{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T04:06:58Z","timestamp":1772770018948,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comp. Appl. Math."],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s40314-023-02443-2","type":"journal-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T12:02:15Z","timestamp":1694520135000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Asymmetric image authentication algorithm using double random modulus decomposition and CGI"],"prefix":"10.1007","volume":"42","author":[{"given":"Raman","family":"Yadav","sequence":"first","affiliation":[]},{"given":"Phool","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"2443_CR1","doi-asserted-by":"publisher","unstructured":"Ajili S, Hajjaji MA, Bouallegue B, Mtibaa A (2014) Joint watermarking\\encryption image for safe transmission: application on medical imaging. In: 2014 Global Summit on Computer & Information Technology (GSCIT), pp 1\u20136. https:\/\/doi.org\/10.1109\/GSCIT.2014.6970110","DOI":"10.1109\/GSCIT.2014.6970110"},{"key":"2443_CR2","doi-asserted-by":"publisher","unstructured":"Ajili S, Hajjaji MA, Mtibaa A (2015) Hybrid SVD-DWT watermarking technique using AES algorithm for medical image safe transfer. In: 2015 16th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), pp 69\u201374. https:\/\/doi.org\/10.1109\/STA.2015.7505164","DOI":"10.1109\/STA.2015.7505164"},{"issue":"4\u20135","key":"2443_CR3","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1504\/IJSISE.2016.078269","volume":"9","author":"S Ajili","year":"2016","unstructured":"Ajili S, Hajjaji MA, Mtibaa A (2016) Combining watermarking and encryption algorithm for medical image safe transfer: method based on DCT. Int J Signal Imaging Syst Eng 9(4\u20135):242\u2013251. https:\/\/doi.org\/10.1504\/IJSISE.2016.078269","journal-title":"Int J Signal Imaging Syst Eng"},{"key":"2443_CR4","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5559191","volume":"2021","author":"S Ajili","year":"2021","unstructured":"Ajili S, Hajjaji MA, Mtibaa A (2021) Crypto-watermarking algorithm using Weber\u2019s law and AES: a view to transfer safe medical image. Sci Program 2021:e5559191. https:\/\/doi.org\/10.1155\/2021\/5559191","journal-title":"Sci Program"},{"issue":"3","key":"2443_CR5","doi-asserted-by":"publisher","first-page":"359","DOI":"10.37190\/oa220303","volume":"52","author":"S Anjana","year":"2022","unstructured":"Anjana S, Yadav AK, Singh P, Singh H (2022) Audio and image encryption scheme based on QR decomposition and random modulus decomposition in Fresnel domain. Opt Appl 52(3):359\u2013374. https:\/\/doi.org\/10.37190\/oa220303","journal-title":"Opt Appl"},{"key":"2443_CR6","doi-asserted-by":"publisher","first-page":"106399","DOI":"10.1016\/j.optlaseng.2020.106399","volume":"137","author":"Archana","year":"2021","unstructured":"Archana, Sachin, Singh P (2021) Cascaded unequal modulus decomposition in Fresnel domain based cryptosystem to enhance the image security. Opt Lasers Eng 137:106399\u2013106411. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106399","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"2443_CR7","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1038\/srep01545","volume":"3","author":"M A\u03b2mann","year":"2013","unstructured":"A\u03b2mann M, Bayer M (2013) Compressive adaptive computational ghost imaging. Sci Rep 3(1):1545\u20131549. https:\/\/doi.org\/10.1038\/srep01545","journal-title":"Sci Rep"},{"key":"2443_CR8","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.ijleo.2017.08.057","volume":"147","author":"B Bai","year":"2017","unstructured":"Bai B et al (2017) Imaging around corners with single-pixel detector by computational ghost imaging. Optik 147:136\u2013142. https:\/\/doi.org\/10.1016\/j.ijleo.2017.08.057","journal-title":"Optik"},{"issue":"4","key":"2443_CR9","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1364\/OL.40.000475","volume":"40","author":"J Cai","year":"2015","unstructured":"Cai J, Shen X, Lei M, Lin C, Dou S (2015) Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. Opt Lett 40(4):475\u2013478. https:\/\/doi.org\/10.1364\/OL.40.000475","journal-title":"Opt