
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier
J. Hemalatha, M. Sekar, Chandan Kumar, et al.
Journal of Information Security and Applications (2023) Vol. 76, pp. 103541-103541
Closed Access | Times Cited: 33
J. Hemalatha, M. Sekar, Chandan Kumar, et al.
Journal of Information Security and Applications (2023) Vol. 76, pp. 103541-103541
Closed Access | Times Cited: 33
Showing 1-25 of 33 citing articles:
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers
Mohammed Es-Sabry, Nabil El Akkad, Lahbib Khrissi, et al.
Egyptian Informatics Journal (2024) Vol. 25, pp. 100449-100449
Open Access | Times Cited: 17
Mohammed Es-Sabry, Nabil El Akkad, Lahbib Khrissi, et al.
Egyptian Informatics Journal (2024) Vol. 25, pp. 100449-100449
Open Access | Times Cited: 17
CUSE: Copyright protection of UNESCO heritage images for safe cities environment
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava
Multimedia Tools and Applications (2025)
Closed Access | Times Cited: 1
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava
Multimedia Tools and Applications (2025)
Closed Access | Times Cited: 1
A new pseudorandom number generator based on chaos in digital filters for image encryption
Z. B. Madouri, Naima Hadj Said, A. Ali Pacha
Journal of Optics (2024)
Closed Access | Times Cited: 7
Z. B. Madouri, Naima Hadj Said, A. Ali Pacha
Journal of Optics (2024)
Closed Access | Times Cited: 7
FuzConvSteganalysis: Steganalysis via fuzzy logic and convolutional neural network
Ntivuguruzwa Jean De La Croix, Tohari Ahmad
SoftwareX (2024) Vol. 26, pp. 101713-101713
Open Access | Times Cited: 5
Ntivuguruzwa Jean De La Croix, Tohari Ahmad
SoftwareX (2024) Vol. 26, pp. 101713-101713
Open Access | Times Cited: 5
IMIH: Imperceptible Medical Image Hiding for Secure Healthcare
Ping Ping, Wei Pan, Deyin Fu, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4652-4667
Closed Access | Times Cited: 4
Ping Ping, Wei Pan, Deyin Fu, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4652-4667
Closed Access | Times Cited: 4
PELMI: Realize robust DNA image storage under general errors via parity encoding and local mean iteration
Ben Cao, Kun Wang, Lei Xie, et al.
Briefings in Bioinformatics (2024) Vol. 25, Iss. 5
Open Access | Times Cited: 4
Ben Cao, Kun Wang, Lei Xie, et al.
Briefings in Bioinformatics (2024) Vol. 25, Iss. 5
Open Access | Times Cited: 4
Editorial: Advancements in multimedia security in the context of artificial intelligence and cloud computing
Rajeev Kumar, Roberto Caldelli, Wong KokSheik, et al.
Journal of Information Security and Applications (2025), pp. 103964-103964
Closed Access
Rajeev Kumar, Roberto Caldelli, Wong KokSheik, et al.
Journal of Information Security and Applications (2025), pp. 103964-103964
Closed Access
Offline Efficient Signature Authentication Using Octave Convolution Neural Network
Adnan Gutub, Sahar Altalhi, Budur Ghazwani
Arabian Journal for Science and Engineering (2025)
Closed Access
Adnan Gutub, Sahar Altalhi, Budur Ghazwani
Arabian Journal for Science and Engineering (2025)
Closed Access
A Trust-based Global Expert System for Disease Diagnosis Using Hierarchical Federated Learning
Farah M. Al-Mulla, Mohammed A. Almulla
Journal of Engineering Research (2025)
Open Access
Farah M. Al-Mulla, Mohammed A. Almulla
Journal of Engineering Research (2025)
Open Access
Rad-Mark: Reliable adversarial zero-watermarking
Kun Hu, D Zhai, Heng Gao, et al.
Neurocomputing (2025), pp. 129970-129970
Closed Access
Kun Hu, D Zhai, Heng Gao, et al.
Neurocomputing (2025), pp. 129970-129970
Closed Access
Storing Images in DNA via base128 Encoding
Kun Wang, Ben Cao, Tao Ma, et al.
Journal of Chemical Information and Modeling (2024) Vol. 64, Iss. 5, pp. 1719-1729
Closed Access | Times Cited: 4
Kun Wang, Ben Cao, Tao Ma, et al.
