{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T23:23:47Z","timestamp":1771716227198,"version":"3.50.1"},"reference-count":45,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computation"],"abstract":"<jats:p>This study presents a novel encryption method for RGB (Red\u2013Green\u2013Blue) color images that combines scrambling techniques with the logistic map equation. In this method, image scrambling serves as a reversible transformation, rendering the image unintelligible to unauthorized users and thus enhancing security against potential attacks. The proposed encryption scheme, called Bit-Plane Representation of Quantum Images (BRQI), utilizes quantum operations in conjunction with a one-dimensional chaotic system to increase encryption efficiency. The encryption algorithm operates in two phases: first, the quantum image undergoes scrambling through bit-plane manipulation, and second, the scrambled image is mixed with a key image generated using the logistic map. To assess the performance of the algorithm, simulations and analyses were conducted, evaluating parameters such as entropy (a measure of disorder) and correlation coefficients to confirm the effectiveness and robustness of this algorithm in safeguarding and encoding color images. The results show that the proposed quantum color image encryption algorithm surpasses classical methods in terms of security, robustness, and computational complexity.<\/jats:p>","DOI":"10.3390\/computation13020056","type":"journal-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T10:26:12Z","timestamp":1739787972000},"page":"56","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Innovative Quantum Encryption Method for RGB Images Based on Bit-Planes and Logistic Maps"],"prefix":"10.3390","volume":"13","author":[{"given":"Saeed","family":"Basiri","sequence":"first","affiliation":[{"name":"Department of Physics, Islamic Azad University, North Tehran Branch, Tehran 1651153311, Iran"}]},{"given":"Laleh","family":"Farhang Matin","sequence":"additional","affiliation":[{"name":"Department of Physics, Islamic Azad University, North Tehran Branch, Tehran 1651153311, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0786-2175","authenticated-orcid":false,"given":"Mosayeb","family":"Naseri","sequence":"additional","affiliation":[{"name":"Digital Technologies Research Centre, National Research Council Canada, 1200 Montreal Road, Ottawa, ON K1A0R6, Canada"},{"name":"Department of Physics and Astronomy, IQST\u2014Institute for Quantum Science and Technology, Quantum Alberta, University of Calgary, 2500 University Drive NW, Calgary, AB T2N 1N4, Canada"}]}],"member":"1968","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"ref_1","unstructured":"Morkel, T., Eloff, .H., and Olivier, M.S. (2005). An Overview of Image Steganography. Information Security South Africa, University of Pretoria."},{"key":"ref_2","unstructured":"Pahati, O.J. (2001). Confounding Carnivore: How to Protect Your Online Privacy. AlterNet, 7\u201316."},{"key":"ref_3","first-page":"287","article-title":"Image Encryption Using Elliptic Curve Cryptography","volume":"54","author":"Singh","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1016\/j.patcog.2004.11.010","article-title":"Bit-Level-Based Secret Sharing for Image Encryption","volume":"38","author":"Lukac","year":"2005","journal-title":"Pattern Recognit."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Mishra, R., and Bhanodiya, P. (2015, January 19\u201320). A review on steganography and cryptography. Proceedings of the 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, India.","DOI":"10.1109\/ICACEA.2015.7164679"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Kamali, S.H., Shakerian, R., Hedayati, M., and Rahmani, M. (2010, January 1\u20133). A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption. Proceedings of the International Conference on Electronics and Information Engineering, Kyoto, Japan.","DOI":"10.1109\/ICEIE.2010.5559902"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2655","DOI":"10.1007\/s10773-014-2046-4","article-title":"Quantum Hilbert Image Scrambling","volume":"53","author":"Jiang","year":"2014","journal-title":"Int. J. Theor. Phys."},{"key":"ref_8","first-page":"2179","article-title":"The Quantum Realization of Arnold and Fibonacci Image Scrambling","volume":"13","author":"Jiang","year":"2014","journal-title":"Quantum Inf. Process."