{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T06:29:25Z","timestamp":1768976965655,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"31","license":[{"start":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T00:00:00Z","timestamp":1708560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T00:00:00Z","timestamp":1708560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18500-9","type":"journal-article","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T08:02:56Z","timestamp":1708588976000},"page":"76223-76245","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Asymmetric healthcare biometric image encryption and watermarking technique using QZ synthesis and QRD algorithm"],"prefix":"10.1007","volume":"83","author":[{"given":"Mehak","family":"Khurana","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5312-2181","authenticated-orcid":false,"given":"Pankaj","family":"Rakheja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,22]]},"reference":[{"key":"18500_CR1","doi-asserted-by":"publisher","first-page":"26273","DOI":"10.1007\/s11042-021-10932-x","volume":"80","author":"AS Shalaby","year":"2021","unstructured":"Shalaby AS, Gad R, Hemdan EE-D, El-Fishawy N (2021) An efficient CNN based encrypted Iris recognition approach in cognitive-IoT system. Multimed Tools Appl 80:26273\u201326296. https:\/\/doi.org\/10.1007\/s11042-021-10932-x","journal-title":"Multimed Tools Appl"},{"key":"18500_CR2","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s41939-019-00049-y","volume":"2","author":"V Kakkad","year":"2019","unstructured":"Kakkad V, Patel M, Shah M (2019) Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidiscip Model Exp and Des 2:233\u2013248. https:\/\/doi.org\/10.1007\/s41939-019-00049-y","journal-title":"Multiscale and Multidiscip Model Exp and Des"},{"key":"18500_CR3","doi-asserted-by":"publisher","first-page":"165661","DOI":"10.1016\/j.ijleo.2020.165661","volume":"224","author":"S Yoosefian Dezfuli Nezhad","year":"2020","unstructured":"Yoosefian Dezfuli Nezhad S, Safdarian N, Hoseini Zadeh SA (2020) New method for fingerprint images encryption using DNA sequence and chaotic tent map. Optik 224:165661. https:\/\/doi.org\/10.1016\/j.ijleo.2020.165661","journal-title":"Optik"},{"key":"18500_CR4","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett, OL 20:767\u2013769. https:\/\/doi.org\/10.1364\/OL.20.000767","journal-title":"Opt Lett, OL"},{"key":"18500_CR5","doi-asserted-by":"publisher","first-page":"3006","DOI":"10.1364\/AO.51.003006","volume":"51","author":"MR Abuturab","year":"2012","unstructured":"Abuturab MR (2012) Color image security system using double random-structured phase encoding in gyrator transform domain. Appl Opt, AO 51:3006\u20133016. https:\/\/doi.org\/10.1364\/AO.51.003006","journal-title":"Appl Opt, AO"},{"key":"18500_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optlaseng.2017.09.019","volume":"101","author":"J Chen","year":"2018","unstructured":"Chen J, Zhang Y, Li J, Zhang L (2018) Security enhancement of double random phase encoding using rear-mounted phase masking. Opt Lasers Eng 101:51\u201359. https:\/\/doi.org\/10.1016\/j.optlaseng.2017.09.019","journal-title":"Opt Lasers Eng"},{"key":"18500_CR7","doi-asserted-by":"publisher","first-page":"A1","DOI":"10.1364\/JOSAA.35.0000A1","volume":"35","author":"S Jiao","year":"2018","unstructured":"Jiao S, Li G, Zhou C et al (2018) Special ciphertext-only attack to double random phase encryption by plaintext shifting with speckle correlation. J Opt Soc Am A, JOSAA 35:A1\u2013A6. https:\/\/doi.org\/10.1364\/JOSAA.35.0000A1","journal-title":"J Opt Soc Am A, JOSAA"},{"key":"18500_CR8","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.optlaseng.2017.07.015","volume":"100","author":"S Yuan","year":"2018","unstructured":"Yuan S, Yang Y, Liu X et al (2018) Optical image transformation and encryption by