{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:22:37Z","timestamp":1768339357497,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2018,9,29]],"date-time":"2018-09-29T00:00:00Z","timestamp":1538179200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s11042-018-6701-2","type":"journal-article","created":{"date-parts":[[2018,9,29]],"date-time":"2018-09-29T05:24:00Z","timestamp":1538198640000},"page":"11585-11606","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A secure image encryption algorithm based on fractional transforms and scrambling in combination with multimodal biometric keys"],"prefix":"10.1007","volume":"78","author":[{"given":"Jobanpreet","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Neeru","family":"Jindal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,29]]},"reference":[{"key":"6701_CR1","doi-asserted-by":"crossref","unstructured":"Acharya B, Patra SK, Panda G (2008) Image Encryption by Novel Cryptosystem Using Matrix Transformation. First International Conference on Emerging Trends in Engineering and Technology, IEEE, 77\u201381","DOI":"10.1109\/ICETET.2008.110"},{"issue":"9","key":"6701_CR2","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.1109\/TSMC.2014.2303789","volume":"44","author":"G Bhatnagar","year":"2014","unstructured":"Bhatnagar G, Wu QJ (2014) Biometric inspired multimedia encryption based on Dual Parameter Fractional Fourier Transform. IEEE transactions on systems, Man, And Cybernetics: Systems 44(9):1234\u20131247","journal-title":"IEEE transactions on systems, Man, And Cybernetics: Systems"},{"key":"6701_CR3","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/j.ins.2012.09.053","volume":"223","author":"G Bhatnagar","year":"2013","unstructured":"Bhatnagar G, Wu QJ, Raman B (2013) Discrete fractional wavelet transform and its application to multiple encryption. Inf Sci 223:297\u2013316","journal-title":"Inf Sci"},{"key":"6701_CR4","doi-asserted-by":"crossref","unstructured":"Chandra S, Paira S, Alam SS, Sanyal G (2014) A comparitive survey of symmetric and asymmetric key cryptography. International Conference on Electronics, Communication and Computational Engineering (ICECCE), 83\u201393","DOI":"10.1109\/ICECCE.2014.7086640"},{"issue":"2","key":"6701_CR5","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/S0031-3203(02)00030-4","volume":"36","author":"J Daugman","year":"2003","unstructured":"Daugman J (2003) The importance of being random: statistical principles of iris recognition. Pattern Recogn 36(2):279\u2013291","journal-title":"Pattern Recogn"},{"issue":"2","key":"6701_CR6","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"J Galbally","year":"2014","unstructured":"Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710\u2013724","journal-title":"IEEE Trans Image Process"},{"key":"6701_CR7","unstructured":"Huijuan X, Shuisheng Q, Yong-Zhong DCH, Ying C (2007) A Composite Image Encryption Scheme Using AES and Chaotic Series. The First International Symposium in Data, Privacy, and E-Commerce, ISDPE, IEEE, 277279\u2013277279"},{"key":"6701_CR8","volume-title":"Handbook of biometrics","author":"A Jain","year":"2007","unstructured":"Jain A, Flynn P, Ross AA (2007) Handbook of biometrics. Springer Science & Business Media, Berlin Heidelberg"},{"issue":"4","key":"6701_CR9","first-page":"250","volume":"64","author":"N Jindal","year":"2013","unstructured":"Jindal N, Singh K (2013) Image Retrieval Algorithm Based on Discrete Fractional Transforms. J Electr Eng 64(4):250\u2013255","journal-title":"J Electr Eng"},{"issue":"8","key":"6701_CR10","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1007\/s11760-012-0391-4","volume":"8","author":"N Jindal","year":"2014","unstructured":"Jindal N, Singh K (2014) Image and video processing using discrete fractional transforms. SIViP 8(8):1543\u20131553","journal-title":"SIViP"},{"issue":"6","key":"6701_CR11","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1631\/jzus.C1300262","volume":"15","author":"OA Khashan","year":"2014","unstructured":"Khashan