
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Efficient watermarking algorithm for digital audio/speech signal
Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, et al.
Digital Signal Processing (2021) Vol. 120, pp. 103251-103251
Closed Access | Times Cited: 38
Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, et al.
Digital Signal Processing (2021) Vol. 120, pp. 103251-103251
Closed Access | Times Cited: 38
Showing 1-25 of 38 citing articles:
Deep transfer learning for automatic speech recognition: Towards better generalization
Hamza Kheddar, Yassine Himeur, Somaya Al‐Maadeed, et al.
Knowledge-Based Systems (2023) Vol. 277, pp. 110851-110851
Open Access | Times Cited: 63
Hamza Kheddar, Yassine Himeur, Somaya Al‐Maadeed, et al.
Knowledge-Based Systems (2023) Vol. 277, pp. 110851-110851
Open Access | Times Cited: 63
Automatic speech recognition using advanced deep learning approaches: A survey
Hamza Kheddar, Mustapha Hemis, Yassine Himeur
Information Fusion (2024) Vol. 109, pp. 102422-102422
Closed Access | Times Cited: 21
Hamza Kheddar, Mustapha Hemis, Yassine Himeur
Information Fusion (2024) Vol. 109, pp. 102422-102422
Closed Access | Times Cited: 21
Robust audio watermarking scheme based on fractional Charlier moment transform and dual tree complex wavelet transform
Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, et al.
Expert Systems with Applications (2022) Vol. 203, pp. 117325-117325
Closed Access | Times Cited: 43
Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, et al.
Expert Systems with Applications (2022) Vol. 203, pp. 117325-117325
Closed Access | Times Cited: 43
A Four-Dimensional Space-Based Data Multi-Embedding Mechanism for Network Services
Mianjie Li, Haozheng Cui, Chihui Liu, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 3, pp. 2741-2750
Closed Access | Times Cited: 17
Mianjie Li, Haozheng Cui, Chihui Liu, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 3, pp. 2741-2750
Closed Access | Times Cited: 17
Efficient color image steganography based on new adapted chaotic dynamical system with discrete orthogonal moment transforms
Mohamed Yamni, Achraf Daoui, Ahmed A. Abd El‐Latif
Mathematics and Computers in Simulation (2024) Vol. 225, pp. 1170-1198
Closed Access | Times Cited: 6
Mohamed Yamni, Achraf Daoui, Ahmed A. Abd El‐Latif
Mathematics and Computers in Simulation (2024) Vol. 225, pp. 1170-1198
Closed Access | Times Cited: 6
An efficient watermarking algorithm for digital audio data in security applications
Mohamed Yamni, Achraf Daoui, Hicham Karmouni, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 12
Mohamed Yamni, Achraf Daoui, Hicham Karmouni, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 12
An audio watermarking method against re-recording distortions
Guoyuan Lin, Weiqi Luo, Peijia Zheng, et al.
Pattern Recognition (2025), pp. 111366-111366
Closed Access
Guoyuan Lin, Weiqi Luo, Peijia Zheng, et al.
Pattern Recognition (2025), pp. 111366-111366
Closed Access
An adaptive and large payload audio watermarking against jittering attacks
Tianyu Yang, Canghong Shi, Minfeng Shao, et al.
Computers & Electrical Engineering (2025) Vol. 124, pp. 110321-110321
Closed Access
Tianyu Yang, Canghong Shi, Minfeng Shao, et al.
Computers & Electrical Engineering (2025) Vol. 124, pp. 110321-110321
Closed Access
Copyright protection of multiple CT images using Octonion Krawtchouk moments and grey Wolf optimizer
Mohamed Yamni, Achraf Daoui, Hicham Karmouni, et al.
Journal of the Franklin Institute (2023) Vol. 360, Iss. 7, pp. 4719-4752
Closed Access | Times Cited: 10
Mohamed Yamni, Achraf Daoui, Hicham Karmouni, et al.
Journal of the Franklin Institute (2023) Vol. 360, Iss. 7, pp. 4719-4752
Closed Access | Times Cited: 10
Towards Robust Speech Models: Mitigating Backdoor Attacks via Audio Signal Enhancement and Fine-Pruning Techniques
Hong-xiang Sun, Qi Zhong, Minfeng Qi, et al.
Mathematics (2025) Vol. 13, Iss. 6, pp. 984-984
Open Access
Hong-xiang Sun, Qi Zhong, Minfeng Qi, et al.
Mathematics (2025) Vol. 13, Iss. 6, pp. 984-984
Open Access
A dual watermarking scheme for identity protection
Sunpreet Sharma, Ju Jia Zou, Gu Fang
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 2207-2236
Open Access | Times Cited: 16
Sunpreet Sharma, Ju Jia Zou, Gu Fang
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 2207-2236
Open Access | Times Cited: 16
ROSEmark: Robust semi-blind ECG watermarking scheme using SWT-DCT framework
Subodh Kumar, Ankit Rajpal, Neeraj Kumar Sharma, et al.
Digital Signal Processing (2022) Vol. 129, pp. 103648-103648
Closed Access | Times Cited: 15
Subodh Kumar, Ankit Rajpal, Neeraj Kumar Sharma, et al.
