{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:28:59Z","timestamp":1740122939788,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16755-2","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:02:34Z","timestamp":1694620954000},"page":"29667-29687","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Stereo image encryption using vector decomposition and symmetry of 2D-DFT in quaternion gyrator domain"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4847-282X","authenticated-orcid":false,"given":"Zhuhong","family":"Shao","sequence":"first","affiliation":[]},{"given":"Leding","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoxu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Bicao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xilin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Shang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"issue":"15","key":"16755_CR1","doi-asserted-by":"publisher","first-page":"6907","DOI":"10.1002\/jsfa.12052","volume":"102","author":"K Nazari","year":"2022","unstructured":"Nazari K, Ebadi MJ, Berahmand K (2022) Diagnosis of alternaria disease and leafminer pest on tomato leaves using image processing techniques. J Sci Food Agric 102(15):6907\u20136920","journal-title":"J Sci Food Agric"},{"key":"16755_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2021.102228","volume":"123","author":"M Rostami","year":"2022","unstructured":"Rostami M, Forouzandeh S, Berahmand K, Soltani M, Shahsavari M, Oussalah M (2022) Gene selection for microarray data classification via multi-objective graph theoretic-based method. Artif Intell Med 123:102228","journal-title":"Artif Intell Med"},{"key":"16755_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104210","volume":"100","author":"M Rostami","year":"2021","unstructured":"Rostami M, Berahmand K, Nasiri E, Forouzandeh S (2021) Review of swarm intelligence-based feature selection methods. Eng Appl Artif Intell 100:104210","journal-title":"Eng Appl Artif Intell"},{"key":"16755_CR4","doi-asserted-by":"publisher","unstructured":"Shang Y, Pan Y, Jiang X, Shao Z, Guo G, Liu T, Ding H (2021) LQGDNet: a local quaternion and global deep network for facial depression recognition. IEEE Trans Affect Comput. https:\/\/doi.org\/10.1109\/TAFFC.2021.3139651","DOI":"10.1109\/TAFFC.2021.3139651"},{"issue":"9","key":"16755_CR5","doi-asserted-by":"publisher","first-page":"14477","DOI":"10.1007\/s11042-020-10234-8","volume":"80","author":"Z Xu","year":"2021","unstructured":"Xu Z, Shao Z, Shang Y, Li B, Ding H, Liu T (2021) Fusing structure and color features for cancelable face recognition. Multimed Tools Appl 80(9):14477\u201314494","journal-title":"Multimed Tools Appl"},{"key":"16755_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106375","volume":"137","author":"H Chen","year":"2021","unstructured":"Chen H, Liu Z, Tanougast C, Liu F, Blondel W (2021) Optical cryptosystem scheme for hyperspectral image based on random spiral transform in gyrator domains. Opt Lasers Eng 137:106375","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"16755_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3165265","volume":"14","author":"W Sun","year":"2018","unstructured":"Sun W, Zhou J, Zhu S, Tang YY (2018) Robust privacy-preserving image sharing over online social networks (OSNs). ACM Trans Multimed Comput Commun Appl 14(1):1\u201322","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"16755_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.optlaseng.2016.03.021","volume":"89","author":"C Guo","year":"2017","unstructured":"Guo C, Wei C, Tan J, Chen K, Liu S, Wu Q, Liu Z (2017) A review of iterative phase retrieval for measurement and encryption. Opt Lasers Eng 89:2\u201312","journal-title":"Opt Lasers Eng"},{"key":"16755_CR9","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Hua Z, Jin F, Xu B, Huang H (2018) 2D logistic-sine-coupling map for image encryption. Signal Process 149:148\u2013161","journal-title":"Signal Process"},{"issue":"12","key":"16755_CR10","doi-asserted-by":"publisher","first-page":"2050173","DOI":"10.1142\/S0218127420501734","volume":"30","author":"H Liu","year":"2020","unstructured":"Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. Int J Bifurcation Chaos 30(12):2050173","journal-title":"Int J Bifurcation Chaos"},{"key":"16755_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107280","volume":"167","author":"S