OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Hiding data in dual color images reversibly via weighted matrix
Partha Chowdhuri, Biswapati Jana
Journal of Information Security and Applications (2019) Vol. 50, pp. 102420-102420
Closed Access | Times Cited: 22

Showing 22 citing articles:

An efficient general data hiding scheme based on image interpolation
Yongqing Chen, Wei-jiao Sun, Liyao Li, et al.
Journal of Information Security and Applications (2020) Vol. 54, pp. 102584-102584
Closed Access | Times Cited: 56

A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and Embedding
Yichao Tang, Chuntao Wang, Shijun Xiang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4114-4129
Closed Access | Times Cited: 7

An Adaptive Bit Allocation Strategy for Minimizing Embedding Distortion in Interpolated Images Used for Reversible Data Hiding
Xiangguang Xiong
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 20088-20098
Closed Access | Times Cited: 3

Adaptive reversible data hiding algorithm for interpolated images using sorting and coding
Xiangguang Xiong, Yi Chen, Mengting Fan, et al.
Journal of Information Security and Applications (2022) Vol. 66, pp. 103137-103137
Closed Access | Times Cited: 15

Data hiding during image processing using capsule networks
Zichi Wang, Guorui Feng, Hanzhou Wu, et al.
Neurocomputing (2023) Vol. 537, pp. 49-60
Closed Access | Times Cited: 7

Reversible hiding method for interpolation images featuring a multilayer center folding strategy
Tzu-Chuen Lu, Shi-Ru Huang, Shu-Wen Huang
Soft Computing (2020) Vol. 25, Iss. 1, pp. 161-180
Closed Access | Times Cited: 18

Pencil shell matrix based image steganography with elevated embedding capacity
Subhadip Mukherjee, Sunita Sarkar, Somnath Mukhopadhyay
Journal of Information Security and Applications (2021) Vol. 62, pp. 102955-102955
Closed Access | Times Cited: 14

Reversible difference expansion multi-layer data hiding technique for medical images
Pascal Maniriho, Leki Jovial Mahoro, Zephanie Bizimana, et al.
International Journal of Advances in Intelligent Informatics (2021) Vol. 7, Iss. 1, pp. 1-1
Open Access | Times Cited: 10

Image Covert Communication With Block Regulation
Shuying Xu, Chin‐Chen Chang, Ji-Hwei Horng
IEEE Signal Processing Letters (2023) Vol. 30, pp. 1217-1221
Closed Access | Times Cited: 2

The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models
Tarek Chaalan, Shaoning Pang, Joarder Kamruzzaman, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 7, pp. 1-39
Open Access | Times Cited: 2

Steganography in Style Transfer
Ruolan Shi, Zichi Wang, Yunlong Hao, et al.
IEEE Transactions on Artificial Intelligence (2024) Vol. 5, Iss. 12, pp. 6054-6065
Closed Access

Dual image based secured reversible data hiding scheme exploiting huffman compression tree combining bit-reversal permutation technique
Kankana Datta, Biswapati Jana, Mamata Dalui Chakraborty
Multimedia Tools and Applications (2024)
Closed Access

Hiding image into image with hybrid attention mechanism based on GANs
Yuling Zhu, Yunyun Dong, Bingbing Song, et al.
IET Image Processing (2024) Vol. 18, Iss. 10, pp. 2679-2689
Open Access

A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique
Kankana Datta, Biswapati Jana, Mamata Dalui Chakraborty
Computer Standards & Interfaces (2024) Vol. 92, pp. 103919-103919
Closed Access

Image based information hiding via minimization of entropy and randomization
Xuemeng Zhao, Yinglei Song
Information Sciences (2024) Vol. 689, pp. 121514-121514
Closed Access

An adaptive block‐wise prediction error‐based (AdaBPE) reversible data hiding in encrypted images for medical image transmission
Shaiju Panchikkil, V. M. Manikandan, Partha Pratim Roy, et al.
CAAI Transactions on Intelligence Technology (2024)
Open Access

An efficient separable reversible data hiding method based on bit pair difference at pixel level
Sanjay Kumar, Gurjit Singh Walia, Anjana Gupta
The Imaging Science Journal (2024), pp. 1-14
Closed Access

Multi-Carrier Information Hiding Algorithm Based on Angle Structure Descriptor
Shuai Ren, Meng Wang, Khurram Shahzad, et al.
IEEE Access (2020) Vol. 8, pp. 122565-122578
Open Access | Times Cited: 3

An Image-Based Information Hiding Approach with Chaotic Systems and Optimized Security
Abdiqani A. Saliban, Yinglei Song
Current Chinese Computer Science (2022) Vol. 2, Iss. 1
Closed Access | Times Cited: 1

Reversible transformation of tetrahedral mesh models for data protection and information hiding
Hao‐Tian Wu, Tao Zhou, Zhenwei Zhuang, et al.
Journal of Information Security and Applications (2022) Vol. 66, pp. 103161-103161
Closed Access | Times Cited: 1

Separable high-capacity reversible data hiding in encrypted images based on multiple predictive compression coding
Hui Shi, Kexun Yan, Ziyi Zhou, et al.
Journal of Electronic Imaging (2023) Vol. 32, Iss. 05
Closed Access

Page 1

Scroll to top