{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T04:34:12Z","timestamp":1772771652449,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:00:00Z","timestamp":1543881600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11633-018-1159-2","type":"journal-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T06:15:03Z","timestamp":1543904103000},"page":"292-304","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Image Encryption Algorithm Based on Compressive Sensing and Fractional DCT via Polynomial Interpolation"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2716-0704","authenticated-orcid":false,"given":"Ya-Ru","family":"Liang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0773-3461","authenticated-orcid":false,"given":"Zhi-Yong","family":"Xiao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,12,4]]},"reference":[{"issue":"10","key":"1159_CR1","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1078\/0030-4026-00291","volume":"114","author":"G. H. Situ","year":"2003","unstructured":"G. H. Situ, J. J. Zhang. A cascaded iterative Fourier transform algorithm for optical security applications. Optik\u2013International Journal for Light and Electron Optics, vol. 114, no. 10, pp. 473\u2013477, 2003. DOI: 10.1078\/0030-4026-00291.","journal-title":"Optik\u2013International Journal for Light and Electron Optics"},{"issue":"1","key":"1159_CR2","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.optcom.2010.09.034","volume":"284","author":"X. G. Wang","year":"2011","unstructured":"X. G. Wang, D. M. Zhao. Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain. Optics Communications, vol. 284, no. 1, pp. 148\u2013152, 2011. DOI: 10.1016\/j.optcom.2010.09.034.","journal-title":"Optics Communications"},{"key":"1159_CR3","first-page":"25","volume":"49","author":"M. H. Annaby","year":"2016","unstructured":"M. H. Annaby, M. A. Rushdi, E. A. Nehary. Image encryption via discrete fractional Fourier-type transforms generated by random matrices. Signal Processing: Image Communication, vol. 49, pp. 25\u201346, 2016. DOI: 10.1016\/j.image.2016.09.006.","journal-title":"Signal Processing: Image Communication"},{"key":"1159_CR4","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.optlaseng.2014.06.003","volume":"62","author":"L. S. Sui","year":"2014","unstructured":"L. S. Sui, K. K. Duan, J. L. Liang, Z. Q. Zhang, H. N. Meng. Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Optics and Lasers in Engineering, vol. 62, pp. 139\u2013152, 2014. DOI: 10.1016\/j.optlaseng.2014.06.003.","journal-title":"Optics and Lasers in Engineering"},{"key":"1159_CR5","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.optlaseng.2016.11.017","volume":"91","author":"L. S. Sui","year":"2017","unstructured":"L. S. Sui, M. J. Xu, A. L. Tian. Optical noise-free image encryption based on quick response code and high dimension chaotic system in gyrator transform domain. Optics and Lasers in Engineering, vol. 91, pp. 106\u2013114, 2017. DOI: 10.1016\/j.optlaseng.2016.11.017.","journal-title":"Optics and Lasers in Engineering"},{"issue":"11","key":"1159_CR6","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1016\/j.ijleo.2008.12.006","volume":"121","author":"Z. J. Liu","year":"2010","unstructured":"Z. J. Liu, M. A. Ahmad, S. T. Liu. Image encryption based on double random amplitude coding in random Hartley transform domain. Optik\u2013International Journal for Light and Electron Optics, vol. 121, no. 11, pp. 959\u2013964, 2010. DOI: 10.1016\/j.ijleo.2008.12.006.","journal-title":"Optik\u2013International Journal for Light and Electron Optics"},{"issue":"2","key":"1159_CR7","doi-asserted-by":"crossref","first-page":"2933","DOI":"10.1007\/s11042-015-3209-x","volume":"76","author":"S. M. Pan","year":"2017","unstructured":"S. M. Pan, R. H. Wen, Z. H. Zhou, N. R. Zhou. Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform. Multimedia Tools and Applications, vol. 76, no. 2, pp. 2933\u20132953, 2017. DOI: 10.1007\/s11042-015-3209-x.","journal-title":"Multimedia Tools and Applications"},{"key":"1159_CR8","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.optcom.2015.05.043","volume":"354","author":"N. R. Zhou","year":"2015","unstructured":"N. R. Zhou, J. P. Yang, C. F. Tan, S. M. Pan, Z. H. Zhou. Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Optics Communications, vol. 354, pp. 112\u2013121, 2015. DOI: 10.1016\/j.optcom.2015.05.043.","journal-title":"Optics Communications"},{"issue":"12","key":"1159_CR9","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1364\/OL.25.000887","volume":"25","author":"G. Unnikrishnan","year":"2000","unstructured":"G. Unnikrishnan, J. Joseph, K. Singh. Optical encryption by double-random phase encoding in the fractional Fourier domain. Optics Letters, vol. 25, no. 12, pp. 887\u2013889, 2000. DOI: 10.1364\/OL.25.000887.","journal-title":"Optics Letters"},{"issue":"6","key":"1159_CR10","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1364\/OL.33.000581","volume":"33","author":"R. Tao","year":"2008","unstructured":"R. Tao, J. Lang, Y. Wang. Optical image encryption based on the multiple-parameter fractional Fourier transform. Optics Letters, vol. 33, no. 6, pp. 581\u2013583, 2008. DOI: 10.1364\/OL.33.000581.","journal-title":"Optics Letters"},{"key":"1159_CR11","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y. P. Li","year":"2017","unstructured":"Y. P. Li, C. H. Wang, H. Chen. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics and Lasers in Engineering, vol. 90, pp. 238\u2013246, 2017. DOI: 10.1016\/j.optlaseng. 2016.10.020.","journal-title":"Optics and Lasers in Engineering"},{"issue":"17","key":"1159_CR12","doi-asserted-by":"crossref","first-page":"10631","DOI":"10.1007\/s11042-014-2115-y","volume":"75","author":"Z. Parvin","year":"2016","unstructured":"Z. Parvin, H. Seyedarabi, M. Shamsi. A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools and Applications, vol. 75, no. 17, pp. 10631\u201310648, 2016. DOI: 10. 1007\/s11042-014-2115-y.","journal-title":"Multimedia Tools and Applications"},{"key":"1159_CR13","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","volume":"90","author":"R. Enayatifar","year":"2017","unstructured":"R. Enayatifar, A. H. Abdullah, I. F. Isnin, A. Altameem, M. Lee. Image encryption using a synchronous permutation-diffusion technique. Optics and Laser Technology, vol. 90, pp. 146\u2013154, 2017. DOI: 10.1016\/j.optlaseng.2016. 10.006.","journal-title":"Optics and Laser Technology"},{"issue":"4","key":"1159_CR14","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T. G. Gao","year":"2008","unstructured":"T. G. Gao, Z. Q. Chen. A new image encryption algorithm based on hyper-chaos. Physics Letters A, vol. 372, no. 4, pp. 394\u2013400, 2008. DOI: 10.1016\/j.physleta.2007.07.040.","journal-title":"Physics Letters A"},{"issue":"8","key":"1159_CR15","doi-asserted-by":"crossref","first-page":"2066","DOI":"10.1016\/j.cnsns.2012.12.012","volume":"18","author":"W. Zhang","year":"2013","unstructured":"W. Zhang, K. W. Wong, H. Yu, Z. L. Zhu. An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 8, pp. 2066\u20132080, 2013. DOI: 10.1016\/j.cnsns.2012.12.012.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"1159_CR16","first-page":"205","volume":"5","author":"I. Venturini","year":"2004","unstructured":"I. Venturini, P. Duhamel. Reality preserving fractional transforms. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Montreal, Canada, vol. 5, pp. 205\u2013208, 2004.","journal-title":"Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing"},{"issue":"10\u201311","key":"1159_CR17","doi-asserted-by":"crossref","first-page":"2584","DOI":"10.1016\/j.optcom.2012.01.085","volume":"285","author":"J. Lang","year":"2012","unstructured":"J. Lang. Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform. Optics Communications, vol. 285, no. 10\u201311, pp. 2584\u20132590, 2012. DOI: 10.1016\/j.optcom.2012.01.085.","journal-title":"Optics Communications"},{"issue":"7","key":"1159_CR18","doi-asserted-by":"crossref","first-page":"2270","DOI":"10.1016\/j.optlastec.2012.02.027","volume":"44","author":"N. R. Zhou","year":"2012","unstructured":"N. R. Zhou, Y. X. Wang, L. H. Gong, X. B. Chen, Y. X. Yang. Novel color image encryption algorithm based on the reality preserving fractional Mellin transform. Optics & Laser Technology, vol. 44, no. 7, pp. 2270\u20132281, 2012. DOI: 10.1016\/j.optlastec.2012.02.027.","journal-title":"Optics & Laser Technology"},{"issue":"11","key":"1159_CR19","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1016\/j.ijleo.2010.06.039","volume":"122","author":"Z. J. Liu","year":"2011","unstructured":"Z. J. Liu, Y. Zhang, H. F. Zhao, M. A. Ahmad, S. T. Liu. Optical multi-image encryption based on frequency shift. Optik\u2013International Journal for Light and Electron Optics, vol. 122, no. 11, pp. 1010\u20131013, 2011. DOI: 10.1016\/j. ijleo.2010.06.039.","journal-title":"Optik\u2013International Journal for Light and Electron Optics"},{"key":"1159_CR20","first-page":"1433","volume-title":"Proceedings of the International Congress of Mathematics","author":"E. J. Cand\u00e8s","year":"2006","unstructured":"E. J. Cand\u00e8s. Compressive sampling. In Proceedings of the International Congress of Mathematics, Madrid, Spain, pp. 1433\u20131452, 2006."},{"issue":"2","key":"1159_CR21","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/TIT.2005.862083","volume":"52","author":"E. J. Cand\u00e8s","year":"2006","unstructured":"E. J. Cand\u00e8s, J. Romberg, T. Tao. Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Transactions on Information Theory, vol. 52, no. 2, pp. 489\u2013509, 2006. DOI: 10.1109\/TIT.2005.862083.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"1159_CR22","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"D. L. Donoho","year":"2006","unstructured":"D. L. Donoho. Compressed sensing. IEEE Transactions on Information Theory, vol. 52, no. 4, pp. 1289\u20131306, 2006. DOI: 10.1109\/TIT.2006.871582.","journal-title":"IEEE Transactions on Information Theory"},{"key":"1159_CR23","first-page":"105","volume-title":"Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing","author":"R. Huang","year":"2011","unstructured":"R. Huang, K. Sakurai. A robust and compression-combined digital image encryption method based on compressive sensing. In Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Dalian, China, pp. 105\u2013108, 2011. DOI: 10.1109\/IIHMSP.2011.53."},{"key":"1159_CR24","first-page":"813","volume-title":"Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing","author":"Y. Rachlin","year":"2008","unstructured":"Y. Rachlin, D. Baron. The secrecy of compressed sensing measurements. In Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing, Urbana, USA, pp. 813\u2013817, 2008. DOI: 10.1109\/ALLERTON.2008.4797641."},{"key":"1159_CR25","first-page":"1","volume-title":"Proceedings of Iran Workshop on Communication and Information Theory","author":"M. R. Mayiami","year":"2013","unstructured":"M. R. Mayiami, B. Seyfe, H. G. Bafghi. Perfect secrecy via compressed sensing. In Proceedings of Iran Workshop on Communication and Information Theory, Tehran, Iran, pp. 1\u20135, 2013. DOI: 10.1109\/IWCIT.2013.6555751."},{"issue":"16","key":"1159_CR26","doi-asserted-by":"crossref","first-page":"2514","DOI":"10.1016\/j.ijleo.2012.08.017","volume":"124","author":"P. Lu","year":"2013","unstructured":"P. Lu, Z. Y. Xu, X. Lu, X. Y. Liu. Digital image information encryption based on compressive sensing and double random-phase encoding technique. Optik\u2013International Journal for Light and Electron Optics, vol. 124, no. 16, pp. 2514\u20132518, 2013. DOI: 10.1016\/j.ijleo.2012.08.017.","journal-title":"Optik\u2013International Journal for Light and Electron Optics"},{"key":"1159_CR27","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.jvcir.2017.01.022","volume":"44","author":"G. Q. Hu","year":"2017","unstructured":"G. Q. Hu, D. Xiao, Y. Wang, T. Xiang. An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. Journal of Visual Communication and Image Representation, vol. 44, pp. 116\u2013127, 2017. DOI: 