{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:28:20Z","timestamp":1759825700200,"version":"3.40.2"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,4,20]],"date-time":"2024-04-20T00:00:00Z","timestamp":1713571200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,20]],"date-time":"2024-04-20T00:00:00Z","timestamp":1713571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19100-3","type":"journal-article","created":{"date-parts":[[2024,4,20]],"date-time":"2024-04-20T06:02:01Z","timestamp":1713592921000},"page":"6687-6709","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An asymmetric double fingerprint template encryption using twin decomposition technique in hybrid transform domain"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5312-2181","authenticated-orcid":false,"given":"Pankaj","family":"Rakheja","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,20]]},"reference":[{"key":"19100_CR1","doi-asserted-by":"publisher","first-page":"26273","DOI":"10.1007\/s11042-021-10932-x","volume":"80","author":"AS Shalaby","year":"2021","unstructured":"Shalaby AS, Gad R, Hemdan EE-D, El-Fishawy N (2021) An efficient CNN based encrypted Iris recognition approach in cognitive-IoT system. Multimed Tools Appl 80:26273\u201326296. https:\/\/doi.org\/10.1007\/s11042-021-10932-x","journal-title":"Multimed Tools Appl"},{"key":"19100_CR2","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s41939-019-00049-y","volume":"2","author":"V Kakkad","year":"2019","unstructured":"Kakkad V, Patel M, Shah M (2019) Biometric authentication and image encryption for image security in cloud framework. Multiscale Multidiscip Model Exp Des 2:233\u2013248. https:\/\/doi.org\/10.1007\/s41939-019-00049-y","journal-title":"Multiscale Multidiscip Model Exp Des"},{"key":"19100_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18184-1","author":"X Wang","year":"2024","unstructured":"Wang X, Shao Z, Li B et al (2024) Color image encryption based on discrete trinion Fourier transform and compressive sensing. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-18184-1","journal-title":"Multimed Tools Appl"},{"key":"19100_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2021.116168","volume":"93","author":"Y Tang","year":"2021","unstructured":"Tang Y, Shao Z, Zhao X, Shang Y (2021) Robust multiple color images encryption using discrete Fourier transforms and chaotic map. Signal Process Image Commun 93:116168. https:\/\/doi.org\/10.1016\/j.image.2021.116168","journal-title":"Signal Process Image Commun"},{"key":"19100_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115662","volume":"80","author":"Z Shao","year":"2020","unstructured":"Shao Z, Liu X, Yao Q et al (2020) Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Process Image Commun 80:115662. https:\/\/doi.org\/10.1016\/j.image.2019.115662","journal-title":"Signal Process Image Commun"},{"key":"19100_CR6","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett, OL 20:767\u2013769. https:\/\/doi.org\/10.1364\/OL.20.000767","journal-title":"Opt Lett, OL"},{"key":"19100_CR7","doi-asserted-by":"publisher","first-page":"3006","DOI":"10.1364\/AO.51.003006","volume":"51","author":"MR Abuturab","year":"2012","unstructured":"Abuturab MR (2012) Color image security system using double random-structured phase encoding in gyrator transform domain. Appl Opt, AO 51:3006\u20133016. https:\/\/doi.org\/10.1364\/AO.51.003006","journal-title":"Appl Opt, AO"},{"key":"19100_CR8","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.optlaseng.2017.09.019","volume":"101","author":"J Chen","year":"2018","unstructured":"Chen J, Zhang Y, Li J, Zhang L (2018) Security enhancement of double random phase encoding using rear-mounted phase masking. Opt Lasers Eng 101:51\u201359. https:\/\/doi.org\/10.1016\/j.optlaseng.2017.09.019","journal-title":"Opt Lasers Eng"},{"key":"19100_CR9","doi-asserted-by":"publisher","first-page":"A1","DOI":"10.1364\/JOSAA.35.0000A1","volume":"35","author":"S Jiao","year":"2018","unstructured":"Jiao S, Li G, Zhou C et al (2018) Special ciphertext-only attack to double random phase encryption by plaintext shifting with speckle correlation. J Opt Soc Am A, JOSAA 35:A1\u2013A6. https:\/\/doi.org\/10.1364\/JOSAA.35.0000A1","journal-title":"J Opt Soc Am A, JOSAA"},{"key":"19100_CR10","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.optlaseng.2017.07.015","volume":"100","author":"S Yuan","year":"2018","unstructured":"Yuan S, Yang Y, Liu X et al (2018) Optical image transformation and encryption by