{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:56:34Z","timestamp":1769918194564,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T00:00:00Z","timestamp":1490918400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11042-017-4637-6","type":"journal-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T07:14:18Z","timestamp":1490944458000},"page":"4585-4608","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":233,"title":["Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram"],"prefix":"10.1007","volume":"77","author":[{"given":"Chuying","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jianzhong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuechang","family":"Ren","sequence":"additional","affiliation":[]},{"given":"B. B.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,31]]},"reference":[{"key":"4637_CR1","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1016\/j.optcom.2010.04.056","volume":"283","author":"A Akhshani","year":"2010","unstructured":"Akhshani A, Behnia S, Akhavan A, Abu Hassan H, Hassan Z (2010) A novel scheme for image encryption based on 2D piecewise chaotic maps. Opt Commun 283:3259\u20133266","journal-title":"Opt Commun"},{"key":"4637_CR2","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.optlaseng.2016.07.010","volume":"88","author":"A Belazi","year":"2017","unstructured":"Belazi A, El-Latif AAA, Diaconu AV, Rhouma R, Belghit S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37\u201350","journal-title":"Opt Lasers Eng"},{"issue":"19","key":"4637_CR3","doi-asserted-by":"crossref","first-page":"1808","DOI":"10.1364\/OL.28.001808","volume":"28","author":"LZ Cai","year":"2003","unstructured":"Cai LZ, Liu Q, Yang XL (2003) Phase-shift extraction and wave-front reconstruction in phase-shifting interferometry with arbitrary phase steps. Opt Lett 28(19):1808\u20131810","journal-title":"Opt Lett"},{"key":"4637_CR4","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/s10851-014-0511-6","volume":"51","author":"BJ Chen","year":"2015","unstructured":"Chen BJ, Shu HZ, Coatrieux G, Chen G, Sun XM, Coatrieux JL (2015) Color image analysis by quaternion-type moments. J Math Imaging Vision 51:124\u2013144","journal-title":"J Math Imaging Vision"},{"key":"4637_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2622697","author":"ZJ Fu","year":"2016","unstructured":"Fu ZJ, Huang FX, Sun XM, Vasilakos AV, Yang CN (2016) Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Serv Comput. doi: 10.1109\/TSC.2016.2622697","journal-title":"IEEE Trans Serv Comput"},{"key":"4637_CR6","volume-title":"Digital image processing","author":"RC Gonzalez","year":"2007","unstructured":"Gonzalez RC, Woods RE (2007) Digital image processing, 3rd edn. Prentice Hall, New Jersey, USA Chapter 5","edition":"3"},{"key":"4637_CR7","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"ZY Hua","year":"2016","unstructured":"Hua ZY, Zhou YC (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci 339:237\u2013253","journal-title":"Inf Sci"},{"key":"4637_CR8","doi-asserted-by":"crossref","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Chen XF, Li MQ, Li JW, Lee P, Lou WJ (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25:1615\u20131625","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"4637_CR9","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"Li J, Li JW, Chen XF, Jia CF, Lou WJ (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64:425\u2013437","journal-title":"IEEE Trans Comput"},{"key":"4637_CR10","doi-asserted-by":"publisher","unstructured":"Li J, Yan HY, Liu ZL, Chen XF, Huang XY, Wong DS Location-sharing systems with enhanced privacy in mobile online social networks. IEEE Sys J. doi: 10.1109\/JSYST.2015.2415835","DOI":"10.1109\/JSYST.2015.2415835"},{"key":"4637_CR11","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1016\/j.ijleo.2010.06.039","volume":"122","author":"ZJ Liu","year":"2011","unstructured":"Liu ZJ, Zhang Y, Zhao HF et al (2011) Optical multi-image encryption based on frequency shift. Optik 122:1010\u20131013","journal-title":"Optik"},{"key":"4637_CR12","doi-asserted-by":"crossref","first-page":"4002","DOI":"10.1002\/sec.1582","volume":"9","author":"Q Liu","year":"2016","unstructured":"Liu Q, Cai WD, Shen J, Fu ZJ, Liu XD, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Networks 9:4002\u20134012","journal-title":"Secur Commun Networks"},{"key":"4637_CR13","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.optcom.2004.02.052","volume":"235","author":"NK Nischal","year":"2004","unstructured":"Nischal NK, Joseph J, Singh K (2004) Securing information using fractional Fourier transform in digital holography. Opt Commun 235:253\u2013259","journal-title":"Opt Commun"},{"key":"4637_CR14","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett 20:767\u2013769","journal-title":"Opt. Lett"},{"key":"4637_CR15","doi-asserted-by":"crossref","first-page":"4932","DOI":"10.1364\/OE.22.004932","volume":"22","author":"ZH Shao","year":"2014","unstructured":"Shao ZH, Shu HZ, Wu JS, Dong ZF, Coatrieux G, Coatrieux JL (2014) Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain. Opt Express 22:4932\u20134943","journal-title":"Opt