{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T06:02:31Z","timestamp":1777010551393,"version":"3.51.4"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"27","license":[{"start":{"date-parts":[[2023,4,12]],"date-time":"2023-04-12T00:00:00Z","timestamp":1681257600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,12]],"date-time":"2023-04-12T00:00:00Z","timestamp":1681257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001412","name":"Council\u00a0of\u00a0Scientific and Industrial Research, India","doi-asserted-by":"publisher","award":["09\/1152(0012)\/2019-EMR-1"],"award-info":[{"award-number":["09\/1152(0012)\/2019-EMR-1"]}],"id":[{"id":"10.13039\/501100001412","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11042-023-15190-7","type":"journal-article","created":{"date-parts":[[2023,4,12]],"date-time":"2023-04-12T05:02:47Z","timestamp":1681275767000},"page":"42439-42463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Asymmetric Cryptosystem Based on Biological Mutation Operation in Chirp-Z Domain"],"prefix":"10.1007","volume":"82","author":[{"family":"Sachin","sequence":"first","affiliation":[]},{"given":"Phool","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,12]]},"reference":[{"issue":"3","key":"15190_CR1","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1007\/s11760-014-0624-9","volume":"9","author":"M Agoyi","year":"2015","unstructured":"Agoyi M, \u00c7elebi E, Anbarjafari G (2015) A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition. SIViP 9(3):735\u2013745. https:\/\/doi.org\/10.1007\/s11760-014-0624-9","journal-title":"SIViP"},{"issue":"2","key":"15190_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/19393555.2020.1718248","volume":"29","author":"PT Akkasaligar","year":"2020","unstructured":"Akkasaligar PT, Biradar S (2020) Selective medical image encryption using DNA cryptography. Information Security Journal: A Global Perspective 29(2):91\u2013101. https:\/\/doi.org\/10.1080\/19393555.2020.1718248","journal-title":"Information Security Journal: A Global Perspective"},{"key":"15190_CR3","doi-asserted-by":"publisher","unstructured":"Archana, Sachin, and P. Singh, \u201cCryptosystem based on triple random phase encoding with chaotic Henon map,\u201d in Proceedings of International Conference on Data Science and Applications, vol. 148, K. Ray, K. C. Roy, S. K. Toshniwal, H. Sharma, and A. Bandyopadhyay, Eds. Singapore: Springer Singapore, 2021, pp. 73\u201384. doi: https:\/\/doi.org\/10.1007\/978-981-15-7561-7_5.","DOI":"10.1007\/978-981-15-7561-7_5"},{"key":"15190_CR4","doi-asserted-by":"publisher","unstructured":"Archana, Sachin, and P. Singh. 2021.\u201cCascaded unequal modulus decomposition in Fresnel domain based cryptosystem to enhance the image security,\u201d Optics and Lasers in Engineering, p. 12. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106399.","DOI":"10.1016\/j.optlaseng.2020.106399"},{"issue":"4","key":"15190_CR5","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1364\/OL.40.000475","volume":"40","author":"J Cai","year":"2015","unstructured":"Cai J, Shen X, Lei M, Lin C, Dou S (2015) Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Opt Lett 40(4):475. https:\/\/doi.org\/10.1364\/OL.40.000475","journal-title":"Opt Lett"},{"key":"15190_CR6","doi-asserted-by":"publisher","first-page":"p. 05809","DOI":"10.1016\/j.optlaseng.2019.105809","volume":"124","author":"H Chen","year":"2020","unstructured":"Chen H, Zhu L, Liu Z, Tanougast C, Liu F, Blondel W (2020) Optical single-channel color image asymmetric cryptosystem based on hyperchaotic system and random modulus decomposition in Gyrator domains. Opt Lasers Eng 124:05809. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105809","journal-title":"Opt Lasers Eng"},{"key":"15190_CR7","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.ins.2020.02.024","volume":"520","author":"J Chen","year":"2020","unstructured":"Chen J, Chen L, Zhou Y (2020) Cryptanalysis of a DNA-based image encryption scheme. Inf Sci 520:130\u2013141. https:\/\/doi.org\/10.1016\/j.ins.2020.02.024","journal-title":"Inf Sci"},{"key":"15190_CR8","doi-asserted-by":"publisher","first-page":"p. 106448","DOI":"10.1016\/j.optlaseng.2020.106448","volume":"138","author":"H Chen","year":"2021","unstructured":"Chen H, Liu Z, Tanougast C, Liu F, Blondel W (2021) A novel chaos based optical cryptosystem for multiple images using DNA-blend and gyrator transform. Opt Lasers Eng 138:106448. