
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Primitively visually meaningful image encryption: A new paradigm
Ruoyu Zhao, Yushu Zhang, Yu Nan, et al.
Information Sciences (2022) Vol. 613, pp. 628-648
Closed Access | Times Cited: 28
Ruoyu Zhao, Yushu Zhang, Yu Nan, et al.
Information Sciences (2022) Vol. 613, pp. 628-648
Closed Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
A comprehensive survey on image encryption: Taxonomy, challenges, and future directions
Morteza SaberiKamarposhti, Amirabbas Ghorbani, Mehdi Yadollahi
Chaos Solitons & Fractals (2023) Vol. 178, pp. 114361-114361
Closed Access | Times Cited: 52
Morteza SaberiKamarposhti, Amirabbas Ghorbani, Mehdi Yadollahi
Chaos Solitons & Fractals (2023) Vol. 178, pp. 114361-114361
Closed Access | Times Cited: 52
Image encryption algorithm based on a new 2D polynomial chaotic map and dynamic S-box
Wanqing Wu, LingShuai Kong
Signal Image and Video Processing (2024) Vol. 18, Iss. 4, pp. 3213-3228
Closed Access | Times Cited: 16
Wanqing Wu, LingShuai Kong
Signal Image and Video Processing (2024) Vol. 18, Iss. 4, pp. 3213-3228
Closed Access | Times Cited: 16
All Roads Lead to Rome: Achieving 3D Object Encryption through 2D Image Encryption Methods
Ruoyu Zhao, Yushu Zhang, Rushi Lan, et al.
IEEE Transactions on Image Processing (2025) Vol. 34, pp. 1075-1089
Closed Access
Ruoyu Zhao, Yushu Zhang, Rushi Lan, et al.
IEEE Transactions on Image Processing (2025) Vol. 34, pp. 1075-1089
Closed Access
TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images
Xiuli Chai, Guoqiang Long, Zhihua Gan, et al.
Applied Intelligence (2024) Vol. 54, Iss. 4, pp. 3429-3447
Closed Access | Times Cited: 4
Xiuli Chai, Guoqiang Long, Zhihua Gan, et al.
Applied Intelligence (2024) Vol. 54, Iss. 4, pp. 3429-3447
Closed Access | Times Cited: 4
An image encryption approach based on a novel two-dimensional chaotic system
Mingjie Zhao, Lixiang Li, Zheng Yuan
Nonlinear Dynamics (2024) Vol. 112, Iss. 22, pp. 20483-20509
Closed Access | Times Cited: 4
Mingjie Zhao, Lixiang Li, Zheng Yuan
Nonlinear Dynamics (2024) Vol. 112, Iss. 22, pp. 20483-20509
Closed Access | Times Cited: 4
SA-TPE: An ideal thumbnail-preserving encryption method based on selective area
Yuexi Peng, Zhiyong Huang, Zhijun Li, et al.
Expert Systems with Applications (2025), pp. 127275-127275
Closed Access
Yuexi Peng, Zhiyong Huang, Zhijun Li, et al.
Expert Systems with Applications (2025), pp. 127275-127275
Closed Access
New 2D hyperchaotic Cubic-Tent map and improved 3D Hilbert diffusion for image encryption
Xinli Xu, Xin-guang Song, Si-hang Liu, et al.
Applied Intelligence (2025) Vol. 55, Iss. 7
Closed Access
Xinli Xu, Xin-guang Song, Si-hang Liu, et al.
Applied Intelligence (2025) Vol. 55, Iss. 7
Closed Access
Noise-free thumbnail-preserving image encryption based on MSB prediction
Zhujing Ye, Ruoyu Zhao, Yushu Zhang, et al.
Information Sciences (2022) Vol. 617, pp. 395-415
Closed Access | Times Cited: 20
Zhujing Ye, Ruoyu Zhao, Yushu Zhang, et al.
Information Sciences (2022) Vol. 617, pp. 395-415
Closed Access | Times Cited: 20
Construction of a New 2D Hyperchaotic Map with Application in Efficient Pseudo-Random Number Generator Design and Color Image Encryption
Shenli Zhu, Xiaoheng Deng, Wendong Zhang, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3171-3171
Open Access | Times Cited: 12
Shenli Zhu, Xiaoheng Deng, Wendong Zhang, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3171-3171
Open Access | Times Cited: 12
Image encryption algorithm based on 2D‐CLICM chaotic system
Xiaoman Jiang, Guangyu Jiang, Qingke Wang, et al.
IET Image Processing (2023) Vol. 17, Iss. 7, pp. 2127-2141
Open Access | Times Cited: 11
Xiaoman Jiang, Guangyu Jiang, Qingke Wang, et al.
IET Image Processing (2023) Vol. 17, Iss. 7, pp. 2127-2141
Open Access | Times Cited: 11
Usability Enhanced Thumbnail-Preserving Encryption Based on Data Hiding for JPEG Images
Xi Ye, Yushu Zhang, Xiangli Xiao, et al.
