{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T17:01:55Z","timestamp":1769014915533,"version":"3.49.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T00:00:00Z","timestamp":1740528000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T00:00:00Z","timestamp":1740528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Mach. Intell."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s42484-025-00246-8","type":"journal-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T12:57:05Z","timestamp":1740574625000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Quantum image cryptography based on discrete chaotic maps"],"prefix":"10.1007","volume":"7","author":[{"given":"Shilpa M.","family":"Satre","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bharti","family":"Joshi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,2,26]]},"reference":[{"issue":"1","key":"246_CR1","doi-asserted-by":"publisher","first-page":"1930","DOI":"10.1038\/s41598-020-58636-w","volume":"10","author":"AA Abd-El-Latif","year":"2020","unstructured":"Abd-El-Latif AA, Abd-El-Atty B, Amin M, Iliyasu AM (2020) Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci Rep 10(1):1930","journal-title":"Sci Rep"},{"issue":"8","key":"246_CR2","doi-asserted-by":"publisher","first-page":"10530","DOI":"10.1109\/TII.2024.3395631","volume":"20","author":"M Alawida","year":"2024","unstructured":"Alawida M (2024) A novel image encryption algorithm based on cyclic chaotic map in industrial iot environments. IEEE Trans Ind Inf 20(8):10530\u201310541","journal-title":"IEEE Trans Ind Inf"},{"issue":"1","key":"246_CR3","doi-asserted-by":"publisher","first-page":"38","DOI":"10.3390\/drones7010038","volume":"7","author":"M Alawida","year":"2023","unstructured":"Alawida M, Teh JS, Alshoura WH (2023) A new image encryption algorithm based on DNA state machine for UAV data encryption. Drones 7(1):38","journal-title":"Drones"},{"key":"246_CR4","doi-asserted-by":"publisher","first-page":"27569","DOI":"10.1007\/s11042-019-07852-2","volume":"78","author":"S Anwar","year":"2019","unstructured":"Anwar S, Meghana S (2019) A pixel permutation based image encryption technique using chaotic map. Multimedia Tools Appl 78:27569\u201327590","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"246_CR5","doi-asserted-by":"publisher","first-page":"161","DOI":"10.3390\/sym13020161","volume":"13","author":"S Askar","year":"2021","unstructured":"Askar S, Al-Khedhairi A, Elsonbaty A, Elsadany A (2021) Chaotic discrete fractional-order food chain model and hybrid image encryption scheme application. Symmetry 13(2):161","journal-title":"Symmetry"},{"issue":"2","key":"246_CR6","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1007\/s11042-020-09775-9","volume":"80","author":"M Benssalah","year":"2021","unstructured":"Benssalah M, Rhaskali Y, Drouiche K (2021) An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimedia Tools Appl 80(2):2081\u20132107","journal-title":"Multimedia Tools Appl"},{"issue":"39\u201340","key":"246_CR7","doi-asserted-by":"publisher","first-page":"29243","DOI":"10.1007\/s11042-020-09542-w","volume":"79","author":"G Cheng","year":"2020","unstructured":"Cheng G, Wang C, Xu C (2020) A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing. Multimedia Tools Appl 79(39\u201340):29243\u201329263","journal-title":"Multimedia Tools Appl"},{"key":"246_CR8","doi-asserted-by":"publisher","first-page":"1126450","DOI":"10.3389\/fmech.2022.1126450","volume":"8","author":"M Dehghani","year":"2023","unstructured":"Dehghani M, Trojovsk\u00fd P (2023) Osprey optimization algorithm: a new bio-inspired metaheuristic algorithm for solving engineering optimization problems. Front Mech Eng 8:1126450","journal-title":"Front Mech Eng"},{"key":"246_CR9","first-page":"1","volume":"2021","author":"Y Dong","year":"2021","unstructured":"Dong Y, Huang X, Mei Q, Gan Y (2021) Self-adaptive image encryption algorithm based on quantum logistic map. Secur Commun Netw 2021:1\u20132","journal-title":"Secur Commun Netw"},{"issue":"1","key":"246_CR10","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s11633-019-1173-z","volume":"17","author":"B Ge","year":"2020","unstructured":"Ge B, Luo HB (2020) Image encryption application of chaotic sequences incorporating quantum keys. Int J Autom Comput 17(1):123\u2013138","journal-title":"Int J Autom Comput"},{"issue":"17","key":"246_CR11","doi-asserted-by":"publisher","first-page":"2050145","DOI":"10.1142\/S021773232050145X","volume":"35","author":"C Hou","year":"2020","unstructured":"Hou C, Liu X, Feng S (2020) Quantum image scrambling algorithm based on discrete Baker map. Mod Phys Lett A 35(17):2050145","journal-title":"Mod Phys Lett A"},{"key":"246_CR12","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s10773-018-3989-7","volume":"58","author":"N Jiang","year":"2019","unstructured":"Jiang N, Dong X, Hu H, Ji Z, Zhang W (2019) Quantum image encryption based on Henon mapping. Int J Theor Phys 58:979\u2013991","journal-title":"Int J Theor Phys"},{"key":"246_CR13","unstructured":"Dataset1:ABDULRAHMANMUKHLEF(2023), Kaggle: [https:\/\/www.kaggle.com\/datasets\/abdulrahmanmukhlef\/casia2]. Accessed on 16\u201311\u20132023"},{"key":"246_CR14","doi-asserted-by":"publisher","unstructured":"Karthick S, Perumal Sankar S, Raja Prathab\u00a0T (2018) An approach for image encryption\/ decryption based on quaternion fourier\u00a0transform. In: Proceedings of 2018\u00a0international conference on emerging\u00a0trends and innovations in engineering and\u00a0technological research (ICETIETR),\u00a0Ernakulam, India.