
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels
Yi Zhang, Xiangyang Luo, Yanqing Guo, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2019) Vol. 30, Iss. 8, pp. 2750-2764
Closed Access | Times Cited: 69
Yi Zhang, Xiangyang Luo, Yanqing Guo, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2019) Vol. 30, Iss. 8, pp. 2750-2764
Closed Access | Times Cited: 69
Showing 1-25 of 69 citing articles:
Coverless Image Steganography Based on Multi-Object Recognition
Yuanjing Luo, Jiaohua Qin, Xuyu Xiang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2020) Vol. 31, Iss. 7, pp. 2779-2791
Closed Access | Times Cited: 96
Yuanjing Luo, Jiaohua Qin, Xuyu Xiang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2020) Vol. 31, Iss. 7, pp. 2779-2791
Closed Access | Times Cited: 96
Concealed Attack for Robust Watermarking Based on Generative Model and Perceptual Loss
Qi Li, Xingyuan Wang, Bin Ma, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2021) Vol. 32, Iss. 8, pp. 5695-5706
Closed Access | Times Cited: 95
Qi Li, Xingyuan Wang, Bin Ma, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2021) Vol. 32, Iss. 8, pp. 5695-5706
Closed Access | Times Cited: 95
Security of medical images for telemedicine: a systematic review
Mahmoud Magdy, Khalid M. Hosny, Neveen I. Ghali, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 18, pp. 25101-25145
Open Access | Times Cited: 61
Mahmoud Magdy, Khalid M. Hosny, Neveen I. Ghali, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 18, pp. 25101-25145
Open Access | Times Cited: 61
Watermarking schemes for digital images: Robustness overview
Oleg Evsutin, Kristina Dzhanashia
Signal Processing Image Communication (2021) Vol. 100, pp. 116523-116523
Closed Access | Times Cited: 54
Oleg Evsutin, Kristina Dzhanashia
Signal Processing Image Communication (2021) Vol. 100, pp. 116523-116523
Closed Access | Times Cited: 54
The infinite race between steganography and steganalysis in images
Trivikram Muralidharan, Aviad Cohen, A.S. Cohen, et al.
Signal Processing (2022) Vol. 201, pp. 108711-108711
Closed Access | Times Cited: 33
Trivikram Muralidharan, Aviad Cohen, A.S. Cohen, et al.
Signal Processing (2022) Vol. 201, pp. 108711-108711
Closed Access | Times Cited: 33
A robust adaptive blind color image watermarking for resisting geometric attacks
Qingtang Su, Decheng Liu, Yehan Sun
Information Sciences (2022) Vol. 606, pp. 194-212
Closed Access | Times Cited: 31
Qingtang Su, Decheng Liu, Yehan Sun
Information Sciences (2022) Vol. 606, pp. 194-212
Closed Access | Times Cited: 31
A survey on Deep-Learning-based image steganography
Bingbing Song, Ping Wei, Sixing Wu, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124390-124390
Closed Access | Times Cited: 5
Bingbing Song, Ping Wei, Sixing Wu, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124390-124390
Closed Access | Times Cited: 5
A systematic review on cover selection methods for steganography: Trend analysis, novel classification and analysis of the elements
Muhammad Harith Noor Azam, Farida Ridzuan, M. Norazizi Sham Mohd Sayuti, et al.
Computer Science Review (2025) Vol. 56, pp. 100726-100726
Closed Access
Muhammad Harith Noor Azam, Farida Ridzuan, M. Norazizi Sham Mohd Sayuti, et al.
Computer Science Review (2025) Vol. 56, pp. 100726-100726
Closed Access
Coverless information hiding based on the generation of anime characters
Yi Cao, Zhili Zhou, Q. M. Jonathan Wu, et al.
EURASIP Journal on Image and Video Processing (2020) Vol. 2020, Iss. 1
Open Access | Times Cited: 40
Yi Cao, Zhili Zhou, Q. M. Jonathan Wu, et al.
EURASIP Journal on Image and Video Processing (2020) Vol. 2020, Iss. 1
Open Access | Times Cited: 40
Improving robust adaptive steganography via minimizing channel errors
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
Signal Processing (2022) Vol. 195, pp. 108498-108498
Closed Access | Times Cited: 24
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
Signal Processing (2022) Vol. 195, pp. 108498-108498
Closed Access | Times Cited: 24
Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography
Liyan Zhu, Xiangyang Luo, Chunfang Yang, et al.
Signal Processing (2021) Vol. 183, pp. 108015-108015
Closed Access | Times Cited: 30
Liyan Zhu, Xiangyang Luo, Chunfang Yang, et al.
Signal Processing (2021) Vol. 183, pp. 108015-108015
Closed Access | Times Cited: 30
Robust steganography resisting JPEG compression by improving selection of cover element
Tong Qiao, Shuai Wang, Xiangyang Luo, et al.
