{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T06:53:34Z","timestamp":1775976814895,"version":"3.50.1"},"reference-count":46,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"vor","delay-in-days":251,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Quantum Communication"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>The emergence of quantum computing has introduced unprecedented security challenges to conventional cryptographic systems, particularly in the domain of classical communications. Our research addresses these challenges by creatively combining quantum key distribution (QKD), specifically the E91 protocol, with logistic chaotic maps to establish a secure image transmission scheme. Our approach utilises the pseudo\u2010randomness of chaotic systems alongside the security mechanisms inherent in quantum entanglement\u2010based protocols. This framework leverages the E91 protocol for secure quantum key distribution to generate identical key pairs at both ends, followed by chaos encryption using the key as a basis for the parameters. This framework utilises the E91 protocol for secure quantum key distribution, leveraging maximally entangled pairs and CHSH inequality tests to detect eavesdropping and potential double\u2010agent attacks by identifying nonentangled qubits, therefore maintaining key confidentiality. Furthermore, through quantitative simulations, we demonstrate the effectiveness of this scheme through key space and key sensitivity analysis, histogram analysis, information entropy analysis, execution time analysis, and differential attack analysis in end\u2010to\u2010end encryption. The results indicate a significant improvement in encryption and decryption efficiency, showcasing the scheme's potential as a viable solution against the vulnerabilities posed by quantum computing advancements. Our research offers a novel perspective on a critical aspect of cybersecurity applications across healthcare, defence, finance, and beyond in the realm of secure quantum communication.<\/jats:p>","DOI":"10.1049\/qtc2.70016","type":"journal-article","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T03:36:04Z","timestamp":1757475364000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantum Secure Image Transmission: A Chaos\u2010Assisted Quantum Key Distribution Approach Using Entanglement"],"prefix":"10.1049","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-4223-2662","authenticated-orcid":false,"given":"Raiyan","family":"Rahman","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering North South University  Dhaka Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1318-072X","authenticated-orcid":false,"given":"Md Shawmoon","family":"Azad","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering North South University  Dhaka Bangladesh"}]},{"given":"Mohammed Rakibul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering North South University  Dhaka Bangladesh"}]},{"given":"Syed Emad Uddin","family":"Shubha","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering North South University  Dhaka Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3737-0315","authenticated-orcid":false,"given":"M. R. C.","family":"Mahdy","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering North South University  Dhaka Bangladesh"},{"name":"NSU Center of Quantum Computing North South University  Dhaka Bangladesh"}]}],"member":"265","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"key":"e_1_2_14_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature23461"},{"key":"e_1_2_14_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539795293172"},{"key":"e_1_2_14_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598\u2010021\u201095973\u2010w"},{"key":"e_1_2_14_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_14_6_1","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.54.1034"},{"key":"e_1_2_14_7_1","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.54.1844"},{"key":"e_1_2_14_8_1","first-page":"203","article-title":"The Uncertainty Relations in Quantum Mechanics","author":"Sen D.","year":"2014","journal-title":"Current Science"},{"key":"e_1_2_14_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP.2008.4610808"},{"key":"e_1_2_14_10_1","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.64.821"},{"key":"e_1_2_14_11_1","doi-asserted-by":"publisher","DOI":"10.1175\/1520\u20100469(1963)020<0130:dnf>2.0.co;2"},{"key":"e_1_2_14_12_1","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.74.5028"},{"key":"e_1_2_14_13_1","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.79.3787"},{"key":"e_1_2_14_14_1","doi-asserted-by":"publisher","DOI":"10.1103\/physreve.66.065202"},{"key":"e_1_2_14_15_1","doi-asserted-by":"publisher","DOI":"10.1175\/1520\u20100469(1963)020<0130:dnf>2.0.co;2"},{"key":"e_1_2_14_16_1","volume-title":"Analysis of Logistic Maps","author":"Adeleke J. O.","year":"2022"},{"key":"e_1_2_14_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/2944326"},{"key":"e_1_2_14_18_1","unstructured":"Chua\u2019s Circuit Diagram and Equations(2023) http:\/\/www.chuacircuits.com\/diagram.php."},{"key":"e_1_2_14_19_1","unstructured":"M. E.Bianco US5048086A \u2013 Encryption System Based on Chaos Theory \u2013 Google Patents(1990)."},{"key":"e_1_2_14_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/e23111373"},{"key":"e_1_2_14_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102832"},{"key":"e_1_2_14_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.03.017"},{"key":"e_1_2_14_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.01.016"},{"key":"e_1_2_14_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"e_1_2_14_25_1","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.67.661"},{"key":"e_1_2_14_26_1","doi-asserted-by":"publisher","DOI":"10.1103\/physrev.47.777"},{"key":"e_1_2_14_27_1","doi-asserted-by":"publisher","DOI":"10.1103\/physicsphysiquefizika.1.195"},{"key":"e_1_2_14_28_1","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.49.91"},{"key":"e_1_2_14_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSYSS2.2017.8267797"},{"key":"e_1_2_14_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-74307-9_4"},{"key":"e_1_2_14_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11128\u2010021\u201003299\u20103"},{"key":"e_1_2_14_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2009.10.001"},{"key":"e_1_2_14_33_1","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.23.880"},{"key":"e_1_2_14_34_1","doi-asserted-by":"publisher","DOI":"10.11728\/cjss2018.05.604"},{"key":"e_1_2_14_35_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715261"},{"key":"e_1_2_14_36_1","volume-title":"A Guide to NumPy","author":"Oliphant T. E.","year":"2006"},{"key":"e_1_2_14_37_1","unstructured":"Scribd The OPENCV User Guide: Release 2.4.9.0. Scribd (n.d.) https:\/\/www.scribd.com\/document\/397891045\/opencv-user-pdf."},{"key":"e_1_2_14_38_1","first-page":"1","volume-title":"IEEE Std 754\u20132008","year":"2008"},{"key":"e_1_2_14_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538\u20107305.1948.tb01338.x"},{"key":"e_1_2_14_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_2_14_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/248603.248613"},{"key":"e_1_2_14_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042\u2010020\u201008897\u20104"},{"key":"e_1_2_14_43_1","doi-asserted-by":"publisher","DOI":"10.18280\/isi.250507"},{"key":"e_1_2_14_44_1","doi-asserted-by":"publisher","DOI":"10.1088\/1402\u20104896\/ad75c5"},{"key":"e_1_2_14_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3446836"},{"key":"e_1_2_14_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462\u2010024\u201010719\u20100"},{"key":"e_1_2_14_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.03.017"}],"container-title":["IET Quantum Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/qtc2.70016","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/qtc2.70016","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/qtc2.70016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T06:30:59Z","timestamp":1775975459000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/qtc2.70016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/qtc2.70016"],"URL":"https:\/\/doi.org\/10.1049\/qtc2.70016","archive":["Portico"],"relation":{},"ISSN":["2632-8925","2632-8925"],"issn-type":[{"value":"2632-8925","type":"print"},{"value":"2632-8925","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-03-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70016"}}