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106448","journal-title":"Opt Lasers Eng"},{"issue":"6736","key":"15190_CR9","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/21092","volume":"399","author":"CT Clelland","year":"1999","unstructured":"Clelland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399(6736):533\u2013534. https:\/\/doi.org\/10.1038\/21092","journal-title":"Nature"},{"issue":"16","key":"15190_CR10","doi-asserted-by":"publisher","first-page":"3913","DOI":"10.1364\/OL.40.003913","volume":"40","author":"X Deng","year":"2015","unstructured":"Deng X (2015) Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition: comment. Opt Lett 40(16):3913. https:\/\/doi.org\/10.1364\/OL.40.003913","journal-title":"Opt Lett"},{"key":"15190_CR11","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2015.10.027","volume":"355\u2013356","author":"A-V Diaconu","year":"2016","unstructured":"Diaconu A-V (2016) Circular inter\u2013intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355\u2013356:314\u2013327. https:\/\/doi.org\/10.1016\/j.ins.2015.10.027","journal-title":"Inf Sci"},{"key":"15190_CR12","doi-asserted-by":"publisher","unstructured":"Dou Y,\u00a0 Liu  X, Fan H, and Li M. 2017. \u201cCryptanalysis of a DNA and chaos based image encryption algorithm,\u201d Optik - International Journal for Light and Electron Optics, vol. 145. https:\/\/doi.org\/10.1016\/j.ijleo.2017.08.050.","DOI":"10.1016\/j.ijleo.2017.08.050"},{"key":"15190_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10527-6","author":"SE El-Khamy","year":"2021","unstructured":"El-Khamy SE, Mohamed AG (2021) An efficient DNA-inspired image encryption algorithm based on hyper-chaotic maps and wavelet fusion. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-021-10527-6","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"15190_CR14","doi-asserted-by":"publisher","first-page":"2533","DOI":"10.1109\/JLT.2013.2267891","volume":"31","author":"AM Elshamy","year":"2013","unstructured":"Elshamy AM et al (2013) Optical image encryption based on chaotic Baker map and double random phase encoding. J Lightwave Technol 31(15):2533\u20132539. https:\/\/doi.org\/10.1109\/JLT.2013.2267891","journal-title":"J Lightwave Technol"},{"issue":"3","key":"15190_CR15","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1007\/s11042-013-1533-6","volume":"72","author":"H Hermassi","year":"2014","unstructured":"Hermassi H, Belazi A, Rhouma R, Belghith SM (2014) Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed Tools Appl 72(3):2211\u20132224. https:\/\/doi.org\/10.1007\/s11042-013-1533-6","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"15190_CR16","doi-asserted-by":"publisher","first-page":"5455","DOI":"10.1007\/s11042-015-2515-7","volume":"75","author":"A Jain","year":"2016","unstructured":"Jain A, Rajpal N (2016) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed Tools Appl 75(10):5455\u20135472. https:\/\/doi.org\/10.1007\/s11042-015-2515-7","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"15190_CR17","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1117\/1.601144","volume":"36","author":"B Javidi","year":"1997","unstructured":"Javidi B (1997) Fault tolerance properties of a double phase encoding encryption technique. Opt Eng 36(4):992. https:\/\/doi.org\/10.1117\/1.601144","journal-title":"Opt Eng"},{"issue":"1","key":"15190_CR18","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1364\/OL.25.000028","volume":"25","author":"B Javidi","year":"2000","unstructured":"Javidi B, Nomura T (2000) Securing information by use of digital holography. Opt Lett 25(1):28. https:\/\/doi.org\/10.1364\/OL.25.000028","journal-title":"Opt