Lett"},{"key":"2443_CR10","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1364\/OL.38.000546","volume":"38","author":"W Chen","year":"2013","unstructured":"Chen W, Chen X (2013) Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. Opt Lett 38:546\u2013548. https:\/\/doi.org\/10.1364\/OL.38.000546","journal-title":"Opt Lett"},{"issue":"23","key":"2443_CR11","doi-asserted-by":"publisher","first-page":"3438","DOI":"10.1364\/OL.31.003438","volume":"31","author":"L Chen","year":"2006","unstructured":"Chen L, Zhao D (2006) Optical image encryption with Hartley transforms. Opt Lett 31(23):3438\u20133440. https:\/\/doi.org\/10.1364\/OL.31.003438","journal-title":"Opt Lett"},{"key":"2443_CR12","doi-asserted-by":"publisher","first-page":"105809","DOI":"10.1016\/j.optlaseng.2019.105809","volume":"124","author":"H Chen","year":"2020","unstructured":"Chen H, Zhu L, Liu Z, Tanougast C, Liu F, Blondel W (2020) Optical single-channel color image asymmetric cryptosystem based on hyperchaotic system and random modulus decomposition in Gyrator domains. Opt Lasers Eng 124:105809\u2013105818. https:\/\/doi.org\/10.1016\/j.optlaseng.2019.105809","journal-title":"Opt Lasers Eng"},{"key":"2443_CR13","doi-asserted-by":"publisher","first-page":"2391","DOI":"10.1364\/OL.35.002391","volume":"35","author":"P Clemente","year":"2010","unstructured":"Clemente P, Dur\u00e1n V, Torres-Company V, Tajahuerce E, Lancis J (2010) Optical encryption based on computational ghost imaging. Opt Lett 35:2391\u20132393. https:\/\/doi.org\/10.1364\/OL.35.002391","journal-title":"Opt Lett"},{"issue":"3","key":"2443_CR14","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith D (1994) The data encryption standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243\u2013250. https:\/\/doi.org\/10.1147\/rd.383.0243","journal-title":"IBM J Res Dev"},{"key":"2443_CR15","doi-asserted-by":"publisher","unstructured":"Gafsi M, Ajili S, Hajjaji MA, Malek J, Mtibaa A (2020) High securing cryptography system for digital image transmission. In: Bouhlel MS, Rovetta S (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT\u201918), Vol. 1, Smart Innovation, Systems and Technologies. Springer International Publishing, Cham, pp 311\u2013322. https:\/\/doi.org\/10.1007\/978-3-030-21005-2_30","DOI":"10.1007\/978-3-030-21005-2_30"},{"issue":"2","key":"2443_CR16","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1364\/JOSAA.32.000323","volume":"32","author":"H Ghanbari-Ghalehjoughi","year":"2015","unstructured":"Ghanbari-Ghalehjoughi H, Ahmadi-Kandjani S, Eslami M (2015) High quality computational ghost imaging using multi-fluorescent screen. J Opt Soc Am A 32(2):323\u2013328. https:\/\/doi.org\/10.1364\/JOSAA.32.000323","journal-title":"J Opt Soc Am A"},{"key":"2443_CR17","doi-asserted-by":"publisher","unstructured":"Hajjaji MA, Gafsi M, Mtibaa A (2019) Discrete cosine transform space for hiding patient information in the medical images. In: 2019 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS), pp 1\u20136. https:\/\/doi.org\/10.1109\/DTSS.2019.8914880","DOI":"10.1109\/DTSS.2019.8914880"},{"key":"2443_CR18","doi-asserted-by":"publisher","first-page":"126105","DOI":"10.1016\/j.optcom.2020.126105","volume":"474","author":"J Huang","year":"2020","unstructured":"Huang J et al (2020) Spectral encoded computational ghost imaging. Opt Commun 474:126105\u2013126113. https:\/\/doi.org\/10.1016\/j.optcom.2020.126105","journal-title":"Opt Commun"},{"key":"2443_CR300","doi-asserted-by":"publisher","first-page":"1570","DOI":"10.1016\/j.procs.2018.05.121","volume":"132","author":"J Kumar","year":"2018","unstructured":"Kumar J, Singh P, Yadav AK, Kumar A (2018) Asymmetric cryptosystem for phase images in fractional Fourier domain using LU-decomposition and Arnold transform. Procedia Comput Sci 132:1570\u20131577 https:\/\/doi.org\/10.1016\/j.procs.2018.05.121","journal-title":"Procedia Comput Sci"},{"issue":"6","key":"2443_CR19","doi-asserted-by":"publisher","DOI":"10.1088\/2040-8986\/ab1e32","volume":"21","author":"R Kumar","year":"2019","unstructured":"Kumar R, Zhong F, Quan C (2019) Optical voice information hiding using enhanced iterative algorithm and computational ghost imaging. J