Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations

Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed in this pape...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:International journal of theoretical physics Ročník 52; číslo 6; s. 1802 - 1817
Hlavní autoři: Zhou, Ri-Gui, Wu, Qian, Zhang, Man-Qun, Shen, Chen-Yi
Médium: Journal Article
Jazyk:angličtina
Vydáno: Boston Springer US 01.06.2013
Témata:
ISSN:0020-7748, 1572-9575
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed in this paper lays in the operational objectives, the quantum image. Firstly, extracts the properties of gray-scale and position from the quantum gray-scale image which the storage expression of image in quantum states is achieved. Along with the geometric transformations in classical images, this article realizes the quantum image geometric transforms by means of designing quantum circuits. Eventually, through a combination of the proposals in previous, the encryption and decryption algorithms on quantum gray-scale images is finally accomplished, which could ensure the confidentiality and security of the information in delivery. The algorithms belong to the application of quantum image geometric transformations, for further, the new explorations for quantum image cryptography researches.
AbstractList Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed in this paper lays in the operational objectives, the quantum image. Firstly, extracts the properties of gray-scale and position from the quantum gray-scale image which the storage expression of image in quantum states is achieved. Along with the geometric transformations in classical images, this article realizes the quantum image geometric transforms by means of designing quantum circuits. Eventually, through a combination of the proposals in previous, the encryption and decryption algorithms on quantum gray-scale images is finally accomplished, which could ensure the confidentiality and security of the information in delivery. The algorithms belong to the application of quantum image geometric transformations, for further, the new explorations for quantum image cryptography researches.
Author Zhang, Man-Qun
Wu, Qian
Zhou, Ri-Gui
Shen, Chen-Yi
Author_xml – sequence: 1
  givenname: Ri-Gui
  surname: Zhou
  fullname: Zhou, Ri-Gui
  organization: College of Information Engineering, East China JiaoTong University
– sequence: 2
  givenname: Qian
  surname: Wu
  fullname: Wu, Qian
  email: xiqian88@gmail.com
  organization: College of Information Engineering, East China JiaoTong University
– sequence: 3
  givenname: Man-Qun
  surname: Zhang
  fullname: Zhang, Man-Qun
  organization: College of Information Engineering, East China JiaoTong University
– sequence: 4
  givenname: Chen-Yi
  surname: Shen
  fullname: Shen, Chen-Yi
  organization: College of Information Engineering, East China JiaoTong University
BookMark eNp9kM9KAzEQh4NUsK0-gLe8QHQy-yfZY621Fgoi1HPIZpO6pZstyfbQt3friqCHnoYZft8w803IyLfeEnLP4YEDiMfIQYiEAUfGUaRMXpExzwSyIhPZiIwBEJgQqbwhkxh3AFBAKsfEvB-1744NXTV6a-nCm3A6dHXrqfYVfba_7Wy_bUPdfTaRPuloK9rP_rJL2za2C7Whm6B9dG1o9BmNt-Ta6X20dz91Sj5eFpv5K1u_LVfz2ZoZlLJjpakclzbXWCFykEZUCRboylwkZVaaxBVprqvcWTQ5apGBSRALJ6VxmcvKZErEsNeENsZgnTJ1931CF3S9VxzU2ZUaXKnelTq7UrIn-T_yEOpGh9NFBgcm9lm_tUHt2mPw_YMXoC-PWIAL
CitedBy_id crossref_primary_10_1007_s11128_015_0932_1
crossref_primary_10_1007_s11128_018_2096_2
crossref_primary_10_1016_j_cosrev_2025_100763
crossref_primary_10_1016_j_chaos_2020_110102
crossref_primary_10_1007_s11128_014_0842_7
crossref_primary_10_1007_s11128_019_2559_0
