
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Secure Reversible Data Hiding Using Block-Wise Histogram Shifting
Samar Kamil Khudhair, Monalisa Sahu, K. R. Raghunandan, et al.
Electronics (2023) Vol. 12, Iss. 5, pp. 1222-1222
Open Access | Times Cited: 43
Samar Kamil Khudhair, Monalisa Sahu, K. R. Raghunandan, et al.
Electronics (2023) Vol. 12, Iss. 5, pp. 1222-1222
Open Access | Times Cited: 43
Showing 1-25 of 43 citing articles:
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier
J. Hemalatha, M. Sekar, Chandan Kumar, et al.
Journal of Information Security and Applications (2023) Vol. 76, pp. 103541-103541
Closed Access | Times Cited: 33
J. Hemalatha, M. Sekar, Chandan Kumar, et al.
Journal of Information Security and Applications (2023) Vol. 76, pp. 103541-103541
Closed Access | Times Cited: 33
Digital image watermarking using discrete cosine transformation based linear modulation
Waleed Alomoush, Osama A. Khashan, Ayat Alrosan, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 24
Waleed Alomoush, Osama A. Khashan, Ayat Alrosan, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 24
CUSE: Copyright protection of UNESCO heritage images for safe cities environment
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava
Multimedia Tools and Applications (2025)
Closed Access | Times Cited: 1
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava
Multimedia Tools and Applications (2025)
Closed Access | Times Cited: 1
Hybrid Encrypted Watermarking Algorithm for Medical Images Based on DCT and Improved DarkNet53
Dekai Li, Jingbing Li, Uzair Aslam Bhatti, et al.
Electronics (2023) Vol. 12, Iss. 7, pp. 1554-1554
Open Access | Times Cited: 13
Dekai Li, Jingbing Li, Uzair Aslam Bhatti, et al.
Electronics (2023) Vol. 12, Iss. 7, pp. 1554-1554
Open Access | Times Cited: 13
PELMI: Realize robust DNA image storage under general errors via parity encoding and local mean iteration
Ben Cao, Kun Wang, Lei Xie, et al.
Briefings in Bioinformatics (2024) Vol. 25, Iss. 5
Open Access | Times Cited: 4
Ben Cao, Kun Wang, Lei Xie, et al.
Briefings in Bioinformatics (2024) Vol. 25, Iss. 5
Open Access | Times Cited: 4
Machine Learning Meets Encrypted Search: The Impact and Efficiency of OMKSA in Data Security
Zhongkai Wei, Ye Su, Xi Zhang, et al.
International Journal of Intelligent Systems (2025) Vol. 2025, Iss. 1
Open Access
Zhongkai Wei, Ye Su, Xi Zhang, et al.
International Journal of Intelligent Systems (2025) Vol. 2025, Iss. 1
Open Access
Rad-Mark: Reliable adversarial zero-watermarking
Kun Hu, D Zhai, Heng Gao, et al.
Neurocomputing (2025), pp. 129970-129970
Closed Access
Kun Hu, D Zhai, Heng Gao, et al.
Neurocomputing (2025), pp. 129970-129970
Closed Access
Arnold’s cat map secure multiple-layer reversible watermarking
Aulia Arham, Novia Lestari
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1536-1536
Open Access | Times Cited: 4
Aulia Arham, Novia Lestari
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1536-1536
Open Access | Times Cited: 4
Storing Images in DNA via base128 Encoding
Kun Wang, Ben Cao, Tao Ma, et al.
Journal of Chemical Information and Modeling (2024) Vol. 64, Iss. 5, pp. 1719-1729
Closed Access | Times Cited: 4
Kun Wang, Ben Cao, Tao Ma, et al.
Journal of Chemical Information and Modeling (2024) Vol. 64, Iss. 5, pp. 1719-1729
Closed Access | Times Cited: 4
A reversible-zero watermarking scheme for medical images
Rizwan Taj, Tao Feng, Saima Kanwal, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4
Rizwan Taj, Tao Feng, Saima Kanwal, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4
Secure medical image watermarking based on reversible data hiding with Arnold's cat map
Aulia Arham, Novia Lestari
International Journal of Advances in Intelligent Informatics (2023) Vol. 9, Iss. 3, pp. 445-445
Open Access | Times Cited: 8
Aulia Arham, Novia Lestari
International Journal of Advances in Intelligent Informatics (2023) Vol. 9, Iss. 3, pp. 445-445
Open Access | Times Cited: 8
A secure video data streaming model using modified firefly and SVD technique
K. Muthulakshmi, K. Valarmathi
Multimedia Systems (2024) Vol. 30, Iss. 2
Closed Access | Times Cited: 2
K. Muthulakshmi, K. Valarmathi
Multimedia Systems (2024) Vol. 30, Iss. 2
Closed Access | Times Cited: 2
Dynamic 8-bit XOR algorithm with AES crypto algorithm for image steganography
Divya Madhu, S. Vasuhi, A. Samydurai
Signal Image and Video Processing (2024) Vol. 18, Iss. S1, pp. 429-445
Open Access | Times Cited: 2
Divya Madhu, S. Vasuhi, A. Samydurai
Signal Image and Video Processing (2024) Vol. 18, Iss. S1, pp. 429-445
Open Access | Times Cited: 2
Secure and Imperceptible Frequency-Based Watermarking for Medical Images
Saadaoui Naima, Akram Zine Eddine Boukhamla, Narima Zermi, et al.