phase-retrieval-based double random-phase encoding and compressive ghost imaging. Opt Lasers Eng 100:105\u2013110. https:\/\/doi.org\/10.1016\/j.optlaseng.2017.07.015","journal-title":"Opt Lasers Eng"},{"key":"18500_CR9","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1364\/OL.29.001584","volume":"29","author":"G Situ","year":"2004","unstructured":"Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett, OL 29:1584\u20131586. https:\/\/doi.org\/10.1364\/OL.29.001584","journal-title":"Opt Lett, OL"},{"key":"18500_CR10","doi-asserted-by":"publisher","first-page":"105769","DOI":"10.1016\/j.optlastec.2019.105769","volume":"121","author":"K Zhou","year":"2020","unstructured":"Zhou K, Fan J, Fan H, Li M (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol 121:105769. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105769","journal-title":"Opt Laser Technol"},{"key":"18500_CR11","doi-asserted-by":"publisher","first-page":"98","DOI":"10.4018\/IJHISI.2018100107","volume":"13","author":"M Khurana","year":"2018","unstructured":"Khurana M, Singh H (2018) Spiral-phase masked optical image health care encryption system for medical images based on fast Walsh-Hadamard transform for security enhancement. Int J Healthcare Inf Syst Inform (IJHISI) 13:98\u2013117","journal-title":"Int J Healthcare Inf Syst Inform (IJHISI)"},{"key":"18500_CR12","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/s10044-017-0656-1","volume":"21","author":"AS Al-Waisy","year":"2018","unstructured":"Al-Waisy AS, Qahwaji R, Ipson S et al (2018) A multi-biometric iris recognition system based on a deep learning approach. Pattern Anal Applic 21:783\u2013802. https:\/\/doi.org\/10.1007\/s10044-017-0656-1","journal-title":"Pattern Anal Applic"},{"key":"18500_CR13","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.optlaseng.2018.12.010","volume":"116","author":"G Verma","year":"2019","unstructured":"Verma G, Liao M, Lu D et al (2019) An optical asymmetric encryption scheme with biometric keys. Opt Lasers Eng 116:32\u201340. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.12.010","journal-title":"Opt Lasers Eng"},{"key":"18500_CR14","doi-asserted-by":"publisher","first-page":"105810","DOI":"10.1016\/j.optlaseng.2019.105810","volume":"124","author":"MR Abuturab","year":"2020","unstructured":"Abuturab MR (2020) Multiple-information security system using key image phase and chaotic random phase encoding in Fresnel transform domain. Opt Lasers Eng 124:105810. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105810","journal-title":"Opt Lasers Eng"},{"key":"18500_CR15","doi-asserted-by":"publisher","first-page":"108071","DOI":"10.1016\/j.optlastec.2022.108071","volume":"151","author":"MR Abuturab","year":"2022","unstructured":"Abuturab MR, Alfalou A (2022) Multiple color image fusion, compression, and encryption using compressive sensing, chaotic-biometric keys, and optical fractional Fourier transform. Opt Laser Technol 151:108071. https:\/\/doi.org\/10.1016\/j.optlastec.2022.108071","journal-title":"Opt Laser Technol"},{"key":"18500_CR16","doi-asserted-by":"publisher","first-page":"106489","DOI":"10.1016\/j.optlastec.2020.106489","volume":"132","author":"A Hadj Brahim","year":"2020","unstructured":"Hadj Brahim A, Ali Pacha A, Hadj Said N (2020) Image encryption based on compressive sensing and chaos systems. Opt Laser Technol 132:106489. https:\/\/doi.org\/10.1016\/j.optlastec.2020.106489","journal-title":"Opt Laser Technol"},{"key":"18500_CR17","doi-asserted-by":"publisher","first-page":"98","DOI":"10.4018\/IJHISI.2018100107","volume":"13","author":"M Khurana","year":"2018","unstructured":"Khurana M, Singh H (2018) Spiral-phase masked optical image health care encryption system for medical images based on fast Walsh-Hadamard transform for security enhancement. IJHISI 