{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:42:36Z","timestamp":1771980156423,"version":"3.50.1"},"reference-count":43,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063729","type":"journal-article","created":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:16:50Z","timestamp":1743135410000},"page":"2161-2188","source":"Crossref","is-referenced-by-count":7,"title":["Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps: An Ultra-Wide Range Dynamics for Image Encryption"],"prefix":"10.32604","volume":"83","author":[{"given":"De Rosal Ignatius","family":"Moses Setiadi","sequence":"first","affiliation":[]},{"given":"T.","family":"Sutojo","sequence":"additional","affiliation":[]},{"given":"Supriadi","family":"Rustad","sequence":"additional","affiliation":[]},{"given":"Muhamad","family":"Akrom","sequence":"additional","affiliation":[]},{"given":"Sudipta Kr","family":"Ghosal","sequence":"additional","affiliation":[]},{"given":"Minh T.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Arnold Adimabua","family":"Ojugo","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","first-page":"124","article-title":"Secure framework for cyber data","author":"Malik","year":"2023 Jan 27\u201329"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"371","DOI":"10.62411\/faith.3048-3719-51","article-title":"Comprehensive exploration of ensemble machine learning techniques for IoT cybersecurity across multi-class and binary classification tasks","volume":"1","author":"\u00c7etin","year":"2025","journal-title":"J Future Artif Intell Technol"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3890","DOI":"10.3390\/electronics12183890","article-title":"Enhancing cloud communication security: a blockchain-powered framework with attribute-aware encryption","volume":"12","author":"Kallapu","year":"2023","journal-title":"Electronics"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.sigpro.2019.06.013","article-title":"An image encryption scheme based on hybridizing digital chaos and finite state machine","volume":"164","author":"Alawida","year":"2019","journal-title":"Signal Process"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2050090","DOI":"10.1142\/S021812742050090X","article-title":"A chaotic image encryption scheme based on H\u00e9non-Chebyshev modulation map and genetic operations","volume":"30","author":"Liu","year":"2020","journal-title":"Int J Bifurc Chaos"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.ins.2022.05.032","article-title":"Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion","volume":"605","author":"Teng","year":"2022","journal-title":"Inf Sci"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"69005","DOI":"10.1109\/ACCESS.2023.3285481","article-title":"Combined interleaved pattern to improve confusion-diffusion image encryption based on hyperchaotic system","volume":"11","author":"Winarno","year":"2023","journal-title":"IEEE Access"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"178","DOI":"10.3390\/computation11090178","article-title":"An image encryption scheme combining 2D cascaded logistic map and permutation-substitution operations","volume":"11","author":"Setiadi","year":"2023","journal-title":"Computation"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"61","DOI":"10.33633\/jcta.v1i2.9388","article-title":"Image encryption using half-inverted cascading chaos cipheration","volume":"1","author":"Setiadi","year":"2023","journal-title":"J Comput Theor Appl"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"3545","DOI":"10.1109\/ACCESS.2022.3232461","article-title":"Chaotic-map based encryption for 3D point and 3D mesh fog data in edge computing","volume":"11","author":"Raghunandan","year":"2023","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1493","DOI":"10.1007\/s11071-015-1957-9","article-title":"An image encryption algorithm based on the perturbed high-dimensional chaotic map","volume":"80","author":"Tong","year":"2015","journal-title":"Nonlinear Dyn"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"124891","DOI":"10.1016\/j.eswa.2024.124891","article-title":"Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics","volume":"257","author":"Lin","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ins.2020.10.048","article-title":"A new fractional one dimensional chaotic map and its application in high-speed image encryption","volume":"550","author":"Talhaoui","year":"2021","journal-title":"Inf Sci"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"123748","DOI":"10.1016\/j.eswa.2024.123748","article-title":"Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos","volume":"250","author":"Wen","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.ijleo.2018.12.178","article-title":"An image encryption algorithm based on modified logistic chaotic map","volume":"181","author":"Han","year":"2019","journal-title":"Optik"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.ins.2020.02.008","article-title":"A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme","volume":"520","author":"Mansouri","year":"2020","journal-title":"Inf Sci"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3389\/fphy.2022.1006324","article-title":"1D sine-map-coupling-logistic-map for 3D model encryption","volume":"10","author":"Hu","year":"2022","journal-title":"Front Phys"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2116","DOI":"10.3390\/electronics10172116","article-title":"Designing 1D chaotic maps for fast chaotic image encryption","volume":"10","author":"Khairullah","year":"2021","journal-title":"Electronics"},{"key":"ref19","first-page":"4435","article-title":"Secure image communication using galois field, hyper 3D logistic map, and B92 quantum protocol","volume":"81","author":"Setiadi","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref20","series-title":"2024 International Seminar on Application for Technology of Information and Communication","article-title":"Implementation of a mixed triple logistic map and the BB84 quantum key distribution for