{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T04:24:02Z","timestamp":1767846242267,"version":"3.49.0"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,1,28]],"date-time":"2017-01-28T00:00:00Z","timestamp":1485561600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11042-017-4374-x","type":"journal-article","created":{"date-parts":[[2017,1,28]],"date-time":"2017-01-28T02:28:56Z","timestamp":1485570536000},"page":"2013-2032","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps"],"prefix":"10.1007","volume":"77","author":[{"given":"Daniel","family":"Souza","sequence":"first","affiliation":[]},{"given":"Aquiles","family":"Burlamaqui","sequence":"additional","affiliation":[]},{"given":"Guido","family":"Souza Filho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,28]]},"reference":[{"key":"4374_CR1","doi-asserted-by":"crossref","unstructured":"Abraham J, Gao J, Kwan P (2011) Fingerprint matching using a hybrid shape and orientation descriptor. INTECH Open Access Publisher","DOI":"10.5772\/19105"},{"issue":"3","key":"4374_CR2","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.optlaseng.2012.09.008","volume":"51","author":"MR Abuturab","year":"2013","unstructured":"Abuturab MR (2013) Color image security system based on discrete hartley transform in gyrator transform domain. Opt Lasers Eng 51(3):317\u2013324","journal-title":"Opt Lasers Eng"},{"issue":"21","key":"4374_CR3","doi-asserted-by":"crossref","first-page":"5133","DOI":"10.1364\/AO.52.005133","volume":"52","author":"MR Abuturab","year":"2013","unstructured":"Abuturab MR (2013) Information authentication system using interference of two beams in gyrator transform domain. Appl Opt 52(21):5133\u20135142","journal-title":"Appl Opt"},{"issue":"31","key":"4374_CR4","doi-asserted-by":"crossref","first-page":"5933","DOI":"10.1364\/AO.48.005933","volume":"48","author":"A Alfalou","year":"2009","unstructured":"Alfalou A, Mansour A (2009) Double random phase encryption scheme to multiplex and simultaneous encode multiple images. Appl Opt 48(31):5933\u20135947","journal-title":"Appl Opt"},{"key":"4374_CR5","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.comnet.2016.01.006","volume":"101","author":"R Amin","year":"2016","unstructured":"Amin R, Islam SH, Biswas G, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42\u201362","journal-title":"Comput Netw"},{"key":"4374_CR6","doi-asserted-by":"crossref","unstructured":"Anzaku ET, Sohn H, Ro YM (2010) Multi-factor authentication using fingerprints and user-specific random projection. In: APWeb, pp 415\u2013418","DOI":"10.1109\/APWeb.2010.44"},{"key":"4374_CR7","first-page":"162","volume-title":"Fault based cryptanalysis of the advanced encryption standard (AES)","author":"J Bl\u00f6mer","year":"2003","unstructured":"Bl\u00f6mer J, Seifert JP (2003) Fault based cryptanalysis of the advanced encryption standard (AES). Springer, Berlin Heidelberg, pp 162\u2013181"},{"issue":"2","key":"4374_CR8","first-page":"525","volume":"52","author":"SE Borujeni","year":"2013","unstructured":"Borujeni SE, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52(2):525\u2013537","journal-title":"Telecommun Syst"},{"key":"4374_CR9","unstructured":"Cavoukian A, Stoianov A et al (2009) Biometric encryption chapter from the encyclopedia of biometrics. Office of the Information and Privacy Commissioner"},{"issue":"6","key":"4374_CR10","doi-asserted-by":"crossref","first-page":"7349","DOI":"10.1364\/OE.22.007349","volume":"22","author":"Jx Chen","year":"2014","unstructured":"Chen Jx, Zhu Zl, Liu Z, Fu C, Zhang Lb, Yu H (2014) A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains. Opt Express 22(6):7349\u20137361","journal-title":"Opt Express"},{"key":"4374_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2014.08.010","volume":"66","author":"Jx Chen","year":"2015","unstructured":"Chen Jx, Zhu Zl, Fu C, Zhang Lb, Yu H (2015) Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains. Opt