
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh
Information Sciences (2019) Vol. 486, pp. 204-230
Closed Access | Times Cited: 55
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh
Information Sciences (2019) Vol. 486, pp. 204-230
Closed Access | Times Cited: 55
Showing 1-25 of 55 citing articles:
Digital image and video watermarking: methodologies, attacks, applications, and future directions
P. Aberna, L. Agilandeeswari
Multimedia Tools and Applications (2023) Vol. 83, Iss. 2, pp. 5531-5591
Closed Access | Times Cited: 41
P. Aberna, L. Agilandeeswari
Multimedia Tools and Applications (2023) Vol. 83, Iss. 2, pp. 5531-5591
Closed Access | Times Cited: 41
Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective
Hemalatha Mahalingam, V. Thanikaiselvan, Anirudh Rajiv Menon, et al.
Mathematics (2023) Vol. 11, Iss. 2, pp. 457-457
Open Access | Times Cited: 40
Hemalatha Mahalingam, V. Thanikaiselvan, Anirudh Rajiv Menon, et al.
Mathematics (2023) Vol. 11, Iss. 2, pp. 457-457
Open Access | Times Cited: 40
A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication
L. Agilandeeswari, Prabukumar Manoharan, Farhan A. Alenizi
Multimedia Tools and Applications (2023) Vol. 82, Iss. 28, pp. 43367-43419
Open Access | Times Cited: 20
L. Agilandeeswari, Prabukumar Manoharan, Farhan A. Alenizi
Multimedia Tools and Applications (2023) Vol. 82, Iss. 28, pp. 43367-43419
Open Access | Times Cited: 20
A review of image watermarking for identity protection and verification
Sunpreet Sharma, Ju Jia Zou, Gu Fang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 31829-31891
Open Access | Times Cited: 19
Sunpreet Sharma, Ju Jia Zou, Gu Fang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 31829-31891
Open Access | Times Cited: 19
Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability
X. Li, Qiancheng Chen, Runfu Chu, et al.
PLoS ONE (2024) Vol. 19, Iss. 2, pp. e0297632-e0297632
Open Access | Times Cited: 6
X. Li, Qiancheng Chen, Runfu Chu, et al.
PLoS ONE (2024) Vol. 19, Iss. 2, pp. e0297632-e0297632
Open Access | Times Cited: 6
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
Afrig Aminuddin, Ferda Ernawan
Computers & Electrical Engineering (2022) Vol. 102, pp. 108207-108207
Closed Access | Times Cited: 23
Afrig Aminuddin, Ferda Ernawan
Computers & Electrical Engineering (2022) Vol. 102, pp. 108207-108207
Closed Access | Times Cited: 23
A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes
Andy M. Ramos, José A.P. Artiles, Daniel P. B. Chaves, et al.
Entropy (2023) Vol. 25, Iss. 3, pp. 508-508
Open Access | Times Cited: 12
Andy M. Ramos, José A.P. Artiles, Daniel P. B. Chaves, et al.
Entropy (2023) Vol. 25, Iss. 3, pp. 508-508
Open Access | Times Cited: 12
A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map
Milad Jafari Barani, Milad Yousefi Valandar, Peyman Ayubi
Optik (2019) Vol. 187, pp. 205-222
Closed Access | Times Cited: 41
Milad Jafari Barani, Milad Yousefi Valandar, Peyman Ayubi
Optik (2019) Vol. 187, pp. 205-222
Closed Access | Times Cited: 41
Artificial bee colony based perceptually tuned blind color image watermarking in hybrid LWT-DCT domain
Sourabh Sharma, Harish Sharma, Janki Ballabh Sharma
Multimedia Tools and Applications (2021) Vol. 80, Iss. 12, pp. 18753-18785
Closed Access | Times Cited: 31
Sourabh Sharma, Harish Sharma, Janki Ballabh Sharma
Multimedia Tools and Applications (2021) Vol. 80, Iss. 12, pp. 18753-18785
Closed Access | Times Cited: 31
A chaotic video steganography technique for carrying different types of secret messages
Milad Yousefi Valandar, Peyman Ayubi, Milad Jafari Barani, et al.
Journal of Information Security and Applications (2022) Vol. 66, pp. 103160-103160
Closed Access | Times Cited: 21
Milad Yousefi Valandar, Peyman Ayubi, Milad Jafari Barani, et al.
Journal of Information Security and Applications (2022) Vol. 66, pp. 103160-103160
Closed Access | Times Cited: 21
A novel color image tampering detection and self-recovery based on fragile watermarking
Xiaofan Xia, Songsong Zhang, Kunshu Wang, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103619-103619
Closed Access | Times Cited: 11
Xiaofan Xia, Songsong Zhang, Kunshu Wang, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103619-103619
Closed Access | Times Cited: 11
Application of discrete transforms with selective coefficients for blind image watermarking
E. Laxmi Lydia, R. Joshua Samuel Raj, Rajajee Selvam, et al.
Transactions on Emerging Telecommunications Technologies (2019) Vol. 32, Iss. 2
Closed Access | Times Cited: 34
E. Laxmi Lydia, R. Joshua Samuel Raj, Rajajee Selvam, et al.
Transactions on Emerging Telecommunications Technologies (2019) Vol. 32, Iss. 2
Closed Access | Times Cited: 34
An Effective Semi-fragile Watermarking Method for Image Authentication Based on Lifting Wavelet Transform and Feed-Forward Neural Network
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Reza Monsefi
Cognitive Computation (2020) Vol. 12, Iss. 4, pp. 863-890
Closed Access | Times Cited: 28
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Reza Monsefi
Cognitive Computation (2020) Vol. 12, Iss. 4, pp. 863-890
Closed Access | Times Cited: 28
A critical literature survey and prospects on tampering and anomaly detection in image data
Kelton Augusto Pontara da Costa, João Paulo Papa, Leandro A. Passos, et al.