Lett"},{"issue":"26","key":"15190_CR19","doi-asserted-by":"publisher","first-page":"5462","DOI":"10.1364\/AO.41.005462","volume":"41","author":"S Kishk","year":"2002","unstructured":"Kishk S, Javidi B (2002) Information hiding technique with double phase encoding. Appl Opt 41(26):5462. https:\/\/doi.org\/10.1364\/AO.41.005462","journal-title":"Appl Opt"},{"key":"15190_CR20","doi-asserted-by":"publisher","unstructured":"Krishna PR, Teja CVMS, R. D. S, and T. V, \u201cA chaos based image encryption using Tinkerbell map functions,\u201d in 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). pp. 578\u2013582. https:\/\/doi.org\/10.1109\/ICECA.2018.8474891.","DOI":"10.1109\/ICECA.2018.8474891"},{"issue":"7","key":"15190_CR21","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1080\/09500340.2019.1572807","volume":"66","author":"R Kumar","year":"2019","unstructured":"Kumar R, Quan C (2019) Optical colour image encryption using spiral phase transform and chaotic pixel scrambling. J Mod Opt 66(7):776\u2013785. https:\/\/doi.org\/10.1080\/09500340.2019.1572807","journal-title":"J Mod Opt"},{"issue":"3","key":"15190_CR22","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1080\/09500340.2017.1395486","volume":"65","author":"R Kumar","year":"2018","unstructured":"Kumar R, Bhaduri B, Hennelly B (2018) QR code-based non-linear image encryption using Shearlet transform and spiral phase transform. J Mod Opt 65(3):321\u2013330. https:\/\/doi.org\/10.1080\/09500340.2017.1395486","journal-title":"J Mod Opt"},{"key":"15190_CR23","doi-asserted-by":"publisher","first-page":"1570","DOI":"10.1016\/j.procs.2018.05.121","volume":"132","author":"J Kumar","year":"2018","unstructured":"Kumar J, Singh P, Yadav AK, Kumar A (2018) Asymmetric cryptosystem for phase images in fractional Fourier domain using LU-decomposition and Arnold transform. Procedia Computer Sci 132:1570\u20131577. https:\/\/doi.org\/10.1016\/j.procs.2018.05.121","journal-title":"Procedia Computer Sci"},{"key":"15190_CR24","doi-asserted-by":"publisher","first-page":"p. 100005","DOI":"10.1016\/j.rio.2020.100005","volume":"1","author":"E Kumari","year":"2020","unstructured":"Kumari E, Mukherjee S, Singh P, Kumar R (2020) Asymmetric color image encryption and compression based on discrete cosine transform in Fresnel domain. Results in Optics 1:100005. https:\/\/doi.org\/10.1016\/j.rio.2020.100005","journal-title":"Results in Optics"},{"key":"15190_CR25","doi-asserted-by":"publisher","first-page":"p. 100009","DOI":"10.1016\/j.rio.2020.100009","volume":"1","author":"E Kumari","year":"2020","unstructured":"Kumari E, Singh P, Mukherjee S, Purohit GN (2020) Analysis of triple random phase encoding cryptosystem in Fresnel domain. Results in Optics 1:100009. https:\/\/doi.org\/10.1016\/j.rio.2020.100009","journal-title":"Results in Optics"},{"key":"15190_CR26","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.ins.2018.08.017","volume":"470","author":"CS Lai","year":"2019","unstructured":"Lai CS et al (2019) A robust correlation analysis framework for imbalanced and dichotomous data with uncertainty. Inf Sci 470:58\u201377. https:\/\/doi.org\/10.1016\/j.ins.2018.08.017","journal-title":"Inf Sci"},{"issue":"2","key":"15190_CR27","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2007.48","volume":"5","author":"R Lyda","year":"2007","unstructured":"Lyda R, Hamrock J (2007) Using entropy analysis to find encrypted and packed malware. IEEE Secur Privacy Mag 5(2):40\u201345. https:\/\/doi.org\/10.1109\/MSP.2007.48","journal-title":"IEEE Secur Privacy Mag"},{"issue":"3","key":"15190_CR28","doi-asserted-by":"publisher","first-page":"p. 035704","DOI":"10.1088\/2040-8986\/ab015f","volume":"21","author":"E Mosso","year":"2019","unstructured":"Mosso E, Bolognini N (2019) Dynamic multiple-image encryption based on chirp z-transform. J Opt 21(3):035704. https:\/\/doi.org\/10.1088\/2040-8986\/ab015f","journal-title":"J Opt"},{"issue":"21","key":"15190_CR29","doi-asserted-by":"publisher","first-page":"5674","DOI":"10.1364\/AO.58.005674","volume":"58","author":"E Mosso","year":"2019","unstructured":"Mosso E, Su\u00e1rez