13:98\u2013117. https:\/\/doi.org\/10.4018\/IJHISI.2018100107","journal-title":"IJHISI"},{"key":"18500_CR18","doi-asserted-by":"publisher","first-page":"026108","DOI":"10.1117\/1.OE.53.2.026108","volume":"53","author":"L Sui","year":"2014","unstructured":"Sui L, Lu H, Ning X, Wang Y (2014) Asymmetric double-image encryption method by using iterative phase retrieval algorithm in fractional Fourier transform domain. Opt Eng 53:026108. https:\/\/doi.org\/10.1117\/1.OE.53.2.026108","journal-title":"Opt Eng"},{"key":"18500_CR19","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.optlaseng.2015.03.024","volume":"72","author":"T Zhao","year":"2015","unstructured":"Zhao T, Ran Q, Yuan L et al (2015) Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography. Opt Lasers Eng 72:12\u201317. https:\/\/doi.org\/10.1016\/j.optlaseng.2015.03.024","journal-title":"Opt Lasers Eng"},{"key":"18500_CR20","doi-asserted-by":"publisher","unstructured":"Tobria A, Singh P (2022) Hybrid cryptosystem based on deterministic phase masks in Fresnel domain and Yang-Gu mixture amplitude-phase retrieval algorithm. https:\/\/doi.org\/10.21203\/rs.3.rs-1503910\/v1","DOI":"10.21203\/rs.3.rs-1503910\/v1"},{"key":"18500_CR21","doi-asserted-by":"publisher","first-page":"e3676265","DOI":"10.1155\/2022\/3676265","volume":"2022","author":"NAE-S Mohamed","year":"2022","unstructured":"Mohamed NAE-S, Youssif A, El-Sayed HA-G (2022) Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system. Complexity 2022:e3676265. https:\/\/doi.org\/10.1155\/2022\/3676265","journal-title":"Complexity"},{"key":"18500_CR22","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1080\/09500340.2020.1760384","volume":"67","author":"P Rakheja","year":"2020","unstructured":"Rakheja P, Singh P, Vig R, Kumar R (2020) Double image encryption scheme for iris template protection using 3D Lorenz system and modified equal modulus decomposition in hybrid transform domain. J Mod Opt 67:592\u2013605. https:\/\/doi.org\/10.1080\/09500340.2020.1760384","journal-title":"J Mod Opt"},{"key":"18500_CR23","doi-asserted-by":"publisher","first-page":"108254","DOI":"10.1016\/j.optlastec.2022.108254","volume":"153","author":"Y Shen","year":"2022","unstructured":"Shen Y, Tang C, Xu M, Lei Z (2022) Optical asymmetric single-channel cryptosystem based on QZ synthesis for color images. Optics Laser Technology 153:108254. https:\/\/doi.org\/10.1016\/j.optlastec.2022.108254","journal-title":"Optics Laser Technology"},{"key":"18500_CR24","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.optcom.2016.11.002","volume":"388","author":"SK Rajput","year":"2017","unstructured":"Rajput SK, Nishchal NK (2017) Optical double image security using random phase fractional Fourier domain encoding and phase-retrieval algorithm. Optics Communications 388:38\u201346. https:\/\/doi.org\/10.1016\/j.optcom.2016.11.002","journal-title":"Optics Communications"},{"key":"18500_CR25","doi-asserted-by":"publisher","first-page":"106177","DOI":"10.1016\/j.optlaseng.2020.106177","volume":"134","author":"P Rakheja","year":"2020","unstructured":"Rakheja P, Singh P, Vig R (2020) An asymmetric image encryption mechanism using QR decomposition in hybrid multi-resolution wavelet domain. Opt Lasers Eng 134:106177. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106177","journal-title":"Opt Lasers Eng"},{"key":"18500_CR26","doi-asserted-by":"publisher","first-page":"155184","DOI":"10.1109\/ACCESS.2020.3019216","volume":"8","author":"SF Yousif","year":"2020","unstructured":"Yousif SF, Abboud AJ, Radhi HY (2020) Robust image encryption with scanning technology, the El-Gamal Algorithm and Chaos Theory. IEEE Access 8:155184\u2013155209. https:\/\/doi.org\/10.1109\/ACCESS.2020.3019216","journal-title":"IEEE Access"},{"key":"18500_CR27","doi-asserted-by":"publisher","first-page":"27453","DOI":"10.1007\/s11042-022-12762-x","volume":"81","author":"SF Yousif","year":"2022","unstructured":"Yousif SF, Abboud AJ, Alhumaima