10.1016\/j.jvcir.2017.01.022.","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"4","key":"1159_CR28","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/s11633-014-0811-8","volume":"11","author":"C. Feng","year":"2014","unstructured":"C. Feng, L. Xiao, Z. H. Wei. Compressive sensing inverse synthetic aperture radar imaging based on gini index regularization. International Journal of Automation and Computing, vol. 11, no. 4, pp. 441\u2013448, 2014. DOI: 10.1007\/s11633-014-0811-8.","journal-title":"International Journal of Automation and Computing"},{"issue":"9\u201310","key":"1159_CR29","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1016\/j.crma.2008.03.014","volume":"346","author":"E. J. Cand\u00e8s","year":"2008","unstructured":"E. J. Cand\u00e8s. The restricted isometry property and its implications for compressed sensing. Comptes Rendus Mathematique, vol. 346, no. 9\u201310, pp. 589\u2013592, 2008. DOI: 10. 1016\/j.crma.2008.03.014.","journal-title":"Comptes Rendus Mathematique"},{"issue":"2","key":"1159_CR30","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1137\/S0097539792240406","volume":"24","author":"B. K. Natarajan","year":"1995","unstructured":"B. K. Natarajan. Sparse approximate solutions to linear systems. SIAM Journal on Computing, vol. 24, no. 2, pp. 227\u2013234, 1995. DOI: 10.1137\/S0097539792240406.","journal-title":"SIAM Journal on Computing"},{"issue":"1","key":"1159_CR31","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1137\/S1064827596304010","volume":"20","author":"S. S. Chen","year":"1998","unstructured":"S. S. Chen, D. L. Donoho, M. A. Saunders. Atomic decomposition by basis pursuit. SIAM Journal on Scientific Computing, vol. 20, no. 1, pp. 33\u201361, 1998. DOI: 10.1137\/S1064827596304010.","journal-title":"SIAM Journal on Scientific Computing"},{"issue":"8","key":"1159_CR32","doi-asserted-by":"crossref","first-page":"1046","DOI":"10.1016\/j.ultras.2012.08.012","volume":"52","author":"Y. Zhang","year":"2012","unstructured":"Y. Zhang, Y. Y. Wang, C. Zhang. Total variation based gradient descent algorithm for sparse-view photoacoustic image reconstruction. Ultrasonics, vol. 52, no. 8, pp. 1046\u20131055, 2012. DOI: 10.1016\/j.ultras.2012.08.012.","journal-title":"Ultrasonics"},{"issue":"12","key":"1159_CR33","doi-asserted-by":"crossref","first-page":"3397","DOI":"10.1109\/78.258082","volume":"41","author":"S. G. Mallat","year":"1993","unstructured":"S. G. Mallat, Z. F. Zhang. Matching pursuits with time-frequency dictionaries. IEEE Transactions on Signal Processing, vol. 41, no. 12, pp. 3397\u20133415, 1993. DOI: 10.1109\/78.258082.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"4","key":"1159_CR34","doi-asserted-by":"crossref","first-page":"2040","DOI":"10.1109\/TIT.2011.2177632","volume":"58","author":"E. T. Liu","year":"2012","unstructured":"E. T. Liu, V. N. Temlyakov. The orthogonal super greedy algorithm and applications in compressed sensing. IEEE Transactions on Information Theory, vol. 58, no. 4, pp. 2040\u20132047, 2012. DOI: 10.1109\/TIT.2011.2177632.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"1159_CR35","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TSP.2008.2007606","volume":"57","author":"H. Mohimani","year":"2009","unstructured":"H. Mohimani, M. Babaie-Zadeh, C. Jutten. A fast approach for overcomplete sparse decomposition based on smoothed l0 norm. IEEE Transactions on Signal Processing, vol. 57, no. 1, pp. 289\u2013301, 2009. DOI: 10.1109\/TSP.2008.2007606.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"4","key":"1159_CR36","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1109\/78.992138","volume":"50","author":"G. Cariolaro","year":"2002","unstructured":"G. Cariolaro, T. Erseghe, P. Kraniauskas. The fractional discrete cosine transform. IEEE Transactions on Signal Processing, vol. 50, no. 4, pp. 902\u2013911, 2002. DOI: 10.1109\/78.992138.