
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Combined Interleaved Pattern to Improve Confusion-Diffusion Image Encryption Based on Hyperchaotic System
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
IEEE Access (2023) Vol. 11, pp. 69005-69021
Open Access | Times Cited: 25
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
IEEE Access (2023) Vol. 11, pp. 69005-69021
Open Access | Times Cited: 25
Showing 25 citing articles:
Global polynomial synchronization of proportional delay memristive neural networks with uncertain parameters and its application to image encryption
Yan Wan, Liqun Zhou, Jiapeng Han
Engineering Applications of Artificial Intelligence (2025) Vol. 147, pp. 110290-110290
Closed Access | Times Cited: 1
Yan Wan, Liqun Zhou, Jiapeng Han
Engineering Applications of Artificial Intelligence (2025) Vol. 147, pp. 110290-110290
Closed Access | Times Cited: 1
AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images
Wassim Alexan, Yousef Korayem, Mohamed Gabr, et al.
IEEE Access (2023) Vol. 11, pp. 106249-106276
Open Access | Times Cited: 27
Wassim Alexan, Yousef Korayem, Mohamed Gabr, et al.
IEEE Access (2023) Vol. 11, pp. 106249-106276
Open Access | Times Cited: 27
An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations
De Rosal Ignatius Moses Setiadi, Nova Rijati
Computation (2023) Vol. 11, Iss. 9, pp. 178-178
Open Access | Times Cited: 22
De Rosal Ignatius Moses Setiadi, Nova Rijati
Computation (2023) Vol. 11, Iss. 9, pp. 178-178
Open Access | Times Cited: 22
Improved Vigenere approach incorporating pseudorandom affine functions for encrypting color images
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 2684-2684
Open Access | Times Cited: 8
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 2684-2684
Open Access | Times Cited: 8
Improved vigenere using affine functions surrounded by two genetic crossovers for image encryption
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 34, Iss. 3, pp. 1787-1787
Open Access | Times Cited: 6
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 34, Iss. 3, pp. 1787-1787
Open Access | Times Cited: 6
Fibonacci Q-Matrix, Hyperchaos, and Galois Field (2⁸) for Augmented Medical Image Encryption
Dina El-Damak, Wassim Alexan, Eyad Mamdouh, et al.
IEEE Access (2024) Vol. 12, pp. 102718-102744
Open Access | Times Cited: 5
Dina El-Damak, Wassim Alexan, Eyad Mamdouh, et al.
IEEE Access (2024) Vol. 12, pp. 102718-102744
Open Access | Times Cited: 5
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Muhammad Aqeel, Arfan Jaffar, Muhammad Faheem, et al.
Engineering Reports (2025) Vol. 7, Iss. 1
Open Access
Muhammad Aqeel, Arfan Jaffar, Muhammad Faheem, et al.
Engineering Reports (2025) Vol. 7, Iss. 1
Open Access
New Vigenere method with pseudo-random affine functions for color image encryption
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Soft Computing (2025)
Closed Access
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Soft Computing (2025)
Closed Access
Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13
Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism
Mustafa A. Al Sibahee, Zaid Ameen Abduljabbar, Chengwen Luo, et al.
PLoS ONE (2024) Vol. 19, Iss. 1, pp. e0296469-e0296469
Open Access | Times Cited: 4
Mustafa A. Al Sibahee, Zaid Ameen Abduljabbar, Chengwen Luo, et al.
PLoS ONE (2024) Vol. 19, Iss. 1, pp. e0296469-e0296469
Open Access | Times Cited: 4
DNA image encryption algorithm based on serrated spiral scrambling and cross bit plane
Wenjing Zhang, Jiangjian Xu, Bing Zhao
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101858-101858
Open Access | Times Cited: 10
Wenjing Zhang, Jiangjian Xu, Bing Zhao
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101858-101858
Open Access | Times Cited: 10
Can There Be a Two Way Hash Function?
