{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:05:57Z","timestamp":1775469957250,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T00:00:00Z","timestamp":1389657600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1007\/s11128-013-0721-7","type":"journal-article","created":{"date-parts":[[2014,1,13]],"date-time":"2014-01-13T09:02:20Z","timestamp":1389603740000},"page":"1223-1236","source":"Crossref","is-referenced-by-count":144,"title":["The quantum realization of Arnold and Fibonacci image scrambling"],"prefix":"10.1007","volume":"13","author":[{"given":"Nan","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Wen-Ya","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Luo","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,14]]},"reference":[{"issue":"6\/7","key":"721_CR1","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/BF02650179","volume":"21","author":"RP Feynman","year":"1982","unstructured":"Feynman, R.P.: Simulating physics with computers. Int. J. Theor. Phys. 21(6\/7), 467\u2013488 (1982)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"721_CR2","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1103\/PhysRevA.54.147","volume":"54","author":"V Vlatko","year":"1996","unstructured":"Vlatko, V., Adriano, B., Artur, E.: Quantum networks for elementary arithmetic operations. Phys. Rev. A 54(1), 147\u2013153 (1996)","journal-title":"Phys. Rev. A"},{"key":"721_CR3","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielson","year":"2000","unstructured":"Nielson, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"721_CR4","unstructured":"Caraiman, S., Manta, V. Image processing using quantum computing. International conference on 16th System Theory, Control and Computing (ICSTCC), pp. 1\u20136 (2012)"},{"key":"721_CR5","unstructured":"Beach, G., Lomont C., Cohen C. Quantum image processing (QuIP). 32nd Applied Imagery Pattern Recognition, Workshop, pp. 39\u201344 (2003)"},{"key":"721_CR6","doi-asserted-by":"crossref","unstructured":"Venegas-Andraca S.E., Bose, S. Storing, processing and retrieving an image using quantum mechanics. Proceedings of the SPIE conference on Quantum Information and Computation, pp. 137\u2013147 (2003)","DOI":"10.1117\/12.485960"},{"key":"721_CR7","unstructured":"Latorre, J.I. Image compression and entanglement. arXiv:quantph\/0510031 (2005)"},{"issue":"1","key":"721_CR8","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s11128-010-0177-y","volume":"10","author":"PQ Le","year":"2011","unstructured":"Le, P.Q., Dong, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression and processing operations. Quantum. Inf. Process. 10(1), 63\u201384 (2011)","journal-title":"Quantum. Inf. Process."},{"issue":"1","key":"721_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-009-0123-z","volume":"9","author":"SE Venegas-Andraca","year":"2010","unstructured":"Venegas-Andraca, S.E., Ball, J.L.: Processing images in entangled quantum system. J. Quantum. Inf. Process. 9(1), 1\u201311 (2010)","journal-title":"J. Quantum. Inf. Process."},{"key":"721_CR10","doi-asserted-by":"crossref","unstructured":"Fijany, A., Williams, C. Quantum wavelet transform: fast algorithm and complete circuits. arXiv:quant-ph\/9809004 (1998)","DOI":"10.1007\/3-540-49208-9_2"},{"key":"721_CR11","doi-asserted-by":"crossref","unstructured":"Klappenecker, A., Roetteler, M. Discrete cosine transforms on quantum computers. IEEER8-EURASIP Symposium on Image and Signal Processing and Analysis (ISPA01), Pula, Croatia, pp. 464\u2013468 (2001)","DOI":"10.1109\/ISPA.2001.938674"},{"key":"721_CR12","unstructured":"Tseng, C., Hwang, T. Quantum circuit design of $$8\\times 8$$ 8 \u00d7 8 discrete cosine transforms using its fast computation flow graph. IEEE International Symposium on Circuits and Systems. pp. 828\u2013831 (2005)"},{"key":"721_CR13","unstructured":"Lomont, C. Quantum convolution and quantum correlation algorithms are physically impossible. arXiv:quant-ph\/0309070 (2003)"},{"issue":"4","key":"721_CR14","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1007\/s11128-012-0423-6","volume":"12","author":"W Zhang","year":"2013","unstructured":"Zhang, W., Gao, F., Liu, B.: A watermark strategy for quantum images based on quantum fourier transform. Quantum. Inf. Process. 12(4), 793\u2013803 (2013)","journal-title":"Quantum. Inf. Process."},{"key":"721_CR15","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1007\/s10773-012-1354-9","volume":"52","author":"W Zhang","year":"2013","unstructured":"Zhang, W., Gao, F., Liu, B.: A quantum watermark protocol. Int. J. Theory. Phys. 52, 504\u2013513 (2013)","journal-title":"Int. J. Theory. Phys."