RS (2022) A new image encryption based on bit replacing, chaos and DNA coding techniques. Multimed Tools Appl 81:27453\u201327493. https:\/\/doi.org\/10.1007\/s11042-022-12762-x","journal-title":"Multimed Tools Appl"},{"key":"18500_CR28","doi-asserted-by":"publisher","first-page":"136","DOI":"10.3390\/electronics11010136","volume":"11","author":"MZ Salim","year":"2022","unstructured":"Salim MZ, Abboud AJ, Yildirim R (2022) A visual cryptography-based watermarking approach for the detection and localization of image forgery. Electronics 11:136. https:\/\/doi.org\/10.3390\/electronics11010136","journal-title":"Electronics"},{"key":"18500_CR29","doi-asserted-by":"publisher","unstructured":"Abboud A, Alburghaif A, Jassim A (2018) Balancing compression and encryption of satellite imagery.  International Journal of Electrical and Computer Engineering (IJECE) 8:3568\u20133586. https:\/\/doi.org\/10.11591\/ijece.v8i5.pp3568-3586","DOI":"10.11591\/ijece.v8i5.pp3568-3586"},{"key":"18500_CR30","doi-asserted-by":"publisher","unstructured":"Albu-Rghaif AN, Jassim AK, Abboud AJ (2018) A data structure encryption algorithm based on circular queue to enhance data security. In: 2018 1st International Scientific Conference of Engineering Sciences - 3rd Scientific Conference of Engineering Science (ISCES). pp 24\u201329 https:\/\/doi.org\/10.1109\/ISCES.2018.8340522","DOI":"10.1109\/ISCES.2018.8340522"},{"key":"18500_CR31","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.optcom.2017.06.087","volume":"403","author":"Y Wei","year":"2017","unstructured":"Wei Y, Yan A, Dong J et al (2017) Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains. Optics Communications 403:62\u201367. https:\/\/doi.org\/10.1016\/j.optcom.2017.06.087","journal-title":"Optics Communications"},{"key":"18500_CR32","doi-asserted-by":"publisher","first-page":"13967","DOI":"10.1007\/s11042-020-08658-3","volume":"79","author":"M Khurana","year":"2020","unstructured":"Khurana M, Singh H (2020) Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures. Multimed Tools Appl 79:13967\u201313986. https:\/\/doi.org\/10.1007\/s11042-020-08658-3","journal-title":"Multimed Tools Appl"},{"key":"18500_CR33","doi-asserted-by":"publisher","first-page":"2108","DOI":"10.1080\/00207217.2015.1020882","volume":"102","author":"HB Kekre","year":"2015","unstructured":"Kekre HB, Sarode TK, Vig R (2015) A new multi-resolution hybrid wavelet for analysis and image compression. Int J Electron 102:2108\u20132126. https:\/\/doi.org\/10.1080\/00207217.2015.1020882","journal-title":"Int J Electron"},{"key":"18500_CR34","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/s11082-019-1921-x","volume":"51","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P, Kumar R (2019) An iris biometric protection scheme using 4D hyperchaotic system and modified equal modulus decomposition in hybrid multi resolution wavelet domain. Opt Quant Electron 51:204. https:\/\/doi.org\/10.1007\/s11082-019-1921-x","journal-title":"Opt Quant Electron"},{"key":"18500_CR35","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1007\/s11082-023-05131-x","volume":"55","author":"P Rakheja","year":"2023","unstructured":"Rakheja P, Khurana M (2023) Multiple iris image encryption using phase retrieval mask, QZ algorithm and umbrella map in hybrid transform domain. Opt Quant Electron 55:878. https:\/\/doi.org\/10.1007\/s11082-023-05131-x","journal-title":"Opt Quant Electron"},{"key":"18500_CR36","doi-asserted-by":"publisher","first-page":"108254","DOI":"10.1016\/j.optlastec.2022.108254","volume":"153","author":"Y Shen","year":"2022","unstructured":"Shen Y, Tang C, Xu M, Lei Z (2022) Optical asymmetric single-channel cryptosystem based on QZ synthesis for color images. Opt Laser Technol 153:108254. https:\/\/doi.org\/10.1016\/j.optlastec.2022.108254","journal-title":"Opt Laser