{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T17:00:40Z","timestamp":1764349240939},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-11003-x","type":"journal-article","created":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T21:02:41Z","timestamp":1621976561000},"page":"27829-27853","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map"],"prefix":"10.1007","volume":"80","author":[{"given":"Shazia","family":"Sabir","sequence":"first","affiliation":[]},{"given":"Vandana","family":"Guleria","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,25]]},"reference":[{"key":"11003_CR1","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Ph.D. thesis, University of Buckingham"},{"issue":"5","key":"11003_CR2","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.optlaseng.2011.12.006","volume":"50","author":"MR Abuturab","year":"2012","unstructured":"Abuturab MR (2012) Securing color information using Arnold transform in gyrator transform domain. Opt Lasers Eng 50(5):772\u2013779","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"11003_CR3","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.optlaseng.2012.09.008","volume":"51","author":"MR Abuturab","year":"2013","unstructured":"Abuturab MR (2013) Color image security system based on discrete Hartley transform in gyrator transform domain. Opt Lasers Eng 51(3):317\u2013324","journal-title":"Opt Lasers Eng"},{"key":"11003_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.optlaseng.2015.01.001","volume":"69","author":"MR Abuturab","year":"2015","unstructured":"Abuturab MR (2015) An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform. Opt Lasers Eng 69:49\u201357","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"11003_CR5","doi-asserted-by":"publisher","first-page":"1329","DOI":"10.1109\/78.839980","volume":"48","author":"C Candan","year":"2000","unstructured":"Candan C, Kutay MA, Ozaktas HM (2000) The discrete fractional Fourier transform. IEEE Trans Signal Process 48(5):1329\u20131337","journal-title":"IEEE Trans Signal Process"},{"issue":"6","key":"11003_CR6","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1016\/j.optlaseng.2013.01.016","volume":"51","author":"H Chen","year":"2013","unstructured":"Chen H, Du X, Liu Z, Yang C (2013) Color image encryption based on the affine transform and gyrator transform. Opt Lasers Eng 51(6):768\u2013775","journal-title":"Opt Lasers Eng"},{"issue":"4-6","key":"11003_CR7","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.optcom.2005.05.052","volume":"254","author":"L Chen","year":"2005","unstructured":"Chen L, Zhao D (2005) Optical image encryption based on fractional wavelet transform. Opt Commun 254(4-6):361\u2013367","journal-title":"Opt Commun"},{"issue":"19","key":"11003_CR8","doi-asserted-by":"publisher","first-page":"8552","DOI":"10.1364\/OE.14.008552","volume":"14","author":"L Chen","year":"2006","unstructured":"Chen L, Zhao D (2006) Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms. Opt Express 14(19):8552\u20138560","journal-title":"Opt Express"},{"issue":"6","key":"11003_CR9","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.ijleo.2006.11.005","volume":"119","author":"L Chen","year":"2008","unstructured":"Chen L, Zhao D (2008) Image encryption with fractional wavelet packet method. Optik 119(6):286\u2013291","journal-title":"Optik"},{"key":"11003_CR10","first-page":"102524","volume":"54","author":"V Guleria","year":"2020","unstructured":"Guleria V, Sabir S, Mishra D (2020) Security of multiple RGB images by RSA cryptosystem combined with FRDCT and Arnold transform. J Inform Secur Appl 54:102524","journal-title":"J Inform Secur Appl"},{"issue":"12","key":"11003_CR11","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1016\/j.optlaseng.2010.07.005","volume":"48","author":"Q Guo","year":"2010","unstructured":"Guo Q, Liu Z, Liu S (2010) Color image encryption by using Arnold and discrete fractional random transforms in IHS space. Opt Lasers Eng 48 (12):1174\u20131181","journal-title":"Opt Lasers