
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13
Showing 13 citing articles:
A comprehensive survey on image encryption: Taxonomy, challenges, and future directions
Morteza SaberiKamarposhti, Amirabbas Ghorbani, Mehdi Yadollahi
Chaos Solitons & Fractals (2023) Vol. 178, pp. 114361-114361
Closed Access | Times Cited: 50
Morteza SaberiKamarposhti, Amirabbas Ghorbani, Mehdi Yadollahi
Chaos Solitons & Fractals (2023) Vol. 178, pp. 114361-114361
Closed Access | Times Cited: 50
Secure gray image sharing framework with adaptive key generation using image digest
C. Nithya, C. Vasantha Lakshmi, K. Thenmozhi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
C. Nithya, C. Vasantha Lakshmi, K. Thenmozhi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Text visualization encryption based on coordinate substitution and chaotic system
Jun Lu, Jiaxin Zhang, Dawei Hao, et al.
Chaos Solitons & Fractals (2024) Vol. 184, pp. 115001-115001
Closed Access | Times Cited: 3
Jun Lu, Jiaxin Zhang, Dawei Hao, et al.
Chaos Solitons & Fractals (2024) Vol. 184, pp. 115001-115001
Closed Access | Times Cited: 3
Image Encryption using Half-Inverted Cascading Chaos Cipheration
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
PSDCLS: Parallel simultaneous diffusion–confusion image cryptosystem based on Latin square
Ebrahim Zarei Zefreh
Journal of Information Security and Applications (2024) Vol. 83, pp. 103785-103785
Closed Access | Times Cited: 1
Ebrahim Zarei Zefreh
Journal of Information Security and Applications (2024) Vol. 83, pp. 103785-103785
Closed Access | Times Cited: 1
Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics
Zhiyu Xie, Yiting Lin, Tengyu Liu, et al.
iScience (2024) Vol. 27, Iss. 9, pp. 110768-110768
Open Access | Times Cited: 1
Zhiyu Xie, Yiting Lin, Tengyu Liu, et al.
iScience (2024) Vol. 27, Iss. 9, pp. 110768-110768
Open Access | Times Cited: 1
Hybrid video steganography and cryptography techniques: Review paper
Noor Dheyaa Majeed, Ali Al-Askery, Fadhil Sahib Hasan
AIP conference proceedings (2024) Vol. 3232, pp. 020013-020013
Closed Access | Times Cited: 1
Noor Dheyaa Majeed, Ali Al-Askery, Fadhil Sahib Hasan
AIP conference proceedings (2024) Vol. 3232, pp. 020013-020013
Closed Access | Times Cited: 1
Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access | Times Cited: 1
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access | Times Cited: 1
Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 12, pp. 17926-17944
Open Access | Times Cited: 2
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 12, pp. 17926-17944
Open Access | Times Cited: 2
A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption
Али А. Шукур, Ammar Ali Neamah, Viet–Thanh Pham, et al.
Heliyon (2024) Vol. 11, Iss. 1, pp. e37239-e37239
Open Access
Али А. Шукур, Ammar Ali Neamah, Viet–Thanh Pham, et al.
Heliyon (2024) Vol. 11, Iss. 1, pp. e37239-e37239
Open Access
Modified bernoulli map-based scramble and s-box supported colour image encryption
Taha Etem, Turgay Kaya
Signal Image and Video Processing (2024) Vol. 19, Iss. 1
Closed Access
Taha Etem, Turgay Kaya
Signal Image and Video Processing (2024) Vol. 19, Iss. 1
Closed Access
Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level
Muhammad Naufal Erza Farandi, Aris Marjuni, Nova Rijati, et al.
The Imaging Science Journal (2024), pp. 1-18
Closed Access
Muhammad Naufal Erza Farandi, Aris Marjuni, Nova Rijati, et al.
The Imaging Science Journal (2024), pp. 1-18
Closed Access
Novel Dual-Domain Chaotic Image Cryptosystem for Cybersecurity Applications
Mahmoud Y. M. Yassin, Ali A. Nasir, Mostafa Taha
IEEE Access (2024) Vol. 12, pp. 123694-123715
Open Access
Mahmoud Y. M. Yassin, Ali A. Nasir, Mostafa Taha
IEEE Access (2024) Vol. 12, pp. 123694-123715
Open Access