
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Image Encryption using Half-Inverted Cascading Chaos Cipheration
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
Showing 8 citing articles:
Global polynomial synchronization of proportional delay memristive neural networks with uncertain parameters and its application to image encryption
Yan Wan, Liqun Zhou, Jiapeng Han
Engineering Applications of Artificial Intelligence (2025) Vol. 147, pp. 110290-110290
Closed Access | Times Cited: 1
Yan Wan, Liqun Zhou, Jiapeng Han
Engineering Applications of Artificial Intelligence (2025) Vol. 147, pp. 110290-110290
Closed Access | Times Cited: 1
A Faster and Robust Artificial Neural Network Based Image Encryption Technique With Improved SSIM
Asisa Kumar Panigrahy, Shima Ramesh Maniyath, Mithileysh Sathiyanarayanan, et al.
IEEE Access (2024) Vol. 12, pp. 10818-10833
Open Access | Times Cited: 6
Asisa Kumar Panigrahy, Shima Ramesh Maniyath, Mithileysh Sathiyanarayanan, et al.
IEEE Access (2024) Vol. 12, pp. 10818-10833
Open Access | Times Cited: 6
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Muhammad Aqeel, Arfan Jaffar, Muhammad Faheem, et al.
Engineering Reports (2025) Vol. 7, Iss. 1
Open Access
Muhammad Aqeel, Arfan Jaffar, Muhammad Faheem, et al.
Engineering Reports (2025) Vol. 7, Iss. 1
Open Access
AISM: An Adaptable Image Steganography Model With User Customization
Bobiao Guo, Ping Ping, Siqi Zhou, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 5, pp. 1955-1968
Closed Access | Times Cited: 1
Bobiao Guo, Ping Ping, Siqi Zhou, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 5, pp. 1955-1968
Closed Access | Times Cited: 1
A robust approach to satellite image encryption using chaotic map and circulant matrices
Shamsa Kanwal, Saba Inam, Asghar Ali Shah, et al.
Engineering Reports (2024)
Open Access | Times Cited: 1
Shamsa Kanwal, Saba Inam, Asghar Ali Shah, et al.
Engineering Reports (2024)
Open Access | Times Cited: 1
5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q‐Matrix
Geeta Biban, Renu Chugh, Anju Panwar, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access
Geeta Biban, Renu Chugh, Anju Panwar, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access
Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access
Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level
Muhammad Naufal Erza Farandi, Aris Marjuni, Nova Rijati, et al.
The Imaging Science Journal (2024), pp. 1-18
Closed Access
Muhammad Naufal Erza Farandi, Aris Marjuni, Nova Rijati, et al.
The Imaging Science Journal (2024), pp. 1-18
Closed Access