
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare
P Rashmi, Supriya Maganahalli Chandramouli, Qiaozhi Hua
Security and Communication Networks (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 27
P Rashmi, Supriya Maganahalli Chandramouli, Qiaozhi Hua
Security and Communication Networks (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
Resource Optimized Selective Image Encryption of Medical Images Using Multiple Chaotic Systems
Kiran Kiran, B. D. Parameshachari
Microprocessors and Microsystems (2022) Vol. 91, pp. 104546-104546
Closed Access | Times Cited: 86
Kiran Kiran, B. D. Parameshachari
Microprocessors and Microsystems (2022) Vol. 91, pp. 104546-104546
Closed Access | Times Cited: 86
An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen‐Cheng Lai, et al.
Big Data and Cognitive Computing (2022) Vol. 6, Iss. 4, pp. 101-101
Open Access | Times Cited: 64
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen‐Cheng Lai, et al.
Big Data and Cognitive Computing (2022) Vol. 6, Iss. 4, pp. 101-101
Open Access | Times Cited: 64
Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System
B. T. Geetha, M. Prakash, A. V. R. Mayuri, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 55
B. T. Geetha, M. Prakash, A. V. R. Mayuri, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 55
Medical Image Encryption: A Comprehensive Review
Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab, et al.
Computers (2023) Vol. 12, Iss. 8, pp. 160-160
Open Access | Times Cited: 22
Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab, et al.
Computers (2023) Vol. 12, Iss. 8, pp. 160-160
Open Access | Times Cited: 22
2D Lorentz Chaotic Model Coupled with Logistic Chaotic Model for Medical Image Encryption: Towards Ensuring Security for Teleradiology
Siju John, Sushil Kumar
Procedia Computer Science (2023) Vol. 218, pp. 918-926
Open Access | Times Cited: 17
Siju John, Sushil Kumar
Procedia Computer Science (2023) Vol. 218, pp. 918-926
Open Access | Times Cited: 17
Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems
Fatma S. Alrayes, Saud S. Alotaibi, Khalid Alissa, et al.
Drones (2022) Vol. 6, Iss. 9, pp. 222-222
Open Access | Times Cited: 28
Fatma S. Alrayes, Saud S. Alotaibi, Khalid Alissa, et al.
Drones (2022) Vol. 6, Iss. 9, pp. 222-222
Open Access | Times Cited: 28
Implementing the Triple-Data Encryption Standard for Secure and Efficient Healthcare Data Storage in Cloud Computing Environments
Wid Akeel Awadh, Mohammed Hashim, Ali Salah Alasady
Informatica (2024) Vol. 48, Iss. 6
Open Access | Times Cited: 5
Wid Akeel Awadh, Mohammed Hashim, Ali Salah Alasady
Informatica (2024) Vol. 48, Iss. 6
Open Access | Times Cited: 5
A novel medical image data protection scheme for smart healthcare system
Mujeeb Ur Rehman, Arslan Shafique, Muhammad Shahbaz Khan, et al.
CAAI Transactions on Intelligence Technology (2024) Vol. 9, Iss. 4, pp. 821-836
Open Access | Times Cited: 4
Mujeeb Ur Rehman, Arslan Shafique, Muhammad Shahbaz Khan, et al.
CAAI Transactions on Intelligence Technology (2024) Vol. 9, Iss. 4, pp. 821-836
Open Access | Times Cited: 4
Securing Medical Images Using Chaotic Map Encryption and LSB Steganography
Abbas Zamil Hussain, Maisa’a Abid Ali Khodher
Revue d intelligence artificielle (2024) Vol. 38, Iss. 1, pp. 313-321
Open Access | Times Cited: 3
Abbas Zamil Hussain, Maisa’a Abid Ali Khodher
Revue d intelligence artificielle (2024) Vol. 38, Iss. 1, pp. 313-321
Open Access | Times Cited: 3
5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q‐Matrix
Geeta Biban, Renu Chugh, Anju Panwar, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 2
Geeta Biban, Renu Chugh, Anju Panwar, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 2
A Dynamic Hybrid Cryptosystem Using Chaos and Diffie–Hellman Protocol: An Image Encryption Application
Rolando Flores-Carapia, Víctor Manuel Silva-García, Manuel Alejandro Cardona-López
Applied Sciences (2023) Vol. 13, Iss. 12, pp. 7168-7168
Open Access | Times Cited: 5
Rolando Flores-Carapia, Víctor Manuel Silva-García, Manuel Alejandro Cardona-López
Applied Sciences (2023) Vol. 13, Iss. 12, pp. 7168-7168
Open Access | Times Cited: 5
H.264/AVC video encryption algorithm based on integer dynamic cross-coupling tent mapping model
Jin Wang, Jiandong Liu, Xu Haoqiang
Multimedia Tools and Applications (2023) Vol. 83, Iss. 5, pp. 13369-13393
Closed Access | Times Cited: 5
Jin Wang, Jiandong Liu, Xu Haoqiang
Multimedia Tools and Applications (2023) Vol. 83, Iss. 5, pp. 13369-13393
Closed Access | Times Cited: 5
Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring
Yazeed Yasin Ghadi, Suliman A. Alsuhibany, Jawad Ahmad, et al.