Signal Processing (2021) Vol. 183, pp. 108048-108048
Closed Access | Times Cited: 30
Tong Qiao, Shuai Wang, Xiangyang Luo, et al.
Signal Processing (2021) Vol. 183, pp. 108048-108048
Closed Access | Times Cited: 30
A Novel Covert Communication Method Based on Bitcoin Transaction
Xiangyang Luo, Pei Zhang, Mingliang Zhang, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 4, pp. 2830-2839
Closed Access | Times Cited: 29
Xiangyang Luo, Pei Zhang, Mingliang Zhang, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 4, pp. 2830-2839
Closed Access | Times Cited: 29
Image robust adaptive steganography adapted to lossy channels in open social networks
Yi Zhang, Xiangyang Luo, Jinwei Wang, et al.
Information Sciences (2021) Vol. 564, pp. 306-326
Closed Access | Times Cited: 27
Yi Zhang, Xiangyang Luo, Jinwei Wang, et al.
Information Sciences (2021) Vol. 564, pp. 306-326
Closed Access | Times Cited: 27
Robust Texture-Aware Local Adaptive Image Watermarking With Perceptual Guarantee
Ying Huang, Hu Guan, Jie Liu, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 9, pp. 4660-4674
Closed Access | Times Cited: 11
Ying Huang, Hu Guan, Jie Liu, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 9, pp. 4660-4674
Closed Access | Times Cited: 11
Robust Steganography for High Quality Images
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 9, pp. 4893-4906
Closed Access | Times Cited: 10
Kai Zeng, Kejiang Chen, Weiming Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 9, pp. 4893-4906
Closed Access | Times Cited: 10
A hybrid algorithm for robust image steganography
Rajwinder Kaur, Butta Singh
Multidimensional Systems and Signal Processing (2020) Vol. 32, Iss. 1, pp. 1-23
Closed Access | Times Cited: 28
Rajwinder Kaur, Butta Singh
Multidimensional Systems and Signal Processing (2020) Vol. 32, Iss. 1, pp. 1-23
Closed Access | Times Cited: 28
JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image
Jie Wang, Chunfang Yang, Ma Zhu, et al.
EURASIP Journal on Image and Video Processing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 23
Jie Wang, Chunfang Yang, Ma Zhu, et al.
EURASIP Journal on Image and Video Processing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 23
Efficient Robust Watermarking Based on Structure-Preserving Quaternion Singular Value Decomposition
Yong Chen, Zhigang Jia, Yaxin Peng, et al.
IEEE Transactions on Image Processing (2023) Vol. 32, pp. 3964-3979
Closed Access | Times Cited: 9
Yong Chen, Zhigang Jia, Yaxin Peng, et al.
IEEE Transactions on Image Processing (2023) Vol. 32, pp. 3964-3979
Closed Access | Times Cited: 9
Practical Cover Selection for Steganography
Zichi Wang, Xinpeng Zhang, Zhenxing Qian
IEEE Signal Processing Letters (2019) Vol. 27, pp. 71-75
Closed Access | Times Cited: 29
Zichi Wang, Xinpeng Zhang, Zhenxing Qian
IEEE Signal Processing Letters (2019) Vol. 27, pp. 71-75
Closed Access | Times Cited: 29
Coverless image steganography based on DenseNet feature mapping
Qiang Liu, Xuyu Xiang, Jiaohua Qin, et al.
EURASIP Journal on Image and Video Processing (2020) Vol. 2020, Iss. 1
Open Access | Times Cited: 24
Qiang Liu, Xuyu Xiang, Jiaohua Qin, et al.
EURASIP Journal on Image and Video Processing (2020) Vol. 2020, Iss. 1
Open Access | Times Cited: 24
Sign steganography revisited with robust domain selection
Xiaoshuai Wu, Tong Qiao, Yanli Chen, et al.
Signal Processing (2022) Vol. 196, pp. 108522-108522
Closed Access | Times Cited: 15
Xiaoshuai Wu, Tong Qiao, Yanli Chen, et al.
Signal Processing (2022) Vol. 196, pp. 108522-108522
Closed Access | Times Cited: 15
Steganalysis Feature Selection With Multidimensional Evaluation and Dynamic Threshold Allocation
Yuanyuan Ma, Lige Xu, Yi Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 34, Iss. 3, pp. 1954-1969
Closed Access | Times Cited: 8
Yuanyuan Ma, Lige Xu, Yi Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 34, Iss. 3, pp. 1954-1969
Closed Access | Times Cited: 8
A new method for locating data hiding in image steganography
Sabyasachi Pramanik
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 34323-34349
Closed Access | Times Cited: 8
Sabyasachi Pramanik
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 34323-34349
Closed Access | Times Cited: 8
Survey on Image Steganography Techniques
Bashayer Falah Alatiyyat, C. Narmatha
(2022), pp. 57-64
Closed Access | Times Cited: 13
Bashayer Falah Alatiyyat, C. Narmatha
(2022), pp. 57-64
Closed Access | Times Cited: 13