OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

GAN-based spatial image steganography with cross feedback mechanism
Fengyong Li, Zongliang Yu, Chuan Qin
Signal Processing (2021) Vol. 190, pp. 108341-108341
Closed Access | Times Cited: 44

Showing 1-25 of 44 citing articles:

Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
De Rosal Ignatius Moses Setiadi, Supriadi Rustad, Pulung Nurtantio Andono, et al.
Signal Processing (2022) Vol. 206, pp. 108908-108908
Closed Access | Times Cited: 83

A robust coverless video steganography based on maximum DC coefficients against video attacks
Laijin Meng, Xinghao Jiang, Zhenzhen Zhang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 5, pp. 13427-13461
Closed Access | Times Cited: 17

GAN-based adaptive cost learning for enhanced image steganography security
Dewang Wang, Gaobo Yang, Jiyou Chen, et al.
Expert Systems with Applications (2024) Vol. 249, pp. 123471-123471
Closed Access | Times Cited: 5

A survey on Deep-Learning-based image steganography
Bingbing Song, Ping Wei, Sixing Wu, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124390-124390
Closed Access | Times Cited: 5

Improving robust adaptive steganography via minimizing channel errors
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
Signal Processing (2022) Vol. 195, pp. 108498-108498
Closed Access | Times Cited: 24

When deep learning meets watermarking: A survey of application, attacks and defenses
Huajie Chen, Chi Liu, Tianqing Zhu, et al.
Computer Standards & Interfaces (2024) Vol. 89, pp. 103830-103830
Closed Access | Times Cited: 4

ACGIS: Adversarial Cover Generator for Image Steganography with Noise Residuals Features-Preserving
Junxue Yang, Xin Liao
Signal Processing Image Communication (2023) Vol. 113, pp. 116927-116927
Closed Access | Times Cited: 10

Ambiguity attack against text-to-image diffusion model watermarking
Zihan Yuan, Li Li, Zichi Wang, et al.
Signal Processing (2024) Vol. 221, pp. 109509-109509
Closed Access | Times Cited: 3

A Novel Gradient-guided Post-processing Method for Adaptive Image Steganography
Guoliang Xie, Jinchang Ren, Stephen Marshall, et al.
Signal Processing (2022) Vol. 203, pp. 108813-108813
Open Access | Times Cited: 17

Color image ROI encryption algorithm based on a novel 4D hyperchaotic system
Lujie Wang, Zhong Chen, Xiyu Sun, et al.
Physica Scripta (2023) Vol. 99, Iss. 1, pp. 015229-015229
Closed Access | Times Cited: 9

Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography
Weixuan Tang, Zhili Zhou, Bin Li, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2826-2839
Closed Access | Times Cited: 3

Lossless image steganography: Regard steganography as super-resolution
Tingqiang Wang, Hang Cheng, Ximeng Liu, et al.
Information Processing & Management (2024) Vol. 61, Iss. 4, pp. 103719-103719
Closed Access | Times Cited: 3

DUIANet: A double layer U-Net image hiding method based on improved Inception module and attention mechanism
Xintao Duan, Guoming Wu, Chun Li, et al.
Journal of Visual Communication and Image Representation (2023) Vol. 98, pp. 104035-104035
Closed Access | Times Cited: 8

Adversarial multi-image steganography via texture evaluation and multi-scale image enhancement
Fengyong Li, Longwei Li, Yishu Zeng, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2

Medical steganography: Enhanced security and image quality, and new S-Q assessment
Yuxiang Peng, Chong Fu, Yu Zheng, et al.
Signal Processing (2024) Vol. 223, pp. 109546-109546
Closed Access | Times Cited: 2

Ensemble Stego Selection for Enhancing Image Steganography
Fengyong Li, Yishu Zeng, Xinpeng Zhang, et al.
IEEE Signal Processing Letters (2022) Vol. 29, pp. 702-706
Closed Access | Times Cited: 11

Lossless Image Steganography Based on Invertible Neural Networks
Lianshan Liu, Li Tang, Wei-Min Zheng
Entropy (2022) Vol. 24, Iss. 12, pp. 1762-1762
Open Access | Times Cited: 11

Randomly-based Stepwise Multi-Level Distributed Medical Image Steganography
Asmaa Munshi
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 3, pp. 10922-10930
Open Access | Times Cited: 6

Enhancing image steganography via adversarial optimization of the stego distribution
Hongyue Zha, Weiming Zhang, Nenghai Yu, et al.
Signal Processing (2023) Vol. 212, pp. 109155-109155
Closed Access | Times Cited: 6

Adversarial feature hybrid framework for steganography with shifted window local loss
Zhengze Li, Xiaoyuan Yang, Kangqing Shen, et al.
Neural Networks (2023) Vol. 165, pp. 358-369
Closed Access | Times Cited: 5

A Linked List Encryption Scheme for Image Steganography without Embedding
Pengbiao Zhao, Qi Zhong, Jingxue Chen, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 141, Iss. 1, pp. 331-352
Open Access | Times Cited: 1

Image steganography approaches and their detection strategies: a survey
Meike Helena Kombrink, Zeno Geradts, Marcel Worring
ACM Computing Surveys (2024)
Closed Access | Times Cited: 1

Protecting copyright of stable diffusion models from ambiguity attacks
Zihan Yuan, Li Li, Zichi Wang, et al.
Signal Processing (2024), pp. 109722-109722
Closed Access | Times Cited: 1

Diminished reality using semantic segmentation and generative adversarial network for landscape assessment: evaluation of image inpainting according to colour vision
Takuya Kikuchi, Tomohiro Fukuda, Nobuyoshi Yabuki
Journal of Computational Design and Engineering (2022) Vol. 9, Iss. 5, pp. 1633-1649
Open Access | Times Cited: 7

Advanced Image Steganography Using a U-Net-Based Architecture with Multi-Scale Fusion and Perceptual Loss
Lu Zeng, Ning Yang, Xiang Li, et al.
Electronics (2023) Vol. 12, Iss. 18, pp. 3808-3808
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top