{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T20:29:33Z","timestamp":1759177773204,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"38","license":[{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202446"],"award-info":[{"award-number":["61202446"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["N150404004"],"award-info":[{"award-number":["N150404004"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20176-0","type":"journal-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T03:45:17Z","timestamp":1726199117000},"page":"85963-85985","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Optical image encryption based on 3D double-phase encoding algorithm in the gyrator transform domain"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5029-5703","authenticated-orcid":false,"given":"Jun","family":"Lang","sequence":"first","affiliation":[]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"20176_CR1","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/jproc.2009.2018367","volume":"97","author":"O Matoba","year":"2009","unstructured":"Matoba O, Nomura T, Perez-Cabre E, Millan MS, Javidi B (2009) Optical techniques for information security. Proc IEEE 97:1128\u20131148. https:\/\/doi.org\/10.1109\/jproc.2009.2018367","journal-title":"Proc IEEE"},{"key":"20176_CR2","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/ol.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20:767\u2013769. https:\/\/doi.org\/10.1364\/ol.20.000767","journal-title":"Opt Lett"},{"key":"20176_CR3","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1364\/ol.29.001584","volume":"29","author":"G Situ","year":"2004","unstructured":"Situ G, Zhang J (2004) Double random-phase encoding in the Fresnel domain. Opt Lett 29:1584\u20131586. https:\/\/doi.org\/10.1364\/ol.29.001584","journal-title":"Opt Lett"},{"key":"20176_CR4","doi-asserted-by":"publisher","first-page":"168649","DOI":"10.1016\/j.ijleo.2022.168649","volume":"254","author":"Y Su","year":"2022","unstructured":"Su Y, Wang X, Wang Z, Liu C, Li J, Xu K et al (2022) Security-enhanced multiple-image encryption based on modified iterative phase retrieval algorithm with structured phase mask in Fresnel domain. Optik 254:168649. https:\/\/doi.org\/10.1016\/j.ijleo.2022.168649","journal-title":"Optik"},{"key":"20176_CR5","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.optlaseng.2013.08.021","volume":"53","author":"J Lang","year":"2014","unstructured":"Lang J, Zhang Z (2014) Blind digital watermarking method in the fractional Fourier transform domain. Opt Lasers Eng 53:112\u2013121. https:\/\/doi.org\/10.1016\/j.optlaseng.2013.08.021","journal-title":"Opt Lasers Eng"},{"key":"20176_CR6","doi-asserted-by":"publisher","first-page":"5745","DOI":"10.1016\/j.optcom.2008.09.001","volume":"281","author":"H Li","year":"2008","unstructured":"Li H, Wang Y (2008) Double-image encryption based on iterative gyrator transform. Opt Commun 281:5745\u20135749. https:\/\/doi.org\/10.1016\/j.optcom.2008.09.001","journal-title":"Opt Commun"},{"key":"20176_CR7","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s11082-023-05524-y","volume":"56","author":"A Tobria","year":"2024","unstructured":"Tobria A, Singh P (2024) A comparative analysis of phase retrieval algorithms in asymmetric double image cryptosystem in gyrator domain. Opt Quantum Electron 56:33. https:\/\/doi.org\/10.1007\/s11082-023-05524-y","journal-title":"Opt Quantum Electron"},{"key":"20176_CR8","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1016\/j.optlaseng.2012.02.012","volume":"50","author":"J Lang","year":"2012","unstructured":"Lang J (2012) Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform and chaos permutation. Opt Lasers Eng 50:929\u2013937. https:\/\/doi.org\/10.1016\/j.optlaseng.2012.02.012","journal-title":"Opt Lasers Eng"},{"key":"20176_CR9","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.optlaseng.2016.01.014","volume":"81","author":"H Singh","year":"2016","unstructured":"Singh H (2016) Devil\u2019s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain. Opt Lasers Eng 81:125\u2013139. