{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:49:07Z","timestamp":1762624147574,"version":"3.37.3"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2019,3,5]],"date-time":"2019-03-05T00:00:00Z","timestamp":1551744000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11042-019-7406-x","type":"journal-article","created":{"date-parts":[[2019,3,6]],"date-time":"2019-03-06T01:13:37Z","timestamp":1551834817000},"page":"20809-20834","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["An asymmetric hybrid cryptosystem using hyperchaotic system and random decomposition in hybrid multi resolution wavelet domain"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5312-2181","authenticated-orcid":false,"given":"Pankaj","family":"Rakheja","sequence":"first","affiliation":[]},{"given":"Rekha","family":"Vig","sequence":"additional","affiliation":[]},{"given":"Phool","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,5]]},"reference":[{"key":"7406_CR1","doi-asserted-by":"publisher","first-page":"1811","DOI":"10.1364\/JOSAA.32.001811","volume":"32","author":"MR Abuturab","year":"2015","unstructured":"Abuturab MR (2015) Group multiple-image encoding and watermarking using coupled logistic maps and gyrator wavelet transform. J Opt Soc Am A, JOSAA 32:1811\u20131820. https:\/\/doi.org\/10.1364\/JOSAA.32.001811","journal-title":"J Opt Soc Am A, JOSAA"},{"key":"7406_CR2","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/s11082-016-0786-5","volume":"48","author":"SP Barfungpa","year":"2016","unstructured":"Barfungpa SP, Abuturab MR (2016) Asymmetric cryptosystem using coherent superposition and equal modulus decomposition of fractional Fourier spectrum. Opt Quant Electron 48:520. https:\/\/doi.org\/10.1007\/s11082-016-0786-5","journal-title":"Opt Quant Electron"},{"key":"7406_CR3","doi-asserted-by":"crossref","unstructured":"Biryukov A (2011) Known plaintext attack. In: Encyclopedia of cryptography and security. Springer, Boston, MA: 704\u2013705","DOI":"10.1007\/978-1-4419-5906-5_588"},{"key":"7406_CR4","doi-asserted-by":"crossref","unstructured":"Biryukov A (2011) Chosen Ciphertext attack. In: Encyclopedia of cryptography and security. Springer, Boston, MA: 205\u2013205","DOI":"10.1007\/978-1-4419-5906-5_556"},{"key":"7406_CR5","doi-asserted-by":"publisher","unstructured":"Cai J, Shen X (2017) Modified optical asymmetric image cryptosystem based on coherent superposition and equal modulus decomposition. Opt Laser Technol Complete:105\u2013112. doi: https:\/\/doi.org\/10.1016\/j.optlastec.2017.04.018","DOI":"10.1016\/j.optlastec.2017.04.018"},{"key":"7406_CR6","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1364\/OL.40.000475","volume":"40","author":"J Cai","year":"2015","unstructured":"Cai J, Shen X, Lei M et al (2015) Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Opt Lett, OL 40:475\u2013478. https:\/\/doi.org\/10.1364\/OL.40.000475","journal-title":"Opt Lett, OL"},{"key":"7406_CR7","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"X Chai","year":"2017","unstructured":"Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197\u2013213. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.08.009","journal-title":"Opt Lasers Eng"},{"key":"7406_CR8","doi-asserted-by":"publisher","first-page":"3438","DOI":"10.1364\/OL.31.003438","volume":"31","author":"L Chen","year":"2006","unstructured":"Chen L, Zhao D (2006) Optical image encryption with Hartley transforms. Opt Lett, OL 31:3438\u20133440. https:\/\/doi.org\/10.1364\/OL.31.003438","journal-title":"Opt Lett, OL"},{"key":"7406_CR9","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.physa.2005.09.039","volume":"364","author":"A Chen","year":"2006","unstructured":"Chen A, Lu J, L\u00fc J, Yu S (2006) Generating hyperchaotic L\u00fc attractor via state feedback control. Physica A: Stat Mech Applic 364:103\u2013110. https:\/\/doi.org\/10.1016\/j.physa.2005.09.039","journal-title":"Physica A: Stat Mech Applic"},{"key":"7406_CR10","doi-asserted-by":"publisher","first-page":"3817","DOI":"10.1364\/OL.35.003817","volume":"35","author":"W