\u00a0https:\/\/doi.org\/10.1109\/ICETIETR.2018.8529014","DOI":"10.1109\/ICETIETR.2018.8529014"},{"key":"246_CR15","doi-asserted-by":"publisher","first-page":"26203","DOI":"10.1007\/s11042-019-07818-4","volume":"78","author":"M Khan","year":"2019","unstructured":"Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools Appl 78:26203\u201326222","journal-title":"Multimedia Tools Appl"},{"key":"246_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02952-7","volume":"20","author":"X Liu","year":"2021","unstructured":"Liu X, Xiao D, Liu C (2021) Three-level quantum image encryption based on Arnold transform and logistic map. Quantum Inf Process 20:1\u201322","journal-title":"Quantum Inf Process"},{"issue":"1","key":"246_CR17","doi-asserted-by":"publisher","first-page":"12694","DOI":"10.48084\/etasr.6601","volume":"14","author":"ZA Mohammed","year":"2024","unstructured":"Mohammed ZA, Gheni HQ, Hussein ZJ, Al-Qurabat AKM (2024) Advancing cloud image security via AES algorithm enhancement techniques. Eng, Technol Appl Sci Res 14(1):12694\u201312701","journal-title":"Eng, Technol Appl Sci Res"},{"key":"246_CR18","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1007\/s11036-019-01293-9","volume":"26","author":"J Mou","year":"2021","unstructured":"Mou J, Yang F, Chu R, Cao Y (2021) Image compression and encryption algorithm based on hyper-chaotic map. Mobile Netw Appl 26:1849\u20131861","journal-title":"Mobile Netw Appl"},{"key":"246_CR19","doi-asserted-by":"publisher","unstructured":"Selvakumar S, Ahilan A, Ben Sujitha B,\u00a0Muthukumaran N (2024) Crystals kyber\u00a0cryptographic algorithm for efficient IoT\u00a0D2d communication. Wireless Network,\u00a0Published Online. https:\/\/doi.org\/10.1007\/s11276-024-03790-6","DOI":"10.1007\/s11276-024-03790-6"},{"issue":"7","key":"246_CR20","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1016\/j.jksuci.2018.05.012","volume":"33","author":"RK Singh","year":"2021","unstructured":"Singh RK, Kumar B, Shaw DK, Khan DA (2021) Level by level image compression-encryption algorithm based on quantum chaos map. J King Saud Univ-Comput Inf Sci 33(7):844\u2013851","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"246_CR21","doi-asserted-by":"publisher","first-page":"2227","DOI":"10.1007\/s00202-020-01016-4","volume":"102","author":"VM Tatabhatla","year":"2020","unstructured":"Tatabhatla VM, Agarwal A, Kanumuri T (2020) A generalized chaotic baker map configuration for reducing the power loss under shading conditions. Electr Eng 102:2227\u20132244","journal-title":"Electr Eng"},{"issue":"22","key":"246_CR22","doi-asserted-by":"publisher","first-page":"31349","DOI":"10.1007\/s11042-022-11985-2","volume":"81","author":"H Tora","year":"2022","unstructured":"Tora H, Gokcay E, Turan M, Buker M (2022) A generalized Arnold\u2019s cat map transformation for image scrambling. Multimedia Tools Appl 81(22):31349\u201331362","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"246_CR23","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s10773-023-05295-y","volume":"62","author":"L Wang","year":"2023","unstructured":"Wang L, Ran Q, Ding J (2023) Quantum color image encryption scheme based on 3D non-equilateral Arnold transform and 3D logistic chaotic map. Int J Theor Phys 62(2):36","journal-title":"Int J Theor Phys"},{"key":"246_CR24","doi-asserted-by":"publisher","first-page":"167904","DOI":"10.1109\/ACCESS.2019.2952140","volume":"7","author":"J Xu","year":"2019","unstructured":"Xu J, Li P, Yang F, Yan H (2019) High intensity image encryption scheme based on quantum logistic chaotic map and complex hyperchaotic system. IEEE Access 7:167904\u2013167918","journal-title":"IEEE Access"},{"issue":"3","key":"246_CR25","doi-asserted-by":"publisher","first-page":"035202","DOI":"10.1088\/1402-4896\/ac4fd0","volume":"97","author":"F Yang","year":"2022","unstructured":"Yang F, An X (2022) A new discrete chaotic map application in image encryption algorithm. Phys Scr 97(3):035202","journal-title":"Phys Scr"},{"key":"246_CR26","doi-asserted-by":"publisher","first-page":"2807","DOI":"10.1007\/s11071-021-06422-2","volume":"104","author":"G Ye","year":"2021","unstructured":"Ye G, Jiao K, Huang X (2021) Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dyn 104:2807\u20132827","journal-title":"Nonlinear Dyn"}],"container-title":["Quantum Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42484-025-00246-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42484-025-00246-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42484-025-00246-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T14:40:48Z","timestamp":1750948848000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42484-025-00246-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,26]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["246"],"URL":"https:\/\/doi.org\/10.1007\/s42484-025-00246-8","relation":{},"ISSN":["2524-4906","2524-4914"],"issn-type":[{"value":"2524-4906","type":"print"},{"value":"2524-4914","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,26]]},"assertion":[{"value":"27 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article is a completely original work of its authors; it has not been published before and will not be sent to other publications until the journal\u2019s editorial board decides not to accept it for publication.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"30"}}