Lasers Eng 66:1\u20139","journal-title":"Opt Lasers Eng"},{"key":"4374_CR12","unstructured":"Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media"},{"issue":"1","key":"4374_CR13","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis Y, Ostrovsky R, Reyzin L, Smith A (2008) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J Comput 38(1):97\u2013139","journal-title":"SIAM J Comput"},{"issue":"15","key":"4374_CR14","doi-asserted-by":"crossref","first-page":"2533","DOI":"10.1109\/JLT.2013.2267891","volume":"31","author":"AM Elshamy","year":"2013","unstructured":"Elshamy AM, Rashed AN, Mohamed AENA, Faragalla OS, Mu Y, Alshebeili SA, Abd El-Samie F (2013) Optical image encryption based on chaotic baker map and double random phase encoding. J Lightwave Technol 31(15):2533\u20132539","journal-title":"J Lightwave Technol"},{"issue":"23","key":"4374_CR15","doi-asserted-by":"crossref","first-page":"5645","DOI":"10.1364\/AO.52.005645","volume":"52","author":"D Fan","year":"2013","unstructured":"Fan D, Meng X, Wang Y, Yang X, Peng X, He W, Dong G, Chen H (2013) Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. Appl Opt 52(23):5645\u20135652","journal-title":"Appl Opt"},{"issue":"11","key":"4374_CR16","doi-asserted-by":"crossref","first-page":"3204","DOI":"10.1364\/AO.54.003204","volume":"54","author":"D Fan","year":"2015","unstructured":"Fan D, Meng X, Wang Y, Yang X, Pan X, Peng X, He W, Dong G, Chen H (2015) Multiple-image authentication with a cascaded multilevel architecture based on amplitude field random sampling and phase information multiplexing. Appl Opt 54(11):3204\u20133215","journal-title":"Appl Opt"},{"issue":"1","key":"4374_CR17","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/TIFS.2009.2038760","volume":"5","author":"YC Feng","year":"2010","unstructured":"Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Trans Inf Forens Secur 5(1):103\u2013117","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"4374_CR18","doi-asserted-by":"crossref","unstructured":"Fleischhacker N, Manulis M, Azodi A (2014) A modular framework for multi-factor authentication and key exchange. In: Security standardisation research. Springer, pp 190\u2013214","DOI":"10.1007\/978-3-319-14054-4_12"},{"issue":"6","key":"4374_CR19","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/0375-9601(84)90993-9","volume":"105","author":"T Geisel","year":"1984","unstructured":"Geisel T, Fairen V (1984) Statistical properties of chaos in chebyshev maps. Phys Lett A 105(6):263\u2013266","journal-title":"Phys Lett A"},{"issue":"2","key":"4374_CR20","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s10845-012-0669-y","volume":"25","author":"W Go","year":"2014","unstructured":"Go W, Lee K, Kwak J (2014) Construction of a secure two-factor user authentication system using fingerprint information and password. J Intell Manuf 25 (2):217\u2013230","journal-title":"J Intell Manuf"},{"issue":"3","key":"4374_CR21","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S0969-4765(15)30036-9","volume":"2015","author":"G Haupt","year":"2015","unstructured":"Haupt G, Mozer T (2015) Assessing biometric authentication: a holistic approach to accuracy. Biom Technol Today 2015(3):5\u20138","journal-title":"Biom Technol Today"},{"issue":"32","key":"4374_CR22","doi-asserted-by":"crossref","first-page":"7750","DOI":"10.1364\/AO.51.007750","volume":"51","author":"W He","year":"2012","unstructured":"He W, Peng X, Meng X, Liu X (2012) Optical hierarchical authentication based on interference and hash function. Appl Opt 51(32):7750\u20137757","journal-title":"Appl Opt"},{"issue":"8","key":"4374_CR23","doi-asserted-by":"crossref","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390\u20131397","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"4374_CR24","doi-asserted-by":"crossref","unstructured":"Jassim S, Al-Assam H, Sellahewa H (2009) Improving performance and security of biometrics using efficient and