
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Improved Pixel and Bit Confusion-Diffusion Based on Mixed Chaos and Hash Operation for Image Encryption
Pulung Nurtantio Andono, De Rosal Ignatius Moses Setiadi
IEEE Access (2022) Vol. 10, pp. 115143-115156
Open Access | Times Cited: 27
Pulung Nurtantio Andono, De Rosal Ignatius Moses Setiadi
IEEE Access (2022) Vol. 10, pp. 115143-115156
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images
Wassim Alexan, Yousef Korayem, Mohamed Gabr, et al.
IEEE Access (2023) Vol. 11, pp. 106249-106276
Open Access | Times Cited: 28
Wassim Alexan, Yousef Korayem, Mohamed Gabr, et al.
IEEE Access (2023) Vol. 11, pp. 106249-106276
Open Access | Times Cited: 28
Combined Interleaved Pattern to Improve Confusion-Diffusion Image Encryption Based on Hyperchaotic System
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
IEEE Access (2023) Vol. 11, pp. 69005-69021
Open Access | Times Cited: 25
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
IEEE Access (2023) Vol. 11, pp. 69005-69021
Open Access | Times Cited: 25
An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations
De Rosal Ignatius Moses Setiadi, Nova Rijati
Computation (2023) Vol. 11, Iss. 9, pp. 178-178
Open Access | Times Cited: 22
De Rosal Ignatius Moses Setiadi, Nova Rijati
Computation (2023) Vol. 11, Iss. 9, pp. 178-178
Open Access | Times Cited: 22
An image encryption algorithm based on multi-layered chaotic maps and its security analysis
Erdal Güvenoğlu
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 11
Erdal Güvenoğlu
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 11
Image encryption algorithm based on DNA encoding and CNN
Kamlesh Kumar Raghuvanshi, Subodh Kumar, Sushil Kumar, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124287-124287
Closed Access | Times Cited: 7
Kamlesh Kumar Raghuvanshi, Subodh Kumar, Sushil Kumar, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124287-124287
Closed Access | Times Cited: 7
An image encryption scheme based on a seven-dimensional hyperchaotic system and Pascal's matrix
Ammar Ali Neamah
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 3, pp. 238-248
Open Access | Times Cited: 21
Ammar Ali Neamah
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 3, pp. 238-248
Open Access | Times Cited: 21
A Faster and Robust Artificial Neural Network Based Image Encryption Technique With Improved SSIM
Asisa Kumar Panigrahy, Shima Ramesh Maniyath, Mithileysh Sathiyanarayanan, et al.
IEEE Access (2024) Vol. 12, pp. 10818-10833
Open Access | Times Cited: 6
Asisa Kumar Panigrahy, Shima Ramesh Maniyath, Mithileysh Sathiyanarayanan, et al.
IEEE Access (2024) Vol. 12, pp. 10818-10833
Open Access | Times Cited: 6
Color image encryption base on a 2D hyperchaotic enhanced Henon map and cross diffusion
Yongsheng Hu, Han Wu, Luoyu Zhou
Alexandria Engineering Journal (2023) Vol. 73, pp. 385-402
Open Access | Times Cited: 13
Yongsheng Hu, Han Wu, Luoyu Zhou
Alexandria Engineering Journal (2023) Vol. 73, pp. 385-402
Open Access | Times Cited: 13
Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13
Integrating Fresnelet Transform and Spiking Cortical Model for robust medical image cryptosystem in zero-watermarking
Pavani Meesala, Dalton Meitei Thounaojam
Computers & Electrical Engineering (2024) Vol. 118, pp. 109371-109371
Closed Access | Times Cited: 4
Pavani Meesala, Dalton Meitei Thounaojam
Computers & Electrical Engineering (2024) Vol. 118, pp. 109371-109371
Closed Access | Times Cited: 4
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Muhammad Aqeel, Arfan Jaffar, Muhammad Faheem, et al.
Engineering Reports (2025) Vol. 7, Iss. 1
Open Access
Muhammad Aqeel, Arfan Jaffar, Muhammad Faheem, et al.