Eng"},{"issue":"1-6","key":"11003_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.optcom.2003.08.030","volume":"226","author":"B Hennelly","year":"2003","unstructured":"Hennelly B, Sheridan JT (2003) Fractional Fourier transform-based image encryption: Phase retrieval algorithm. Opt Commun 226(1-6):61\u201380","journal-title":"Opt Commun"},{"issue":"7","key":"11003_CR13","doi-asserted-by":"publisher","first-page":"2238","DOI":"10.1016\/j.optlastec.2012.02.032","volume":"44","author":"JJ Huang","year":"2012","unstructured":"Huang JJ, Hwang HE, Chen CY, Chen CM (2012) Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain. Opt Laser Technol 44(7):2238\u20132244","journal-title":"Opt Laser Technol"},{"issue":"4","key":"11003_CR14","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1177\/1077546314536919","volume":"22","author":"I Hussain","year":"2016","unstructured":"Hussain I (2016) Optical image encryption based on S-box transformation and fractional Hartley transform. J Vib Control 22(4):1143\u20131146","journal-title":"J Vib Control"},{"issue":"13","key":"11003_CR15","doi-asserted-by":"publisher","first-page":"3243","DOI":"10.1016\/j.optcom.2011.03.030","volume":"284","author":"HE Hwang","year":"2011","unstructured":"Hwang HE (2011) An optical image cryptosystem based on Hartley transform in the Fresnel transform domain. Opt Commun 284(13):3243\u20133247","journal-title":"Opt Commun"},{"issue":"1","key":"11003_CR16","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.optcom.2007.07.012","volume":"279","author":"M Joshi","year":"2007","unstructured":"Joshi M, Chandrashakher K (2007) Singh, Color image encryption and decryption using fractional Fourier transform. Opt Commun 279(1):35\u201342","journal-title":"Opt Commun"},{"key":"11003_CR17","doi-asserted-by":"crossref","unstructured":"Kang XJ, Han Z, Yu AW, Duan PQ (2017) Double random scrambling encoding in the RPMPFrHT domain. IEEE Int Conf Image Process (ICIP)4362\u20134366","DOI":"10.1109\/ICIP.2017.8297106"},{"key":"11003_CR18","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.optlaseng.2013.07.015","volume":"52","author":"M Kumar","year":"2014","unstructured":"Kumar M, Mishra D, Sharma R (2014) A first approach on an RGB image encryption. Opt Lasers Eng 52:27\u201334","journal-title":"Opt Lasers Eng"},{"issue":"10-11","key":"11003_CR19","doi-asserted-by":"publisher","first-page":"2584","DOI":"10.1016\/j.optcom.2012.01.085","volume":"285","author":"J Lang","year":"2012","unstructured":"Lang J (2012) Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform. Opt Commun 285(10-11):2584\u20132590","journal-title":"Opt Commun"},{"issue":"7-8","key":"11003_CR20","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1016\/j.optlaseng.2010.02.005","volume":"48","author":"Z Liu","year":"2010","unstructured":"Liu Z, Dai J, Sun X, Liu S (2010) Color image encryption by using the rotation of color vector in Hartley transform domains. Opt Lasers Eng 48 (7-8):800\u2013805","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"11003_CR21","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1016\/j.optlaseng.2010.12.005","volume":"49","author":"Z Liu","year":"2011","unstructured":"Liu Z, Xu L, Lin C, Dai J, Liu S (2011) Image encryption scheme by using iterative random phase encoding in gyrator transform domains. Opt Lasers Eng 49(4):542\u2013546","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"11003_CR22","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.optcom.2010.09.013","volume":"284","author":"Z Liu","year":"2011","unstructured":"Liu Z, Xu L, Liu T, Chen H, Li P, Lin C, Liu S (2011) Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains. Opt Commun 284(1):123\u2013128","journal-title":"Opt Commun"},{"key":"11003_CR23","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.optcom.2014.09.040","volume":"335","author":"I Mehra","year":"2015","unstructured":"Mehra I, Nishchal NK (2015) Wavelet-based image fusion for securing multiple images through asymmetric keys. Opt Commun 335:153\u2013160","journal-title":"Opt