
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An efficient image encryption scheme for healthcare applications
Parsa Sarosh, Shabir A. Parah, G. Mohiuddin Bhat
Multimedia Tools and Applications (2022) Vol. 81, Iss. 5, pp. 7253-7270
Open Access | Times Cited: 51
Parsa Sarosh, Shabir A. Parah, G. Mohiuddin Bhat
Multimedia Tools and Applications (2022) Vol. 81, Iss. 5, pp. 7253-7270
Open Access | Times Cited: 51
Showing 26-50 of 51 citing articles:
An Adaptive Lightweight Hybrid Encryption Scheme for Securing the Healthcare Data in Cloud-Assisted Internet of Things
Bakkaiahgari Padma Vijetha Dev, K. Venkata Prasad
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2959-2980
Closed Access | Times Cited: 6
Bakkaiahgari Padma Vijetha Dev, K. Venkata Prasad
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2959-2980
Closed Access | Times Cited: 6
Hardware implementation of a robust image cryptosystem using reversible cellular-automata rules and 3-D chaotic systems
Nessrine Abbassi, Mohamed Gafsi, Rim Amdouni, et al.
Integration (2022) Vol. 87, pp. 49-66
Closed Access | Times Cited: 9
Nessrine Abbassi, Mohamed Gafsi, Rim Amdouni, et al.
Integration (2022) Vol. 87, pp. 49-66
Closed Access | Times Cited: 9
Novel Dominant Color Subband Image Encryption in Visual Sensor Network for Smart Military Surveillance System
R. Nithya, D. Dhanasekaran
Traitement du signal (2022) Vol. 39, Iss. 3, pp. 951-960
Open Access | Times Cited: 9
R. Nithya, D. Dhanasekaran
Traitement du signal (2022) Vol. 39, Iss. 3, pp. 951-960
Open Access | Times Cited: 9
A comparative review and analysis of medical image encryption and compression techniques
D. Jeni Jeba Seeli, K. K. Thanammal
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
D. Jeni Jeba Seeli, K. K. Thanammal
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
HAWKFOG-an enhanced deep learning framework for the Fog-IoT environment
R Abirami, E Poovammal
Frontiers in Artificial Intelligence (2024) Vol. 7
Open Access | Times Cited: 1
R Abirami, E Poovammal
Frontiers in Artificial Intelligence (2024) Vol. 7
Open Access | Times Cited: 1
CLEA-256-based text and image encryption algorithm for security in IOD networks
Snehal Samanth, K. V. Prema, Mamatha Balachandra
Cogent Engineering (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 3
Snehal Samanth, K. V. Prema, Mamatha Balachandra
Cogent Engineering (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 3
Medical Image Encryption and Decryption Based on DNA: A Survey
Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab, et al.
Journal of Techniques (2023) Vol. 5, Iss. 3, pp. 116-128
Open Access | Times Cited: 3
Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab, et al.
Journal of Techniques (2023) Vol. 5, Iss. 3, pp. 116-128
Open Access | Times Cited: 3
Enhancing Security of Medical Image Data in the Cloud Using Machine Learning Technique
Chandra Shekhar Tiwari, Vijay Kumar Jha
International Journal of Image Graphics and Signal Processing (2022) Vol. 14, Iss. 4, pp. 13-31
Open Access | Times Cited: 5
Chandra Shekhar Tiwari, Vijay Kumar Jha
International Journal of Image Graphics and Signal Processing (2022) Vol. 14, Iss. 4, pp. 13-31
Open Access | Times Cited: 5
A new highly fractal 1D- chaotic map-based novel encryption on HVS-based watermarked Fundus images for 2-level security in teleophthalmology applications
M Amrutha, A. Kannammal
Physica Scripta (2023) Vol. 98, Iss. 12, pp. 125118-125118
Closed Access | Times Cited: 2
M Amrutha, A. Kannammal
Physica Scripta (2023) Vol. 98, Iss. 12, pp. 125118-125118
Closed Access | Times Cited: 2
Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment
C. S. S. Anupama, Raed Alsini, N. Supriya, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 2, pp. 3219-3233
Open Access | Times Cited: 4
C. S. S. Anupama, Raed Alsini, N. Supriya, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 2, pp. 3219-3233
Open Access | Times Cited: 4
Resource optimized Region Based Image Encryption Using Chaotic Maps
Kiran Kiran, B. D. Parameshachari, Sudheesh K.V., et al.
International Journal of e-Collaboration (2022) Vol. 18, Iss. 1, pp. 1-20
Closed Access | Times Cited: 3
Kiran Kiran, B. D. Parameshachari, Sudheesh K.V., et al.
International Journal of e-Collaboration (2022) Vol. 18, Iss. 1, pp. 1-20
Closed Access | Times Cited: 3
Secure Transmission of Medical Image Using a Wavelet Interval Type-2 TSK Fuzzy Brain-Imitated Neural Network
Duc-Hung Pham, Tuân-Tú Huỳnh, Chih‐Min Lin, et al.
Research Square (Research Square) (2024)
Open Access
Duc-Hung Pham, Tuân-Tú Huỳnh, Chih‐Min Lin, et al.
