
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Sensitive Image Encryption Algorithm Based on a Higher-Dimensional Chaotic Map and Steganography
Jinyuan Liu, Yong Wang, Qi Han, et al.
International Journal of Bifurcation and Chaos (2022) Vol. 32, Iss. 01
Closed Access | Times Cited: 15
Jinyuan Liu, Yong Wang, Qi Han, et al.
International Journal of Bifurcation and Chaos (2022) Vol. 32, Iss. 01
Closed Access | Times Cited: 15
Showing 15 citing articles:
2D and 3D compatible chaotic image encryption system based on checkers rules and shift register
Chang Cai, Yinghong Cao, Hadi Jahanshahi, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 9, pp. 106874-106874
Closed Access | Times Cited: 7
Chang Cai, Yinghong Cao, Hadi Jahanshahi, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 9, pp. 106874-106874
Closed Access | Times Cited: 7
High-quality visually secure image cryptosystem using improved Chebyshev map and 2D compressive sensing model
Shufeng Huang, Donghua Jiang, Qianxue Wang, et al.
Chaos Solitons & Fractals (2022) Vol. 163, pp. 112584-112584
Closed Access | Times Cited: 22
Shufeng Huang, Donghua Jiang, Qianxue Wang, et al.
Chaos Solitons & Fractals (2022) Vol. 163, pp. 112584-112584
Closed Access | Times Cited: 22
Reversible blind image hiding algorithm based on compressive sensing and fusion mechanism
Huishan Wu, Guodong Ye, Wun‐She Yap, et al.
Optics & Laser Technology (2023) Vol. 167, pp. 109755-109755
Closed Access | Times Cited: 15
Huishan Wu, Guodong Ye, Wun‐She Yap, et al.
Optics & Laser Technology (2023) Vol. 167, pp. 109755-109755
Closed Access | Times Cited: 15
Constructing n-dimensional discrete non-degenerate hyperchaotic maps using QR decomposition
Chunlei Fan, Qun Ding
Chaos Solitons & Fractals (2023) Vol. 174, pp. 113915-113915
Closed Access | Times Cited: 12
Chunlei Fan, Qun Ding
Chaos Solitons & Fractals (2023) Vol. 174, pp. 113915-113915
Closed Access | Times Cited: 12
Spatiotemporal Chaos in a Sine Map Lattice With Discrete Memristor Coupling
Shaobo He, Bo Yan, Xianming Wu, et al.
IEEE Transactions on Circuits and Systems I Regular Papers (2024) Vol. 71, Iss. 3, pp. 1039-1049
Closed Access | Times Cited: 4
Shaobo He, Bo Yan, Xianming Wu, et al.
IEEE Transactions on Circuits and Systems I Regular Papers (2024) Vol. 71, Iss. 3, pp. 1039-1049
Closed Access | Times Cited: 4
Memristive Hopfield neural network with multiple controllable nonlinear offset behaviors and its medical encryption application
Xiangxin Leng, Xiaoping Wang, Zhigang Zeng
Chaos Solitons & Fractals (2024) Vol. 183, pp. 114944-114944
Closed Access | Times Cited: 4
Xiangxin Leng, Xiaoping Wang, Zhigang Zeng
Chaos Solitons & Fractals (2024) Vol. 183, pp. 114944-114944
Closed Access | Times Cited: 4
Data security in the Industrial Internet of Things (IIoT) through a triple-image encryption framework leveraging 3-D NEAT, 1DCJ, and 4DHCFO techniques
Abid Mehmood, Arslan Shafique, Neeraj Kumar, et al.
Computers & Electrical Engineering (2024) Vol. 118, pp. 109354-109354
Open Access | Times Cited: 3
Abid Mehmood, Arslan Shafique, Neeraj Kumar, et al.
Computers & Electrical Engineering (2024) Vol. 118, pp. 109354-109354
Open Access | Times Cited: 3
A Novel Machine Learning Technique for Selecting Suitable Image Encryption Algorithms for IoT Applications
Arslan Shafique, Abid Mehmood, Moatsum Alawida, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-21
Open Access | Times Cited: 9
Arslan Shafique, Abid Mehmood, Moatsum Alawida, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-21
Open Access | Times Cited: 9
Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map
Ahmad Al-Daraiseh, Yousef Sanjalawe, Salam Al-E’mari, et al.
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 5, pp. 73-73
Open Access | Times Cited: 4
Ahmad Al-Daraiseh, Yousef Sanjalawe, Salam Al-E’mari, et al.
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 5, pp. 73-73
Open Access | Times Cited: 4
Hiding text using the least significant bit technique to improve cover image in the steganography system
Estabraq Hussein Jasim Halboos, Abbas M. Al-Bakry
Bulletin of Electrical Engineering and Informatics (2022) Vol. 11, Iss. 6, pp. 3258-3271
Open Access | Times Cited: 5
Estabraq Hussein Jasim Halboos, Abbas M. Al-Bakry
Bulletin of Electrical Engineering and Informatics (2022) Vol. 11, Iss. 6, pp. 3258-3271
Open Access | Times Cited: 5
Secure Index with OFDM-IM-based Chaotic System
Sura H. Hussien, Hamsa A. Abdullah
Iraqi Journal of Information & Communications Technology (2024) Vol. 6, Iss. 3, pp. 36-49
Open Access
Sura H. Hussien, Hamsa A. Abdullah
Iraqi Journal of Information & Communications Technology (2024) Vol. 6, Iss. 3, pp. 36-49
Open Access
A Novel Approach to Secure Hashing: Implementing Chaotic Hash Functions for Enhanced Security
Yuxuan Li
Research Square (Research Square) (2024)
Open Access
Yuxuan Li
Research Square (Research Square) (2024)
Open Access
A New Cryptographic Key Planning Algorithm Based on Blum Blum Shub
Songül Karakuş, Fırat Artuğer
Turkish Journal of Science and Technology (2024)
Open Access
Songül Karakuş, Fırat Artuğer
Turkish Journal of Science and Technology (2024)
Open Access
Security Compressed Sensing Image Encryption Algorithm Based on Elliptic Curve
Anan Jin, Xiang Li, Qingzhi Xiong
Communications in computer and information science (2023), pp. 350-360
Closed Access | Times Cited: 1
Anan Jin, Xiang Li, Qingzhi Xiong
Communications in computer and information science (2023), pp. 350-360
Closed Access | Times Cited: 1
An Intelligent Secure Adversarial Examples Detection Scheme in Heterogeneous Complex Environments
Weizheng Wang, Xiangqi Wang, Xianmin Pan, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 76, Iss. 3, pp. 3859-3876
Open Access
Weizheng Wang, Xiangqi Wang, Xianmin Pan, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 76, Iss. 3, pp. 3859-3876
Open Access