Express"},{"key":"4637_CR16","doi-asserted-by":"crossref","first-page":"1408","DOI":"10.1016\/j.dsp.2009.10.015","volume":"20","author":"JJ Shen","year":"2010","unstructured":"Shen JJ, Ren JM (2010) A robust associative watermarking technique based on vector quantization. Digital Signal Process 20:1408\u20131423","journal-title":"Digital Signal Process"},{"key":"4637_CR17","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.optlaseng.2007.09.001","volume":"46","author":"N Singh","year":"2008","unstructured":"Singh N, Sinha A (2008) Optical image encryption using fractional Fourier transform and chaos. Opt Lasers Eng 46:117\u2013123","journal-title":"Opt Lasers Eng"},{"key":"4637_CR18","doi-asserted-by":"crossref","first-page":"1584","DOI":"10.1364\/OL.29.001584","volume":"29","author":"GH Situ","year":"2004","unstructured":"Situ GH, Zhang JJ (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29:1584\u20131586","journal-title":"Opt Lett"},{"issue":"2","key":"4637_CR19","first-page":"22","volume":"16","author":"AE Todd","year":"2007","unstructured":"Todd AE, Stephen JS (2007) Hypercomplex Fourier transforms of color images. IEEE Trans Image Process 16(2):22\u201335","journal-title":"IEEE Trans Image Process"},{"key":"4637_CR20","doi-asserted-by":"crossref","first-page":"S189","DOI":"10.1088\/1464-4258\/5\/5\/363","volume":"5","author":"R Tudela","year":"2003","unstructured":"Tudela R, Badosa EM, Labastida I, Vallmitjana S, Juvells I, Carnicer A (2003) Full complex Fresnel holograms displayed on liquid crystal devices. J Opt A Pure Appl Opt 5:S189\u2013S194","journal-title":"J Opt A Pure Appl Opt"},{"key":"4637_CR21","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.optlastec.2012.10.037","volume":"48","author":"Q Wang","year":"2013","unstructured":"Wang Q, Guo Q, Lei L (2013) Double image encryption based on phase-amplitude mixed encoding and multistage phase encoding in gyrator transform domains. Opt Laser Technol 48:267\u2013279","journal-title":"Opt Laser Technol"},{"key":"4637_CR22","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.optcom.2015.01.045","volume":"344","author":"Y Wang","year":"2015","unstructured":"Wang Y, Quan C, Tay CJ (2015) Optical color image encryption without information disclosure using phase-truncated Fresnel transform and a random amplitude mask. Opt Commun 344:147\u2013155","journal-title":"Opt Commun"},{"key":"4637_CR23","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"ZH Xia","year":"2016","unstructured":"Xia ZH, Wang XH, Zhang LG, Qin Z, Sun XM, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11:2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4637_CR24","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.sigpro.2016.10.002","volume":"132","author":"EY Xie","year":"2017","unstructured":"Xie EY, Li C, Yu S, L\u00fc J (2017) On the cryptanalysis of Fridrich's chaotic image encryption scheme. Signal Process 132:150\u2013154","journal-title":"Signal Process"},{"key":"4637_CR25","volume-title":"Computer-generated hologram","author":"ZL Yu","year":"1984","unstructured":"Yu ZL, Jin GF (1984) Computer-generated hologram. Tsinghua University Press, Beijing Chap. 4"},{"key":"4637_CR26","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.optlastec.2011.11.014","volume":"44","author":"S Yuan","year":"2012","unstructured":"Yuan S, Xin YH, Liu MT, Yao SX, Sun XJ (2012) An improved method to enhance the security of double random-phase encoding in the Fresnel domain. Opt Laser Technol 44:51\u201356","journal-title":"Opt Laser Technol"},{"issue":"9","key":"4637_CR27","doi-asserted-by":"crossref","first-page":"9684","DOI":"10.1364\/OE.18.009684","volume":"18","author":"S Zhang","year":"2010","unstructured":"Zhang S, Weide DVD, Oliver J (2010) Superfast phase-shifting method for 3-D shape measurement. Opt. Express 18(9):9684\u20139689","journal-title":"Opt. Express"},{"key":"4637_CR28","doi-asserted-by":"crossref","first-page":"961","DOI":"10.3233\/IFS-141378","volume":"28","author":"YH Zheng","year":"2015","unstructured":"Zheng YH, Jeon B, Xu DH, Wu QM, Zhang H (2015) Image segmentation by generalized hierarchical fuzzy C-means algorithm. J Intell Fuzzy Syst 28:961\u2013973","journal-title":"J Intell Fuzzy Syst"},{"key":"4637_CR29","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1587\/transinf.2015EDP7341","volume":"E99-D","author":"ZL Zhou","year":"2016","unstructured":"Zhou ZL, Yang CN, Chen BJ, Sun XM, Liu Q, Wu QM (2016) Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans Inf Syst E99-D:1531\u20131540","journal-title":"IEICE Trans Inf Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4637-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4637-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4637-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,4]],"date-time":"2020-10-04T18:39:41Z","timestamp":1601836781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4637-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,31]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["4637"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4637-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,31]]}}}