
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography
Liyan Zhu, Xiangyang Luo, Chunfang Yang, et al.
Signal Processing (2021) Vol. 183, pp. 108015-108015
Closed Access | Times Cited: 30
Liyan Zhu, Xiangyang Luo, Chunfang Yang, et al.
Signal Processing (2021) Vol. 183, pp. 108015-108015
Closed Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
De Rosal Ignatius Moses Setiadi, Supriadi Rustad, Pulung Nurtantio Andono, et al.
Signal Processing (2022) Vol. 206, pp. 108908-108908
Closed Access | Times Cited: 83
De Rosal Ignatius Moses Setiadi, Supriadi Rustad, Pulung Nurtantio Andono, et al.
Signal Processing (2022) Vol. 206, pp. 108908-108908
Closed Access | Times Cited: 83
GAN-based spatial image steganography with cross feedback mechanism
Fengyong Li, Zongliang Yu, Chuan Qin
Signal Processing (2021) Vol. 190, pp. 108341-108341
Closed Access | Times Cited: 44
Fengyong Li, Zongliang Yu, Chuan Qin
Signal Processing (2021) Vol. 190, pp. 108341-108341
Closed Access | Times Cited: 44
Robust data hiding method based on frequency coefficient variance in repetitive compression
Serdar Solak, Abdiwahab Mohamed Abdirashid, Arsene Adjevi, et al.
Engineering Science and Technology an International Journal (2024) Vol. 56, pp. 101756-101756
Open Access | Times Cited: 5
Serdar Solak, Abdiwahab Mohamed Abdirashid, Arsene Adjevi, et al.
Engineering Science and Technology an International Journal (2024) Vol. 56, pp. 101756-101756
Open Access | Times Cited: 5
Improving robust adaptive steganography via minimizing channel errors
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
Signal Processing (2022) Vol. 195, pp. 108498-108498
Closed Access | Times Cited: 24
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
Signal Processing (2022) Vol. 195, pp. 108498-108498
Closed Access | Times Cited: 24
Robust Steganography for High Quality Images
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 9, pp. 4893-4906
Closed Access | Times Cited: 10
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 9, pp. 4893-4906
Closed Access | Times Cited: 10
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping
Pei Zhang, Qingfeng Cheng, Mingliang Zhang, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4469-4480
Closed Access | Times Cited: 3
Pei Zhang, Qingfeng Cheng, Mingliang Zhang, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4469-4480
Closed Access | Times Cited: 3
A survey of recent advances in image steganography
Akshay Kumar, Rajneesh Rani, Samayveer Singh
Security and Privacy (2022) Vol. 6, Iss. 3
Closed Access | Times Cited: 17
Akshay Kumar, Rajneesh Rani, Samayveer Singh
Security and Privacy (2022) Vol. 6, Iss. 3
Closed Access | Times Cited: 17
Sign steganography revisited with robust domain selection
Xiaoshuai Wu, Tong Qiao, Yanli Chen, et al.
Signal Processing (2022) Vol. 196, pp. 108522-108522
Closed Access | Times Cited: 15
Xiaoshuai Wu, Tong Qiao, Yanli Chen, et al.
Signal Processing (2022) Vol. 196, pp. 108522-108522
Closed Access | Times Cited: 15
Medical Image Compression Based on Variational Autoencoder
Xuan Liu, Lu Zhang, Zihao Guo, et al.
Mathematical Problems in Engineering (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 14
Xuan Liu, Lu Zhang, Zihao Guo, et al.
Mathematical Problems in Engineering (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 14
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography
Qingxiao Guan, Peng Liu, Weiming Zhang, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 501-516
Closed Access | Times Cited: 13
Qingxiao Guan, Peng Liu, Weiming Zhang, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 501-516
Closed Access | Times Cited: 13
Robust Image Steganography: Hiding Messages in Frequency Coefficients
Yuhang Lan, Fei Shang, Jianhua Yang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 12, pp. 14955-14963
Open Access | Times Cited: 7
Yuhang Lan, Fei Shang, Jianhua Yang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 12, pp. 14955-14963
Open Access | Times Cited: 7
Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix
Qingxiao Guan, Kaimeng Chen, Hefeng Chen, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 9, pp. 6002-6016
Closed Access | Times Cited: 9
Qingxiao Guan, Kaimeng Chen, Hefeng Chen, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 9, pp. 6002-6016
Closed Access | Times Cited: 9
Improve steganography system using agents software based on statistical and classification technique
Estabraq Hussein Jasim Halboos, Abbas M. Al-Bakry
Bulletin of Electrical Engineering and Informatics (2023) Vol. 12, Iss. 3, pp. 1595-1606
Open Access | Times Cited: 3
Estabraq Hussein Jasim Halboos, Abbas M. Al-Bakry
Bulletin of Electrical Engineering and Informatics (2023) Vol. 12, Iss. 3, pp. 1595-1606
Open Access | Times Cited: 3
Extraction Method of Secret Message Based on Optimal Hypothesis Test
Hansong Du, Jiufen Liu, Xiangyang Luo, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 20, Iss. 6, pp. 5265-5277
Closed Access | Times Cited: 2
Hansong Du, Jiufen Liu, Xiangyang Luo, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 20, Iss. 6, pp. 5265-5277
Closed Access | Times Cited: 2
Joint encryption and authentication in hybrid domains with hidden double random-phase encoding
Hua Ren, Shaozhang Niu
Multimedia Tools and Applications (2022) Vol. 81, Iss. 18, pp. 25993-26014
Closed Access | Times Cited: 3
Hua Ren, Shaozhang Niu
Multimedia Tools and Applications (2022) Vol. 81, Iss. 18, pp. 25993-26014
Closed Access | Times Cited: 3
SE-SIS: Shadow-Embeddable Lossless Secret Image Sharing for Greyscale Images
Zikai Xu, Bin Liu, Fei Hu, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4775-4779
Closed Access
Zikai Xu, Bin Liu, Fei Hu, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4775-4779
Closed Access
Enhancing Steganography through Optimized Quantization Tables
Rasa Brūzgienė, Algimantas Venčkauskas, Šarūnas Grigaliūnas, et al.
