
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Sign steganography revisited with robust domain selection
Xiaoshuai Wu, Tong Qiao, Yanli Chen, et al.
Signal Processing (2022) Vol. 196, pp. 108522-108522
Closed Access | Times Cited: 15
Xiaoshuai Wu, Tong Qiao, Yanli Chen, et al.
Signal Processing (2022) Vol. 196, pp. 108522-108522
Closed Access | Times Cited: 15
Showing 15 citing articles:
SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection
Xiaoshuai Wu, Xin Liao, Bo Ou
(2023), pp. 1190-1201
Open Access | Times Cited: 13
Xiaoshuai Wu, Xin Liao, Bo Ou
(2023), pp. 1190-1201
Open Access | Times Cited: 13
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction
Xiaolong Duan, Bin Li, Zhaoxia Yin, et al.
Expert Systems with Applications (2023) Vol. 229, pp. 120416-120416
Open Access | Times Cited: 11
Xiaolong Duan, Bin Li, Zhaoxia Yin, et al.
Expert Systems with Applications (2023) Vol. 229, pp. 120416-120416
Open Access | Times Cited: 11
Robust Steganography for High Quality Images
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 9, pp. 4893-4906
Closed Access | Times Cited: 10
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 9, pp. 4893-4906
Closed Access | Times Cited: 10
Toward Secure and Robust Steganography for Black-Box Generated Images
Kai Zeng, Kejiang Chen, Jiansong Zhang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3237-3250
Closed Access | Times Cited: 3
Kai Zeng, Kejiang Chen, Jiansong Zhang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3237-3250
Closed Access | Times Cited: 3
Robust image steganography against JPEG compression based on DCT residual modulation
Yingkai Huang, Zhuxian Liu, Qiwen Wu, et al.
Signal Processing (2024) Vol. 219, pp. 109431-109431
Closed Access | Times Cited: 3
Yingkai Huang, Zhuxian Liu, Qiwen Wu, et al.
Signal Processing (2024) Vol. 219, pp. 109431-109431
Closed Access | Times Cited: 3
Errorless Robust JPEG Steganography using Outputs of JPEG Coders
Jan Butora, Pauline Puteaux, Patrick Bas
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 4, pp. 2394-2406
Open Access | Times Cited: 8
Jan Butora, Pauline Puteaux, Patrick Bas
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 4, pp. 2394-2406
Open Access | Times Cited: 8
Robust Adversarial Watermark Defending Against GAN Synthesization Attack
Shengwang Xu, Tong Qiao, Ming Xu, et al.
IEEE Signal Processing Letters (2024) Vol. 31, pp. 351-355
Closed Access | Times Cited: 2
Shengwang Xu, Tong Qiao, Ming Xu, et al.
IEEE Signal Processing Letters (2024) Vol. 31, pp. 351-355
Closed Access | Times Cited: 2
Hide text in an image using Blowfish algorithm and development of least significant bit technique
Sarah Kareem Salim, Mohammed Majid Msallam, Huda Ismail Olewi
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 29, Iss. 1, pp. 339-339
Open Access | Times Cited: 8
Sarah Kareem Salim, Mohammed Majid Msallam, Huda Ismail Olewi
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 29, Iss. 1, pp. 339-339
Open Access | Times Cited: 8
Fast dominant feature selection with compensation for efficient image steganalysis
Xinquan Yu, Yuanyuan Ma, Yi Zhang, et al.
Signal Processing (2024) Vol. 220, pp. 109475-109475
Closed Access | Times Cited: 1
Xinquan Yu, Yuanyuan Ma, Yi Zhang, et al.
Signal Processing (2024) Vol. 220, pp. 109475-109475
Closed Access | Times Cited: 1
Secure management of DICOM images via reversible data hiding, contrast enhancement and visible-imperceptible watermarking
Diana Nuñez-Ramirez, Eduardo Fragoso‐Navarro, David Mata-Mendoza, et al.
Health and Technology (2024) Vol. 14, Iss. 3, pp. 581-596
Closed Access
Diana Nuñez-Ramirez, Eduardo Fragoso‐Navarro, David Mata-Mendoza, et al.
Health and Technology (2024) Vol. 14, Iss. 3, pp. 581-596
Closed Access
Errorless Robust JPEG Steganography for Pixel Images
Jan Butora, Etienne Levecque, Patrick Bas
(2024), pp. 1-6
Open Access
Jan Butora, Etienne Levecque, Patrick Bas
(2024), pp. 1-6
Open Access
Robust Adaptive Steganography Based on Adaptive STC-ECC
Ye Yao, Linchao Huang, Hui Wang, et al.
IEEE Transactions on Multimedia (2023) Vol. 26, pp. 5477-5489
Closed Access | Times Cited: 1
Ye Yao, Linchao Huang, Hui Wang, et al.
IEEE Transactions on Multimedia (2023) Vol. 26, pp. 5477-5489
Closed Access | Times Cited: 1
Secure Exchange of Medical Images Via Extended Visual Cryptography
Luis Olvera-Martinez
(2022)
Open Access | Times Cited: 1
Luis Olvera-Martinez
(2022)
Open Access | Times Cited: 1
Robust Steganography in Practical Communication: A Comparative Study
Tong Qiao, Shengwang Xu, Shuai Wang, et al.
Research Square (Research Square) (2023)
Open Access
Tong Qiao, Shengwang Xu, Shuai Wang, et al.
Research Square (Research Square) (2023)
Open Access
Robust steganography in practical communication: a comparative study
Tong Qiao, Shengwang Xu, Shuai Wang, et al.
EURASIP Journal on Image and Video Processing (2023) Vol. 2023, Iss. 1
Open Access
Tong Qiao, Shengwang Xu, Shuai Wang, et al.
EURASIP Journal on Image and Video Processing (2023) Vol. 2023, Iss. 1
Open Access