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sankpal, P.R., and Vijaya, P.A. (2014, January 8\u201310). Image Encryption Using Chaotic Maps: A Survey. Proceedings of the Fifth International Conference on Signal and Image Processing, Bangalore, India.","DOI":"10.1109\/ICSIP.2014.80"},{"key":"ref_10","first-page":"10343","article-title":"A Novel Double-Image Encryption Scheme Based on Cross-Image Pixel Scrambling in Gyrator Domains","volume":"22","author":"Chen","year":"2014","journal-title":"Opt. Express"},{"key":"ref_11","first-page":"1877","article-title":"An Efficient Diffusion Approach for Chaos-Based Image Encryption","volume":"42","author":"Wong","year":"2009","journal-title":"Chaos Solitons Fractals"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2971","DOI":"10.1007\/s11128-013-0561-5","article-title":"Analysis and Improvement of the Watermark Strategy for Quantum Images Based on Quantum Fourier Transform","volume":"12","author":"Yang","year":"2013","journal-title":"Quantum Inf. Process."},{"key":"ref_13","first-page":"62396","article-title":"A Quantum Image Representation Based on Bitplanes","volume":"6","author":"Li","year":"2018","journal-title":"Proc. IEEE"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1007\/s11128-015-1195-6","article-title":"A Survey of Quantum Image Representations","volume":"15","author":"Yan","year":"2016","journal-title":"Quantum Inf. Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1038\/s42254-020-0193-5","article-title":"Advances in High-Dimensional Quantum Entanglement","volume":"2","author":"Erhard","year":"2020","journal-title":"Nat. Rev. Phys."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1038\/nphys2904","article-title":"Quantum Entanglement","volume":"10","author":"Vedral","year":"2014","journal-title":"Nat. Phys."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"44001","DOI":"10.1209\/0295-5075\/81\/44001","article-title":"Quantum Limits in Image Processing","volume":"81","author":"Delaubert","year":"2008","journal-title":"EPL (Europhys. Lett.)"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1117\/12.485960","article-title":"Storing, Processing, and Retrieving an Image Using Quantum Mechanics","volume":"Volume 5105","author":"Bose","year":"2003","journal-title":"Quantum Information and Computation"},{"key":"ref_19","first-page":"475","article-title":"Quantum Image Processing: Challenges and Future Research Issues","volume":"10","author":"Chakraborty","year":"2018","journal-title":"Int. J. Inf. Technol."},{"key":"ref_20","unstructured":"Ventura, D., and Martinez, T. (1998, January 4\u20139). Quantum Associative Memory with Exponential Capacity. Proceedings of the IEEE International Joint Conference on Neural Networks, World Congress on Computational Intelligence, Anchorage, AK, USA."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s11128-010-0177-y","article-title":"A Flexible Representation of Quantum Images for Polynomial Preparation, Image Compression, and Processing Operations","volume":"10","author":"Le","year":"2011","journal-title":"Quantum Inf. Process."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.ins.2014.03.035","article-title":"Multidimensional color image storage, retrieval, and compression based on quantum amplitudes and phases","volume":"273","author":"Li","year":"2014","journal-title":"Inf. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"404","DOI":"10.20965\/jaciii.2013.p0404","article-title":"An RGB Multi-Channel Representation for Images on Quantum Computers","volume":"17","author":"Sun","year":"2013","journal-title":"J. Adv. Comput. Intell. Intell. Inform."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2833","DOI":"10.1007\/s11128-013-0567-z","article-title":"NEQR: A Novel Enhanced Quantum Representation of Digital Images","volume":"12","author":"Zhang","year":"2013","journal-title":"Quantum Inf. Process."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.ijleo.2016.09.123","article-title":"Red-Green-Blue multi-channel quantum representation of digital images","volume":"128","author":"Abdolmaleky","year":"2017","journal-title":"Optik"},{"key":"ref_26","first-page":"341","article-title":"Quantum Implementation Circuits of Quantum Signal Representation and Type Conversion","volume":"65","author":"Li","year":"2018","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"4205","DOI":"10.1007\/s10773-016-3046-3","article-title":"A Novel LSB Based Quantum Watermarking","volume":"55","author":"Heidari","year":"2016","journal-title":"Int. J. Theor. Phys."