phase-retrieval-based double random-phase encoding and compressive ghost imaging. Opt Lasers Eng 100:105\u2013110. https:\/\/doi.org\/10.1016\/j.optlaseng.2017.07.015","journal-title":"Opt Lasers Eng"},{"key":"19100_CR11","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1364\/OL.29.001584","volume":"29","author":"G Situ","year":"2004","unstructured":"Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett, OL 29:1584\u20131586. https:\/\/doi.org\/10.1364\/OL.29.001584","journal-title":"Opt Lett, OL"},{"key":"19100_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2019.105769","volume":"121","author":"K Zhou","year":"2020","unstructured":"Zhou K, Fan J, Fan H, Li M (2020) Secure image encryption scheme using double random-phase encoding and compressed sensing. Opt Laser Technol 121:105769. https:\/\/doi.org\/10.1016\/j.optlastec.2019.105769","journal-title":"Opt Laser Technol"},{"key":"19100_CR13","doi-asserted-by":"crossref","unstructured":"Biryukov A (2011) Known plaintext attack. In: Encyclopedia of cryptography and security. Springer, Boston, pp 704\u2013705","DOI":"10.1007\/978-1-4419-5906-5_588"},{"key":"19100_CR14","doi-asserted-by":"crossref","unstructured":"Biryukov A (2011) Chosen ciphertext attack. In: Encyclopedia of cryptography and security. Springer, Boston, pp 205\u2013205","DOI":"10.1007\/978-1-4419-5906-5_556"},{"key":"19100_CR15","doi-asserted-by":"publisher","first-page":"10253","DOI":"10.1364\/OE.15.010253","volume":"15","author":"Y Frauel","year":"2007","unstructured":"Frauel Y, Castro A, Naughton TJ, Javidi B (2007) Resistance of the double random phase encryption against various attacks. Opt Express, OE 15:10253\u201310265. https:\/\/doi.org\/10.1364\/OE.15.010253","journal-title":"Opt Express, OE"},{"key":"19100_CR16","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1364\/OL.31.001044","volume":"31","author":"X Peng","year":"2006","unstructured":"Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett, OL 31:1044\u20131046. https:\/\/doi.org\/10.1364\/OL.31.001044","journal-title":"Opt Lett, OL"},{"key":"19100_CR17","doi-asserted-by":"publisher","first-page":"3181","DOI":"10.1364\/OE.14.003181","volume":"14","author":"U Gopinathan","year":"2006","unstructured":"Gopinathan U, Monaghan DS, Naughton TJ, Sheridan JT (2006) A known-plaintext heuristic attack on the Fourier plane encryption algorithm. Opt Express, OE 14:3181\u20133186. https:\/\/doi.org\/10.1364\/OE.14.003181","journal-title":"Opt Express, OE"},{"key":"19100_CR18","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1364\/OL.35.000118","volume":"35","author":"W Qin","year":"2010","unstructured":"Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett, OL 35:118\u2013120. https:\/\/doi.org\/10.1364\/OL.35.000118","journal-title":"Opt Lett, OL"},{"key":"19100_CR19","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1016\/j.optcom.2011.12.017","volume":"285","author":"X Wang","year":"2012","unstructured":"Wang X, Zhao D (2012) A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Commun 285:1078\u20131081. https:\/\/doi.org\/10.1016\/j.optcom.2011.12.017","journal-title":"Opt Commun"},{"key":"19100_CR20","doi-asserted-by":"publisher","first-page":"6874","DOI":"10.1364\/AO.54.006874","volume":"54","author":"Y Wang","year":"2015","unstructured":"Wang Y, Quan C, Tay CJ (2015) Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform. Appl Opt, AO 54:6874\u20136881. https:\/\/doi.org\/10.1364\/AO.54.006874","journal-title":"Appl Opt, AO"},{"key":"19100_CR21","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1364\/AO.52.000871","volume":"52","author":"SK Rajput","year":"2013","unstructured":"Rajput SK, Nishchal NK (2013) Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. Appl Opt, AO 52:871\u2013878. https:\/\/doi.org\/10.1364\/AO.52.000871","journal-title":"Appl Opt, AO"},{"key":"19100_CR22","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.optcom.2013.06.036","volume":"309","author":"SK Rajput","year":"2013","unstructured":"Rajput SK, Nishchal NK (2013) Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem. Opt Commun 309:231\u2013235. https:\/\/doi.org\/10.1016\/j.optcom.2013.06.036","journal-title":"Opt Commun"},{"key":"19100_CR23","doi-asserted-by":"publisher","first-page":"3684","DOI":"10.1364\/OL.38.003684","volume":"38","author":"X Wang","year":"2013","unstructured":"Wang X, Zhao D (2013) Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask. Opt Lett, OL 38:3684\u20133686. https:\/\/doi.org\/10.1364\/OL.38.003684","journal-title":"Opt