Open Access
ARTICLE
Brownian-Perturbed Hénon Map for Image Encryption: Application in Biomedical Images
1 Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
2 Department of Mathematics, Capital University of Science & Technology (CUST), Islamabad, Pakistan
3 School of Natural Sciences, National University of Science and Technology, Islamabad, Pakistan
4 Department of Mathematics, Government College University, Lahore, Pakistan
5 Department of Mathematics & Statistics, Faculty of Science, International Islamic University Islamabad, H-10, Islamabad, Pakistan
6 Department of Mathematics, College of Science, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul, Republic of Korea
* Corresponding Author: Ahmed Zeeshan. Email:
(This article belongs to the Special Issue: Advances in Secure Computing: Post-Quantum Security, Multimedia Encryption, and Intelligent Threat Defence)
Computers, Materials & Continua 2026, 88(1), 29 https://doi.org/10.32604/cmc.2026.078078
Received 23 December 2025; Accepted 26 February 2026; Issue published 08 May 2026
Abstract
The rapid growth in the field of data and cloud computing has made it essential to ensure information security. Encryption consists of multiple layers, among which a critical component is the Substitution box (S-box). The S-box provides nonlinearity and confusion between the original and cipher forms, and its performance directly determines the security of the cipher against cryptanalysis. Chaotic systems have been widely used for image encryption, however, they suffer from well known limitations such as deterministic periodicity and reduced unpredictability in finite field digital environments. To address these issues, we propose a new S-box generation scheme based on an improved chaotic map, which combines the Hénon chaotic map with Brownian motion, concept in thermodynamics. In the proposed method, the initial keys used in the permutation and diffusion stages interact with each other, thereby enhancing the complexity of the system. We leverage the sensitivity and periodicity of the Hénon map and inject a zigzag Brownian motion sequence into its iteration process to overcome limitations of standalone chaotic maps. The extended scheme is implemented, and a comprehensive security analysis is performed on various cipher images obtained through the modified design. The results of the analysis demonstrate strong security properties, while the running time of the proposed scheme is comparatively better. The proposed scheme is both novel and adaptable, making it suitable for enhancing resistance against differential and algebraic attacks. Hénon-map S-box with Brownian perturbation secures biomedical images (MRI/CT, ultrasound and Xrays) and biofluid sequences (micro-PIV/microfluidics). High unpredictability enables real-time encryption which preserves privacy of patient data/IP.Keywords
Cryptography is the practice and study of techniques for secure communication in the presence of adversaries. It is all about protecting and encrypting data so that if someone intercepts it during transmission, they are unable to read or understand the message [1]. The process of securing data in a certain way is called encryption [2]. Throughout history, encryption techniques have evolved from ancient methods like the Caesar cipher, key used method to today’s highly advanced systems [3]. As computational power and mathematical understanding have grown, old methods became easier to crack, making it essential to develop stronger and more sophisticated algorithms in order to stay one step ahead and keep communication safer.
A key theoretical leap was Kerckhoffs’s principle, which states that a cryptosystem should remain secure even if everything about the system except the secret key is publicly known [4], subsequently formulated by Claude Shannon as “The enemy knows the system” by which the approach to encryption can be publicly known, but not the key. From this, Shannon in 1945–1949 developed the basis of modern cryptography with his information theoretic analysis of secrecy systems [5]. Shannon defined the principles of confusion and diffusion, fundamental principles for block cipher design. Confusion hides relationships between key and cipher text, while diffusion disseminates the plain text structure throughout the output to prevent statistical attacks. Shannon also demonstrated that perfect secrecy, such that cipher text never provides any information on plain text, is attainable only with a key length equivalent to that of the message, as with the one time pad. In the contemporary age, cryptography divides into symmetric and asymmetric techniques, symmetric encryption employs one and the same key for decryption and encryption [2]. Block ciphers such as DES (Data Encryption Standard) and AES (Advanced Encryption Standard) employ substitution–permutation networks, where S-boxes introduce confusion and permutation layers provide diffusion. Asymmetric encryption is based on pairs of keys, one public and another private, to encrypt and decrypt communication [6]. Such schemes usually rely on difficult mathematical problems such as integer factorization or discrete logarithms. Elliptic Curve Cryptography (ECC) is a new, compact scheme for safe key exchange.