OA, Zin AM, Sundararajan EA (2014) Performance study of selective encryption in comparison to full encryption for still visual images. Journal of Zhejiang University SCIENCE C 15(6):435\u2013444","journal-title":"Journal of Zhejiang University SCIENCE C"},{"key":"6701_CR12","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.sigpro.2013.07.020","volume":"94","author":"JB Lima","year":"2014","unstructured":"Lima JB, Novaes LFG (2014) Image encryption based on the fractional Fourier transform over finite fields. Signal Process 94:521\u2013530","journal-title":"Signal Process"},{"key":"6701_CR13","unstructured":"Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2Activity: Recognizing Complex Activities from Sensor Data. 24th International Joint Conference on Artificial Intelligence, 1617\u20131623"},{"key":"6701_CR14","doi-asserted-by":"crossref","unstructured":"Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing , 108\u2013115","DOI":"10.1016\/j.neucom.2015.08.096"},{"key":"6701_CR15","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. Thirtieth AAAI Conference on Artificial Intelligence, pp. 201\u2013207","DOI":"10.1609\/aaai.v30i1.9969"},{"key":"6701_CR16","unstructured":"Liu Y, Zheng Y, Liang Y, Liu S, Rosenblum DS (2016) Urban water quality prediction based on multi-task multi-view learning. 25th International Joint Conference on Artificial Intelligence, pp. 2576\u20132582"},{"issue":"3","key":"6701_CR17","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1504\/IJCVR.2015.071337","volume":"5","author":"K Naik","year":"2015","unstructured":"Naik K, Pal AK (2015) Design of a cryptosystem for DCT compressed image using Arnold transform and fractional Fourier transform. International Journal of Computational Vision and Robotics 5(3):335\u2013346","journal-title":"International Journal of Computational Vision and Robotics"},{"issue":"10","key":"6701_CR18","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1016\/S0141-9331(03)00113-3","volume":"27","author":"VA Narayanan","year":"2003","unstructured":"Narayanan VA, Prabhu KMM (2003) The fractional Fourier transforms: theory, implementation and error analysis. Microprocess Microsyst 27(10):511\u2013521","journal-title":"Microprocess Microsyst"},{"issue":"2","key":"6701_CR19","doi-asserted-by":"publisher","first-page":"2933","DOI":"10.1007\/s11042-015-3209-x","volume":"76","author":"SM Pan","year":"2017","unstructured":"Pan SM, Wen RH, Zhou ZH, Zhou NR (2017) Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform. Multimedia Tools and Applications 76(2):2933\u20132953","journal-title":"Multimedia Tools and Applications"},{"issue":"17","key":"6701_CR20","doi-asserted-by":"publisher","first-page":"10631","DOI":"10.1007\/s11042-014-2115-y","volume":"75","author":"Z Parvin","year":"2016","unstructured":"Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools and Applications 75(17):10631\u201310648","journal-title":"Multimedia Tools and Applications"},{"key":"6701_CR21","unstructured":"Rao BR, Rao EK, Rao SR (2012) Finger Print Parameter Based Cryptographic Key Generation. International Journal of Engineering Research and Applications (IJERA) ISSN, 2248\u20139622"},{"issue":"4","key":"6701_CR22","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s13319-016-0110-y","volume":"7","author":"H Singh","year":"2016","unstructured":"Singh H (2016) Cryptosystem for Securing Image Encryption Using Structured Phase Masks in Fresnel Wavelet Transform Domain. 3D Res 7(4):34","journal-title":"3D Res"},{"key":"6701_CR23","unstructured":"Sinha A, Singh K (2013) Image encryption using fractional Fourier transform and 3D Jigsaw transform. Opt Eng"},{"key":"6701_CR24","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.optcom.2015.01.021","volume":"343","author":"L Sui","year":"2015","unstructured":"Sui L, Duan K, Liang J (2015) Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps. Opt Commun 343:140\u2013149","journal-title":"Opt Commun"},{"key":"6701_CR25","doi-asserted-by":"crossref","unstructured":"Sun Q, Guan P, Qiu Y, Xue Y (2012) A Novel Digital Image Encryption Method Based on One-dimensional Random Scrambling. 