{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T20:43:22Z","timestamp":1760647402512,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688837"},{"type":"electronic","value":"9783030688844"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68884-4_43","type":"book-chapter","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:29:09Z","timestamp":1612826949000},"page":"519-530","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Quantum Color Image Encryption Scheme Based on Controlled Alternate Quantum Walks"],"prefix":"10.1007","author":[{"given":"Ting","family":"Yan","sequence":"first","affiliation":[]},{"given":"Dan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"Venegas-Andraca, S., Bose, S.: Storing, processing, and retrieving an image using quantum mechanics. In: Proceedings of SPIE Conference of Quantum Information and Computation, vol. 5105, pp. 137\u2013147 (2003)","DOI":"10.1117\/12.485960"},{"issue":"1","key":"43_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-016-1457-y","volume":"16","author":"M Mastriani","year":"2016","unstructured":"Mastriani, M.: Quantum image processing? Quantum Inf. Process. 16(1), 1\u201342 (2016). https:\/\/doi.org\/10.1007\/s11128-016-1457-y","journal-title":"Quantum Inf. Process."},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Yan, F., Venegas-Andraca, S.E.: Quantum image processing, Quantum Information Processing (2020)","DOI":"10.1007\/978-981-32-9331-1"},{"issue":"1","key":"43_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-015-1195-6","volume":"15","author":"F Yan","year":"2015","unstructured":"Yan, F., Iliyasu, A.M., Venegas-Andraca, S.E.: A survey of quantum image representations. Quantum Inf. Process. 15(1), 1\u201335 (2015). https:\/\/doi.org\/10.1007\/s11128-015-1195-6","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"43_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2386-3","volume":"18","author":"B Abd-El-Atty","year":"2019","unstructured":"Abd-El-Atty, B., Abd El-Latif, A.A., Venegas-Andraca, S.E.: An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quantum Inf. Process. 18(9), 1\u201326 (2019). https:\/\/doi.org\/10.1007\/s11128-019-2386-3","journal-title":"Quantum Inf. Process."},{"key":"43_CR6","doi-asserted-by":"publisher","first-page":"123869","DOI":"10.1016\/j.physa.2019.123869","volume":"547","author":"AA Abd EL-Latif","year":"2019","unstructured":"Abd EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E.: Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Physica A 547, 123869 (2019)","journal-title":"Physica A"},{"key":"43_CR7","doi-asserted-by":"publisher","first-page":"105942","DOI":"10.1016\/j.optlastec.2019.105942","volume":"124","author":"AA Abd EL-Latif","year":"2020","unstructured":"Abd EL-Latif, A.A., et al.: Controlled alternate quantum walks based privacy preserving healthcare images in internet of things. Opt. Laser Technol. 124, 105942 (2020)","journal-title":"Opt. Laser Technol."},{"key":"43_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-016-0001-8","volume":"6","author":"YG Yang","year":"2016","unstructured":"Yang, Y.G., Zhao, Q.Q.: Novel pseudo-random number generator based on quantum random walks. Sci. Rep. 6, 1\u201311 (2016)","journal-title":"Sci. Rep."},{"key":"43_CR9","doi-asserted-by":"publisher","first-page":"19788","DOI":"10.1038\/srep19788","volume":"6","author":"YG Yang","year":"2016","unstructured":"Yang, Y.G., Xu, P., Yang, R., Zhou, Y.H., Shi, W.M.: Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci. Rep. 6, 19788 (2016)","journal-title":"Sci. Rep."},{"issue":"8","key":"43_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1954-2","volume":"17","author":"Y-G Yang","year":"2018","unstructured":"Yang, Y.-G., Bi, J.-L., Chen, X.-B., Yuan, Z., Zhou, Y.-H., Shi, W.-M.: Simple hash function using discrete-time quantum walks. Quantum Inf. Process. 17(8), 1\u201319 (2018). https:\/\/doi.org\/10.1007\/s11128-018-1954-2","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"43_CR11","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1007\/s11128-013-0567-z","volume":"12","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., Lu, K., Gao, Y., Wang, M.: NEQR: a novel enhanced quantum representation of digital images. Quantum Inf. Process. 