S-boxes play a pivotal role in symmetric key cryptography as the primary source of nonlinearity and confusion in block cipher algorithms [7]. A cryptographically secure S-box should exhibit certain properties [8], it must be a bijective mapping (permutation) to prevent cipher degeneracies, and it should have high Nonlinearity (NL) to resist linear cryptanalysis [9]. It should also satisfy the Strict Avalanche Criterion (SAC), a single-bit change in input flips about 50 percent of output bits, and the Bit Independence Criterion (BIC), output bit changes should be statistically independent [10]. Furthermore, a good S-box has low Differential Uniformity (DU) (minimizing the probability that a given input difference leads to a particular output difference), thereby resisting differential cryptanalysis [11]. Low maximum linear approximation probability (LAP) is desired for resistance to linear cryptanalysis, and high algebraic complexity (e.g., high algebraic degree) helps resist algebraic attacks [12]. Achieving all these properties simultaneously in an S-box is challenging, especially for larger S-box sizes (
In this work, we propose an enhanced chaos-based S-box generation method that synergistically combines the 2D Hénon map with Brownian motion. The Hénon map is a well known discrete time chaotic system with proven chaotic dynamics and a two dimensional state that provides more complexity than 1D maps. Brownian motion, on the other hand, is a stochastic process characterized by random, continuous movements, intuitively, the irregular zigzag movement of particles suspended in fluid (also known as a Wiener process in mathematical terms). By injecting a Brownian motion component into the iterative process of the Hénon map, we effectively introduce an external source of randomness that perturbs the chaotic trajectory in a controlled manner. This hybrid approach yields a composite chaotic system with improved unpredictability, reduced periodicity, and greater entropy compared to the use of the Hénon map alone. In essence, the Brownian perturbation continually perturbs the deterministic chaos, preventing it from settling into short cycles and ensuring a broader exploration of state space. We leverage this enhanced chaos to generate S-boxes that are highly random yet reproducible (with a secret key seed) and that fulfill the strict criteria for cryptographic substitution components. The Brownian perturbed Hénon (BPH) map is ideal for privacy safe encryption of biomedical and biofluid imaging in real time, without degrading diagnostic quality. The main contributions of the paper are:
1. A hybrid Brownian perturbed Hénon chaotic map is proposed to mitigate finite-precision degradation in chaos based S-box generation.
2. A deterministic, key dependent S-box construction framework is developed using rank order mapping, guaranteeing bijectivity and cryptographic soundness.
3. The proposed hybrid map enhances robustness by combining deterministic chaos with controlled stochastic perturbations, resulting in increased unpredictability and improved statistical complexity compared with conventional chaotic maps.
4. The controlled Brownian perturbations in the proposed map are specifically designed to suppress periodicity inherent in finite precision implementations while preserving determinism and key dependence.
The remainder of the paper is organized as follows. In Section 2, we review existing S-box design approaches and their limitations. Section 3 introduces the necessary preliminaries, including the Hénon chaotic map and discrete Brownian motion. Section 4 presents the proposed S-box generation method in detail. In Section 5, we evaluate the cryptographic properties of the proposed S-box and compare them with existing state-of-the-art designs. Section 6 demonstrates the effectiveness of the proposed S-box in image encryption through statistical and graphical analysis. Finally, Section 7 concludes the paper and outlines directions for future research.
Over the past few decades, diverse approaches have been developed for constructing S-boxes, each with its own philosophy and trade-offs. We categorize them into a few broad categories, algebraic constructions, chaos-based methods, heuristic techniques and cipher derived S-boxes, and discuss how our work relates to and improves upon these.
Many classical ciphers use S-boxes designed with algebraic structures or human crafted criteria. The AES S-box, for example, is constructed by inverting elements in the finite field
The literature shows a trade-off between structured approaches (algebraic, manual design) that give provable optimality in some criteria, and automated or chaotic approaches that can generate many alternative S-boxes but require careful analysis to ensure no weaknesses.