Ismail","year":"2020","unstructured":"Ismail S, Said L, Radwan A, Madian A, Abu-ElYazeed M (2020) A novel image encryption system merging fractional-order edge detection and generalized chaotic maps. Signal Process 167:107280","journal-title":"Signal Process"},{"issue":"6","key":"16755_CR12","first-page":"2250081","volume":"32","author":"M Zhao","year":"2022","unstructured":"Zhao M, Liu H (2022) Construction of a nondegenerate 2D chaotic map with application to irreversible parallel key expansion algorithm. I J Chaos 32(6):2250081","journal-title":"I J Chaos"},{"key":"16755_CR13","doi-asserted-by":"publisher","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"H Liu","year":"2023","unstructured":"Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-box using 3D chaotic map and application to image encryption. Multimed Tool Appl 82:23899\u201323914","journal-title":"Multimed Tool Appl"},{"key":"16755_CR14","doi-asserted-by":"publisher","first-page":"20037","DOI":"10.1007\/s11042-018-7110-2","volume":"78","author":"W Yu","year":"2019","unstructured":"Yu W, Liu Y, Gong L, Tian M, Tu L (2019) Double-image encryption based on spatiotemporal chaos and DNA operations. Multimed Tools Appl 78:20037\u201320064","journal-title":"Multimed Tools Appl"},{"key":"16755_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2021.116168","volume":"93","author":"Y Tang","year":"2021","unstructured":"Tang Y, Shao Z, Zhao X, Shang Y (2021) Robust multiple color images encryption using discrete Fourier transforms and chaotic map. Signal Process Image Commun 93:116168","journal-title":"Signal Process Image Commun"},{"key":"16755_CR16","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.optlastec.2018.06.014","volume":"107","author":"R Kumar","year":"2018","unstructured":"Kumar R, Sheridan JT, Bhaduri B (2018) Nonlinear double image encryption using 2D non-separable linear canonical transform and phase retrieval algorithm. Opt Laser Technol 107:353\u2013360","journal-title":"Opt Laser Technol"},{"issue":"6","key":"16755_CR17","doi-asserted-by":"publisher","first-page":"1595","DOI":"10.1109\/TCSVT.2018.2851983","volume":"29","author":"X Kang","year":"2018","unstructured":"Kang X, Ming A, Tao R (2018) Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans Circuits Syst Video Technol 29(6):1595\u20131607","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"16755_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10043-019-00552-0","volume":"27","author":"G Ren","year":"2020","unstructured":"Ren G, Han J, Fu J, Shan M (2020) Asymmetric multiple-image interference cryptosystem using discrete cosine transform and conditional decomposition. Opt Rev 27:1\u20138","journal-title":"Opt Rev"},{"issue":"10","key":"16755_CR19","doi-asserted-by":"publisher","first-page":"14633","DOI":"10.1007\/s11042-022-13898-6","volume":"82","author":"Z Shao","year":"2023","unstructured":"Shao Z, Wang X, Tang Y, Shang Y (2023) Trinion discrete cosine transform with application to color image encryption. Multimed Tools Appl 82(10):14633\u201314659","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"16755_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPHOT.2020.2963921","volume":"12","author":"G Luan","year":"2020","unstructured":"Luan G, Li A, Chen Z, Huang C (2020) Asymmetric optical image encryption with silhouette removal using interference and equal modulus decomposition. IEEE Photonics J 12(2):1\u20138","journal-title":"IEEE Photonics J"},{"key":"16755_CR21","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.optcom.2015.05.043","volume":"354","author":"N Zhou","year":"2015","unstructured":"Zhou N, Yang J, Tan C, Pan S, Zhou Z (2015) Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt Commun 354:112\u2013121","journal-title":"Opt Commun"},{"key":"16755_CR22","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.optcom.2015.05.071","volume":"354","author":"L Sui","year":"2015","unstructured":"Sui L, Liu B, Wang Q, Li Y, Liang J (2015) Double-image encryption based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator domain. Opt Commun 354:184\u2013196","journal-title":"Opt Commun"},{"key":"16755_CR23","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1007\/s11042-016-4279-0","volume":"77","author":"Z Shao","year":"2018","unstructured":"Shao Z, Shang Y, Fu X, Yuan H, Shu H (2018) Double-image cryptosystem using chaotic map and mixture