
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A survey of image encryption algorithms based on chaotic system
Pengfei Fang, Han Liu, Chengmao Wu, et al.
The Visual Computer (2022) Vol. 39, Iss. 5, pp. 1975-2003
Closed Access | Times Cited: 52
Pengfei Fang, Han Liu, Chengmao Wu, et al.
The Visual Computer (2022) Vol. 39, Iss. 5, pp. 1975-2003
Closed Access | Times Cited: 52
Showing 26-50 of 52 citing articles:
Chaos Based Novel Video Encryption Scheme to Secure Video/Image Information from Any AI-Generated Attacks
Harshita Bajaj, Parnab Das, Santanu Mandal
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 50, Iss. 1, pp. 1-20
Open Access | Times Cited: 1
Harshita Bajaj, Parnab Das, Santanu Mandal
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 50, Iss. 1, pp. 1-20
Open Access | Times Cited: 1
Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion
Dong Jiang, Zhen Yuan, Wenxin Li, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 3
Dong Jiang, Zhen Yuan, Wenxin Li, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 3
A Novel Approach for Medical Image Security Using the Radon Transform and AES-CBC Algorithm
Muhammad Sulaman, Hafiz Gulfam umer, kasif Iqbal, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 3
Muhammad Sulaman, Hafiz Gulfam umer, kasif Iqbal, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 3
A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition
Mengyao Li, Xianwen Fang, Asimeng Ernest
Mathematics (2023) Vol. 11, Iss. 15, pp. 3274-3274
Open Access | Times Cited: 3
Mengyao Li, Xianwen Fang, Asimeng Ernest
Mathematics (2023) Vol. 11, Iss. 15, pp. 3274-3274
Open Access | Times Cited: 3
An Efficient Image Encryption Algorithm using Chaotic S-boxes of Pseudo-random Size
Mourad Kattass, Hicham Rrghout, Abdellatif Jarjar, et al.
(2023)
Closed Access | Times Cited: 3
Mourad Kattass, Hicham Rrghout, Abdellatif Jarjar, et al.
(2023)
Closed Access | Times Cited: 3
The Probabilistic Image Encryption Algorithm Based on Galois Field GF(257)
Yong Zhang, Ruiyou Li, Yuwen Shi, et al.
IETE Journal of Research (2023), pp. 1-14
Closed Access | Times Cited: 3
Yong Zhang, Ruiyou Li, Yuwen Shi, et al.
IETE Journal of Research (2023), pp. 1-14
Closed Access | Times Cited: 3
A unified image cryptography based on a perceptron-like network
Yong Zhang
The Visual Computer (2022) Vol. 39, Iss. 10, pp. 4985-5000
Closed Access | Times Cited: 4
Yong Zhang
The Visual Computer (2022) Vol. 39, Iss. 10, pp. 4985-5000
Closed Access | Times Cited: 4
A novel image encryption algorithm based on new one-dimensional chaos and DNA coding
Sijia Feng, Maochang Zhao, Zhaobin Liu, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 36, pp. 84275-84297
Closed Access
Sijia Feng, Maochang Zhao, Zhaobin Liu, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 36, pp. 84275-84297
Closed Access
A Novel Color Image Encryption using DNA Code and Dual Memristor Hyperchaotic System
Biniyam Ayele Belete, Demissie Jobir Gelmecha, Ram Sewak Singh, et al.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 1469-1477
Closed Access
Biniyam Ayele Belete, Demissie Jobir Gelmecha, Ram Sewak Singh, et al.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 1469-1477
Closed Access
Securing DICOM Images with a Novel Chaotic Encryption Scheme Utilizing Wavelet Transform and Biometric Fingerprint
Sareh Mortajez, Mohammad Jafar Dehghan, Amirabbas Azizi
Research Square (Research Square) (2024)
Open Access
Sareh Mortajez, Mohammad Jafar Dehghan, Amirabbas Azizi
Research Square (Research Square) (2024)
Open Access
Research on Chaos Image Encryption Algorithm Based on Scrambling Diffusion
Qingqing Li, Zhengzhu Wen
2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (2024), pp. 1036-1039
Closed Access
Qingqing Li, Zhengzhu Wen
2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (2024), pp. 1036-1039
Closed Access
Synchronization of Chaotic Hyperbolic PDE Systems for Image Encryption Using Backstepping Observer Design
Jeanne Redaud, Hideki Sano
2022 European Control Conference (ECC) (2024), pp. 376-381
Closed Access
Jeanne Redaud, Hideki Sano
2022 European Control Conference (ECC) (2024), pp. 376-381
Closed Access
An image partition security-sharing mechanism based on blockchain and chaotic encryption
Na Wang, Xiaochang C. Wang, Aodi Liu, et al.
