{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T22:53:43Z","timestamp":1767480823568,"version":"3.41.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,3,12]],"date-time":"2015-03-12T00:00:00Z","timestamp":1426118400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s11128-015-0964-6","type":"journal-article","created":{"date-parts":[[2015,3,11]],"date-time":"2015-03-11T06:22:57Z","timestamp":1426054977000},"page":"1717-1734","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":99,"title":["Quantum image Gray-code and bit-plane scrambling"],"prefix":"10.1007","volume":"14","author":[{"given":"Ri-Gui","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Ya-Juan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Fan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,12]]},"reference":[{"issue":"1","key":"964_CR1","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s11128-010-0177-y","volume":"10","author":"PQ Le","year":"2011","unstructured":"Le, P.Q., Dong, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Inf. Process. 10(1), 63\u201384 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"964_CR2","doi-asserted-by":"crossref","first-page":"2833","DOI":"10.1007\/s11128-013-0567-z","volume":"12","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., Lu, K., Gao, Y., Wang, M.: NEQR: a novel enhanced quantum representation of digital images. Quantum Inf. Process. 12(8), 2833\u20132860 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"964_CR3","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1007\/s11128-013-0705-7","volume":"13","author":"HS Li","year":"2014","unstructured":"Li, H.S., Zhu, Q., Zhou, R.G., Song, L., Yang, X.J.: Multi-dimensional color image storage and retrieval for a normal arbitrary quantum superposition state. Quantum Inf. Process. 13(4), 991\u20131011 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"964_CR4","doi-asserted-by":"crossref","first-page":"3457","DOI":"10.1103\/PhysRevA.52.3457","volume":"52","author":"A Barenco","year":"1995","unstructured":"Barenco, A., Bennett, C.H., Cleve, R., DiVincenzo, D.P., Margolus, N., Shor, P., Weinfurter, H.: Elementary gates for quantum computation. Phys. Rev. A At. Mol. Opt. Phys. 52(5), 3457 (1995)","journal-title":"Phys. Rev. A At. Mol. Opt. Phys."},{"issue":"6","key":"964_CR5","doi-asserted-by":"crossref","first-page":"698","DOI":"10.20965\/jaciii.2011.p0698","volume":"15","author":"PQ Le","year":"2011","unstructured":"Le, P.Q., Iliyasu, A.M., Dong, F., Hirota, K.: Efficient color transformations on quantum images. JACIII 15(6), 698\u2013706 (2011)","journal-title":"JACIII"},{"issue":"1","key":"964_CR6","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/s11128-012-0385-8","volume":"12","author":"CY Pang","year":"2013","unstructured":"Pang, C.Y., Zhou, R.G., Ding, C.B., Hu, B.Q.: Quantum search algorithm for set operation. Quantum Inf. Process. 12(1), 481\u2013492 (2013)","journal-title":"Quantum Inf. Process."},{"key":"964_CR7","doi-asserted-by":"crossref","unstructured":"Fijany, A., Williams, C.: Quantum wavelet transform: fast algorithm and complete circuits (1998). arXiv:quant-ph\/9809004","DOI":"10.1007\/3-540-49208-9_2"},{"issue":"2","key":"964_CR8","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1007\/s11128-012-0423-6","volume":"12","author":"WW Zhang","year":"2013","unstructured":"Zhang, W.W., Gao, F., Liu, B., Wen, Q.Y., Chen, H.: A watermark strategy for quantum images based on quantum fourier transform. Quantum Inf. Process. 12(2), 793\u2013803 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"964_CR9","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.ins.2011.09.028","volume":"186","author":"AM Iliyasu","year":"2012","unstructured":"Iliyasu, A.M., Le, P.Q., Dong, F., Hirota, K.: Watermarking and authentication of quantum images based on restricted geometric transformations. Inf. Sci. 186(1), 126\u2013149 (2012)","journal-title":"Inf. Sci."