{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T12:55:25Z","timestamp":1769345725179,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2014,6,17]],"date-time":"2014-06-17T00:00:00Z","timestamp":1402963200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11128-014-0768-0","type":"journal-article","created":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T08:40:25Z","timestamp":1403167225000},"page":"1765-1787","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":80,"title":["Quantum image encryption based on restricted geometric and color transformations"],"prefix":"10.1007","volume":"13","author":[{"given":"Xian-Hua","family":"Song","sequence":"first","affiliation":[]},{"given":"Shen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ahmed A.","family":"Abd El-Latif","sequence":"additional","affiliation":[]},{"given":"Xia-Mu","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,17]]},"reference":[{"key":"768_CR1","doi-asserted-by":"crossref","unstructured":"Deutsch, D.: Quantum theory, the Church-Turing principle and the universal quantum computer, Proc. R. Soc. London A400, 97\u2013117 (1985)","DOI":"10.1098\/rspa.1985.0070"},{"issue":"10","key":"768_CR2","first-page":"698","volume":"15","author":"PQ Le","year":"2011","unstructured":"Le, P.Q., Iliyasu, A.M., Dong, F., Hirota, K.: Efficient color transformations on quantum images. J. Adv. Comput. Intell. Intell. Inform. 15(10), 698\u2013706 (2011)","journal-title":"J. Adv. Comput. Intell. Intell. Inform."},{"key":"768_CR3","doi-asserted-by":"crossref","first-page":"3457","DOI":"10.1103\/PhysRevA.52.3457","volume":"52","author":"A Barenco","year":"1995","unstructured":"Barenco, A., Bennett, C.H., Cleve, R., DiVincenzo, D.P., Margolus, N., Shor, P.W., Sleator, T., Smolin, J.A., Weinfurter, H.: Elementary gates for quantum computation. Phys. Rev. Part A 52, 3457 (1995)","journal-title":"Phys. Rev. Part A"},{"key":"768_CR4","doi-asserted-by":"crossref","first-page":"040501","DOI":"10.1103\/PhysRevLett.102.040501","volume":"102","author":"T Monz","year":"2009","unstructured":"Monz, T., Kim, K., Hansel, W., Riebe, M., Villar, A.S., Schindler, P., Chwalla, M., Hennrich, M., Blatt, R.: Realization of the quantum Toffoli gate with trapped ions. Phys. Rev. Let. 102, 040501 (2009)","journal-title":"Phys. Rev. Let."},{"key":"768_CR5","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"768_CR6","unstructured":"Venegas-Andraca, S.E., Bose, S.: Quantum computation and image processing: new trends in artifficial intelligence. Proceedings of the International Conference on Artifficial Intelligence IJCAI-03, pp. 1563\u20131564 (2003)"},{"key":"768_CR7","doi-asserted-by":"crossref","unstructured":"Venegas-Andraca, S.E., Bose, S.: Storing, processing and retrieving an image using quantum mechanics. Proceedings of SPIE Conference Quantum Information and Computation, 5105, pp. 137\u2013147 (2003)","DOI":"10.1117\/12.485960"},{"issue":"6","key":"768_CR8","doi-asserted-by":"crossref","first-page":"1117","DOI":"10.1017\/S0960129510000411","volume":"20","author":"M Lanzagorta","year":"2010","unstructured":"Lanzagorta, M., Uhlmann, J.: Quantum algorithmic methods for computational geometry. Math. Struct. Comput. Sci. 20(6), 1117\u20131125 (2010)","journal-title":"Math. Struct. Comput. Sci."},{"key":"768_CR9","doi-asserted-by":"crossref","first-page":"067901","DOI":"10.1103\/PhysRevLett.87.067901","volume":"87","author":"C Trugenberger","year":"2001","unstructured":"Trugenberger, C.: Probabilistic quantum memories. Phys. Rev. Lett. 87, 067901 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"768_CR10","doi-asserted-by":"crossref","first-page":"277903","DOI":"10.1103\/PhysRevLett.89.277903","volume":"89","author":"C Trugenberger","year":"2002","unstructured":"Trugenberger, C.: Phase transitions in quantum pattern recognition. Phys. Rev. Lett. 89, 277903 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"768_CR11","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1023\/A:1024022632303","volume":"1","author":"C Trugenberger","year":"2002","unstructured":"Trugenberger, C.: Quantum pattern recognition. Quantum Inf. Process. 1(6), 471\u2013493 (2002)","journal-title":"Quantum Inf. Process."