There are various ways to counter the shortcomings in chaotic systems. Chaos anti control methods are aimed at producing and improving chaotic phenomena by the application of control inputs, and they were applied in the study of chaotic encryption algorithms [35]. Stochastic perturbation approaches add random or noising perturbations to modify trajectories in the system, which helps affecting the escape rates and fractal properties found in chaotic systems [36]. Hybrid perturbation delay methods involve periodically disturbing system parameters to account for the digital precision effect and to achieve ergodicity [37]. Even these methods can be used for increasing the complexity of a system, however, they involve either increased structural complexity or parameter adjustments. Brownian motion, on the other hand, is a well known stochastic process for diffusion, which can be coupled with a pre-existing chaotic map for controlled randomness, efficient trajectory diffusion within phase space, and compensation for finite precision without incurring too much computational expense. The use of Brownian motion in chaos based cryptographic systems has proven useful for improving pseudo random sequence statistical properties and encrypting performance [38].
Our work combines two different sources, Hénon and Brownian, to form a composite chaotic system. A closely related prior effort is the work by Harmouch and El Kouch (2018) on using Brownian motion to generate
This section introduces the basic concepts and mathematical tools used to construct cryptographically robust S-boxes. We cover the Hénon chaotic map, discrete Brownian motion, and rank order mapping for generating bijective permutations.
The Hénon map is a two dimensional discrete time dynamical system introduced by Michel Hénon [41]. It exhibits chaotic behavior for certain parameter values and is defined as:
where
which shows that the map is area preserving. An area preserving chaotic map is a conservative dynamical system whose Jacobian determinant equals unity, ensuring that phase-space area remains invariant under iteration. This property is fundamental to its chaotic dynamics. The Hénon attractor is presented in Fig. 1a and Orbit diagram for the Hénon map, keeping b = 0.3 and varying a is shown in Fig. 1b. The plot shows the classic period doubling route to chaos.

Figure 1: Hénon map results: (a) Attractor and (b) Orbit diagram.
Brownian motion is a continuous time stochastic process with independent Gaussian increments. In digital implementations, it is commonly approximated in discrete time as a cumulative sum of zero mean random increments, referred to as discrete Brownian motion [42].
where

Figure 2: Multiple independent realizations of discrete Brownian motion.
3.3 Rank Order Mapping: Generating Permutations
Rank-order mapping is a mathematical technique to transform a real-valued sequence into a unique permutation of integers [44]. This is particularly useful when a continuous sequence, such as one generated by a chaotic map or a discrete Brownian motion needs to be converted into a discrete bijective sequence. Let
the rank-order mapping produces a permutation P of
1. Sort H in ascending order and record the original indices
2. Define the permutation
This procedure ensures that each element of the original sequence is assigned a unique rank, which will help us yielding a bijective mapping suitable for later use in constructions of S-boxes.
4 Proposed S-Box Generation Method
This section presents our method for constructing cryptographically strong S-boxes by combining a hybrid Hénon chaotic map with key dependent Brownian perturbations and applying deterministic rank-order mapping [44]. The procedure ensures sensitive dependence on the secret key while mitigating finite precision artifacts inherent to digital chaotic systems.
4.1 Hybrid Hénon-Brownian Chaotic Source
To enhance the unpredictability of the Hénon map in finite precision computations, we inject small key dependent Brownian perturbations into the system. Let
where
Fig. 3 illustrates the phase space trajectories of the Hénon map after introducing controlled Brownian perturbations into its iterative process. Each trajectory corresponds to an independent realization generated using different pseudo random seeds while keeping the chaotic parameters fixed. Compared with the classical Hénon attractor under finite precision arithmetic, the perturbed system exhibits increased trajectory dispersion and reduced recurrence of short periodic orbits. This behavior indicates that the Brownian perturbation disrupts deterministic numerical artifacts and mitigates degradation effects commonly observed in digital chaotic implementations.

Figure 3: Trajectory of the Hénon map with Brownian perturbations applied at each step.
4.2 Key Dependent Initialization
The secret key K initializes the system as follows:
1. Apply a key derivation function (KDF) to K.
2. Extract the initial states
3. Seed the PRNG for generating Gaussian increments
Each key produces a unique chaotic trajectory, ensuring that the resulting S-box is key-dependent and distinct.
