{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:11:59Z","timestamp":1748405519444,"version":"3.41.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T00:00:00Z","timestamp":1748304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T00:00:00Z","timestamp":1748304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04030-0","type":"journal-article","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T10:40:56Z","timestamp":1748342456000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing the Power of Advanced Arnold Cat Map for Secure Quantum Image Cryptography"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6479-7838","authenticated-orcid":false,"given":"Shilpa M.","family":"Satre","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bharti","family":"Joshi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,5,27]]},"reference":[{"key":"4030_CR1","doi-asserted-by":"publisher","first-page":"92043","DOI":"10.1109\/ACCESS.2024.3423691","volume":"12","author":"G Cao","year":"2024","unstructured":"Cao G, Tao Y, Liu X, Zhang T. Image encryption based on a coined chaotic system and high-intensity encryption primitives. IEEE Access. 2024;12:92043\u201361. https:\/\/doi.org\/10.1109\/ACCESS.2024.3423691.","journal-title":"IEEE Access"},{"issue":"7","key":"4030_CR2","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1016\/j.jksuci.2018.05.012","volume":"33","author":"RK Singh","year":"2021","unstructured":"Singh RK, Kumar B, Shaw DK, Khan DA. Level by level image compression-encryption algorithm based on quantum chaos map. J King Saud Univ Comput Inf Sci. 2021;33(7):844\u201351.","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"4030_CR3","doi-asserted-by":"publisher","first-page":"93795","DOI":"10.1109\/ACCESS.2021.3092512","volume":"9","author":"AS Alanazi","year":"2021","unstructured":"Alanazi AS, Munir N, Khan M, Asif M, Hussain I. Cryptanalysis of novel image encryption scheme based on multiple chaotic substitution boxes. IEEE Access. 2021;9:93795\u2013802. https:\/\/doi.org\/10.1109\/ACCESS.2021.3092512.","journal-title":"IEEE Access"},{"key":"4030_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03187-w","volume":"20","author":"JY Dai","year":"2021","unstructured":"Dai JY, Ma Y, Zhou NR. Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4D hyper-chaotic Henon map. Quantum Inf Process. 2021;20:1\u201324.","journal-title":"Quantum Inf Process"},{"issue":"3","key":"4030_CR5","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ac4fd0","volume":"97","author":"F Yang","year":"2022","unstructured":"Yang F, An X. A new discrete chaotic map application in image encryption algorithm. Phys Scr. 2022;97(3): 035202.","journal-title":"Phys Scr"},{"key":"4030_CR6","doi-asserted-by":"publisher","first-page":"116031","DOI":"10.1109\/ACCESS.2022.3218668","volume":"10","author":"H Chen","year":"2022","unstructured":"Chen H, Bai E, Jiang X, Wu Y. A fast image encryption algorithm based on improved 6-D hyper-chaotic system. IEEE Access. 2022;10:116031\u201344. https:\/\/doi.org\/10.1109\/ACCESS.2022.3218668.","journal-title":"IEEE Access"},{"issue":"10","key":"4030_CR7","doi-asserted-by":"publisher","first-page":"9926","DOI":"10.1016\/j.jksuci.2021.12.022","volume":"34","author":"M Maazouz","year":"2021","unstructured":"Maazouz M, Toubal A, Bengherbia B, Houhou O, Batel N. FPGA implementation of a chaos-based image encryption algorithm. J King Saud Univ Comput Inf Sci. 2021;34(10):9926\u201341. https:\/\/doi.org\/10.1016\/j.jksuci.2021.12.022.","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"4030_CR8","doi-asserted-by":"publisher","first-page":"12966","DOI":"10.1109\/ACCESS.2022.3146792","volume":"10","author":"J Arif","year":"2022","unstructured":"Arif J, Khan MA, Ghaleb B, Ahmad J, Munir A, Rashid U, Al-Dubai AY. A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution. IEEE Access. 2022;10:12966\u201382. https:\/\/doi.org\/10.1109\/ACCESS.2022.3146792.","journal-title":"IEEE Access"},{"issue":"2","key":"4030_CR9","doi-asserted-by":"publisher","first-page":"161","DOI":"10.3390\/sym13020161","volume":"13","author":"S Askar","year":"2021","unstructured":"Askar S, Al-Khedhairi A, Elsonbaty A, Elsadany A. Chaotic discrete fractional-order food chain model and hybrid image encryption scheme application. Symmetry. 