},{"issue":"6","key":"964_CR10","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1007\/s10773-012-1274-8","volume":"52","author":"RG Zhou","year":"2013","unstructured":"Zhou, R.G., Wu, Q., Zhang, M.Q., Shen, C.Y.: Quantum image encryption and decryption algorithms based on quantum image geometric transformations. Int. J. Theor. Phys. 52(6), 1802\u20131817 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"5","key":"964_CR11","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.patrec.2009.11.008","volume":"31","author":"G Ye","year":"2010","unstructured":"Ye, G.: Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit. Lett. 31(5), 347\u2013354 (2010)","journal-title":"Pattern Recognit. Lett."},{"key":"964_CR12","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MMUL.2011.54","volume":"4","author":"ALA Dalhoum","year":"2012","unstructured":"Dalhoum, A.L.A., Mahafzah, B.A., Awwad, A.A., Aldhamari, I., Ortega, A., Alfonseca, M.: Digital image scrambling using 2D cellular automata. IEEE Multimed. 4, 28\u201336 (2012)","journal-title":"IEEE Multimed."},{"key":"964_CR13","doi-asserted-by":"crossref","unstructured":"Gunjal, B.L., Manthalkar, R.R.: Discrete wavelet transform based strongly robust watermarking scheme for information hiding in digital images. In: IEEE 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET), pp. 124\u2013129 (2010)","DOI":"10.1109\/ICETET.2010.12"},{"key":"964_CR14","doi-asserted-by":"crossref","unstructured":"Wu, L., Zhang, J., Deng, W., He, D.: Arnold transformation algorithm and anti-Arnold transformation algorithm. In: IEEE 1st International Conference on Information Science and Engineering (ICISE), pp. 1164\u20131167 (2009)","DOI":"10.1109\/ICISE.2009.347"},{"key":"964_CR15","doi-asserted-by":"crossref","unstructured":"Yushen, L., Yanling, H., Chenye, W.: A research on the robust digital watermark of color radar images. In: IEEE International Conference on Information and Automation (ICIA), pp. 1091\u20131096 (2010)","DOI":"10.1109\/ICINFA.2010.5512166"},{"key":"964_CR16","doi-asserted-by":"crossref","unstructured":"Nag, A., Singh, J.P., Khan, S., Biswas, S., Sarkar, D., Sarkar, P.P.: Image encryption using affine transform and XOR operation. In: IEEE International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), pp. 309\u2013312 (2011)","DOI":"10.1109\/ICSCCN.2011.6024565"},{"key":"964_CR17","first-page":"977","volume-title":"CIS 2005, LNCS (LNAI)","author":"L Zhang","year":"2005","unstructured":"Zhang, L., Shiming, J., Xie, Y., Yuan, Q., Wan, Y., Bao, G.: Principle of image encrypting algorithm based on magic cube transformation. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-M., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005, LNCS (LNAI), vol. 3802, pp. 977\u2013982. Springer, Heidelberg (2005)"},{"key":"964_CR18","unstructured":"Abugharsa, A.B., Basari, A.S.B.H., Almangush, H.: A Novel Image Encryption using an Integration Technique of Blocks Rotation based on the Magic cube and the AES Algorithm. arXiv preprint arXiv:1209.4777 (2012)"},{"key":"964_CR19","doi-asserted-by":"crossref","unstructured":"Delei, J., Sen, B., Wenming, D.: An Image Encryption Algorithm Based on Knight\u2019s Tour and Slip Encryption-filter. In: IEEE International Conference on Computer Science and Software Engineering 1, 251\u2013255 (2008)","DOI":"10.1109\/CSSE.2008.1142"},{"key":"964_CR20","doi-asserted-by":"crossref","unstructured":"Zou, J., Ward, R.K., Qi, D.: The generalized Fibonacci transformations and application to image scrambling. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, pp. iii-385 (2004)","DOI":"10.1109\/ICASSP.2004.1326562"},{"issue":"5","key":"964_CR21","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1016\/j.optcom.2011.11.044","volume":"285","author":"Y Zhou","year":"2012","unstructured":"Zhou, Y., Panetta, K., Agaian, S., Chen, C.P.: Image encryption using P-Fibonacci transform and decomposition. Optics Commun. 285(5), 594\u2013608 (2012)","journal-title":"Optics Commun."},{"issue":"5","key":"964_CR22","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1007\/s11128-013-0721-7","volume":"13","author":"N Jiang","year":"2014","unstructured":"Jiang, N., Wu, W.Y., Wang, L.: The quantum realization of Arnold and Fibonacci image scrambling. Quantum Inf. Process. 