Lett, OL"},{"key":"19100_CR24","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1364\/AO.53.000208","volume":"53","author":"X Wang","year":"2014","unstructured":"Wang X, Chen Y, Dai C, Zhao D (2014) Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. Appl Opt, AO 53:208\u2013213. https:\/\/doi.org\/10.1364\/AO.53.000208","journal-title":"Appl Opt, AO"},{"key":"19100_CR25","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1364\/OL.40.000475","volume":"40","author":"J Cai","year":"2015","unstructured":"Cai J, Shen X, Lei M et al (2015) Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Opt Lett, OL 40:475\u2013478. https:\/\/doi.org\/10.1364\/OL.40.000475","journal-title":"Opt Lett, OL"},{"key":"19100_CR26","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/s11082-016-0786-5","volume":"48","author":"SP Barfungpa","year":"2016","unstructured":"Barfungpa SP, Abuturab MR (2016) Asymmetric cryptosystem using coherent superposition and equal modulus decomposition of fractional Fourier spectrum. Opt Quant Electron 48:520. https:\/\/doi.org\/10.1007\/s11082-016-0786-5","journal-title":"Opt Quant Electron"},{"key":"19100_CR27","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.optlaseng.2018.08.020","volume":"112","author":"H Chen","year":"2019","unstructured":"Chen H, Liu Z, Zhu L et al (2019) Asymmetric color cryptosystem using chaotic Ushiki map and equal modulus decomposition in fractional Fourier transform domains. Opt Lasers Eng 112:7\u201315. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.08.020","journal-title":"Opt Lasers Eng"},{"key":"19100_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2017.01.005","volume":"93","author":"H Chen","year":"2017","unstructured":"Chen H, Tanougast C, Liu Z, Sieler L (2017) Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains. Opt Lasers Eng 93:1\u20138. https:\/\/doi.org\/10.1016\/j.optlaseng.2017.01.005","journal-title":"Opt Lasers Eng"},{"key":"19100_CR29","doi-asserted-by":"publisher","DOI":"10.1088\/2040-8978\/18\/8\/085701","volume":"18","author":"A Fatima","year":"2016","unstructured":"Fatima A, Mehra I, Nishchal NK (2016) Optical image encryption using equal modulus decomposition and multiple diffractive imaging. J Opt 18:085701. https:\/\/doi.org\/10.1088\/2040-8978\/18\/8\/085701","journal-title":"J Opt"},{"key":"19100_CR30","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/s11082-019-1921-x","volume":"51","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P, Kumar R (2019) An iris biometric protection scheme using 4D hyperchaotic system and modified equal modulus decomposition in hybrid multi resolution wavelet domain. Opt Quant Electron 51:204. https:\/\/doi.org\/10.1007\/s11082-019-1921-x","journal-title":"Opt Quant Electron"},{"key":"19100_CR31","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1080\/09500340.2019.1574037","volume":"66","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P (2019) Asymmetric hybrid encryption scheme based on modified equal modulus decomposition in hybrid multi-resolution wavelet domain. J Mod Opt 66:799\u2013811. https:\/\/doi.org\/10.1080\/09500340.2019.1574037","journal-title":"J Mod Opt"},{"key":"19100_CR32","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.ijleo.2018.09.088","volume":"176","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P (2019) Optical asymmetric watermarking using 4D hyperchaotic system and modified equal modulus decomposition in hybrid multi resolution wavelet domain. Optik 176:425\u2013437. https:\/\/doi.org\/10.1016\/j.ijleo.2018.09.088","journal-title":"Optik"},{"key":"19100_CR33","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1364\/AO.55.000679","volume":"55","author":"Y Wang","year":"2016","unstructured":"Wang Y, Quan C, Tay CJ (2016) New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. Appl Opt 55:679\u2013686","journal-title":"Appl Opt"},{"key":"19100_CR34","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1080\/09500340.2018.1431314","volume":"65","author":"H Xu","year":"2018","unstructured":"Xu H, Xu W, Wang S, Wu S (2018) Phase-only asymmetric optical cryptosystem based on random modulus decomposition. J Mod Opt 65:1245\u20131252. https:\/\/doi.org\/10.1080\/09500340.2018.1431314","journal-title":"J Mod Opt"},{"key":"19100_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2019.163289","volume":"198","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P (2019) An asymmetric watermarking scheme based on random decomposition in hybrid multi-resolution wavelet domain using 3D Lorenz chaotic system. Optik 198:163289. https:\/\/doi.org\/10.1016\/j.ijleo.2019.163289","journal-title":"Optik"},{"key":"19100_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106063","volume":"129","author":"M Abdelfattah","year":"2020","unstructured":"Abdelfattah M, Hegazy SF, Areed NFF, Obayya SSA (2020) Compact optical asymmetric cryptosystem based on unequal modulus decomposition of multiple color images. Opt Lasers Eng 129:106063. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106063","journal-title":"Opt Lasers Eng"},{"key":"19100_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2023.109109","volume":"161","author":"M Rafiq Abuturab","year":"2023","unstructured":"Rafiq Abuturab M (2023) Multiple color image cryptosystem based on coupled-logistic-map-biometric keys, QR decomposition with column pivoting and optical Fresnel transform. Opt Laser Technol 161:109109. https:\/\/doi.org\/10.1016\/j.optlastec.2023.109109","journal-title":"Opt Laser Technol"},{"key":"19100_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2022.108254","volume":"153","author":"Y Shen","year":"2022","unstructured":"Shen Y, Tang C, Xu M, Lei Z (2022) Optical asymmetric single-channel cryptosystem based on QZ synthesis for color images. Opt Laser Technol 153:108254. https:\/\/doi.org\/10.1016\/j.optlastec.2022.108254","journal-title":"Opt Laser Technol"},{"key":"19100_CR39","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.optcom.2014.02.061","volume":"323","author":"MR Abuturab","year":"2014","unstructured":"Abuturab MR (2014) Single-channel color information security system using LU decomposition in gyrator transform domains. Optics Communications 323:100\u2013109. https:\/\/doi.org\/10.1016\/j.optcom.2014.02.061","journal-title":"Optics Communications"},{"key":"19100_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106448","volume":"138","author":"H Chen","year":"2021","unstructured":"Chen H, Liu Z, Tanougast C et al (2021) A novel chaos based optical cryptosystem for multiple images using DNA-blend and gyrator transform. Opt Lasers Eng 138:106448. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106448","journal-title":"Opt Lasers Eng"},{"key":"19100_CR41","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/s11082-016-0669-9","volume":"48","author":"H Chen","year":"2016","unstructured":"Chen H, Tanougast C, Liu Z, Hao B (2016) Securing color image by using hyperchaotic system in gyrator transform domains. Opt Quant Electron 48:396. https:\/\/doi.org\/10.1007\/s11082-016-0669-9","journal-title":"Opt Quant Electron"},{"key":"19100_CR42","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.optlaseng.2008.08.001","volume":"47","author":"H Li","year":"2009","unstructured":"Li H (2009) Image encryption based on gyrator transform and two-step phase-shifting interferometry. Opt Lasers Eng 47:45\u201350. https:\/\/doi.org\/10.1016\/j.optlaseng.2008.08.001","journal-title":"Opt Lasers Eng"},{"key":"19100_CR43","doi-asserted-by":"publisher","first-page":"3913","DOI":"10.1016\/j.optcom.2011.04.005","volume":"284","author":"W Chen","year":"2011","unstructured":"Chen W, Chen X (2011) Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain. Optics Communications 284:3913\u20133917. https:\/\/doi.org\/10.1016\/j.optcom.2011.04.005","journal-title":"Optics Communications"},{"key":"19100_CR44","doi-asserted-by":"publisher","first-page":"2238","DOI":"10.1016\/j.optlastec.2012.02.032","volume":"44","author":"J-J Huang","year":"2012","unstructured":"Huang J-J, Hwang H-E, Chen C-Y, Chen C-M (2012) Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain. Opt Laser Technol 44:2238\u20132244. https:\/\/doi.org\/10.1016\/j.optlastec.2012.02.032","journal-title":"Opt Laser Technol"},{"key":"19100_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2022.108254","volume":"153","author":"Y Shen","year":"2022","unstructured":"Shen Y, Tang C, Xu M, Lei Z (2022) Optical asymmetric single-channel cryptosystem based on QZ synthesis for color images. Optics Laser Technology 153:108254. https:\/\/doi.org\/10.1016\/j.optlastec.2022.108254","journal-title":"Optics Laser Technology"},{"key":"19100_CR46","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1007\/s11082-023-05131-x","volume":"55","author":"P Rakheja","year":"2023","unstructured":"Rakheja P, Khurana M (2023) Multiple iris image encryption using phase retrieval mask, QZ algorithm and umbrella map in hybrid transform domain. Opt Quant Electron 55:878. https:\/\/doi.org\/10.1007\/s11082-023-05131-x","journal-title":"Opt Quant