
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations
De Rosal Ignatius Moses Setiadi, Nova Rijati
Computation (2023) Vol. 11, Iss. 9, pp. 178-178
Open Access | Times Cited: 22
De Rosal Ignatius Moses Setiadi, Nova Rijati
Computation (2023) Vol. 11, Iss. 9, pp. 178-178
Open Access | Times Cited: 22
Showing 22 citing articles:
Global polynomial synchronization of proportional delay memristive neural networks with uncertain parameters and its application to image encryption
Yan Wan, Liqun Zhou, Jiapeng Han
Engineering Applications of Artificial Intelligence (2025) Vol. 147, pp. 110290-110290
Closed Access | Times Cited: 1
Yan Wan, Liqun Zhou, Jiapeng Han
Engineering Applications of Artificial Intelligence (2025) Vol. 147, pp. 110290-110290
Closed Access | Times Cited: 1
Image encryption algorithm based on a new 3D chaotic system using cellular automata
Ahmad Yousefian Darani, Y. Khedmati Yengejeh, H. Pakmanesh, et al.
Chaos Solitons & Fractals (2023) Vol. 179, pp. 114396-114396
Closed Access | Times Cited: 22
Ahmad Yousefian Darani, Y. Khedmati Yengejeh, H. Pakmanesh, et al.
Chaos Solitons & Fractals (2023) Vol. 179, pp. 114396-114396
Closed Access | Times Cited: 22
A Faster and Robust Artificial Neural Network Based Image Encryption Technique With Improved SSIM
Asisa Kumar Panigrahy, Shima Ramesh Maniyath, Mithileysh Sathiyanarayanan, et al.
IEEE Access (2024) Vol. 12, pp. 10818-10833
Open Access | Times Cited: 6
Asisa Kumar Panigrahy, Shima Ramesh Maniyath, Mithileysh Sathiyanarayanan, et al.
IEEE Access (2024) Vol. 12, pp. 10818-10833
Open Access | Times Cited: 6
Realizing permutation gates with phi-bits: Acoustic quantum analogue computing
David Cavalluzzi, Akinsanmi S. Ige, Keith Runge, et al.
Journal of Applied Physics (2025) Vol. 137, Iss. 10
Open Access
David Cavalluzzi, Akinsanmi S. Ige, Keith Runge, et al.
Journal of Applied Physics (2025) Vol. 137, Iss. 10
Open Access
Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13
Edy Winarno, Kristiawan Prasetyo Agung Nugroho, Prajanto Wahyu Adi, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101790-101790
Open Access | Times Cited: 13
Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps
Dani Elias Mfungo, Xianping Fu
Entropy (2023) Vol. 25, Iss. 11, pp. 1478-1478
Open Access | Times Cited: 10
Dani Elias Mfungo, Xianping Fu
Entropy (2023) Vol. 25, Iss. 11, pp. 1478-1478
Open Access | Times Cited: 10
Can There Be a Two Way Hash Function?
Timucin Koroglu, Refik Samet
IEEE Access (2024) Vol. 12, pp. 18358-18386
Open Access | Times Cited: 3
Timucin Koroglu, Refik Samet
IEEE Access (2024) Vol. 12, pp. 18358-18386
Open Access | Times Cited: 3
Improvement of medical data security using SABES optimization algorithm
Suvita Rani Sharma, Birmohan Singh, Manpreet Kaur
The Journal of Supercomputing (2024) Vol. 80, Iss. 9, pp. 12929-12965
Closed Access | Times Cited: 3
Suvita Rani Sharma, Birmohan Singh, Manpreet Kaur
The Journal of Supercomputing (2024) Vol. 80, Iss. 9, pp. 12929-12965
Closed Access | Times Cited: 3
Image encryption algorithm based on COA and hyperchaotic Lorenz system
Xiaofu Qin, Yong Zhang
Nonlinear Dynamics (2024) Vol. 112, Iss. 12, pp. 10611-10632
Closed Access | Times Cited: 3
Xiaofu Qin, Yong Zhang
Nonlinear Dynamics (2024) Vol. 112, Iss. 12, pp. 10611-10632
Closed Access | Times Cited: 3
Image Encryption using Half-Inverted Cascading Chaos Cipheration
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
PSDCLS: Parallel simultaneous diffusion–confusion image cryptosystem based on Latin square
Ebrahim Zarei Zefreh
Journal of Information Security and Applications (2024) Vol. 83, pp. 103785-103785
Closed Access | Times Cited: 1
Ebrahim Zarei Zefreh
Journal of Information Security and Applications (2024) Vol. 83, pp. 103785-103785
Closed Access | Times Cited: 1
A Secure Transmission of Digital Images using Multiple Chaotic Maps and Elliptic Curve
Javaria Akbar, Nasir Siddiqui, Shamsa Kanwal, et al.