},{"key":"768_CR12","doi-asserted-by":"crossref","first-page":"5326","DOI":"10.1016\/j.physa.2008.04.036","volume":"387","author":"G Abal","year":"2008","unstructured":"Abal, G., Donangelo, R., Fort, H.: Conditional strategies in iterated quantum games. Physica A 387, 5326\u20135332 (2008)","journal-title":"Physica A"},{"key":"768_CR13","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. Proceedings of 35th Annual Symposium Foundations of 751 Computer Science, IEEE Computer Society. Press, Los Almitos, CA, 124 C134 (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"768_CR14","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1016\/j.physa.2006.09.022","volume":"375","author":"N Zhou","year":"2007","unstructured":"Zhou, N., Ye, Liu: Novel qubit block encryption algorithm with hybrid keys. Physica A 375, 693\u2013698 (2007)","journal-title":"Physica A"},{"key":"768_CR15","doi-asserted-by":"crossref","unstructured":"Yang Y.G., Xia J., Jia X., Zhang, H.: Novel image encryption\/decryption based on quantum fourier transform and double phase encoding. Quantum Inf. Process., pp. 1\u201317 (2013)","DOI":"10.1007\/s11128-013-0612-y"},{"issue":"1","key":"768_CR16","first-page":"63","volume":"10","author":"PQ Le","year":"2010","unstructured":"Le, P.Q., Dong, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression and processing operations. Quantum Inf. Process. 10(1), 63\u201384 (2010)","journal-title":"Quantum Inf. Process."},{"key":"768_CR17","unstructured":"Latorre, J.I.: Image compression and entanglement. arXiv:quant-ph\/0510031 (2005)"},{"key":"768_CR18","doi-asserted-by":"crossref","unstructured":"Sun B., Le P.Q., Iliyasu A.M., Adrian Garcia J., Yan F., Dong J., F., Hirota, K.: A multi-channel representation for images on quantum computers using the RGB $$\\alpha $$ \u03b1 color space. Proceedings of the IEEE 7th International Symposium on Intelligent Signal Processing, pp. 160\u2013165 (2011)","DOI":"10.1109\/WISP.2011.6051718"},{"key":"768_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lu, K., Gao, Y.H., Wang, M.: NEQR: a novel enhanced quantum representation of digital images. Quantum Inf. Process. 12(8), 2833\u20132860 (2013)","DOI":"10.1007\/s11128-013-0567-z"},{"key":"768_CR20","doi-asserted-by":"crossref","unstructured":"Simona C., Vasile, M.: Image representation and processing using ternary. Quantum Computing. Adaptive and Natural Computing Algorithms, pp. 366\u2013375 (2013)","DOI":"10.1007\/978-3-642-37213-1_38"},{"key":"768_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lu, K., Gao, Y.H., Xu, K.: A novel quantum representation for log-polar images. Quantum Inf. Process. 12(9), 3103\u20133126 (2013)","DOI":"10.1007\/s11128-013-0587-8"},{"key":"768_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, R.G., Wu, Q., Zhang, M.Q., Shen, C.Y.: Quantum image encryption and decryption algorithm based on quantum image geometric transformations. Int. J. Theor. Phys. 52(6), 1802\u20131817 (2013)","DOI":"10.1007\/s10773-012-1274-8"},{"key":"768_CR23","doi-asserted-by":"crossref","unstructured":"Abd El-Latif, A., Li, L., Zhang, T., Wang, N., Song, X., Niu, X.M.: Digital image encryption based on multiple chaotic systems. Sens. Imaging Int. J. 13(2), 67\u201388 (2012)","DOI":"10.1007\/s11220-012-0071-z"},{"key":"768_CR24","doi-asserted-by":"crossref","unstructured":"Abd El-Latif A.A., Li, L., Wang, N., Han, Q., Niu, X.M.: A New approach to chaotic image encryption based on quantum chaotic systems, exploiting color spaces. Signal Process. 93(11), 2986\u20133000 (2013)","DOI":"10.1016\/j.sigpro.2013.03.031"},{"key":"768_CR25","doi-asserted-by":"crossref","unstructured":"Le, P.Q., Iliyasu, A.M., Dong, F., Hirota, K.: Strategies for designing geometric transformations on quantum images. Theor. Comput. Sci. 412, 1406\u20131418 (2011)","DOI":"10.1016\/j.tcs.2010.11.029"},{"issue":"3","key":"768_CR26","first-page":"113","volume":"40","author":"PQ Le","year":"2010","unstructured":"Le, P.Q., Iliyasu, A.M., Dong, F., Hirota, K.: Fast geometric transformations on quantum images. IAENG Int. J. Appl. Math. 40(3), 113\u2013123 (2010)","journal-title":"IAENG Int. J. Appl. Math."},{"key":"768_CR27","doi-asserted-by":"crossref","first-page":"4241","DOI":"10.1016\/j.optcom.2012.06.041","volume":"285","author":"AA Abd EI-Latif","year":"2012","unstructured":"Abd EI-Latif, A.A., Niu, X.M., Amin, M.: A new image cipher in time and frequency domains. Opt. Commun. 