Opt 21(6):065704. https:\/\/doi.org\/10.1088\/2040-8986\/ab1e32","journal-title":"J Opt"},{"issue":"8","key":"2443_CR20","doi-asserted-by":"publisher","first-page":"8690","DOI":"10.1364\/OE.25.008690","volume":"25","author":"G Li","year":"2017","unstructured":"Li G, Yang W, Li D, Situ G (2017) Ciphertext-only attack on the double random-phase encryption: experimental demonstration. Opt Express 25(8):8690\u20138697. https:\/\/doi.org\/10.1364\/OE.25.008690","journal-title":"Opt Express"},{"key":"2443_CR21","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.optlaseng.2018.03.005","volume":"107","author":"S Liansheng","year":"2018","unstructured":"Liansheng S, Yin C, Ailing T, Asundi AK (2018) An optical watermarking scheme with two-layer framework based on computational ghost imaging. Opt Lasers Eng 107:38\u201345. https:\/\/doi.org\/10.1016\/j.optlaseng.2018.03.005","journal-title":"Opt Lasers Eng"},{"issue":"7","key":"2443_CR22","doi-asserted-by":"publisher","first-page":"075204","DOI":"10.1088\/1612-202X\/aac002","volume":"15","author":"S Liansheng","year":"2018","unstructured":"Liansheng S, Yin C, Bing L, Ailing T, Asundi AK (2018) Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval. Laser Phys Lett 15(7):075204\u2013075213. https:\/\/doi.org\/10.1088\/1612-202X\/aac002","journal-title":"Laser Phys Lett"},{"key":"2443_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.170378","volume":"272","author":"J-T Liu","year":"2023","unstructured":"Liu J-T et al (2023) Robust binarized data analysis with computational ghost imaging. Optik 272:170378. https:\/\/doi.org\/10.1016\/j.ijleo.2022.170378","journal-title":"Optik"},{"issue":"22","key":"2443_CR24","doi-asserted-by":"publisher","first-page":"3261","DOI":"10.1364\/OL.31.003261","volume":"31","author":"X Peng","year":"2006","unstructured":"Peng X, Wei H, Zhang P (2006) Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. Opt Lett 31(22):3261\u20133263. https:\/\/doi.org\/10.1364\/OL.31.003261","journal-title":"Opt Lett"},{"issue":"2","key":"2443_CR25","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1364\/OL.35.000118","volume":"35","author":"W Qin","year":"2010","unstructured":"Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35(2):118\u2013120. https:\/\/doi.org\/10.1364\/OL.35.000118","journal-title":"Opt Lett"},{"key":"2443_CR26","doi-asserted-by":"publisher","unstructured":"Qin W, Peng S, Meng X, He W (2010) Improved known-plaintext attack on optical encryption based on double random phase encoding. In: 2010 Symposium on Photonics and Optoelectronics, pp 1\u20134. https:\/\/doi.org\/10.1109\/SOPO.2010.5504346","DOI":"10.1109\/SOPO.2010.5504346"},{"key":"2443_CR28","doi-asserted-by":"publisher","first-page":"163289","DOI":"10.1016\/j.ijleo.2019.163289","volume":"198","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P (2019) An asymmetric watermarking scheme based on random decomposition in hybrid multi-resolution wavelet domain using 3D Lorenz chaotic system. Optik 198:163289\u2013163304. https:\/\/doi.org\/10.1016\/j.ijleo.2019.163289","journal-title":"Optik"},{"issue":"2","key":"2443_CR29","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/s11082-019-1769-0","volume":"51","author":"P Rakheja","year":"2019","unstructured":"Rakheja P, Vig R, Singh P (2019) An asymmetric hybrid cryptosystem using equal modulus and random decomposition in hybrid transform domain. Opt Quantum Electron 51(2):54\u201370. https:\/\/doi.org\/10.1007\/s11082-019-1769-0","journal-title":"Opt Quantum Electron"},{"issue":"7","key":"2443_CR30","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767\u2013769. https:\/\/doi.org\/10.1364\/OL.20.000767","journal-title":"Opt Lett"},{"issue":"11","key":"2443_CR32","doi-asserted-by":"publisher","first-page":"115101","DOI":"10.1088\/1402-4896\/ac925d","volume":"97","author":"Sachin","year":"2022","unstructured":"Sachin, Kumar R, Singh P (2022) Multiuser optical image authentication platform based on sparse constraint and polar decomposition in Fresnel domain. Phys Scr 97(11):115101\u2013115116. https:\/\/doi.org\/10.1088\/1402-4896\/ac925d","journal-title":"Phys Scr"},{"issue":"5","key":"2443_CR33","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/s11082-022-03646-3","volume":"54","author":"Sachin","year":"2022","unstructured":"Sachin, Singh P (2022) A novel chaotic Umbrella map and its application to image encryption. Opt Quantum Electron. 