{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T17:00:00Z","timestamp":1764349200506},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09973-5","type":"journal-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T10:02:32Z","timestamp":1604052152000},"page":"7911-7937","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An improved bit plane image encryption technique using RC4 and quantum chaotic demeanour"],"prefix":"10.1007","volume":"80","author":[{"given":"Anjali","family":"Malik","sequence":"first","affiliation":[]},{"given":"Sangeeta","family":"Dhall","sequence":"additional","affiliation":[]},{"given":"Shailender","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,30]]},"reference":[{"issue":"11","key":"9973_CR1","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1016\/j.sigpro.2013.03.031","volume":"93","author":"AA Abd El-Latif","year":"2013","unstructured":"Abd El-Latif AA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93(11):2986\u20133000","journal-title":"Signal Process"},{"issue":"4","key":"9973_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3009965","volume":"49","author":"N Abura\u2019ed","year":"2017","unstructured":"Abura\u2019ed N, Khan FS, Bhaskar H (2017) Advances in the quantum theoretical approach to image processing applications. ACM Comput Surv (CSUR) 49(4):1\u201349","journal-title":"ACM Comput Surv (CSUR)"},{"key":"9973_CR3","unstructured":"Ahmed HEDH, Kalash HM and Allah OF, (2007). Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. In 2007 International Conference on Electrical Engineering (pp. 1-7). IEEE"},{"issue":"12","key":"9973_CR4","doi-asserted-by":"publisher","first-page":"4653","DOI":"10.1016\/j.cnsns.2012.05.033","volume":"17","author":"A Akhshani","year":"2012","unstructured":"Akhshani A, Akhavan A, Lim SC, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653\u20134661","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"9973_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.cnsns.2013.06.017","volume":"19","author":"A Akhshani","year":"2014","unstructured":"Akhshani A, Akhavan A, Mobaraki A, Lim SC, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simul 19(1):101\u2013111","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"9973_CR6","volume-title":"An introduction to multivariate statistical analysis","author":"TW Anderson","year":"1958","unstructured":"Anderson TW (1958) An introduction to multivariate statistical analysis. Wiley, New York"},{"key":"9973_CR7","first-page":"100","volume":"2","author":"K Anuradha","year":"2015","unstructured":"Anuradha K, Naik PPS (2015) Medical image cryptanalysis using histogram matching bitplane and adjoin mapping algorithms. Int J Mag Eng Technol Manag Res 2:100\u2013105","journal-title":"Int J Mag Eng Technol Manag Res"},{"issue":"15","key":"9973_CR8","doi-asserted-by":"publisher","first-page":"16529","DOI":"10.1007\/s11042-016-3926-9","volume":"76","author":"R Bansal","year":"2017","unstructured":"Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigen\u00e8re scheme. Multimed Tools Appl 76(15):16529\u201316562","journal-title":"Multimed Tools Appl"},{"key":"9973_CR9","doi-asserted-by":"crossref","unstructured":"Barker E and Mouha N, (2017). Recommendation for the triple data encryption algorithm (TDEA) block cipher (no. NIST special publication (SP) 800-67 rev. 2 (draft)). National Institute of Standards and Technology","DOI":"10.6028\/NIST.SP.800-67r2"},{"issue":"7","key":"9973_CR10","first-page":"116","volume":"2","author":"S Basu","year":"2011","unstructured":"Basu S (2011) International data encryption algorithm (Idea)\u2013a typical illustration. J Glob Res Comput Sci 2(7):116\u2013118","journal-title":"J Glob Res Comput Sci"},{"issue":"3","key":"9973_CR11","doi-asserted-by":"publisher","first-page":"1987","DOI":"10.1007\/s11042-019-08223-7","volume":"79","author":"S Dhall","year":"2020","unstructured":"Dhall S, Sharma R, Gupta S (2020) A multi-level steganography mechanism using quantum chaos encryption. Multimed Tools Appl 79(3):1987\u20132012","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"9973_CR12","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.image.2011.11.003","volume":"27","author":"M Fran\u00e7ois","year":"2012","unstructured":"Fran\u00e7ois M, Grosges T, Barchiesi D, Erra R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27(3):249\u2013259","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"9973_CR13","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s13319-015-0062-7","volume":"6","author":"G