
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Medical Image Encryption: A Comprehensive Review
Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab, et al.
Computers (2023) Vol. 12, Iss. 8, pp. 160-160
Open Access | Times Cited: 20
Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab, et al.
Computers (2023) Vol. 12, Iss. 8, pp. 160-160
Open Access | Times Cited: 20
Showing 20 citing articles:
Target localization image encryption of wind turbines based on DNA strand replacement rule
Chengye Zou, Haifeng Li, Xuncai Zhang, et al.
Chaos Solitons & Fractals (2024) Vol. 183, pp. 114890-114890
Closed Access | Times Cited: 5
Chengye Zou, Haifeng Li, Xuncai Zhang, et al.
Chaos Solitons & Fractals (2024) Vol. 183, pp. 114890-114890
Closed Access | Times Cited: 5
Securing healthcare medical image information using advance morphological component analysis, information hiding systems, and hybrid convolutional neural networks on IoMT
Binay Kumar Pandey, D. K. Pandey
Computers in Biology and Medicine (2024) Vol. 185, pp. 109499-109499
Closed Access | Times Cited: 2
Binay Kumar Pandey, D. K. Pandey
Computers in Biology and Medicine (2024) Vol. 185, pp. 109499-109499
Closed Access | Times Cited: 2
A Novel Framework for Image Encryption by Integrating Modified Moth Flame Optimization and Logistic Chaotic Map for Enhanced Security
Akshat Aggarwal, Eshaan Awasthi, Deepika Kukreja, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Akshat Aggarwal, Eshaan Awasthi, Deepika Kukreja, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
A Comprehensive Review on Security of Medical Image in Telemedicine
Iraqi Journal of Computer Communication Control and System Engineering (2024), pp. 79-95
Open Access | Times Cited: 1
Iraqi Journal of Computer Communication Control and System Engineering (2024), pp. 79-95
Open Access | Times Cited: 1
Image encryption of medical images
Mohit Pandey, Abhishek Gupta
Advances in computers (2024)
Closed Access
Mohit Pandey, Abhishek Gupta
Advances in computers (2024)
Closed Access
Complexity Reduction in DAT-Based Image Processing
Віктор Макарічев, Vladimir Lukin, Iryna Brysina
Lecture notes in networks and systems (2024), pp. 553-565
Closed Access
Віктор Макарічев, Vladimir Lukin, Iryna Brysina
Lecture notes in networks and systems (2024), pp. 553-565
Closed Access
Securing DICOM Images with a Novel Chaotic Encryption Scheme Utilizing Wavelet Transform and Biometric Fingerprint
Sareh Mortajez, Mohammad Jafar Dehghan, Amirabbas Azizi
Research Square (Research Square) (2024)
Open Access
Sareh Mortajez, Mohammad Jafar Dehghan, Amirabbas Azizi
Research Square (Research Square) (2024)
Open Access
Multi-models Based on Yolov8 for Identification of Vehicle Type and License Plate Recognition
Mustafa Noaman Kadhim, Ammar Hussein Mutlag, Dalal Abdulmohsin Hammood
Communications in computer and information science (2024), pp. 118-135
Closed Access
Mustafa Noaman Kadhim, Ammar Hussein Mutlag, Dalal Abdulmohsin Hammood
Communications in computer and information science (2024), pp. 118-135
Closed Access
On the Impact of Discrete Atomic Compression on Image Classification by Convolutional Neural Networks
Віктор Макарічев, Vladimir Lukin, Iryna Brysina
Computation (2024) Vol. 12, Iss. 9, pp. 176-176
Open Access
Віктор Макарічев, Vladimir Lukin, Iryna Brysina
Computation (2024) Vol. 12, Iss. 9, pp. 176-176
Open Access
An Efficient Image Encryption Scheme for Medical Image Security
Zeenath, K. Durgadevi, John W Carey M
International Journal of Electrical and Electronics Research (2024) Vol. 12, Iss. 3, pp. 964-976
Open Access
Zeenath, K. Durgadevi, John W Carey M
International Journal of Electrical and Electronics Research (2024) Vol. 12, Iss. 3, pp. 964-976
Open Access
Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network
Saba Inam, Shamsa Kanwal, Anousha Anwar, et al.
