OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations
De Rosal Ignatius Moses Setiadi, Nova Rijati
Computation (2023) Vol. 11, Iss. 9, pp. 178-178
Open Access | Times Cited: 22

Showing 22 citing articles:

Global polynomial synchronization of proportional delay memristive neural networks with uncertain parameters and its application to image encryption
Yan Wan, Liqun Zhou, Jiapeng Han
Engineering Applications of Artificial Intelligence (2025) Vol. 147, pp. 110290-110290
Closed Access | Times Cited: 1

Image encryption algorithm based on a new 3D chaotic system using cellular automata
Ahmad Yousefian Darani, Y. Khedmati Yengejeh, H. Pakmanesh, et al.
Chaos Solitons & Fractals (2023) Vol. 179, pp. 114396-114396
Closed Access | Times Cited: 22

A Faster and Robust Artificial Neural Network Based Image Encryption Technique With Improved SSIM
Asisa Kumar Panigrahy, Shima Ramesh Maniyath, Mithileysh Sathiyanarayanan, et al.
IEEE Access (2024) Vol. 12, pp. 10818-10833
Open Access | Times Cited: 6

Realizing permutation gates with phi-bits: Acoustic quantum analogue computing
David Cavalluzzi, Akinsanmi S. Ige, Keith Runge, et al.
Journal of Applied Physics (2025) Vol. 137, Iss. 10
Open Access

Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13

Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps
Dani Elias Mfungo, Xianping Fu
Entropy (2023) Vol. 25, Iss. 11, pp. 1478-1478
Open Access | Times Cited: 10

Can There Be a Two Way Hash Function?
Timucin Koroglu, Refik Samet
IEEE Access (2024) Vol. 12, pp. 18358-18386
Open Access | Times Cited: 3

Improvement of medical data security using SABES optimization algorithm
Suvita Rani Sharma, Birmohan Singh, Manpreet Kaur
The Journal of Supercomputing (2024) Vol. 80, Iss. 9, pp. 12929-12965
Closed Access | Times Cited: 3

Image encryption algorithm based on COA and hyperchaotic Lorenz system
Xiaofu Qin, Yong Zhang
Nonlinear Dynamics (2024) Vol. 112, Iss. 12, pp. 10611-10632
Closed Access | Times Cited: 3

Image Encryption using Half-Inverted Cascading Chaos Cipheration
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8

PSDCLS: Parallel simultaneous diffusion–confusion image cryptosystem based on Latin square
Ebrahim Zarei Zefreh
Journal of Information Security and Applications (2024) Vol. 83, pp. 103785-103785
Closed Access | Times Cited: 1

A Secure Transmission of Digital Images using Multiple Chaotic Maps and Elliptic Curve
Javaria Akbar, Nasir Siddiqui, Shamsa Kanwal, et al.
International Journal of Research Publication and Reviews (2024) Vol. 5, Iss. 6, pp. 473-481
Open Access | Times Cited: 1

Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access | Times Cited: 1

Integration of a novel 3D chaotic map with ELSS and novel cross-border pixel exchange strategy for secure image communication
Sajid Khan, Hao Peng, Zhaoquan Gu, et al.
Complex & Intelligent Systems (2024)
Open Access | Times Cited: 1

Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 12, pp. 17926-17944
Open Access | Times Cited: 2

Rotary Combination Permutation and image tiling to safeguard real-time image-based systems through a new 1D-chaotic map
Mohamed Amine Midoun, Xinye Cai, Mohamed Zakariya Talhaoui, et al.
Expert Systems with Applications (2024), pp. 126201-126201
Closed Access

Medical Image Encryption for Advanced Security and Privacy
Sangeeth Johnson, Amal K Reji, P S Devanarayan, et al.
(2024), pp. 1-4
Closed Access

5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q‐Matrix
Geeta Biban, Renu Chugh, Anju Panwar, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access

Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level
Muhammad Naufal Erza Farandi, Aris Marjuni, Nova Rijati, et al.
The Imaging Science Journal (2024), pp. 1-18
Closed Access

Enhancing Secret Image Authentication Through Encryption-Based Steganography with Reversible Watermarking
P. Lakshmi, G Sunil, Ali Ashoor Issa, et al.
(2023), pp. 1-6
Closed Access

Page 1

Scroll to top