},{"key":"721_CR16","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.ins.2011.09.028","volume":"186","author":"AM Iliyasu","year":"2012","unstructured":"Iliyasu, A.M., Le, P.Q., Dong, F., Hirota, K.: Watermarking and authentication of quantum images based on restricted geometric transformations. Inf. Sci. 186, 126\u2013149 (2012)","journal-title":"Inf. Sci."},{"key":"721_CR17","first-page":"511","volume":"128","author":"L Honglian","year":"2012","unstructured":"Honglian, L., Jing, F.: Generalization of Arnold transform\u2014FAN transform and its application in image scrambling encryption. Recent. Adv. CSIE, LNEE. 128, 511\u2013516 (2012)","journal-title":"Recent. Adv. CSIE, LNEE."},{"issue":"25","key":"721_CR18","doi-asserted-by":"crossref","first-page":"1583","DOI":"10.1049\/el:20046517","volume":"40","author":"MR Zhang","year":"2004","unstructured":"Zhang, M.R., Shao, G.C., Yi, K.C.: T-matrix and its applications in image processing. Electron. Lett. 40(25), 1583\u20131584 (2004)","journal-title":"Electron. Lett."},{"issue":"11","key":"721_CR19","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1049\/el:20010443","volume":"37","author":"Y-S Sun","year":"2001","unstructured":"Sun, Y.-S., Shyu, H.-C.: Image scrambling through a fractional $$GF(q^{n})$$ G F ( q n ) composite domain. Electron. Lett. 37(11), 685\u2013687 (2001)","journal-title":"Electron. Lett."},{"issue":"1","key":"721_CR20","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/76.486424","volume":"6","author":"KS Joo","year":"1996","unstructured":"Joo, K.S., Bose, T.: Two-dimensional periodically shift variant digital filters. IEEE Trans. Circuits. Syst. Video. Technol. 6(1), 97\u2013107 (1996)","journal-title":"IEEE Trans. Circuits. Syst. Video. Technol."},{"issue":"4","key":"721_CR21","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MMUL.2011.54","volume":"19","author":"ALA Dalhoum","year":"2012","unstructured":"Dalhoum, A.L.A., Mahafzah, B.A., Awwad, A.A.: Digital image scrambling using 2D cellular automata dalhoum. IEEE. MultiMed. 19(4), 28\u201336 (2012)","journal-title":"IEEE. MultiMed."},{"issue":"3","key":"721_CR22","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1109\/TCSVT.2008.918116","volume":"18","author":"S Li","year":"2008","unstructured":"Li, S., Li, C., Lo, K.-T., Chen, G.: Cryptanalysis of an image scrambling scheme without bandwidth expansion. IEEE Trans. Circuits. Syst. Video. Technol. 18(3), 338\u2013349 (2008)","journal-title":"IEEE Trans. Circuits. Syst. Video. Technol."},{"issue":"1","key":"721_CR23","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/BF01199438","volume":"36","author":"G Peano","year":"1890","unstructured":"Peano, G.: Sur une courbe qui remplit toute une aire plane. Math. Ann. 36(1), 157\u2013160 (1890)","journal-title":"Math. Ann."},{"key":"721_CR24","volume-title":"Computational intelligence and security","author":"L Zhang","year":"2005","unstructured":"Zhang, L., et al.: Computational intelligence and security. Springer, Berlin (2005)"},{"key":"721_CR25","doi-asserted-by":"crossref","unstructured":"Zhu L., et al.: A novel algorithm for scrambling digital image based on cat chaotic mapping. International Conference of Intelligent Information Hiding and Multimedia Signal Processing, IEEE CS Press, pp. 601\u2013604 (2006)","DOI":"10.1109\/IIH-MSP.2006.265074"},{"issue":"3","key":"721_CR26","first-page":"113","volume":"40","author":"PQ Le","year":"2010","unstructured":"Le, P.Q., Iliyasu, A.M., Dong, F.Y., Hirota, K.: Fast geometric transformation on quantum images. IAENG Int. J. Appl. Math. 40(3), 113\u2013123 (2010)","journal-title":"IAENG Int. J. Appl. Math."},{"key":"721_CR27","volume-title":"Ergodic problems of classical mechanics","author":"VI Arnold","year":"1968","unstructured":"Arnold, V.I., Avez, A.: Ergodic problems of classical mechanics. Benjamin, New York (1968)"},{"issue":"7","key":"721_CR28","doi-asserted-by":"crossref","first-page":"603","DOI":"10.2307\/2324989","volume":"99","author":"FJ Dyson","year":"1992","unstructured":"Dyson, F.J., Falk, H.: Period of a discrete cat mapping. Am. Math. Mon. 99(7), 603\u2013614 (1992)","journal-title":"Am. Math. Mon."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0721-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-013-0721-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0721-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T11:51:26Z","timestamp":1565092286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-013-0721-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,14]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,5]]}},"alternative-id":["721"],"URL":"https:\/\/doi.org\/10.1007\/s11128-013-0721-7","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1,14]]}}}