Circuits Systems and Signal Processing (2024)
Closed Access | Times Cited: 2
Saadaoui Naima, Akram Zine Eddine Boukhamla, Narima Zermi, et al.
Circuits Systems and Signal Processing (2024)
Closed Access | Times Cited: 2
Enhanced Steganography for High Dynamic Range Images with Improved Security and Capacity
Tzung‐Her Chen, Jing-Ya Yan
Applied Sciences (2023) Vol. 13, Iss. 15, pp. 8865-8865
Open Access | Times Cited: 6
Tzung‐Her Chen, Jing-Ya Yan
Applied Sciences (2023) Vol. 13, Iss. 15, pp. 8865-8865
Open Access | Times Cited: 6
A novel image compression method using wavelet coefficients and Huffman coding
Shiju Thomas, Addepalli V. N. Krishna, Sabeen Govind, et al.
Journal of Engineering Research (2023)
Open Access | Times Cited: 6
Shiju Thomas, Addepalli V. N. Krishna, Sabeen Govind, et al.
Journal of Engineering Research (2023)
Open Access | Times Cited: 6
An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images
B. Madhushree, Halaguru Basavarajappa Basanth Kumar, H. R. Chennamma
Multimedia Tools and Applications (2023) Vol. 83, Iss. 13, pp. 39779-39821
Closed Access | Times Cited: 6
B. Madhushree, Halaguru Basavarajappa Basanth Kumar, H. R. Chennamma
Multimedia Tools and Applications (2023) Vol. 83, Iss. 13, pp. 39779-39821
Closed Access | Times Cited: 6
Innovative image interpolation based reversible data hiding for secure communication
Riya Punia, Arun Malik, Samayveer Singh
Discover Internet of Things (2023) Vol. 3, Iss. 1
Open Access | Times Cited: 5
Riya Punia, Arun Malik, Samayveer Singh
Discover Internet of Things (2023) Vol. 3, Iss. 1
Open Access | Times Cited: 5
DNA Steganography: Embedding the Secret Messages Using Glass Stack Method and Detecting Errors Made by Different Attacks
Mahbubun Nahar, A. H. M. Kamal
International Journal of Computers and Applications (2024) Vol. 46, Iss. 7, pp. 508-525
Closed Access | Times Cited: 1
Mahbubun Nahar, A. H. M. Kamal
International Journal of Computers and Applications (2024) Vol. 46, Iss. 7, pp. 508-525
Closed Access | Times Cited: 1
Reversible data hiding in encrypted images with block-based bit-plane reallocation
Li Liu, Chaofan Chen, Yingchun Wu, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 37, pp. 84911-84932
Closed Access | Times Cited: 1
Li Liu, Chaofan Chen, Yingchun Wu, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 37, pp. 84911-84932
Closed Access | Times Cited: 1
SIHNet: A safe image hiding method with less information leaking
Zien Cheng, Xin Jin, Qian Jiang, et al.
IET Image Processing (2024) Vol. 18, Iss. 10, pp. 2800-2815
Open Access | Times Cited: 1
Zien Cheng, Xin Jin, Qian Jiang, et al.
IET Image Processing (2024) Vol. 18, Iss. 10, pp. 2800-2815
Open Access | Times Cited: 1
Separable Reversible Data Hiding for Encrypted 3D Meshes Based on Self-Organized Blocking and Most Significant Bit Prediction
Liansheng Sui, Pengfei Zhang, Zhaolin Xiao, et al.
Symmetry (2024) Vol. 16, Iss. 8, pp. 1059-1059
Open Access | Times Cited: 1
Liansheng Sui, Pengfei Zhang, Zhaolin Xiao, et al.
Symmetry (2024) Vol. 16, Iss. 8, pp. 1059-1059
Open Access | Times Cited: 1
CT image authentication for telemedicine applications using self-embedding pixel-wise technique with chaotic coordinate mapping and lfsr
Ritu Gothwal, Shivendra Shivani, Shailendra Tiwari
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Ritu Gothwal, Shivendra Shivani, Shailendra Tiwari
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation
Dima Kasasbeh, Mohammed Anbar
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 6, pp. 102112-102112
Open Access | Times Cited: 1
Dima Kasasbeh, Mohammed Anbar
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 6, pp. 102112-102112
Open Access | Times Cited: 1
A robust approach to satellite image encryption using chaotic map and circulant matrices
Shamsa Kanwal, Saba Inam, Asghar Ali Shah, et al.
Engineering Reports (2024)
Open Access | Times Cited: 1
Shamsa Kanwal, Saba Inam, Asghar Ali Shah, et al.
Engineering Reports (2024)
Open Access | Times Cited: 1