Commun"},{"issue":"4-6","key":"11003_CR24","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1080\/19393555.2016.1241323","volume":"25","author":"DC Mishra","year":"2016","unstructured":"Mishra DC, Sharma R (2016) An approach for security of color image data in coordinate, geometric, and frequency domains. Inform Secur J A Global Perspect 25(4-6):213\u2013234","journal-title":"Inform Secur J A Global Perspect"},{"issue":"4-6","key":"11003_CR25","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.optcom.2004.02.052","volume":"235","author":"NK Nishchal","year":"2004","unstructured":"Nishchal NK, Joseph J, Singh K (2004) Securing information using fractional Fourier transform in digital holography. Opt Commun 235(4-6):253\u2013259","journal-title":"Opt Commun"},{"issue":"6","key":"11003_CR26","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/LSP.2006.871721","volume":"13","author":"SC Pei","year":"2006","unstructured":"Pei SC, Hsue WL (2006) The multiple-parameter discrete fractional Fourier transform. IEEE Signal Process Lett 13(6):329\u2013332","journal-title":"IEEE Signal Process Lett"},{"issue":"6","key":"11003_CR27","first-page":"665","volume":"45","author":"SC Pei","year":"1998","unstructured":"Pei SC, Tseng CC, Yeh MH, Shyu JJ (1998) Discrete fractional Hartley and Fourier transforms. IEEE Trans Circ Syst II: Analog Digit Signal Process 45(6):665\u2013675","journal-title":"IEEE Trans Circ Syst II: Analog Digit Signal Process"},{"issue":"6","key":"11003_CR28","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.optcom.2011.10.019","volume":"285","author":"A Prasad","year":"2012","unstructured":"Prasad A, Kumar M, Choudhury DR (2012) Color image encoding using fractional Fourier transformation associated with wavelet transformation. Opt Commun 285(6):1005\u20131009","journal-title":"Opt Commun"},{"issue":"7","key":"11003_CR29","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767\u2013769","journal-title":"Opt Lett"},{"issue":"3","key":"11003_CR30","first-page":"421","volume":"47","author":"P Singh","year":"2017","unstructured":"Singh P, Yadav A, Singh K (2017) Color image encryption using affine transform in fractional Hartley domain. Opt Appl 47(3):421\u2013433","journal-title":"Opt Appl"},{"key":"11003_CR31","first-page":"020017","volume":"1802","author":"P Singh","year":"2017","unstructured":"Singh P, Yadav A, Singh K, Saini I (2017) Optical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition. Math Sci Appl AIP Conf Proc 1802:020017\u20131\u20137","journal-title":"Math Sci Appl AIP Conf Proc"},{"issue":"14","key":"11003_CR32","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1364\/OL.29.001584","volume":"29","author":"G Situ","year":"2004","unstructured":"Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29(14):1584\u20131586","journal-title":"Opt Lett"},{"key":"11003_CR33","doi-asserted-by":"crossref","unstructured":"Soleymani A, Nordin MJ, Sundararajan E (2014) A chaotic cryptosystem for images based on Henon and Arnold cat map. The Scientif World J 2014","DOI":"10.1155\/2014\/536930"},{"issue":"8","key":"11003_CR34","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1016\/j.optcom.2008.12.070","volume":"282","author":"R Tao","year":"2009","unstructured":"Tao R, Lang J, Wang Y (2009) The multiple-parameter discrete fractional Hadamard transform. Opt Commun 282(8):1531\u20131535","journal-title":"Opt Commun"},{"issue":"4","key":"11003_CR35","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TIFS.2010.2068289","volume":"5","author":"R Tao","year":"2010","unstructured":"Tao R, Meng XY, Wang Y (2010) Image encryption with multiorders of fractional Fourier transforms. IEEE Trans Inform Forens Secur 5(4):734\u2013738","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"18","key":"11003_CR36","doi-asserted-by":"publisher","first-page":"5309","DOI":"10.1016\/j.ijleo.2014.06.068","volume":"125","author":"S Vashisth","year":"2014","unstructured":"Vashisth S, Singh H, Yadav A, Singh K (2014) Image encryption using