crossref_primary_10_1007_s10773_023_05295_y
crossref_primary_10_1007_s11128_015_0926_z
crossref_primary_10_32604_cmc_2021_019153
crossref_primary_10_1016_j_ins_2015_12_024
crossref_primary_10_1109_ACCESS_2019_2955570
crossref_primary_10_1007_s11128_016_1292_1
crossref_primary_10_1007_s11128_020_02837_9
crossref_primary_10_1007_s10773_015_2524_3
crossref_primary_10_1016_j_physa_2019_122660
crossref_primary_10_1007_s10773_013_1991_7
crossref_primary_10_1007_s10773_019_04057_z
crossref_primary_10_1007_s11128_020_02724_3
crossref_primary_10_1109_ACCESS_2018_2871107
crossref_primary_10_1007_s11042_022_12337_w
crossref_primary_10_3390_e16105290
crossref_primary_10_1007_s11128_022_03555_0
crossref_primary_10_1016_j_optlaseng_2020_106393
crossref_primary_10_3390_e25121629
crossref_primary_10_1007_s12065_024_00927_6
crossref_primary_10_1016_j_ijleo_2015_07_082
crossref_primary_10_1007_s11128_020_02739_w
crossref_primary_10_1007_s40042_021_00065_7
crossref_primary_10_1109_ACCESS_2023_3247507
crossref_primary_10_1063_5_0247876
crossref_primary_10_1007_s10773_021_04733_z
crossref_primary_10_1109_ACCESS_2018_2871691
crossref_primary_10_1007_s11128_020_02649_x
crossref_primary_10_1088_1674_1056_ac8f35
crossref_primary_10_1007_s10773_016_3000_4
crossref_primary_10_1007_s11071_015_2048_7
crossref_primary_10_1016_j_ins_2016_01_078
crossref_primary_10_1007_s10773_016_3046_3
crossref_primary_10_1007_s11128_025_04871_x
crossref_primary_10_1007_s11276_021_02831_8
crossref_primary_10_1007_s11128_015_0986_0
crossref_primary_10_1007_s11128_015_0964_6
crossref_primary_10_1109_TCE_2025_3572949
crossref_primary_10_1016_j_ins_2014_03_035
crossref_primary_10_1007_s11128_018_2104_6
crossref_primary_10_1007_s11128_015_1072_3
crossref_primary_10_1007_s11128_020_02723_4
crossref_primary_10_1140_epjp_s13360_022_02630_w
crossref_primary_10_1109_ACCESS_2024_3367232
crossref_primary_10_1007_s11128_015_1099_5
crossref_primary_10_1007_s11128_018_1826_9
crossref_primary_10_1109_TCSI_2018_2853655
crossref_primary_10_1007_s10773_018_3710_x
crossref_primary_10_1007_s00500_023_08747_z
crossref_primary_10_1007_s11128_022_03624_4
crossref_primary_10_1016_j_ins_2014_02_124
crossref_primary_10_1007_s10773_019_04346_7
crossref_primary_10_1007_s11128_013_0629_2
crossref_primary_10_1007_s11128_020_2579_9
crossref_primary_10_1007_s11128_014_0768_0
crossref_primary_10_1007_s11128_023_04026_w
crossref_primary_10_1007_s11128_020_02678_6
crossref_primary_10_3390_e20110867
crossref_primary_10_1007_s11128_020_02654_0
crossref_primary_10_1007_s11128_020_02944_7
crossref_primary_10_1088_1402_4896_ad8819
crossref_primary_10_1007_s10773_015_2800_2
crossref_primary_10_1155_2021_6671613
crossref_primary_10_1088_1402_4896_ad0099
crossref_primary_10_1140_epjst_e2019_800209_3
crossref_primary_10_3389_fphy_2024_1230294
crossref_primary_10_1145_3009965
crossref_primary_10_1007_s11128_016_1457_y
crossref_primary_10_1007_s11042_020_09043_w
crossref_primary_10_1007_s11128_025_04735_4
crossref_primary_10_1007_s11128_018_1958_y
crossref_primary_10_1007_s10773_018_3841_0
crossref_primary_10_1007_s10773_017_3469_5
crossref_primary_10_1007_s11128_019_2479_z
crossref_primary_10_1109_ACCESS_2019_2942986
crossref_primary_10_1007_s11128_015_1135_5
crossref_primary_10_3390_electronics11162628
crossref_primary_10_1007_s42484_023_00102_7
crossref_primary_10_1002_cpe_7899
crossref_primary_10_1007_s10773_017_3533_1
crossref_primary_10_1007_s11128_021_03386_5
crossref_primary_10_1002_qute_202400579
crossref_primary_10_1007_s11554_020_00948_1
