{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:02Z","timestamp":1740122822026,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"37-38","license":[{"start":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T00:00:00Z","timestamp":1595894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T00:00:00Z","timestamp":1595894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11042-020-09296-5","type":"journal-article","created":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T01:02:40Z","timestamp":1595898160000},"page":"27555-27581","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Color image encryption based on discrete trinion Fourier transform and random-multiresolution singular value decomposition"],"prefix":"10.1007","volume":"79","author":[{"given":"Qijun","family":"Yao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4847-282X","authenticated-orcid":false,"given":"Zhuhong","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Xilin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Qingbin","family":"Tong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,28]]},"reference":[{"key":"9296_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.optlaseng.2014.01.006","volume":"57","author":"MR Abuturab","year":"2014","unstructured":"Abuturab MR (2014) Color information verification system based on singular value decomposition in gyrator transform domains. Opt Lasers Eng 57:13\u201319","journal-title":"Opt Lasers Eng"},{"issue":"8","key":"9296_CR2","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1016\/j.sigpro.2011.02.011","volume":"91","author":"D Assefa","year":"2011","unstructured":"Assefa D, Mansinha L, Tiampo KF, Rasmussen H, Abdella K (2011) The trinion Fourier transform of color images. Signal Process 91(8):1887\u20131900","journal-title":"Signal Process"},{"doi-asserted-by":"publisher","unstructured":"Bahri M (2017) General correlation theorem for trinion Fourier transform. In: AIP Conf Proc 1913(1): https:\/\/doi.org\/10.1063\/1.5016638.","key":"9296_CR3","DOI":"10.1063\/1.5016638"},{"issue":"6","key":"9296_CR4","first-page":"1657","volume":"19","author":"M Bahria","year":"2016","unstructured":"Bahria M, Mulkiaha NE, Ashinob R (2016) Real matrix representation for trinion numbers and its properties. Inf Int Interdisc J 19(6):1657\u20131666","journal-title":"Inf Int Interdisc J"},{"issue":"2","key":"9296_CR5","first-page":"023033","volume":"27","author":"T Bekkouche","year":"2018","unstructured":"Bekkouche T, Bouguezel S (2018) Digital double random amplitude image encryption method based on the symmetry property of the parametric discrete Fourier transform. J Electron Imaging 27(2):023033","journal-title":"J Electron Imaging"},{"issue":"6","key":"9296_CR6","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1080\/02564602.2018.1533892","volume":"36","author":"P Bhaskar","year":"2019","unstructured":"Bhaskar P, Sumit K, Rajib Kumar K (2019) Image encryption based on block-wise fractional Fourier transform with wavelet transform. IETE Tech Rev 36(6):600\u2013613","journal-title":"IETE Tech Rev"},{"key":"9296_CR7","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.ins.2014.02.018","volume":"277","author":"G Bhatnagar","year":"2014","unstructured":"Bhatnagar G, Saha A, Wu QMJ, Atrey PK (2014) Analysis and extension of multiresolution singular value decomposition. Inf Sci 277:247\u2013262","journal-title":"Inf Sci"},{"issue":"17","key":"9296_CR8","doi-asserted-by":"publisher","first-page":"3433","DOI":"10.1016\/j.optcom.2009.05.044","volume":"282","author":"LF Chen","year":"2009","unstructured":"Chen LF, Zhao DM (2009) Color image encoding in dual fractional Fourier-wavelet domain with random phases. Optics Commun 282(17):3433\u20133438","journal-title":"Optics Commun"},{"key":"9296_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.optlaseng.2017.01.005","volume":"93","author":"H Chen","year":"2017","unstructured":"Chen H, Tanougast C, Liu ZJ, Sieler L (2017) Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains. Opt Lasers Eng 93:1\u20138","journal-title":"Opt Lasers Eng"},{"key":"9296_CR10","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","volume":"142","author":"J Chen","year":"2018","unstructured":"Chen J, Zhu Z, Zhang L, Zhang Y, Yang B (2018) Exploiting self-adaptive permutation\u2013diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340\u2013353","journal-title":"Signal Process"},{"issue":"12","key":"9296_CR11","doi-asserted-by":"publisher","first-page":"2238","DOI":"10.1049\/iet-ipr.2018.5440","volume":"12","author":"BJ Chen","year":"2018","unstructured":"Chen BJ, Yu M, Tian YH, Li LD, Wang DC, Sun XM (2018) Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption. IET Image Process 