O, Bolognini N (2019) Asymmetric multiple-image encryption system based on a chirp z-transform. Appl Opt 58(21):5674. https:\/\/doi.org\/10.1364\/AO.58.005674","journal-title":"Appl Opt"},{"issue":"8","key":"15190_CR30","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1364\/OL.31.001044","volume":"31","author":"X Peng","year":"2006","unstructured":"Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31(8):1044. https:\/\/doi.org\/10.1364\/OL.31.001044","journal-title":"Opt Lett"},{"issue":"22","key":"15190_CR31","doi-asserted-by":"publisher","first-page":"3261","DOI":"10.1364\/OL.31.003261","volume":"31","author":"X Peng","year":"2006","unstructured":"Peng X, Wei H, Zhang P (2006) Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt Lett 31(22):3261. https:\/\/doi.org\/10.1364\/OL.31.003261","journal-title":"Opt Lett"},{"issue":"5","key":"15190_CR32","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1002\/j.1538-7305.1969.tb04268.x","volume":"48","author":"LR Rabiner","year":"1969","unstructured":"Rabiner LR, Schafer RW, Rader CM (1969) The chirp z-transform algorithm and its application. Bell Syst Tech J 48(5):1249\u20131292. https:\/\/doi.org\/10.1002\/j.1538-7305.1969.tb04268.x","journal-title":"Bell Syst Tech J"},{"key":"15190_CR33","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.ijleo.2018.09.088","volume":"176","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P (2019) Optical asymmetric watermarking using 4D hyperchaotic system and modified equal modulus decomposition in hybrid multi resolution wavelet domain. Optik 176:425\u2013437. https:\/\/doi.org\/10.1016\/j.ijleo.2018.09.088","journal-title":"Optik"},{"key":"15190_CR34","doi-asserted-by":"publisher","DOI":"10.16943\/ptinsa\/2019\/49590","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P (2019) An asymmetric hybrid watermarking mechanism using hyperchaotic system and random decomposition in 2D Non-separable linear canonical domain. PINSA. https:\/\/doi.org\/10.16943\/ptinsa\/2019\/49590","journal-title":"PINSA"},{"issue":"6","key":"15190_CR35","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/s11082-019-1921-x","volume":"51","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P, Kumar R (2019) An iris biometric protection scheme using 4D hyperchaotic system and modified equal modulus decomposition in hybrid multi resolution wavelet domain. Opt Quant Electron 51(6):204. https:\/\/doi.org\/10.1007\/s11082-019-1921-x","journal-title":"Opt Quant Electron"},{"issue":"7","key":"15190_CR36","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767. https:\/\/doi.org\/10.1364\/OL.20.000767","journal-title":"Opt Lett"},{"key":"15190_CR37","doi-asserted-by":"publisher","unstructured":"Sachin, Archana, and P. Singh. 2021. \u201cOptical image encryption algorithm based on chaotic Tinkerbell map with random phase masks in Fourier domain,\u201d in Proceedings of International Conference on Data Science and Applications, vol. 148, K. Ray, K. C. Roy, S. K. Toshniwal, H. Sharma, and A. Bandyopadhyay, Eds. Singapore: Springer Singapore, 2021, pp. 249\u2013262. https:\/\/doi.org\/10.1007\/978-981-15-7561-7_20.","DOI":"10.1007\/978-981-15-7561-7_20"},{"key":"15190_CR38","doi-asserted-by":"publisher","unstructured":"Sharma N, Saini  I, Yadav A, and Singh  P. 2017. \u201cPhase image encryption based on 3D-Lorenz chaotic system and double random phase encoding.\u201d 3D Res. vol. 8, no. 4, p. 39, https:\/\/doi.org\/10.1007\/s13319-017-0149-4.","DOI":"10.1007\/s13319-017-0149-4"},{"key":"15190_CR39","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.optlaseng.2016.11.022","volume":"91","author":"P Singh","year":"2017","unstructured":"Singh P, Yadav AK, Singh K (2017) Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt Lasers Eng 91:187\u2013195. