
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
Qinmao Jiang, Simin Yu, Qianxue Wang
Entropy (2023) Vol. 25, Iss. 3, pp. 395-395
Open Access | Times Cited: 13
Qinmao Jiang, Simin Yu, Qianxue Wang
Entropy (2023) Vol. 25, Iss. 3, pp. 395-395
Open Access | Times Cited: 13
Showing 13 citing articles:
Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos
Heping Wen, Yiting Lin, Lincheng Yang, et al.
Expert Systems with Applications (2024) Vol. 250, pp. 123748-123748
Closed Access | Times Cited: 24
Heping Wen, Yiting Lin, Lincheng Yang, et al.
Expert Systems with Applications (2024) Vol. 250, pp. 123748-123748
Closed Access | Times Cited: 24
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Muhammad Aqeel, Arfan Jaffar, Muhammad Faheem, et al.
Engineering Reports (2025) Vol. 7, Iss. 1
Open Access
Muhammad Aqeel, Arfan Jaffar, Muhammad Faheem, et al.
Engineering Reports (2025) Vol. 7, Iss. 1
Open Access
Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images
Abeer Al-Hyari, Mua’ad Abu-Faraj, Charlie Obimbo, et al.
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 8-8
Open Access
Abeer Al-Hyari, Mua’ad Abu-Faraj, Charlie Obimbo, et al.
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 8-8
Open Access
Cryptanalysis of substitution-permutation network based image encryption schemes: a systematic review
Sakshi Dhall, Khushboo Yadav
Nonlinear Dynamics (2024) Vol. 112, Iss. 17, pp. 14719-14744
Closed Access | Times Cited: 2
Sakshi Dhall, Khushboo Yadav
Nonlinear Dynamics (2024) Vol. 112, Iss. 17, pp. 14719-14744
Closed Access | Times Cited: 2
Innovative Transformation of S-Box Through Chaotic Map Using a Pragmatic Approach
Awais Salman Qazi, Amjad Hussain Zahid, Abdullah Baz, et al.
IEEE Access (2024) Vol. 12, pp. 42725-42736
Open Access | Times Cited: 1
Awais Salman Qazi, Amjad Hussain Zahid, Abdullah Baz, et al.
IEEE Access (2024) Vol. 12, pp. 42725-42736
Open Access | Times Cited: 1
Dynamic analysis of a novel hyperchaotic system based on STM32 and application in image encryption
Xue‐Feng Cheng, Hongmei Zhu, Lian Liu, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Xue‐Feng Cheng, Hongmei Zhu, Lian Liu, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Integration of a novel 3D chaotic map with ELSS and novel cross-border pixel exchange strategy for secure image communication
Sajid Khan, Hao Peng, Zhaoquan Gu, et al.
Complex & Intelligent Systems (2024)
Open Access | Times Cited: 1
Sajid Khan, Hao Peng, Zhaoquan Gu, et al.
Complex & Intelligent Systems (2024)
Open Access | Times Cited: 1
Agricultural Unmanned Aerial Vehicle image transmission protection scheme based on hybrid hyperchaos and Bonouille-DCT compressed sensing
Lingzhi Zhou, Xia Han, Qingfa Lin, et al.
Research Square (Research Square) (2024)
Open Access
Lingzhi Zhou, Xia Han, Qingfa Lin, et al.
Research Square (Research Square) (2024)
Open Access
An image encryption approach combining cross-interaction region scrambling and plainimage-related diffusion using a dynamic external key
Faisal S. Alsubaei, Mohamed Meselhy Eltoukhy, Alaa A. Ahmed, et al.
Alexandria Engineering Journal (2024) Vol. 114, pp. 198-230
Open Access
Faisal S. Alsubaei, Mohamed Meselhy Eltoukhy, Alaa A. Ahmed, et al.
Alexandria Engineering Journal (2024) Vol. 114, pp. 198-230
Open Access
Cryptanalysis of an image encryption algorithm based on cellular automata and chaotic skew tent map
Chunlan Deng, Qianxue Wang, Simin Yu, et al.
Multimedia Tools and Applications (2024)
Closed Access
Chunlan Deng, Qianxue Wang, Simin Yu, et al.
Multimedia Tools and Applications (2024)
Closed Access
Image Encryption Hiding Algorithm Based on Digital Time-Varying Delay Chaos Model and Compression Sensing Technique
Bingxue Jin, Liuqin Fan, Bowen Zhang, et al.
iScience (2024) Vol. 27, Iss. 9, pp. 110717-110717
Open Access
Bingxue Jin, Liuqin Fan, Bowen Zhang, et al.
iScience (2024) Vol. 27, Iss. 9, pp. 110717-110717
Open Access
Two-dimensional hyperchaos-based encryption and compression algorithm for agricultural UAV-captured planar images
Lingzhi Zhou, Xia Han, Qingfa Lin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Lingzhi Zhou, Xia Han, Qingfa Lin, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Image Encryption Hiding Algorithm Based on Digital Time-Varying Delay Chaos Model and Compression Sensing Technique
Bingxue Jin, Liuqin Fan, Rongqing Lei, et al.
(2023)
Closed Access | Times Cited: 1
Bingxue Jin, Liuqin Fan, Rongqing Lei, et al.
(2023)
Closed Access | Times Cited: 1