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.ijleo.2017.03.091","article-title":"A new secure quantum watermarking scheme","volume":"139","author":"Naseri","year":"2017","journal-title":"Optik"},{"key":"ref_29","unstructured":"(2017, November 24). U.S. District Court Rules in Favor of Copyright Protection for Standards Incorporated by Reference into Federal Regulations. Available online: www.ansi.org."},{"key":"ref_30","first-page":"237","article-title":"An Image Encryption Approach Based on Chaotic Maps","volume":"24","author":"Zhang","year":"2005","journal-title":"Inf. Sci."},{"key":"ref_31","unstructured":"Fridrich, J. (1997, January 12\u201315). Image Encryption Based on Chaotic Maps. Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Orlando, FL, USA."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Peng, J., Jin, S., Chen, G., Yang, Z., and Liao, X. (2008, January 18\u201320). An Image Encryption Scheme Based on Chaotic Map. Proceedings of the 2008 Fourth International Conference on Natural Computation, Jinan, China.","DOI":"10.1109\/ICNC.2008.227"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/BF01941800","article-title":"Absolutely Continuous Invariant Measures for One-Parameter Families of One-Dimensional Maps","volume":"81","author":"Jakobson","year":"1981","journal-title":"Commun. Math. Phys."},{"key":"ref_34","first-page":"1919","article-title":"A Fast Image Encryption System Based on Chaotic Maps with Finite Precision Representation","volume":"33","author":"Kwok","year":"2007","journal-title":"Chaos Solitons Fractals"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1038\/261459a0","article-title":"Simple Mathematical Models with Very Complicated Dynamics","volume":"261","author":"May","year":"1976","journal-title":"Nature"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","article-title":"Image Encryption Using Chaotic Logistic Map","volume":"24","author":"Pareek","year":"2006","journal-title":"Image Vis. Comput."},{"key":"ref_37","first-page":"203","article-title":"Measurement of the Entropy of an Image with Application to Image Focusing","volume":"31","author":"Thum","year":"1984","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1007\/s11071-017-3698-4","article-title":"Lossless Chaotic Color Image Cryptosystem Based on DNA Encryption and Entropy","volume":"87","author":"Wu","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/S0031-3203(01)00054-1","article-title":"Color Image Segmentation Based on Histogram Thresholding and Region Merging","volume":"35","author":"Cheng","year":"2002","journal-title":"Pattern Recognit."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.ins.2012.07.049","article-title":"Local Shannon Entropy Measure with Statistical Tests for Image Randomness","volume":"222","author":"Wu","year":"2013","journal-title":"Inf. Sci."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A Mathematical Theory of Communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2638","DOI":"10.1016\/j.physd.2008.03.049","article-title":"Image Encryption with Chaotically Coupled Chaotic Maps","volume":"237","author":"Pisarchik","year":"2008","journal-title":"Phys. D Nonlinear Phenom."},{"key":"ref_43","first-page":"309","article-title":"OCML-Based Colour Image Encryption","volume":"40","author":"Rhouma","year":"2009","journal-title":"Inf. Sci."},{"key":"ref_44","unstructured":"Mackenzie, C.E. (1980). Coded Character Sets: Overview of Image Steganography, Addison-Wesley Publishing Company, Inc.. [1st ed.]. The Systems Programming Series."},{"key":"ref_45","first-page":"185","article-title":"A Hybrid Genetic Algorithm and Chaotic Function Model for Image Encryption","volume":"66","author":"Abdullah","year":"2012","journal-title":"Appl. Math. Comput."}],"container-title":["Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/2\/56\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:36:26Z","timestamp":1760027786000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/2\/56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,17]]},"references-count":45,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["computation13020056"],"URL":"https:\/\/doi.org\/10.3390\/computation13020056","relation":{},"ISSN":["2079-3197"],"issn-type":[{"value":"2079-3197","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,17]]}}}