fractional Mellin transform, structured phase filters, and phase retrieval. Optik 125(18):5309\u20135315","journal-title":"Optik"},{"key":"11003_CR37","first-page":"205","volume":"5","author":"I Venturini","year":"2004","unstructured":"Venturini I, Duhamel P (2004) Reality preserving fractional transforms, International Conference on Acoustics. Speech Signal Process 5:205\u2013208","journal-title":"Speech Signal Process"},{"key":"11003_CR38","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ins.2016.02.041","volume":"349-350","author":"X Wu","year":"2016","unstructured":"Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349-350:137\u2013153","journal-title":"Inf Sci"},{"issue":"9","key":"11003_CR39","doi-asserted-by":"publisher","first-page":"1720","DOI":"10.1016\/j.optcom.2009.12.066","volume":"283","author":"J Wu","year":"2010","unstructured":"Wu J, Zhang L, Zhou N (2010) Image encryption based on the multiple-order discrete fractional cosine transform. Opt Commun 283(9):1720\u20131725","journal-title":"Opt Commun"},{"issue":"2","key":"11003_CR40","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/s13319-018-0172-0","volume":"9","author":"PL Yadav","year":"2018","unstructured":"Yadav PL, Singh H (2018) Optical double image hiding in the fractional Hartley transform using structured phase filter and Arnold transform. 3D Research 9(2):20","journal-title":"3D Research"},{"issue":"4","key":"11003_CR41","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.optlaseng.2012.11.001","volume":"51","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Xiao D (2013) Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt Lasers Eng 51(4):472\u2013480","journal-title":"Opt Lasers Eng"},{"issue":"21","key":"11003_CR42","doi-asserted-by":"publisher","first-page":"5326","DOI":"10.1016\/j.optcom.2008.07.049","volume":"281","author":"D Zhao","year":"2008","unstructured":"Zhao D, Li X, Chen L (2008) Optical image encryption with redefined fractional Hartley transform. Opt Commun 281(21):5326\u20135329","journal-title":"Opt Commun"},{"issue":"13","key":"11003_CR43","doi-asserted-by":"publisher","first-page":"3234","DOI":"10.1016\/j.optcom.2011.02.065","volume":"284","author":"N Zhou","year":"2011","unstructured":"Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284(13):3234\u20133242","journal-title":"Opt Commun"},{"issue":"24","key":"11003_CR44","doi-asserted-by":"publisher","first-page":"5588","DOI":"10.1016\/j.optcom.2011.08.034","volume":"284","author":"N Zhou","year":"2011","unstructured":"Zhou N, Wang Y, Wu J (2011) Image encryption algorithm based on the multi-order discrete fractional Mellin transform. Opt Commun 284 (24):5588\u20135597","journal-title":"Opt Commun"},{"issue":"2","key":"11003_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPHOT.2020.2981494","volume":"12","author":"Z Zhu","year":"2020","unstructured":"Zhu Z, Wu C, Wang J, Hu K, Chen XD (2020) A novel 3D vector decomposition for color-image encryption. IEEE Photonics J 12(2):1\u201314","journal-title":"IEEE Photonics J"},{"issue":"22","key":"11003_CR46","doi-asserted-by":"publisher","first-page":"6672","DOI":"10.1016\/j.ijleo.2014.06.149","volume":"125","author":"H Zhu","year":"2014","unstructured":"Zhu H, Zhao C, Zhang X, Yang L (2014) An image encryption scheme using generalized Arnold map and affine cipher. Optik 125(22):6672\u20136677","journal-title":"Optik"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11003-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11003-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11003-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T17:34:15Z","timestamp":1675359255000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11003-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":46,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["11003"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11003-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,25]]},"assertion":[{"value":"13 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}