crossref_primary_10_1007_s10773_014_2245_z
crossref_primary_10_1007_s10773_022_05244_1
crossref_primary_10_1007_s11042_019_08514_z
crossref_primary_10_1007_s10773_016_3073_0
crossref_primary_10_1007_s11128_022_03709_0
crossref_primary_10_1007_s10773_021_04909_7
crossref_primary_10_1007_s10773_021_04862_5
crossref_primary_10_1007_s10773_019_04258_6
crossref_primary_10_1063_5_0265586
crossref_primary_10_1007_s11128_014_0849_0
crossref_primary_10_1007_s11128_022_03510_z
crossref_primary_10_1007_s10773_017_3561_x
crossref_primary_10_1007_s10773_018_3932_y
crossref_primary_10_1007_s11128_022_03517_6
crossref_primary_10_1007_s11128_015_1195_6
crossref_primary_10_1088_1674_1056_ad1174
crossref_primary_10_1007_s11128_017_1612_0
crossref_primary_10_1155_2014_104325
crossref_primary_10_1007_s11128_013_0612_y
crossref_primary_10_1007_s11128_016_1364_2
crossref_primary_10_1038_s41598_018_32348_8
crossref_primary_10_1007_s11042_021_11656_8
crossref_primary_10_1007_s10773_018_3887_z
crossref_primary_10_1145_3663577
crossref_primary_10_1088_1402_4896_ad504d
crossref_primary_10_1007_s10773_017_3341_7
crossref_primary_10_1007_s10773_017_3365_z
crossref_primary_10_1007_s11128_020_02952_7
crossref_primary_10_1016_j_csbr_2025_100053
crossref_primary_10_1016_j_physa_2019_123869
crossref_primary_10_1007_s11128_019_2317_3
crossref_primary_10_1016_j_physa_2019_123908
crossref_primary_10_1007_s10773_022_04998_y
crossref_primary_10_1007_s44443_025_00155_7
crossref_primary_10_1016_j_ijleo_2016_11_124
crossref_primary_10_1109_TETC_2024_3471086
crossref_primary_10_1007_s10773_016_2954_6
crossref_primary_10_1007_s10773_017_3493_5
Cites_doi 10.1007/s11128-009-0123-z
10.1007/s10773-011-0950-4
10.1103/PhysRevA.52.3457
10.1109/SFCS.1994.365700
10.1007/s11128-010-0177-y
10.1145/1242471.1242474
10.1038/299802a0
10.1109/TIT.1976.1055638
10.1002/j.1538-7305.1949.tb00928.x
ContentType Journal Article
Copyright Springer Science+Business Media, LLC 2012
Copyright_xml – notice: Springer Science+Business Media, LLC 2012
DBID AAYXX
CITATION
DOI 10.1007/s10773-012-1274-8
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 1572-9575
EndPage 1817
ExternalDocumentID 10_1007_s10773_012_1274_8
GroupedDBID -54
-5F
-5G
-BR
-DZ
-EM
-Y2
-~C
-~X
.86
.VR
06D
0R~
0VY
1N0
1SB
2.D
203
28-
29J
29~
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
78A
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDBF
ABDZT
ABECU
ABEFU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACNCT
ACOKC
ACOMO
ACPIV
ACUHS
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFFNX
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
B0M
BA0
BBWZM
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EAD
EAP
EAS
EBLON
EBS
EIOEI
EJD
EMK
EPL
ESBYG
ESX
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GPTSA
GQ3
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
H~9
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P9T
PF0
PKN
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SDH
SDM
SGB
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPH
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TN5
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UPT
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WH7
WK8
XJT
YLTOR
Z45
Z7R
Z7U
Z7X
Z83
Z88
Z8R
Z8W
Z92
ZMTXR
~8M
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ABUFD
ACSTC
ADHKG
ADXHL
AEZWR
AFDZB
AFFHD
AFHIU
AFKRA
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
AMVHM
ARAPS
ATHPR
AYFIA
AZQEC
BENPR
BGLVJ
CCPQU
CITATION
DWQXO
GNUQQ
HCIFZ
M2P
PHGZM
PHGZT
PQGLB
ID FETCH-LOGICAL-c288t-bcdf18e6a2d22108c7d3292fb673b5bc3f946ad6fe2c62a750c3229f88cf5f5b3
