
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Chaotic color multi-image compression-encryption/ LSB data type steganography scheme for NFT transaction security
Zheyi Zhang, Yinghong Cao, Hadi Jahanshahi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101839-101839
Open Access | Times Cited: 19
Zheyi Zhang, Yinghong Cao, Hadi Jahanshahi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101839-101839
Open Access | Times Cited: 19
Showing 19 citing articles:
A discrete Chialvo–Rulkov neuron network coupled with a novel memristor model: Design, Dynamical analysis, DSP implementation and its application
Hongli Cao, Yu Wang, Santo Banerjee, et al.
Chaos Solitons & Fractals (2024) Vol. 179, pp. 114466-114466
Closed Access | Times Cited: 48
Hongli Cao, Yu Wang, Santo Banerjee, et al.
Chaos Solitons & Fractals (2024) Vol. 179, pp. 114466-114466
Closed Access | Times Cited: 48
Biological neuron modeling based on bifunctional memristor and its application in secure communication
Zhitang Han, Bo Sun, Santo Banerjee, et al.
Chaos Solitons & Fractals (2024) Vol. 184, pp. 115020-115020
Closed Access | Times Cited: 18
Zhitang Han, Bo Sun, Santo Banerjee, et al.
Chaos Solitons & Fractals (2024) Vol. 184, pp. 115020-115020
Closed Access | Times Cited: 18
Multi-cube encryption scheme for multi-type images based on modified Klotski game and hyperchaotic map
Zheyi Zhang, Jun Mou, Nanrun Zhou, et al.
Nonlinear Dynamics (2024) Vol. 112, Iss. 7, pp. 5727-5747
Closed Access | Times Cited: 8
Zheyi Zhang, Jun Mou, Nanrun Zhou, et al.
Nonlinear Dynamics (2024) Vol. 112, Iss. 7, pp. 5727-5747
Closed Access | Times Cited: 8
Multimedia healthcare cloud personal archives security system based on compressed sensing and multi-image encryption
Zheyi Zhang, Nanrun Zhou, Bo Sun, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 8, pp. 106844-106844
Closed Access | Times Cited: 7
Zheyi Zhang, Nanrun Zhou, Bo Sun, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 8, pp. 106844-106844
Closed Access | Times Cited: 7
2D and 3D compatible chaotic image encryption system based on checkers rules and shift register
Chang Cai, Yinghong Cao, Hadi Jahanshahi, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 9, pp. 106874-106874
Closed Access | Times Cited: 7
Chang Cai, Yinghong Cao, Hadi Jahanshahi, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 9, pp. 106874-106874
Closed Access | Times Cited: 7
Combining Semi-Tensor Product Compressed Sensing and Session Keys for Low-Cost Encryption of Batch Information in WBANs
Jun Mou, Zheyi Zhang, Santo Banerjee, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33565-33576
Closed Access | Times Cited: 6
Jun Mou, Zheyi Zhang, Santo Banerjee, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33565-33576
Closed Access | Times Cited: 6
A Universal Image Compression Sensing–Encryption Algorithm Based on DNA-Triploid Mutation
Yinghong Cao, Linlin Tan, Xianying Xu, et al.
Mathematics (2024) Vol. 12, Iss. 13, pp. 1990-1990
Open Access | Times Cited: 5
Yinghong Cao, Linlin Tan, Xianying Xu, et al.
Mathematics (2024) Vol. 12, Iss. 13, pp. 1990-1990
Open Access | Times Cited: 5
DeepSteg: Integerating new paradigms of cascaded deep video steganography for securing digital data
Sahar Magdy, Sherin M. Youssef, Karma M. Fathalla, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 483-501
Closed Access
Sahar Magdy, Sherin M. Youssef, Karma M. Fathalla, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 483-501
Closed Access
Image Encryption in Frequency Domain Using Hybrid Chaotic Maps, Hashing, and Lifting Wavelet Transform
Fizza Batool, Nadeem Kureshi, Rashiq Rafiq Marie, et al.