54(5):266. https:\/\/doi.org\/10.1007\/s11082-022-03646-3","journal-title":"Opt Quantum Electron."},{"key":"2443_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-15190-7","volume":"82","author":"Sachin","year":"2023","unstructured":"Sachin, Singh P (2023) Asymmetric cryptosystem based on biological mutation operation in chirp-z domain. Multimed Tools Appl 82:1\u201325. https:\/\/doi.org\/10.1007\/s11042-023-15190-7","journal-title":"Multimed Tools Appl"},{"key":"2443_CR36","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.optcom.2015.01.002","volume":"343","author":"Z Shao","year":"2015","unstructured":"Shao Z, Duan Y, Coatrieux G, Wu J, Meng J, Shu H (2015) Combining double random phase encoding for color image watermarking in quaternion Gyrator domain. Opt Commun 343:56\u201365. https:\/\/doi.org\/10.1016\/j.optcom.2015.01.002","journal-title":"Opt Commun"},{"key":"2443_CR37","doi-asserted-by":"publisher","first-page":"06180","DOI":"10.1103\/PhysRevA.78.061802","volume":"78","author":"J Shapiro","year":"2008","unstructured":"Shapiro J (2008) Computational ghost imaging. Phys Rev A 78:06180\u201306184. https:\/\/doi.org\/10.1103\/PhysRevA.78.061802","journal-title":"Phys Rev A"},{"key":"2443_CR38","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.optcom.2017.12.041","volume":"413","author":"T Shimobaba","year":"2018","unstructured":"Shimobaba T et al (2018) Computational ghost imaging using deep learning. Opt Commun 413:147\u2013151. https:\/\/doi.org\/10.1016\/j.optcom.2017.12.041","journal-title":"Opt Commun"},{"key":"2443_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/926135","volume":"2015","author":"H Singh","year":"2015","unstructured":"Singh H, Yadav AK, Vashisth S, Singh K (2015) Optical image encryption using devil\u2019s vortex toroidal lens in the Fresnel transform domain. Int J Opt 2015:1\u201313. https:\/\/doi.org\/10.1155\/2015\/926135","journal-title":"Int J Opt"},{"key":"2443_CR40","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.optlaseng.2016.11.022","volume":"91","author":"P Singh","year":"2017","unstructured":"Singh P, Yadav AK, Singh K (2017) Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt Lasers Eng 91:187\u2013195. https:\/\/doi.org\/10.1016\/j.optlaseng.2016.11.022","journal-title":"Opt Lasers Eng"},{"key":"2443_CR41","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1063\/1.4748875","volume":"101","author":"M Tanha","year":"2012","unstructured":"Tanha M, Kheradmand R, Ahmadi-Kandjani S (2012) Gray-scale and color optical encryption based on computational ghost imaging. Appl Phys Lett 101:100\u2013110. https:\/\/doi.org\/10.1063\/1.4748875","journal-title":"Appl Phys Lett"},{"issue":"2","key":"2443_CR42","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1140\/epjd\/e2012-30341-8","volume":"67","author":"M Tanha","year":"2013","unstructured":"Tanha M, Ahmadi-Kandjani S, Kheradmand R, Ghanbari H (2013) Computational fluorescence ghost imaging. Eur Phys J D 67(2):44\u201347. https:\/\/doi.org\/10.1140\/epjd\/e2012-30341-8","journal-title":"Eur Phys J D"},{"key":"2443_CR44","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1080\/09500340.2020.1733690","volume":"67","author":"Y Tao","year":"2020","unstructured":"Tao Y, Yang X, Meng X, Wang Y, Yin Y, Dong G (2020) Plaintext-related multiple-image encryption based on computational ghost imaging. J Mod Opt 67:394\u2013404. https:\/\/doi.org\/10.1080\/09500340.2020.1733690","journal-title":"J Mod Opt"},{"issue":"6","key":"2443_CR45","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1016\/j.optcom.2011.12.017","volume":"285","author":"X Wang","year":"2012","unstructured":"Wang X, Zhao D (2012) A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Commun 285(6):1078\u20131081. https:\/\/doi.org\/10.1016\/j.optcom.2011.12.017","journal-title":"Opt Commun"},{"key":"2443_CR46","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1364\/AO.53.000208","volume":"53","author":"X