
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Robust data hiding for JPEG images with invertible neural network
Fei Shang, Yuhang Lan, Jianhua Yang, et al.
Neural Networks (2023) Vol. 163, pp. 219-232
Closed Access | Times Cited: 15
Fei Shang, Yuhang Lan, Jianhua Yang, et al.
Neural Networks (2023) Vol. 163, pp. 219-232
Closed Access | Times Cited: 15
Showing 15 citing articles:
Image encryption algorithm based on a new 2D polynomial chaotic map and dynamic S-box
Wanqing Wu, LingShuai Kong
Signal Image and Video Processing (2024) Vol. 18, Iss. 4, pp. 3213-3228
Closed Access | Times Cited: 16
Wanqing Wu, LingShuai Kong
Signal Image and Video Processing (2024) Vol. 18, Iss. 4, pp. 3213-3228
Closed Access | Times Cited: 16
Learning-based image steganography and watermarking: A survey
Kun Hu, Mingpei Wang, MA Xiao-hui, et al.
Expert Systems with Applications (2024) Vol. 249, pp. 123715-123715
Closed Access | Times Cited: 13
Kun Hu, Mingpei Wang, MA Xiao-hui, et al.
Expert Systems with Applications (2024) Vol. 249, pp. 123715-123715
Closed Access | Times Cited: 13
Robust data hiding method based on frequency coefficient variance in repetitive compression
Serdar Solak, Abdiwahab Mohamed Abdirashid, Arsene Adjevi, et al.
Engineering Science and Technology an International Journal (2024) Vol. 56, pp. 101756-101756
Open Access | Times Cited: 5
Serdar Solak, Abdiwahab Mohamed Abdirashid, Arsene Adjevi, et al.
Engineering Science and Technology an International Journal (2024) Vol. 56, pp. 101756-101756
Open Access | Times Cited: 5
New Framework of Robust Image Encryption
Lin Huang, Chuan Qin, Guorui Feng, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2025)
Closed Access
Lin Huang, Chuan Qin, Guorui Feng, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2025)
Closed Access
High-Capacity Image Hiding via Compressible Invertible Neural Network
Chang-Guang Wang, Haoyi Shi, Qingru Li, et al.
Lecture notes in computer science (2025), pp. 36-53
Closed Access
Chang-Guang Wang, Haoyi Shi, Qingru Li, et al.
Lecture notes in computer science (2025), pp. 36-53
Closed Access
MFI-Net: multi-level feature invertible network image concealment technique
Dapeng Cheng, Minghui Zhu, Bo Yang, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2668-e2668
Open Access
Dapeng Cheng, Minghui Zhu, Bo Yang, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2668-e2668
Open Access
JPEG Image Steganography With Automatic Embedding Cost Learning
Jianhua Yang, Yi Liao, Fei Shang, et al.
International Journal of Intelligent Systems (2025) Vol. 2025, Iss. 1
Open Access
Jianhua Yang, Yi Liao, Fei Shang, et al.
International Journal of Intelligent Systems (2025) Vol. 2025, Iss. 1
Open Access
DKiS: Decay weight invertible image steganography with private key
Hang Yang, Yitian Xu, Xuhua Liu
Neural Networks (2025) Vol. 185, pp. 107148-107148
Closed Access
Hang Yang, Yitian Xu, Xuhua Liu
Neural Networks (2025) Vol. 185, pp. 107148-107148
Closed Access
Deploying deep learning networks based advanced techniques for image processing on FPGA platform
Refka Ghodhbani, Taoufik Saidani, Hafedh Zayeni
Neural Computing and Applications (2023) Vol. 35, Iss. 26, pp. 18949-18969
Closed Access | Times Cited: 10
Refka Ghodhbani, Taoufik Saidani, Hafedh Zayeni
Neural Computing and Applications (2023) Vol. 35, Iss. 26, pp. 18949-18969
Closed Access | Times Cited: 10
Robust image hiding network with Frequency and Spatial Attentions
Xiaobin Zeng, Bingwen Feng, Zhihua Xia, et al.
Pattern Recognition (2024) Vol. 155, pp. 110691-110691
Closed Access | Times Cited: 2
Xiaobin Zeng, Bingwen Feng, Zhihua Xia, et al.
Pattern Recognition (2024) Vol. 155, pp. 110691-110691
Closed Access | Times Cited: 2
Toward high imperceptibility deep JPEG steganography based on sparse adversarial attack
Beijing Chen, Yuxin Nie, Jianhua Yang
Journal of Visual Communication and Image Representation (2023) Vol. 97, pp. 103977-103977
Closed Access | Times Cited: 3
Beijing Chen, Yuxin Nie, Jianhua Yang
Journal of Visual Communication and Image Representation (2023) Vol. 97, pp. 103977-103977
Closed Access | Times Cited: 3
Neural network-based reversible data hiding for medical image
Ping Kong, Yongdong Zhang, Lin Huang, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124903-124903
Closed Access
Ping Kong, Yongdong Zhang, Lin Huang, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124903-124903
Closed Access
Robust Image Steganography Model Based on Discrete-Dual-Tree Complex Wavelet Transform and Invertible Neural Network
Delin Duan, Shuyuan Shen, Songsen Yu, et al.
(2024), pp. 272-279
Closed Access
Delin Duan, Shuyuan Shen, Songsen Yu, et al.
(2024), pp. 272-279
Closed Access
A Transformer-based invertible neural network for robust image watermarking
Zhouyan He, Renzhi Hu, Jun Wu, et al.
Journal of Visual Communication and Image Representation (2024), pp. 104317-104317
Closed Access
Zhouyan He, Renzhi Hu, Jun Wu, et al.
Journal of Visual Communication and Image Representation (2024), pp. 104317-104317
Closed Access
Hiding speech in music files
X.M Zhang, Shijun Xiang, Huang Hongbin
Journal of Information Security and Applications (2024) Vol. 89, pp. 103951-103951
Closed Access
X.M Zhang, Shijun Xiang, Huang Hongbin
Journal of Information Security and Applications (2024) Vol. 89, pp. 103951-103951
Closed Access