4.3 Optional 3D Brownian Perturbation
While the Hénon map is two-dimensional, the principle of Brownian perturbation can be extended to three dimensions for applications such as image encryption. 3D Brownian perturbation introduces multidimensional
4.4 S-Box Construction via Rank-Order Mapping
Using the chaotic trajectory generated by the hybrid system, a bijective S-box is obtained through rank order mapping. Let
1. Discard the first
2. Collect the next N values
3. Sort H in ascending order and record the original indices
4. Define the S-box permutation
This method guarantees a bijective, key dependent S-box with strong diffusion properties while mitigating finite precision artifacts in the chaotic system.
4.5 Hénon–Brownian S-Box Generator Algorithm
Algorithm 1 describes the step-by-step procedure employed to construct the Hénon–Brownian S-box generator.

4.6 Toy Example: 4
To illustrate the procedure of Algorithm 1, we consider a small-scale example with
After discarding
Applying rank-order mapping, we obtain the permutation index array:
Finally, the resulting
This example demonstrates the same procedure as Algorithm 1, but on a smaller scale for clarity. The full
4.7 Discussion on Proposed Method
We now discuss how parameters are chosen in practice and why these choices contribute to both functionality and security of our Proposed method.
Each stage of the construction is governed by parameters that balance chaotic richness with numerical stability:
1. Hénon map parameters
2. Perturbation scales
3. Transient length
4. Sequence length N: For an
5. PRNG seeding: The Gaussian increments used in perturbation are generated from a pseudo random number generator seeded with the secret key, ensuring both reproducibility and key dependence.
4.7.2 Remarks and Implementation Guideline
The proposed framework admits several natural extensions and practical considerations. Larger S-boxes can be generated by increasing the sequence length N, while multiple S-boxes may be obtained by exploiting different chaotic coordinates. Furthermore, the perturbation principle is not restricted to two dimensions; its extension into three dimensions enables stronger shuffling mechanisms in multimedia and image encryption applications. In all such cases, parameter values must be tuned to preserve both chaotic behavior and the small perturbation scales that underpin security.
From an implementation perspective, double-precision floating point arithmetic is recommended in order to maximize the effective state space and reduce numerical artifacts arising from finite precision. When applying rank-order mapping, a stable sorting procedure should be used to ensure consistency in the presence of potential ties. Finally, if the S-box is intended for high-assurance scenarios where secrecy is critical, the Gaussian increments driving perturbations should be generated by a cryptographically secure PRNG, ensuring resistance against adversarial reconstruction attempts.
4.7.3 S-Boxes Generated Using Proposed Scheme
In the proposed scheme, we present generated S-boxes. These S-Boxes provide better resistance against cryptanalytic attacks. The constructed S-Boxes are presented in Tables 1 and 2.


We generated a number of
5.1 S-Box Generation Time Analysis
The computational efficiency of our proposed Hénon Brownian S-box generation method was evaluated by measuring the time taken to generate each S-box for a set of different keys. Fig. 4 shows the generation times for 20 representative keys. The Fig. 4 indicates that the time remains fairly consistent across different keys, with minor variations due to the random initialization in the Hénon Brownian process. The average generation time per S-box is approximately 0.01 s, demonstrating that our method is computationally efficient and suitable for practical cryptographic applications.

Figure 4: Generation time for Hénon Brownian S-boxes across 20 different keys.
5.2 Cryptographic Properties of the Proposed S-Box
The strength of any S-box is determined by its ability to withstand cryptanalytic attacks. To this end, the proposed S-box has been evaluated against the standard set of cryptographic properties that ensure confusion, diffusion, and resistance to both linear and differential attacks.
Bijectivity:
By construction, the S-box is a permutation of 0–255, hence bijective (one-to-one and onto). It can be seen in Fig. 5 that all 256 output values are unique and every input maps to a unique output. There were no fixed points in our S-box (i.e., no input

Figure 5: Bijectivity analysis of the proposed S-box.
Nonlinearity:
The nonlinearity of an S-box is measured as the minimum Hamming distance of its output Boolean functions from all affine functions [9]. For an

Figure 6: Walsh–Hadamard spectrum of an output bit.