Wang","year":"2014","unstructured":"Wang X, Chen Y, Dai C, Zhao D (2014) Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. Appl Opt 53:208\u2013213. https:\/\/doi.org\/10.1364\/AO.53.000208","journal-title":"Appl Opt"},{"key":"2443_CR47","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1364\/AO.55.000679","volume":"55","author":"Y Wang","year":"2016","unstructured":"Wang Y, Quan C, Tay CJ (2016) New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition. Appl Opt 55:679\u2013686. https:\/\/doi.org\/10.1364\/AO.55.000679","journal-title":"Appl Opt"},{"key":"2443_CR48","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.optcom.2016.01.026","volume":"366","author":"L Wang","year":"2016","unstructured":"Wang L, Zhao S, Cheng W, Gong L, Chen H (2016) Optical image hiding based on computational ghost imaging. Opt Commun 366:314\u2013320. https:\/\/doi.org\/10.1016\/j.optcom.2016.01.026","journal-title":"Opt Commun"},{"key":"2443_CR50","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.optcom.2015.09.039","volume":"359","author":"J Wu","year":"2016","unstructured":"Wu J, Xie Z, Liu Z, Liu W, Zhang Y, Liu S (2016) Multiple-image encryption based on computational ghost imaging. Opt Commun 359:38\u201343. https:\/\/doi.org\/10.1016\/j.optcom.2015.09.039","journal-title":"Opt Commun"},{"key":"2443_CR51","doi-asserted-by":"publisher","first-page":"106105","DOI":"10.1016\/j.optlaseng.2020.106105","volume":"132","author":"H Wu","year":"2020","unstructured":"Wu H et al (2020) Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence. Opt Lasers Eng 132:106105\u2013106113. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106105","journal-title":"Opt Lasers Eng"},{"issue":"10","key":"2443_CR52","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1080\/09500340.2018.1431314","volume":"65","author":"H Xu","year":"2018","unstructured":"Xu H, Xu W, Wang S, Wu S (2018) Phase-only asymmetric optical cryptosystem based on random modulus decomposition. J Mod Opt 65(10):1245\u20131252. https:\/\/doi.org\/10.1080\/09500340.2018.1431314","journal-title":"J Mod Opt"},{"issue":"6","key":"2443_CR53","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1080\/09500340.2018.1559951","volume":"66","author":"AK Yadav","year":"2019","unstructured":"Yadav AK, Singh P, Saini I, Singh K (2019) Asymmetric encryption algorithm for colour images based on fractional Hartley transform. J Mod Opt 66(6):629\u2013642. https:\/\/doi.org\/10.1080\/09500340.2018.1559951","journal-title":"J Mod Opt"},{"key":"2443_CR54","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.optcom.2015.12.013","volume":"365","author":"S Yuan","year":"2016","unstructured":"Yuan S, Yao J, Liu X, Zhou X, Li Z (2016) Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging. Opt Commun 365:180\u2013185. https:\/\/doi.org\/10.1016\/j.optcom.2015.12.013","journal-title":"Opt Commun"},{"key":"2443_CR55","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.optlaseng.2017.07.015","volume":"100","author":"S Yuan","year":"2018","unstructured":"Yuan S, Yang Y, Liu X, Zhou X, Wei Z (2018) Optical image transformation and encryption by phase-retrieval-based double random-phase encoding and compressive ghost imaging. Opt Lasers Eng 100:105\u2013110. https:\/\/doi.org\/10.1016\/j.optlaseng.2017.07.015","journal-title":"Opt Lasers Eng"},{"key":"2443_CR56","doi-asserted-by":"publisher","first-page":"126568","DOI":"10.1016\/j.optcom.2020.126568","volume":"482","author":"S Yuan","year":"2021","unstructured":"Yuan S et al (2021) A blind watermarking scheme based on computational ghost imaging in wavelet domain. Opt Commun 482:126568\u2013128583. https:\/\/doi.org\/10.1016\/j.optcom.2020.126568","journal-title":"Opt Commun"},{"key":"2443_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.170500","volume":"273","author":"S Yuan","year":"2023","unstructured":"Yuan S, Han Y, Liu X, Li Z, Bing P, Zhou X (2023) Optical encryption for multi-user based on computational ghost imaging with Hadamard modulation. Optik 273:170500. https:\/\/doi.org\/10.1016\/j.ijleo.2022.170500","journal-title":"Optik"},{"issue":"10","key":"2443_CR58","doi-asserted-by":"publisher","first-page":"105405","DOI":"10.1088\/2040-8978\/16\/10\/105405","volume":"16","author":"M