
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A survey of image encryption algorithms based on chaotic system
Pengfei Fang, Han Liu, Chengmao Wu, et al.
The Visual Computer (2022) Vol. 39, Iss. 5, pp. 1975-2003
Closed Access | Times Cited: 52
Pengfei Fang, Han Liu, Chengmao Wu, et al.
The Visual Computer (2022) Vol. 39, Iss. 5, pp. 1975-2003
Closed Access | Times Cited: 52
Showing 1-25 of 52 citing articles:
A novel chaos-based permutation for image encryption
Moatsum Alawida
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 6, pp. 101595-101595
Open Access | Times Cited: 38
Moatsum Alawida
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 6, pp. 101595-101595
Open Access | Times Cited: 38
An image encryption algorithm based on multi-layered chaotic maps and its security analysis
Erdal Güvenoğlu
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 12
Erdal Güvenoğlu
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 12
Image encryption algorithm based on DNA network and hyperchaotic system
Jinwei Yu, Kaiyu Peng, Langwen Zhang, et al.
The Visual Computer (2024) Vol. 40, Iss. 11, pp. 8001-8021
Closed Access | Times Cited: 8
Jinwei Yu, Kaiyu Peng, Langwen Zhang, et al.
The Visual Computer (2024) Vol. 40, Iss. 11, pp. 8001-8021
Closed Access | Times Cited: 8
Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion
Chunlai Li, Yan Zhang, Haodong Li, et al.
The Visual Computer (2023) Vol. 40, Iss. 2, pp. 731-746
Closed Access | Times Cited: 21
Chunlai Li, Yan Zhang, Haodong Li, et al.
The Visual Computer (2023) Vol. 40, Iss. 2, pp. 731-746
Closed Access | Times Cited: 21
Quantum image encryption algorithm based on four-dimensional chaos
Xiaodong Liu, Qian-Hua Chen, Run-Sheng Zhao, et al.
Frontiers in Physics (2024) Vol. 12
Open Access | Times Cited: 7
Xiaodong Liu, Qian-Hua Chen, Run-Sheng Zhao, et al.
Frontiers in Physics (2024) Vol. 12
Open Access | Times Cited: 7
A color image encryption scheme based on chaotic mapping, chaotic system, and DNA coding
Shaohui Yan, Lin Li, Binxian Gu, et al.
Applied Intelligence (2023) Vol. 53, Iss. 24, pp. 31181-31206
Closed Access | Times Cited: 15
Shaohui Yan, Lin Li, Binxian Gu, et al.
Applied Intelligence (2023) Vol. 53, Iss. 24, pp. 31181-31206
Closed Access | Times Cited: 15
Design of a new four-dimensional chaotic system and its application to color image encryption
Shaohui Yan, Lin Li, Weilong Zhao, et al.
Nonlinear Dynamics (2023) Vol. 111, Iss. 18, pp. 17519-17545
Open Access | Times Cited: 14
Shaohui Yan, Lin Li, Weilong Zhao, et al.
Nonlinear Dynamics (2023) Vol. 111, Iss. 18, pp. 17519-17545
Open Access | Times Cited: 14
Fast colored video encryption using block scrambling and multi-key generation
Khalid M. Hosny, Mohamed A. Zaki, Nabil A. Lashin, et al.
The Visual Computer (2022) Vol. 39, Iss. 12, pp. 6041-6072
Open Access | Times Cited: 20
Khalid M. Hosny, Mohamed A. Zaki, Nabil A. Lashin, et al.
The Visual Computer (2022) Vol. 39, Iss. 12, pp. 6041-6072
Open Access | Times Cited: 20
Simplified Image Encryption Algorithm (SIEA) to enhance image security in cloud storage
M. Lavanya, K. Joseph Abraham Sundar, S. Saravanan
Multimedia Tools and Applications (2024) Vol. 83, Iss. 22, pp. 61313-61345
Closed Access | Times Cited: 4
M. Lavanya, K. Joseph Abraham Sundar, S. Saravanan
Multimedia Tools and Applications (2024) Vol. 83, Iss. 22, pp. 61313-61345
Closed Access | Times Cited: 4
An efficient and compromise-resilient image encryption scheme for resource-constrained environments
Abdul Nasir Khan, Abid Mehmood, Muhammad Nasir Mumtaz Bhutta, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0297534-e0297534
Open Access | Times Cited: 4
Abdul Nasir Khan, Abid Mehmood, Muhammad Nasir Mumtaz Bhutta, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0297534-e0297534
Open Access | Times Cited: 4
Novel grayscale image encryption based on 4D fractional-order hyperchaotic system, 2D Henon map and knight tour algorithm
Saeed Ullah, Xinge Liu, Adil Waheed, et al.
Physica Scripta (2024) Vol. 99, Iss. 9, pp. 095248-095248
Closed Access | Times Cited: 4
Saeed Ullah, Xinge Liu, Adil Waheed, et al.
Physica Scripta (2024) Vol. 99, Iss. 9, pp. 095248-095248
Closed Access | Times Cited: 4
A novel image cipher system based on hybrid vigenere-affine approach
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Multimedia Tools and Applications (2025)
Closed Access
Hamid El Bourakkadi, Abdelhakim Chemlal, Hassan Tabti, et al.
