{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:16:35Z","timestamp":1761005795244,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":44,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819513451","type":"print"},{"value":"9789819513468","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-1346-8_13","type":"book-chapter","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T06:21:35Z","timestamp":1760941295000},"page":"204-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum Color Image Selective Encryption in HSI Color Space"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0111-8559","authenticated-orcid":false,"given":"Xianhua","family":"Song","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8469-2666","authenticated-orcid":false,"given":"Mengmeng","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8571-8419","authenticated-orcid":false,"given":"Fuzhou","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,21]]},"reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.46578\/humder.1066545","volume":"7","author":"C Tiken","year":"2022","unstructured":"Tiken, C., Samli, R.: A comprehensive review about image encryption methods. Harran \u00dcniversitesi M\u00fchendislik Dergisi 7(1), 27\u201349 (2022)","journal-title":"Harran \u00dcniversitesi M\u00fchendislik Dergisi"},{"issue":"8","key":"13_CR2","doi-asserted-by":"publisher","first-page":"160","DOI":"10.3390\/computers12080160","volume":"12","author":"ST Ahmed","year":"2023","unstructured":"Ahmed, S.T., Hammood, D.A., Chisab, R.F., et al.: Medical image encryption: a comprehensive review. Computers 12(8), 160 (2023)","journal-title":"Computers"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. in: The 35th Annual IEEE Symposium on Foundations of Computer Science, Los Alamitos, CA, USA, pp. 124\u2013134 (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: The 28th Annual ACM Symposium on Theory of Computing, Philadelphia, pp. 212\u2013219. ACM, USA (1996)","DOI":"10.1145\/237814.237866"},{"key":"13_CR5","first-page":"157","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2005","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information, pp. 157\u2013223. Cambridge University Press, Cambridge (2005)"},{"issue":"2","key":"13_CR6","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s11831-021-09599-2","volume":"29","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Xu, M., Zhang, Y.: Review of quantum image processing. Arch. Comput. Methods in Eng. 29(2), 737\u2013761 (2022)","journal-title":"Arch. Comput. Methods in Eng."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Kolivand, H., Hamood, S.F., Asadianfam, S., et al.: Image encryption techniques: a comprehensive review. Multimed. Tools Appl. 1\u201336 (2024)","DOI":"10.1007\/s11042-023-17896-0"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Puech, W., Bors, A.G., Rodrigues, J.M.: Protection of color images by selective encryption. In: Advanced Color Image Processing and Analysis, pp. 397\u2013421 (2013)","DOI":"10.1007\/978-1-4419-6190-7_12"},{"issue":"3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/S0010-4825(02)00094-X","volume":"33","author":"R Norcen","year":"2003","unstructured":"Norcen, R., Podesser, M., Pommer, A., et al.: Confidential storage and transmission of medical image data. Comput. Biol. Med. 33(3), 277\u2013292 (2003)","journal-title":"Comput. Biol. Med."},{"issue":"6","key":"13_CR10","first-page":"92","volume":"2","author":"MG Nazneen","year":"2013","unstructured":"Nazneen, M.G., Banu, S., Tabassum, Z., et al.: Selective bitplane encryption for secure transmission of image data in mobile environment. Int. J. Sci. Technol. Res. 2(6), 92\u201396 (2013)","journal-title":"Int. J. Sci. Technol. Res."},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/ACCESS.2017.2777869","volume":"6","author":"AA Abd El-Latif","year":"2017","unstructured":"Abd El-Latif, A.A., Abd-El-Atty, B., Talha, M.: Robust encryption of quantum medical images. IEEE Access 6, 1073\u20131081 (2017)","journal-title":"IEEE Access"},{"key":"13_CR12","first-page":"102832","volume":"59","author":"T Janani","year":"2021","unstructured":"Janani, T., Brindha, M.: A secure medical image transmission scheme aided by quantum representation. J. Inf. Secur. Appl. 59, 102832 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11128-024-04281-5","volume":"23","author":"Y Wei","year":"2024","unstructured":"Wei, Y., Li, H.S., Liu, K., et al.: Quantum video encryption based on bitplanes and improved Arnold scrambling. Quantum Inf. Process. 23, 67 (2024)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"13_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02643-3","volume":"19","author":"AM Grigoryan","year":"2020","unstructured":"Grigoryan, A.M., Agaian, S.S.: New look on quantum representation of images: Fourier transform representation. Quantum Inf. Process. 