12(12):2238\u20132249","journal-title":"IET Image Process"},{"key":"9296_CR12","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.optlaseng.2018.08.020","volume":"112","author":"H Chen","year":"2019","unstructured":"Chen H, Liu ZJ, Zhu L, Tanougast C, Blondel W (2019) Asymmetric color cryptosystem using chaotic Ushiki map and equal modulus decomposition in fractional Fourier transform domains. Opt Lasers Eng 112:7\u201315","journal-title":"Opt Lasers Eng"},{"issue":"6","key":"9296_CR13","doi-asserted-by":"publisher","first-page":"445","DOI":"10.3390\/e20060445","volume":"20","author":"C Fan","year":"2018","unstructured":"Fan C, Ding Q (2018) A novel image encryption scheme based on self-synchronous chaotic stream cipher and wavelet transform. Entropy 20(6):445","journal-title":"Entropy"},{"key":"9296_CR14","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1007\/s11042-019-08190-z","volume":"79","author":"OS Faragallah","year":"2019","unstructured":"Faragallah OS, AlZain MA, El-Sayed HS, Al-Amri JF, El-Shafai W, Afifi A, Naeem EA, Soh B (2019) Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimed Tools Appl 79:2495\u20132519. https:\/\/doi.org\/10.1007\/s11042-019-08190-z","journal-title":"Multimed Tools Appl"},{"key":"9296_CR15","doi-asserted-by":"publisher","first-page":"4184","DOI":"10.1109\/ACCESS.2018.2879857","volume":"7","author":"OS Faragallah","year":"2019","unstructured":"Faragallah OS, Alzain MA, El-Sayed HS, Al-Amri JF, El-Shafai W, Afifi A, Naeem EA, Soh B (2019) Block-based optical color image encryption based on double random phase encoding. IEEE Access 7:4184\u20134194","journal-title":"IEEE Access"},{"key":"9296_CR16","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.sigpro.2019.06.010","volume":"164","author":"HM Ghadirli","year":"2019","unstructured":"Ghadirli HM, Nodehi A, Enayatifar R (2019) An overview of encryption algorithms in color images. Signal Process 164:163\u2013185","journal-title":"Signal Process"},{"key":"9296_CR17","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.optlaseng.2016.03.021","volume":"89","author":"C Guo","year":"2017","unstructured":"Guo C, Wei C, Tan J, Chen K, Liu S, Wu Q, Liu Z (2017) A review of iterative phase retrieval for measurement and encryption. Opt Lasers Eng 89:2\u201312","journal-title":"Opt Lasers Eng"},{"issue":"23","key":"9296_CR18","doi-asserted-by":"publisher","first-page":"5713","DOI":"10.1016\/j.optcom.2008.08.024","volume":"281","author":"M Joshi","year":"2008","unstructured":"Joshi M, Chandrashakher SK (2008) Color image encryption and decryption for twin images in fractional Fourier domain. Optics Commun 281(23):5713\u20135720","journal-title":"Optics Commun"},{"issue":"12","key":"9296_CR19","doi-asserted-by":"publisher","first-page":"2496","DOI":"10.1016\/j.optcom.2010.02.024","volume":"283","author":"M Joshi","year":"2010","unstructured":"Joshi M, Shakher C, Singh K (2010) Fractional Fourier transform based image multiplexing and encryption technique for four-color images using input images as keys. Optics Commun 283(12):2496\u20132505","journal-title":"Optics Commun"},{"doi-asserted-by":"crossref","unstructured":"Kang XJ, Ming AL, R. Tao (2019) Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans Circ Syst Vid 29(6): 1595\u20131607.","key":"9296_CR20","DOI":"10.1109\/TCSVT.2018.2851983"},{"issue":"2","key":"9296_CR21","doi-asserted-by":"publisher","first-page":"129","DOI":"10.3807\/JOSK.2014.18.2.129","volume":"18","author":"IH Lee","year":"2014","unstructured":"Lee IH, Cho M (2014) Double random phase encryption based orthogonal encoding technique for color images. J Opt Soc Korea 18(2):129\u2013133","journal-title":"J Opt Soc Korea"},{"issue":"1","key":"9296_CR22","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.optcom.2010.09.013","volume":"284","author":"ZJ Liu","year":"2011","unstructured":"Liu ZJ, Xu L, Liu T, Chen H, Li PF, Lin CA, Liu ST (2011) Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domain. Opt Commun 284(1):123\u2013128","journal-title":"Opt Commun"},{"key":"9296_CR23","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.optlastec.2013.05.023","volume":"57","author":"S Liu","year":"2014","unstructured":"Liu S, Guo C, Sheridan JT (2014) A review of optical image encryption techniques. Opt Lasers Technol 57:327\u2013342","journal-title":"Opt Lasers Technol"},{"issue":"4","key":"9296_CR24","volume":"27","author":"XL Liu","year":"2018","unstructured":"Liu XL, Wu YF, Shao ZH, Wu JS, Shu HZ (2018) Color image watermarking using a discrete trinion Fourier transform. J Electron Imaging 27(4):043046","journal-title":"J Electron Imaging"},{"issue":"1","key":"9296_CR25","doi-asserted-by":"publisher","first-page":"6900207","DOI":"10.1109\/JPHOT.2018.2886295","volume":"11","author":"GY