secure image communication","author":"Morissa","year":"2024 Sep 21\u201322"},{"key":"ref21","first-page":"657","article-title":"A highly secured image encryption scheme using quantum walk and chaos","volume":"73","author":"Kamran","year":"2022","journal-title":"Comput Mater Contin"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"060601","DOI":"10.1103\/PhysRevLett.128.060601","article-title":"Exact emergent quantum state designs from quantum chaotic dynamics","volume":"128","author":"Ho","year":"2022","journal-title":"Phys Rev Lett"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1038\/s41586-022-05442-1","article-title":"Preparing random states and benchmarking with many-body quantum chaos","volume":"613","author":"Choi","year":"2023","journal-title":"Nature"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"022124","DOI":"10.1103\/PhysRevA.92.022124","article-title":"Intrinsic randomness as a measure of quantum coherence","volume":"92","author":"Yuan","year":"2015","journal-title":"Phys Rev A"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"326","DOI":"10.3390\/photonics8080326","article-title":"Quantum chaos in time series of single photons as a superposition of wave and particle states","volume":"8","author":"Mendoza","year":"2021","journal-title":"Photonics"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"15605","DOI":"10.1007\/s11042-018-6973-6","article-title":"Image encryption algorithm based on quantum chaotic map and DNA coding","volume":"78","author":"Zhang","year":"2019","journal-title":"Multimed Tools Appl"},{"key":"ref27","first-page":"1","article-title":"An image encryption scheme based on logistic quantum chaos","volume":"24","author":"Wang","year":"2022","journal-title":"Entropy"},{"key":"ref28","first-page":"3447","article-title":"Image encryption using multi-scroll attractor and chaotic logistic map","volume":"72","author":"Anitha","year":"2022","journal-title":"Comput Mater Contin"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"101980","DOI":"10.1016\/j.jksuci.2024.101980","article-title":"Quantum-enhanced chaotic image encryption: strengthening digital data security with 1-D sine-based chaotic maps and quantum coding","volume":"36","author":"Rehman","year":"2024","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"106833","DOI":"10.1016\/j.rinp.2023.106833","article-title":"Fast adaptive synchronization of discrete quantum chaotic maps","volume":"52","author":"Wang","year":"2023","journal-title":"Results Phys"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1080\/09500340.2024.2436521","article-title":"QMedShield: a novel quantum chaos-based image encryption scheme for secure medical image storage in the cloud","volume":"71","author":"Rajan","year":"2024","journal-title":"J Mod Opt"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1930","DOI":"10.1038\/s41598-020-58636-w","article-title":"Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications","volume":"10","author":"Abd El-Latif","year":"2020","journal-title":"Sci Rep"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"7768","DOI":"10.3390\/app13137768","article-title":"Hybrid chaotic-based PRNG for secure cryptography applications","volume":"13","author":"Alnajim","year":"2023","journal-title":"Appl Sci"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"118857","DOI":"10.1109\/ACCESS.2024.3447889","article-title":"A Novel 1-dimensional cosine chaotic equation and digital image encryption technique","volume":"12","author":"Ullah","year":"2024","journal-title":"IEEE Access"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.cnsns.2013.06.017","article-title":"Pseudo random number generator based on quantum chaotic map","volume":"19","author":"Akhshani","year":"2014","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"106021","DOI":"10.1103\/PhysRevD.103.106021","article-title":"Geometry of quantum complexity","volume":"103","author":"Auzzi","year":"2021","journal-title":"Phys Rev D"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"264","DOI":"10.22331\/q-2020-05-11-264","article-title":"How many qubits are needed for quantum computational supremacy?","volume":"4","author":"Dalzell","year":"2020","journal-title":"Quantum"},{"key":"ref38","unstructured":"USC Viterbi School of Engineering. SIPI Image Database [Internet]. [cited 2019 Mar 27]. Available from: http:\/\/sipi.usc.edu\/database\/."},{"key":"ref39","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","article-title":"Local Shannon entropy measure with statistical tests for image randomness","volume":"222","author":"Wu","year":"2013","journal-title":"Inf Sci"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"115143","DOI":"10.1109\/ACCESS.2022.3218886","article-title":"Improved pixel and bit confusion-diffusion based on mixed chaos and hash operation for image encryption","volume":"10","author":"Andono","year":"2022","journal-title":"IEEE Access"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"20481","DOI":"10.1109\/ACCESS.2021.3054952","article-title":"A quantum chaotic image cryptosystem and its application in IoT secure communication","volume":"9","author":"Wen","year":"2021","journal-title":"IEEE Access"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-022-17045-x","article-title":"A generalized framework for elliptic curves based PRNG and its utilization in image encryption","volume":"12","author":"AbdElHaleem","year":"2022","journal-title":"Sci Rep"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"29243","DOI":"10.1007\/s11042-020-09542-w","article-title":"A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing","volume":"79","author":"Cheng","year":"2020","journal-title":"Multimed Tools Appl"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_63729\/TSP_CMC_63729.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:08:32Z","timestamp":1763341712000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":43,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063729","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}