OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Robust Image Steganography: Hiding Messages in Frequency Coefficients
Yuhang Lan, Fei Shang, Jianhua Yang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 12, pp. 14955-14963
Open Access | Times Cited: 7

Showing 7 citing articles:

PRIS: Practical robust invertible network for image steganography
Hang Yang, Yitian Xu, Xuhua Liu, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108419-108419
Open Access | Times Cited: 11

Lossless image steganography: Regard steganography as super-resolution
Tingqiang Wang, Hang Cheng, Ximeng Liu, et al.
Information Processing & Management (2024) Vol. 61, Iss. 4, pp. 103719-103719
Closed Access | Times Cited: 3

Robust image hiding network with Frequency and Spatial Attentions
Xiaobin Zeng, Bingwen Feng, Zhihua Xia, et al.
Pattern Recognition (2024) Vol. 155, pp. 110691-110691
Closed Access | Times Cited: 2

StegFormer: Rebuilding the Glory of Autoencoder-Based Steganography
Xiao Ke, Huanqi Wu, Wenzhong Guo
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 3, pp. 2723-2731
Open Access | Times Cited: 1

High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach
Tamer Rabie, Mohammed Baziyad, Ibrahim Kamel
Algorithms (2024) Vol. 17, Iss. 8, pp. 328-328
Open Access | Times Cited: 1

A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features
Fan Li, C. Liu, Zhenbo Dong, et al.
Security and Communication Networks (2024) Vol. 2024, pp. 1-22
Open Access

Dig a Hole and Fill in Sand: Adversary and Hiding Decoupled Steganography
Weixuan Tang, Hu Yang, Yuan Rao, et al.
(2024), pp. 10440-10448
Closed Access

Page 1

Scroll to top