
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective
Hemalatha Mahalingam, V. Thanikaiselvan, Anirudh Rajiv Menon, et al.
Mathematics (2023) Vol. 11, Iss. 2, pp. 457-457
Open Access | Times Cited: 40
Hemalatha Mahalingam, V. Thanikaiselvan, Anirudh Rajiv Menon, et al.
Mathematics (2023) Vol. 11, Iss. 2, pp. 457-457
Open Access | Times Cited: 40
Showing 1-25 of 40 citing articles:
Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments
Hemalatha Mahalingam, Padmapriya Velupillai Meikandan, K. Thenmozhi, et al.
Mathematics (2023) Vol. 11, Iss. 8, pp. 1769-1769
Open Access | Times Cited: 43
Hemalatha Mahalingam, Padmapriya Velupillai Meikandan, K. Thenmozhi, et al.
Mathematics (2023) Vol. 11, Iss. 8, pp. 1769-1769
Open Access | Times Cited: 43
A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
Sanjay Kumar, Deepmala Sharma
Artificial Intelligence Review (2024) Vol. 57, Iss. 4
Open Access | Times Cited: 30
Sanjay Kumar, Deepmala Sharma
Artificial Intelligence Review (2024) Vol. 57, Iss. 4
Open Access | Times Cited: 30
Secured IIoT against trust deficit - A flexi cryptic approach
V. M. Padmapriya, K. Thenmozhi, M. Hemalatha, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 20
V. M. Padmapriya, K. Thenmozhi, M. Hemalatha, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 20
DNA-chaos governed cryptosystem for cloud-based medical image repository
Nithya Chidambaram, K. Thenmozhi, Pethuru Raj, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 4127-4144
Closed Access | Times Cited: 12
Nithya Chidambaram, K. Thenmozhi, Pethuru Raj, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 4127-4144
Closed Access | Times Cited: 12
Secured Quantum Image Communication Using New Two Dimensional Chaotic Map Based Encryption Methods
Sakshi Patel, V. Thanikaiselvan, Rengarajan Amirtharajan
International Journal of Theoretical Physics (2024) Vol. 63, Iss. 2
Closed Access | Times Cited: 8
Sakshi Patel, V. Thanikaiselvan, Rengarajan Amirtharajan
International Journal of Theoretical Physics (2024) Vol. 63, Iss. 2
Closed Access | Times Cited: 8
Image scrambling encryption using chaotic map and genetic algorithm: a hybrid approach for enhanced security
Sanjay Kumar, Deepmala Sharma
Nonlinear Dynamics (2024) Vol. 112, Iss. 14, pp. 12537-12564
Closed Access | Times Cited: 8
Sanjay Kumar, Deepmala Sharma
Nonlinear Dynamics (2024) Vol. 112, Iss. 14, pp. 12537-12564
Closed Access | Times Cited: 8
Let wavelet authenticate and tent-map encrypt: a sacred connect against a secret nexus
V. Manikandan, Vinoth Raj, Siva Janakiraman, et al.
Soft Computing (2024) Vol. 28, Iss. 9-10, pp. 6839-6853
Closed Access | Times Cited: 5
V. Manikandan, Vinoth Raj, Siva Janakiraman, et al.
Soft Computing (2024) Vol. 28, Iss. 9-10, pp. 6839-6853
Closed Access | Times Cited: 5
Remote sensing image encryption algorithm utilizing 2D Logistic memristive hyperchaotic map and SHA-512
Qiang Lai, Yuan Liu, Liang Yang
Science China Technological Sciences (2024) Vol. 67, Iss. 5, pp. 1553-1566
Closed Access | Times Cited: 5
Qiang Lai, Yuan Liu, Liang Yang
Science China Technological Sciences (2024) Vol. 67, Iss. 5, pp. 1553-1566
Closed Access | Times Cited: 5
Hybrid image encryption: leveraging DNA sequencing and Lorenz chaotic dynamics for enhanced security
Kadda Benyahia, Abdelkader Khobzaoui, Samir Benbakreti
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Kadda Benyahia, Abdelkader Khobzaoui, Samir Benbakreti
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
A hidden multiwing memristive neural network and its application in remote sensing data security
Sirui Ding, Hairong Lin, Xiaoheng Deng, et al.
Expert Systems with Applications (2025), pp. 127168-127168
Closed Access
Sirui Ding, Hairong Lin, Xiaoheng Deng, et al.
Expert Systems with Applications (2025), pp. 127168-127168
Closed Access
An Efficient Image Encryption Algorithm Based on Innovative DES Structure and Hyperchaotic Keys
Shih-Yu Li, Yanwen Gai, Kai-Chung Shih, et al.
IEEE Transactions on Circuits and Systems I Regular Papers (2023) Vol. 70, Iss. 10, pp. 4103-4111
Closed Access | Times Cited: 15
Shih-Yu Li, Yanwen Gai, Kai-Chung Shih, et al.
