
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Latest Trends in Deep Learning Techniques for Image Steganography
Vijay Kumar, Sahil Sharma, Chandan Kumar, et al.
International Journal of Digital Crime and Forensics (2023) Vol. 15, Iss. 1, pp. 1-14
Open Access | Times Cited: 16
Vijay Kumar, Sahil Sharma, Chandan Kumar, et al.
International Journal of Digital Crime and Forensics (2023) Vol. 15, Iss. 1, pp. 1-14
Open Access | Times Cited: 16
Showing 16 citing articles:
Image steganography approaches and their detection strategies: a survey
Meike Helena Kombrink, Zeno Geradts, Marcel Worring
ACM Computing Surveys (2024)
Closed Access | Times Cited: 4
Meike Helena Kombrink, Zeno Geradts, Marcel Worring
ACM Computing Surveys (2024)
Closed Access | Times Cited: 4
Steganographic Method in Selected Areas of the Stego-Carrier in the Spatial Domain
Predrag Milosav, Milan Milosavljević, Zoran Banjac
Symmetry (2023) Vol. 15, Iss. 5, pp. 1015-1015
Open Access | Times Cited: 8
Predrag Milosav, Milan Milosavljević, Zoran Banjac
Symmetry (2023) Vol. 15, Iss. 5, pp. 1015-1015
Open Access | Times Cited: 8
Upgrading script watermarking robustness of unusual-to-tolerate functional confirmation by secret-sharing
Adnan Gutub, Esraa Almehmadi
Journal of Engineering Research (2023) Vol. 11, Iss. 4, pp. 392-403
Open Access | Times Cited: 6
Adnan Gutub, Esraa Almehmadi
Journal of Engineering Research (2023) Vol. 11, Iss. 4, pp. 392-403
Open Access | Times Cited: 6
Enhanced Steganography for High Dynamic Range Images with Improved Security and Capacity
Tzung‐Her Chen, Jing-Ya Yan
Applied Sciences (2023) Vol. 13, Iss. 15, pp. 8865-8865
Open Access | Times Cited: 6
Tzung‐Her Chen, Jing-Ya Yan
Applied Sciences (2023) Vol. 13, Iss. 15, pp. 8865-8865
Open Access | Times Cited: 6
An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images
B. Madhushree, Halaguru Basavarajappa Basanth Kumar, H. R. Chennamma
Multimedia Tools and Applications (2023) Vol. 83, Iss. 13, pp. 39779-39821
Closed Access | Times Cited: 6
B. Madhushree, Halaguru Basavarajappa Basanth Kumar, H. R. Chennamma
Multimedia Tools and Applications (2023) Vol. 83, Iss. 13, pp. 39779-39821
Closed Access | Times Cited: 6
A novel scheme for random sequential high-capacity data hiding based on PVD and LSB
Wanqing Wu, Huili Li
Signal Image and Video Processing (2023) Vol. 18, Iss. 3, pp. 2277-2287
Open Access | Times Cited: 4
Wanqing Wu, Huili Li
Signal Image and Video Processing (2023) Vol. 18, Iss. 3, pp. 2277-2287
Open Access | Times Cited: 4
Steganography-based facial re-enactment using generative adversarial networks
Vijay Kumar, Sahil Sharma
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 7609-7630
Closed Access | Times Cited: 4
Vijay Kumar, Sahil Sharma
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 7609-7630
Closed Access | Times Cited: 4
Assured Unlock: A Mobile App for Dual-Layer Encryption to Enhance Data Security
A. Goyal, Ashish Gupta, Kuldeep Chaurasia, et al.
(2024), pp. 514-519
Closed Access | Times Cited: 1
A. Goyal, Ashish Gupta, Kuldeep Chaurasia, et al.
(2024), pp. 514-519
Closed Access | Times Cited: 1
Advancing data privacy in color images through pixel-specific data hiding techniques
Murat Uzun, Serdar Solak
Computers & Electrical Engineering (2024) Vol. 118, pp. 109442-109442
Closed Access | Times Cited: 1
Murat Uzun, Serdar Solak
Computers & Electrical Engineering (2024) Vol. 118, pp. 109442-109442
Closed Access | Times Cited: 1
A Fast and Low Distortion Image Steganography Framework Based on Nature-Inspired Optimizers
Magdy M. Fadel, Wael Said, Esam A. A. Hagras, et al.
IEEE Access (2023) Vol. 11, pp. 125768-125789
Open Access | Times Cited: 2
Magdy M. Fadel, Wael Said, Esam A. A. Hagras, et al.
IEEE Access (2023) Vol. 11, pp. 125768-125789
Open Access | Times Cited: 2
Survey in Image and Audio Steganography by using the Deep Learning Methods
Zeina Al Hadad, Ibtisam Hassoun Ali
Journal of Kufa for Mathematics and Computer (2023) Vol. 10, Iss. 2, pp. 132-139
Open Access | Times Cited: 1
Zeina Al Hadad, Ibtisam Hassoun Ali
Journal of Kufa for Mathematics and Computer (2023) Vol. 10, Iss. 2, pp. 132-139
Open Access | Times Cited: 1
Enhancing Data Hiding with Deep Steganography: Leveraging Cnns and Loss Function Optimization for Robustness and Quality
P. Malathi, T. Gireesh Kumar
(2024)
Closed Access
P. Malathi, T. Gireesh Kumar
(2024)
Closed Access
Image steganography without embedding by carrier secret information for secure communication in networks
Yangwen Zhang, Yuling Chen, Hui Dou, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308265-e0308265
Open Access
Yangwen Zhang, Yuling Chen, Hui Dou, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308265-e0308265
Open Access
Image Steganography Using Responsible Artificial Intelligence Technique
Narendra Kumar Chahar, Arvind Dhaka, Amita Nandal, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 185-206
Closed Access
Narendra Kumar Chahar, Arvind Dhaka, Amita Nandal, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 185-206
Closed Access
Image steganography in the IoMT and telemedicine: Residual and Enhanced Discriminative Network
N. V. Balaji, Sorabh Sharma, Ashok Kumar Sahoo, et al.
(2024), pp. 1-7
Closed Access
N. V. Balaji, Sorabh Sharma, Ashok Kumar Sahoo, et al.
(2024), pp. 1-7
Closed Access
Deep learning based active image steganalysis: a review
Punam Bedi, Anuradha Singhal, Veenu Bhasin
International Journal of Systems Assurance Engineering and Management (2023) Vol. 15, Iss. 3, pp. 786-799
Closed Access
Punam Bedi, Anuradha Singhal, Veenu Bhasin
International Journal of Systems Assurance Engineering and Management (2023) Vol. 15, Iss. 3, pp. 786-799
Closed Access