Research Square (Research Square) (2024)
Open Access
A New 6D Hyperchaos-Based Medical Image Encryption Scheme Using k-Fibonacci Numbers
Samira Dib
International Journal of Electrical and Electronic Engineering & Telecommunications (2024) Vol. 13, Iss. 2, pp. 148-159
Open Access
Samira Dib
International Journal of Electrical and Electronic Engineering & Telecommunications (2024) Vol. 13, Iss. 2, pp. 148-159
Open Access
Opposition to Synchronization of Bistable State in Motif Configuration of Rössler Chaotic Oscillator Systems
Juan Hugo García-López, R. Jaimes-Reátegui, G. Huerta-Cuéllar, et al.
Chaos Theory and Applications (2024) Vol. 6, Iss. 2, pp. 131-143
Open Access
Juan Hugo García-López, R. Jaimes-Reátegui, G. Huerta-Cuéllar, et al.
Chaos Theory and Applications (2024) Vol. 6, Iss. 2, pp. 131-143
Open Access
Smart Pixels: Harnessing Deep Learning and Fibonacci Decomposition for Image Ciphering
Yasmine M. Khazaal, Ali Douik, Monji Kherallah
IEEE Access (2024) Vol. 12, pp. 130723-130735
Open Access
Yasmine M. Khazaal, Ali Douik, Monji Kherallah
IEEE Access (2024) Vol. 12, pp. 130723-130735
Open Access
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud
Arun Amaithi Rajan, V. Vetriselvi, Mayank Raikwar, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
Arun Amaithi Rajan, V. Vetriselvi, Mayank Raikwar, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
An efficient optimized encryption and compression techniques to improve medical image security and transmission in the cloud
D. Jeni Jeba Seeli, K.K. Thanammal
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING (2024)
Closed Access
D. Jeni Jeba Seeli, K.K. Thanammal
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING (2024)
Closed Access
An image encryption algorithm based on heat flow cryptosystems
Jin Li, Jinzheng Qu, Xibo Duan, et al.
Networks and Heterogeneous Media (2023) Vol. 18, Iss. 3, pp. 1260-1287
Open Access | Times Cited: 1
Jin Li, Jinzheng Qu, Xibo Duan, et al.
Networks and Heterogeneous Media (2023) Vol. 18, Iss. 3, pp. 1260-1287
Open Access | Times Cited: 1
Medical image characteristic region recognition encryption algorithm based on intra and inter blocks scrambling and LSCC chaotic map
Rong Chen, Fan Zhang, Lin Teng, et al.
Multimedia Tools and Applications (2023) Vol. 82, Iss. 29, pp. 45839-45867
Closed Access | Times Cited: 1
Rong Chen, Fan Zhang, Lin Teng, et al.
Multimedia Tools and Applications (2023) Vol. 82, Iss. 29, pp. 45839-45867
Closed Access | Times Cited: 1
EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation
Govardhan Hegde, S. K. Gupta, G. M. Prabhu, et al.
Communications in computer and information science (2023), pp. 109-120
Closed Access | Times Cited: 1
Govardhan Hegde, S. K. Gupta, G. M. Prabhu, et al.
Communications in computer and information science (2023), pp. 109-120
Closed Access | Times Cited: 1
An efficient hybrid fuzzy image encryption models for the secured cloud accessing in portable robotics devices
K. Subba Reddy, K. Rajendra Prasad, K. Nageswara Reddy, et al.
Soft Computing (2023)
Closed Access | Times Cited: 1
K. Subba Reddy, K. Rajendra Prasad, K. Nageswara Reddy, et al.
Soft Computing (2023)
Closed Access | Times Cited: 1
An Efficient Hybrid Fuzzy Image Encryption Models for the Secured Cloud Accessing in Portable Robotics Devices
K. Subba Reddy, K. Rajendra Prasad, K. Nageswara Reddy, et al.
Research Square (Research Square) (2023)
Open Access
K. Subba Reddy, K. Rajendra Prasad, K. Nageswara Reddy, et al.
Research Square (Research Square) (2023)
Open Access
Protection of COVID-19 images using multiple elliptic curve cryptography
Diana Laishram, Navdeep Singh, Kh. Manglem Singh
The Imaging Science Journal (2023), pp. 1-13
Closed Access
Diana Laishram, Navdeep Singh, Kh. Manglem Singh
The Imaging Science Journal (2023), pp. 1-13
Closed Access
Color Image Encryption Employing Cellular Automata and Three-Dimensional Chaotic Transforms
Renjith V. Ravi, S. B. Goyal, Sardar M. N. Islam, et al.
Lecture notes in electrical engineering (2023), pp. 411-421
Closed Access
Renjith V. Ravi, S. B. Goyal, Sardar M. N. Islam, et al.
Lecture notes in electrical engineering (2023), pp. 411-421
Closed Access
A Modified KLEIN Encryption-based Knight Tour for Image Encryption
Emaan Oudha Oraby, Rafeef Mohammed Hamza
Journal of Applied Engineering and Technological Science (JAETS) (2023) Vol. 5, Iss. 1, pp. 268-278
Open Access
Emaan Oudha Oraby, Rafeef Mohammed Hamza
Journal of Applied Engineering and Technological Science (JAETS) (2023) Vol. 5, Iss. 1, pp. 268-278
Open Access