Chen","year":"2010","unstructured":"Chen W, Chen X, Sheppard CJR (2010) Optical image encryption based on diffractive imaging. Opt Lett, OL 35:3817\u20133819. https:\/\/doi.org\/10.1364\/OL.35.003817","journal-title":"Opt Lett, OL"},{"key":"7406_CR11","doi-asserted-by":"publisher","first-page":"125403","DOI":"10.1088\/2040-8978\/16\/12\/125403","volume":"16","author":"J-X Chen","year":"2014","unstructured":"Chen J-X, Zhu Z-L, Fu C et al (2014) Cryptanalysis and improvement of an optical image encryption scheme using a chaotic baker map and double random phase encoding. J Opt 16:125403. https:\/\/doi.org\/10.1088\/2040-8978\/16\/12\/125403","journal-title":"J Opt"},{"key":"7406_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2017.01.005","volume":"93","author":"H Chen","year":"2017","unstructured":"Chen H, Tanougast C, Liu Z, Sieler L (2017) Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains. Opt Lasers Eng 93:1\u20138. https:\/\/doi.org\/10.1016\/j.optlaseng.2017.01.005","journal-title":"Opt Lasers Eng"},{"key":"7406_CR13","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.1364\/OL.33.001575","volume":"33","author":"XC Cheng","year":"2008","unstructured":"Cheng XC, Cai LZ, Wang YR et al (2008) Security enhancement of double-random phase encryption by amplitude modulation. Opt Lett, OL 33:1575\u20131577. https:\/\/doi.org\/10.1364\/OL.33.001575","journal-title":"Opt Lett, OL"},{"key":"7406_CR14","doi-asserted-by":"publisher","first-page":"3198","DOI":"10.1364\/OL.38.003198","volume":"38","author":"M Cho","year":"2013","unstructured":"Cho M, Javidi B (2013) Three-dimensional photon counting double-random-phase encryption. Opt Lett, OL 38:3198\u20133201. https:\/\/doi.org\/10.1364\/OL.38.003198","journal-title":"Opt Lett, OL"},{"key":"7406_CR15","doi-asserted-by":"publisher","first-page":"3913","DOI":"10.1364\/OL.40.003913","volume":"40","author":"X Deng","year":"2015","unstructured":"Deng X (2015) Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition: comment. Opt Lett, OL 40:3913\u20133913. https:\/\/doi.org\/10.1364\/OL.40.003913","journal-title":"Opt Lett, OL"},{"key":"7406_CR16","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.optlastec.2011.07.019","volume":"44","author":"X Deng","year":"2012","unstructured":"Deng X, Zhao D (2012) Multiple-image encryption using phase retrieve algorithm and intermodulation in Fourier domain. Opt Laser Technol 44:374\u2013377. https:\/\/doi.org\/10.1016\/j.optlastec.2011.07.019","journal-title":"Opt Laser Technol"},{"key":"7406_CR17","doi-asserted-by":"publisher","first-page":"2533","DOI":"10.1109\/JLT.2013.2267891","volume":"31","author":"AM Elshamy","year":"2013","unstructured":"Elshamy AM, Rashed ANZ, Mohamed AENA et al (2013) Optical image encryption based on chaotic baker map and double random phase encoding. J Lightwave Technol 31:2533\u20132539. https:\/\/doi.org\/10.1109\/JLT.2013.2267891","journal-title":"J Lightwave Technol"},{"key":"7406_CR18","doi-asserted-by":"publisher","first-page":"085701","DOI":"10.1088\/2040-8978\/18\/8\/085701","volume":"18","author":"A Fatima","year":"2016","unstructured":"Fatima A, Mehra I, Nishchal NK (2016) Optical image encryption using equal modulus decomposition and multiple diffractive imaging. J Opt 18:085701. https:\/\/doi.org\/10.1088\/2040-8978\/18\/8\/085701","journal-title":"J Opt"},{"key":"7406_CR19","doi-asserted-by":"publisher","first-page":"10253","DOI":"10.1364\/OE.15.010253","volume":"15","author":"Y Frauel","year":"2007","unstructured":"Frauel Y, Castro A, Naughton TJ, Javidi B (2007) Resistance of the double random phase encryption against various attacks. Opt Express, OE 15:10253\u201310265. https:\/\/doi.org\/10.1364\/OE.15.010253","journal-title":"Opt Express, OE"},{"key":"7406_CR20","doi-asserted-by":"publisher","unstructured":"Fu C, Zhang G, Zhu M et al (2018) A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy. Sec Commun Netw. https:\/\/doi.org\/10.1155\/2018\/2708532","DOI":"10.1155\/2018\/2708532"},{"key":"7406_CR21","doi-asserted-by":"publisher","unstructured":"Ge