Egyptian Informatics Journal (2024) Vol. 28, pp. 100541-100541
Open Access
Saba Inam, Shamsa Kanwal, Anousha Anwar, et al.
Egyptian Informatics Journal (2024) Vol. 28, pp. 100541-100541
Open Access
Key image generation using piecewise linear chaotic maps and MD5 hashing
Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Ghisab
AIP conference proceedings (2024) Vol. 3232, pp. 020033-020033
Closed Access
Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Ghisab
AIP conference proceedings (2024) Vol. 3232, pp. 020033-020033
Closed Access
Vehicle detection and classification from images/videos using deep learning architectures: A survey
Mustafa Noaman Kadhim, Ammar Hussein Mutlag, Dalal Abdulmohsin Hammood
AIP conference proceedings (2024) Vol. 3232, pp. 020034-020034
Closed Access
Mustafa Noaman Kadhim, Ammar Hussein Mutlag, Dalal Abdulmohsin Hammood
AIP conference proceedings (2024) Vol. 3232, pp. 020034-020034
Closed Access
A Multilayer Nonlinear Permutation Framework and Its Demonstration in Lightweight Image Encryption
Cemile İnce, Kenan İNCE, Davut Hanbay
Entropy (2024) Vol. 26, Iss. 10, pp. 885-885
Open Access
Cemile İnce, Kenan İNCE, Davut Hanbay
Entropy (2024) Vol. 26, Iss. 10, pp. 885-885
Open Access
Optimizing video data security: A hybrid MAES-ECC encryption technique for efficient internet transmission
Sobia Shafiq, Sohaib Latif, Jamaludin Ibrahim, et al.
PLoS ONE (2024) Vol. 19, Iss. 11, pp. e0311765-e0311765
Open Access
Sobia Shafiq, Sohaib Latif, Jamaludin Ibrahim, et al.
PLoS ONE (2024) Vol. 19, Iss. 11, pp. e0311765-e0311765
Open Access
Exploring the Impact of Quantum Internet on Telemedicine Technology: Enhancing Healthcare Delivery, Speed, and Data Security
Awadh Ali Abdo Mohammed, Abdulrahman Mohammed Hussein Obaid, Ayman Alsabry, et al.
(2024), pp. 1-9
Closed Access
Awadh Ali Abdo Mohammed, Abdulrahman Mohammed Hussein Obaid, Ayman Alsabry, et al.
(2024), pp. 1-9
Closed Access
Enhancing security of medical images using code-based intermittent encryption and convolutional neural network
Prasanth Aruchamy, M Sundarrajan, Mani Deepak Choudhry, et al.
The Computer Journal (2024)
Closed Access
Prasanth Aruchamy, M Sundarrajan, Mani Deepak Choudhry, et al.
The Computer Journal (2024)
Closed Access
Survey on medical image encryption: From classical to deep learning-based approaches
Shiv Prasad, Amit Kumar Singh
Computers & Electrical Engineering (2024) Vol. 123, pp. 110011-110011
Closed Access
Shiv Prasad, Amit Kumar Singh
Computers & Electrical Engineering (2024) Vol. 123, pp. 110011-110011
Closed Access
The Impact/Role of Artificial Intelligence in Anesthesia: Remote Pre-Operative Assessment and Perioperative
Sayed Athar Hussain Kazmi
Asian Journal of Medicine and Health (2023) Vol. 21, Iss. 12, pp. 95-100
Open Access
Sayed Athar Hussain Kazmi
Asian Journal of Medicine and Health (2023) Vol. 21, Iss. 12, pp. 95-100
Open Access
Multimedia Encryption Over Wireless Communication Using Fuzzy Logic based Approach
G Devi Sree, Ch. Rupa, U Gayathri
(2023), pp. 1-5
Closed Access
G Devi Sree, Ch. Rupa, U Gayathri
(2023), pp. 1-5
Closed Access