Communications in computer and information science (2025), pp. 262-273
Closed Access
Fizza Batool, Nadeem Kureshi, Rashiq Rafiq Marie, et al.
Communications in computer and information science (2025), pp. 262-273
Closed Access
A Simple Photosensitive Circuit Based on a Mutator for Emulating Memristor, Memcapacitor, and Meminductor: Light Illumination Effects on Dynamical Behaviors
Yixin Chen, Yinghong Cao, Jun Mou, et al.
International Journal of Bifurcation and Chaos (2024) Vol. 34, Iss. 06
Closed Access | Times Cited: 4
Yixin Chen, Yinghong Cao, Jun Mou, et al.
International Journal of Bifurcation and Chaos (2024) Vol. 34, Iss. 06
Closed Access | Times Cited: 4
A secure image steganography based on LSB technique and 2D chaotic maps
Noura Khalil, Amany Sarhan, Mahmoud A. M. Alshewimy
Computers & Electrical Engineering (2024) Vol. 119, pp. 109566-109566
Closed Access | Times Cited: 3
Noura Khalil, Amany Sarhan, Mahmoud A. M. Alshewimy
Computers & Electrical Engineering (2024) Vol. 119, pp. 109566-109566
Closed Access | Times Cited: 3
Security-oriented steganographic payload allocation for multi-remote sensing images
Tian Wu, Xuan Hu, Chunnian Liu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Tian Wu, Xuan Hu, Chunnian Liu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
A Universal Image Compression Sensing-Encryption Algorithm Based on DNA-Triploid Mutation
Yinghong Cao, Linlin Tan, Xianying Xu, et al.
(2024)
Open Access | Times Cited: 1
Yinghong Cao, Linlin Tan, Xianying Xu, et al.
(2024)
Open Access | Times Cited: 1
Cross-Channel Color Image Encryption Scheme Based on Discrete Memristive Coupled Neurons and DWT Compression
Yinghong Cao, Chang Cai, Xianying Xu, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2647-2647
Open Access | Times Cited: 1
Yinghong Cao, Chang Cai, Xianying Xu, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2647-2647
Open Access | Times Cited: 1
An extreme multistable circuit based on a new memcapacitor and a new meminductor
Xiyu Ren, Xiuguo Bi, Yinghong Cao, et al.
Physica Scripta (2024) Vol. 99, Iss. 8, pp. 085238-085238
Closed Access | Times Cited: 1
Xiyu Ren, Xiuguo Bi, Yinghong Cao, et al.
Physica Scripta (2024) Vol. 99, Iss. 8, pp. 085238-085238
Closed Access | Times Cited: 1
Multi-Objective Region Encryption Algorithm Based on Adaptive Mechanism
Juan Wang, Boyong Gao, Xingchuang Xiong, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2463-2463
Open Access
Juan Wang, Boyong Gao, Xingchuang Xiong, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2463-2463
Open Access
Steganography in Cloud Computing Environments
R. Nithyashree, B. Pawankumar, Siva RamaKrishnan S
Advances in information security, privacy, and ethics book series (2024), pp. 219-244
Closed Access
R. Nithyashree, B. Pawankumar, Siva RamaKrishnan S
Advances in information security, privacy, and ethics book series (2024), pp. 219-244
Closed Access
Asymmetric Image Encryption-Hiding Scheme Based on Reversible Neural Network
Min Liu, Guodong Ye
(2024)
Closed Access
Min Liu, Guodong Ye
(2024)
Closed Access
High Capacity Adaptive Block-Based Color Image Steganography and Human Perception-Guided Steganalysis
Taniya Seth, Amit K. Shukla, Swati Goel, et al.
Heliyon (2024), pp. e40511-e40511
Open Access
Taniya Seth, Amit K. Shukla, Swati Goel, et al.
Heliyon (2024), pp. e40511-e40511
Open Access