
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Using GAN-Based Encryption to Secure Digital Images With Reconstruction Through Customized Super Resolution Network
Monu Singh, Naman Baranwal, Kedar Nath Singh, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 3977-3984
Closed Access | Times Cited: 12
Monu Singh, Naman Baranwal, Kedar Nath Singh, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 3977-3984
Closed Access | Times Cited: 12
Showing 12 citing articles:
Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics
Yiting Lin, Zhiyu Xie, Tingting Chen, et al.
Expert Systems with Applications (2024) Vol. 257, pp. 124891-124891
Closed Access | Times Cited: 23
Yiting Lin, Zhiyu Xie, Tingting Chen, et al.
Expert Systems with Applications (2024) Vol. 257, pp. 124891-124891
Closed Access | Times Cited: 23
Latent Vector Optimization-Based Generative Image Steganography for Consumer Electronic Applications
Zhili Zhou, Zhipeng Bao, Weiwei Jiang, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 4357-4366
Closed Access | Times Cited: 7
Zhili Zhou, Zhipeng Bao, Weiwei Jiang, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 4357-4366
Closed Access | Times Cited: 7
Real-Time Mouse Data Protection Method Using GANs for Image-Based User Authentication Based on GetCursorPos() and SetCursorPos() Functions
Jinwook Kim, Kyungroul Lee, Hanjo Jeong
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 977-977
Open Access
Jinwook Kim, Kyungroul Lee, Hanjo Jeong
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 977-977
Open Access
Deep learning based medical image segmentation for encryption with copyright protection through data hiding
Monu Singh, Kedar Nath Singh, Amrita Mohan, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110202-110202
Closed Access
Monu Singh, Kedar Nath Singh, Amrita Mohan, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110202-110202
Closed Access
Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression
Monu Singh, Naman Baranwal, Kedar Nath Singh, et al.
Journal of Information Security and Applications (2023) Vol. 79, pp. 103628-103628
Closed Access | Times Cited: 10
Monu Singh, Naman Baranwal, Kedar Nath Singh, et al.
Journal of Information Security and Applications (2023) Vol. 79, pp. 103628-103628
Closed Access | Times Cited: 10
DeepENC: Deep Learning-Based ROI Selection for Encryption of Medical Images Through Key Generation With Multimodal Information Fusion
Kedar Nath Singh, Naman Baranwal, Om Prakash Singh, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 3, pp. 6149-6156
Closed Access | Times Cited: 3
Kedar Nath Singh, Naman Baranwal, Om Prakash Singh, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 3, pp. 6149-6156
Closed Access | Times Cited: 3
GANMarked: Using Secure GAN for Information Hiding in Digital Images
Himanshu Kumar Singh, Naman Baranwal, Kedar Nath Singh, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 3, pp. 6189-6195
Closed Access | Times Cited: 2
Himanshu Kumar Singh, Naman Baranwal, Kedar Nath Singh, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 3, pp. 6189-6195
Closed Access | Times Cited: 2
Deep learning-based image encryption techniques: Fundamentals, current trends, challenges and future directions
Om Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, et al.
Neurocomputing (2024) Vol. 612, pp. 128714-128714
Closed Access | Times Cited: 2
Om Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, et al.
Neurocomputing (2024) Vol. 612, pp. 128714-128714
Closed Access | Times Cited: 2
GANs for Image Security Applications: A Literature Review
Mays Y. Mhawi, Hikmat N. Abdullah, Axel Sikora
Iraqi Journal of Information & Communications Technology (2024) Vol. 7, Iss. 2, pp. 89-102
Open Access
Mays Y. Mhawi, Hikmat N. Abdullah, Axel Sikora
Iraqi Journal of Information & Communications Technology (2024) Vol. 7, Iss. 2, pp. 89-102
Open Access
Survey on medical image encryption: From classical to deep learning-based approaches
Shiv Prasad, Amit Kumar Singh
Computers & Electrical Engineering (2024) Vol. 123, pp. 110011-110011
Closed Access
Shiv Prasad, Amit Kumar Singh
Computers & Electrical Engineering (2024) Vol. 123, pp. 110011-110011
Closed Access
Bl-IEA: A Bit-Level Image Encryption Algorithm using Transformation and Chaotic Skew Tent Map based Substitution for Fingerprint Images
Aditya Kulkarni, S N Prajwalasimha, Naveen Kulkarni, et al.
(2024), pp. 1-7
Closed Access
Aditya Kulkarni, S N Prajwalasimha, Naveen Kulkarni, et al.
(2024), pp. 1-7
Closed Access
Secure transmission of ocean images using deep learning‐based data hiding
Himanshu Kumar Singh, Kedar Nath Singh, Amit Kumar Singh
Expert Systems (2023)
Closed Access | Times Cited: 1
Himanshu Kumar Singh, Kedar Nath Singh, Amit Kumar Singh
Expert Systems (2023)
Closed Access | Times Cited: 1