OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Image robust adaptive steganography adapted to lossy channels in open social networks
Yi Zhang, Xiangyang Luo, Jinwei Wang, et al.
Information Sciences (2021) Vol. 564, pp. 306-326
Closed Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
De Rosal Ignatius Moses Setiadi, Supriadi Rustad, Pulung Nurtantio Andono, et al.
Signal Processing (2022) Vol. 206, pp. 108908-108908
Closed Access | Times Cited: 83

A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and Embedding
Yichao Tang, Chuntao Wang, Shijun Xiang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4114-4129
Closed Access | Times Cited: 6

Robust data hiding for JPEG images with invertible neural network
Fei Shang, Yuhang Lan, Jianhua Yang, et al.
Neural Networks (2023) Vol. 163, pp. 219-232
Closed Access | Times Cited: 15

Robust Steganography for High Quality Images
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 9, pp. 4893-4906
Closed Access | Times Cited: 10

A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping
Pei Zhang, Qingfeng Cheng, Mingliang Zhang, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4469-4480
Closed Access | Times Cited: 3

A Novel Gradient-guided Post-processing Method for Adaptive Image Steganography
Guoliang Xie, Jinchang Ren, Stephen Marshall, et al.
Signal Processing (2022) Vol. 203, pp. 108813-108813
Open Access | Times Cited: 17

Sign steganography revisited with robust domain selection
Xiaoshuai Wu, Tong Qiao, Yanli Chen, et al.
Signal Processing (2022) Vol. 196, pp. 108522-108522
Closed Access | Times Cited: 15

A two-stage robust reversible watermarking using polar harmonic transform for high robustness and capacity
Yichao Tang, Kangshun Li, Chuntao Wang, et al.
Information Sciences (2023) Vol. 654, pp. 119786-119786
Closed Access | Times Cited: 7

A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning
Hao Li, Jinwei Wang, Naixue Xiong, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2023) Vol. 19, Iss. 6, pp. 1-23
Closed Access | Times Cited: 4

Reversible Data Hiding in Encrypted Images With Adaptive Huffman Code Based on Dynamic Prediction Axes
C. S. Ji, Guangyong Gao, Yun-Qing Shi
IEEE Transactions on Multimedia (2023) Vol. 26, pp. 5962-5975
Closed Access | Times Cited: 4

CNN based “Text in Image” Steganography using Slice Encryption Algorithm and LWT
Lingamallu Naga Srinivasu, V. Vijayaraghavan
Optik (2022) Vol. 265, pp. 169398-169398
Closed Access | Times Cited: 6

Robustness of JPEG images based on F5 steganography
Jiayi Chen, Nan Xu, Li Cheng, et al.
(2024) Vol. 2001, pp. 58-58
Closed Access

Towards improving the security of image steganography via minimizing the spatial embedding impact
Wenkang Su, Jiangqun Ni, Xianglei Hu, et al.
Digital Signal Processing (2022) Vol. 131, pp. 103758-103758
Closed Access | Times Cited: 3

Secure and Efficient Covert Communication for Blockchain-Integrated SAGINs
Weijia Li, Yuan Zhang, Xinyu He, et al.
Security and Safety (2024) Vol. 3, pp. 2024006-2024006
Open Access

Light-weight Steganography for HPC Lossy Compression
Ruiwen Shan, Jon C. Calhoun
(2024), pp. 442-451
Closed Access

Enhancing robustness in video data hiding against recompression with a wide parameter range
Yanli Chen, Asad Malik, Hongxia Wang, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103796-103796
Closed Access

A Covert Communication Method Adapted to Social Media Based on Time Modulation of Bullet Comments
Chun Mao, Zhenyu Li, Mingliang Zhang, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 69, Iss. 3, pp. 568-580
Closed Access | Times Cited: 1

Steganographic key recovery for adaptive steganography under “known-message attacks”
Hansong Du, Jiufen Liu, Yuguo Tian, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 8, pp. 10981-11004
Closed Access | Times Cited: 2

Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes
Hansong Du, Jiufen Liu, Yuguo Tian, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-16
Open Access | Times Cited: 2

A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp Modulation and Carrier Selection Based on Social Networks
Mingliang Zhang, Zhenyu Li, Pei Zhang, et al.
Symmetry (2022) Vol. 14, Iss. 1, pp. 111-111
Open Access | Times Cited: 1

A Hybrid Visual Cryptography Method using Sigmoid Function for Security Enhancement in Gray Scale Images
Dinesh Kumar, Kailash C. Patidar, Mr. Gourav Saxena, et al.
Indian Journal of Artificial Intelligence and Neural Networking (2021) Vol. 1, Iss. 3, pp. 7-11
Open Access | Times Cited: 1

Dhu-Net: High-Capacity Binary Data Hiding Network Based on Improved U-Net
Xintao Duan, chun Li, Bingxin Wei, et al.
(2023)
Closed Access

High Security and Robustness Image Steganography Based On Ant Colony Optimization Algorithms and Discrete Cosine Transform
Ahmed Shihab Ahmed, Hussein Ali Salah
Journal of education for pure science. (2023) Vol. 13, Iss. 4
Open Access

Secure ‘Text in Image’ Steganography Scheme Based on Alexnet and Contour-Let Transform
Lingamallu Naga Srinivasu, V. Vijayaraghavan
2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP) (2022), pp. 1-6
Closed Access

ENHANCEMENT OF SECURED DATA TRANSMISSION USING n*3 INCOMPREHENSIBLE STEGO FILES BASED ON LS, SL, AND LC ALGORITHMS
Lingamallu Naga Srinivasu, V. Vijayaraghavan
Telecommunications and Radio Engineering (2022) Vol. 82, Iss. 1, pp. 19-51
Closed Access

Page 1 - Next Page

Scroll to top