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.01.014","journal-title":"Opt Lasers Eng"},{"key":"20176_CR10","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.optcom.2014.10.049","volume":"338","author":"J Lang","year":"2015","unstructured":"Lang J (2015) Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Opt Commun 338:181\u2013192. https:\/\/doi.org\/10.1016\/j.optcom.2014.10.049","journal-title":"Opt Commun"},{"key":"20176_CR11","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1364\/ol.31.001044","volume":"31","author":"X Peng","year":"2006","unstructured":"Peng X, Zhang P, Wei H, Yu B (2006) Known-plaintext attack on optical encryption based on double random phase keys. Opt Lett 31:1044\u20131046. https:\/\/doi.org\/10.1364\/ol.31.001044","journal-title":"Opt Lett"},{"key":"20176_CR12","doi-asserted-by":"publisher","first-page":"3261","DOI":"10.1364\/ol.31.003261","volume":"31","author":"X Peng","year":"2006","unstructured":"Peng X, Wei H, Zhang P (2006) Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt Lett 31:3261\u20133263. https:\/\/doi.org\/10.1364\/ol.31.003261","journal-title":"Opt Lett"},{"key":"20176_CR13","doi-asserted-by":"publisher","first-page":"1644","DOI":"10.1364\/ol.30.001644","volume":"30","author":"A Carnicer","year":"2005","unstructured":"Carnicer A, Montes-Usategui M, Arcos S, Juvells I (2005) Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. Opt Lett 30:1644\u20131646. https:\/\/doi.org\/10.1364\/ol.30.001644","journal-title":"Opt Lett"},{"key":"20176_CR14","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1364\/ol.35.000118","volume":"35","author":"W Qin","year":"2010","unstructured":"Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35:118\u2013120. https:\/\/doi.org\/10.1364\/ol.35.000118","journal-title":"Opt Lett"},{"key":"20176_CR15","doi-asserted-by":"publisher","first-page":"5100","DOI":"10.1364\/ao.53.005100","volume":"53","author":"X Wang","year":"2014","unstructured":"Wang X, Zhao D, Chen Y (2014) Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask. Appl Optics 53:5100\u20135108. https:\/\/doi.org\/10.1364\/ao.53.005100","journal-title":"Appl Optics"},{"key":"20176_CR16","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1364\/ao.53.000208","volume":"53","author":"X Wang","year":"2014","unstructured":"Wang X, Chen Y, Dai C, Zhao D (2014) Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. Appl Optics 53:208\u2013213. https:\/\/doi.org\/10.1364\/ao.53.000208","journal-title":"Appl Optics"},{"key":"20176_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.optcom.2014.10.018","volume":"338","author":"J Lang","year":"2015","unstructured":"Lang J, Zhang J (2015) Optical image cryptosystem using chaotic phase-amplitude masks encoding and least-data-driven decryption by compressive sensing. Opt Commun 338:45\u201353. https:\/\/doi.org\/10.1016\/j.optcom.2014.10.018","journal-title":"Opt Commun"},{"key":"20176_CR18","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1016\/j.optlastec.2012.01.021","volume":"44","author":"W He","year":"2012","unstructured":"He W, Peng X, Meng X (2012) A hybrid strategy for cryptanalysis of optical encryption based on double-random phase-amplitude encoding. Opt Laser Technol 44:1203\u20131206. https:\/\/doi.org\/10.1016\/j.optlastec.2012.01.021","journal-title":"Opt Laser Technol"},{"key":"20176_CR19","doi-asserted-by":"publisher","first-page":"084203","DOI":"10.1088\/1674-1056\/28\/8\/084203","volume":"28","author":"S-Q Wang","year":"2019","unstructured":"Wang S-Q, Meng X-F, Wang Y-R, Yin Y-K, Yang X-L (2019) Phase retrieval algorithm for optical information security*. Chin Phys B 28:084203. https:\/\/doi.org\/10.1088\/1674-1056\/28\/8\/084203","journal-title":"Chin Phys B"},{"key":"20176_CR20","doi-asserted-by":"publisher","first-page":"2464","DOI":"10.1117\/1.600849","volume":"35","author":"RK Wang","year":"1996","unstructured":"Wang RK, Watson