2021;13(2):161.","journal-title":"Symmetry"},{"issue":"5","key":"4030_CR10","doi-asserted-by":"publisher","first-page":"7365","DOI":"10.1007\/s11042-021-11803-1","volume":"81","author":"U Erkan","year":"2022","unstructured":"Erkan U, Toktas A, Engino\u011flu S, Akbacak E, Thanh DNH. An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN. Multimedia Tools Appl. 2022;81(5):7365\u201391. https:\/\/doi.org\/10.1007\/s11042-021-11803-1.","journal-title":"Multimedia Tools Appl"},{"key":"4030_CR11","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s10773-018-3989-7","volume":"58","author":"N Jiang","year":"2019","unstructured":"Jiang N, Dong X, Hu H, Ji Z, Zhang W. Quantum image encryption based on Henon mapping. Int J Theor Phys. 2019;58:979\u201391.","journal-title":"Int J Theor Phys"},{"key":"4030_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02952-7","volume":"20","author":"X Liu","year":"2021","unstructured":"Liu X, Xiao D, Liu C. Three-level quantum image encryption based on Arnold transform and logistic map. Quantum Inf Process. 2021;20:1\u201322.","journal-title":"Quantum Inf Process"},{"key":"4030_CR13","doi-asserted-by":"publisher","first-page":"2807","DOI":"10.1007\/s11071-021-06422-2","volume":"104","author":"G Ye","year":"2021","unstructured":"Ye G, Jiao K, Huang X. Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dyn. 2021;104:2807\u201327.","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"4030_CR14","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s11633-019-1173-z","volume":"17","author":"B Ge","year":"2020","unstructured":"Ge B, Luo HB. Image encryption application of chaotic sequences incorporating quantum keys. Int J Autom Comput. 2020;17(1):123\u201338.","journal-title":"Int J Autom Comput"},{"issue":"2","key":"4030_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s10773-023-05295-y","volume":"62","author":"L Wang","year":"2023","unstructured":"Wang L, Ran Q, Ding J. Quantum color image encryption scheme based on 3D non-equilateral Arnold transform and 3D logistic chaotic map. Int J Theor Phys. 2023;62(2):36.","journal-title":"Int J Theor Phys"},{"key":"4030_CR16","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1007\/s11036-019-01293-9","volume":"26","author":"J Mou","year":"2021","unstructured":"Mou J, Yang F, Chu R, Cao Y. Image compression and encryption algorithm based on hyper-chaotic map. Mob Netw Appl. 2021;26:1849\u201361.","journal-title":"Mob Netw Appl"},{"key":"4030_CR17","doi-asserted-by":"publisher","first-page":"27569","DOI":"10.1007\/s11042-019-07852-2","volume":"78","author":"S Anwar","year":"2019","unstructured":"Anwar S, Meghana S. A pixel permutation based image encryption technique using chaotic map. Multimedia Tools Appl. 2019;78:27569\u201390.","journal-title":"Multimedia Tools Appl"},{"issue":"22","key":"4030_CR18","doi-asserted-by":"publisher","first-page":"31349","DOI":"10.1007\/s11042-022-11985-2","volume":"81","author":"H Tora","year":"2022","unstructured":"Tora H, Gokcay E, Turan M, Buker M. A generalized Arnold\u2019s Cat Map transformation for image scrambling. Multimedia Tools Appl. 2022;81(22):31349\u201362.","journal-title":"Multimedia Tools Appl"},{"key":"4030_CR19","doi-asserted-by":"publisher","first-page":"2227","DOI":"10.1007\/s00202-020-01016-4","volume":"102","author":"VM Tatabhatla","year":"2020","unstructured":"Tatabhatla VM, Agarwal A, Kanumuri T. A generalized chaotic baker map configuration for reducing the power loss under shading conditions. Electr Eng. 2020;102:2227\u201344.","journal-title":"Electr Eng"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04030-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04030-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04030-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T10:40:56Z","timestamp":1748342456000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04030-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,27]]},"references-count":19,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["4030"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04030-0","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,27]]},"assertion":[{"value":"27 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and \/or animals"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"503"}}