
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Data Protection in Palmprint Recognition via Dynamic Random Invisible Watermark Embedding
Chengcheng Liu, Dexing Zhong, Huikai Shao
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 10, pp. 6927-6940
Closed Access | Times Cited: 17
Chengcheng Liu, Dexing Zhong, Huikai Shao
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 10, pp. 6927-6940
Closed Access | Times Cited: 17
Showing 17 citing articles:
Unsupervised Palmprint Image Quality Assessment via Pseudo-Label Generation and Ranking Guidance
Yuchen Zou, Chengcheng Liu, Huikai Shao, et al.
IEEE Transactions on Instrumentation and Measurement (2023) Vol. 72, pp. 1-11
Closed Access | Times Cited: 22
Yuchen Zou, Chengcheng Liu, Huikai Shao, et al.
IEEE Transactions on Instrumentation and Measurement (2023) Vol. 72, pp. 1-11
Closed Access | Times Cited: 22
Deep Learning in Palmprint Recognition-A Comprehensive Survey
Chengrui Gao, Ziyuan Yang, Wei Jia, et al.
(2025)
Open Access
Chengrui Gao, Ziyuan Yang, Wei Jia, et al.
(2025)
Open Access
Privacy Protection in Palmprint Recognition via Pruning Frequency Channels
Siyu Shi, Huikai Shao, Dexing Zhong
Lecture notes in computer science (2025), pp. 57-67
Closed Access
Siyu Shi, Huikai Shao, Dexing Zhong
Lecture notes in computer science (2025), pp. 57-67
Closed Access
Learning Discriminative Palmprint Anti‐Spoofing Features via High‐Frequency Spoofing Regions Adaptation
Chengcheng Liu, Huikai Shao, Dexing Zhong
IET Image Processing (2025) Vol. 19, Iss. 1
Open Access
Chengcheng Liu, Huikai Shao, Dexing Zhong
IET Image Processing (2025) Vol. 19, Iss. 1
Open Access
Privacy Preserving Palmprint Recognition via Federated Metric Learning
Huikai Shao, Chengcheng Liu, LI Xiao-jiang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 878-891
Closed Access | Times Cited: 11
Huikai Shao, Chengcheng Liu, LI Xiao-jiang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 878-891
Closed Access | Times Cited: 11
Online Signature Watermarking in the Transform Domain
Marcos Faúndez-Zanuy
Cognitive Computation (2025) Vol. 17, Iss. 2
Open Access
Marcos Faúndez-Zanuy
Cognitive Computation (2025) Vol. 17, Iss. 2
Open Access
Palmprint recognition system using VR-LBP and KAZE features for better recognition accuracy
Noor Aldeen A. Khalid, Muhammad Imran Ahmad, Tan Shie Chow, et al.
Bulletin of Electrical Engineering and Informatics (2024) Vol. 13, Iss. 2, pp. 1060-1068
Open Access | Times Cited: 2
Noor Aldeen A. Khalid, Muhammad Imran Ahmad, Tan Shie Chow, et al.
Bulletin of Electrical Engineering and Informatics (2024) Vol. 13, Iss. 2, pp. 1060-1068
Open Access | Times Cited: 2
Palmsecmatch: A Data-Centric Template Protection Method for Palmprint Recognition
Chengcheng Liu, Huikai Shao, Dexing Zhong
(2024)
Closed Access | Times Cited: 2
Chengcheng Liu, Huikai Shao, Dexing Zhong
(2024)
Closed Access | Times Cited: 2
A Blind Digital Watermarking Approach Using Palmprint-Embedded Local Binary Patterns and Arnold Cat Map Transformations
Brahim Ferik, Lakhdar Laimeche, Abdallah Meraoumia, et al.
(2024) Vol. 4, pp. 1-8
Closed Access | Times Cited: 2
Brahim Ferik, Lakhdar Laimeche, Abdallah Meraoumia, et al.
(2024) Vol. 4, pp. 1-8
Closed Access | Times Cited: 2
PalmSecMatch: A data-centric template protection method for palmprint recognition
Chengcheng Liu, Huikai Shao, Dexing Zhong
Displays (2024) Vol. 84, pp. 102771-102771
Closed Access | Times Cited: 2
Chengcheng Liu, Huikai Shao, Dexing Zhong
Displays (2024) Vol. 84, pp. 102771-102771
Closed Access | Times Cited: 2
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation
Fei Peng, Tongxin Liao, Min Long
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 12, pp. 8394-8408
Closed Access | Times Cited: 12
Fei Peng, Tongxin Liao, Min Long
IEEE Transactions on Circuits and Systems for Video Technology (2022) Vol. 32, Iss. 12, pp. 8394-8408
Closed Access | Times Cited: 12
Review of Image Forensic Techniques Based on Deep Learning
Chunyin Shi, Luan Chen, Chengyou Wang, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3134-3134
Open Access | Times Cited: 6
Chunyin Shi, Luan Chen, Chengyou Wang, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3134-3134
Open Access | Times Cited: 6
Privacy-Preserving Convolutional Bi-LSTM Network for Robust Analysis of Encrypted Time-Series Medical Images
Manjur Kolhar, Sultan Mesfer Aldossary
AI (2023) Vol. 4, Iss. 3, pp. 706-720
Open Access | Times Cited: 5
Manjur Kolhar, Sultan Mesfer Aldossary
AI (2023) Vol. 4, Iss. 3, pp. 706-720
Open Access | Times Cited: 5
Learning domain-adaptive palmprint anti-spoofing feature from multi-source domains
Chengcheng Liu, Huikai Shao, Dexing Zhong
Displays (2024) Vol. 86, pp. 102871-102871
Closed Access | Times Cited: 1
Chengcheng Liu, Huikai Shao, Dexing Zhong
Displays (2024) Vol. 86, pp. 102871-102871
Closed Access | Times Cited: 1
Review on Image Forensic Techniques Based on Deep Learning
Chunyin Shi, Luan Chen, Chengyou Wang, et al.
(2023)
Open Access | Times Cited: 2
Chunyin Shi, Luan Chen, Chengyou Wang, et al.
(2023)
Open Access | Times Cited: 2
Optimized Hybrid DTCWT with Arnolds Cat Map Watermarking Scheme for Multi-Modal Digital Evidence
Amit Kale, Mahesh. S. Chanvan
2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC) (2024), pp. 1-4
Closed Access
Amit Kale, Mahesh. S. Chanvan
2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC) (2024), pp. 1-4
Closed Access
Steganography Approach to Image Authentication Using Pulse Coupled Neural Network
Radoslav Forgáč, Miloš Očkay, Martin Javurek, et al.
Computing and Informatics (2023) Vol. 42, Iss. 3, pp. 591-614
Open Access
Radoslav Forgáč, Miloš Očkay, Martin Javurek, et al.
Computing and Informatics (2023) Vol. 42, Iss. 3, pp. 591-614
Open Access