19(5), 1\u201326 (2020). https:\/\/doi.org\/10.1007\/s11128-020-02643-3","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"13_CR15","doi-asserted-by":"publisher","first-page":"13879","DOI":"10.1038\/s41598-021-93471-7","volume":"11","author":"J Su","year":"2021","unstructured":"Su, J., Guo, X., Liu, C., et al.: An improved novel quantum image representation and its experimental test on IBM quantum experience. Sci. Rep. 11(1), 13879 (2021)","journal-title":"Sci. Rep."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Nguyen, T., Paik, I., Sagawa, H., Thang, T.C.: Quantum machine learning with quantum image representations. In: 2022 IEEE International Conference on Quantum Computing and Engineering (QCE), Broomfield, CO, USA, pp. 851\u2013854 (2022)","DOI":"10.1109\/QCE53715.2022.00142"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Ranjan, A., Arya, A.K.S., Ravinder, M.: Quantum techniques for image processing. In: 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, pp. 1035\u20131039 (2020)","DOI":"10.1109\/ICACCCN51052.2020.9362910"},{"key":"13_CR18","unstructured":"Beach, G., Lomont, C., Cohen, C.: Quantum image processing (quip). In: 2003 Proceedings of the 32nd Applied Imagery Pattern Recognition Workshop, pp. 39\u201344. IEEE (2003)"},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s11128-010-0177-y","volume":"10","author":"PQ Le","year":"2011","unstructured":"Le, P.Q., Dong, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Inf. Process. 10, 63\u201384 (2011)","journal-title":"Quantum Inf. Process."},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1007\/s11128-013-0567-z","volume":"12","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., Lu, K., Gao, Y., et al.: NEQR: a novel enhanced quantum representation of digital images. Quantum Inf. Process. 12, 2833\u20132860 (2013)","journal-title":"Quantum Inf. Process."},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Sun, B., Le, P.Q., Iliyasu, A.M., et al.: A multi-channel representation for images on quantum computers using the RGB\u03b1 color space. In: IEEE International Symposium on Intelligent Signal Processing, Floriana, Malta, pp. 1\u20136 (2011)","DOI":"10.1109\/WISP.2011.6051718"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Sun, B., Iliyasu, A., Yan, F., et al.: An RGB multi-channel representation for images on quantum computers. J. Adv. Comput. Intell. Intell. Inform. 17(3) (2013)","DOI":"10.20965\/jaciii.2013.p0404"},{"key":"13_CR23","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/s11128-013-0705-7","volume":"13","author":"HS Li","year":"2014","unstructured":"Li, H.S., Zhu, Q., Zhou, R.G., et al.: Multi-dimensional color image storage and retrieval for a normal arbitrary quantum superposition state. Quantum Inf. Process. 13, 991\u20131011 (2014)","journal-title":"Quantum Inf. Process."},{"key":"13_CR24","unstructured":"Caraiman, S., Manta, V.: Image processing using quantum computing. In: IEEE International Conference on System Theory, Control and Computing (ICSTCC), Sinaia, Romania, pp. 1\u20136 (2012)"},{"issue":"1","key":"13_CR25","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1587\/transfun.E100.A.341","volume":"100","author":"M Kamiyama","year":"2017","unstructured":"Kamiyama, M., Taguchi, A.: HSI color space with same gamut of RGB color space. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100(1), 341\u2013344 (2017)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Kong, F., Peng, Y.: Color image watermarking algorithm based on HSI color space. In: 2010 2nd International Conference on Industrial and Information Systems, Dalian, China, pp. 464\u2013467 (2010)","DOI":"10.1109\/INDUSIS.2010.5565754"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Saravanan, G., Yamuna, G., Nandhini, S.: Real time implementation of RGB to HSV\/HSI\/HSL and its reverse color space models. In: 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, India, pp. 0462\u20130466 (2016)","DOI":"10.1109\/ICCSP.2016.7754179"},{"issue":"2","key":"13_CR28","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1587\/transfun.E98.A.792","volume":"98","author":"A Taguchi","year":"2015","unstructured":"Taguchi, A., Hoshi, Y.: Color image enhancement in HSI color space without gamut problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98(2), 792\u2013795 (2015)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"1","key":"13_CR29","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s11128-021-03337-0","volume":"21","author":"GL Chen","year":"2022","unstructured":"Chen, G.L., Song, X.H., Venegas-Andraca, S.E., et al.: QIRHSI: novel quantum image representation based on HSI color space model. Quantum Inf. Process. 21(1), 5 (2022)","journal-title":"Quantum Inf. Process."