
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Neural-assisted image-dependent encryption scheme for medical image cloud storage
C. Lakshmi, K. Thenmozhi, John Bosco Balaguru Rayappan, et al.
Neural Computing and Applications (2020) Vol. 33, Iss. 12, pp. 6671-6684
Closed Access | Times Cited: 48
C. Lakshmi, K. Thenmozhi, John Bosco Balaguru Rayappan, et al.
Neural Computing and Applications (2020) Vol. 33, Iss. 12, pp. 6671-6684
Closed Access | Times Cited: 48
Showing 1-25 of 48 citing articles:
Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments
Hemalatha Mahalingam, Padmapriya Velupillai Meikandan, K. Thenmozhi, et al.
Mathematics (2023) Vol. 11, Iss. 8, pp. 1769-1769
Open Access | Times Cited: 46
Hemalatha Mahalingam, Padmapriya Velupillai Meikandan, K. Thenmozhi, et al.
Mathematics (2023) Vol. 11, Iss. 8, pp. 1769-1769
Open Access | Times Cited: 46
Blockchain based medical image encryption using Arnold’s cat map in a cloud environment
Saba Inam, Shamsa Kanwal, Rabia Firdous, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 19
Saba Inam, Shamsa Kanwal, Rabia Firdous, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 19
DNA-chaos governed cryptosystem for cloud-based medical image repository
Nithya Chidambaram, K. Thenmozhi, Pethuru Raj, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 4127-4144
Closed Access | Times Cited: 13
Nithya Chidambaram, K. Thenmozhi, Pethuru Raj, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 4127-4144
Closed Access | Times Cited: 13
A decision tree approach for enhancing real-time response in exigent healthcare unit using edge computing
Eram Fatima Siddiqui, Tasneem Ahmed, Sandeep Kumar Nayak
Measurement Sensors (2024) Vol. 32, pp. 100979-100979
Open Access | Times Cited: 10
Eram Fatima Siddiqui, Tasneem Ahmed, Sandeep Kumar Nayak
Measurement Sensors (2024) Vol. 32, pp. 100979-100979
Open Access | Times Cited: 10
Chaos based image encryption scheme to secure sensitive multimedia content in cloud storage
Talha Umar, Mohammad Nadeem, Faisal Anwer
Expert Systems with Applications (2024) Vol. 257, pp. 125050-125050
Closed Access | Times Cited: 10
Talha Umar, Mohammad Nadeem, Faisal Anwer
Expert Systems with Applications (2024) Vol. 257, pp. 125050-125050
Closed Access | Times Cited: 10
Deep learning-based encryption for secure transmission digital images: A survey
Soniya Rohhila, Amit Kumar Singh
Computers & Electrical Engineering (2024) Vol. 116, pp. 109236-109236
Closed Access | Times Cited: 9
Soniya Rohhila, Amit Kumar Singh
Computers & Electrical Engineering (2024) Vol. 116, pp. 109236-109236
Closed Access | Times Cited: 9
Blockchain driven medical image encryption employing chaotic tent map in cloud computing
Usman Shahid, Shamsa Kanwal, Mahwish Bano, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Usman Shahid, Shamsa Kanwal, Mahwish Bano, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Chaotic Lightweight Cryptosystem for Image Encryption
Jannatul Ferdush, Mahbuba Begum, Mohammad Shorif Uddin
Advances in Multimedia (2021) Vol. 2021, pp. 1-16
Open Access | Times Cited: 49
Jannatul Ferdush, Mahbuba Begum, Mohammad Shorif Uddin
Advances in Multimedia (2021) Vol. 2021, pp. 1-16
Open Access | Times Cited: 49
A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks
Bassem Abd-El-Atty
Neural Computing and Applications (2022) Vol. 35, Iss. 1, pp. 773-785
Open Access | Times Cited: 31
Bassem Abd-El-Atty
Neural Computing and Applications (2022) Vol. 35, Iss. 1, pp. 773-785
Open Access | Times Cited: 31
EiMOL: A Secure Medical Image Encryption Algorithm based on Optimization and the Lorenz System
KN Singh, OP Singh, Amit Kumar Singh, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2022) Vol. 19, Iss. 2s, pp. 1-19
Closed Access | Times Cited: 26
KN Singh, OP Singh, Amit Kumar Singh, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2022) Vol. 19, Iss. 2s, pp. 1-19
Closed Access | Times Cited: 26
Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment
K. L. Neela, V. Kavitha
Applied Intelligence (2022) Vol. 53, Iss. 4, pp. 4733-4747
Closed Access | Times Cited: 24
K. L. Neela, V. Kavitha
Applied Intelligence (2022) Vol. 53, Iss. 4, pp. 4733-4747
Closed Access | Times Cited: 24
A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2
L. Shane John Paul, Carlton Gracias, Anurag Desai, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 26, pp. 37873-37894
Closed Access | Times Cited: 23
