{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T21:13:34Z","timestamp":1767993214896,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T00:00:00Z","timestamp":1521504000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11042-018-5818-7","type":"journal-article","created":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T20:11:29Z","timestamp":1521576689000},"page":"25821-25840","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain"],"prefix":"10.1007","volume":"77","author":[{"given":"Zhuhong","family":"Shao","sequence":"first","affiliation":[]},{"given":"Yuanyuan","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Qingbin","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Xiaoxu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,20]]},"reference":[{"key":"5818_CR1","doi-asserted-by":"publisher","first-page":"3006","DOI":"10.1364\/AO.51.003006","volume":"51","author":"MR Abuturab","year":"2012","unstructured":"Abuturab MR (2012) Color image security system using double random-structured phase encoding in gyrator transform domain. Appl Opt 51:3006\u20133016","journal-title":"Appl Opt"},{"key":"5818_CR2","doi-asserted-by":"publisher","first-page":"104031","DOI":"10.1088\/1464-4258\/10\/10\/104031","volume":"10","author":"D Amaya","year":"2008","unstructured":"Amaya D, Tebaldi M, Torroba R, Bolognini N (2008) Digital color encryption using a multi-wavelength approach and a joint transform correlator. J Opt A Pure Appl Opt 10:104031","journal-title":"J Opt A Pure Appl Opt"},{"key":"5818_CR3","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1364\/AO.48.002099","volume":"48","author":"D Amaya","year":"2009","unstructured":"Amaya D, Tebaldi M, Torroba R, Bolognini N (2009) Wavelength multiplexing encryption using joint transform correlator architecture. Appl Opt 48:2099\u20132104","journal-title":"Appl Opt"},{"key":"5818_CR4","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/j.ins.2012.09.053","volume":"223","author":"G Bhatnagar","year":"2013","unstructured":"Bhatnagar G, Wu QMJ, Raman B (2013) Discrete fractional wavelet transform and its application to multiple encryption. Inf Sci 223:297\u2013316","journal-title":"Inf Sci"},{"key":"5818_CR5","doi-asserted-by":"publisher","first-page":"8552","DOI":"10.1364\/OE.14.008552","volume":"14","author":"L Chen","year":"2006","unstructured":"Chen L, Zhao D (2006) Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms. Opt Express 14:8552\u20138560","journal-title":"Opt Express"},{"key":"5818_CR6","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1016\/j.optlaseng.2013.01.016","volume":"51","author":"H Chen","year":"2013","unstructured":"Chen H, Du X, Liu Z, Yang C (2013) Color image encryption based on the affine transform and gyrator transform. Opt Lasers Eng 51:768\u2013775","journal-title":"Opt Lasers Eng"},{"key":"5818_CR7","doi-asserted-by":"publisher","first-page":"6900113","DOI":"10.1109\/JPHOT.2013.2258144","volume":"5","author":"W Chen","year":"2013","unstructured":"Chen W, Chen X, Stern A, Javidi B (2013) Phase-modulated optical system with sparse representation for information encoding and authentication. IEEE Photon J 5:6900113","journal-title":"IEEE Photon J"},{"key":"5818_CR8","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.optlastec.2015.01.016","volume":"70","author":"J Chen","year":"2015","unstructured":"Chen J, Zhu Z, Fu C, Yu H, Zhang L (2015) Gyrator transform based double random phase encoding with sparse representation for information authentication. Opt Laser Technol 70:50\u201358","journal-title":"Opt Laser Technol"},{"key":"5818_CR9","unstructured":"CVG-UGR database: \n                    http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/"},{"key":"5818_CR10","doi-asserted-by":"publisher","first-page":"7486","DOI":"10.1364\/AO.52.007486","volume":"52","author":"Q Gong","year":"2013","unstructured":"Gong Q, Liu X, Li G, Qin Y (2013) Multiple-image encryption and authentication with sparse representation by space multiplexing. Appl Opt 52:7486\u20137493","journal-title":"Appl Opt"},{"key":"5818_CR11","doi-asserted-by":"publisher","first-page":"4698","DOI":"10.1364\/AO.54.004698","volume":"54","author":"C Guo","year":"2015","unstructured":"Guo