
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography
Qingxiao Guan, Peng Liu, Weiming Zhang, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 501-516
Closed Access | Times Cited: 13
Qingxiao Guan, Peng Liu, Weiming Zhang, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 501-516
Closed Access | Times Cited: 13
Showing 13 citing articles:
IMIH: Imperceptible Medical Image Hiding for Secure Healthcare
Ping Ping, Wei Pan, Deyin Fu, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4652-4667
Closed Access | Times Cited: 4
Ping Ping, Wei Pan, Deyin Fu, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4652-4667
Closed Access | Times Cited: 4
Robust image steganography against JPEG compression based on DCT residual modulation
Yingkai Huang, Zhuxian Liu, Qiwen Wu, et al.
Signal Processing (2024) Vol. 219, pp. 109431-109431
Closed Access | Times Cited: 4
Yingkai Huang, Zhuxian Liu, Qiwen Wu, et al.
Signal Processing (2024) Vol. 219, pp. 109431-109431
Closed Access | Times Cited: 4
A robust image watermarking framework based on U2-net encoder and loss function weight assignment
Kang Xu, Wen Han, Yixiang Fang, et al.
Multimedia Systems (2025) Vol. 31, Iss. 1
Closed Access
Kang Xu, Wen Han, Yixiang Fang, et al.
Multimedia Systems (2025) Vol. 31, Iss. 1
Closed Access
Lite Localization Network and DUE-Based Watermarking for Color Image Copyright Protection
Liuhao Zhu, Yixiang Fang, Yi Zhao, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2024) Vol. 34, Iss. 10, pp. 9311-9325
Closed Access | Times Cited: 3
Liuhao Zhu, Yixiang Fang, Yi Zhao, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2024) Vol. 34, Iss. 10, pp. 9311-9325
Closed Access | Times Cited: 3
Toward Secure and Robust Steganography for Black-Box Generated Images
Kai Zeng, Kejiang Chen, Jiansong Zhang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3237-3250
Closed Access | Times Cited: 3
Kai Zeng, Kejiang Chen, Jiansong Zhang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3237-3250
Closed Access | Times Cited: 3
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping
Yunming Zhang, Dengpan Ye, Caiyun Xie, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4628-4641
Open Access | Times Cited: 2
Yunming Zhang, Dengpan Ye, Caiyun Xie, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4628-4641
Open Access | Times Cited: 2
Securing Fixed Neural Network Steganography
Zicong Luo, Sheng Li, Guobiao Li, et al.
(2023), pp. 7943-7951
Open Access | Times Cited: 6
Zicong Luo, Sheng Li, Guobiao Li, et al.
(2023), pp. 7943-7951
Open Access | Times Cited: 6
Covert Communication through Robust Fragment Hiding in a Large Number of Images
Pengfei Wang, Hua Zhong, Ya‐Pei Feng, et al.
Sensors (2024) Vol. 24, Iss. 2, pp. 627-627
Open Access | Times Cited: 1
Pengfei Wang, Hua Zhong, Ya‐Pei Feng, et al.
Sensors (2024) Vol. 24, Iss. 2, pp. 627-627
Open Access | Times Cited: 1
Moiré pattern generation-based image steganography
Tiewei Qin, Bingwen Feng, Bing Chen, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103753-103753
Closed Access | Times Cited: 1
Tiewei Qin, Bingwen Feng, Bing Chen, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103753-103753
Closed Access | Times Cited: 1
Deep Sub-Image Sampling Based Defense Against Spatial-Domain Adversarial Steganography
Xinyu Huang, Yuwen Cao, Tomoaki Ohtsuki
(2024), pp. 383-387
Closed Access
Xinyu Huang, Yuwen Cao, Tomoaki Ohtsuki
(2024), pp. 383-387
Closed Access
Watermarking for Social Networks Images With Improved Robustness Through Polar Codes
Oleg Evsutin, Fedor Ivanov, Kristina Dzhanashia
IEEE Access (2024) Vol. 12, pp. 118154-118168
Open Access
Oleg Evsutin, Fedor Ivanov, Kristina Dzhanashia
IEEE Access (2024) Vol. 12, pp. 118154-118168
Open Access
A strong-robust covert communication scheme based on geo-coordinate
Yanmei Liu, Mingliang Zhang, Ying Duan, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 32475-32496
Closed Access
Yanmei Liu, Mingliang Zhang, Ying Duan, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 32475-32496
Closed Access
Information Embedding With Stegotext Reconstruction
Yinfei Xu, Jian Lu, Xuan Guang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1415-1428
Closed Access
Yinfei Xu, Jian Lu, Xuan Guang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1415-1428
Closed Access