M, Ye R (2018) A novel image encryption scheme based on 3D bit matrix and chaotic map with Markov properties. Egypt Inform J. https:\/\/doi.org\/10.1016\/j.eij.2018.10.001","DOI":"10.1016\/j.eij.2018.10.001"},{"key":"7406_CR22","doi-asserted-by":"publisher","first-page":"3181","DOI":"10.1364\/OE.14.003181","volume":"14","author":"U Gopinathan","year":"2006","unstructured":"Gopinathan U, Monaghan DS, Naughton TJ, Sheridan JT (2006) A known-plaintext heuristic attack on the Fourier plane encryption algorithm. Opt Express, OE 14:3181\u20133186. https:\/\/doi.org\/10.1364\/OE.14.003181","journal-title":"Opt Express, OE"},{"key":"7406_CR23","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1364\/OL.28.000269","volume":"28","author":"B Hennelly","year":"2003","unstructured":"Hennelly B, Sheridan JT (2003) Optical image encryption by random shifting in fractional Fourier domains. Opt Lett, OL 28:269\u2013271. https:\/\/doi.org\/10.1364\/OL.28.000269","journal-title":"Opt Lett, OL"},{"key":"7406_CR24","doi-asserted-by":"publisher","first-page":"2388","DOI":"10.1364\/AO.51.002388","volume":"51","author":"J-J Huang","year":"2012","unstructured":"Huang J-J, Hwang H-E, Chen C-Y, Chen C-M (2012) Lensless multiple-image optical encryption based on improved phase retrieval algorithm. Appl Opt, AO 51:2388\u20132394. https:\/\/doi.org\/10.1364\/AO.51.002388","journal-title":"Appl Opt, AO"},{"key":"7406_CR25","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1364\/OL.25.000028","volume":"25","author":"B Javidi","year":"2000","unstructured":"Javidi B, Nomura T (2000) Securing information by use of digital holography. Opt Lett, OL 25:28\u201330. https:\/\/doi.org\/10.1364\/OL.25.000028","journal-title":"Opt Lett, OL"},{"key":"7406_CR26","doi-asserted-by":"publisher","first-page":"2108","DOI":"10.1080\/00207217.2015.1020882","volume":"102","author":"HB Kekre","year":"2015","unstructured":"Kekre HB, Sarode TK, Vig R (2015) A new multi-resolution hybrid wavelet for analysis and image compression. Int J Electron 102:2108\u20132126. https:\/\/doi.org\/10.1080\/00207217.2015.1020882","journal-title":"Int J Electron"},{"key":"7406_CR27","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optlastec.2017.03.041","volume":"95","author":"R Kumar","year":"2017","unstructured":"Kumar R, Bhaduri B (2017) Optical image encryption using Kronecker product and hybrid phase masks. Opt Laser Technol 95:51\u201355. https:\/\/doi.org\/10.1016\/j.optlastec.2017.03.041","journal-title":"Opt Laser Technol"},{"issue":"1","key":"7406_CR28","doi-asserted-by":"publisher","first-page":"015701","DOI":"10.1088\/2040-8986\/aa9943","volume":"20","author":"R Kumar","year":"2017","unstructured":"Kumar R, Bhaduri B, Nishchal NK (2017) Nonlinear QR code based optical image encryption using spiral phase transform, equal modulus decomposition and singular value decomposition. J Opt 20(1):015701. https:\/\/doi.org\/10.1088\/2040-8986\/aa9943","journal-title":"J Opt"},{"key":"7406_CR29","doi-asserted-by":"publisher","first-page":"21384","DOI":"10.1364\/OE.23.021384","volume":"23","author":"T Li","year":"2015","unstructured":"Li T, Shi Y (2015) Security risk of diffractive-imaging-based optical cryptosystem. Opt Express, OE 23:21384\u201321391. https:\/\/doi.org\/10.1364\/OE.23.021384","journal-title":"Opt Express, OE"},{"key":"7406_CR30","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.1364\/OL.26.001242","volume":"26","author":"S Liu","year":"2001","unstructured":"Liu S, Mi Q, Zhu B (2001) Optical image encryption with multistage and multichannel fractional Fourier-domain filtering. Opt Lett, OL 26:1242\u20131244. https:\/\/doi.org\/10.1364\/OL.26.001242","journal-title":"Opt Lett, OL"},{"key":"7406_CR31","doi-asserted-by":"publisher","first-page":"013020","DOI":"10.1117\/1.3557790","volume":"20","author":"Z Liu","year":"2011","unstructured":"Liu Z, Chen H, Liu T et al (2011) Image encryption by using gyrator transform and Arnold transform. JEI. JEIME5 