Open Access iconOpen Access

ARTICLE

Brownian-Perturbed Hénon Map for Image Encryption: Application in Biomedical Images

Walaa Alayed1, Asad Ur Rehman2, M.Awais Ehsan3, Waqar Ul Hassan4, Ahmed Zeeshan5,6,*

1 Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
2 Department of Mathematics, Capital University of Science & Technology (CUST), Islamabad, Pakistan
3 School of Natural Sciences, National University of Science and Technology, Islamabad, Pakistan
4 Department of Mathematics, Government College University, Lahore, Pakistan
5 Department of Mathematics & Statistics, Faculty of Science, International Islamic University Islamabad, H-10, Islamabad, Pakistan
6 Department of Mathematics, College of Science, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul, Republic of Korea

* Corresponding Author: Ahmed Zeeshan. Email: email

(This article belongs to the Special Issue: Advances in Secure Computing: Post-Quantum Security, Multimedia Encryption, and Intelligent Threat Defence)

Computers, Materials & Continua 2026, 88(1), 29 https://doi.org/10.32604/cmc.2026.078078

Abstract

The rapid growth in the field of data and cloud computing has made it essential to ensure information security. Encryption consists of multiple layers, among which a critical component is the Substitution box (S-box). The S-box provides nonlinearity and confusion between the original and cipher forms, and its performance directly determines the security of the cipher against cryptanalysis. Chaotic systems have been widely used for image encryption, however, they suffer from well known limitations such as deterministic periodicity and reduced unpredictability in finite field digital environments. To address these issues, we propose a new S-box generation scheme based on an improved chaotic map, which combines the Hénon chaotic map with Brownian motion, concept in thermodynamics. In the proposed method, the initial keys used in the permutation and diffusion stages interact with each other, thereby enhancing the complexity of the system. We leverage the sensitivity and periodicity of the Hénon map and inject a zigzag Brownian motion sequence into its iteration process to overcome limitations of standalone chaotic maps. The extended scheme is implemented, and a comprehensive security analysis is performed on various cipher images obtained through the modified design. The results of the analysis demonstrate strong security properties, while the running time of the proposed scheme is comparatively better. The proposed scheme is both novel and adaptable, making it suitable for enhancing resistance against differential and algebraic attacks. Hénon-map S-box with Brownian perturbation secures biomedical images (MRI/CT, ultrasound and Xrays) and biofluid sequences (micro-PIV/microfluidics). High unpredictability enables real-time encryption which preserves privacy of patient data/IP.

Keywords

Substitution boxes; cryptography; encryption; Hénon chaotic map; biomedical; biofluid; Brownian motion

Cite This Article

APA Style
Alayed, W., Rehman, A.U., Ehsan, M., Hassan, W.U., Zeeshan, A. (2026). Brownian-Perturbed Hénon Map for Image Encryption: Application in Biomedical Images. Computers, Materials & Continua, 88(1), 29. https://doi.org/10.32604/cmc.2026.078078
Vancouver Style
Alayed W, Rehman AU, Ehsan M, Hassan WU, Zeeshan A. Brownian-Perturbed Hénon Map for Image Encryption: Application in Biomedical Images. Comput Mater Contin. 2026;88(1):29. https://doi.org/10.32604/cmc.2026.078078
IEEE Style
W. Alayed, A. U. Rehman, M. Ehsan, W. U. Hassan, and A. Zeeshan, “Brownian-Perturbed Hénon Map for Image Encryption: Application in Biomedical Images,” Comput. Mater. Contin., vol. 88, no. 1, pp. 29, 2026. https://doi.org/10.32604/cmc.2026.078078



cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 305

    View

  • 49

    Download

  • 0

    Like

Share Link