International Journal of Research Publication and Reviews (2024) Vol. 5, Iss. 6, pp. 473-481
Open Access | Times Cited: 1
Javaria Akbar, Nasir Siddiqui, Shamsa Kanwal, et al.
International Journal of Research Publication and Reviews (2024) Vol. 5, Iss. 6, pp. 473-481
Open Access | Times Cited: 1
Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access | Times Cited: 1
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access | Times Cited: 1
Integration of a novel 3D chaotic map with ELSS and novel cross-border pixel exchange strategy for secure image communication
Sajid Khan, Hao Peng, Zhaoquan Gu, et al.
Complex & Intelligent Systems (2024)
Open Access | Times Cited: 1
Sajid Khan, Hao Peng, Zhaoquan Gu, et al.
Complex & Intelligent Systems (2024)
Open Access | Times Cited: 1
Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 12, pp. 17926-17944
Open Access | Times Cited: 2
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 12, pp. 17926-17944
Open Access | Times Cited: 2
A Unified Framework for Cyber Oriented Digital Engineering using Integration of Explainable Chaotic Cryptology on Pervasive Systems
Devisha Arunadevi Tiwari, Bhaskar Mondal
(2024)
Open Access
Devisha Arunadevi Tiwari, Bhaskar Mondal
(2024)
Open Access
Rotary Combination Permutation and image tiling to safeguard real-time image-based systems through a new 1D-chaotic map
Mohamed Amine Midoun, Xinye Cai, Mohamed Zakariya Talhaoui, et al.
Expert Systems with Applications (2024), pp. 126201-126201
Closed Access
Mohamed Amine Midoun, Xinye Cai, Mohamed Zakariya Talhaoui, et al.
Expert Systems with Applications (2024), pp. 126201-126201
Closed Access
A Unified Framework for Cyber Oriented Digital Engineering using Integration of Explainable Chaotic Cryptology on Pervasive Systems
Devisha Arunadevi Tiwari, Bhaskar Mondal
(2024)
Open Access
Devisha Arunadevi Tiwari, Bhaskar Mondal
(2024)
Open Access
Medical Image Encryption for Advanced Security and Privacy
Sangeeth Johnson, Amal K Reji, P S Devanarayan, et al.
(2024), pp. 1-4
Closed Access
Sangeeth Johnson, Amal K Reji, P S Devanarayan, et al.
(2024), pp. 1-4
Closed Access
5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q‐Matrix
Geeta Biban, Renu Chugh, Anju Panwar, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access
Geeta Biban, Renu Chugh, Anju Panwar, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access
Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level
Muhammad Naufal Erza Farandi, Aris Marjuni, Nova Rijati, et al.
The Imaging Science Journal (2024), pp. 1-18
Closed Access
Muhammad Naufal Erza Farandi, Aris Marjuni, Nova Rijati, et al.
The Imaging Science Journal (2024), pp. 1-18
Closed Access
Enhancing Secret Image Authentication Through Encryption-Based Steganography with Reversible Watermarking
P. Lakshmi, G Sunil, Ali Ashoor Issa, et al.
(2023), pp. 1-6
Closed Access
P. Lakshmi, G Sunil, Ali Ashoor Issa, et al.
(2023), pp. 1-6
Closed Access