OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

EiMOL: A Secure Medical Image Encryption Algorithm based on Optimization and the Lorenz System
KN Singh, OP Singh, Amit Kumar Singh, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2022) Vol. 19, Iss. 2s, pp. 1-19
Closed Access | Times Cited: 26

Showing 1-25 of 26 citing articles:

Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain
Ali Akram Abdul-Kareem, Waleed A. Mahmoud Al‐Jawher
International Journal of Computers and Applications (2023) Vol. 45, Iss. 4, pp. 306-322
Closed Access | Times Cited: 20

An algorithm based on 6D fractional order hyperchaotic system and knight tour algorithm to encrypt image
Chenchen He, Zhong Chen, Lujie Wang, et al.
Physica Scripta (2024) Vol. 99, Iss. 5, pp. 055205-055205
Open Access | Times Cited: 7

Dynamic rotation medical image encryption scheme based on improved Lorenz chaos
Zhenlong Man, Chang Gao, Yu Dai, et al.
Nonlinear Dynamics (2024) Vol. 112, Iss. 15, pp. 13571-13597
Closed Access | Times Cited: 6

Robust medical and color image cryptosystem using array index and chaotic S-box
Durgabati Podder, Subhrajyoti Deb, Debapriya Banik, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 4321-4346
Closed Access | Times Cited: 6

A robust and lossless commutative encryption and watermarking algorithm for vector geographic data
Shuitao Guo, Shijie Zhu, Changqing Zhu, et al.
Journal of Information Security and Applications (2023) Vol. 75, pp. 103503-103503
Closed Access | Times Cited: 13

An image encryption algorithm using hybrid sea lion optimization and chaos theory in the hartley domain
Ali Akram Abdul-Kareem, Waleed A. Mahmoud Al‐Jawher
International Journal of Computers and Applications (2024) Vol. 46, Iss. 5, pp. 324-337
Open Access | Times Cited: 5

Using GAN-Based Encryption to Secure Digital Images With Reconstruction Through Customized Super Resolution Network
Monu Singh, Naman Baranwal, Kedar Nath Singh, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 3977-3984
Closed Access | Times Cited: 12

A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet – Fourier Transforms
Ali Akram Abdul-Kareem, Waleed A. Mahmoud Al‐Jawher
Journal of Cyber Security and Mobility (2023)
Open Access | Times Cited: 11

An efficient and compromise-resilient image encryption scheme for resource-constrained environments
Abdul Nasir Khan, Abid Mehmood, Muhammad Nasir Mumtaz Bhutta, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0297534-e0297534
Open Access | Times Cited: 4

Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach
Mohammad Mazyad Hazzazi, Mujeeb Ur Rehman, Arslan Shafique, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4

Novel grayscale image encryption based on 4D fractional-order hyperchaotic system, 2D Henon map and knight tour algorithm
Saeed Ullah, Xinge Liu, Adil Waheed, et al.
Physica Scripta (2024) Vol. 99, Iss. 9, pp. 095248-095248
Closed Access | Times Cited: 4

Digital Images Encryption Using PWLCM and Sine Map
Niraj Yadav, Amrita Mohan, Om Prakash Singh, et al.
Communications in computer and information science (2025), pp. 86-102
Closed Access

A Survey on Optimized Based Image Encryption Techniques
Manish Kumar, Bhartendu Nath Mishra, Nishchay Deep
Springer proceedings in mathematics & statistics (2025), pp. 649-681
Closed Access

A verifiable variable threshold visual image secret sharing scheme
Yu‐Guang Yang, Wen Cheng, Guang‐Bao Xu, et al.
Multimedia Systems (2025) Vol. 31, Iss. 3
Closed Access

JPEG-compatible Joint Image Compression and Encryption Algorithm with File Size Preservation
Yuxiang Peng, Chong Fu, Guixing Cao, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2023) Vol. 20, Iss. 4, pp. 1-20
Open Access | Times Cited: 10

Deep learning-based segmentation for medical data hiding with Galois field
Preetam Amrit, Kedar Nath Singh, Naman Baranwal, et al.
Neural Computing and Applications (2023)
Closed Access | Times Cited: 8

MieWC: Medical image encryption using wavelet transform and multiple chaotic maps
Kunal Demla, Ashima Anand
Security and Privacy (2024) Vol. 7, Iss. 3
Closed Access | Times Cited: 2

Robust watermarking algorithm based on multimodal medical image fusion
Om Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, et al.
Elsevier eBooks (2024), pp. 77-107
Closed Access | Times Cited: 2

Double iris image asymmetric encryption mechanism using rear mounted spiral phase mask in hybrid transform domain
Ayushi Bansal, Pankaj Rakheja, Hukum Singh
Optical and Quantum Electronics (2024) Vol. 56, Iss. 5
Closed Access | Times Cited: 2

Deep learning-based image encryption techniques: Fundamentals, current trends, challenges and future directions
Om Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, et al.
Neurocomputing (2024) Vol. 612, pp. 128714-128714
Closed Access | Times Cited: 2

A metaheuristic image cryptosystem using improved parallel model and many‐objective optimization
Zihao Xin, Sheng Liu, Xiaoyi Zhou, et al.
IET Image Processing (2024) Vol. 18, Iss. 11, pp. 2838-2854
Open Access | Times Cited: 1

Detecting Post Editing of Multimedia Images using Transfer Learning and Fine Tuning
Simon Lucas Jonker, Malthe Andreas Lejbølle Jelstrup, Weizhi Meng, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2023) Vol. 20, Iss. 6, pp. 1-22
Open Access | Times Cited: 2

Key-Independent Image Encryption using DNA Encoding and Chaotic Dynamics
V Maharaja Vannia Moorthi, Megha R Krishna, Gopika Anil Kumar, et al.
(2024)
Closed Access

Internet of medical things-based authentication for an optimized watermarking of encrypted EEG
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava
The Journal of Supercomputing (2023)
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top