Digital Signal Processing (2022) Vol. 129, pp. 103648-103648
Closed Access | Times Cited: 15
Securing Dual-Channel Audio Communication With a 2-D Infinite Collapse and Logistic Map
Rui Wu, Suo Gao, Herbert Ho‐Ching Iu, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 10214-10223
Closed Access | Times Cited: 9
Rui Wu, Suo Gao, Herbert Ho‐Ching Iu, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 10214-10223
Closed Access | Times Cited: 9
DISH: Digital image steganography using stochastic-computing with high-capacity
Mohamed Osama Elhady, Maha H. Abbas, Farooq A. Khanday, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 25, pp. 66033-66048
Open Access | Times Cited: 3
Mohamed Osama Elhady, Maha H. Abbas, Farooq A. Khanday, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 25, pp. 66033-66048
Open Access | Times Cited: 3
Speech cryptography algorithms: utilizing frequency and time domain techniques merging
Osama S. Faragallah, M. Farouk, Hala S. El‐sayed, et al.
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 10, pp. 3617-3649
Closed Access | Times Cited: 2
Osama S. Faragallah, M. Farouk, Hala S. El‐sayed, et al.
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 10, pp. 3617-3649
Closed Access | Times Cited: 2
Comprehensive analysis of least significant bit and difference expansion watermarking algorithms for online signature signals
Marcos Faúndez-Zanuy
Expert Systems with Applications (2024), pp. 126214-126214
Closed Access | Times Cited: 2
Marcos Faúndez-Zanuy
Expert Systems with Applications (2024), pp. 126214-126214
Closed Access | Times Cited: 2
An efficient computation of discrete orthogonal moments for bio-signals reconstruction
Islam S. Fathi, Mohamed Ali Ahmed, M. A. Makhlouf
EURASIP Journal on Advances in Signal Processing (2022) Vol. 2022, Iss. 1
Open Access | Times Cited: 8
Islam S. Fathi, Mohamed Ali Ahmed, M. A. Makhlouf
EURASIP Journal on Advances in Signal Processing (2022) Vol. 2022, Iss. 1
Open Access | Times Cited: 8
Enhancing secure storage and sharing of multi-image in cloud environments using a novel chaotic map
Jinglei Yang, Xingbin Liu
Expert Systems with Applications (2024), pp. 125897-125897
Closed Access | Times Cited: 1
Jinglei Yang, Xingbin Liu
Expert Systems with Applications (2024), pp. 125897-125897
Closed Access | Times Cited: 1
Towards improving the security of image steganography via minimizing the spatial embedding impact
Wenkang Su, Jiangqun Ni, Xianglei Hu, et al.
Digital Signal Processing (2022) Vol. 131, pp. 103758-103758
Closed Access | Times Cited: 5
Wenkang Su, Jiangqun Ni, Xianglei Hu, et al.
Digital Signal Processing (2022) Vol. 131, pp. 103758-103758
Closed Access | Times Cited: 5
Multimedia Security Through 1D Chaotic Systems
Achraf Daoui, Ahmed A. Abd El‐Latif
Advances in data mining and database management book series (2023), pp. 1-31
Closed Access | Times Cited: 2
Achraf Daoui, Ahmed A. Abd El‐Latif
Advances in data mining and database management book series (2023), pp. 1-31
Closed Access | Times Cited: 2
A novel audio watermarking algorithm robust against recapturing attacks
Junjie He, Zhenghui Liu, Kejia Lin, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 12, pp. 18599-18616
Closed Access | Times Cited: 4
Junjie He, Zhenghui Liu, Kejia Lin, et al.
Multimedia Tools and Applications (2022) Vol. 82, Iss. 12, pp. 18599-18616
Closed Access | Times Cited: 4
Transient detection-based adaptive audio watermarking using attack-aware optimization
Dong Wook Kim, Jin-Kyum Kim, ZhengHui Piao, et al.
Digital Signal Processing (2023) Vol. 146, pp. 104352-104352
Closed Access | Times Cited: 2
Dong Wook Kim, Jin-Kyum Kim, ZhengHui Piao, et al.
Digital Signal Processing (2023) Vol. 146, pp. 104352-104352
Closed Access | Times Cited: 2
A music watermarking method based on the multi-band power distribution of copyright owner’s speech
Qing Qian, Meixin Song, Shuyun Zhou, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 26, pp. 67627-67642
Closed Access
Qing Qian, Meixin Song, Shuyun Zhou, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 26, pp. 67627-67642
Closed Access
A Novel Digital Audio Encryption and Forensics Watermarking Scheme
Junjie He, Pei Dong Zhu, Zhenghui Liu, et al.
IEEE Access (2024) Vol. 12, pp. 103565-103582
Open Access
Junjie He, Pei Dong Zhu, Zhenghui Liu, et al.
IEEE Access (2024) Vol. 12, pp. 103565-103582
Open Access
HiFi-GANw: Watermarked Speech Synthesis Via Fine-Tuning of HiFi-GAN
Xiangyu Cheng, Yaofei Wang, Chang Liu, et al.
IEEE Signal Processing Letters (2024) Vol. 31, pp. 2440-2444
Closed Access
Xiangyu Cheng, Yaofei Wang, Chang Liu, et al.
IEEE Signal Processing Letters (2024) Vol. 31, pp. 2440-2444
Closed Access