Retraction

Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique

Citations (75)

75
Total Citations
8
Post-Retraction
(10.7%)
67
Pre-Retraction
0
Same Day
Post-Retraction Citation Analysis
1 Within 30 days
5 Within 1 year
0 After 2+ years
685 Days since retraction (latest)
DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data
Prabir Kumar Naskar, Soumya Paul, Dipta Nandy et al. (4 authors)
Multimedia Tools and Applications
Published: May 2019
45 citations
1488 days before retraction
The influence mechanism of financial and monetary policy on economic restructuring based on wireless network technology
Yu Ma
Journal of Intelligent & Fuzzy Systems
Published: May 2019
2 citations
1488 days before retraction
English teaching practice based on artificial intelligence technology
Yi Bin, Durbadal Mandal
Journal of Intelligent & Fuzzy Systems
Published: May 2019
120 citations
1488 days before retraction
Research on anti-glycation activity based on dynamic particle swarm optimization for BP neural network
Liu Bingfeng
Journal of Intelligent & Fuzzy Systems
Published: May 2019
4 citations
1495 days before retraction
Study on the effect of hypertensive treatment based on drug factor analysis model under the background of big data
Yan Zhao, Jiajing Le, Lifeng Zhu et al. (4 authors)
Journal of Intelligent & Fuzzy Systems
Published: May 2019
7 citations
1495 days before retraction
The related factors analysis of ideological and political effectiveness in self-media based on data mining
Saiyu Zhang, Jiangfeng Li, Moore Jodylf
Journal of Intelligent & Fuzzy Systems
Published: May 2019
9 citations
1495 days before retraction
Research on sensor error compensation of comprehensive logging unit based on machine learning
Haibo Liang, Haifeng Chen, Yanjun Lü
Journal of Intelligent & Fuzzy Systems
Published: May 2019
20 citations
1495 days before retraction
Numerical simulation study of gas explosion in confined space based on deep learning algorithm
Qizhong Li, Zhongqi Wang, Wang Ye
Journal of Intelligent & Fuzzy Systems
Published: May 2019
1 citation
1495 days before retraction
Computer network security evaluation simulation model based on neural network
Ying Tang, Mohamed Elhoseny
Journal of Intelligent & Fuzzy Systems
Published: May 2019
85 citations
1495 days before retraction
Bat optimization algorithm with fuzzy based PIT sharing (BF-PIT) algorithm for Named Data Networking (NDN)
P. Uma Maheswari, P. Manickam, K. Sathesh Kumar et al. (5 authors)
Journal of Intelligent & Fuzzy Systems
Published: Apr 2019
24 citations
1512 days before retraction
Region-based scalable smart system for anomaly detection in pedestrian walkways
B. S. Murugan, Mohamed Elhoseny, K. Shankar et al. (4 authors)
Computers & Electrical Engineering
Published: Feb 2019
73 citations
1568 days before retraction
Optimal Stream Encryption for Multiple Shares of Images by Improved Cuckoo Search Model
K. Shankar, Mohamed Elhoseny
Lecture notes in electrical engineering
Published: Jan 2019
2 citations
1624 days before retraction
An Optimal Light Weight Cryptography—SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks
K. Shankar, Mohamed Elhoseny
Lecture notes in electrical engineering
Published: Jan 2019
3 citations
1624 days before retraction
Multiple Share Creation with Optimal Hash Function for Image Security in WSN Aid of OGWO
K. Shankar, Mohamed Elhoseny
Lecture notes in electrical engineering
Published: Jan 2019
3 citations
1624 days before retraction
Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography
P. Manickam, K. Shankar, Eswaran Perumal et al. (5 authors)
Advanced sciences and technologies for security applications
Published: Jan 2019
29 citations
1624 days before retraction
An Optimal Lightweight Cryptographic Hash Function for Secure Image Transmission in Wireless Sensor Networks
K. Shankar, Mohamed Elhoseny
Lecture notes in electrical engineering
Published: Jan 2019
5 citations
1624 days before retraction
An Optimal Haar Wavelet with Light Weight Cryptography Based Secret Data Hiding on Digital Images in Wireless Sensor Networks
K. Shankar, Mohamed Elhoseny
Lecture notes in electrical engineering
Published: Jan 2019
1 citation
1624 days before retraction
Optimal Lightweight Encryption Based Secret Share Creation Scheme for Digital Images in Wireless Sensor Networks
K. Shankar, Mohamed Elhoseny
Lecture notes in electrical engineering
Published: Jan 2019
1 citation
1624 days before retraction
Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model
A. Sivasankari, S. Krishnaveni
Advanced sciences and technologies for security applications
Published: Jan 2019
5 citations
1624 days before retraction
Optimal Data Hiding Key in Encrypted Images Based Digital Image Security in Wireless Sensor Networks
K. Shankar, Mohamed Elhoseny
Lecture notes in electrical engineering
Published: Jan 2019
1624 days before retraction
Introduction
K. Shankar, Mohamed Elhoseny
Lecture notes in electrical engineering
Published: Jan 2019
1624 days before retraction
An Optimal Singular Value Decomposition with LWC-RECTANGLE Block Cipher Based Digital Image Watermarking in Wireless Sensor Networks
K. Shankar, Mohamed Elhoseny
Lecture notes in electrical engineering
Published: Jan 2019
4 citations
1624 days before retraction
Clustering Based Cybersecurity Model for Cloud Data
A Bhuvaneshwaran, P. Manickam, M. Ilayaraja et al. (5 authors)
Advanced sciences and technologies for security applications
Published: Jan 2019
2 citations
1624 days before retraction
Introduction to Multimedia Tools and Applications
Abdul Rahaman Wahab Sait, J. Uthayakumar, K. Shankar et al. (4 authors)
Springer eBooks
Published: Jan 2019
3 citations
1624 days before retraction
An Optimal Lightweight RECTANGLE Block Cipher for Secure Image Transmission in Wireless Sensor Networks
K. Shankar, Mohamed Elhoseny
Lecture notes in electrical engineering
Published: Jan 2019
2 citations
1624 days before retraction
Quick Stats
Total Citations: 75
Years Since Retraction: 2.4 years
Open Access: Yes
Last Checked: Jul 24, 2025
Related Papers
An intrusion identification and prevention for cloud comput…
Optik - International Journal for Light and Electron Optics • 63 citations
Incomplete big data imputation mining algorithm based on BP…
Journal of Intelligent & Fuzzy Systems • 20 citations
Application of Apriori and FP-growth algorithms in soft exa…
Journal of Intelligent & Fuzzy Systems • 10 citations
A negative selection algorithm with human-in-the-loop for a…
Journal of Intelligent & Fuzzy Systems • 0 citations
Complex smoke removal in image: Integrating frequency learn…
Journal of Intelligent & Fuzzy Systems • 0 citations