OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Pencil shell matrix based image steganography with elevated embedding capacity
Subhadip Mukherjee, Sunita Sarkar, Somnath Mukhopadhyay
Journal of Information Security and Applications (2021) Vol. 62, pp. 102955-102955
Closed Access | Times Cited: 14

Showing 14 citing articles:

Study on Applications of Reversible Information Hiding Algorithms Based on Discrete Cosine Transform Coefficient and Frequency Band Selection in JPEG Image Encryption
Yingwei Gao
Automatic Control and Computer Sciences (2024) Vol. 58, Iss. 2, pp. 216-225
Closed Access | Times Cited: 2

Parallel BFS through pennant data structure with reducer hyper‐object based data hiding for 3D mesh images
Sakhi Bandyopadhyay, Subhadip Mukherjee, Somnath Mukhopadhyay, et al.
Security and Privacy (2024) Vol. 7, Iss. 5
Closed Access | Times Cited: 1

IoTSLE: Securing IoT systems in low-light environments through finite automata, deep learning and DNA computing based image steganographic model
Subhadip Mukherjee, Somnath Mukhopadhyay, Sunita Sarkar
Internet of Things (2024) Vol. 28, pp. 101358-101358
Closed Access | Times Cited: 1

Personal Social Network Profile Authentication through Image Steganography
Subhadip Mukherjee, Somnath Mukhopadhyay, Sunita Sarkar
(2023), pp. 129-129
Open Access | Times Cited: 4

CNN based “Text in Image” Steganography using Slice Encryption Algorithm and LWT
Lingamallu Naga Srinivasu, V. Vijayaraghavan
Optik (2022) Vol. 265, pp. 169398-169398
Closed Access | Times Cited: 6

An Image Steganography Technique Based on Fake DNA Sequence Construction
Subhadip Mukherjee, Sunita Sarkar, Somnath Mukhopadhyay
Algorithms for intelligent systems (2022), pp. 613-621
Closed Access | Times Cited: 6

Octagon Shell Based Image Steganography for Avoiding Human Visual System with Lower Computational Time
Subhadip Mukherjee, Sunita Sarkar, Somnath Mukhopadhyay
2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT) (2022), pp. 1-5
Closed Access | Times Cited: 4

Hiding Secret Data Using AES Encryption and DFS Graph Traversal in 3D Images
Sakhi Bandyopadhyay, Sunita Sarkar, Somnath Mukhopadhyay
(2023), pp. 1-4
Closed Access | Times Cited: 2

ChatGPT Based Image Steganography (CGIS): A Novel Intelligent Information Hiding Approach to Achieve Secure Covert Communication
Subhadip Mukherjee, Somnath Mukhopadhyay, Sunita Sarkar
(2023), pp. 1-5
Closed Access | Times Cited: 2

Chaotic map technique for enhancement security for android mobile system based on image encryption
Kawther Thabt Saleh, Nisreen Abd Alhadi Jabr, Iman Hussein AL-Qinani
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 27, Iss. 3, pp. 1698-1698
Open Access | Times Cited: 3

Virtualized three-dimensional reference tables for efficient data embedding
Wien Hong, G.H. Su, Wei‐Ling Lin, et al.
Journal of Visual Communication and Image Representation (2024), pp. 104351-104351
Closed Access

Hiding speech in music files
X.M Zhang, Shijun Xiang, Huang Hongbin
Journal of Information Security and Applications (2024) Vol. 89, pp. 103951-103951
Closed Access

An Approach on Image Steganography Based on the Least Significant Bit Algorithm
Karthik Chelakkara Murugan, Debabrata Samanta, Mausumi Goswami
Advances in healthcare information systems and administration book series (2022), pp. 228-246
Closed Access

Two Stages of Algebraic Matrix Decomposition in Optimal Image Steganographic Approach
Jumana Waleed, Ihab Mahdi Almaameri, Areej M. Abduldaim, et al.
2022 5th International Conference on Engineering Technology and its Applications (IICETA) (2022), pp. 294-299
Closed Access

Page 1

Scroll to top