L. Shane John Paul, Carlton Gracias, Anurag Desai, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 26, pp. 37873-37894
Closed Access | Times Cited: 23
Healthcare with datacare—a triangular DNA security
S. Aashiq Banu, Adel Ismail Al‐Alawi, M. Padmaa, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 7, pp. 21153-21170
Closed Access | Times Cited: 16
S. Aashiq Banu, Adel Ismail Al‐Alawi, M. Padmaa, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 7, pp. 21153-21170
Closed Access | Times Cited: 16
DRL-based dependent task offloading with delay-energy tradeoff in medical image edge computing
Qi Liu, Zhao Tian, Ning Wang, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 3, pp. 3283-3304
Open Access | Times Cited: 5
Qi Liu, Zhao Tian, Ning Wang, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 3, pp. 3283-3304
Open Access | Times Cited: 5
Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis
Shubha Pankaj, Mohit Dua
Information Security Journal A Global Perspective (2024) Vol. 33, Iss. 3, pp. 332-358
Closed Access | Times Cited: 5
Shubha Pankaj, Mohit Dua
Information Security Journal A Global Perspective (2024) Vol. 33, Iss. 3, pp. 332-358
Closed Access | Times Cited: 5
Robustly correlated key‐medical image for DNA‐chaos based encryption
Ichraf Aouissaoui, Toufik Bakir, Anis Sakly
IET Image Processing (2021) Vol. 15, Iss. 12, pp. 2770-2786
Closed Access | Times Cited: 28
Ichraf Aouissaoui, Toufik Bakir, Anis Sakly
IET Image Processing (2021) Vol. 15, Iss. 12, pp. 2770-2786
Closed Access | Times Cited: 28
A simple embed over encryption scheme for DICOM images using Bülban Map
V. Manikandan, Rengarajan Amirtharajan
Medical & Biological Engineering & Computing (2022) Vol. 60, Iss. 3, pp. 701-717
Open Access | Times Cited: 22
V. Manikandan, Rengarajan Amirtharajan
Medical & Biological Engineering & Computing (2022) Vol. 60, Iss. 3, pp. 701-717
Open Access | Times Cited: 22
Reconfigurable security solution based on hopfield neural network for e-healthcare applications
C. Lakshmi, C. Nithya, K. Thenmozhi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
C. Lakshmi, C. Nithya, K. Thenmozhi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Improves RC6 algorithm with multi-chaotic maps for encryption text
Moayad Awny Alsamurai, Wafaa Ali, Mustafa Hussein Taha
AIP conference proceedings (2025) Vol. 3264, pp. 030003-030003
Closed Access
Moayad Awny Alsamurai, Wafaa Ali, Mustafa Hussein Taha
AIP conference proceedings (2025) Vol. 3264, pp. 030003-030003
Closed Access
A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map
Bin Zhang, Bahbibi Rahmatullah, Shir Li Wang, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 10, pp. 15735-15762
Open Access | Times Cited: 15
Bin Zhang, Bahbibi Rahmatullah, Shir Li Wang, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 10, pp. 15735-15762
Open Access | Times Cited: 15
Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion
Shanshan Li, Li Zhao, Na Yang
Security and Communication Networks (2021) Vol. 2021, pp. 1-23
Open Access | Times Cited: 20
Shanshan Li, Li Zhao, Na Yang
Security and Communication Networks (2021) Vol. 2021, pp. 1-23
Open Access | Times Cited: 20
Enhancing Security in UAV-Assisted Image Data Collection for Internet of Things
Fucheng Xue, Wei Chen, Meichen Gai, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31646-31661
Closed Access | Times Cited: 2
Fucheng Xue, Wei Chen, Meichen Gai, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31646-31661
Closed Access | Times Cited: 2
On dual encryption with RC6 and combined logistic tent map for grayscale and DICOM
V. Manikandan, Rengarajan Amirtharajan
Multimedia Tools and Applications (2021)
Closed Access | Times Cited: 11
V. Manikandan, Rengarajan Amirtharajan
Multimedia Tools and Applications (2021)
Closed Access | Times Cited: 11
Exploiting LSB Self-quantization for Plaintext-related Image Encryption in the Zero-trust Cloud
Sheng Liu, Yujian Zhuang, Li Huang, et al.
Journal of Information Security and Applications (2022) Vol. 66, pp. 103138-103138
Closed Access | Times Cited: 8
Sheng Liu, Yujian Zhuang, Li Huang, et al.
Journal of Information Security and Applications (2022) Vol. 66, pp. 103138-103138
Closed Access | Times Cited: 8
Pixel-Based Image Encryption Approaches: A Review
Asha J. Vithayathil, A. Sreekumar
Algorithms for intelligent systems (2023), pp. 137-150
Closed Access | Times Cited: 4
Asha J. Vithayathil, A. Sreekumar
Algorithms for intelligent systems (2023), pp. 137-150
Closed Access | Times Cited: 4