Technol"},{"key":"18500_CR37","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1016\/j.optlastec.2018.08.033","volume":"109","author":"Y Xiong","year":"2019","unstructured":"Xiong Y, Quan C (2019) Hybrid attack free optical cryptosystem based on two random masks and lower upper decomposition with partial pivoting. Optics Laser Technology 109:456\u2013464. https:\/\/doi.org\/10.1016\/j.optlastec.2018.08.033","journal-title":"Optics Laser Technology"},{"key":"18500_CR38","doi-asserted-by":"publisher","first-page":"129265","DOI":"10.1016\/j.optcom.2023.129265","volume":"533","author":"I Mehra","year":"2023","unstructured":"Mehra I, Nishchal NK (2023) Fingerprint image encryption using phase retrieval algorithm in gyrator wavelet transform domain using QR decomposition. Optics Communications 533:129265. https:\/\/doi.org\/10.1016\/j.optcom.2023.129265","journal-title":"Optics Communications"},{"key":"18500_CR39","doi-asserted-by":"publisher","first-page":"109109","DOI":"10.1016\/j.optlastec.2023.109109","volume":"161","author":"M Rafiq Abuturab","year":"2023","unstructured":"Rafiq Abuturab M (2023) Multiple color image cryptosystem based on coupled-logistic-map-biometric keys, QR decomposition with column pivoting and optical Fresnel transform. Opt Laser Technol 161:109109. https:\/\/doi.org\/10.1016\/j.optlastec.2023.109109","journal-title":"Opt Laser Technol"},{"key":"18500_CR40","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s11082-019-2130-3","volume":"52","author":"M Arora","year":"2020","unstructured":"Arora M, Khurana M (2020) Secure image encryption technique based on jigsaw transform and chaotic scrambling using digital image watermarking. Opt Quant Electron 52:59. https:\/\/doi.org\/10.1007\/s11082-019-2130-3","journal-title":"Opt Quant Electron"},{"key":"18500_CR41","doi-asserted-by":"publisher","unstructured":"Anjana S, Rakheja P, Yadav A et al (2022) Asymmetric double image encryption, compression and watermarking scheme based on orthogonal-triangular decomposition with column pivoting. Optica Applicata 52. https:\/\/doi.org\/10.37190\/oa220210","DOI":"10.37190\/oa220210"},{"key":"18500_CR42","doi-asserted-by":"publisher","first-page":"4923","DOI":"10.1016\/j.optcom.2010.07.034","volume":"283","author":"Z Liu","year":"2010","unstructured":"Liu Z, Xu L, Guo Q et al (2010) Image watermarking by using phase retrieval algorithm in gyrator transform domain. Optics Communications 283:4923\u20134927. https:\/\/doi.org\/10.1016\/j.optcom.2010.07.034","journal-title":"Optics Communications"},{"key":"18500_CR43","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIP.2016.2616281","volume":"26","author":"PR Nalla","year":"2017","unstructured":"Nalla PR, Kumar A (2017) Toward more accurate iris recognition using cross-spectral matching. IEEE Trans Image Process 26:208\u2013221. https:\/\/doi.org\/10.1109\/TIP.2016.2616281","journal-title":"IEEE Trans Image Process"},{"key":"18500_CR44","doi-asserted-by":"publisher","first-page":"2008","DOI":"10.1109\/TIP.2017.2788866","volume":"27","author":"C Lin","year":"2018","unstructured":"Lin C, Kumar A (2018) Matching contactless and contact-based conventional fingerprint images for biometrics identification. IEEE Trans Image Process 27:2008\u20132021. https:\/\/doi.org\/10.1109\/TIP.2017.2788866","journal-title":"IEEE Trans Image Process"},{"key":"18500_CR45","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.1016\/j.procs.2018.05.129","volume":"132","author":"M Khurana","year":"2018","unstructured":"Khurana M, Singh H (2018) Data computation and secure encryption based on gyrator transform using singular value decomposition and randomization. Procedia Computer Science 132:1636\u20131645. https:\/\/doi.org\/10.1016\/j.procs.2018.05.129","journal-title":"Procedia Computer Science"},{"key":"18500_CR46","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.optlaseng.2016.01.014","volume":"81","author":"H Singh","year":"2016","unstructured":"Singh H (2016) Devil\u05f3s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain. Opt Lasers Eng 81:125\u2013139. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.01.014","journal-title":"Opt Lasers Eng"},{"key":"18500_CR47","doi-asserted-by":"publisher","first-page":"7301","DOI":"10.1364\/OE.383240","volume":"28","author":"S Jiao","year":"2020","unstructured":"Jiao S, Feng J, Gao Y et al (2020) Visual cryptography in single-pixel imaging. Opt Express 28:7301. https:\/\/doi.org\/10.1364\/OE.383240","journal-title":"Opt Express"},{"key":"18500_CR48","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1364\/OL.31.001044","volume":"31","author":"X Peng","year":"2006","unstructured":"Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31:1044. https:\/\/doi.org\/10.1364\/OL.31.001044","journal-title":"Opt Lett"},{"key":"18500_CR49","doi-asserted-by":"publisher","unstructured":"Sachin, Archana, Singh P (2021) Optical image encryption algorithm based on chaotic tinker Bell Map with random phase masks in Fourier Domain. In: Ray K, Roy KC, Toshniwal SK et al (eds). Proceedings of International Conference on Data Science and Applications. Springer Singapore, Singapore.  Lecture Notes in Networks and Systems 148:249\u2013262. https:\/\/doi.org\/10.1007\/978-981-15-7561-7_20","DOI":"10.1007\/978-981-15-7561-7_20"},{"key":"18500_CR50","doi-asserted-by":"publisher","unstructured":"Archana, Sachin, Singh P (2021) Cryptosystem based on triple random phase encoding with chaotic Henon Map. In: Ray K, Roy KC, Toshniwal SK et al (eds) Proceedings of International Conference on Data Science and Applications. Springer Singapore, Singapore. Lecture Notes in Networks and Systems 148:73\u201384. https:\/\/doi.org\/10.1007\/978-981-15-7561-7_5","DOI":"10.1007\/978-981-15-7561-7_5"},{"key":"18500_CR51","doi-asserted-by":"publisher","first-page":"106063","DOI":"10.1016\/j.optlaseng.2020.106063","volume":"129","author":"M Abdelfattah","year":"2020","unstructured":"Abdelfattah M, Hegazy SF, Areed NFF, Obayya SSA (2020) Compact optical asymmetric cryptosystem based on unequal modulus decomposition of multiple color images. Opt Lasers Eng 129:106063. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106063","journal-title":"Opt Lasers Eng"},{"key":"18500_CR52","doi-asserted-by":"publisher","first-page":"167568","DOI":"10.1016\/j.ijleo.2021.167568","volume":"244","author":"R Girija","year":"2021","unstructured":"Girija R, Anshula SH (2021) Security-enhanced optical nonlinear cryptosystem based on modified Gerchberg-Saxton iterative algorithm. Optik 244:167568. https:\/\/doi.org\/10.1016\/j.ijleo.2021.167568","journal-title":"Optik"},{"key":"18500_CR53","first-page":"283","volume":"52","author":"S Anjana","year":"2022","unstructured":"Anjana S, Rakheja P, Yadav A et al (2022) Asymmetric double image encryption, compression and watermarking scheme based on orthogonal-triangular decomposition with column pivoting. Opt Appl 52:283","journal-title":"Opt Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18500-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18500-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18500-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T08:42:42Z","timestamp":1725352962000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18500-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,22]]},"references-count":53,"journal-issue":{"issue":"31","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["18500"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18500-9","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,22]]},"assertion":[{"value":"23 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Manuscript has not been published elsewhere and that it has not been submitted simultaneously for publication elsewhere.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}