IA, Chatwin C (1996) Random phase encoding for optical security. Opt Eng 35:2464\u20132469. https:\/\/doi.org\/10.1117\/1.600849","journal-title":"Opt Eng"},{"key":"20176_CR21","doi-asserted-by":"publisher","first-page":"5295","DOI":"10.1364\/ao.39.005295","volume":"39","author":"Y Li","year":"2000","unstructured":"Li Y, Kreske K, Rosen J (2000) Security and encryption optical systems based on a correlator with significant output images. Appl Optics 39:5295\u20135301. https:\/\/doi.org\/10.1364\/ao.39.005295","journal-title":"Appl Optics"},{"key":"20176_CR22","doi-asserted-by":"publisher","first-page":"4825","DOI":"10.1364\/ao.41.004825","volume":"41","author":"H Chang","year":"2002","unstructured":"Chang H, Lu W, Kuo C (2002) Multiple-phase retrieval for optical security systems by use of random-phase encoding. Appl Optics 41:4825\u20134834. https:\/\/doi.org\/10.1364\/ao.41.004825","journal-title":"Appl Optics"},{"key":"20176_CR23","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.optcom.2004.01.002","volume":"232","author":"G Situ","year":"2004","unstructured":"Situ G, Zhang J (2004) A lensless optical security system based on computer-generated phase only masks. Opt Commun 232:115\u2013122. https:\/\/doi.org\/10.1016\/j.optcom.2004.01.002","journal-title":"Opt Commun"},{"key":"20176_CR24","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1364\/oe.24.000499","volume":"24","author":"L Sui","year":"2016","unstructured":"Sui L, Zhou B, Ning X, Tian A (2016) Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain. Opt Express 24:499\u2013515. https:\/\/doi.org\/10.1364\/oe.24.000499","journal-title":"Opt Express"},{"key":"20176_CR25","doi-asserted-by":"publisher","first-page":"25821","DOI":"10.1007\/s11042-018-5818-7","volume":"77","author":"Z Shao","year":"2018","unstructured":"Shao Z, Shang Y, Tong Q, Ding H, Zhao X, Fu X (2018) Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain. Multimed Tools Appl 77:25821\u201325840. https:\/\/doi.org\/10.1007\/s11042-018-5818-7","journal-title":"Multimed Tools Appl"},{"key":"20176_CR26","doi-asserted-by":"publisher","first-page":"075402","DOI":"10.1088\/2040-8978\/14\/7\/075402","volume":"14","author":"W Chen","year":"2012","unstructured":"Chen W, Chen X, Sheppard CJR (2012) Optical image encryption based on phase retrieval combined with three-dimensional particle-like distribution. J Opt 14:075402. https:\/\/doi.org\/10.1088\/2040-8978\/14\/7\/075402","journal-title":"J Opt"},{"key":"20176_CR27","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.optlaseng.2012.09.002","volume":"51","author":"W Chen","year":"2013","unstructured":"Chen W, Chen X (2013) Optical image encryption based on multiple-region plaintext and phase retrieval in three-dimensional space. Opt Lasers Eng 51:128\u2013133. https:\/\/doi.org\/10.1016\/j.optlaseng.2012.09.002","journal-title":"Opt Lasers Eng"},{"key":"20176_CR28","doi-asserted-by":"publisher","first-page":"106662","DOI":"10.1016\/j.optlaseng.2021.106662","volume":"145","author":"M Shan","year":"2021","unstructured":"Shan M, Liu L, Liu B, Zhong Z (2021) Security enhanced cascaded phase encoding based on a 3D phase retrieval algorithm. Opt Lasers Eng 145:106662. https:\/\/doi.org\/10.1016\/j.optlaseng.2021.106662","journal-title":"Opt Lasers Eng"},{"key":"20176_CR29","doi-asserted-by":"publisher","first-page":"128270","DOI":"10.1016\/j.optcom.2022.128270","volume":"516","author":"M Shan","year":"2022","unstructured":"Shan M, Guo J, Zhong Z, Liu B, Yu L, Liu L (2022) Security enhanced optical image cryptosystem based on phase encoding by generating a sparse volumetric ciphertext. Opt Commun 516:128270. https:\/\/doi.org\/10.1016\/j.optcom.2022.128270","journal-title":"Opt Commun"},{"key":"20176_CR30","doi-asserted-by":"publisher","first-page":"130603","DOI":"10.1016\/j.optcom.2024.130603","volume":"564","author":"Y Su","year":"2024","unstructured":"Su Y, Wang Z, Wang Y, Xue R, Wang B, Zhong W et al (2024) Multiple-image encryption based on authenticable