IEDL.DBID RSV
ISICitedReferencesCount 152
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000318373700010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0020-7748
IngestDate Sat Nov 29 06:30:52 EST 2025
Tue Nov 18 22:38:15 EST 2025
Fri Feb 21 02:34:22 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Geometric transformation
Quantum image
Symmetric cryptosystem
Encryption and decryption algorithms
Language English
License http://www.springer.com/tdm
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c288t-bcdf18e6a2d22108c7d3292fb673b5bc3f946ad6fe2c62a750c3229f88cf5f5b3
PageCount 16
ParticipantIDs crossref_citationtrail_10_1007_s10773_012_1274_8
crossref_primary_10_1007_s10773_012_1274_8
springer_journals_10_1007_s10773_012_1274_8
PublicationCentury 2000
PublicationDate 20130600
2013-6-00
PublicationDateYYYYMMDD 2013-06-01
PublicationDate_xml – month: 6
  year: 2013
  text: 20130600
PublicationDecade 2010
PublicationPlace Boston
PublicationPlace_xml – name: Boston
PublicationTitle International journal of theoretical physics
PublicationTitleAbbrev Int J Theor Phys
PublicationYear 2013
Publisher Springer US
Publisher_xml – name: Springer US
References Stallings (CR3) 2010
Diffie, Hellman (CR5) 1967; 22
Wootters, Zurek (CR15) 1982; 299
CR6
Venegas-Andraca, Ball (CR11) 2010; 9
Bose (CR4) 2002
Shor (CR7) 1994
CR13
CR12
Barenco, Bennett, Cleve, DiVincenzo, Margolus, Shor, Sleator, Smolin, Weinfurter (CR17) 1995; 52
Nielsen, Chuang (CR9) 2000
Dagmar, Gabor, Tim, Tobias, Jorg (CR1) 2007; 39
Zhou, Wang, Wu, Shi (CR16) 2012; 51
Shannon (CR2) 1949; 28
Venegas-Andraca, Bose (CR10) 2003; 5105
Grover (CR8) 1995
Le, Dong, Hirota (CR14) 2010; 10
W.K. Wootters (1274_CR15) 1982; 299
C.E. Shannon (1274_CR2) 1949; 28
R. Zhou (1274_CR16) 2012; 51
B. Dagmar (1274_CR1) 2007; 39
L.K. Grover (1274_CR8) 1995
A. Barenco (1274_CR17) 1995; 52
S.E. Venegas-Andraca (1274_CR10) 2003; 5105
1274_CR12
1274_CR6
S.E. Venegas-Andraca (1274_CR11) 2010; 9
1274_CR13
M. Nielsen (1274_CR9) 2000
W. Stallings (1274_CR3) 2010
R. Bose (1274_CR4) 2002
P.W. Shor (1274_CR7) 1994
P.Q. Le (1274_CR14) 2010; 10
W. Diffie (1274_CR5) 1967; 22
References_xml – volume: 5105
  start-page: 137
  year: 2003
  end-page: 147
  ident: CR10
  article-title: Storing, processing and retrieving and image using quantum mechanics
  publication-title: Quantum Inf. Comput.
– volume: 9
  start-page: 1
  issue: 1
  year: 2010
  end-page: 11
  ident: CR11
  article-title: Processing images in entangled quantum systems
  publication-title: Quantum Inf. Process.
  doi: 10.1007/s11128-009-0123-z
– volume: 51
  start-page: 705
  issue: 3
  year: 2012
  end-page: 723
  ident: CR16
  article-title: Quantum associative neural network with nonlinear search algorithm
  publication-title: Int. J. Theor. Phys.
  doi: 10.1007/s10773-011-0950-4
– volume: 52
  start-page: 3457
  issue: 5
  year: 1995
  end-page: 3467
  ident: CR17
  article-title: Elementary gates for quantum computation
  publication-title: Phys. Rev. A, Gen. Phys.
  doi: 10.1103/PhysRevA.52.3457
– start-page: 124
  year: 1994
  end-page: 134
  ident: CR7
  article-title: Algorithms for quantum computation: discrete log and factoring
  publication-title: Foundations of Computer Science, Proceedings of the 35th Annual Symposium
  doi: 10.1109/SFCS.1994.365700
– ident: CR12
– volume: 28
  start-page: 656
  issue: 4
  year: 1949
  end-page: 715
  ident: CR2
  article-title: Communication theory of secrecy systems
  publication-title: Bell Syst. Tech. J.