IEEE Transactions on Circuits and Systems I Regular Papers (2023) Vol. 70, Iss. 10, pp. 4103-4111
Closed Access | Times Cited: 15
Healthcare with datacare—a triangular DNA security
S. Aashiq Banu, Adel Ismail Al‐Alawi, M. Padmaa, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 7, pp. 21153-21170
Closed Access | Times Cited: 15
S. Aashiq Banu, Adel Ismail Al‐Alawi, M. Padmaa, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 7, pp. 21153-21170
Closed Access | Times Cited: 15
Efficient and secure chaotic PRNG for color image encryption
Mohammed M. Al-Mhadawi, Ekhlas Abbas Albahrani, Sadeq H. Lafta
Microprocessors and Microsystems (2023) Vol. 101, pp. 104911-104911
Closed Access | Times Cited: 14
Mohammed M. Al-Mhadawi, Ekhlas Abbas Albahrani, Sadeq H. Lafta
Microprocessors and Microsystems (2023) Vol. 101, pp. 104911-104911
Closed Access | Times Cited: 14
A forensic framework to improve digital image evidence administration in IIoT✰
Deepti Rani, Nasib Singh Gill, Preeti Gulia
Journal of Industrial Information Integration (2024) Vol. 38, pp. 100568-100568
Closed Access | Times Cited: 4
Deepti Rani, Nasib Singh Gill, Preeti Gulia
Journal of Industrial Information Integration (2024) Vol. 38, pp. 100568-100568
Closed Access | Times Cited: 4
Optimized and secure digital image watermarking technique using Henon mapping in redundant domain
Chandan Kumar
Multimedia Tools and Applications (2024) Vol. 83, Iss. 34, pp. 81151-81166
Closed Access | Times Cited: 4
Chandan Kumar
Multimedia Tools and Applications (2024) Vol. 83, Iss. 34, pp. 81151-81166
Closed Access | Times Cited: 4
Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm
Muhammad Hussain, Nadeem Iqbal, Zia Bashir
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5355-5376
Closed Access | Times Cited: 3
Muhammad Hussain, Nadeem Iqbal, Zia Bashir
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5355-5376
Closed Access | Times Cited: 3
A novel image encryption scheme based on ccnn
Xiangzi Zhang, Lina Sun, Xicong Geng, et al.
Physica Scripta (2024) Vol. 99, Iss. 2, pp. 025253-025253
Open Access | Times Cited: 2
Xiangzi Zhang, Lina Sun, Xicong Geng, et al.
Physica Scripta (2024) Vol. 99, Iss. 2, pp. 025253-025253
Open Access | Times Cited: 2
Optimized quantum computing technique to encrypt medical images
Monireh Houshmand, Mahsa Khorrampanah, Ali Hamid Muosa Alkhudhari
Optical and Quantum Electronics (2024) Vol. 56, Iss. 3
Closed Access | Times Cited: 2
Monireh Houshmand, Mahsa Khorrampanah, Ali Hamid Muosa Alkhudhari
Optical and Quantum Electronics (2024) Vol. 56, Iss. 3
Closed Access | Times Cited: 2
Novel dual-image encryption scheme based on memristive cellular neural network and K-means alogrithm
Yi Zhao, Mingwen Zheng, Yanping Zhang, et al.
Nonlinear Dynamics (2024) Vol. 112, Iss. 21, pp. 19515-19539
Closed Access | Times Cited: 2
Yi Zhao, Mingwen Zheng, Yanping Zhang, et al.
Nonlinear Dynamics (2024) Vol. 112, Iss. 21, pp. 19515-19539
Closed Access | Times Cited: 2
A Review of Genome to Chaos: Exploring DNA Dynamics in Security
S. Aashiq Banu, L. Koteswara Rao, P. Shanmuga Priya, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
S. Aashiq Banu, L. Koteswara Rao, P. Shanmuga Priya, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
A multiple-image encryption algorithm based on orthogonal arrays with strength 3
Ming Xu
Optics & Laser Technology (2023) Vol. 167, pp. 109746-109746
Closed Access | Times Cited: 4
Ming Xu
Optics & Laser Technology (2023) Vol. 167, pp. 109746-109746
Closed Access | Times Cited: 4
Two-dimensional-lag complex logistic map with complex parameters and its encryption application
Fangfang 芳芳 Zhang 张, Jinbo 金波 Wu 武, Lei 磊 Kou 寇, et al.
Chinese Physics B (2024) Vol. 33, Iss. 5, pp. 050505-050505
Open Access | Times Cited: 1
Fangfang 芳芳 Zhang 张, Jinbo 金波 Wu 武, Lei 磊 Kou 寇, et al.
Chinese Physics B (2024) Vol. 33, Iss. 5, pp. 050505-050505
Open Access | Times Cited: 1
Graph Crypto-Stego System for Securing Graph Data Using Association Schemes
Anuradha Sabharwal, Pooja Yadav, Kamal Kumar
Journal of Applied Mathematics (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
Anuradha Sabharwal, Pooja Yadav, Kamal Kumar
Journal of Applied Mathematics (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
Development of scalable coding of encrypted images using Modified Absolute Moment Block Truncation Code
Jeya Bright Pankiraj, Vishnuvarthanan Govindaraj, Yudong Zhang, et al.
Signal Image and Video Processing (2024) Vol. 18, Iss. 5, pp. 3973-3981
Closed Access | Times Cited: 1
Jeya Bright Pankiraj, Vishnuvarthanan Govindaraj, Yudong Zhang, et al.
Signal Image and Video Processing (2024) Vol. 18, Iss. 5, pp. 3973-3981
Closed Access | Times Cited: 1
An authenticated spectrum acquirement and transmission of encrypted images over fusion centre
V. Thanikaiselvan, Y PiyaDessi, Renuga Devi S, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
V. Thanikaiselvan, Y PiyaDessi, Renuga Devi S, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1