amplitude-phase retrieval in gyrator domain. Multimed Tools Appl 77:1285\u20131298","journal-title":"Multimed Tools Appl"},{"key":"16755_CR24","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.optlaseng.2018.10.002","volume":"113","author":"L Sui","year":"2019","unstructured":"Sui L, Zhang X, Huang C, Tian A, Asundi AK (2019) Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Opt Lasers Eng 113:29\u201337","journal-title":"Opt Lasers Eng"},{"key":"16755_CR25","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.optlaseng.2019.01.015","volume":"118","author":"M Abuturab","year":"2019","unstructured":"Abuturab M (2019) Securing multiple information using wavelet transform and Yang-Gu mixture amplitude-phase retrieval algorithm. Opt Lasers Eng 118:42\u201351","journal-title":"Opt Lasers Eng"},{"key":"16755_CR26","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.optlaseng.2019.06.005","volume":"122","author":"L Sui","year":"2019","unstructured":"Sui L, Du C, Zhang X, Tian A, Asundi A (2019) Double-image encryption based on interference and logistic map under the framework of double random phase encoding. Opt Lasers Eng 122:113\u2013122","journal-title":"Opt Lasers Eng"},{"key":"16755_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105858","volume":"122","author":"L Liu","year":"2020","unstructured":"Liu L, Shan M, Zhong Z, Liu B (2020) Multiple-image encryption and authentication based on optical interference by sparsification and space multiplexing. Opt Laser Technol 122:105858","journal-title":"Opt Laser Technol"},{"key":"16755_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115662","volume":"80","author":"Z Shao","year":"2020","unstructured":"Shao Z, Liu X, Yao Q, Qi N, Shang Y, Zhang J (2020) Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Process-Image Comm 80:115662","journal-title":"Signal Process-Image Comm"},{"issue":"10","key":"16755_CR29","doi-asserted-by":"publisher","first-page":"15825","DOI":"10.1007\/s11042-021-10550-7","volume":"80","author":"X Sun","year":"2021","unstructured":"Sun X, Shao Z, Shang Y, Liang M, Yang F (2021) Multiple-image encryption based on cascaded gyrator transforms and high-dimensional chaotic system. Multimed Tools Appl 80(10):15825\u201315848","journal-title":"Multimed Tools Appl"},{"key":"16755_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2021.108275","volume":"189","author":"X Liu","year":"2021","unstructured":"Liu X, Wu Y, Zhang H, Wu J, Zhang L (2021) Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking. Signal Process 189:108275","journal-title":"Signal Process"},{"key":"16755_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2023.109107","volume":"211","author":"N Zhou","year":"2023","unstructured":"Zhou N, Tong L, Zou W (2023) Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation. Signal Process 211:109107","journal-title":"Signal Process"},{"key":"16755_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107652","volume":"175","author":"H Ye","year":"2020","unstructured":"Ye H, Zhou N, Gong L (2020) Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Process 175:107652","journal-title":"Signal Process"},{"key":"16755_CR33","doi-asserted-by":"crossref","unstructured":"Scharstein D, Pal C (2007) Learning conditional random fields for stereo. In: IEEE computer society conference on computer vision and pattern recognition (CVPR 2007), Minneapolis, MN","DOI":"10.1109\/CVPR.2007.383191"},{"key":"16755_CR34","doi-asserted-by":"crossref","unstructured":"Hirschm\u00fcller H, Scharstein D (2007) Evaluation of cost functions for stereo matching. In: IEEE computer society conference on computer vision and pattern recognition (CVPR 2007), Minneapolis, MN","DOI":"10.1109\/CVPR.2007.383248"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16755-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16755-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16755-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T10:08:09Z","timestamp":1710065289000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16755-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,13]]},"references-count":34,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16755"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16755-2","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,9,13]]},"assertion":[{"value":"28 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}