– start-page: 212
  year: 1995
  end-page: 219
  ident: CR8
  article-title: A fast quantum mechanical algorithm for database search
  publication-title: Proceedings of the Twenty-Eight Annual ACM Symposium on Theory of Computing
– ident: CR13
– volume: 10
  start-page: 63
  year: 2010
  end-page: 84
  ident: CR14
  article-title: A flexible representation of quantum images for polynomial preparation, image compression, and processing operations
  publication-title: Quantum Inf. Process.
  doi: 10.1007/s11128-010-0177-y
– volume: 39
  issue: 2
  year: 2007
  ident: CR1
  article-title: Quantum cryptography: a survey
  publication-title: ACM Comput. Surv.
  doi: 10.1145/1242471.1242474
– year: 2010
  ident: CR3
  publication-title: Cryptography and Network Security Principles and Practices
– year: 2002
  ident: CR4
  publication-title: Information Theory, Coding and Cryptography
– ident: CR6
– volume: 299
  start-page: 802
  year: 1982
  end-page: 803
  ident: CR15
  article-title: A single quantum cannot be cloned
  publication-title: Nature
  doi: 10.1038/299802a0
– volume: 22
  start-page: 644
  year: 1967
  end-page: 654
  ident: CR5
  article-title: New directions in cryptography
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.1976.1055638
– year: 2000
  ident: CR9
  publication-title: Quantum Computation and Quantum Information
– ident: 1274_CR12
– volume: 28
  start-page: 656
  issue: 4
  year: 1949
  ident: 1274_CR2
  publication-title: Bell Syst. Tech. J.
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– volume: 299
  start-page: 802
  year: 1982
  ident: 1274_CR15
  publication-title: Nature
  doi: 10.1038/299802a0
– ident: 1274_CR13
– volume-title: Information Theory, Coding and Cryptography
  year: 2002
  ident: 1274_CR4
– volume: 10
  start-page: 63
  year: 2010
  ident: 1274_CR14
  publication-title: Quantum Inf. Process.
– volume: 52
  start-page: 3457
  issue: 5
  year: 1995
  ident: 1274_CR17
  publication-title: Phys. Rev. A, Gen. Phys.
  doi: 10.1103/PhysRevA.52.3457
– start-page: 212
  volume-title: Proceedings of the Twenty-Eight Annual ACM Symposium on Theory of Computing
  year: 1995
  ident: 1274_CR8
– volume: 39
  issue: 2
  year: 2007
  ident: 1274_CR1
  publication-title: ACM Comput. Surv.
– start-page: 124
  volume-title: Foundations of Computer Science, Proceedings of the 35th Annual Symposium
  year: 1994
  ident: 1274_CR7
  doi: 10.1109/SFCS.1994.365700
– volume: 51
  start-page: 705
  issue: 3
  year: 2012
  ident: 1274_CR16
  publication-title: Int. J. Theor. Phys.
  doi: 10.1007/s10773-011-0950-4
– volume: 9
  start-page: 1
  issue: 1
  year: 2010
  ident: 1274_CR11
  publication-title: Quantum Inf. Process.
  doi: 10.1007/s11128-009-0123-z
– volume-title: Quantum Computation and Quantum Information
  year: 2000
  ident: 1274_CR9
– volume-title: Cryptography and Network Security Principles and Practices
  year: 2010
  ident: 1274_CR3
– volume: 22
  start-page: 644
  year: 1967
  ident: 1274_CR5
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.1976.1055638
– ident: 1274_CR6
– volume: 5105
  start-page: 137
  year: 2003
  ident: 1274_CR10
  publication-title: Quantum Inf. Comput.
