OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm
T. Avudaiappan, R. Balasubramanian, S. Sundara Pandiyan, et al.
Journal of Medical Systems (2018) Vol. 42, Iss. 11
Closed Access | Times Cited: 77

Showing 1-25 of 77 citing articles:

RETRACTED ARTICLE: Hybrid optimization with cryptography encryption for medical image security in Internet of Things
Mohamed Elhoseny, K. Shankar, S. K. Lakshmanaprabu, et al.
Neural Computing and Applications (2018) Vol. 32, Iss. 15, pp. 10979-10993
Closed Access | Times Cited: 227

Optimal bilateral filter and Convolutional Neural Network based denoising method of medical image measurements
Mohamed Elhoseny, K. Shankar
Measurement (2019) Vol. 143, pp. 125-135
Closed Access | Times Cited: 177

Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications
Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, et al.
IEEE Access (2021) Vol. 9, pp. 47731-47742
Open Access | Times Cited: 176

Reliable Data Transmission Model for Mobile Ad Hoc Network Using Signcryption Technique
Mohamed Elhoseny, K. Shankar
IEEE Transactions on Reliability (2019) Vol. 69, Iss. 3, pp. 1077-1086
Closed Access | Times Cited: 149

Securing healthcare medical image information using advance morphological component analysis, information hiding systems, and hybrid convolutional neural networks on IoMT
Binay Kumar Pandey, Digvijay Pandey
Computers in Biology and Medicine (2024) Vol. 185, pp. 109499-109499
Closed Access | Times Cited: 30

Secure medical image transmission using deep neural network in e‐health applications
Ala Abdulsalam Alarood, Muhammad Faheem, Mahmoud Ahmad Al‐Khasawneh, et al.
Healthcare Technology Letters (2023) Vol. 10, Iss. 4, pp. 87-98
Open Access | Times Cited: 32

RETRACTED ARTICLE: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers
S. Sheeba Rani, Jafar A. Alzubi, S. K. Lakshmanaprabu, et al.
Multimedia Tools and Applications (2019) Vol. 79, Iss. 47-48, pp. 35405-35424
Closed Access | Times Cited: 56

Multipurpose medical image watermarking for effective security solutions
Rishi Sinhal, Sachin Sharma, Irshad Ahmad Ansari, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 10, pp. 14045-14063
Open Access | Times Cited: 35

A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT-DCT and Chaotic Map
Jing Liu, Jingbing Li, Jieren Cheng, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2019) Vol. 61, Iss. 2, pp. 889-910
Open Access | Times Cited: 38

A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images
Sareh Mortajez, Marziyeh Tahmasbi, Javad Zarei, et al.
Informatics in Medicine Unlocked (2020) Vol. 20, pp. 100396-100396
Open Access | Times Cited: 34

Complex entropy based encryption and decryption technique for securing medical images
Vinod Kumar, Vinay Kumar Pathak, Neelendra Badal, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 26, pp. 37441-37459
Open Access | Times Cited: 19

A modified salp swarm algorithm (SSA) combined with a chaotic coupled map lattices (CML) approach for the secured encryption and compression of medical images during data transmission
C. Thirumarai Selvi, J. Amudha, R. Sudhakar
Biomedical Signal Processing and Control (2021) Vol. 66, pp. 102465-102465
Closed Access | Times Cited: 24

A novel DICOM image encryption with JSMP map
Joan S. Muthu, P. Murali
Optik (2021) Vol. 251, pp. 168416-168416
Closed Access | Times Cited: 24

A novel medical image encryption based on cellular automata with ROI position embedded
Ping Ping, Xiaojuan Zhang, Xiaohui Yang, et al.
Multimedia Tools and Applications (2022) Vol. 81, Iss. 5, pp. 7323-7343
Closed Access | Times Cited: 16

An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herding Optimization
K. Shankar, Mohamed Elhoseny, Eswaran Perumal, et al.
Advanced sciences and technologies for security applications (2019), pp. 31-42
Closed Access | Times Cited: 27

An intelligent energy management and traffic predictive model for autonomous vehicle systems
Suneetha Manne, E. Laxmi Lydia, Irina V. Pustokhina, et al.
Soft Computing (2021) Vol. 25, Iss. 18, pp. 11941-11953
Closed Access | Times Cited: 23

Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system
Seyyed Keyvan Mousavi, Ali Ghaffari
Journal of Information Security and Applications (2021) Vol. 61, pp. 102945-102945
Closed Access | Times Cited: 23

A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations
Bin Zhang, Bahbibi Rahmatullah, Shir Li Wang, et al.
Multimedia Tools and Applications (2020) Vol. 82, Iss. 14, pp. 21867-21906
Closed Access | Times Cited: 22

Dual encryption of digital information in a tough fluorescent hydrogel
Yang Liu, Ming Li, Huaqiang Ju, et al.
Polymer Chemistry (2022) Vol. 13, Iss. 45, pp. 6255-6260
Closed Access | Times Cited: 14

A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology
Jian Li, Zelin Zhang, Shengyu Li, et al.
BMC Medical Informatics and Decision Making (2020) Vol. 20, Iss. S14
Open Access | Times Cited: 19

Multi-medical image protection: compression–encryption scheme based on TLNN and mask cubes
Linlin Tan, Yinghong Cao, Santo Banerjee, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 2

A novel chaotic DICOM image encryption algorithm based on pseudo-random polyline and rapid diffusion-scrambling
Ziying Zhang, Lin Teng
Physica Scripta (2023) Vol. 98, Iss. 3, pp. 035226-035226
Closed Access | Times Cited: 6

Medical image security and authenticity via dual encryption
Kishore Babu Nampalle, Shriansh Manhas, Balasubramanian Raman
Applied Intelligence (2023) Vol. 53, Iss. 17, pp. 20647-20659
Closed Access | Times Cited: 5

Medical image encryption based on biometric keys and lower–upper decomposition with partial pivoting
Xiaohui Wang, Zheng Zhu, Fan Wang, et al.
Applied Optics (2020) Vol. 60, Iss. 1, pp. 24-24
Closed Access | Times Cited: 13

A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on Bandelet-DCT
Yangxiu Fang, Jing Liu, Jingbing Li, et al.
Smart innovation, systems and technologies (2021), pp. 61-73
Closed Access | Times Cited: 12

Page 1 - Next Page

Scroll to top