
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities
Sunpreet Sharma, Ju Jia Zou, Gu Fang
IEEE Access (2022) Vol. 10, pp. 85677-85700
Closed Access | Times Cited: 14
Sunpreet Sharma, Ju Jia Zou, Gu Fang
IEEE Access (2022) Vol. 10, pp. 85677-85700
Closed Access | Times Cited: 14
Showing 14 citing articles:
A review of image watermarking for identity protection and verification
Sunpreet Sharma, Ju Jia Zou, Gu Fang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 31829-31891
Open Access | Times Cited: 20
Sunpreet Sharma, Ju Jia Zou, Gu Fang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 31829-31891
Open Access | Times Cited: 20
ECDSA-based Tamper Detection in Medical Data Using a Watermarking Technique
Ch. Rupa, Naga Vivek K, Gautam Srivastava, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 78-87
Open Access | Times Cited: 4
Ch. Rupa, Naga Vivek K, Gautam Srivastava, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 78-87
Open Access | Times Cited: 4
Image Watermarking between Conventional and Learning-Based Techniques: A Literature Review
Said Boujerfaoui, Rabia Riad, Hassan Douzi, et al.
Electronics (2022) Vol. 12, Iss. 1, pp. 74-74
Open Access | Times Cited: 17
Said Boujerfaoui, Rabia Riad, Hassan Douzi, et al.
Electronics (2022) Vol. 12, Iss. 1, pp. 74-74
Open Access | Times Cited: 17
A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva, et al.
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8430-8430
Open Access | Times Cited: 9
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva, et al.
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8430-8430
Open Access | Times Cited: 9
An adaptive approach for multi-media steganography using improved chaotic map and discrete cosine transform
Shyla Nagarajegowda, K. Kalimuthu
Signal Image and Video Processing (2024) Vol. 18, Iss. 10, pp. 6695-6711
Closed Access | Times Cited: 1
Shyla Nagarajegowda, K. Kalimuthu
Signal Image and Video Processing (2024) Vol. 18, Iss. 10, pp. 6695-6711
Closed Access | Times Cited: 1
An Algorithm for Detecting and Restoring Tampered Images Using Chaotic Watermark Embedding
Zijie Xu, Erfu Wang
Electronics (2024) Vol. 13, Iss. 18, pp. 3604-3604
Open Access | Times Cited: 1
Zijie Xu, Erfu Wang
Electronics (2024) Vol. 13, Iss. 18, pp. 3604-3604
Open Access | Times Cited: 1
Robust, Secure and Semi-Blind Watermarking Technique Using Flexible Scaling Factor in Block-Based Wavelet Algorithm
Ersin Elbaşi, Nour Mostafa, Elda Cina
Electronics (2022) Vol. 11, Iss. 22, pp. 3680-3680
Open Access | Times Cited: 6
Ersin Elbaşi, Nour Mostafa, Elda Cina
Electronics (2022) Vol. 11, Iss. 22, pp. 3680-3680
Open Access | Times Cited: 6
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and decryption
Sharon Rose Victor Juvvanapudi, Pullakura Rajesh Kumar, K. V. V. S. Reddy
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2023) Vol. 14, Iss. 1, pp. 389-389
Open Access | Times Cited: 2
Sharon Rose Victor Juvvanapudi, Pullakura Rajesh Kumar, K. V. V. S. Reddy
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2023) Vol. 14, Iss. 1, pp. 389-389
Open Access | Times Cited: 2
MP3 Audio watermarking using calibrated side information features for tamper detection and localization
Salma Masmoudi, Maha Charfeddine, Chokri Ben Amar
Multimedia Tools and Applications (2024) Vol. 83, Iss. 24, pp. 64637-64662
Closed Access
Salma Masmoudi, Maha Charfeddine, Chokri Ben Amar
Multimedia Tools and Applications (2024) Vol. 83, Iss. 24, pp. 64637-64662
Closed Access
Robust image tamper detection and recovery with self-embedding watermarking using SPIHT and LDPC
Priyanka Priyadarshini, Kshiramani Naik
International Journal of Computers and Applications (2024) Vol. 46, Iss. 8, pp. 580-603
Closed Access
Priyanka Priyadarshini, Kshiramani Naik
International Journal of Computers and Applications (2024) Vol. 46, Iss. 8, pp. 580-603
Closed Access
Digital Image Authentication Scheme Based on Intrinsic Dimension Estimation of Manifold Learning
Xiaomei Quan
2022 7th International Conference on Computer and Communication Systems (ICCCS) (2024), pp. 1384-1389
Closed Access
Xiaomei Quan
2022 7th International Conference on Computer and Communication Systems (ICCCS) (2024), pp. 1384-1389
Closed Access
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
Afrig Aminuddin, Ferda Ernawan, Danakorn Nincarean, et al.
Engineering Science and Technology an International Journal (2024) Vol. 56, pp. 101790-101790
Open Access
Afrig Aminuddin, Ferda Ernawan, Danakorn Nincarean, et al.
Engineering Science and Technology an International Journal (2024) Vol. 56, pp. 101790-101790
Open Access
A Secured Communication in Watermarking using Fast Walsh Hadamard Transformation in Image Processing
K. Premkumar, H. Twinky, S. Naveen, et al.
2022 6th International Conference on Electronics, Communication and Aerospace Technology (2022), pp. 1186-1191
Closed Access | Times Cited: 1
K. Premkumar, H. Twinky, S. Naveen, et al.
2022 6th International Conference on Electronics, Communication and Aerospace Technology (2022), pp. 1186-1191
Closed Access | Times Cited: 1
A Novel Approach of Fragile Watermarking for Authentication and Tamper Detection Exploiting Local Binary Pattern (LBP)
Manasi Jana, Biswapati Jana, Subhankar Joardar
Communications in computer and information science (2023), pp. 3-16
Closed Access
Manasi Jana, Biswapati Jana, Subhankar Joardar
Communications in computer and information science (2023), pp. 3-16
Closed Access