20:013020. https:\/\/doi.org\/10.1117\/1.3557790","journal-title":"JEIME5"},{"key":"7406_CR32","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1364\/OL.38.001651","volume":"38","author":"W Liu","year":"2013","unstructured":"Liu W, Liu Z, Liu S (2013) Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. Opt Lett, OL 38:1651\u20131653. https:\/\/doi.org\/10.1364\/OL.38.001651","journal-title":"Opt Lett, OL"},{"key":"7406_CR33","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1364\/OE.23.000655","volume":"23","author":"D Maluenda","year":"2015","unstructured":"Maluenda D, Carnicer A, Mart\u00ednez-Herrero R et al (2015) Optical encryption using photon-counting polarimetric imaging. Opt Express, OE 23:655\u2013666. https:\/\/doi.org\/10.1364\/OE.23.000655","journal-title":"Opt Express, OE"},{"key":"7406_CR34","doi-asserted-by":"publisher","first-page":"5474","DOI":"10.1364\/OE.22.005474","volume":"22","author":"I Mehra","year":"2014","unstructured":"Mehra I, Nishchal NK (2014) Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding. Opt Express, OE 22:5474\u20135482. https:\/\/doi.org\/10.1364\/OE.22.005474","journal-title":"Opt Express, OE"},{"key":"7406_CR35","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.optcom.2004.02.052","volume":"235","author":"K Nishchal","year":"2004","unstructured":"Nishchal K, Joseph J, Singh K, Naveen (2004) Securing information using fractional Fourier transform in digital holography. Opt Commun 235:253\u2013259. https:\/\/doi.org\/10.1016\/j.optcom.2004.02.052","journal-title":"Opt Commun"},{"key":"7406_CR36","doi-asserted-by":"publisher","first-page":"2031","DOI":"10.1117\/1.1304844","volume":"39","author":"T Nomura","year":"2000","unstructured":"Nomura T, Javidi B (2000) Optical encryption using a joint transform correlator architecture. OE, OPEGAR 39:2031\u20132036. https:\/\/doi.org\/10.1117\/1.1304844","journal-title":"OE, OPEGAR"},{"key":"7406_CR37","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1364\/OL.31.001044","volume":"31","author":"X Peng","year":"2006","unstructured":"Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett, OL 31:1044\u20131046. https:\/\/doi.org\/10.1364\/OL.31.001044","journal-title":"Opt Lett, OL"},{"key":"7406_CR38","doi-asserted-by":"publisher","first-page":"080501","DOI":"10.1117\/1.3607421","volume":"50","author":"W Qin","year":"2011","unstructured":"Qin W (2011) Universal and special keys based on phase-truncated Fourier transform. Opt Eng 50:080501. https:\/\/doi.org\/10.1117\/1.3607421","journal-title":"Opt Eng"},{"key":"7406_CR39","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1364\/OL.35.000118","volume":"35","author":"W Qin","year":"2010","unstructured":"Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett, OL 35:118\u2013120. https:\/\/doi.org\/10.1364\/OL.35.000118","journal-title":"Opt Lett, OL"},{"key":"7406_CR40","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1364\/AO.52.000871","volume":"52","author":"SK Rajput","year":"2013","unstructured":"Rajput SK, Nishchal NK (2013) Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. Appl Opt, AO 52:871\u2013878. https:\/\/doi.org\/10.1364\/AO.52.000871","journal-title":"Appl Opt, AO"},{"key":"7406_CR41","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.optcom.2013.06.036","volume":"309","author":"SK Rajput","year":"2013","unstructured":"Rajput SK, Nishchal NK (2013) Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem. Opt Commun 309:231\u2013235. https:\/\/doi.org\/10.1016\/j.optcom.2013.06.036","journal-title":"Opt Commun"},{"key":"7406_CR42","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.ijleo.2018.09.088","volume":"176","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P (2019) Optical asymmetric watermarking using 4D hyperchaotic system and modified equal modulus decomposition in hybrid multi resolution wavelet domain. Optik 176:425\u2013437. https:\/\/doi.org\/10.1016\/j.ijleo.2018.09.088","journal-title":"Optik"},{"key":"7406_CR43","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett, OL 20:767\u2013769. https:\/\/doi.org\/10.1364\/OL.20.000767","journal-title":"Opt Lett, OL"},{"key":"7406_CR44","doi-asserted-by":"publisher","unstructured":"Sharma N, Saini I, Yadav A, Singh P (2017) Phase-image encryption based on 3D-Lorenz chaotic system and double random phase encoding. 