285, 4241\u20134251 (2012)","journal-title":"Opt. Commun."},{"key":"768_CR28","volume-title":"Framework for the Analysis and Design of Encryption Strategies Based on Discrete-Time Chaotic Dynamical Systems","author":"D Arroyo","year":"2009","unstructured":"Arroyo, D.: Framework for the Analysis and Design of Encryption Strategies Based on Discrete-Time Chaotic Dynamical Systems. Universidad Politecnica de Madrid, Madrid (2009)"},{"key":"768_CR29","volume-title":"An Introduction to Chaotic Dynamical Systems","author":"RL Devaney","year":"2003","unstructured":"Devaney, R.L.: An Introduction to Chaotic Dynamical Systems. Westview Press, Boulder (2003)"},{"key":"768_CR30","doi-asserted-by":"crossref","unstructured":"Kocarev, L., Galias, Z., Lian, S.: Intelligent Computing Based on Chaos. Springer, New York, Vol. 184 (2009)","DOI":"10.1007\/978-3-540-95972-4"},{"issue":"2","key":"768_CR31","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 35(2), 408\u2013419 (2008)","journal-title":"Chaos Solitons Fractals"},{"key":"768_CR32","doi-asserted-by":"crossref","unstructured":"Song, X.H., Niu, X.M.: Comment on: Novel image encryption\/decryption based on quantum fourier transform and double phase encoding. Quantum Inf. Process (2014). doi: 10.1007\/s11128-014-0738-6","DOI":"10.1007\/s11128-014-0738-6"},{"key":"768_CR33","doi-asserted-by":"crossref","unstructured":"Yan, F., Le, P.Q., Iliyasu, A.M., Sun, B., Garcia, J.A., Dong, F.Y., Hirota, K.: Assessing the similarity of quantum images based on probability measurements. IEEE World Congress on Computational Intelligence, Brisbane, 10\u201315 June, pp. 1\u20136 (2012)","DOI":"10.1109\/CEC.2012.6256418"},{"key":"768_CR34","unstructured":"The USC-SIPI Image Database. http:\/\/sipi.usc.edu\/database\/database.php"},{"key":"768_CR35","unstructured":"Elashry, I.E.: Digital image encryption, MS Thesis, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University (2010)"},{"key":"768_CR36","doi-asserted-by":"crossref","unstructured":"Gray, R.: Entropy and Information Theory. Springer, New York (2010)","DOI":"10.1007\/978-1-4419-7970-4"},{"key":"768_CR37","unstructured":"Ahmad, J., Ahmed, F.: Efficiency analysis and security evaluation of image encryption schemes. Int. J. Video, Image Process. Network Sec. 12(4), 18\u201331 (2012)"},{"key":"768_CR38","unstructured":"Ahmed, H., Kalash, H., Allah, O.: Implementation of rc5 block cipher algorithm for image cryptosystems. Int. J. Inf. Technol. 3(4) (2007)"},{"issue":"2","key":"768_CR39","first-page":"221","volume":"6","author":"R Enayatifar","year":"2011","unstructured":"Enayatifar, R.: Image encryption via logistic map function and heap tree. Int. J. Phys. Sci. 6(2), 221 (2011)","journal-title":"Int. J. Phys. Sci."},{"key":"768_CR40","doi-asserted-by":"crossref","first-page":"033002","DOI":"10.1117\/1.3167847","volume":"18","author":"I Elashry","year":"2009","unstructured":"Elashry, I., Allah, O., Abbas, A., El-Rabaie, S., El-Samie, F.: Homomorphic image encryption. J. Electron. Imaging 18, 033002 (2009)","journal-title":"J. Electron. Imaging"},{"key":"768_CR41","unstructured":"Fan, H., Wang, Y.N., Jing, L., Yue, J.D., Shi, H.D., Zhang, Y.L., Mu, L.Z.: Quantum cloning machines and the applications, arXiv preprint arXiv:1301.2956 (2013)"},{"key":"768_CR42","volume-title":"Applied Cryptography Second Edition: Protocols, Algorithms, and Source Code in C [M]","author":"B Scheneie","year":"1996","unstructured":"Scheneie, B.: Applied Cryptography Second Edition: Protocols, Algorithms, and Source Code in C [M], 2nd edn. Wiley, New York (1996)","edition":"2"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0768-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-014-0768-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0768-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T11:36:01Z","timestamp":1746272161000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-014-0768-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,17]]},"references-count":42,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["768"],"URL":"https:\/\/doi.org\/10.1007\/s11128-014-0768-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,17]]}}}