Timucin Koroglu, Refik Samet
IEEE Access (2024) Vol. 12, pp. 18358-18386
Open Access | Times Cited: 3
Timucin Koroglu, Refik Samet
IEEE Access (2024) Vol. 12, pp. 18358-18386
Open Access | Times Cited: 3
Image Encryption using Half-Inverted Cascading Chaos Cipheration
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
A Lightweight Image Encryption Scheme Using DNA Coding and Chaos
Marwan A. Fetteha, Wafaa S. Sayed, Lobna A. Said
Electronics (2023) Vol. 12, Iss. 24, pp. 4895-4895
Open Access | Times Cited: 7
Marwan A. Fetteha, Wafaa S. Sayed, Lobna A. Said
Electronics (2023) Vol. 12, Iss. 24, pp. 4895-4895
Open Access | Times Cited: 7
Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 12, pp. 17926-17944
Open Access | Times Cited: 2
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 12, pp. 17926-17944
Open Access | Times Cited: 2
AES Security Improvement by Utilizing New Key-Dependent XOR Tables
Trần Thị Lượng, Nguyễn Ngọc Cương, Bay Vo
IEEE Access (2024) Vol. 12, pp. 53158-53177
Open Access
Trần Thị Lượng, Nguyễn Ngọc Cương, Bay Vo
IEEE Access (2024) Vol. 12, pp. 53158-53177
Open Access
Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access
Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level
Muhammad Naufal Erza Farandi, Aris Marjuni, Nova Rijati, et al.
The Imaging Science Journal (2024), pp. 1-18
Closed Access
Muhammad Naufal Erza Farandi, Aris Marjuni, Nova Rijati, et al.
The Imaging Science Journal (2024), pp. 1-18
Closed Access
Synchronization of Chaotic Extremum-Coded Random Number Generators and Its Application to Segmented Image Encryption
Shunsuke Araki, Ji-Han Wu, Jun‐Juh Yan
Mathematics (2024) Vol. 12, Iss. 19, pp. 2983-2983
Open Access
Shunsuke Araki, Ji-Han Wu, Jun‐Juh Yan
Mathematics (2024) Vol. 12, Iss. 19, pp. 2983-2983
Open Access
Image Encryption Using Higher Dimension Chaotic Systems for Enhanced Image Security
S. Subathra, V. Thanikaiselvan
(2024), pp. 1-6
Closed Access
S. Subathra, V. Thanikaiselvan
(2024), pp. 1-6
Closed Access
Enhanced Color Image Encryption Utilizing a Novel Vigenere Method with Pseudorandom Affine Functions
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Acadlore Transactions on AI and Machine Learning (2024) Vol. 3, Iss. 1, pp. 36-56
Open Access
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Acadlore Transactions on AI and Machine Learning (2024) Vol. 3, Iss. 1, pp. 36-56
Open Access
A Robust Color Image Encryption Scheme with Complex Whirl Wind Spiral chaotic system and quadrant-wise pixel permutation
Maran Ponnambalam, P. Mathivanan, Sajjad Shaukat Jamal
Physica Scripta (2024) Vol. 99, Iss. 10, pp. 105239-105239
Closed Access
Maran Ponnambalam, P. Mathivanan, Sajjad Shaukat Jamal
Physica Scripta (2024) Vol. 99, Iss. 10, pp. 105239-105239
Closed Access
Image Encryption Using A Novel Orbital-Extraction Permutation Technique and Chaotic Key Generation
Sikandar Khan, Safee Ullah, Jawad Ahmad, et al.
(2024), pp. 414-419
Closed Access
Sikandar Khan, Safee Ullah, Jawad Ahmad, et al.
(2024), pp. 414-419
Closed Access
Novel Dual-Domain Chaotic Image Cryptosystem for Cybersecurity Applications
Mahmoud Y. M. Yassin, Ali A. Nasir, Mostafa Taha
IEEE Access (2024) Vol. 12, pp. 123694-123715
Open Access
Mahmoud Y. M. Yassin, Ali A. Nasir, Mostafa Taha
IEEE Access (2024) Vol. 12, pp. 123694-123715
Open Access
Shuffle medical image encryption scheme based on 4D memristive hyperchaotic map
Qiang Lai, Huangtao Wang, Xiao‐Wen Zhao, et al.
Nonlinear Dynamics (2024)
Closed Access
Qiang Lai, Huangtao Wang, Xiao‐Wen Zhao, et al.
Nonlinear Dynamics (2024)
Closed Access