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.11.022","journal-title":"Opt Lasers Eng"},{"key":"15190_CR40","doi-asserted-by":"publisher","unstructured":"Singh P, Yadav AK,\u00a0 Singh K, and Saini  I. 2017. \u201cOptical image encryption in the fractional Hartley domain, using Arnold transform and singular value decomposition,\u201d presented at the AIP conference proceeding, 2017, p. 020017. https:\/\/doi.org\/10.1063\/1.4973267.","DOI":"10.1063\/1.4973267"},{"key":"15190_CR41","doi-asserted-by":"publisher","unstructured":"Singh P, Yadav AK, and Singh K. 2019 \u201cKnown-plaintext attack on cryptosystem based on fractional hartley transform using particle swarm optimization algorithm,\u201d in Engineering Vibration, Communication and Information Processing, vol. 478, K. Ray, S. N. Sharan, S. Rawat, S. K. Jain, S. Srivastava, and A. Bandyopadhyay, Eds. Singapore: Springer Singapore, 2019, pp. 317\u2013327. https:\/\/doi.org\/10.1007\/978-981-13-1642-5_29.","DOI":"10.1007\/978-981-13-1642-5_29"},{"issue":"12","key":"15190_CR42","doi-asserted-by":"publisher","first-page":"14021","DOI":"10.1007\/s11042-016-3800-9","volume":"76","author":"X Su","year":"2017","unstructured":"Su X, Li W, Hu H (2017) Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 76(12):14021\u201314033. https:\/\/doi.org\/10.1007\/s11042-016-3800-9","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"15190_CR43","doi-asserted-by":"publisher","first-page":"14443","DOI":"10.1038\/s41598-019-50234-9","volume":"9","author":"V Sukhoy","year":"2019","unstructured":"Sukhoy V, Stoytchev A (2019) Generalizing the inverse FFT off the unit circle. Sci Rep 9(1):14443. https:\/\/doi.org\/10.1038\/s41598-019-50234-9","journal-title":"Sci Rep"},{"issue":"12","key":"15190_CR44","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1364\/OL.25.000887","volume":"25","author":"G Unnikrishnan","year":"2000","unstructured":"Unnikrishnan G, Joseph J, Singh K (2000) Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt Lett 25(12):887. https:\/\/doi.org\/10.1364\/OL.25.000887","journal-title":"Opt Lett"},{"issue":"4","key":"15190_CR45","doi-asserted-by":"publisher","first-page":"pp. 691","DOI":"10.1134\/S1054661820040240","volume":"30","author":"D Vijayalakshmi","year":"2020","unstructured":"Vijayalakshmi D, Nath MK (2020) Taxonomy of Performance Measures for Contrast Enhancement. Pattern Recognit. Image Anal 30(4):691\u2013701. https:\/\/doi.org\/10.1134\/S1054661820040240","journal-title":"Pattern Recognit. Image Anal"},{"issue":"8","key":"15190_CR46","doi-asserted-by":"publisher","first-page":"3929","DOI":"10.1007\/s00034-021-01655-3","volume":"40","author":"D Vijayalakshmi","year":"2021","unstructured":"Vijayalakshmi D, Nath MK (2021) A Novel Contrast Enhancement Technique using Gradient-Based Joint Histogram Equalization. Circuits Syst Signal Process 40(8):3929\u20133967. https:\/\/doi.org\/10.1007\/s00034-021-01655-3","journal-title":"Circuits Syst Signal Process"},{"issue":"1","key":"15190_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-020-00305-3","volume":"21","author":"D Vijayalakshmi","year":"2020","unstructured":"Vijayalakshmi D, Nath MK, Acharya OP (2020) A Comprehensive Survey on Image Contrast Enhancement Techniques in Spatial Domain. Sens Imaging 21(1):1\u201340. https:\/\/doi.org\/10.1007\/s11220-020-00305-3","journal-title":"Sens Imaging"},{"key":"15190_CR48","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2020.106393","volume":"137","author":"X Wang","year":"2021","unstructured":"Wang X, Li Y (2021) Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Opt Lasers Eng 137:10\u20136393. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106393","journal-title":"Opt Lasers Eng"},{"key":"15190_CR49","doi-asserted-by":"publisher","first-page":"p. 163550","DOI":"10.1016\/j.optlastec.2020.106355","volume":"132","author":"T Wang","year":"2020","unstructured":"Wang T, Wang M (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Opt Laser Technol 132:163550. https:\/\/doi.org\/10.1016\/j.optlastec.2020.106355","journal-title":"Opt Laser Technol"},{"key":"15190_CR50","doi-asserted-by":"publisher","first-page":"66234","DOI":"10.1109\/ACCESS.2019.2917994","volume":"7","author":"J Wang","year":"2019","unstructured":"Wang J, Chen X, Zeng J, Wang Q-H, Hu Y (2019) Asymmetric cryptosystem using improved equal modulus decomposition in cylindrical diffraction domain. IEEE Access 7:66234\u201366241. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917994","journal-title":"IEEE Access"},{"issue":"3","key":"15190_CR51","doi-asserted-by":"publisher","first-page":"246","DOI":"10.3390\/e21030246","volume":"21","author":"H Wen","year":"2019","unstructured":"Wen H, Yu S, L\u00fc J (2019) Breaking an image encryption algorithm based on DNA encoding and spatiotemporal chaos. Entropy 21(3):246. https:\/\/doi.org\/10.3390\/e21030246","journal-title":"Entropy"},{"issue":"30","key":"15190_CR52","doi-asserted-by":"publisher","first-page":"8921","DOI":"10.1364\/AO.54.008921","volume":"54","author":"J Wu","year":"2015","unstructured":"Wu J, Liu W, Liu Z, Liu S (2015) Cryptanalysis of an asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Appl Opt 54(30):8921. https:\/\/doi.org\/10.1364\/AO.54.008921","journal-title":"Appl Opt"},{"key":"15190_CR53","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Image encryption using 2D H\u00e9non-Sine map and DNA approach. Signal Process 153:11\u201323. https:\/\/doi.org\/10.1016\/j.sigpro.2018.06.008","journal-title":"Signal Process"},{"issue":"2","key":"15190_CR54","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/s12596-017-0435-9","volume":"47","author":"AK Yadav","year":"2018","unstructured":"Yadav AK, Singh P, Singh K (2018) Cryptosystem based on devil\u2019s vortex Fresnel lens in the fractional Hartley domain. J Opt 47(2):208\u2013219. https:\/\/doi.org\/10.1007\/s12596-017-0435-9","journal-title":"J Opt"},{"issue":"11","key":"15190_CR55","doi-asserted-by":"publisher","first-page":"3137","DOI":"10.1142\/S0218127411030581","volume":"21","author":"S Yuan","year":"2011","unstructured":"Yuan S, Jiang T, Jing Z (2011) Bifurcation and chaos in the Tinkerbell map. Int J Bifurcation Chaos 21(11):3137\u20133156. https:\/\/doi.org\/10.1142\/S0218127411030581","journal-title":"Int J Bifurcation Chaos"},{"key":"15190_CR56","doi-asserted-by":"publisher","first-page":"94810","DOI":"10.1109\/ACCESS.2020.2995839","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang Y (2020) Cryptanalyzing an image cryptosystem based on circular inter-intra pixels bit-level permutation. IEEE Access 8:94810\u201394816. https:\/\/doi.org\/10.1109\/ACCESS.2020.2995839","journal-title":"IEEE Access"},{"issue":"11","key":"15190_CR57","doi-asserted-by":"publisher","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Guo L, Wei X (Dec.2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11):2028\u20132035. https:\/\/doi.org\/10.1016\/j.mcm.2010.06.005","journal-title":"Math Comput Model"},{"issue":"11","key":"15190_CR58","doi-asserted-by":"publisher","first-page":"6303","DOI":"10.1007\/s11042-015-2573-x","volume":"75","author":"P Zhen","year":"2016","unstructured":"Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl 75(11):6303\u20136319. https:\/\/doi.org\/10.1007\/s11042-015-2573-x","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"15190_CR59","doi-asserted-by":"publisher","first-page":"772","DOI":"10.3390\/e22070772","volume":"22","author":"S Zhu","year":"2020","unstructured":"Zhu S, Zhu C (2020) Secure image encryption algorithm based on hyperchaos and dynamic DNA coding. Entropy 22(7):772. https:\/\/doi.org\/10.3390\/e22070772","journal-title":"Entropy"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15190-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15190-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15190-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T10:13:27Z","timestamp":1698315207000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15190-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,12]]},"references-count":59,"journal-issue":{"issue":"27","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["15190"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15190-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,12]]},"assertion":[{"value":"29 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest concerning the publication of this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}