OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Vulnerability Attacks of SVD-Based Video Watermarking Scheme in an IoT Environment
Heri Prasetyo, Chih‐Hsien Hsia, Chin -Hua Liu
IEEE Access (2020) Vol. 8, pp. 69919-69936
Open Access | Times Cited: 22

Showing 22 citing articles:

Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain
Wennan Huan, Sheng Li, Zhenxing Qian, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2021) Vol. 32, Iss. 4, pp. 1955-1965
Closed Access | Times Cited: 64

Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Raniyah Wazirali, Rami Ahmad, Ahmed Al-Amayreh, et al.
Electronics (2021) Vol. 10, Iss. 14, pp. 1744-1744
Open Access | Times Cited: 49

Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication
Osama S. Faragallah, Walid El‐Shafai, Ahmed I. Sallam, et al.
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 2, pp. 1215-1239
Closed Access | Times Cited: 48

PSO-Optimized Watermarking Using Lifting Wavelet Transform and SVD for Enhanced Image Security
Praveenkumar Babu, Goli Supraja, Gopi Kasinathan, et al.
Journal of Machine and Computing (2025), pp. 131-139
Closed Access

Digital to quantum watermarking: A journey from past to present and into the future
Swapnaneel Dhar, Aditya Kumar Sahu
Computer Science Review (2024) Vol. 54, pp. 100679-100679
Closed Access | Times Cited: 4

Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain
Md. Asikuzzaman, Hannes Mareen, Nour Moustafa, et al.
IEEE Access (2022) Vol. 10, pp. 15681-15698
Open Access | Times Cited: 17

Blockchain for Cyber-Physical Systems: Challenges and Applications
Yassine Maleh, Swathi Lakkineni, Lo’ai Tawalbeh, et al.
Internet of things (2022), pp. 11-59
Closed Access | Times Cited: 15

Deformable model segmentation for range image watermarking
Amine Khaldi, Mohamed Redouane Kafi, Akram Zine Eddine Boukhamla
Multimedia Tools and Applications (2022) Vol. 82, Iss. 8, pp. 12211-12227
Closed Access | Times Cited: 11

Blind Semi-fragile Hybrid Domain-Based Dual Watermarking System for Video Authentication and Tampering Localization
Amal Hammami, Amal Ben Hamida, Chokri Ben Amar, et al.
Circuits Systems and Signal Processing (2023) Vol. 43, Iss. 1, pp. 264-301
Closed Access | Times Cited: 6

Analysis of Modern Methods to Ensure Data Integrity in Cyber-Physical System Management Protocols
Roman Meshcheryakov, Andrey Iskhakov, Oleg Evsutin
Informatics and Automation (2020) Vol. 19, Iss. 5, pp. 1089-1122
Open Access | Times Cited: 7

Security Attack on Secret Sharing Based Watermarking Using Fractional Fourier Transform and Singular Value Decomposition
Didi Rosiyadi, Heri Prasetyo, Shi Jinn Horng, et al.
(2020)
Closed Access | Times Cited: 7

A classification algorithm to identify counterfeit embedded devices in IoT based system
Riya Varman, T. Yukthasree, P. Varshini, et al.
AIP conference proceedings (2024) Vol. 3023, pp. 020019-020019
Closed Access

Fast and robust JND-guided video watermarking scheme in spatial domain
Antonio Cedillo‐Hernandez, Lydia Velázquez-García, Manuel Cedillo‐Hernandez, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 9, pp. 102199-102199
Open Access

Weakness Analysis of Medical Image Watermarking Using RDWT and SVD
Heri Prasetyo, Henry Praherdhiono, Abna Hidayati, et al.
(2023), pp. 24-28
Closed Access | Times Cited: 1

Using Artificial Jellyfish Algorithm with Transformation Technique for Secure Video Watermarking Embedding Process
Kommisetti Murthy Raju, M. V. Subbarao
(2022), pp. 204-208
Closed Access | Times Cited: 1

A two way secured high imperceptible digital color image watermarking
Renuka V Mahagaonkar, Ulhas D. Shiurkar
Sadhana (2023) Vol. 48, Iss. 4
Closed Access

3D Video Image Processing Effect Optimization Method Based on Virtual Reality Technology
Zhihong He, Wenjie Jia, Erhua Sun, et al.
International Journal of Circuits Systems and Signal Processing (2022) Vol. 16, pp. 385-390
Open Access

Structural performance assessment by acceleration measurements based on null space method and fast independent component analysis for the frame-shear wall structure under earthquake wave
Shenglan Ma, Yuhao Liu, Shao-Fei Jiang
Journal of Civil Structural Health Monitoring (2022) Vol. 12, Iss. 5, pp. 1027-1041
Closed Access

Blockchain Application for Cybersecurity in Cyber-Physical Systems
Soufyane Mounir, Imade Fahd Eddine Fatani
International Journal of Smart Security Technologies (2022) Vol. 9, Iss. 1, pp. 1-20
Closed Access

Page 1

Scroll to top