stable random projection techniques. In: Proceedings of 6th international symposium on image and signal processing and analysis, 2009. ISPA 2009. IEEE, pp 556\u2013561","DOI":"10.1109\/ISPA.2009.5297690"},{"issue":"3","key":"4374_CR25","doi-asserted-by":"crossref","first-page":"935","DOI":"10.1117\/1.601259","volume":"36","author":"B Javidi","year":"1997","unstructured":"Javidi B, Sergent A (1997) Fully phase encoded key and biometrics for security verification. Optical Eng 36(3):935\u2013942","journal-title":"Optical Eng"},{"issue":"26","key":"4374_CR26","doi-asserted-by":"crossref","first-page":"6247","DOI":"10.1364\/AO.37.006247","volume":"37","author":"B Javidi","year":"1998","unstructured":"Javidi B, Ahouzi E (1998) Optical security system with fourier plane encoding. Appl Opt 37(26):6247\u20136255","journal-title":"Appl Opt"},{"key":"4374_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2014.02.011","volume":"269","author":"J Kang","year":"2014","unstructured":"Kang J, Nyang D, Lee K (2014) Two-factor face authentication using matrix permutation transformation and a user password. Inform Sci 269:1\u201320","journal-title":"Inform Sci"},{"issue":"13","key":"4374_CR28","doi-asserted-by":"crossref","first-page":"3026","DOI":"10.1016\/j.neucom.2007.12.017","volume":"71","author":"MK Khan","year":"2008","unstructured":"Khan MK, Zhang J (2008) Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71(13):3026\u20133031","journal-title":"Neurocomputing"},{"issue":"5","key":"4374_CR29","doi-asserted-by":"crossref","first-page":"1749","DOI":"10.1016\/j.chaos.2005.12.015","volume":"32","author":"MK Khan","year":"2007","unstructured":"Khan MK, Zhang J, Tian L (2007) Chaotic secure content-based hidden transmission of biometric templates. Chaos Solitons Fract 32(5):1749\u20131759","journal-title":"Chaos Solitons Fract"},{"issue":"2","key":"4374_CR30","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/j.patcog.2014.08.024","volume":"48","author":"SH Khan","year":"2015","unstructured":"Khan SH, Akbar MA, Shahzad F, Farooq M, Khan Z (2015) Secure biometric template generation for multi-factor authentication. Pattern Recog 48(2):458\u2013472","journal-title":"Pattern Recog"},{"issue":"4","key":"4374_CR31","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/j.optcom.2004.11.066","volume":"247","author":"J Kim","year":"2005","unstructured":"Kim J, Choi J, An J, Kim N, Lee K (2005) Digital holographic security system based on random phase encoded reference beams and fingerprint identification. Opt Commun 247(4):265\u2013274","journal-title":"Opt Commun"},{"issue":"10","key":"4374_CR32","doi-asserted-by":"crossref","first-page":"2365","DOI":"10.1016\/j.ijleo.2013.10.066","volume":"125","author":"D Kong","year":"2014","unstructured":"Kong D, Shen X, Shen Y, Wang X (2014) Multi-image encryption based on interference of computer generated hologram. Optik-Int J Light Electron Opt 125 (10):2365\u20132368","journal-title":"Optik-Int J Light Electron Opt"},{"key":"4374_CR33","doi-asserted-by":"crossref","unstructured":"Kumar A, Lee HJ (2013) Multi-factor authentication process using more than one token with watermark security. In: Future information communication technology and applications. Springer, pp 579\u2013587","DOI":"10.1007\/978-94-007-6516-0_65"},{"issue":"13","key":"4374_CR34","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1364\/AO.50.001805","volume":"50","author":"P Kumar","year":"2011","unstructured":"Kumar P, Joseph J, Singh K (2011) Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. Appl Opt 50(13):1805\u20131811","journal-title":"Appl Opt"},{"key":"4374_CR35","unstructured":"Kwan PW, Gao J, Guo Y (2006) Fingerprint matching using enhanced shape context. In: Proceedings of the image and vision computing New Zealand. Citeseer, pp 115\u2013120"},{"issue":"6","key":"4374_CR36","doi-asserted-by":"crossref","first-page":"1979","DOI":"10.1016\/j.jnca.2011.07.003","volume":"34","author":"L