phase and phase retrieval under structured light illumination. Opt Commun 564:130603. https:\/\/doi.org\/10.1016\/j.optcom.2024.130603","journal-title":"Opt Commun"},{"key":"20176_CR31","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.optlaseng.2007.09.001","volume":"46","author":"N Singh","year":"2008","unstructured":"Singh N, Sinha A (2008) Optical image encryption using fractional Fourier transform and chaos. Opt Lasers Eng 46:117\u2013123. https:\/\/doi.org\/10.1016\/j.optlaseng.2007.09.001","journal-title":"Opt Lasers Eng"},{"key":"20176_CR32","doi-asserted-by":"publisher","first-page":"127544","DOI":"10.1016\/j.optcom.2021.127544","volume":"506","author":"X Wang","year":"2022","unstructured":"Wang X, Su Y, Liu C, Li J, Li S, Cai Z, Wan W (2022) Security enhancement of image encryption method based on Fresnel diffraction with chaotic phase. Opt Commun 506:127544. https:\/\/doi.org\/10.1016\/j.optcom.2021.127544","journal-title":"Opt Commun"},{"key":"20176_CR33","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1364\/josaa.17.000342","volume":"17","author":"R Simon","year":"2000","unstructured":"Simon R, Wolf KB (2000) Structure of the set of paraxial optical systems. J Opt Soc Am A-Opt Image Sci Vis 17:342\u201355. https:\/\/doi.org\/10.1364\/josaa.17.000342","journal-title":"J Opt Soc Am A-Opt Image Sci Vis"},{"key":"20176_CR34","doi-asserted-by":"publisher","first-page":"3135","DOI":"10.1364\/josaa.24.003135","volume":"24","author":"JA Rodrigo","year":"2007","unstructured":"Rodrigo JA, Alieva T, Calvo ML (2007) Experimental implementation of the gyrator transform. J Opt Soc Am A-Opt Image Sci Vis 24:3135\u20139. https:\/\/doi.org\/10.1364\/josaa.24.003135","journal-title":"J Opt Soc Am A-Opt Image Sci Vis"},{"key":"20176_CR35","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1016\/j.ijleo.2010.06.010","volume":"122","author":"Z Liu","year":"2011","unstructured":"Liu Z, Chen D, Ma J, Wei S, Zhang Y, Dai J et al (2011) Fast algorithm of discrete gyrator transform based on convolution operation. Optik 122:864\u2013867. https:\/\/doi.org\/10.1016\/j.ijleo.2010.06.010","journal-title":"Optik"},{"key":"20176_CR36","doi-asserted-by":"publisher","first-page":"12413","DOI":"10.1007\/s00500-020-04683-4","volume":"24","author":"L You","year":"2020","unstructured":"You L, Yang E, Wang G (2020) A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput 24:12413\u201312427. https:\/\/doi.org\/10.1007\/s00500-020-04683-4","journal-title":"Soft Comput"},{"key":"20176_CR37","doi-asserted-by":"publisher","first-page":"2757","DOI":"10.1007\/s11071-017-3409-1","volume":"88","author":"A Ullah","year":"2017","unstructured":"Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88:2757\u20132769. https:\/\/doi.org\/10.1007\/s11071-017-3409-1","journal-title":"Nonlinear Dyn"},{"key":"20176_CR38","doi-asserted-by":"publisher","first-page":"84980","DOI":"10.1109\/access.2019.2925081","volume":"7","author":"MF Khan","year":"2019","unstructured":"Khan MF, Ahmed A, Saleem K, Shah T (2019) A novel design of cryptographic SP-Network based on gold sequences and chaotic logistic tent system. IEEE Access 7:84980\u201384991. https:\/\/doi.org\/10.1109\/access.2019.2925081","journal-title":"IEEE Access"},{"key":"20176_CR39","unstructured":"CVG-UGR database: http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20176-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20176-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20176-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T10:16:30Z","timestamp":1731752190000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20176-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,13]]},"references-count":39,"journal-issue":{"issue":"38","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["20176"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20176-0","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,9,13]]},"assertion":[{"value":"7 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}