
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Rough set based effective technique of image watermarking
Shishir Kumar, Neha Jain, Steven Lawrence Fernandes
Journal of Computational Science (2016) Vol. 19, pp. 121-137
Closed Access | Times Cited: 28
Shishir Kumar, Neha Jain, Steven Lawrence Fernandes
Journal of Computational Science (2016) Vol. 19, pp. 121-137
Closed Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold
Ferda Ernawan, Muhammad Nomani Kabir
IEEE Access (2018) Vol. 6, pp. 20464-20480
Open Access | Times Cited: 127
Ferda Ernawan, Muhammad Nomani Kabir
IEEE Access (2018) Vol. 6, pp. 20464-20480
Open Access | Times Cited: 127
Selective bit embedding scheme for robust blind color image watermarking
Thien Huynh‐The, Cam-Hao Hua, Nguyen Anh Tu, et al.
Information Sciences (2017) Vol. 426, pp. 1-18
Closed Access | Times Cited: 73
Thien Huynh‐The, Cam-Hao Hua, Nguyen Anh Tu, et al.
Information Sciences (2017) Vol. 426, pp. 1-18
Closed Access | Times Cited: 73
A fuzzy topological model of hemimetric-based fuzzy rough set and some applications to digital image processing
Xinyue Han, Wei Yao, Chang-Jie Zhou
Topology and its Applications (2025), pp. 109327-109327
Closed Access
Xinyue Han, Wei Yao, Chang-Jie Zhou
Topology and its Applications (2025), pp. 109327-109327
Closed Access
Reversible data hiding based on Shamir’s secret sharing for color images over cloud
Priyanka Singh, Balasubramanian Raman
Information Sciences (2017) Vol. 422, pp. 77-97
Closed Access | Times Cited: 49
Priyanka Singh, Balasubramanian Raman
Information Sciences (2017) Vol. 422, pp. 77-97
Closed Access | Times Cited: 49
A deep convolutional neural network for the early detection of breast carcinoma with respect to hyper- parameter tuning
D. Saranyaraj, M. Manikandan, S. Uma Maheswari
Multimedia Tools and Applications (2018) Vol. 79, Iss. 15-16, pp. 11013-11038
Closed Access | Times Cited: 32
D. Saranyaraj, M. Manikandan, S. Uma Maheswari
Multimedia Tools and Applications (2018) Vol. 79, Iss. 15-16, pp. 11013-11038
Closed Access | Times Cited: 32
A blind spatial domain-based image watermarking using texture analysis and association rules mining
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
Multimedia Tools and Applications (2018) Vol. 78, Iss. 12, pp. 15705-15750
Closed Access | Times Cited: 30
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
Multimedia Tools and Applications (2018) Vol. 78, Iss. 12, pp. 15705-15750
Closed Access | Times Cited: 30
Cognitive Analysis of Medical Decision-Making: An Extended MULTIMOORA-Based Multigranulation Probabilistic Model with Evidential Reasoning
Wenhui Bai, Chao Zhang, Yanhui Zhai, et al.
Cognitive Computation (2024) Vol. 16, Iss. 6, pp. 3149-3167
Closed Access | Times Cited: 2
Wenhui Bai, Chao Zhang, Yanhui Zhai, et al.
Cognitive Computation (2024) Vol. 16, Iss. 6, pp. 3149-3167
Closed Access | Times Cited: 2
Efficient hybrid approach to segment and classify exudates for DR prediction
Muhammad Sharif, Javeria Amin, Mussarat Yasmin, et al.
Multimedia Tools and Applications (2018) Vol. 79, Iss. 15-16, pp. 11107-11123
Closed Access | Times Cited: 23
Muhammad Sharif, Javeria Amin, Mussarat Yasmin, et al.
Multimedia Tools and Applications (2018) Vol. 79, Iss. 15-16, pp. 11107-11123
Closed Access | Times Cited: 23
Genetic algorithm based key sequence generation for cipher system
K B Sudeepa, Ganesh Aithal, V. Rajinikanth, et al.
Pattern Recognition Letters (2020) Vol. 133, pp. 341-348
Closed Access | Times Cited: 12
K B Sudeepa, Ganesh Aithal, V. Rajinikanth, et al.