Journal of Chemical Information and Modeling (2024) Vol. 64, Iss. 5, pp. 1719-1729
Closed Access | Times Cited: 4
Integrating machine learning and features extraction for practical reliable color images steganalysis classification
Ahd Aljarf, Haneen Zamzami, Adnan Gutub
Soft Computing (2023) Vol. 27, Iss. 19, pp. 13877-13888
Closed Access | Times Cited: 10
Ahd Aljarf, Haneen Zamzami, Adnan Gutub
Soft Computing (2023) Vol. 27, Iss. 19, pp. 13877-13888
Closed Access | Times Cited: 10
A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem
Raghunandan Ramesh, Radhakrishna Dodmane, Surendra Shetty, et al.
Cryptography (2023) Vol. 7, Iss. 3, pp. 44-44
Open Access | Times Cited: 9
Raghunandan Ramesh, Radhakrishna Dodmane, Surendra Shetty, et al.
Cryptography (2023) Vol. 7, Iss. 3, pp. 44-44
Open Access | Times Cited: 9
Improving the robustness of steganalysis in the adversarial environment with Generative Adversarial Network
Peng Ye, Qi Yu, Guobin Fu, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103743-103743
Closed Access | Times Cited: 2
Peng Ye, Qi Yu, Guobin Fu, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103743-103743
Closed Access | Times Cited: 2
A novel image compression method using wavelet coefficients and Huffman coding
Shiju Thomas, Addepalli V. N. Krishna, Sabeen Govind, et al.
Journal of Engineering Research (2023)
Open Access | Times Cited: 6
Shiju Thomas, Addepalli V. N. Krishna, Sabeen Govind, et al.
Journal of Engineering Research (2023)
Open Access | Times Cited: 6
Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability
Adnan Gutub
Journal of Engineering Research (2023) Vol. 12, Iss. 1, pp. 107-121
Open Access | Times Cited: 5
Adnan Gutub
Journal of Engineering Research (2023) Vol. 12, Iss. 1, pp. 107-121
Open Access | Times Cited: 5
Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches
Adnan Gutub, Faiza Al-Shaarani, Khoulood Alharthi
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Adnan Gutub, Faiza Al-Shaarani, Khoulood Alharthi
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
SIHNet: A safe image hiding method with less information leaking
Zien Cheng, Xin Jin, Qian Jiang, et al.
IET Image Processing (2024) Vol. 18, Iss. 10, pp. 2800-2815
Open Access | Times Cited: 1
Zien Cheng, Xin Jin, Qian Jiang, et al.
IET Image Processing (2024) Vol. 18, Iss. 10, pp. 2800-2815
Open Access | Times Cited: 1
A High-performance Image Steganography Scheme Based on Dual-adversarial Networks
Bin Ma, Kun Li, Jian Xu, et al.
IEEE Signal Processing Letters (2024) Vol. 31, pp. 2655-2659
Closed Access | Times Cited: 1
Bin Ma, Kun Li, Jian Xu, et al.
IEEE Signal Processing Letters (2024) Vol. 31, pp. 2655-2659
Closed Access | Times Cited: 1
Image steganography approaches and their detection strategies: a survey
Meike Helena Kombrink, Zeno Geradts, Marcel Worring
ACM Computing Surveys (2024)
Closed Access | Times Cited: 1
Meike Helena Kombrink, Zeno Geradts, Marcel Worring
ACM Computing Surveys (2024)
Closed Access | Times Cited: 1
CT image authentication for telemedicine applications using self-embedding pixel-wise technique with chaotic coordinate mapping and lfsr
Ritu Gothwal, Shivendra Shivani, Shailendra Tiwari
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Ritu Gothwal, Shivendra Shivani, Shailendra Tiwari
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
AISM: An Adaptable Image Steganography Model With User Customization
Bobiao Guo, Ping Ping, Siqi Zhou, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 5, pp. 1955-1968
Closed Access | Times Cited: 1
Bobiao Guo, Ping Ping, Siqi Zhou, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 5, pp. 1955-1968
Closed Access | Times Cited: 1
Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review
Richard Apau, Michael Asante, Frimpong Twum, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308807-e0308807
Open Access | Times Cited: 1
Richard Apau, Michael Asante, Frimpong Twum, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308807-e0308807
Open Access | Times Cited: 1
A robust approach to satellite image encryption using chaotic map and circulant matrices
Shamsa Kanwal, Saba Inam, Asghar Ali Shah, et al.
Engineering Reports (2024)
Open Access | Times Cited: 1
Shamsa Kanwal, Saba Inam, Asghar Ali Shah, et al.
Engineering Reports (2024)
Open Access | Times Cited: 1
High Capacity Adaptive Block-Based Color Image Steganography and Human Perception-Guided Steganalysis
Taniya Seth, Amit K. Shukla, Swati Goel, et al.
Heliyon (2024), pp. e40511-e40511
Open Access
Taniya Seth, Amit K. Shukla, Swati Goel, et al.
Heliyon (2024), pp. e40511-e40511
Open Access