SSID ssj0009048
Score 2.3941953
Snippet Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 1802
SubjectTerms Elementary Particles
Mathematical and Computational Physics
Physics
Physics and Astronomy
Quantum Field Theory
Quantum Physics
Theoretical
Title Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations
URI https://link.springer.com/article/10.1007/s10773-012-1274-8
Volume 52
WOSCitedRecordID wos000318373700010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1572-9575
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0009048
  issn: 0020-7748
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA66KnjxLa4vcvCkFGqaNulx1V0VZPGxyt5KO0l0YduVtiv470362AeooMeWSSiTycyXzmQ-hE5swST1pLAoMX-rPIdYPomkJWwahSaVx8qW-Xes2-X9vn9f3ePO6mr3OiVZeOqZy26MmdofQ8bBqMUX0ZKOdtzwNTw-vUw77dq0dL_6XKSxDa9Tmd9NMR-M5jOhRYDprP_r0zbQWoUncas0gE20IJMttFLUdUK2jeBhrFU3jvFtrB0HbieQfhZOAoeJwFdy8tgavo7SQf4WZ_hCBzaB9bv5sddyFBv6LcC9GbCrjXYHPXfavcsbq-JVsIBwnlsRCHXOpRcSQfSJjwMTDvGJijzmRG4EjvKpFwpPSQIeCTWmAL3tfcU5KFe5kbOLGskokXsIa3DiAFDBgTLqk_NQIypGIXSJUqH07CayawUHUDUdN9wXw2DaLtnoLtC6C4zuAt5Ep5Mh72XHjd-Ez-oVCarNl_0svf8n6QO0SkruC72yh6iRp2N5hJbhIx9k6XFhdF-Ax9Dg
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDI5ggODCGzGeOXACVerSrEmPAzY2MSYeA-1WtU4Ck7YOrRsS_56kjz0kQIJjKyeqHMf-UjufETqzBZPUlcKixPytch1ieSSUlrBpGJhUHksp85us1eKdjnef3eOO82r3PCWZeOqZy26Mmdof04yDUYsvoiWqA5YhzH98epky7do0db_6XKSxDc9Tmd9NMR-M5jOhSYCpbfzr0zbReoYncSU1gC20IKNttJLUdUK8g-BhrFU37uNGXzsOXI1g-Jk4CRxEAl_LyWOl9zoYdkdv_Rhf6sAmsH43P_ZGDvqm_Rbg9gzY1Ua7i55r1fZV3cr6KlhAOB9ZIQhV4tINiCD6xMeBCYd4RIUuc8JyCI7yqBsIV0kCLgk0pgC97T3FOaiyKofOHipEg0juI6zBiQNABQfKqEdKgUZUjEJQJkoF0rWLyM4V7ENGOm56X_T8KV2y0Z2vdecb3fm8iM4nQ95Txo3fhC_yFfGzzRf_LH3wJ-lTtFpv3zX9ZqN1e4jWSNoHQ6_yESqMhmN5jJbhY9SNhyeJAX4BVPjTxA
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwEA9-44vf4rd58Ekp69KsSR-n23Q4xsQpeyvtJdGB7WTtBP97k7XdB6ggPrZcSrlc737Xu_wOoQtbMEldKSxKzN8q1yGWR0JpCZuGgSnlsYwyv8Xabd7reZ18zmlSdLsXJcnsTINhaYrT0rtQpZmDb4yZPiAzmINRiy-iZWr66E26_vg8Zd21aeaKdY6kcQ4vyprfPWI-MM1XRcfBprH579fcQhs5zsTVzDC20YKMd9DquN8Tkl0EDyOt0lGEm5F2KLgew_Bz7DxwEAtck5PL6tvLYNhPX6MEX-uAJ7C-N7_2Vg4iM5YLcHcGBGtj3kNPjXr35s7K5y1YQDhPrRCEKnPpBkQQnQlyYMIhHlGhy5ywEoKjPOoGwlWSgEsCjTVAuwNPcQ6qoiqhs4-W4kEsDxDWoMUBoIIDZdQj5UAjLUYhqBClAunah8gulO1DTkZuZmK8-VMaZaM7X-vON7rz-SG6nCx5z5g4fhO-KnbHzz_K5Gfpoz9Jn6O1Tq3ht5rt-2O0TrLxGHqTT9BSOhzJU7QCH2k_GZ6NbfELYN7cqA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Quantum+Image+Encryption+and+Decryption+Algorithms+Based+on+Quantum+Image+Geometric+Transformations&rft.jtitle=International+journal+of+theoretical+physics&rft.au=Zhou%2C+Ri-Gui&rft.au=Wu%2C+Qian&rft.au=Zhang%2C+Man-Qun&rft.au=Shen%2C+Chen-Yi&rft.date=2013-06-01&rft.pub=Springer+US&rft.issn=0020-7748&rft.eissn=1572-9575&rft.volume=52&rft.issue=6&rft.spage=1802&rft.epage=1817&rft_id=info:doi/10.1007%2Fs10773-012-1274-8&rft.externalDocID=10_1007_s10773_012_1274_8
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-7748&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-7748&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-7748&client=summon