Hanchinamani","year":"2015","unstructured":"Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Res 6(3):30","journal-title":"3D Res"},{"issue":"3","key":"9973_CR14","first-page":"347","volume":"19","author":"C Jin","year":"2017","unstructured":"Jin C, Liu H (2017) A color image encryption scheme based on Arnold scrambling and quantum chaotic. IJ Netw Secur 19(3):347\u2013357","journal-title":"IJ Netw Secur"},{"issue":"7","key":"9973_CR15","first-page":"23","volume":"11","author":"S Kaur","year":"2017","unstructured":"Kaur S, Jindal H (2017) Enhanced image watermarking technique using wavelets and interpolation. Int J Image Graph Sig Process 11(7):23","journal-title":"Int J Image Graph Sig Process"},{"key":"9973_CR16","unstructured":"Kester QA, (2013). A hybrid cryptosystem based on Vigenere cipher and columnar transposition cipher. arXiv preprint arXiv:1307.7786"},{"issue":"1","key":"9973_CR17","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/s13319-018-0162-2","volume":"9","author":"M Kumari","year":"2018","unstructured":"Kumari M, Gupta S (2018) A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res 9(1):10","journal-title":"3D Res"},{"issue":"9","key":"9973_CR18","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.1016\/j.imavis.2008.12.008","volume":"27","author":"C Li","year":"2009","unstructured":"Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27(9):1371\u20131381","journal-title":"Image Vis Comput"},{"issue":"1","key":"9973_CR19","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/s10773-017-3561-x","volume":"57","author":"P Li","year":"2018","unstructured":"Li P, Xiao H (2018) An improved filtering method for quantum color image in frequency domain. Int J Theor Phys 57(1):258\u2013278","journal-title":"Int J Theor Phys"},{"issue":"20","key":"9973_CR20","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739\u201320753","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"9973_CR21","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2019","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Video Technol 30(3):685\u2013696","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"10","key":"9973_CR22","doi-asserted-by":"publisher","first-page":"100301","DOI":"10.1007\/s11433-015-5714-3","volume":"58","author":"B Liu","year":"2015","unstructured":"Liu B, Gao F, Huang W, Wen Q (2015) QKD-based quantum private query without a failure probability. Sci China Phys Mech Astron 58(10):100301","journal-title":"Sci China Phys Mech Astron"},{"issue":"1","key":"9973_CR23","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s13319-016-0114-7","volume":"8","author":"H Liu","year":"2017","unstructured":"Liu H, Jin C (2017) A novel color image encryption algorithm based on quantum chaos sequence. 3D Res 8(1):4","journal-title":"3D Res"},{"key":"9973_CR24","doi-asserted-by":"publisher","first-page":"6937","DOI":"10.1109\/ACCESS.2018.2889896","volume":"7","author":"X Liu","year":"2018","unstructured":"Liu X, Xiao D, Xiang Y (2018) Quantum image encryption using intra and inter bit permutation based on logistic map. IEEE Access 7:6937\u20136946","journal-title":"IEEE Access"},{"key":"9973_CR25","first-page":"102","volume":"1","author":"S Mandal","year":"2014","unstructured":"Mandal S, Das S, Nath A (2014) Data hiding and retrieval using visual cryptography. Int J Innov Res Adv Eng 1:102\u2013110","journal-title":"Int J Innov Res Adv Eng"},{"issue":"8","key":"9973_CR26","first-page":"17","volume":"9","author":"K Mander","year":"2017","unstructured":"Mander K, Jindal H (2017) An improved image compression-decompression technique using block truncation and wavelets. Int J Image Graph Sig Process 9(8):17","journal-title":"Int J Image Graph Sig Process"},{"key":"9973_CR27","doi-asserted-by":"crossref","unstructured":"Matsui M, (1994). The first experimental cryptanalysis of the data encryption standard. In Annual International Cryptology Conference (pp. 1-11). Springer, Berlin, Heidelberg","DOI":"10.1007\/3-540-48658-5_1"},{"issue":"1","key":"9973_CR28","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the derivation of a \u201cchaotic\u201d encryption algorithm. Cryptologia 13(1):29\u201342","journal-title":"Cryptologia"},{"issue":"5","key":"9973_CR29","first-page":"28","volume":"9","author":"A Mittal","year":"2017","unstructured":"Mittal A, Jindal H (2017) Novelty in image reconstruction using DWT and CLAHE. Int J Image Graph Sig