Multimedia Tools and Applications (2025)
Closed Access
Image encryption based on simple shift, permutation and transformation operations on bit layers
Saleem Alzoubi
Data & Metadata (2025) Vol. 4, pp. 690-690
Closed Access
Saleem Alzoubi
Data & Metadata (2025) Vol. 4, pp. 690-690
Closed Access
Secure real-time transmission of multi-spectral satellite images inducing a 6D hyper-chaotic system and BB84 QKD protocol
Bandana Mallick, Priyadarsan Parida, Chittaranjan Nayak, et al.
Alexandria Engineering Journal (2025) Vol. 122, pp. 364-384
Closed Access
Bandana Mallick, Priyadarsan Parida, Chittaranjan Nayak, et al.
Alexandria Engineering Journal (2025) Vol. 122, pp. 364-384
Closed Access
ZigZag transform with Durstenfeld shuffle for fast and secure image encryption
Erdal Güvenoğlu, Volkan Tunalı
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 9
Erdal Güvenoğlu, Volkan Tunalı
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 9
Satellite image encryption based on RNA and 7D complex chaotic system
Lijiang Zhao, Lilong Zhao, Fenping Cui, et al.
The Visual Computer (2023) Vol. 40, Iss. 8, pp. 5659-5679
Closed Access | Times Cited: 7
Lijiang Zhao, Lilong Zhao, Fenping Cui, et al.
The Visual Computer (2023) Vol. 40, Iss. 8, pp. 5659-5679
Closed Access | Times Cited: 7
MieWC: Medical image encryption using wavelet transform and multiple chaotic maps
Kunal Demla, Ashima Anand
Security and Privacy (2024) Vol. 7, Iss. 3
Closed Access | Times Cited: 2
Kunal Demla, Ashima Anand
Security and Privacy (2024) Vol. 7, Iss. 3
Closed Access | Times Cited: 2
DICOM Medical Image Security with DNA- Non-Uniform Cellular Automata and JSMP Map Based Encryption Technique
Ahmed Mohamed, Walid El-Shafa, Mona Shokair
Menoufia Journal of Electronic Engineering Research (2024) Vol. 33, Iss. 1, pp. 1-16
Open Access | Times Cited: 2
Ahmed Mohamed, Walid El-Shafa, Mona Shokair
Menoufia Journal of Electronic Engineering Research (2024) Vol. 33, Iss. 1, pp. 1-16
Open Access | Times Cited: 2
Chaotic Image Encryption Using an Improved Vigenère Cipher and a Crossover Operator
Mourad Kattass, Hicham Rrghout, Mariem Jarjar, et al.
Studies in computational intelligence (2024), pp. 181-191
Closed Access | Times Cited: 2
Mourad Kattass, Hicham Rrghout, Mariem Jarjar, et al.
Studies in computational intelligence (2024), pp. 181-191
Closed Access | Times Cited: 2
Local bit-level image encryption algorithm based on one dimensional zero excluded chaotic map
Xiaogang Feng, Guankai Han, Fengying Yan, et al.
Physica Scripta (2024) Vol. 99, Iss. 6, pp. 065214-065214
Open Access | Times Cited: 2
Xiaogang Feng, Guankai Han, Fengying Yan, et al.
Physica Scripta (2024) Vol. 99, Iss. 6, pp. 065214-065214
Open Access | Times Cited: 2
Deep learning-based image encryption techniques: Fundamentals, current trends, challenges and future directions
Om Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, et al.
Neurocomputing (2024) Vol. 612, pp. 128714-128714
Closed Access | Times Cited: 2
Om Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, et al.
Neurocomputing (2024) Vol. 612, pp. 128714-128714
Closed Access | Times Cited: 2
A novel fast image encryption scheme based on a new one-dimensional compound sine chaotic system
Jianeng Tang, Feng Zhang, Hui Ni
The Visual Computer (2022) Vol. 39, Iss. 10, pp. 4955-4983
Open Access | Times Cited: 10
Jianeng Tang, Feng Zhang, Hui Ni
The Visual Computer (2022) Vol. 39, Iss. 10, pp. 4955-4983
Open Access | Times Cited: 10
A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy
Víctor Manuel Silva-García, Rolando Flores-Carapia, Manuel Alejandro Cardona-López
Entropy (2024) Vol. 26, Iss. 2, pp. 154-154
Open Access | Times Cited: 1
Víctor Manuel Silva-García, Rolando Flores-Carapia, Manuel Alejandro Cardona-López
Entropy (2024) Vol. 26, Iss. 2, pp. 154-154
Open Access | Times Cited: 1
Privacy-Preserving Process Mining: A Blockchain-Based Privacy-Aware Reversible Shared Image Approach
Xianwen Fang, Mengyao Li
Applied Artificial Intelligence (2024) Vol. 38, Iss. 1
Open Access | Times Cited: 1
Xianwen Fang, Mengyao Li
Applied Artificial Intelligence (2024) Vol. 38, Iss. 1
Open Access | Times Cited: 1
A new image encryption approach that uses an improved Hill-Vigenère method and chaotic maps
Samir El Kaddouhi, Youness Qobbi, Abubakar Abid, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Samir El Kaddouhi, Youness Qobbi, Abubakar Abid, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1