Strict Avalanche Criterion (SAC):
We tested SAC by flipping each input bit and observing the change in output. The average number of output bits that change was 3.994 out of 8 (49.925 percent), which is essentially the ideal 50 percent [45]. Each of the 8 input bits individually showed close to 50 percent avalanche effect, with no weak input bit. Satisfying SAC means a one-bit difference in input leads to a completely different output, ensuring strong diffusion as shown in Fig. 7.

Figure 7: Strict Avalanche Criterion (SAC) results of the proposed S-box.
Bit Independence Criterion (BIC):
BIC refines the SAC by additionally testing whether output bits change independently when a single input bit is flipped [46]. We evaluated the BIC–SAC values by computing correlations between the avalanche patterns of different output bits. All correlation values were found to be very close to zero (

Figure 8: BIC–SAC analysis of the proposed S-box.
Comparison
To validate the effectiveness of the proposed S-boxes, we compared their cryptographic performance with several state-of-the-art S-boxes reported in recent literature. Table 3 presents a comprehensive comparison in terms of NL, SAC, BIC, and DU. The proposed S-boxes achieve high average nonlinearity (around 106–106.5) and well-balanced SAC values close to the ideal 0.5, while maintaining a low maximum differential probability of 0.0469. These results demonstrate that our S-boxes not only provide strong confusion and diffusion properties but also surpass many existing constructions, highlighting their robustness against classical cryptanalytic attacks.
6 Application in Image Encryption
To demonstrate the practical utility of the proposed S-box, we apply it to image encryption. Digital images contain a high degree of correlation among adjacent pixels, which makes them vulnerable to statistical attacks if not sufficiently diffused and confused. The nonlinearity and key-dependence of our S-box design provide an effective mechanism for breaking this correlation and achieving secure encryption.
Let
1. S-box generation: Generate a collection S of
2. Selection matrix: Construct an
3. Pixel substitution: For each pixel
thereby obtaining the ciphertext image
The decryption process follows the same procedure in reverse using the identical secret key. Since each S-box in the set S is bijective, its inverse
Fig. 9 illustrates the plain, encrypted, and decrypted images, demonstrating that the proposed scheme produces noise-like ciphertext while allowing exact recovery of the original image without any loss of visual information.

Figure 9: Visual comparison of plain, encrypted and decrypted images using the proposed S-box.
In addition to visual inspection, a quantitative analysis was carried out to evaluate the correlation and entropy of the encrypted images. Table 4 reports the correlation coefficients of adjacent pixels in horizontal, vertical, and diagonal directions, along with entropy values, for both plain and encrypted images. The plain images exhibit high pixel correlation, which is expected due to the natural redundancy in images. However, after encryption, the correlation drops close to zero in all directions, indicating effective removal of statistical dependencies. Furthermore, the entropy values of the encrypted images approach the ideal value of 8, confirming that the proposed scheme produces cipher texts with high randomness and resistance against statistical attacks.

In this work, we presented a novel methodology for constructing S-boxes with strong cryptographic properties. The proposed S-boxes were thoroughly evaluated using well established criteria such as Bijectivity, NL, SAC and BIC. In addition, their practical effectiveness was demonstrated through image encryption experiments. The visual inspection of encrypted images, together with correlation and entropy analysis, confirmed that the proposed scheme achieves high confusion and diffusion, produces cipher texts with noise like statistical distributions, and effectively removes redundancy from plain images. These results highlight the robustness of the proposed design against classical cryptanalytic and statistical attacks. Additionally, the high key sensitivity ensures that minimal variations in the secret key yield completely different S-boxes and encrypted outputs, further strengthening resilience against key related attacks.
Although the proposed approach shows promising results, there remain several interesting directions for future research. One avenue is to investigate adaptive or key-dependent S-box generation mechanisms, which can dynamically modify substitution layers to resist structural attacks more effectively. Another direction is to explore the integration of the proposed S-boxes into full fledged block and stream cipher architectures, evaluating performance metrics such as throughput, latency, and energy consumption in practical implementations. Moreover, a systematic study on the robustness of the proposed S-boxes against emerging attack paradigms, including algebraic attacks, and machine learning assisted cryptanalysis, can provide additional confidence in their security. Finally, extending the methodology to lightweight and resource constrained environments can ensure that strong cryptographic properties are achieved without compromising efficiency.