Journal of Healthcare Engineering (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 9
Yazeed Yasin Ghadi, Suliman A. Alsuhibany, Jawad Ahmad, et al.
Journal of Healthcare Engineering (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 9
Generation of Boxes and Permutations Using a Bijective Function and the Lorenz Equations: An Application to Color Image Encryption
Víctor Manuel Silva-García, Rolando Flores-Carapia, Manuel Alejandro Cardona-López, et al.
Mathematics (2023) Vol. 11, Iss. 3, pp. 599-599
Open Access | Times Cited: 4
Víctor Manuel Silva-García, Rolando Flores-Carapia, Manuel Alejandro Cardona-López, et al.
Mathematics (2023) Vol. 11, Iss. 3, pp. 599-599
Open Access | Times Cited: 4
Machine learning in cloud-based trust modeling in M-health application using classification with image encryption
Shamimul Qamar
Soft Computing (2023)
Closed Access | Times Cited: 4
Shamimul Qamar
Soft Computing (2023)
Closed Access | Times Cited: 4
Image encryption algorithm based on ElGamal cryptography and selective random diffusion
Liming Guo, Jianqing He, Guodong Ye
Physica Scripta (2023) Vol. 98, Iss. 11, pp. 115251-115251
Closed Access | Times Cited: 4
Liming Guo, Jianqing He, Guodong Ye
Physica Scripta (2023) Vol. 98, Iss. 11, pp. 115251-115251
Closed Access | Times Cited: 4
A novel scheme for random sequential high-capacity data hiding based on PVD and LSB
Wanqing Wu, Huili Li
Signal Image and Video Processing (2023) Vol. 18, Iss. 3, pp. 2277-2287
Open Access | Times Cited: 4
Wanqing Wu, Huili Li
Signal Image and Video Processing (2023) Vol. 18, Iss. 3, pp. 2277-2287
Open Access | Times Cited: 4
Quaternion with quantum walks for designing a novel color image cryptosystem
Bassem Abd-El-Atty
Journal of Information Security and Applications (2022) Vol. 71, pp. 103367-103367
Closed Access | Times Cited: 7
Bassem Abd-El-Atty
Journal of Information Security and Applications (2022) Vol. 71, pp. 103367-103367
Closed Access | Times Cited: 7
Medical Image Encryption Method Using Cubic-Sin-Logistic-Tent Chaotic Pseudo-Random Number Sequence-Based Substitution
Subhajit Adhikari, Sunil Karforma
SN Computer Science (2023) Vol. 4, Iss. 4
Closed Access | Times Cited: 2
Subhajit Adhikari, Sunil Karforma
SN Computer Science (2023) Vol. 4, Iss. 4
Closed Access | Times Cited: 2
Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 12, pp. 17926-17944
Open Access | Times Cited: 2
Mujeeb Ur Rehman, Arslan Shafique, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 12, pp. 17926-17944
Open Access | Times Cited: 2
Improving Bandwidth Utilization for Underwater Fiber Optic Networks Through Intelligent Optimization Techniques
Nitin N. Sakhare, Rakesh Kumar Yadav, A. Rajesh, et al.
(2023), pp. 276-281
Closed Access | Times Cited: 2
Nitin N. Sakhare, Rakesh Kumar Yadav, A. Rajesh, et al.
(2023), pp. 276-281
Closed Access | Times Cited: 2
A High-Capacity Reversible Data-Hiding Scheme for Medical Image Transmission Using Modified Elias Gamma Encoding
V. M. Manikandan, Kandala Sree Rama Murthy, Bhavana Siddineni, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3101-3101
Open Access | Times Cited: 3
V. M. Manikandan, Kandala Sree Rama Murthy, Bhavana Siddineni, et al.
Electronics (2022) Vol. 11, Iss. 19, pp. 3101-3101
Open Access | Times Cited: 3
Retracted: Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare
Security and Communication Networks
Security and Communication Networks (2023) Vol. 2023, pp. 1-1
Open Access | Times Cited: 1
Security and Communication Networks
Security and Communication Networks (2023) Vol. 2023, pp. 1-1
Open Access | Times Cited: 1
Image encryption of medical images
Mohit Pandey, Abhishek Gupta
Advances in computers (2024)
Closed Access
Mohit Pandey, Abhishek Gupta
Advances in computers (2024)
Closed Access
A robust dual-layer medical image watermarking scheme based on matrix factorization in the LWT domain for E-healthcare applications
Boubakeur Latreche, Ahmed Merrad, Ali Benziane, et al.
Multimedia Tools and Applications (2024)
Closed Access
Boubakeur Latreche, Ahmed Merrad, Ali Benziane, et al.
Multimedia Tools and Applications (2024)
Closed Access