C, Liu S, Sheridan JT (2015) Iterative phase retrieval algorithms. I: optimization. Appl Opt 54:4698\u20134708","journal-title":"Appl Opt"},{"key":"5818_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.optlaseng.2016.03.021","volume":"89","author":"C Guo","year":"2017","unstructured":"Guo C, Wei C, Tan J, Chen K, Liu S, Wu Q, Liu Z (2017) A review of iterative phase retrieval for measurement and encryption. Opt Lasers Eng 89:2\u201312","journal-title":"Opt Lasers Eng"},{"key":"5818_CR13","volume-title":"Elements of quaternions","author":"WR Hamilton","year":"1866","unstructured":"Hamilton WR (1866) Elements of quaternions. Longmans Green, London"},{"key":"5818_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.optcom.2007.07.012","volume":"279","author":"M Joshi","year":"2007","unstructured":"Joshi M, Chandrashakher K (2007) Singh, color image encryption and decryption using fractional Fourier transform. Opt Commun 279:35\u201342","journal-title":"Opt Commun"},{"key":"5818_CR15","doi-asserted-by":"publisher","first-page":"5713","DOI":"10.1016\/j.optcom.2008.08.024","volume":"281","author":"M Joshi","year":"2008","unstructured":"Joshi M, Chandrashakher K (2008) Singh, Color image encryption and decryption for twin images in fractional Fourier domain. Opt Commun 281:5713\u20135720","journal-title":"Opt Commun"},{"key":"5818_CR16","doi-asserted-by":"publisher","first-page":"3402","DOI":"10.1109\/TSP.2016.2544740","volume":"64","author":"X Kang","year":"2016","unstructured":"Kang X, Tao R, Zhang F (2016) Multiple-parameter discrete fractional transform and its applications. IEEE Trans Signal Process 64:3402\u20133417","journal-title":"IEEE Trans Signal Process"},{"key":"5818_CR17","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.optlastec.2012.09.007","volume":"47","author":"ZJ Liu","year":"2013","unstructured":"Liu ZJ, Zhang Y, Li S, Liu W, Liu W, Wang Y, Liu S (2013) Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domains. Opt Laser Technol 47:152\u2013158","journal-title":"Opt Laser Technol"},{"key":"5818_CR18","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.optlastec.2013.05.023","volume":"57","author":"S Liu","year":"2014","unstructured":"Liu S, Guo C, Sheridan JT (2014) A review of optical image encryption techniques. Opt Laser Technol 57:327\u2013342","journal-title":"Opt Laser Technol"},{"key":"5818_CR19","doi-asserted-by":"publisher","first-page":"4328","DOI":"10.1364\/AO.55.004328","volume":"55","author":"I Moon","year":"2016","unstructured":"Moon I, Yi F, Han M, Lee J (2016) Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms. Appl Opt 55:4328\u20134335","journal-title":"Appl Opt"},{"key":"5818_CR20","doi-asserted-by":"publisher","first-page":"13779","DOI":"10.1364\/OE.19.013779","volume":"19","author":"F Mosso","year":"2011","unstructured":"Mosso F, Tebaldi M, Barrera JF, Bolognini N, Torroba R (2011) Pure optical dynamical color encryption. Opt Express 19:13779\u201313786","journal-title":"Opt Express"},{"key":"5818_CR21","doi-asserted-by":"publisher","first-page":"2783","DOI":"10.1109\/78.960426","volume":"49","author":"SC Pei","year":"2001","unstructured":"Pei SC, Ding JJ, Chang JH (2001) Efficient Implementation of quaternion Fourier transform, convolution, and correlation by 2-D complex FFT. IEEE Trans Signal Process 49:2783\u20132797","journal-title":"IEEE Trans Signal Process"},{"key":"5818_CR22","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1364\/OL.36.000022","volume":"36","author":"E P\u00e9rez-Cabr\u00e9","year":"2011","unstructured":"P\u00e9rez-Cabr\u00e9 E, Cho M, Javidi B (2011) Information authentication using photon-counting double-random-phase encrypted images. Opt Lett 36:22\u201324","journal-title":"Opt Lett"},{"key":"5818_CR23","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.optcom.2016.11.002","volume":"388","author":"SK Rajput","year":"2017","unstructured":"Rajput SK, Nishchal NK (2017) Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm. Opt Commun 388:38\u201346","journal-title":"Opt Commun"},{"key":"5818_CR24","doi-asserted-by":"publisher","DOI":"10.1088\/2040-8978\/17\/6\/065704","volume":"17","author":"N Rawat","year":"2015","unstructured":"Rawat N, Hwang IC, Shi