Leng","year":"2011","unstructured":"Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979\u20131989","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"4374_CR37","doi-asserted-by":"crossref","first-page":"1979","DOI":"10.1016\/j.jnca.2011.07.003","volume":"34","author":"L Leng","year":"2011","unstructured":"Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979\u20131989. Control and Optimization over Wireless Networks","journal-title":"J Netw Comput Appl"},{"key":"4374_CR38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2012.08.028","volume":"108","author":"L Leng","year":"2013","unstructured":"Leng L, Zhang J (2013) Palmhash code vs. palmphasor code. Neurocomputing 108:1\u201312","journal-title":"Neurocomputing"},{"issue":"11","key":"4374_CR39","doi-asserted-by":"crossref","first-page":"1860","DOI":"10.1002\/sec.900","volume":"7","author":"L Leng","year":"2014","unstructured":"Leng L, Teoh ABJ, Li M, Khan MK (2014) A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur Commun Netw 7(11): 1860\u20131871","journal-title":"Secur Commun Netw"},{"issue":"20","key":"4374_CR40","doi-asserted-by":"crossref","first-page":"3876","DOI":"10.1016\/j.ins.2010.06.040","volume":"180","author":"H Li","year":"2010","unstructured":"Li H, Zhang J, Zhang Z (2010) Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes. Inform Sci 180 (20):3876\u20133893","journal-title":"Inform Sci"},{"issue":"7","key":"4374_CR41","doi-asserted-by":"crossref","first-page":"1704","DOI":"10.1016\/j.optcom.2011.11.115","volume":"285","author":"J Li","year":"2012","unstructured":"Li J, Zheng T, Liu Qz, Li R (2012) Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography. Opt Commun 285(7):1704\u20131709","journal-title":"Opt Commun"},{"issue":"18","key":"4374_CR42","doi-asserted-by":"crossref","first-page":"1605","DOI":"10.1016\/j.ijleo.2011.08.031","volume":"123","author":"J Li","year":"2012","unstructured":"Li J, Zheng T, Liu Qz, Li R (2012) Image encryption with two-step-only quadrature phase-shifting digital holography. Optik-Int J Light Electron Opt 123 (18):1605\u20131608","journal-title":"Optik-Int J Light Electron Opt"},{"key":"4374_CR43","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1016\/j.optlaseng.2013.12.002","volume":"55","author":"J Li","year":"2014","unstructured":"Li J, Li J, Pan Y, Li R (2014) Optical image hiding with a modified mach\u2013zehnder interferometer. Opt Lasers Eng 55:258\u2013261","journal-title":"Opt Lasers Eng"},{"issue":"10","key":"4374_CR44","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320\u20133327","journal-title":"Comput Math Appl"},{"issue":"1","key":"4374_CR45","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.optlaseng.2012.08.004","volume":"51","author":"Z Liu","year":"2013","unstructured":"Liu Z, Li S, Liu W, Wang Y, Liu S (2013) Image encryption algorithm by using fractional fourier transform and pixel scrambling operation based on double random phase encoding. Opt Lasers Eng 51(1):8\u201314","journal-title":"Opt Lasers Eng"},{"key":"4374_CR46","unstructured":"Miller FP, Vandome AF, McBrewster J (2009) Advanced encryption standard. Alpha Press"},{"issue":"8","key":"4374_CR47","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1016\/j.patrec.2009.07.003","volume":"31","author":"A Nagar","year":"2010","unstructured":"Nagar A, Nandakumar K, Jain AK (2010) A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recog Lett 31(8):733\u2013741","journal-title":"Pattern Recog Lett"},{"key":"4374_CR48","unstructured":"Nandakumar K (2008) Multibiometric systems: fusion strategies and template security. ProQuest"},{"key":"4374_CR49","doi-asserted-by":"crossref","unstructured":"Nguyen TAT, Nguyen DT, Dang TK (2015) A multi-factor biometric based remote authentication using fuzzy commitment and non-invertible transformation. In: Information and communication technology-EurAsia conference. Springer, pp 