PLoS ONE (2024) Vol. 19, Iss. 7, pp. e0307686-e0307686
Open Access
Na Wang, Xiaochang C. Wang, Aodi Liu, et al.
PLoS ONE (2024) Vol. 19, Iss. 7, pp. e0307686-e0307686
Open Access
Dynamically Choosing S-Boxes Using SHA-256
Mohamed Ahmed, Yousef Korayem, Mohamed Kamel Gabr, et al.
2022 International Telecommunications Conference (ITC-Egypt) (2024), pp. 349-355
Closed Access
Mohamed Ahmed, Yousef Korayem, Mohamed Kamel Gabr, et al.
2022 International Telecommunications Conference (ITC-Egypt) (2024), pp. 349-355
Closed Access
Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling
Kai Gao, Chin‐Chen Chang, Chia‐Chen Lin
IEEE Access (2024) Vol. 12, pp. 153274-153284
Open Access
Kai Gao, Chin‐Chen Chang, Chia‐Chen Lin
IEEE Access (2024) Vol. 12, pp. 153274-153284
Open Access
Towards the Transferable Reversible Adversarial Example via Distribution-Relevant Attack
Zhuo Tian, Xiaoyi Zhou, Xing Fan, et al.
Lecture notes in computer science (2024), pp. 292-305
Closed Access
Zhuo Tian, Xiaoyi Zhou, Xing Fan, et al.
Lecture notes in computer science (2024), pp. 292-305
Closed Access
TRAE: Reversible Adversarial Example with Traceability
Zhuo Tian, Xiaoyi Zhou, Xing Fan, et al.
Lecture notes in computer science (2024), pp. 367-379
Closed Access
Zhuo Tian, Xiaoyi Zhou, Xing Fan, et al.
Lecture notes in computer science (2024), pp. 367-379
Closed Access
Innovations in Image Encryption: Chaotic Systems Approach
Idriss Ben Hssain, Ahmed Bencherqui, Hassane Moustabchir, et al.
Lecture notes in networks and systems (2024), pp. 736-747
Closed Access
Idriss Ben Hssain, Ahmed Bencherqui, Hassane Moustabchir, et al.
Lecture notes in networks and systems (2024), pp. 736-747
Closed Access
SecMISS: Secured Medical Image Secret Sharing mechanism for smart health applications
Ajmal Mohammed, P. Samundiswary
The Visual Computer (2023) Vol. 40, Iss. 6, pp. 4251-4271
Closed Access | Times Cited: 1
Ajmal Mohammed, P. Samundiswary
The Visual Computer (2023) Vol. 40, Iss. 6, pp. 4251-4271
Closed Access | Times Cited: 1
A Novel Hyper Chaotic-Cellular Automata Based Medical Image Encryption Technique
Walid El‐Shafai, Ahmed Naguib, Mona Shokair
(2023), pp. 1-8
Closed Access | Times Cited: 1
Walid El‐Shafai, Ahmed Naguib, Mona Shokair
(2023), pp. 1-8
Closed Access | Times Cited: 1
A novel and Fast hybrid design of cryptosystems for Image via 5-D chaos based random keys and DNA
M. Sankari, Murugesan Vanathi
Multimedia Tools and Applications (2023) Vol. 83, Iss. 20, pp. 58495-58514
Closed Access | Times Cited: 1
M. Sankari, Murugesan Vanathi
Multimedia Tools and Applications (2023) Vol. 83, Iss. 20, pp. 58495-58514
Closed Access | Times Cited: 1
Parallel Image Encryption Algorithm Using Partitioned Cellular Automata on Graphic Processor Unit
Mahmood Fazlali, Amirhossein Alihoseini, Ebrahim Zarei, et al.
(2023), pp. 1-6
Open Access
Mahmood Fazlali, Amirhossein Alihoseini, Ebrahim Zarei, et al.
(2023), pp. 1-6
Open Access
Improved Login Interface Algorithm for Financial Transactions Using Visual Cryptographic Authentication
N. Sugirtham, R. Sherine Jenny, R. Sudhakar, et al.
Springer eBooks (2023), pp. 29-52
Closed Access
N. Sugirtham, R. Sherine Jenny, R. Sudhakar, et al.
Springer eBooks (2023), pp. 29-52
Closed Access
Remote sensing image encryption algorithm using chaos and differential coding
Quanyv Wang, Wei Zhou, Xiaohu Zhao
(2023), pp. 1-6
Closed Access
Quanyv Wang, Wei Zhou, Xiaohu Zhao
(2023), pp. 1-6
Closed Access
Image Encryption and Hiding Algorithm Based on Hyper Chaotic System and Compressed Sensing
Zhi-Qiang Liu, Han Liu
(2023), pp. 1-6
Closed Access
Zhi-Qiang Liu, Han Liu
(2023), pp. 1-6
Closed Access