
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A data hiding scheme based on the difference of image interpolation algorithms
Xuemei Bai, Yong Chen, Gangpeng Duan, et al.
Journal of Information Security and Applications (2022) Vol. 65, pp. 103068-103068
Closed Access | Times Cited: 25
Xuemei Bai, Yong Chen, Gangpeng Duan, et al.
Journal of Information Security and Applications (2022) Vol. 65, pp. 103068-103068
Closed Access | Times Cited: 25
Showing 25 citing articles:
Reversible Data Hiding using Pixel-Value-Ordering and Difference Expansion in Digital Images
Ntivuguruzwa Jean De La Croix, Chaidir Chalaf Islamy, Tohari Ahmad
(2022)
Closed Access | Times Cited: 26
Ntivuguruzwa Jean De La Croix, Chaidir Chalaf Islamy, Tohari Ahmad
(2022)
Closed Access | Times Cited: 26
Hybrid prediction error and histogram shifting method for reversible data hiding in video system
Cheng-Ta Huang, Jingyan Song, T. Dang
Journal of Information Security and Applications (2025) Vol. 89, pp. 104007-104007
Closed Access
Cheng-Ta Huang, Jingyan Song, T. Dang
Journal of Information Security and Applications (2025) Vol. 89, pp. 104007-104007
Closed Access
Dynamic Payload Adjustment in Image Steganography Through Interpolation and Center Folding Strategies
Thanh Nhân Vo, Tzu-Chuen Lu
Signal Processing (2025), pp. 110030-110030
Closed Access
Thanh Nhân Vo, Tzu-Chuen Lu
Signal Processing (2025), pp. 110030-110030
Closed Access
Interpolation data hiding schemes based on center folding strategy and well-turned embedded positions
Thanh Nhân Vo, Tzu-Chuen Lu
Journal of Information Security and Applications (2025) Vol. 91, pp. 104055-104055
Closed Access
Thanh Nhân Vo, Tzu-Chuen Lu
Journal of Information Security and Applications (2025) Vol. 91, pp. 104055-104055
Closed Access
Reversible Data Hiding Algorithm in Encrypted Domain Based on Image Interpolation
Siyao Zhong, Yu Lu, Xiangguang Xiong
IEEE Access (2023) Vol. 11, pp. 108281-108294
Open Access | Times Cited: 7
Siyao Zhong, Yu Lu, Xiangguang Xiong
IEEE Access (2023) Vol. 11, pp. 108281-108294
Open Access | Times Cited: 7
Adaptive reversible data hiding scheme based on difference division interpolation
Hua Zhang, Huiying Sun, Fanli Meng
Expert Systems with Applications (2024) Vol. 254, pp. 124338-124338
Closed Access | Times Cited: 2
Hua Zhang, Huiying Sun, Fanli Meng
Expert Systems with Applications (2024) Vol. 254, pp. 124338-124338
Closed Access | Times Cited: 2
Image Steganography using Customized Differences between the Neighboring Pixels
Irsyad Fikriansyah Ramadhan, Rr. Diajeng Alfisyahrinnisa Anandha, Adifa Widyadhani Chanda D’Layla, et al.
(2024), pp. 496-501
Closed Access | Times Cited: 2
Irsyad Fikriansyah Ramadhan, Rr. Diajeng Alfisyahrinnisa Anandha, Adifa Widyadhani Chanda D’Layla, et al.
(2024), pp. 496-501
Closed Access | Times Cited: 2
VHNet: A Video Hiding Network with robustness to video coding
Xiaofeng Shen, Heng Yao, Shunquan Tan, et al.
Journal of Information Security and Applications (2023) Vol. 75, pp. 103515-103515
Closed Access | Times Cited: 4
Xiaofeng Shen, Heng Yao, Shunquan Tan, et al.