IEEE Signal Processing Letters (2023) Vol. 30, pp. 793-797
Closed Access | Times Cited: 11
Xi Ye, Yushu Zhang, Xiangli Xiao, et al.
IEEE Signal Processing Letters (2023) Vol. 30, pp. 793-797
Closed Access | Times Cited: 11
A novel multi-layer image encryption algorithm based on 2D drop-wave function
Xingbin Liu, Jing Yang
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 3
Xingbin Liu, Jing Yang
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 3
Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT
Ruoyu Zhao, Yushu Zhang, Rushi Lan, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 3, pp. 2630-2645
Closed Access | Times Cited: 16
Ruoyu Zhao, Yushu Zhang, Rushi Lan, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 3, pp. 2630-2645
Closed Access | Times Cited: 16
An Effective Anti-Object-Detection Image Privacy Protection Scheme Based on Robust Chaos
Yuexi Peng, Zixin Lan, Zhijun Li, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 5, pp. 7227-7237
Closed Access | Times Cited: 3
Yuexi Peng, Zixin Lan, Zhijun Li, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 5, pp. 7227-7237
Closed Access | Times Cited: 3
Visually semantic-preserving and people-oriented color image encryption based on cross-plane thumbnail preservation
Dezhi An, Dawei Hao, Ruoyu Zhao, et al.
Expert Systems with Applications (2023) Vol. 233, pp. 120931-120931
Closed Access | Times Cited: 8
Dezhi An, Dawei Hao, Ruoyu Zhao, et al.
Expert Systems with Applications (2023) Vol. 233, pp. 120931-120931
Closed Access | Times Cited: 8
Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption
Dezhi An, Dawei Hao, Jun Lu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17357-17371
Closed Access | Times Cited: 2
Dezhi An, Dawei Hao, Jun Lu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17357-17371
Closed Access | Times Cited: 2
TPE-AP: Thumbnail-Preserving Encryption Based on Adjustable Precision for JPEG Images
Xiuli Chai, Gongyao Cao, Zhihua Gan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 22, pp. 37021-37031
Closed Access | Times Cited: 2
Xiuli Chai, Gongyao Cao, Zhihua Gan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 22, pp. 37021-37031
Closed Access | Times Cited: 2
Adversarial Thumbnail-Preserving Transformation for Facial Images Based on GAN
Wentao Zhou, Yushu Zhang, Ruoyu Zhao, et al.
IEEE Signal Processing Letters (2023) Vol. 30, pp. 1147-1151
Closed Access | Times Cited: 6
Wentao Zhou, Yushu Zhang, Ruoyu Zhao, et al.
IEEE Signal Processing Letters (2023) Vol. 30, pp. 1147-1151
Closed Access | Times Cited: 6
IoT Privacy Protection: JPEG-TPE With Lower File Size Expansion and Lossless Decryption
Yuan Yuan, Hongjie He, Hadi Amirpour, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23485-23496
Closed Access | Times Cited: 1
Yuan Yuan, Hongjie He, Hadi Amirpour, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23485-23496
Closed Access | Times Cited: 1
Visually Semantics-Aware Color Image Encryption Based on Cross-Plane Substitution and Permutation
Yongming Zhang, Ruoyu Zhao, Yushu Zhang, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10576-10586
Closed Access | Times Cited: 1
Yongming Zhang, Ruoyu Zhao, Yushu Zhang, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10576-10586
Closed Access | Times Cited: 1
Visual Content Privacy Protection: A Survey
Ruoyu Zhao, Yushu Zhang, Tao Wang, et al.
ACM Computing Surveys (2024)
Open Access | Times Cited: 1
Ruoyu Zhao, Yushu Zhang, Tao Wang, et al.
ACM Computing Surveys (2024)
Open Access | Times Cited: 1
3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system
Ruoyu Zhao, Yushu Zhang, Shimin Li, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122140-122140
Closed Access | Times Cited: 3
Ruoyu Zhao, Yushu Zhang, Shimin Li, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122140-122140
Closed Access | Times Cited: 3
The Probabilistic Image Encryption Algorithm Based on Galois Field GF(257)
Yong Zhang, Ruiyou Li, Yuwen Shi, et al.
IETE Journal of Research (2023), pp. 1-14
Closed Access | Times Cited: 3
Yong Zhang, Ruiyou Li, Yuwen Shi, et al.
IETE Journal of Research (2023), pp. 1-14
Closed Access | Times Cited: 3
Biometric information security based on double chaotic rotating diffusion
Zhenlong Man
Chaos Solitons & Fractals (2023) Vol. 172, pp. 113614-113614
Open Access | Times Cited: 2
Zhenlong Man
Chaos Solitons & Fractals (2023) Vol. 172, pp. 113614-113614
Open Access | Times Cited: 2
Four enhanced algorithms for full size image hiding in chest x-ray images
Apichat Heednacram, Yossawee Keaomanee
Multimedia Tools and Applications (2024) Vol. 83, Iss. 30, pp. 74855-74881
Closed Access
Apichat Heednacram, Yossawee Keaomanee
Multimedia Tools and Applications (2024) Vol. 83, Iss. 30, pp. 74855-74881
Closed Access