3D Res 8:. doi: https:\/\/doi.org\/10.1007\/s13319-017-0149-4","DOI":"10.1007\/s13319-017-0149-4"},{"key":"7406_CR45","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.1080\/09500340.2018.1496286","volume":"65","author":"H Singh","year":"2018","unstructured":"Singh H (2018) Hybrid structured phase mask in frequency plane for optical double image encryption in gyrator transform domain. J Mod Opt 65:2065\u20132078. https:\/\/doi.org\/10.1080\/09500340.2018.1496286","journal-title":"J Mod Opt"},{"key":"7406_CR46","doi-asserted-by":"publisher","first-page":"020017","DOI":"10.1063\/1.4973267","volume":"1802","author":"P Singh","year":"2017","unstructured":"Singh P, Yadav AK, Singh K, Saini I (2017) Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition. AIP Conference Proceedings 1802:020017. https:\/\/doi.org\/10.1063\/1.4973267","journal-title":"AIP Conference Proceedings"},{"key":"7406_CR47","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1504\/IJSCCPS.2017.10009739","volume":"2","author":"P Singh","year":"2017","unstructured":"Singh P, Saini I, Yadav AK (2017) Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme. Int J Soc Comput Cyber-Phys Syst 2:59. https:\/\/doi.org\/10.1504\/IJSCCPS.2017.10009739","journal-title":"Int J Soc Comput Cyber-Phys Syst"},{"key":"7406_CR48","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1364\/OL.29.001584","volume":"29","author":"G Situ","year":"2004","unstructured":"Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett, OL 29:1584\u20131586. https:\/\/doi.org\/10.1364\/OL.29.001584","journal-title":"Opt Lett, OL"},{"key":"7406_CR49","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.optlastec.2012.10.016","volume":"48","author":"L Sui","year":"2013","unstructured":"Sui L, Gao B (2013) Single-channel color image encryption based on iterative fractional Fourier transform and chaos. Opt Laser Technol 48:117\u2013127. https:\/\/doi.org\/10.1016\/j.optlastec.2012.10.016","journal-title":"Opt Laser Technol"},{"key":"7406_CR50","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1364\/AO.39.002313","volume":"39","author":"E Tajahuerce","year":"2000","unstructured":"Tajahuerce E, Matoba O, Verrall SC, Javidi B (2000) Optoelectronic information encryption with phase-shifting interferometry. Appl Opt, AO 39:2313\u20132320. https:\/\/doi.org\/10.1364\/AO.39.002313","journal-title":"Appl Opt, AO"},{"key":"7406_CR51","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1364\/OL.25.000887","volume":"25","author":"G Unnikrishnan","year":"2000","unstructured":"Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett, OL 25:887\u2013889. https:\/\/doi.org\/10.1364\/OL.25.000887","journal-title":"Opt Lett, OL"},{"key":"7406_CR52","first-page":"14","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Sheikh HR (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:14","journal-title":"IEEE Trans Image Process"},{"key":"7406_CR53","doi-asserted-by":"publisher","first-page":"6645","DOI":"10.1364\/AO.50.006645","volume":"50","author":"X Wang","year":"2011","unstructured":"Wang X, Zhao D (2011) Security enhancement of a phase-truncation based image encryption algorithm. Appl Opt 50:6645\u20136651","journal-title":"Appl Opt"},{"key":"7406_CR54","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1016\/j.optcom.2011.12.017","volume":"285","author":"X Wang","year":"2012","unstructured":"Wang X, Zhao D (2012) A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Commun 285:1078\u20131081. https:\/\/doi.org\/10.1016\/j.optcom.2011.12.017","journal-title":"Opt Commun"},{"key":"7406_CR55","doi-asserted-by":"publisher","first-page":"6170","DOI":"10.1364\/AO.52.006170","volume":"52","author":"X Wang","year":"2013","unstructured":"Wang X, Zhao D (2013) Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle. Appl