Skip to main content
Log in

A novel image encryption scheme based on Brownian motion and PWLCM chaotic system

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Many encryption algorithms are directly based on the matrix transformation or their own definition of strict rules. We try to propose a new digital image encryption scheme to simulate physical phenomena rather than deliberately create rigid rules. First, the paper takes each pixel of the image as a Brownian particle, using the Monte Carlo method to simulate a Brownian motion, thus effectively scrambling the image. Then we diffuse the image with PWLCM chaotic system. To enhance the sensitivity of the key and the plaintext, we modified the initial value of PWLCM chaotic system. Experimental results and security analysis show that our method has good performance and can be used in image encryption and transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Wikipedia. http://en.wikipedia.org/wiki/Big_data

  2. Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  3. Williams, H.C.: A modification of the RSA public-key encrypt on procedure. IEEE Trans. Inf. Theory 26(6), 726–729 (1980)

    Article  MATH  Google Scholar 

  4. Deng, C., Luo, Y.: An optimized RSA digital image encryption algorithm and the analysis of its security. Manuf. Autom. 32(8), 40–43 (2010)

    Google Scholar 

  5. Linxian, Z.: Research of image encryption algorithm based on S-DES. In: Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE 2012), Hangzhou, China, pp. 184–187 (2012)

    Google Scholar 

  6. Chen, G.R., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  7. Ma, Z.g., Qiu, S.s.: An image encryption system based on general cat map. J. China Inst. Commun. 24(2), 51–57 (2003)

    Google Scholar 

  8. Mao, Y.B., Chen, G.R., Lian, S.G.: A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurc. Chaos 14(10), 3613–3624 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  9. Yuen, C.H., Wong, K.W.: A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl. Soft Comput. 11(8), 5092–5098 (2011)

    Article  Google Scholar 

  10. Zhang, Z., Wang, L.: Semiblind image watermarking algorithm in DCT domain with chaotic encryption. Comput. Eng. 29(17), 9–11 (2003)

    Google Scholar 

  11. Wang, X.Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)

    Article  MATH  Google Scholar 

  12. Zhu, H., Zhao, C., Zhang, X.: A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process. Image Commun. 28(6), 670–680 (2013)

    Article  Google Scholar 

  13. Guodong, Y., Kwok-Wo, W.: An image encryption scheme based on time-delay and hyperchaotic system. Nonlinear Dyn. 71(1–2), 259–267 (2013)

    Google Scholar 

  14. Guodong, Y., Kwok-Wo, W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69(4), 2079–2087 (2012)

    Article  Google Scholar 

  15. Xiaoqiang, Z., Guiliang, Z., Shilong, M.: Remote-sensing image encryption in hybrid domains. Opt. Commun. 285(7), 1736–1743 (2012)

    Article  Google Scholar 

  16. Xiaoqiang, Z., Guiliang, Z., Weiping, W., Mengmeng, W., Shilong, M.: Period law of discrete two-dimensional Arnold transformation. In: Proceedings of the 2010 Fifth International Conference on Frontier of Computer Science and Technology (FCST 2010), Changchun, China, pp. 565–569 (2010)

    Google Scholar 

  17. Cokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Phys. Lett. A 373(15), 1357–1360 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  18. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)

    Article  MATH  Google Scholar 

  19. Wang, X.Y., He, G.X.: Cryptanalysis on an image block encryption algorithm based on spatiotemporal chaos. Chin. Phys. 21(6), 060502 (2012)

    Article  Google Scholar 

  20. Wikipedia. http://en.wikipedia.org/wiki/Brownian_motion

  21. Shannon, C.E.: Bell Syst. Tech. J. 28, 656 (1949)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (Nos: 61370145, 61173183, and 60973152), the Doctoral Program Foundation of Institution of Higher Education of China (No: 20070141014), Program for Liaoning Excellent Talents in University (No: LR2012003), the National Natural Science Foundation of Liaoning province (No: 20082165), and the Fundamental Research Funds for the Central Universities (No: DUT12JB06).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xingyuan Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, X., Xu, D. A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75, 345–353 (2014). https://doi.org/10.1007/s11071-013-1070-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-013-1070-x

Keywords

Navigation