Journal of Information Security and Applications (2023) Vol. 75, pp. 103515-103515
Closed Access | Times Cited: 4
A Steganographic Approach to Secure Data Using Pairs-Based Difference Expansion
Hammuda Arsyad, Ntivuguruzwa Jean De La Croix, Tohari Ahmad
(2023), pp. 363-368
Closed Access | Times Cited: 3
Hammuda Arsyad, Ntivuguruzwa Jean De La Croix, Tohari Ahmad
(2023), pp. 363-368
Closed Access | Times Cited: 3
Reversible data hiding scheme based on improved interpolation and three-in-one intelligent strategy
Hua Zhang, Huiying Sun, Fanli Meng
Journal of Information Security and Applications (2023) Vol. 77, pp. 103573-103573
Closed Access | Times Cited: 2
Hua Zhang, Huiying Sun, Fanli Meng
Journal of Information Security and Applications (2023) Vol. 77, pp. 103573-103573
Closed Access | Times Cited: 2
High Payload Lossless Steganography Using Image Interpolation
Raju Pratap Sharma, Aruna Malik, Samayveer Singh, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-14
Open Access | Times Cited: 2
Raju Pratap Sharma, Aruna Malik, Samayveer Singh, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-14
Open Access | Times Cited: 2
Interpolation Based Reversible Data Hiding using Pixel Intensity Classes
Abhinandan Tripathi, Jay Prakash
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING (2023)
Open Access | Times Cited: 2
Abhinandan Tripathi, Jay Prakash
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING (2023)
Open Access | Times Cited: 2
Octagon Shell Based Image Steganography for Avoiding Human Visual System with Lower Computational Time
Subhadip Mukherjee, Sunita Sarkar, Somnath Mukhopadhyay
2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT) (2022), pp. 1-5
Closed Access | Times Cited: 4
Subhadip Mukherjee, Sunita Sarkar, Somnath Mukhopadhyay
2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT) (2022), pp. 1-5
Closed Access | Times Cited: 4
Adaptive Reversible Data Hiding Scheme Based on Difference Division Interpolation
Hua Zhang, Huiying Sun, Fanli Meng
(2024)
Closed Access
Hua Zhang, Huiying Sun, Fanli Meng
(2024)
Closed Access
Block-based optimization for enhancing reversible watermarking using reduce difference expansion
Aulia Arham, Hanung Adi Nugroho
Communications in Science and Technology (2024) Vol. 9, Iss. 1, pp. 57-64
Open Access
Aulia Arham, Hanung Adi Nugroho
Communications in Science and Technology (2024) Vol. 9, Iss. 1, pp. 57-64
Open Access
Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in images
Aulia Arham, Hanung Adi Nugroho
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access
Aulia Arham, Hanung Adi Nugroho
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access
RADH-A Reversible and Authenticable Data Hiding Scheme in Encrypted Domain Based on Image Interpolation and Substitution
Chia‐Chen Lin, R.-J. Chen, Wei‐Liang Tai, et al.
Applied Sciences (2024) Vol. 14, Iss. 23, pp. 11083-11083
Open Access
Chia‐Chen Lin, R.-J. Chen, Wei‐Liang Tai, et al.
Applied Sciences (2024) Vol. 14, Iss. 23, pp. 11083-11083
Open Access
Reversible Data Hiding Algorithm in Encrypted Domain Based on Image Interpolation and Substitution
Chia‐Chen Lin, R.-J. Chen, Aristophane Nshimiyimana, et al.
(2024), pp. 102-109
Closed Access
Chia‐Chen Lin, R.-J. Chen, Aristophane Nshimiyimana, et al.
(2024), pp. 102-109
Closed Access
A Contemporary Review of Interpolation-based Reversible Data Hiding
Supriya Pandey, Shrawan Kumar Pandey, Abhinandan Tripathi
(2024), pp. 1646-1653
Closed Access
Supriya Pandey, Shrawan Kumar Pandey, Abhinandan Tripathi
(2024), pp. 1646-1653
Closed Access
An efficient separable reversible data hiding method based on bit pair difference at pixel level
Sanjay Kumar, Gurjit Singh Walia, Anjana Gupta
The Imaging Science Journal (2024), pp. 1-14
Closed Access
Sanjay Kumar, Gurjit Singh Walia, Anjana Gupta
The Imaging Science Journal (2024), pp. 1-14
Closed Access
Adaptive Reversible Data Hiding Scheme Based on Difference Division Interpolation
Hua Zhang, Huiying Sun, Fanli Meng
(2023)
Closed Access | Times Cited: 1
Hua Zhang, Huiying Sun, Fanli Meng
(2023)
Closed Access | Times Cited: 1
High Capacity Reversible Data Hiding Scheme based on Interpolation and Tetris Matrix
Fei-Fei Qian, Nuo Xu, Wanli Lyu
2022 41st Chinese Control Conference (CCC) (2022), pp. 7471-7478
Closed Access | Times Cited: 1
Fei-Fei Qian, Nuo Xu, Wanli Lyu
2022 41st Chinese Control Conference (CCC) (2022), pp. 7471-7478
Closed Access | Times Cited: 1
Separable high-capacity reversible data hiding in encrypted images based on multiple predictive compression coding
Hui Shi, Kexun Yan, Ziyi Zhou, et al.
Journal of Electronic Imaging (2023) Vol. 32, Iss. 05
Closed Access
Hui Shi, Kexun Yan, Ziyi Zhou, et al.
Journal of Electronic Imaging (2023) Vol. 32, Iss. 05
Closed Access
Adaptive Reversible Data Hiding Scheme Based on Difference Division Interpolation
Hua Zhang, Huiying Sun, Fanli Meng
(2023)
Closed Access
Hua Zhang, Huiying Sun, Fanli Meng
(2023)
Closed Access
An Effective Reversible Data Hiding Scheme Used in Compressible Encryption Which Can Prevent Loss
S.F. Li, Meng Zhang
(2023), pp. 74-78
Closed Access
S.F. Li, Meng Zhang
(2023), pp. 74-78
Closed Access