
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Reversible Data Hiding Method for Interpolated Images Based on Modulo Operation and Prediction-Error Expansion
Mengting Fan, Siyao Zhong, Xiangguang Xiong
IEEE Access (2023) Vol. 11, pp. 27290-27302
Open Access | Times Cited: 13
Mengting Fan, Siyao Zhong, Xiangguang Xiong
IEEE Access (2023) Vol. 11, pp. 27290-27302
Open Access | Times Cited: 13
Showing 13 citing articles:
Dynamic Payload Adjustment in Image Steganography Through Interpolation and Center Folding Strategies
Thanh Nhân Vo, Tzu-Chuen Lu
Signal Processing (2025), pp. 110030-110030
Closed Access
Thanh Nhân Vo, Tzu-Chuen Lu
Signal Processing (2025), pp. 110030-110030
Closed Access
Interpolation based reversible data hiding methods: A survey
Aayush Jindal, Sanjay Kumar, Shilpa Mahajan, et al.
AIP conference proceedings (2025) Vol. 3283, pp. 020002-020002
Closed Access
Aayush Jindal, Sanjay Kumar, Shilpa Mahajan, et al.
AIP conference proceedings (2025) Vol. 3283, pp. 020002-020002
Closed Access
A multi-level sorting prediction enhancement-based two-dimensional reversible data hiding algorithm for JPEG images
Bin Ma, Songkun Wang, Jian Xu, et al.
Digital Signal Processing (2023) Vol. 141, pp. 104145-104145
Open Access | Times Cited: 5
Bin Ma, Songkun Wang, Jian Xu, et al.
Digital Signal Processing (2023) Vol. 141, pp. 104145-104145
Open Access | Times Cited: 5
A robust watermarking approach for medical image authentication using dual image and quorum function
Ashis Dey, Partha Chowdhuri, Pabitra Pal, et al.
Journal of Visual Communication and Image Representation (2024), pp. 104299-104299
Closed Access | Times Cited: 1
Ashis Dey, Partha Chowdhuri, Pabitra Pal, et al.
Journal of Visual Communication and Image Representation (2024), pp. 104299-104299
Closed Access | Times Cited: 1
Reversible data hiding strategy exploiting circular distance interpolation utilizing optimal pixel adjustment with error substitution
Manasi Jana, Biswapati Jana, Subhankar Joardar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 16, pp. 48949-48986
Closed Access | Times Cited: 3
Manasi Jana, Biswapati Jana, Subhankar Joardar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 16, pp. 48949-48986
Closed Access | Times Cited: 3
High Payload Lossless Steganography Using Image Interpolation
Raju Pratap Sharma, Aruna Malik, Samayveer Singh, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-14
Open Access | Times Cited: 2
Raju Pratap Sharma, Aruna Malik, Samayveer Singh, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-14
Open Access | Times Cited: 2
Interpolation Based Reversible Data Hiding using Pixel Intensity Classes
Abhinandan Tripathi, Jay Prakash
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING (2023)
Open Access | Times Cited: 2
Abhinandan Tripathi, Jay Prakash
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING (2023)
Open Access | Times Cited: 2
High-Payload Data-Hiding Scheme Based on Interpolation and Histogram Shifting
Chi-Yao Weng, Hao-Yu Weng, Njabulo Sinethemba Shongwe, et al.
Electronics (2024) Vol. 13, Iss. 4, pp. 738-738
Open Access
Chi-Yao Weng, Hao-Yu Weng, Njabulo Sinethemba Shongwe, et al.
Electronics (2024) Vol. 13, Iss. 4, pp. 738-738
Open Access
Randomization Strategies in Image Steganography Techniques: A Review
AFM Zainul Abadin, Rossilawati Sulaiman, Mohammad Kamrul Hasan
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 3139-3171
Open Access
AFM Zainul Abadin, Rossilawati Sulaiman, Mohammad Kamrul Hasan
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 3139-3171
Open Access
Reversible data hiding in encrypted images based on Lasso regression predictor and dynamic secret sharing
Yu Ren, Jiaohua Qin, Xuyu Xiang, et al.
Applied Intelligence (2024) Vol. 55, Iss. 2
Closed Access
Yu Ren, Jiaohua Qin, Xuyu Xiang, et al.
Applied Intelligence (2024) Vol. 55, Iss. 2
Closed Access
Adaptive and Effective Data Hiding Scheme for AMBTC Compression Codes
Chia‐Chen Lin, En-Ting Chu, Yu‐Fan Lin
(2024), pp. 66-72
Closed Access
Chia‐Chen Lin, En-Ting Chu, Yu‐Fan Lin
(2024), pp. 66-72
Closed Access
A Contemporary Review of Interpolation-based Reversible Data Hiding
Supriya Pandey, Shrawan Kumar Pandey, Abhinandan Tripathi
(2024), pp. 1646-1653
Closed Access
Supriya Pandey, Shrawan Kumar Pandey, Abhinandan Tripathi
(2024), pp. 1646-1653
Closed Access
A Multi-level Sorting Prediction Enhancement-Based Two-Dimensional Reversible Data Hiding Algorithm for JPEG Images
Bin Ma, Songkun Wang, Jian Xu, et al.
Lecture notes in computer science (2023), pp. 481-495
Closed Access
Bin Ma, Songkun Wang, Jian Xu, et al.
Lecture notes in computer science (2023), pp. 481-495
Closed Access