{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T03:56:45Z","timestamp":1772855805301,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:00:00Z","timestamp":1769212800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T00:00:00Z","timestamp":1772755200000},"content-version":"vor","delay-in-days":41,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100007847","name":"Natural Science Foundation of Jilin Province","doi-asserted-by":"publisher","award":["20220101132JC"],"award-info":[{"award-number":["20220101132JC"]}],"id":[{"id":"10.13039\/100007847","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s44443-026-00483-2","type":"journal-article","created":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T06:55:50Z","timestamp":1769237750000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A computational ghost imaging multi-party collaborative decryption method for low-resolution images"],"prefix":"10.1007","volume":"38","author":[{"given":"Jianan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiaoyang","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Zilong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Xia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9526-4030","authenticated-orcid":false,"given":"Dexin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,24]]},"reference":[{"issue":"1\u20132","key":"483_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"M Baptista","year":"1998","unstructured":"Baptista M (1998) Cryptography with chaos. Phys Lett A 240(1\u20132):50\u201354","journal-title":"Phys Lett A"},{"issue":"3.4","key":"483_CR2","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3.4):313\u2013336","journal-title":"IBM Syst J"},{"issue":"5","key":"483_CR3","doi-asserted-by":"publisher","first-page":"053840","DOI":"10.1103\/PhysRevA.79.053840","volume":"79","author":"Y Bromberg","year":"2009","unstructured":"Bromberg Y, Katz O, Silberberg Y (2009) Ghost imaging with a single detector. Phys Rev A-Atomic Mol Optical Phys 79(5):053840","journal-title":"Phys Rev A-Atomic Mol Optical Phys"},{"issue":"14","key":"483_CR4","doi-asserted-by":"publisher","first-page":"2391","DOI":"10.1364\/OL.35.002391","volume":"35","author":"P Clemente","year":"2010","unstructured":"Clemente P, Dur\u00e1n V, Torres-Company V, Tajahuerce E, Lancis J (2010) Optical encryption based on computational ghost imaging. Opt Lett 35(14):2391\u20132393","journal-title":"Opt Lett"},{"issue":"12","key":"483_CR5","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"483_CR6","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1364\/AOP.2.000405","volume":"2","author":"BI Erkmen","year":"2010","unstructured":"Erkmen BI, Shapiro JH (2010) Ghost imaging: from quantum to classical to computational. Adv Optics Photon 2(4):405\u2013450","journal-title":"Adv Optics Photon"},{"key":"483_CR7","doi-asserted-by":"crossref","unstructured":"Feldman P (1987) A practical scheme for non-interactive verifiable secret sharing. IEEE, 427\u2013438","DOI":"10.1109\/SFCS.1987.4"},{"key":"483_CR8","doi-asserted-by":"crossref","unstructured":"Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM. IEEE, 2366\u20132369","DOI":"10.1109\/ICPR.2010.579"},{"issue":"17","key":"483_CR9","doi-asserted-by":"publisher","first-page":"107203","DOI":"10.1016\/j.jfranklin.2024.107203","volume":"361","author":"J-L Hu","year":"2024","unstructured":"Hu J-L, Chen M-X, Zhou S, Zhou N-R (2024) Optical image authentication and encryption scheme with computational ghost imaging. J Franklin Inst 361(17):107203","journal-title":"J Franklin Inst"},{"key":"483_CR10","doi-asserted-by":"publisher","first-page":"107282","DOI":"10.1016\/j.rinp.2023.107282","volume":"56","author":"H Huang","year":"2024","unstructured":"Huang H, Han Z (2024) Computational ghost imaging encryption using RSA algorithm and discrete wavelet transform. Results Phys 56:107282","journal-title":"Results Phys"},{"issue":"1","key":"483_CR11","doi-asserted-by":"publisher","first-page":"7676","DOI":"10.1038\/s41598-017-07816-2","volume":"7","author":"S Jiang","year":"2017","unstructured":"Jiang S, Wang Y, Long T, Meng X, Yang X, Shu R, Sun B (2017) Information security scheme based on computational temporal ghost imaging. Sci Rep 7(1):7676","journal-title":"Sci Rep"},{"issue":"12","key":"483_CR12","doi-asserted-by":"publisher","first-page":"1370","DOI":"10.1364\/PRJ.7.001370","volume":"7","author":"Y Kang","year":"2019","unstructured":"Kang Y, Zhang L, Ye H, Zhao M, Kanwal S, Bai C, Zhang D (2019) One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access. Photon Res 7(12):1370\u20131380","journal-title":"Photon Res"},{"key":"483_CR13","unstructured":"Koch E, Zhao J (1995) Towards robust and hidden image copyright labeling 1:123\u2013132"},{"key":"483_CR14","doi-asserted-by":"crossref","unstructured":"Kurak C, McHugh J (1992) A cautionary note on image downgrading. IEEE Computer Society, 153\u2013154","DOI":"10.1109\/CSAC.1992.228224"},{"key":"483_CR15","doi-asserted-by":"publisher","first-page":"170744","DOI":"10.1016\/j.ijleo.2023.170744","volume":"278","author":"J Li","year":"2023","unstructured":"Li J, Zhang Q (2023) Compressed phase coding-based optical image encryption. Optik 278:170744","journal-title":"Optik"},{"issue":"9","key":"483_CR16","doi-asserted-by":"publisher","first-page":"11084","DOI":"10.1364\/OE.26.011084","volume":"26","author":"X Li","year":"2018","unstructured":"Li X, Zhao M, Xing Y, Zhang H-L, Li L, Kim S-T, Zhou X, Wang Q-H (2018) Designing optical 3D images encryption and reconstruction using monospectral synthetic aperture integral imaging. Opt Express 26(9):11084\u201311099","journal-title":"Opt Express"},{"issue":"12","key":"483_CR17","doi-asserted-by":"publisher","first-page":"16493","DOI":"10.1364\/OE.27.016493","volume":"27","author":"S Liansheng","year":"2019","unstructured":"Liansheng S, Cong D, Minjie X, Ailing T, Anand A (2019) Information encryption based on the customized data container under the framework of computational ghost imaging. Opt Express 27(12):16493\u201316506","journal-title":"Opt Express"},{"key":"483_CR18","doi-asserted-by":"publisher","first-page":"106370","DOI":"10.1016\/j.optlaseng.2020.106370","volume":"137","author":"X Liu","year":"2021","unstructured":"Liu X, Meng X, Wang Y, Wu H, Yang X, He W, Chen H (2021) Optical multilevel authentication based on singular value decomposition ghost imaging and secret sharing cryptography. Opt Lasers Eng 137:106370","journal-title":"Opt Lasers Eng"},{"issue":"2","key":"483_CR19","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1364\/OE.23.000655","volume":"23","author":"D Maluenda","year":"2015","unstructured":"Maluenda D, Carnicer A, Mart\u00ednez-Herrero R, Juvells I, Javidi B (2015) Optical encryption using photon-counting polarimetric imaging. Opt Express 23(2):655\u2013666","journal-title":"Opt Express"},{"issue":"5560","key":"483_CR20","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"RM May","year":"1976","unstructured":"May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459\u2013467","journal-title":"Nature"},{"issue":"7","key":"483_CR21","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767\u2013769","journal-title":"Opt Lett"},{"issue":"6","key":"483_CR22","doi-asserted-by":"publisher","first-page":"061802","DOI":"10.1103\/PhysRevA.78.061802","volume":"78","author":"JH Shapiro","year":"2008","unstructured":"Shapiro JH (2008) Computational ghost imaging. Phys Rev A-Atomic Mol Optical Phys 78(6):061802","journal-title":"Phys Rev A-Atomic Mol Optical Phys"},{"key":"483_CR23","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.optlaseng.2019.01.006","volume":"116","author":"L Sui","year":"2019","unstructured":"Sui L, Zhao X, Huang C, Tian A, Anand A (2019) An optical multiple-image authentication based on transport of intensity equation. Opt Lasers Eng 116:116\u2013124","journal-title":"Opt Lasers Eng"},{"key":"483_CR24","doi-asserted-by":"publisher","first-page":"106627","DOI":"10.1016\/j.optlaseng.2021.106627","volume":"143","author":"L Sui","year":"2021","unstructured":"Sui L, Pang Z, Cheng Y, Cheng Y, Xiao Z, Tian A, Qian K, Anand A (2021) An optical image encryption based on computational ghost imaging with sparse reconstruction. Opt Lasers Eng 143:106627","journal-title":"Opt Lasers Eng"},{"key":"483_CR25","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.optlaseng.2018.10.014","volume":"114","author":"S Wang","year":"2019","unstructured":"Wang S, Meng X, Yin Y, Wang Y, Yang X, Zhang X, Peng X, He W, Dong G, Chen H (2019) Optical image watermarking based on singular value decomposition ghost imaging and lifting wavelet transform. Opt Lasers Eng 114:76\u201382","journal-title":"Opt Lasers Eng"},{"key":"483_CR26","doi-asserted-by":"crossref","unstructured":"Yan A, Lu C, Yu J, Tang M, Dong J, Hu Z, Zhang H (2019) Multiple-image encryption based on angular-multiplexing holography with quick response code and spiral phase keys. Appl Opt 58(34):6\u201310","DOI":"10.1364\/AO.58.0000G6"},{"key":"483_CR27","doi-asserted-by":"crossref","unstructured":"Yi K, Leihong Z, Hualong Y, Dawei Z (2021) Hybrid encryption scheme based on temporal ghost imaging. Appl Phys B 127(8):124","DOI":"10.1007\/s00340-021-07580-2"},{"issue":"14","key":"483_CR28","doi-asserted-by":"publisher","first-page":"3917","DOI":"10.1364\/OL.392424","volume":"45","author":"S Yuan","year":"2020","unstructured":"Yuan S, Wang L, Liu X, Zhou X (2020) Forgery attack on optical encryption based on computational ghost imaging. Opt Lett 45(14):3917\u20133920","journal-title":"Opt Lett"},{"issue":"3","key":"483_CR29","doi-asserted-by":"publisher","first-page":"4242","DOI":"10.1364\/OE.510356","volume":"32","author":"L Zhang","year":"2024","unstructured":"Zhang L, Wang X, Zhou Q, Xue J, Xu B (2024) Optical cryptosystem based on computational ghost imaging and nonlinear authentication. Opt Express 32(3):4242\u20134253","journal-title":"Opt Express"},{"issue":"12","key":"483_CR30","doi-asserted-by":"publisher","first-page":"21866","DOI":"10.1364\/OE.455975","volume":"30","author":"P Zheng","year":"2022","unstructured":"Zheng P, Ye Z, Xiong J, Liu H-C (2022) Computational ghost imaging encryption with a pattern compression from 3D to 0D. Opt Express 30(12):21866\u201321875","journal-title":"Opt Express"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-026-00483-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-026-00483-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-026-00483-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T15:17:01Z","timestamp":1772810221000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-026-00483-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,24]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["483"],"URL":"https:\/\/doi.org\/10.1007\/s44443-026-00483-2","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,24]]},"assertion":[{"value":"24 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"85"}}