Acknowledgement: The authors gratefully acknowledge the support provided by Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Funding Statement: This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number PNURSP2026R500, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Author Contributions: Walaa Alayed: conceptualization, validation, writing—review and editing, funding acquisition. Asad Ur Rehman: methodology, formal analysis. M. Awais Ehsan: methodology, software, investigation, writing—original draft preparation. Waqar Ul Hassan: validation, visualization, writing. Ahmed Zeeshan: conceptualization, formal analysis, supervision, writing—review and editing. All authors reviewed and approved the final version of the manuscript.
Availability of Data and Materials: Data will be available on request. Ahmed Zeeshan (ahmad.zeeshan@iiu.edu.pk). Datasets used are publicly available.
Ethics Approval: This study does not involve human participants, animals, or any clinical trials. All image data used in the experiments are publicly available benchmark images; therefore, ethical approval was not required.
Conflicts of Interest: The authors declare no conflicts of interest.
References
1. Paar C, Pelzl J. Understanding cryptography. Vol. 1. Cham, Switzerland: Springer; 2010. [Google Scholar]
2. Bellare M, Desai A, Jokipii E, Rogaway P. A concrete security treatment of symmetric encryption. In: Proceedings 38th Annual Symposium on Foundations of Computer Science. Piscataway, NJ, USA: IEEE; 1997. p. 394–403. [Google Scholar]
3. Davies D. A brief history of cryptography. Inf Secur Tech Report. 1997;2(2):14–7. [Google Scholar]
4. Stallings W. Network and internetwork security: principles and practice. Saddle River, NJ, USA: Prentice-Hall, Inc.; 1995 [cited 2026 Feb 2]. Available from: https://dl.acm.org/doi/abs/10.5555/193189. [Google Scholar]
5. Shannon CE, Weaver W. The mathematical theory of communication. Champsaign, IL, USA: University of Illinois Press; 1998. [Google Scholar]
6. Farah S, Javed Y, Shamim A, Nawaz T. An experimental study on performance evaluation of asymmetric encryption algorithms. In: Recent Advances in Information Science, Proceeding of the 3rd European Conference of Computer Science,(EECS-12). Athens, Greece: WSEAS; 2012. p. 121–4. [Google Scholar]
7. Buchmann J, Buchamann J. Introduction to cryptography. Vol. 335. Cham, Switzerland: Springer; 2004. [Google Scholar]
8. Mohamed K, Pauzi MNM, Ali FHHM, Ariffin S, Zulkipli NHN. Study of s-box properties in block cipher. In: 2014 International Conference on Computer, Communications, and Control Technology (I4CT). Piscataway, NJ, USA: IEEE; 2014. p. 362–6. [Google Scholar]
9. Nyberg K. Perfect nonlinear s-boxes. In: Workshop on the Theory and Application of of Cryptographic Techniques. Cham, Switzerland: Springer; 1991. p. 378–86. doi: 10.1007/3-540-46416-6_32. [Google Scholar] [CrossRef]
10. VERGİLİ I, Yücel MD. Avalanche and bit independence properties for the ensembles of randomly chosen n∖times n s-boxes. Turkish J Electr Eng Comput Sci. 2001;9(2):137–46. [Google Scholar]
11. Blondeau C, Canteaut A, Charpin P. Differential properties of
12. Courtois NT, Meier W. Algebraic attacks on stream ciphers with linear feedback. In: International Conference on the Theory and Applications of Cryptographic Techniques. Cham, Switzerland: Springer; 2003. p. 345–59. [Google Scholar]
13. Sankpal PR, Vijaya P. Image encryption using chaotic maps: a survey. In: 2014 Fifth International Conference on Signal and Image Processing. Piscataway, NJ, USA: IEEE; 2014. p. 102–7. [Google Scholar]