77\u201388","DOI":"10.1007\/978-3-319-24315-3_8"},{"issue":"6\u201310","key":"4374_CR50","first-page":"91","volume":"43","author":"CH Niu","year":"2012","unstructured":"Niu CH, Wang XL, Mao XH (2012) Multiple-image hiding based on interference principle. Opt Quant Electron 43(6\u201310):91\u201399","journal-title":"Opt Quant Electron"},{"issue":"8","key":"4374_CR51","doi-asserted-by":"crossref","first-page":"2031","DOI":"10.1117\/1.1304844","volume":"39","author":"T Nomura","year":"2000","unstructured":"Nomura T, Javidi B (2000) Optical encryption using a joint transform correlator architecture. Opt Eng 39(8):2031\u20132035","journal-title":"Opt Eng"},{"issue":"8","key":"4374_CR52","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1364\/OL.31.001044","volume":"31","author":"X Peng","year":"2006","unstructured":"Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31(8):1044\u20131046","journal-title":"Opt Lett"},{"issue":"4","key":"4374_CR53","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1364\/AO.52.000871","volume":"52","author":"SK Rajput","year":"2013","unstructured":"Rajput SK, Nishchal NK (2013) Known-plaintext attack-based optical cryptosystem using phase-truncated fresnel transform. Appl Opt 52(4):871\u2013878","journal-title":"Appl Opt"},{"issue":"6","key":"4374_CR54","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.1364\/JOSAA.31.001233","volume":"31","author":"SK Rajput","year":"2014","unstructured":"Rajput SK, Nishchal NK (2014) An optical encryption and authentication scheme using asymmetric keys. JOSA A 31(6):1233\u20131238","journal-title":"JOSA A"},{"issue":"3","key":"4374_CR55","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1364\/AO.53.000418","volume":"53","author":"SK Rajput","year":"2014","unstructured":"Rajput SK, Nishchal NK (2014) Fresnel domain nonlinear optical image encryption scheme based on gerchberg\u2013saxton phase-retrieval algorithm. Appl Opt 53 (3):418\u2013425","journal-title":"Appl Opt"},{"issue":"1","key":"4374_CR56","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2011-1","volume":"2011","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 2011(1):1","journal-title":"EURASIP J Inf Secur"},{"issue":"7","key":"4374_CR57","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Opt Lett 20(7):767\u2013769","journal-title":"Opt Lett"},{"issue":"1","key":"4374_CR58","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.chaos.2007.07.083","volume":"40","author":"R Rhouma","year":"2009","unstructured":"Rhouma R, Meherzi S, Belghith S (2009) Ocml-based colour image encryption. Chaos Solitons Fractals 40(1):309\u2013318","journal-title":"Chaos Solitons Fractals"},{"issue":"1","key":"4374_CR59","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.optcom.2009.09.002","volume":"283","author":"N Saini","year":"2010","unstructured":"Saini N, Sinha A (2010) Optics based biometric encryption using log polar transform. Opt Commun 283(1):34\u201343","journal-title":"Opt Commun"},{"issue":"3","key":"4374_CR60","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1016\/j.optcom.2010.10.007","volume":"284","author":"N Saini","year":"2011","unstructured":"Saini N, Sinha A (2011) Soft biometrics in conjunction with optics based biohashing. Opt Commun 284(3):756\u2013763","journal-title":"Opt Commun"},{"issue":"8","key":"4374_CR61","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1016\/j.optlaseng.2013.03.006","volume":"51","author":"N Saini","year":"2013","unstructured":"Saini N, Sinha A (2013) Biometrics based key management of double random phase encoding scheme using error control codes. Opt Lasers Eng 51(8):1014\u20131022","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"4374_CR62","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.optcom.2004.01.002","volume":"232","author":"G Situ","year":"2004","unstructured":"Situ G, Zhang J (2004) A lensless optical security system based on computer-generated phase only masks. Opt Commun 232(1):115\u2013122","journal-title":"Opt