Electron"},{"key":"19100_CR47","doi-asserted-by":"publisher","first-page":"20809","DOI":"10.1007\/s11042-019-7406-x","volume":"78","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P (2019) An asymmetric hybrid cryptosystem using hyperchaotic system and random decomposition in hybrid multi resolution wavelet domain. Multimed Tools Appl 78:20809\u201320834. https:\/\/doi.org\/10.1007\/s11042-019-7406-x","journal-title":"Multimed Tools Appl"},{"key":"19100_CR48","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/s11082-019-1769-0","volume":"51","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P (2019) An asymmetric hybrid cryptosystem using equal modulus and random decomposition in hybrid transform domain. Opt Quant Electron 51:54. https:\/\/doi.org\/10.1007\/s11082-019-1769-0","journal-title":"Opt Quant Electron"},{"key":"19100_CR49","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.optlastec.2015.11.009","volume":"78","author":"L Chen","year":"2016","unstructured":"Chen L, Gao X, Chen X et al (2016) A new optical image cryptosystem based on two-beam coherent superposition and unequal modulus decomposition. Opt Laser Technol 78:167\u2013174. https:\/\/doi.org\/10.1016\/j.optlastec.2015.11.009","journal-title":"Opt Laser Technol"},{"key":"19100_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106399","volume":"137","author":"S Archana","year":"2021","unstructured":"Archana S, Singh P (2021) Cascaded unequal modulus decomposition in Fresnel domain based cryptosystem to enhance the image security. Opt Lasers Eng 137:106399. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106399","journal-title":"Opt Lasers Eng"},{"key":"19100_CR51","doi-asserted-by":"publisher","first-page":"5965","DOI":"10.1007\/s11042-022-13584-7","volume":"82","author":"SH Anshula","year":"2023","unstructured":"Anshula SH (2023) Ensuring security of cryptosystems with DVFM-, modified equal modulus decomposition in the domain of gyrator wavelet transform. Multimed Tools Appl 82:5965\u20135985. https:\/\/doi.org\/10.1007\/s11042-022-13584-7","journal-title":"Multimed Tools Appl"},{"key":"19100_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106038","volume":"129","author":"MR Abuturab","year":"2020","unstructured":"Abuturab MR (2020) A superposition based multiple-image encryption using Fresnel-Domain high dimension chaotic phase encoding. Opt Lasers Eng 129:106038. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106038","journal-title":"Opt Lasers Eng"},{"key":"19100_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.165661","volume":"224","author":"S Yoosefian Dezfuli Nezhad","year":"2020","unstructured":"Yoosefian Dezfuli Nezhad S, Safdarian N, Hoseini Zadeh SA (2020) New method for fingerprint images encryption using DNA sequence and chaotic tent map. Optik 224:165661. https:\/\/doi.org\/10.1016\/j.ijleo.2020.165661","journal-title":"Optik"},{"key":"19100_CR54","doi-asserted-by":"publisher","first-page":"283","DOI":"10.37190\/oa220210","volume":"52","author":"S Anjana","year":"2022","unstructured":"Anjana S, Rakheja P, Yadav A, Singh P, Singh H (2022) Asymmetric double image encryption, compression and watermarking scheme based on orthogonal-triangular decomposition with column pivoting. Opt Appl 52:283. https:\/\/doi.org\/10.37190\/oa220210","journal-title":"Opt Appl"},{"key":"19100_CR55","doi-asserted-by":"publisher","first-page":"21","DOI":"10.37190\/oa220102","volume":"52","author":"J Kumar","year":"2022","unstructured":"Kumar J, Singh P, Yadav A (2022) Asymmetric double-image encryption using twin decomposition in fractional Hartley domain. Opt Appl 52:21\u201335. https:\/\/doi.org\/10.37190\/oa220102","journal-title":"Opt Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19100-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19100-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19100-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T00:26:42Z","timestamp":1742689602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19100-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,20]]},"references-count":55,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["19100"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19100-3","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,4,20]]},"assertion":[{"value":"22 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Manuscript has not been published elsewhere and that it has not been submitted simultaneously for publication elsewhere.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}