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"20","key":"1159_CR37","doi-asserted-by":"crossref","first-page":"1760","DOI":"10.1080\/09500340.2013.858189","volume":"60","author":"J. H. Wu","year":"2013","unstructured":"J. H. Wu, F. F. Guo, P. P. Zeng, N. R. Zhou. Image encryption based on a reality-preserving fractional discrete cosine transform and a chaos-based generating sequence. Journal of Modern Optics, vol. 60, no. 20, pp. 1760\u20131771, 2013. DOI: 10.1080\/09500340.2013.858189.","journal-title":"Journal of Modern Optics"},{"issue":"4","key":"1159_CR38","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1080\/09500340.2014.964342","volume":"62","author":"Y. R. Liang","year":"2014","unstructured":"Y. R. Liang, G. P. Liu, N. R. Zhou, J. H. Wu. Image encryption combining multiple generating sequences controlled fractional DCT with dependent scrambling and diffusion. Journal of Modern Optics, vol. 62, no. 4, pp. 251\u2013264, 2014. DOI: 10.1080\/09500340.2014.964342.","journal-title":"Journal of Modern Optics"},{"issue":"5","key":"1159_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S1005-8885(15)60673-2","volume":"22","author":"Y. R. Liang","year":"2015","unstructured":"Y. R. Liang, J. H. Wu. New image encryption combining fractional DCT via polynomial interpolation with dependent scrambling and diffusion. Journal of China Universities of Posts and Telecommunications, vol. 22, no. 5, pp. 1\u20139, 2015. DOI: 10.1016\/S1005-8885(15)60673-2.","journal-title":"Journal of China Universities of Posts and Telecommunications"},{"issue":"17","key":"1159_CR40","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1016\/j.optcom.2010.04.056","volume":"283","author":"A. Akhshani","year":"2010","unstructured":"A. Akhshani, S. Behnia, A. Akhavan, H. Abu Hassan, Z. Hassan. A novel scheme for image encryption based on 2D piecewise chaotic maps. Optics Communications, vol. 283, no. 17, pp. 3259\u20133266, 2010. DOI: 10.1016\/j.optcom.2010. 04.056.","journal-title":"Optics Communications"},{"issue":"18","key":"1159_CR41","doi-asserted-by":"crossref","first-page":"5075","DOI":"10.1016\/j.ijleo.2014.06.054","volume":"125","author":"N. R. Zhou","year":"2014","unstructured":"N. R. Zhou, A. D. Zhang, J. H. Wu, D. J. Pei, Y. X. Yang. Novel hybrid image compression-encryption algorithm based on compressive sensing. Optik\u2013International Journal for Light and Electron Optics, vol. 125, no. 18, pp. 5075\u20135080, 2014. DOI: 10.1016\/j.ijleo.2014.06.054.","journal-title":"Optik\u2013International Journal for Light and Electron Optics"},{"issue":"10","key":"1159_CR42","first-page":"5357","volume":"2","author":"A. S. Arumugam","year":"2010","unstructured":"A. S. Arumugam, D. N. Krishnan. Biometric encryption and bio-fusion authentication using combined Arnold transition and permutation matrices. International Journal of Engineering Science and Technology, vol. 2, no. 10, pp. 5357\u20135369, 2010.","journal-title":"International Journal of Engineering Science and Technology"},{"issue":"19","key":"1159_CR43","doi-asserted-by":"crossref","first-page":"4331","DOI":"10.1016\/j.optcom.2011.05.028","volume":"284","author":"V. Patidar","year":"2011","unstructured":"V. Patidar, N. K. Pareek, G. K. Purohit, K. K. Sud. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Communications, vol. 284, no. 19, pp. 4331\u20134339, 2011. DOI: 10.1016\/j.optcom.2011.05.028.","journal-title":"Optics Communications"}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-018-1159-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11633-018-1159-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-018-1159-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T15:17:21Z","timestamp":1586013441000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11633-018-1159-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,4]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["1159"],"URL":"https:\/\/doi.org\/10.1007\/s11633-018-1159-2","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"value":"1476-8186","type":"print"},{"value":"1751-8520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,4]]},"assertion":[{"value":"27 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}