Process 9(5):28","journal-title":"Int J Image Graph Sig Process"},{"issue":"2","key":"9973_CR30","first-page":"44","volume":"3","author":"A Mousa","year":"2006","unstructured":"Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. IJCSA 3(2):44\u201356","journal-title":"IJCSA"},{"issue":"9","key":"9973_CR31","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926\u2013934","journal-title":"Image Vis Comput"},{"key":"9973_CR32","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.optcom.2015.03.016","volume":"348","author":"Q Ran","year":"2015","unstructured":"Ran Q, Yuan L, Zhao T (2015) Image encryption based on nonseparable fractional Fourier transform and chaotic map. Opt Commun 348:43\u201349","journal-title":"Opt Commun"},{"issue":"19","key":"9973_CR33","first-page":"12","volume":"50","author":"R Rayarikar","year":"2012","unstructured":"Rayarikar R, Upadhyay S, Pimpale P (2012) SMS encryption using AES algorithm on android. Int J Comput Appl 50(19):12\u201317","journal-title":"Int J Comput Appl"},{"key":"9973_CR34","volume-title":"The RC5 encryption algorithm. In International Workshop on Fast Software Encryption (pp. 86-96)","author":"RL Rivest","year":"1994","unstructured":"Rivest RL (1994) The RC5 encryption algorithm. In International Workshop on Fast Software Encryption (pp. 86-96). Springer, Berlin, Heidelberg"},{"issue":"2","key":"9973_CR35","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s11042-010-0652-6","volume":"56","author":"IS Sam","year":"2012","unstructured":"Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56(2):315\u2013330","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"9973_CR36","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1007\/s11071-012-0402-6","volume":"69","author":"IS Sam","year":"2012","unstructured":"Sam IS, Devaraj P, Bhuvaneswaran RS (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn 69(4):1995\u20132007","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"9973_CR37","first-page":"38","volume":"19","author":"B Schneier","year":"1994","unstructured":"Schneier B (1994) The blowfish encryption algorithm. Dr Dobb\u2019s Journal-Software Tools for the Professional Programmer 19(4):38\u201343","journal-title":"Dr Dobb\u2019s Journal-Software Tools for the Professional Programmer"},{"issue":"1","key":"9973_CR38","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TC.2017.2721404","volume":"67","author":"CY Wei","year":"2017","unstructured":"Wei CY, Cai XQ, Liu B, Wang TY, Gao F (2017) A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans Comput 67(1):2\u20138","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"9973_CR39","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J 1(2):31\u201338","journal-title":"Cyber J"},{"issue":"03","key":"9973_CR40","doi-asserted-by":"publisher","first-page":"1730001","DOI":"10.1142\/S0219749917300017","volume":"15","author":"F Yan","year":"2017","unstructured":"Yan F, Iliyasu AM, Le PQ (2017) Quantum image processing: a review of advances in its security technologies. Int J Quantum Inf 15(03):1730001","journal-title":"Int J Quantum Inf"},{"issue":"01","key":"9973_CR41","doi-asserted-by":"publisher","first-page":"1850010","DOI":"10.1142\/S0218127418500104","volume":"28","author":"G Ye","year":"2018","unstructured":"Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurcation Chaos 28(01):1850010","journal-title":"Int J Bifurcation Chaos"},{"issue":"6","key":"9973_CR42","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s11128-018-1902-1","volume":"17","author":"N Zhou","year":"2018","unstructured":"Zhou N, Chen W, Yan X, Wang Y (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quantum Inf Process 17(6):137","journal-title":"Quantum Inf Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09973-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-09973-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09973-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T23:49:49Z","timestamp":1614210589000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-09973-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9973"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09973-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"15 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Author Anjali Malik declares that she has no conflict of interest. Author Sangeeta Dhall declares that he has no conflict of interest. Author Shailender Gupta declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}