12(8), 2833\u20132860 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"43_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-016-1463-0","volume":"16","author":"J Sang","year":"2016","unstructured":"Sang, J., Wang, S., Li, Q.: A novel quantum representation of color digital images. Quantum Inf. Process. 16(2), 1\u201314 (2016). https:\/\/doi.org\/10.1007\/s11128-016-1463-0","journal-title":"Quantum Inf. Process."},{"key":"43_CR13","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1007\/s11128-012-0421-8","volume":"12","author":"D Li","year":"2012","unstructured":"Li, D., et al.: Discrete-time interacting quantum walks and quantum hash schemes. Quant. Inf. Process. 12, 1501\u20131513 (2012). https:\/\/doi.org\/10.1007\/s11128-012-0421-8","journal-title":"Quant. Inf. Process."},{"key":"43_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-017-18566-6","volume":"8","author":"D Li","year":"2017","unstructured":"Li, D., et al.: Controlled alternate quantum walks based quantum hash function. Sci. Rep. 8, 1\u20137 (2017). https:\/\/doi.org\/10.1038\/s41598-017-18566-6","journal-title":"Sci. Rep."},{"issue":"9","key":"43_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-017-1640-9","volume":"16","author":"R-G Zhou","year":"2017","unstructured":"Zhou, R.-G., Hu, W., Fan, P.: Quantum watermarking scheme through Arnold scrambling and LSB steganography. Quantum Inf. Process. 16(9), 1\u201321 (2017). https:\/\/doi.org\/10.1007\/s11128-017-1640-9","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"43_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02641-5","volume":"19","author":"WW Hu","year":"2020","unstructured":"Hu, W.W., Zhou, R.G., Liu, X.A., et al.: Quantum image steganography algorithm based on modified exploiting modification direction embedding. Quantum Inf. Process. 19(5), 1\u201328 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"43_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1921-y","volume":"17","author":"RG Zhou","year":"2018","unstructured":"Zhou, R.G., Hu, W.W., Luo, G.F., Liu, X.A., Fan, P.: Quantum realization of the nearest neighbor value interpolation method for INEQR. Quantum Inf. Process. 17(7), 1\u201337 (2018). https:\/\/doi.org\/10.1007\/s11128-018-1921-y","journal-title":"Quantum Inf. Process."},{"key":"43_CR18","first-page":"26","volume":"7","author":"SO David","year":"2007","unstructured":"David, S.O., Ramos, R.: Quantum bit string comparator: circuits and applications quantum bit string comparator: circuits and applications. Quantum Comput. Comput. 7, 26 (2007)","journal-title":"Quantum Comput. Comput."},{"issue":"15","key":"43_CR19","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1016\/j.tcs.2010.11.029","volume":"412","author":"PQ Le","year":"2011","unstructured":"Le, P.Q., Iliyasu, A.M., Dong, F., Hirota, K.: Strategies for designing geometric transformations on quantum images. Theor. Comput. Sci. 412(15), 1406\u20131418 (2011)","journal-title":"Theor. Comput. Sci."},{"issue":"10","key":"43_CR20","doi-asserted-by":"publisher","first-page":"100504","DOI":"10.1088\/1674-1056\/26\/10\/100504","volume":"26","author":"LM Zhang","year":"2017","unstructured":"Zhang, L.M., Sun, K.H., Liu, W.H., et al.: A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations. Chin. Phys. B 26(10), 100504 (2017)","journal-title":"Chin. Phys. B"},{"key":"43_CR21","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1103\/PhysRevA.52.3457","volume":"52","author":"A Barenco","year":"1995","unstructured":"Barenco, A., et al.: Elementary gates for quantum computation. Phys. Rev. A 52, 3457\u20133488 (1995)","journal-title":"Phys. Rev. A"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68884-4_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:50:37Z","timestamp":1612828237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68884-4_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688837","9783030688844"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68884-4_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}