Engineering Reports (2025) Vol. 7, Iss. 1
Open Access
New Vigenere method with pseudo-random affine functions for color image encryption
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Soft Computing (2025)
Closed Access
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Soft Computing (2025)
Closed Access
DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane
Wenjing Zhang, Jiangjian Xu, Bing Zhao
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101858-101858
Open Access | Times Cited: 10
Wenjing Zhang, Jiangjian Xu, Bing Zhao
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101858-101858
Open Access | Times Cited: 10
A novel data encryption method using an interlaced chaotic transform
Erhan Gökçay, Hakan Tora
Expert Systems with Applications (2023) Vol. 237, pp. 121494-121494
Closed Access | Times Cited: 8
Erhan Gökçay, Hakan Tora
Expert Systems with Applications (2023) Vol. 237, pp. 121494-121494
Closed Access | Times Cited: 8
Image Encryption using Half-Inverted Cascading Chaos Cipheration
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
A Novel Four-Dimensional Hyperchaotic System: Design, Dynamic Analysis, Synchronization, and Image Encryption
Erman Özpolat, Vedat Çelik, Arif Gülten
IEEE Access (2024) Vol. 12, pp. 126063-126073
Open Access | Times Cited: 2
Erman Özpolat, Vedat Çelik, Arif Gülten
IEEE Access (2024) Vol. 12, pp. 126063-126073
Open Access | Times Cited: 2
Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems
Shaofang Wang, Jingwen Pan, Yanrong Cui, et al.
Mathematics (2024) Vol. 12, Iss. 20, pp. 3297-3297
Open Access | Times Cited: 2
Shaofang Wang, Jingwen Pan, Yanrong Cui, et al.
Mathematics (2024) Vol. 12, Iss. 20, pp. 3297-3297
Open Access | Times Cited: 2
An Efficient Audio Encryption Scheme Based on Elliptic Curve over Finite Fields
Hafeez ur Rehman, Mohammad Mazyad Hazzazi, Tariq Shah, et al.
Mathematics (2023) Vol. 11, Iss. 18, pp. 3824-3824
Open Access | Times Cited: 5
Hafeez ur Rehman, Mohammad Mazyad Hazzazi, Tariq Shah, et al.
Mathematics (2023) Vol. 11, Iss. 18, pp. 3824-3824
Open Access | Times Cited: 5
Method to Improve the Cryptographic Properties of S-Boxes
J. A. Aboytes-González, Carlos Soubervielle‐Montalvo, I. Campos-Cantón, et al.
IEEE Access (2023) Vol. 11, pp. 99546-99557
Open Access | Times Cited: 5
J. A. Aboytes-González, Carlos Soubervielle‐Montalvo, I. Campos-Cantón, et al.
IEEE Access (2023) Vol. 11, pp. 99546-99557
Open Access | Times Cited: 5
Reversibly selective encryption for medical images based on coupled chaotic maps and steganography
Lina Zhang, Xianhua Song, Ahmed A. Abd El‐Latif, et al.
Complex & Intelligent Systems (2023) Vol. 10, Iss. 2, pp. 2187-2213
Open Access | Times Cited: 5
Lina Zhang, Xianhua Song, Ahmed A. Abd El‐Latif, et al.
Complex & Intelligent Systems (2023) Vol. 10, Iss. 2, pp. 2187-2213
Open Access | Times Cited: 5
Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access | Times Cited: 1
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access | Times Cited: 1
N-dimensional non-degenerate chaos based on singular value estimation with application in dynamic DNA image encryption
Xiaotong Wang, Xu Dai, Yang Wang, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 1
Xiaotong Wang, Xu Dai, Yang Wang, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 1
Enhanced Color Image Encryption Utilizing a Novel Vigenere Method with Pseudorandom Affine Functions
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Acadlore Transactions on AI and Machine Learning (2024) Vol. 3, Iss. 1, pp. 36-56
Open Access
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Acadlore Transactions on AI and Machine Learning (2024) Vol. 3, Iss. 1, pp. 36-56
Open Access
AES Security Improvement by Utilizing New Key-Dependent XOR Tables
Trần Thị Lượng, Nguyễn Ngọc Cương, Bay Vo
IEEE Access (2024) Vol. 12, pp. 53158-53177
Open Access
Trần Thị Lượng, Nguyễn Ngọc Cương, Bay Vo
IEEE Access (2024) Vol. 12, pp. 53158-53177
Open Access
An improved Dijkstra cross-plane image encryption algorithm based on a chaotic system
Pijun Hou, Yuepeng Wang, Ziming Shi, et al.
Frontiers in Artificial Intelligence (2024) Vol. 7
Open Access
Pijun Hou, Yuepeng Wang, Ziming Shi, et al.
Frontiers in Artificial Intelligence (2024) Vol. 7
Open Access