Applied Soft Computing (2020) Vol. 97, pp. 106727-106727
Closed Access | Times Cited: 27
Kelton Augusto Pontara da Costa, João Paulo Papa, Leandro A. Passos, et al.
Applied Soft Computing (2020) Vol. 97, pp. 106727-106727
Closed Access | Times Cited: 27
Hierarchical multilevel framework using RDWT-QR optimized watermarking in telemedicine
K. Swaraja, K. Meenakshi, Padmavathi Kora
Biomedical Signal Processing and Control (2021) Vol. 68, pp. 102688-102688
Closed Access | Times Cited: 23
K. Swaraja, K. Meenakshi, Padmavathi Kora
Biomedical Signal Processing and Control (2021) Vol. 68, pp. 102688-102688
Closed Access | Times Cited: 23
A self-embedding secure fragile watermarking scheme with high quality recovery
Li Huang, Da Kuang, Chenglong Li, et al.
Journal of Visual Communication and Image Representation (2022) Vol. 83, pp. 103437-103437
Closed Access | Times Cited: 16
Li Huang, Da Kuang, Chenglong Li, et al.
Journal of Visual Communication and Image Representation (2022) Vol. 83, pp. 103437-103437
Closed Access | Times Cited: 16
A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities
Sunpreet Sharma, Ju Jia Zou, Gu Fang
IEEE Access (2022) Vol. 10, pp. 85677-85700
Closed Access | Times Cited: 14
Sunpreet Sharma, Ju Jia Zou, Gu Fang
IEEE Access (2022) Vol. 10, pp. 85677-85700
Closed Access | Times Cited: 14
A Review of Genome to Chaos: Exploring DNA Dynamics in Security
S. Aashiq Banu, L. Koteswara Rao, P. Shanmuga Priya, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
S. Aashiq Banu, L. Koteswara Rao, P. Shanmuga Priya, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting
Fei Peng, Zi-Xing Lin, Xiang Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2020) Vol. 31, Iss. 1, pp. 411-424
Closed Access | Times Cited: 23
Fei Peng, Zi-Xing Lin, Xiang Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2020) Vol. 31, Iss. 1, pp. 411-424
Closed Access | Times Cited: 23
A blind recovery technique with integer wavelet transforms in image watermarking
Ferda Ernawan, Afrig Aminuddin, Suraya Abu Bakar
Engineering Science and Technology an International Journal (2023) Vol. 48, pp. 101586-101586
Open Access | Times Cited: 7
Ferda Ernawan, Afrig Aminuddin, Suraya Abu Bakar
Engineering Science and Technology an International Journal (2023) Vol. 48, pp. 101586-101586
Open Access | Times Cited: 7
Reversible Image Fragile Watermarking with Dual Tampering Detection
Cai Zhan, Lu Leng, Chin‐Chen Chang, et al.
Electronics (2024) Vol. 13, Iss. 10, pp. 1884-1884
Open Access | Times Cited: 2
Cai Zhan, Lu Leng, Chin‐Chen Chang, et al.
Electronics (2024) Vol. 13, Iss. 10, pp. 1884-1884
Open Access | Times Cited: 2
WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Ahad Harati, et al.
Applied Soft Computing (2020) Vol. 101, pp. 107029-107029
Open Access | Times Cited: 18
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Ahad Harati, et al.
Applied Soft Computing (2020) Vol. 101, pp. 107029-107029
Open Access | Times Cited: 18
Review on secured data capabilities of cryptography, steganography, and watermarking domain
Farah Qasim Ahmed Alyousuf, Roshidi Din
Indonesian Journal of Electrical Engineering and Computer Science (2020) Vol. 17, Iss. 2, pp. 1053-1053
Open Access | Times Cited: 16
Farah Qasim Ahmed Alyousuf, Roshidi Din
Indonesian Journal of Electrical Engineering and Computer Science (2020) Vol. 17, Iss. 2, pp. 1053-1053
Open Access | Times Cited: 16
Detection and Recovery of Higher Tampered Images Using Novel Feature and Compression Strategy
Faranak Tohidi, Manoranjan Paul, M. R. Hooshmandasl
IEEE Access (2021) Vol. 9, pp. 57510-57528
Open Access | Times Cited: 15
Faranak Tohidi, Manoranjan Paul, M. R. Hooshmandasl
IEEE Access (2021) Vol. 9, pp. 57510-57528
Open Access | Times Cited: 15
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
S. Aashiq Banu, Rengarajan Amirtharajan
Frontiers of Information Technology & Electronic Engineering (2021) Vol. 22, Iss. 7, pp. 940-956
Closed Access | Times Cited: 14
S. Aashiq Banu, Rengarajan Amirtharajan
Frontiers of Information Technology & Electronic Engineering (2021) Vol. 22, Iss. 7, pp. 940-956
Closed Access | Times Cited: 14