
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Fuzzy Vault Schemes in Multi-secret Digital Steganography
Katarzyna Koptyra, Marek R. Ogiela
(2015), pp. 183-186
Closed Access | Times Cited: 11
Katarzyna Koptyra, Marek R. Ogiela
(2015), pp. 183-186
Closed Access | Times Cited: 11
Showing 11 citing articles:
Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review
A. H. Mohsin, A. A. Zaidan, B. B. Zaidan, et al.
Journal of Medical Systems (2018) Vol. 42, Iss. 12
Closed Access | Times Cited: 51
A. H. Mohsin, A. A. Zaidan, B. B. Zaidan, et al.
Journal of Medical Systems (2018) Vol. 42, Iss. 12
Closed Access | Times Cited: 51
Compressionābased steganography
Bruno Carpentieri, Arcangelo Castiglione, Alfredo De Santis, et al.
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 8
Closed Access | Times Cited: 14
Bruno Carpentieri, Arcangelo Castiglione, Alfredo De Santis, et al.
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 8
Closed Access | Times Cited: 14
Multiply information coding and hiding using fuzzy vault
Katarzyna Koptyra, Marek R. Ogiela
Soft Computing (2018) Vol. 23, Iss. 12, pp. 4357-4366
Closed Access | Times Cited: 14
Katarzyna Koptyra, Marek R. Ogiela
Soft Computing (2018) Vol. 23, Iss. 12, pp. 4357-4366
Closed Access | Times Cited: 14
State of the Art in Biometric Key Binding and Key Generation Schemes
Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, et al.
International Journal of Communication Networks and Information Security (IJCNIS) (2022) Vol. 9, Iss. 3
Open Access | Times Cited: 6
Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, et al.
International Journal of Communication Networks and Information Security (IJCNIS) (2022) Vol. 9, Iss. 3
Open Access | Times Cited: 6
An Efficient Steganographic Protocol for WebP Files
Katarzyna Koptyra, Marek R. Ogiela
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12404-12404
Open Access | Times Cited: 3
Katarzyna Koptyra, Marek R. Ogiela
Applied Sciences (2023) Vol. 13, Iss. 22, pp. 12404-12404
Open Access | Times Cited: 3
Finger Knuckle Print Recognition using MMDA with Fuzzy Vault
Muthukumar Arunachalam, Kavipriya Amuthan
The International Arab Journal of Information Technology (2020) Vol. 17, Iss. 4, pp. 554-561
Open Access | Times Cited: 4
Muthukumar Arunachalam, Kavipriya Amuthan
The International Arab Journal of Information Technology (2020) Vol. 17, Iss. 4, pp. 554-561
Open Access | Times Cited: 4
Tiek: Two-tier Authentication and Key Distribution for Wearable Devices
Sam Hylamia, Wenqing Yan, Christian Rohner, et al.
(2019), pp. 1-6
Open Access | Times Cited: 3
Sam Hylamia, Wenqing Yan, Christian Rohner, et al.
(2019), pp. 1-6
Open Access | Times Cited: 3
Concealing Additional Secrets Using Sharing Approach in Steganography
Marek R. Ogiela, Katarzyna Koptyra
Lecture notes on data engineering and communications technologies (2016), pp. 507-512
Closed Access | Times Cited: 1
Marek R. Ogiela, Katarzyna Koptyra
Lecture notes on data engineering and communications technologies (2016), pp. 507-512
Closed Access | Times Cited: 1
Multi-level Steganography Based on Fuzzy Vault Systems and Secret Sharing Techniques
Katarzyna Koptyra, Marek R. Ogiela
Springer eBooks (2017), pp. 115-121
Closed Access | Times Cited: 1
Katarzyna Koptyra, Marek R. Ogiela
Springer eBooks (2017), pp. 115-121
Closed Access | Times Cited: 1
Biometric Traits in Multi-secret Digital Steganography
Katarzyna Koptyra, Marek R. Ogiela
Lecture notes in computer science (2017), pp. 313-319
Closed Access | Times Cited: 1
Katarzyna Koptyra, Marek R. Ogiela
Lecture notes in computer science (2017), pp. 313-319
Closed Access | Times Cited: 1
Poster: Tiek: Two-tier Authentication and Key Distribution for Wearable Devices
Sam Hylamia, Christian Rohner, Thiemo Voigt
IEEE European Symposium on Security and Privacy (2019)
Closed Access
Sam Hylamia, Christian Rohner, Thiemo Voigt
IEEE European Symposium on Security and Privacy (2019)
Closed Access