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), IEEE, 1669\u20131672","DOI":"10.1109\/FSKD.2012.6233963"},{"issue":"9","key":"6701_CR26","doi-asserted-by":"publisher","first-page":"094003","DOI":"10.1088\/2040-8978\/14\/9\/094003","volume":"14","author":"M Takeda","year":"2012","unstructured":"Takeda M, Nakano K, Suzuki H, Yamaguchi M (2012) Encoding plaintext by Fourier transform hologram in double random phase encoding using fingerprint keys. J Opt 14(9):094003","journal-title":"J Opt"},{"issue":"1","key":"6701_CR27","doi-asserted-by":"publisher","first-page":"012047","DOI":"10.1088\/1742-6596\/274\/1\/012047","volume":"274","author":"JM Vilardy","year":"2011","unstructured":"Vilardy JM, Useche J, Torres CO, Mattos L (2011) Image encryption using the fractional wavelet transform. J Phys Conf Ser 274(1):012047","journal-title":"J Phys Conf Ser"},{"issue":"3","key":"6701_CR28","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11071-010-9749-8","volume":"62","author":"XY Wang","year":"2010","unstructured":"Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics 62(3):615\u2013621","journal-title":"Nonlinear Dynamics"},{"issue":"11","key":"6701_CR29","first-page":"2816","volume":"8","author":"J Wu","year":"2013","unstructured":"Wu J, Guo F, Zhou N (2013) Single-Channel Color Image Encryption using the Reality-Preserving Fractional Discrete Cosine Transform in YCbCr Space. JCP 8(11):2816\u20132822","journal-title":"JCP"},{"key":"6701_CR30","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.optlaseng.2015.09.007","volume":"78","author":"L Xu","year":"2016","unstructured":"Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17\u201325","journal-title":"Opt Lasers Eng"},{"key":"6701_CR31","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585\u20134608","journal-title":"Multimed Tools Appl"},{"issue":"21","key":"6701_CR32","doi-asserted-by":"publisher","first-page":"5326","DOI":"10.1016\/j.optcom.2008.07.049","volume":"281","author":"D Zhao","year":"2008","unstructured":"Zhao D, Li X, Chen L (2008) Optical image encryption with redefined fractional Hartley transform. Opt Commun 281(21):5326\u20135329","journal-title":"Opt Commun"},{"issue":"3","key":"6701_CR33","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1016\/j.patcog.2009.08.004","volume":"43","author":"Q Zhao","year":"2010","unstructured":"Zhao Q, Zhang D, Zhang L, Luo N (2010) High resolution partial fingerprint alignment using pore\u2013valley descriptors. Pattern Recogn 43(3):1050\u20131061","journal-title":"Pattern Recogn"},{"issue":"13","key":"6701_CR34","doi-asserted-by":"publisher","first-page":"3234","DOI":"10.1016\/j.optcom.2011.02.065","volume":"284","author":"N Zhou","year":"2011","unstructured":"Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284(13):3234\u20133242","journal-title":"Opt Commun"},{"issue":"18","key":"6701_CR35","doi-asserted-by":"publisher","first-page":"5075","DOI":"10.1016\/j.ijleo.2014.06.054","volume":"125","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Wu J, Pei D, Yang Y (2014) Novel hybrid image compression-encryption algorithm based on compressive sensing. Optik-International Journal for Light and Electron Optics 125(18):5075\u20135080","journal-title":"Optik-International Journal for Light and Electron Optics"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6701-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6701-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6701-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T23:57:07Z","timestamp":1662163027000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6701-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,29]]},"references-count":35,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["6701"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6701-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,29]]},"assertion":[{"value":"5 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}