Electronics (2024) Vol. 13, Iss. 12, pp. 2415-2415
Open Access
Rasa Brūzgienė, Algimantas Venčkauskas, Šarūnas Grigaliūnas, et al.
Electronics (2024) Vol. 13, Iss. 12, pp. 2415-2415
Open Access
Recent Advances in Digital Signal Analysis by Orthogonal Transformations
Adil Sayyouri, Ahmed Bencherqui, Mhamed Sayyouri, et al.
Lecture notes in networks and systems (2024), pp. 448-463
Closed Access
Adil Sayyouri, Ahmed Bencherqui, Mhamed Sayyouri, et al.
Lecture notes in networks and systems (2024), pp. 448-463
Closed Access
Color Image Retrieval Method Using Low Dimensional Salient Visual Feature Descriptors for IoT Applications
Naushad Varish, Priyanka Singh, Prannoy Tugiti, et al.
Computational Intelligence and Neuroscience (2023) Vol. 2023, pp. 1-18
Open Access | Times Cited: 1
Naushad Varish, Priyanka Singh, Prannoy Tugiti, et al.
Computational Intelligence and Neuroscience (2023) Vol. 2023, pp. 1-18
Open Access | Times Cited: 1
Traditional and Deep Learning Techniques in Image Steganography: Recent Advances
Hesham Fathy AbdelRazik, Ahmed S. Elsayed, Sally Ismail, et al.
(2023), pp. 38-44
Closed Access | Times Cited: 1
Hesham Fathy AbdelRazik, Ahmed S. Elsayed, Sally Ismail, et al.
(2023), pp. 38-44
Closed Access | Times Cited: 1
Steganographic key recovery for adaptive steganography under “known-message attacks”
Hansong Du, Jiufen Liu, Yuguo Tian, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 8, pp. 10981-11004
Closed Access | Times Cited: 2
Hansong Du, Jiufen Liu, Yuguo Tian, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 8, pp. 10981-11004
Closed Access | Times Cited: 2
Information Steganography Technology of Optical Communication Sensor Network Based on Virtual Reality Technology
ZhongBao Wang, WenMing Li, GuoQing Wang
Journal of Sensors (2022) Vol. 2022, pp. 1-7
Open Access | Times Cited: 2
ZhongBao Wang, WenMing Li, GuoQing Wang
Journal of Sensors (2022) Vol. 2022, pp. 1-7
Open Access | Times Cited: 2
Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes
Hansong Du, Jiufen Liu, Yuguo Tian, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-16
Open Access | Times Cited: 2
Hansong Du, Jiufen Liu, Yuguo Tian, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-16
Open Access | Times Cited: 2
Information Hiding in Still Image Based on Variable Steganography Technique to Achieve High Imperceptibility
Rakan Mohammed Rashid, Baker Khalid Baker, Omar Farook Mohammad, et al.
(2021), pp. 171-176
Closed Access | Times Cited: 1
Rakan Mohammed Rashid, Baker Khalid Baker, Omar Farook Mohammad, et al.
(2021), pp. 171-176
Closed Access | Times Cited: 1
A Hybrid Visual Cryptography Method using Sigmoid Function for Security Enhancement in Gray Scale Images
Dinesh Kumar, Kailash C. Patidar, Mr. Gourav Saxena, et al.
Indian Journal of Artificial Intelligence and Neural Networking (2021) Vol. 1, Iss. 3, pp. 7-11
Open Access | Times Cited: 1
Dinesh Kumar, Kailash C. Patidar, Mr. Gourav Saxena, et al.
Indian Journal of Artificial Intelligence and Neural Networking (2021) Vol. 1, Iss. 3, pp. 7-11
Open Access | Times Cited: 1