13(5), 1223\u20131236 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"964_CR23","doi-asserted-by":"crossref","first-page":"2463","DOI":"10.1007\/s10773-014-2046-4","volume":"53","author":"N Jiang","year":"2014","unstructured":"Jiang, N., Wang, L., Wu, W.Y.: Quantum Hilbert image scrambling. Int. J. Theor. Phys. 53(7), 2463\u20132484 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"4","key":"964_CR24","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1093\/ietisy\/e91-d.4.1110","volume":"91","author":"CHEN Chang-Chu","year":"2008","unstructured":"Chang-Chu, C.H.E.N., Chang, C.C.: LSB-based steganography using reflected gray code. IEICE Trans. Inf. Syst. 91(4), 1110\u20131116 (2008)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"2","key":"964_CR25","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TSMCB.2012.2210706","volume":"43","author":"Y Zhou","year":"2013","unstructured":"Zhou, Y., Panetta, K., Agaian, S., Chen, C.: (n, k, p)-Gray code for image systems. IEEE Trans. Cybern. 43(2), 515\u2013529 (2013)","journal-title":"IEEE Trans. Cybern."},{"issue":"8","key":"964_CR26","doi-asserted-by":"crossref","first-page":"3303","DOI":"10.1016\/j.cnsns.2011.12.015","volume":"17","author":"L Zhao","year":"2012","unstructured":"Zhao, L., Adhikari, A., Xiao, D., Sakurai, K.: On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption. Commun. Nonlinear Sci. Numer. Simul. 17(8), 3303\u20133327 (2012)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"1","key":"964_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-009-0123-z","volume":"9","author":"SE Venegas-Andraca","year":"2010","unstructured":"Venegas-Andraca, S.E., Ball, J.L.: Processing images in entangled quantum systems. Quantum Inf. Process. 9(1), 1\u201311 (2010)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"964_CR28","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1007\/s10773-011-0950-4","volume":"51","author":"R Zhou","year":"2012","unstructured":"Zhou, R., Wang, H., Wu, Q., Shi, Y.: Quantum associative neural network with nonlinear search algorithm. Int. J. Theor. Phys. 51(3), 705\u2013723 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"964_CR29","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/s10773-009-0183-y","volume":"49","author":"R Zhou","year":"2010","unstructured":"Zhou, R.: Quantum competitive neural network. Int. J. Theor. Phys. 49(1), 110\u2013119 (2010)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"964_CR30","first-page":"363","volume":"17","author":"JC Zou","year":"2002","unstructured":"Zou, J.C., Li, G.F., Qi, D.X.: Generalized Gray code and its application in the scrambling technology of digital images. Appl. Math. A J. Chin. Univ. 17(3), 363\u2013370 (2002). (in Chinese)","journal-title":"Appl. Math. A J. Chin. Univ."},{"issue":"10","key":"964_CR31","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","volume":"65","author":"S Rawat","year":"2011","unstructured":"Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int. J. Electron. Commun. 65(10), 840\u2013847 (2011)","journal-title":"AEU Int. J. Electron. Commun."},{"issue":"8","key":"964_CR32","doi-asserted-by":"crossref","first-page":"3303","DOI":"10.1016\/j.cnsns.2011.12.015","volume":"17","author":"L Zhao","year":"2012","unstructured":"Zhao, L., Adhikari, A., Xiao, D., Sakurai, K.: On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption. Commun. Nonlinear Sci. Numer. Simul. 17(8), 3303\u20133327 (2012)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-0964-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-0964-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-0964-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T21:12:30Z","timestamp":1747775550000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-0964-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,12]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["964"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-0964-6","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2015,3,12]]}}}