Pattern Recognition Letters (2020) Vol. 133, pp. 341-348
Closed Access | Times Cited: 12
Classification of compressed and uncompressed text documents
S. N. Bharath Bhushan, Ajit Danti
Future Generation Computer Systems (2018) Vol. 88, pp. 614-623
Closed Access | Times Cited: 10
S. N. Bharath Bhushan, Ajit Danti
Future Generation Computer Systems (2018) Vol. 88, pp. 614-623
Closed Access | Times Cited: 10
A Reversible Data Hiding Algorithm Based on Secret Sharing
Xin Jin, Lanxin Su, Jitao Huang
Journal of Information Hiding and Privacy Protection (2021) Vol. 3, Iss. 2, pp. 69-82
Open Access | Times Cited: 5
Xin Jin, Lanxin Su, Jitao Huang
Journal of Information Hiding and Privacy Protection (2021) Vol. 3, Iss. 2, pp. 69-82
Open Access | Times Cited: 5
Generation of pseudo random number sequence from discrete oscillating samples of equally spread objects and application for stream cipher system
K B Sudeepa, Ganesh Aithal
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 1
Closed Access | Times Cited: 4
K B Sudeepa, Ganesh Aithal
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 1
Closed Access | Times Cited: 4
A joint spatial texture analysis/watermarking system for digital image authentication
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
(2017), pp. 1-6
Closed Access | Times Cited: 3
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
(2017), pp. 1-6
Closed Access | Times Cited: 3
Finding Traceability Granularity Influencing Factors using Rough Set Method: An Empirical Analysis on Vegetable Companies in Tianjin City, China
Jianping Qian, Jiali Li, Bojian Geng, et al.
(2023)
Open Access | Times Cited: 1
Jianping Qian, Jiali Li, Bojian Geng, et al.
(2023)
Open Access | Times Cited: 1
A Robust Watermarking System Based on Formal Concept Analysis and Texture Analysis.
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
The Florida AI Research Society (2017), pp. 682-687
Closed Access | Times Cited: 2
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
The Florida AI Research Society (2017), pp. 682-687
Closed Access | Times Cited: 2
Rough Set Theory Based on Robust Image Watermarking
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
Studies in computational intelligence (2017), pp. 627-659
Closed Access | Times Cited: 2
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
Studies in computational intelligence (2017), pp. 627-659
Closed Access | Times Cited: 2
Hybrid Hyper Chaotic Map with LSB for Image Encryption and Decryption
Jahnavi Shankar, C. Nandini
Scalable Computing Practice and Experience (2022) Vol. 23, Iss. 4, pp. 181-192
Open Access | Times Cited: 2
Jahnavi Shankar, C. Nandini
Scalable Computing Practice and Experience (2022) Vol. 23, Iss. 4, pp. 181-192
Open Access | Times Cited: 2
DIGITAL IMAGE AUTHENTICATION MODEL
Ігор Рубан, Nataliia Bolohova, Vitalii Martovytskyi, et al.
Advanced Information Systems (2021) Vol. 5, Iss. 1, pp. 113-117
Open Access | Times Cited: 2
Ігор Рубан, Nataliia Bolohova, Vitalii Martovytskyi, et al.
Advanced Information Systems (2021) Vol. 5, Iss. 1, pp. 113-117
Open Access | Times Cited: 2
A robust watermarking technique in spatial domain using closeness coefficients of texture
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
(2017), pp. 1-6
Closed Access | Times Cited: 1
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
(2017), pp. 1-6
Closed Access | Times Cited: 1
Performance Comparison of Intelligent Techniques Based Image Watermarking
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
Lecture notes in computer science (2018), pp. 844-853
Closed Access | Times Cited: 1
Musab Ghadi, Lamri Laouamer, Laurent Nana, et al.
Lecture notes in computer science (2018), pp. 844-853
Closed Access | Times Cited: 1
Finding Traceability Granularity Influencing Factors Using Rough Set Method: An Empirical Analysis of Vegetable Companies in Tianjin City, China
Jianping Qian, Jiali Li, Bojian Geng, et al.
Foods (2023) Vol. 12, Iss. 11, pp. 2124-2124
Open Access
Jianping Qian, Jiali Li, Bojian Geng, et al.
Foods (2023) Vol. 12, Iss. 11, pp. 2124-2124
Open Access
Score Level Fusion Based Approach for Water Leak Detection in Infrared Images
Ashwath Rao
International Journal for Research in Applied Science and Engineering Technology (2017) Vol. V, Iss. XI, pp. 378-385
Open Access
Ashwath Rao
International Journal for Research in Applied Science and Engineering Technology (2017) Vol. V, Iss. XI, pp. 378-385
Open Access
Robust logo watermarking based on wavelet transform modulus maxima
Mohammad Barr, C.V. Serdean
(2017), pp. 212-217
Closed Access
Mohammad Barr, C.V. Serdean
(2017), pp. 212-217
Closed Access
An attribute reduction method based on three-way decisions model for decision tables
Linzi Yin, Xuemei Xu, Jiafeng Ding, et al.
(2018), pp. 381-386
Closed Access
Linzi Yin, Xuemei Xu, Jiafeng Ding, et al.
(2018), pp. 381-386
Closed Access
Missing Value Management: Weighted Heuristic Similarity Estimation for Numeric Values
Omar M. Elzeki, Mohammed F. Alrahmawy, Sabry El-Mogy
Mansoura Journal for Computer and Information Sciences (2019) Vol. 15, Iss. 1, pp. 45-52
Open Access
Omar M. Elzeki, Mohammed F. Alrahmawy, Sabry El-Mogy
Mansoura Journal for Computer and Information Sciences (2019) Vol. 15, Iss. 1, pp. 45-52
Open Access