Commun"},{"key":"4374_CR63","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.optlastec.2012.11.020","volume":"48","author":"L Sui","year":"2013","unstructured":"Sui L, Gao B (2013) Color image encryption based on gyrator transform and arnold transform. Opt Laser Technol 48:530\u2013538","journal-title":"Opt Laser Technol"},{"key":"4374_CR64","unstructured":"Wang H (2012) A no interference method for image encryption and decryption by an optical system of a fractional fourier transformation and a fourier transformation. In: Advances in multimedia, software engineering and computing, vol 1. Springer, pp 671\u2013676"},{"issue":"23","key":"4374_CR65","doi-asserted-by":"crossref","first-page":"28,077","DOI":"10.1364\/OE.22.028077","volume":"22","author":"X Wang","year":"2014","unstructured":"Wang X, Chen W, Chen X (2014) Optical binary image encryption using aperture-key and dual wavelengths. Opt Express 22(23):28,077\u201328,085","journal-title":"Opt Express"},{"issue":"5","key":"4374_CR66","doi-asserted-by":"crossref","first-page":"6239","DOI":"10.1364\/OE.23.006239","volume":"23","author":"X Wang","year":"2015","unstructured":"Wang X, Chen W, Chen X (2015) Optical information authentication using compressed double-random-phase-encoded images and quick-response codes. Opt Express 23(5):6239\u20136253","journal-title":"Opt Express"},{"issue":"11","key":"4374_CR67","doi-asserted-by":"crossref","first-page":"3477","DOI":"10.1007\/s11128-013-0612-y","volume":"12","author":"YG Yang","year":"2013","unstructured":"Yang YG, Xia J, Jia X, Zhang H (2013) Novel image encryption\/decryption based on quantum fourier transform and double phase encoding. Quant Inf Process 12(11):3477\u20133493","journal-title":"Quant Inf Process"},{"key":"4374_CR68","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.optlastec.2013.05.021","volume":"54","author":"S Yuan","year":"2013","unstructured":"Yuan S, Zhang T, Zhou X, Liu X, Liu M (2013) An optical authentication system based on encryption technique and multimodal biometrics. Opt Laser Technol 54:120\u2013127","journal-title":"Opt Laser Technol"},{"key":"4374_CR69","unstructured":"Zhang J, Khan MK (2011) Cancelable palmcode generated from randomized gabor filters for palmprint template protection"},{"issue":"21","key":"4374_CR70","doi-asserted-by":"crossref","first-page":"2443","DOI":"10.1364\/OL.33.002443","volume":"33","author":"Y Zhang","year":"2008","unstructured":"Zhang Y, Wang B (2008) Optical image encryption based on interference. Opt Lett 33(21):2443\u20132445","journal-title":"Opt Lett"},{"issue":"4","key":"4374_CR71","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.optlaseng.2012.11.001","volume":"51","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Xiao D (2013) Double optical image encryption using discrete chirikov standard map and chaos-based fractional random transform. Opt Lasers Eng 51(4):472\u2013480","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"4374_CR72","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1007\/s11128-015-0926-z","volume":"14","author":"NR Zhou","year":"2015","unstructured":"Zhou NR, Hua TX, Gong LH, Pei DJ, Liao QH (2015) Quantum image encryption based on generalized arnold transform and double random-phase encoding. Quant Inf Process 14(4):1193\u20131213","journal-title":"Quant Inf Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4374-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4374-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4374-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,16]],"date-time":"2018-01-16T06:50:00Z","timestamp":1516085400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4374-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,28]]},"references-count":72,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["4374"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4374-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,28]]}}}