Opt 52:6170\u20136178","journal-title":"Appl Opt"},{"key":"7406_CR56","doi-asserted-by":"publisher","first-page":"3684","DOI":"10.1364\/OL.38.003684","volume":"38","author":"X Wang","year":"2013","unstructured":"Wang X, Zhao D (2013) Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask. Opt Lett, OL 38:3684\u20133686. https:\/\/doi.org\/10.1364\/OL.38.003684","journal-title":"Opt Lett, OL"},{"key":"7406_CR57","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1364\/AO.53.000208","volume":"53","author":"X Wang","year":"2014","unstructured":"Wang X, Chen Y, Dai C, Zhao D (2014) Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. Appl Opt, AO 53:208\u2013213. https:\/\/doi.org\/10.1364\/AO.53.000208","journal-title":"Appl Opt, AO"},{"key":"7406_CR58","doi-asserted-by":"publisher","first-page":"6874","DOI":"10.1364\/AO.54.006874","volume":"54","author":"Y Wang","year":"2015","unstructured":"Wang Y, Quan C, Tay CJ (2015) Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform. Appl Opt, AO 54:6874\u20136881. https:\/\/doi.org\/10.1364\/AO.54.006874","journal-title":"Appl Opt, AO"},{"key":"7406_CR59","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1364\/AO.55.000679","volume":"55","author":"Y Wang","year":"2016","unstructured":"Wang Y, Quan C, Tay CJ (2016) New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. Appl Opt 55:679\u2013686","journal-title":"Appl Opt"},{"key":"7406_CR60","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1080\/09500340.2018.1431314","volume":"65","author":"H Xu","year":"2018","unstructured":"Xu H, Xu W, Wang S, Wu S (2018) Phase-only asymmetric optical cryptosystem based on random modulus decomposition. J Mod Opt 65:1245\u20131252. https:\/\/doi.org\/10.1080\/09500340.2018.1431314","journal-title":"J Mod Opt"},{"key":"7406_CR61","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.optcom.2015.04.063","volume":"353","author":"S Zhao","year":"2015","unstructured":"Zhao S, Wang L, Liang W et al (2015) High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique. Opt Commun 353:90\u201395. https:\/\/doi.org\/10.1016\/j.optcom.2015.04.063","journal-title":"Opt Commun"},{"key":"7406_CR62","doi-asserted-by":"publisher","first-page":"3234","DOI":"10.1016\/j.optcom.2011.02.065","volume":"284","author":"N Zhou","year":"2011","unstructured":"Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284:3234\u20133242. https:\/\/doi.org\/10.1016\/j.optcom.2011.02.065","journal-title":"Opt Commun"},{"key":"7406_CR63","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou N, Li H, Wang D et al (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321. https:\/\/doi.org\/10.1016\/j.optcom.2014.12.084","journal-title":"Opt Commun"},{"key":"7406_CR64","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1007\/s11128-015-0926-z","volume":"14","author":"NR Zhou","year":"2015","unstructured":"Zhou NR, Hua TX, Gong LH et al (2015) Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Process 14:1193\u20131213. https:\/\/doi.org\/10.1007\/s11128-015-0926-z","journal-title":"Quantum Inf Process"},{"key":"7406_CR65","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"N Zhou","year":"2016","unstructured":"Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression\u2013encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133. https:\/\/doi.org\/10.1016\/j.optlastec.2016.02.018","journal-title":"Opt Laser Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7406-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7406-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7406-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T01:21:50Z","timestamp":1663032110000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7406-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,5]]},"references-count":65,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["7406"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7406-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,3,5]]},"assertion":[{"value":"30 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}