},{"issue":"17","key":"13_CR30","doi-asserted-by":"publisher","first-page":"3038","DOI":"10.3390\/math10173038","volume":"10","author":"X Song","year":"2022","unstructured":"Song, X., Chen, G., Abd El-Latif, A.A.: Quantum color image encryption scheme based on geometric transformation and intensity channel diffusion. Mathematics 10(17), 3038 (2022)","journal-title":"Mathematics"},{"key":"13_CR31","doi-asserted-by":"publisher","first-page":"21883","DOI":"10.1109\/ACCESS.2023.3247507","volume":"11","author":"X Song","year":"2023","unstructured":"Song, X., Chen, G., Abd El-Latif, A.A., et al.: Quantum geometric transformation based on QIRHSI quantum color images. IEEE Access 11, 21883\u201321899 (2023)","journal-title":"IEEE Access"},{"issue":"9","key":"13_CR32","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/s11128-023-04092-0","volume":"22","author":"M Li","year":"2023","unstructured":"Li, M., Song, X., El-Latif, A.A.A.: EQIRHSI: enhanced quantum image representation using entanglement state encoding in the HSI color model. Quantum Inf. Process. 22(9), 334 (2023)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"13_CR33","doi-asserted-by":"publisher","first-page":"1650193","DOI":"10.1142\/S0218127416501935","volume":"26","author":"D Xiao","year":"2016","unstructured":"Xiao, D., Fu, Q., Xiang, T., et al.: Chaotic image encryption of regions of interest. Int. J. Bifurc. Chaos 26(11), 1650193 (2016)","journal-title":"Int. J. Bifurc. Chaos"},{"key":"13_CR34","unstructured":"Ntalianis, K.S.: An automatic human video objects encryption scheme built on stream and block ciphers and based on chaos. In: Proceedings of the 9th World Scientific and Engineering Academy and Society (WSEAS) International Conference on Systems, Wisconsin, United States, pp. 1\u20137 (2005)"},{"issue":"6","key":"13_CR35","first-page":"315","volume":"10","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Zhao, F., Xu, Y., et al.: A novel face template protection algorithm based on the fusion of chaos theory and RSA encryption. Int. J. Secur. Appl. 10(6), 315\u2013330 (2016)","journal-title":"Int. J. Secur. Appl."},{"key":"13_CR36","doi-asserted-by":"crossref","unstructured":"Cheng, W., An, G.: Face template protection using chaotic encryption. In: The 5th IET International Conference on Wireless, Mobile and Multimedia Networks, Beijing, China, pp. 4\u201312 (2013)","DOI":"10.1049\/cp.2013.2417"},{"issue":"3","key":"13_CR37","doi-asserted-by":"publisher","first-page":"035227","DOI":"10.1088\/1402-4896\/acbcf8","volume":"98","author":"R Chen","year":"2023","unstructured":"Chen, R., Li, X., Teng, L., et al.: Selective region medical image encryption algorithm based on cascade chaos and two-dimensional joseph traversal. Phys. Scr. 98(3), 035227 (2023)","journal-title":"Phys. Scr."},{"key":"13_CR38","unstructured":"Prakash, S.A., Kumar, A.G., Anandavel, L., et al.: Selective encryption using segmentation mask with chaotic Henon map for multidimensional medical images. arXiv preprint arXiv:2403.04781 (2024)"},{"issue":"2","key":"13_CR39","doi-asserted-by":"publisher","first-page":"2187","DOI":"10.1007\/s40747-023-01258-2","volume":"10","author":"L Zhang","year":"2024","unstructured":"Zhang, L., Song, X., El-Latif, A.A.A., et al.: Reversibly selective encryption for medical images based on coupled chaotic maps and steganography. Complex Intell. Syst. 10(2), 2187\u20132213 (2024)","journal-title":"Complex Intell. Syst."},{"key":"13_CR40","doi-asserted-by":"publisher","first-page":"3908","DOI":"10.1007\/s10773-019-04258-6","volume":"58","author":"S Heidari","year":"2019","unstructured":"Heidari, S., Naseri, M., Nagata, K.: Quantum selective encryption for medical images. Int. J. Theor. Phys. 58, 3908\u20133926 (2019)","journal-title":"Int. J. Theor. Phys."},{"key":"13_CR41","unstructured":"Hu, H.: Research on region of interest extraction for quantum images and quantum 3D models. Beijing University of Technology (2020)"},{"key":"13_CR42","unstructured":"Li, M., Song, X., Zhao Y., Abd El-Latif, A.A.: Space-frequency based multichannel dual encryption for quantum color images using chaotic system and quantum walks. Quantum Inf. Process. (under review)"},{"issue":"08","key":"13_CR43","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(08), 2129\u20132151 (2006)","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"12","key":"13_CR44","doi-asserted-by":"publisher","first-page":"2290","DOI":"10.3390\/sym13122290","volume":"13","author":"J Wang","year":"2021","unstructured":"Wang, J., Song, X., Wang, H., et al.: Applicable image security based on new hyperchaotic system. Symmetry 13(12), 2290 (2021)","journal-title":"Symmetry"}],"container-title":["Lecture Notes in Computer Science","Green, Pervasive, and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-1346-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T06:21:45Z","timestamp":1760941305000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-1346-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,21]]},"ISBN":["9789819513451","9789819513468"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-1346-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,21]]},"assertion":[{"value":"21 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"GPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Green, Pervasive, and Cloud Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gpc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2024.gpc-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}