14. De Micco L, Antonelli M, Rosso OA. From continuous-time chaotic systems to pseudo random number generators: analysis and generalized methodology. Entropy. 2021;23(6):2021–671. doi:10.3390/e23060671. [Google Scholar] [PubMed] [CrossRef]
15. Beirami A, Nejati H, Callegari S. Fundamental performance limits of chaotic-map random number generators. In: 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton). Piscataway, NJ, USA: IEEE; 2014. p. 1126–31. [Google Scholar]
16. Klöwer M, Coveney PV, Paxton EA, Palmer TN. Periodic orbits in chaotic systems simulated at low precision. Sci Rep. 2022;13(1):2023–11410. doi:10.21203/rs.3.rs-2223046/v1. [Google Scholar] [CrossRef]
17. Li S, Chen G, Mou X. On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcat Chaos. 2005;15(10):3119–51. doi:10.1142/s0218127405014052. [Google Scholar] [CrossRef]
18. Ahmad M, Alkanhel RI, Soliman NF, Algarni AD, El-Samie FEA, El-Shafai W. Securing healthcare data in iomt network using enhanced chaos based substitution and diffusion. Comput Syst Sci Eng. 2023;47(2):2361–80. doi:10.32604/csse.2023.038439. [Google Scholar] [CrossRef]
19. Deng Q, Wang C, Sun Y, Yang G. Discrete memristive conservative chaotic map: dynamics, hardware implementation, and application in secure communication. IEEE Trans Cybern. 2025;55(8):3926–34. doi:10.1109/tcyb.2025.3565333. [Google Scholar] [PubMed] [CrossRef]
20. Abba A, Teh JS, Alawida M. Towards accurate keyspace analysis of chaos-based image ciphers. Multimed Tools Appl. 2024;83(33):79047–66. doi:10.1007/s11042-024-18628-8. [Google Scholar] [CrossRef]
21. Zhang B, Liu L. Chaos-based image encryption: review, application, and challenges. Mathematics. 2023;11(11):2585. [Google Scholar]
22. Gao J, Shen Y, Li S, Zhang J. An enhanced hybrid chaotic system and its application in image encryption. J King Saud Univ Comput Inf Sci. 2025;37(9):295. doi:10.1007/s44443-025-00320-y. [Google Scholar] [CrossRef]
23. Andreatos AS, Leros AP. Secure chaotic cryptosystem for 3D medical images. Mathematics. 2025;13(20):3310. doi:10.3390/math13203310. [Google Scholar] [CrossRef]
24. Song K, Imran N, Chen JY, Dobbins AC. A hybrid chaos-based cryptographic framework for post-quantum secure communications. arXiv:2504.08618. 2025. doi:10.48084/etasr.12471. [Google Scholar] [CrossRef]
25. Daemen J, Rijmen V. AES proposal: Rijndael, Tech. rep., NIST AES candidate submission, version 2. 1999 [cited 2026 Feb 2]. Available from: https://www.cs.miami.edu/home/burt/learning/Csc688.012/rijndael/rijndael_doc_V2.pdf. [Google Scholar]
26. Parikh C, Patel P. Performance evaluation of AES algorithm on various development platforms. In: 2007 IEEE International Symposium on Consumer Electronics. Piscataway, NJ, USA: IEEE; 2007. p. 1–6. [Google Scholar]
27. IBM. Data encryption standard. Federal Information Processing Standards Publication. 1999[cited 2026 Feb 2]. Available from: https://academickids.com/encyclopedia/index.php/Data_Encryption_Standard. [Google Scholar]
28. Sakallı MT, Aslan B, Buluş E, Mesut AŞ, Büyüksaraçoğlu F, Karaahmetoğlu O. On the algebraic expression of the AES s-box like s-boxes. In: International Conference on Networked Digital Technologies. Cham, Switzerland: Springer; 2010. p. 213–27. [Google Scholar]
29. Gaabouri IEl, Senhadji M, Belkasmi M, Bhiri BEl. A new s-box pattern generation based on chaotic enhanced logistic map: case of 5-bit s-box. Cybersecurity. 2024;7(1):2024–59. doi:10.1186/s42400-024-00254-4. [Google Scholar] [CrossRef]
30. James D, Priya TL. An innovative approach for dynamic key dependent s-box to enhance security of IoT systems. Measurement: Sensors. 2023;30:100923. doi:10.1016/j.measen.2023.100923. [Google Scholar] [CrossRef]