Y, Lee BG (2015) Optical image encryption via photon-counting imaging and compressive sensing based ptychography. J Opt 17:065704","journal-title":"J Opt"},{"key":"5818_CR25","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20:767\u2013769","journal-title":"Opt Lett"},{"key":"5818_CR26","doi-asserted-by":"publisher","first-page":"19199","DOI":"10.3390\/s150819199","volume":"15","author":"J Sang","year":"2015","unstructured":"Sang J, Zhao J, Xiang ZL, Cai B, Xiang H (2015) Security analysis of image encryption based on gyrator transform by searching the rotation angle with improved PSO algorithm. Sensors 15:19199\u201319211","journal-title":"Sensors"},{"key":"5818_CR27","doi-asserted-by":"publisher","first-page":"98450V","DOI":"10.1117\/12.2223798","volume":"9845","author":"J Sang","year":"2016","unstructured":"Sang J, Alam MS, Cai B (2016) On the security of gyrator transform-based image encryption by chosen-plaintext attack. Proc SPIE 9845:98450V","journal-title":"Proc SPIE"},{"key":"5818_CR28","first-page":"472","volume":"5307","author":"G Schaefer","year":"2003","unstructured":"Schaefer G, Stich M (2003) UCID: An uncompressed color image database. Proc SPIE Electron Imaging Storage Retr Methods Appl Multimed 5307:472\u2013480","journal-title":"Proc SPIE Electron Imaging Storage Retr Methods Appl Multimed"},{"key":"5818_CR29","doi-asserted-by":"crossref","unstructured":"Shao ZH, Wu JS, Coatrieux JL, Coatrieux G, Shu HZ (2013) Quaternion gyrator transform and its application to color image encryption. Proc 20th IEEE international conference on image processing pp 4579\u20134582","DOI":"10.1109\/ICIP.2013.6738943"},{"key":"5818_CR30","doi-asserted-by":"publisher","first-page":"4932","DOI":"10.1364\/OE.22.004932","volume":"22","author":"ZH Shao","year":"2014","unstructured":"Shao ZH, Shu HZ, Wu JS, Dong ZF, Coatrieux G, Coatrieux JL (2014) Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain. Opt Express 22:4932\u20134942","journal-title":"Opt Express"},{"key":"5818_CR31","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.optcom.2015.01.002","volume":"343","author":"ZH Shao","year":"2015","unstructured":"Shao ZH, Duan YP, Coatrieux G, Wu JS, Meng JY, Shu HZ (2015) Combining double random phase encoding for color image watermarking in quaternion gyrator domain. Opt Commun 343:56\u201365","journal-title":"Opt Commun"},{"key":"5818_CR32","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1364\/OL.30.001306","volume":"30","author":"G Situ","year":"2005","unstructured":"Situ G, Zhang J (2005) Multiple-image encryption by wavelength multiplexing. Opt Lett 30:1306\u20131308","journal-title":"Opt Lett"},{"key":"5818_CR33","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1364\/OL.38.001996","volume":"38","author":"LS Sui","year":"2013","unstructured":"Sui LS, Xin MT, Tian AL (2013) Multiple-image encryption based on phase mask multiplexing in fractional Fourier transform domain. Opt Lett 38:1996\u20131998","journal-title":"Opt Lett"},{"key":"5818_CR34","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.optlaseng.2014.06.003","volume":"62","author":"LS Sui","year":"2014","unstructured":"Sui LS, Duan KK, Liang JL, Zhang ZQ, Meng HN (2014) Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Opt Lasers Eng 62:139\u2013152","journal-title":"Opt Lasers Eng"},{"key":"5818_CR35","doi-asserted-by":"publisher","first-page":"16067","DOI":"10.1364\/OE.15.016067","volume":"15","author":"R Tao","year":"2007","unstructured":"Tao R, Xin Y, Wang Y (2007) Double image encryption based on random phase encoding in the fractional Fourier domain. Opt Express 15:16067\u201316079","journal-title":"Opt Express"},{"key":"5818_CR36","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1364\/OL.25.000887","volume":"25","author":"G Unnikrishnan","year":"2000","unstructured":"Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett 25:887\u2013889","journal-title":"Opt Lett"},{"key":"5818_CR37","doi-asserted-by":"publisher","first-page":"1856","DOI":"10.1016\/j.ijleo.2010.11.016","volume":"122","author":"XL Wang","year":"2011","unstructured":"Wang XL, Zhai HC, Li ZL, Ge Q (2011) Double random-phase encryption based on discrete quaternion Fourier-transforms. Optik 