OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A survey of image encryption algorithms based on chaotic system
Pengfei Fang, Han Liu, Chengmao Wu, et al.
The Visual Computer (2022) Vol. 39, Iss. 5, pp. 1975-2003
Closed Access | Times Cited: 52

Showing 26-50 of 52 citing articles:

Chaos Based Novel Video Encryption Scheme to Secure Video/Image Information from Any AI-Generated Attacks
Harshita Bajaj, Parnab Das, Santanu Mandal
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 50, Iss. 1, pp. 1-20
Open Access | Times Cited: 1

Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion
Dong Jiang, Zhen Yuan, Wenxin Li, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 3

A Novel Approach for Medical Image Security Using the Radon Transform and AES-CBC Algorithm
Muhammad Sulaman, Hafiz Gulfam umer, kasif Iqbal, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 3

A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition
Mengyao Li, Xianwen Fang, Asimeng Ernest
Mathematics (2023) Vol. 11, Iss. 15, pp. 3274-3274
Open Access | Times Cited: 3

An Efficient Image Encryption Algorithm using Chaotic S-boxes of Pseudo-random Size
Mourad Kattass, Hicham Rrghout, Abdellatif Jarjar, et al.
(2023)
Closed Access | Times Cited: 3

The Probabilistic Image Encryption Algorithm Based on Galois Field GF(257)
Yong Zhang, Ruiyou Li, Yuwen Shi, et al.
IETE Journal of Research (2023), pp. 1-14
Closed Access | Times Cited: 3

A unified image cryptography based on a perceptron-like network
Yong Zhang
The Visual Computer (2022) Vol. 39, Iss. 10, pp. 4985-5000
Closed Access | Times Cited: 4

A novel image encryption algorithm based on new one-dimensional chaos and DNA coding
Sijia Feng, Maochang Zhao, Zhaobin Liu, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 36, pp. 84275-84297
Closed Access

A Novel Color Image Encryption using DNA Code and Dual Memristor Hyperchaotic System
Biniyam Ayele Belete, Demissie Jobir Gelmecha, Ram Sewak Singh, et al.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (2024), pp. 1469-1477
Closed Access

Securing DICOM Images with a Novel Chaotic Encryption Scheme Utilizing Wavelet Transform and Biometric Fingerprint
Sareh Mortajez, Mohammad Jafar Dehghan, Amirabbas Azizi
Research Square (Research Square) (2024)
Open Access

Research on Chaos Image Encryption Algorithm Based on Scrambling Diffusion
Qingqing Li, Zhengzhu Wen
2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (2024), pp. 1036-1039
Closed Access

Synchronization of Chaotic Hyperbolic PDE Systems for Image Encryption Using Backstepping Observer Design
Jeanne Redaud, Hideki Sano
2022 European Control Conference (ECC) (2024), pp. 376-381
Closed Access

An image partition security-sharing mechanism based on blockchain and chaotic encryption
Na Wang, Xiaochang C. Wang, Aodi Liu, et al.
PLoS ONE (2024) Vol. 19, Iss. 7, pp. e0307686-e0307686
Open Access

Dynamically Choosing S-Boxes Using SHA-256
Mohamed Ahmed, Yousef Korayem, Mohamed Kamel Gabr, et al.
2022 International Telecommunications Conference (ITC-Egypt) (2024), pp. 349-355
Closed Access

Key-Free Image Encryption Algorithm Based on Self-Triggered Gaussian Noise Sampling
Kai Gao, Chin‐Chen Chang, Chia‐Chen Lin
IEEE Access (2024) Vol. 12, pp. 153274-153284
Open Access

Towards the Transferable Reversible Adversarial Example via Distribution-Relevant Attack
Zhuo Tian, Xiaoyi Zhou, Xing Fan, et al.
Lecture notes in computer science (2024), pp. 292-305
Closed Access

TRAE: Reversible Adversarial Example with Traceability
Zhuo Tian, Xiaoyi Zhou, Xing Fan, et al.
Lecture notes in computer science (2024), pp. 367-379
Closed Access

Innovations in Image Encryption: Chaotic Systems Approach
Idriss Ben Hssain, Ahmed Bencherqui, Hassane Moustabchir, et al.
Lecture notes in networks and systems (2024), pp. 736-747
Closed Access

SecMISS: Secured Medical Image Secret Sharing mechanism for smart health applications
Ajmal Mohammed, P. Samundiswary
The Visual Computer (2023) Vol. 40, Iss. 6, pp. 4251-4271
Closed Access | Times Cited: 1

A Novel Hyper Chaotic-Cellular Automata Based Medical Image Encryption Technique
Walid El‐Shafai, Ahmed Naguib, Mona Shokair
(2023), pp. 1-8
Closed Access | Times Cited: 1

A novel and Fast hybrid design of cryptosystems for Image via 5-D chaos based random keys and DNA
M. Sankari, Murugesan Vanathi
Multimedia Tools and Applications (2023) Vol. 83, Iss. 20, pp. 58495-58514
Closed Access | Times Cited: 1

Parallel Image Encryption Algorithm Using Partitioned Cellular Automata on Graphic Processor Unit
Mahmood Fazlali, Amirhossein Alihoseini, Ebrahim Zarei, et al.
(2023), pp. 1-6
Open Access

Improved Login Interface Algorithm for Financial Transactions Using Visual Cryptographic Authentication
N. Sugirtham, R. Sherine Jenny, R. Sudhakar, et al.
Springer eBooks (2023), pp. 29-52
Closed Access

Remote sensing image encryption algorithm using chaos and differential coding
Quanyv Wang, Wei Zhou, Xiaohu Zhao
(2023), pp. 1-6
Closed Access

Scroll to top