Luan","year":"2019","unstructured":"Luan GY, Li AC, Zhang DM, Wang DX (2019) Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain. IEEE Photonics J 11(1):6900207","journal-title":"IEEE Photonics J"},{"key":"9296_CR26","doi-asserted-by":"publisher","first-page":"77740","DOI":"10.1109\/ACCESS.2018.2884013","volume":"6","author":"YL Luo","year":"2018","unstructured":"Luo YL, Tang SB, Qin XS, Cao LC, Jiang F, Liu JX (2018) A double-image encryption scheme based on amplitude-phase encoding and discrete complex random transformation. IEEE Access 6:77740\u201377753","journal-title":"IEEE Access"},{"key":"9296_CR27","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.jnca.2018.02.009","volume":"108","author":"KP Praaveen","year":"2018","unstructured":"Praaveen KP, Syam KP, Alphonse PJA (2018) Attribute based encryption in cloud computing: a survey, gap analysis, and future directions. J Netw Compu Appl 108:37\u201352","journal-title":"J Netw Compu Appl"},{"doi-asserted-by":"crossref","unstructured":"Shao ZH, Wu JS, Coatrieux JL, Coatrieux G, Shu HZ (2013). Quaternion gyrator transform and its application to color image encryption. In: Proc IEEE International Conference on Image Processing, pp. 4579\u20134582.","key":"9296_CR28","DOI":"10.1109\/ICIP.2013.6738943"},{"key":"9296_CR29","doi-asserted-by":"publisher","first-page":"115662","DOI":"10.1016\/j.image.2019.115662","volume":"80","author":"ZH Shao","year":"2020","unstructured":"Shao ZH, Liu XL, Yao QJ, Qi N, Shang YY, Zhang JJ (2020) Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Process Image Commun 80:115662","journal-title":"Signal Process Image Commun"},{"key":"9296_CR30","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.optlaseng.2018.10.002","volume":"113","author":"L Sui","year":"2019","unstructured":"Sui L, Zhang X, Huang C, Tian A, Asundid AK (2019) Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Opt Lasers Eng 113:29\u201337","journal-title":"Opt Lasers Eng"},{"issue":"4","key":"9296_CR31","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"20","key":"9296_CR32","doi-asserted-by":"publisher","first-page":"1856","DOI":"10.1016\/j.ijleo.2010.11.016","volume":"122","author":"XL Wang","year":"2011","unstructured":"Wang XL, Zhai HC, Li ZL, Ge Q (2011) Double random-phase encryption based on discrete quaternion Fourier-transforms. Optik 122(20):1856\u20131859","journal-title":"Optik"},{"key":"9296_CR33","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"CP Wang","year":"2019","unstructured":"Wang CP, Wang XY, Xia ZQ, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109\u2013120","journal-title":"Inf Sci"},{"key":"9296_CR34","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.optlaseng.2016.06.007","volume":"89","author":"LL Yao","year":"2017","unstructured":"Yao LL, Yuan CJ, Qiang JJ, Feng ST, Nie SP (2017) Asymmetric color image encryption based on singular value decomposition. Opt Lasers Eng 89:80\u201387","journal-title":"Opt Lasers Eng"},{"issue":"15","key":"9296_CR35","doi-asserted-by":"publisher","first-page":"4381","DOI":"10.1364\/AO.56.004381","volume":"56","author":"FL Yi","year":"2017","unstructured":"Yi FL, Jeoung Y, Moon I (2017) Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging. Appl Opt 56(15):4381\u20134387","journal-title":"Appl Opt"},{"issue":"5","key":"9296_CR36","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1002\/(SICI)1098-2760(19990605)21:5<318::AID-MOP4>3.0.CO;2-A","volume":"21","author":"SQ Zhang","year":"1999","unstructured":"Zhang SQ, Karim MA (1999) Color image encryption using double random phase encoding. Microw Opt Technol Lett 21(5):318\u2013323","journal-title":"Microw Opt Technol Lett"},{"issue":"7","key":"9296_CR37","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.3724\/SP.J.1146.2011.01364","volume":"34","author":"W Zhang","year":"2012","unstructured":"Zhang W, Zhou N (2012) Double-color image encryption based on discrete fractional random transform. J Electron Inf Technol 34(7):1727\u20131734","journal-title":"J Electron Inf Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09296-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09296-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09296-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T23:30:40Z","timestamp":1627428640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09296-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,28]]},"references-count":37,"journal-issue":{"issue":"37-38","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["9296"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09296-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,7,28]]},"assertion":[{"value":"20 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}