
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Fast Chaotic Image Encryption Algorithm Using a Novel Divide and Conquer Diffusion Strategy
Bin Ge, Zhihua Shen, Jinbao Zhang
IEEE Access (2022) Vol. 10, pp. 95986-96005
Open Access | Times Cited: 6
Bin Ge, Zhihua Shen, Jinbao Zhang
IEEE Access (2022) Vol. 10, pp. 95986-96005
Open Access | Times Cited: 6
Showing 6 citing articles:
2D and 3D compatible chaotic image encryption system based on checkers rules and shift register
Chang Cai, Yinghong Cao, Hadi Jahanshahi, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 9, pp. 106874-106874
Closed Access | Times Cited: 7
Chang Cai, Yinghong Cao, Hadi Jahanshahi, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 9, pp. 106874-106874
Closed Access | Times Cited: 7
An efficient chaotic image encryption scheme using simultaneous permutation–diffusion operation
Qingxin Sheng, Chong Fu, Zhaonan Lin, et al.
The Visual Computer (2023) Vol. 40, Iss. 3, pp. 1643-1658
Closed Access | Times Cited: 9
Qingxin Sheng, Chong Fu, Zhaonan Lin, et al.
The Visual Computer (2023) Vol. 40, Iss. 3, pp. 1643-1658
Closed Access | Times Cited: 9
Chaotic Color Image Encryption Based on Eight-Base DNA-Level Permutation and Diffusion
Wei Fan, Taiyong Li, Jianan Wu, et al.
Entropy (2023) Vol. 25, Iss. 9, pp. 1268-1268
Open Access | Times Cited: 8
Wei Fan, Taiyong Li, Jianan Wu, et al.
Entropy (2023) Vol. 25, Iss. 9, pp. 1268-1268
Open Access | Times Cited: 8
Chaotic Technique for High Information Security based on Dual-Hiding Asynchronous-Logic AES Accelerator with High Resistance to Prevent Side-Channel Attacks
V Prasanth, M Munikumar, Maddigiri Ganesh, et al.
(2024), pp. 1684-1689
Closed Access | Times Cited: 1
V Prasanth, M Munikumar, Maddigiri Ganesh, et al.
(2024), pp. 1684-1689
Closed Access | Times Cited: 1
A Hybrid Digital and Optical Double Color Image Encryption Scheme Using a Nine-Dimensional Chaotic System
Rusul Abdulridha Muttashar, R.S. Fyath
2021 14th International Conference on Developments in eSystems Engineering (DeSE) (2023), pp. 50-55
Closed Access
Rusul Abdulridha Muttashar, R.S. Fyath
2021 14th International Conference on Developments in eSystems Engineering (DeSE) (2023), pp. 50-55
Closed Access
An Analytical Survey of Image Encryption Techniques Used in Various Application Domains
Archana Kotangale, Dillip Rout
Lecture notes in networks and systems (2023), pp. 87-102
Closed Access
Archana Kotangale, Dillip Rout
Lecture notes in networks and systems (2023), pp. 87-102
Closed Access