Zafari","year":"2014","unstructured":"Zafari M, Kheradmand R, Ahmadi-Kandjani S (2014) Optical encryption with selective computational ghost imaging. J Opt 16(10):105405\u2013105410. https:\/\/doi.org\/10.1088\/2040-8978\/16\/10\/105405","journal-title":"J Opt"},{"key":"2443_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108554","volume":"197","author":"H Zeng","year":"2022","unstructured":"Zeng H, Xing Y, Kim S-T, Li X (2022) Designing real-time 3D image security with CA-based random mode decomposition. Signal Process 197:108554. https:\/\/doi.org\/10.1016\/j.sigpro.2022.108554","journal-title":"Signal Process"},{"key":"2443_CR60","doi-asserted-by":"publisher","unstructured":"Zhang Q, Ding Q (2015) Digital image encryption based on advanced encryption standard (AES). In: 2015 Fifth Int. Conf. Instrum. Meas. Comput. Commun. Control IMCCC, pp. 1218\u20131221, https:\/\/doi.org\/10.1109\/IMCCC.2015.261","DOI":"10.1109\/IMCCC.2015.261"},{"issue":"1","key":"2443_CR61","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1134\/S0030400X16070250","volume":"121","author":"L Zhang","year":"2016","unstructured":"Zhang L et al (2016) Study on the algorithm of computational ghost imaging based on discrete Fourier transform measurement matrix. Opt Spectrosc 121(1):143\u2013151. https:\/\/doi.org\/10.1134\/S0030400X16070250","journal-title":"Opt Spectrosc"},{"key":"2443_CR62","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.optcom.2015.04.063","volume":"353","author":"S Zhao","year":"2015","unstructured":"Zhao S, Wang L, Liang W, Cheng W, Gong L (2015) High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique. Opt Commun 353:90\u201395. https:\/\/doi.org\/10.1016\/j.optcom.2015.04.063","journal-title":"Opt Commun"},{"issue":"4","key":"2443_CR63","doi-asserted-by":"publisher","first-page":"353","DOI":"10.3390\/photonics10040353","volume":"10","author":"M Zhao","year":"2023","unstructured":"Zhao M, Zhang X, Zhang R (2023) High-quality computational ghost imaging with a conditional GAN. Photonics 10(4):353. https:\/\/doi.org\/10.3390\/photonics10040353","journal-title":"Photonics"},{"issue":"13","key":"2443_CR64","doi-asserted-by":"publisher","first-page":"3234","DOI":"10.1016\/j.optcom.2011.02.065","volume":"284","author":"N Zhou","year":"2011","unstructured":"Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284(13):3234\u20133242. https:\/\/doi.org\/10.1016\/j.optcom.2011.02.065","journal-title":"Opt Commun"},{"key":"2443_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2022.128982","volume":"527","author":"D Zhou","year":"2023","unstructured":"Zhou D et al (2023) Temporally and spatially variant-resolution illumination patterns in computational ghost imaging. Opt Commun 527:128982. https:\/\/doi.org\/10.1016\/j.optcom.2022.128982","journal-title":"Opt Commun"},{"key":"2443_CR66","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.optcom.2018.03.014","volume":"420","author":"J Zhu","year":"2018","unstructured":"Zhu J et al (2018) Computational ghost imaging encryption based on fingerprint phase mask. Opt Commun 420:34\u201339. https:\/\/doi.org\/10.1016\/j.optcom.2018.03.014","journal-title":"Opt Commun"}],"container-title":["Computational and Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-023-02443-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40314-023-02443-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-023-02443-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T03:46:16Z","timestamp":1696563976000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40314-023-02443-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,12]]},"references-count":62,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["2443"],"URL":"https:\/\/doi.org\/10.1007\/s40314-023-02443-2","relation":{},"ISSN":["2238-3603","1807-0302"],"issn-type":[{"value":"2238-3603","type":"print"},{"value":"1807-0302","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,12]]},"assertion":[{"value":"27 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest concerning the publication of this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"305"}}