122:1856\u20131859","journal-title":"Optik"},{"key":"5818_CR38","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.optcom.2014.01.041","volume":"320","author":"Q Wang","year":"2014","unstructured":"Wang Q, Guo Q, Lei L (2014) Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg\u2013Saxton in gyrator domain. Opt Commun 320:12\u201321","journal-title":"Opt Commun"},{"key":"5818_CR39","first-page":"7800310","volume":"7","author":"X Wang","year":"2015","unstructured":"Wang X, Chen W, Chen X (2015) Optical encryption and authentication based on phase retrieval and sparsity constraints. IEEE Photon J 7:7800310","journal-title":"IEEE Photon J"},{"key":"5818_CR40","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.1364\/JOSAA.33.002158","volume":"33","author":"Y Wang","year":"2016","unstructured":"Wang Y, Markman A, Quan C, Javidi B (2016) Double-random-phase encryption with photon counting for image authentication using only the amplitude of the encrypted image. J Opt Soc Am A 33:2158\u20132165","journal-title":"J Opt Soc Am A"},{"key":"5818_CR41","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.optlaseng.2016.06.006","volume":"89","author":"L Yao","year":"2017","unstructured":"Yao L, Yuan C, Qiang J, Feng S, Nie S (2017) An asymmetric color image encryption method by using deduced gyrator transform. Opt Lasers Eng 89:72\u201379","journal-title":"Opt Lasers Eng"},{"key":"5818_CR42","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.optlastec.2016.09.004","volume":"88","author":"L Yuan","year":"2017","unstructured":"Yuan L, Ran Q, Zhao T (2017) Image authentication based on double-image encryption and partial phase decryption in nonlinear fractional Fourier domain. Opt Laser Technol 88:111\u2013120","journal-title":"Opt Laser Technol"},{"key":"5818_CR43","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/TIP.2011.2109730","volume":"20","author":"L Zhang","year":"2011","unstructured":"Zhang L, Zhang L, Mou XQ, Zhang D (2011) FSIM: a feature similarity index for image quality assessment. IEEE Trans Image Process 20:2378\u20132386","journal-title":"IEEE Trans Image Process"},{"key":"5818_CR44","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.optlaseng.2016.08.015","volume":"88","author":"S Zhong","year":"2017","unstructured":"Zhong S, Li M, Tang X, He W, Wang X (2017) Information verification and encryption based on phase retrieval with sparsity constraints and optical inference. Opt Lasers Eng 88:214\u2013220","journal-title":"Opt Lasers Eng"},{"key":"5818_CR45","doi-asserted-by":"publisher","first-page":"1358","DOI":"10.1109\/JSAC.2011.110803","volume":"29","author":"L Zhou","year":"2011","unstructured":"Zhou L, Chao H, Vasilakos AV (2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Areas Commun 29:1358\u20131367","journal-title":"IEEE J Sel Areas Commun"},{"key":"5818_CR46","doi-asserted-by":"publisher","first-page":"2789","DOI":"10.1016\/j.optcom.2011.02.066","volume":"284","author":"NR Zhou","year":"2011","unstructured":"Zhou NR, Wang YX, Gong LH, He H, Wu JH (2011) Novel single-channel color image encryption algorithm based on chaos and fractional Fourier transform. Opt Commun 284:2789\u20132796","journal-title":"Opt Commun"},{"key":"5818_CR47","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCOM.2014.6766087","volume":"52","author":"L Zhou","year":"2014","unstructured":"Zhou L, Wu D, Zheng BY, Guizani M (2014) Joint physical-application layer security for wireless multimedia delivery. IEEE Commun Mag 52:66\u201372","journal-title":"IEEE Commun Mag"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5818-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5818-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5818-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,20]],"date-time":"2019-03-20T01:46:32Z","timestamp":1553046392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5818-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,20]]},"references-count":47,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5818"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5818-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,20]]},"assertion":[{"value":"12 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}