31. Nagaraj N, Shastry MC, Vaidya PG. Increasing average period lengths by switching of robust chaos maps in finite precision. Eur Phys J Spec Top. 2008;165(1):73–83. doi:10.1140/epjst/e2008-00850-4. [Google Scholar] [CrossRef]
32. Nazish M, Javid M, Banday MT. Enhanced logistic map with infinite chaos and its applicability in lightweight and high-speed pseudo-random bit generation. Cybersecurity. 2025;8(1):24. doi:10.1186/s42400-024-00319-4. [Google Scholar] [CrossRef]
33. Namuq J. S-box design utilizing 3D chaotic maps for cryptographic application. Magalla Al-Basra Al-Ulūm Al-Handasiyya. 2024;24(2):68–73. [Google Scholar]
34. Zhang R, Shu R, Wei Y, Zhang H, Wu X. A novel s-box generation methodology based on the optimized gan model. Comput Mater Contin. 2023;76(2):1911–27. doi:10.32604/cmc.2023.041187. [Google Scholar] [CrossRef]
35. Wang S, He J. Design of chaotic systems with multiple scrolls via anti-control method and its encryption application. IAENG Intl J Appl Math. 2024;54(12):2636–44. [Google Scholar]
36. Liu T, Wan X-J, Zhou Z. Novel two-stage uncertainty optimization design of a compliant finger based on stochastic perturbation approach. Appl Math Model. 2025;142(11):115952. doi:10.1016/j.apm.2025.115952. [Google Scholar] [CrossRef]
37. Xiang H, Liu L. A new perturbation-feedback hybrid control method for reducing the dynamic degradation of digital chaotic systems and its application in image encryption. Multimed Tools Appl. 2021;80(13):19237–61. doi:10.1007/s11042-021-10680-y. [Google Scholar] [CrossRef]
38. Premkumar R, Mahdal M, Elangovan M. An efficient chaos-based image encryption technique using bitplane decay and genetic operators. Sensors. 2022;22(20):8044. doi:10.3390/s22208044. [Google Scholar] [PubMed] [CrossRef]
39. Harmouch Y, Kouch REl. Brownian techniques for constructing high-strong cryptographic s-boxes. In: Proceedings of the 2nd International Conference on Smart Digital Environment; 2018 Oct 18–20; Rabat, Morocco. p. 19–26. [Google Scholar]
40. Nazish M, Bandy MT. e-cm: a novel approach to advancing chaotic dynamics in discrete one-dimensional maps for secure IoT applications. Cybersecurity. 2025;8(1):71. [Google Scholar]
41. Hénon M. A two-dimensional mapping with a strange attractor. Commun Math Phys. 1976;50(1):69–77. doi:10.1007/bf01608556. [Google Scholar] [CrossRef]
42. Zainalabideen A, Suwais K, El-Bakry H, Abdelmaksoud I. Brownian motion models: cryptographic applications, capabilities, and limitations. Frontiers Comput Sci. 2025;7:1649256. doi:10.3389/fcomp.2025.1649256. [Google Scholar] [CrossRef]
43. Coeurjolly J-F. Estimating the parameters of a fractional brownian motion by discrete variations of its sample paths. Stat Inference Stoch Process. 2001;4(2):199–227. doi:10.1023/a:1017507306245. [Google Scholar] [CrossRef]
44. Gnedin A. Coherent random permutations with record statistics. In: 2007 Conference on Analysis of Algorithms, AofA 07. Nancy, France: Discrete Mathematics & Theoretical Computer Science; 2007. p. 157–70. [Google Scholar]
45. Kim K, Matsumoto T, Imai H. A recursive construction method of s-boxes satisfying strict avalanche criterion. In: Conference on the Theory and Application of Cryptography. Cham, Switzerland: Springer; 1990. p. 565–74. [Google Scholar]
46. Levinskas M, Mihalkovich A. Avalanche effect and bit independence criterion of perfectly secure shannon cipher based on matrix power. Math Models Eng. 2021;7(3):50–3. [Google Scholar]
47. Garipcan AM, Aydin Y, Özkaynak F. An efficient 2D hyper chaos and DNA encoding-based S-box generation method using chaotic evolutionary improvement algorithm for nonlinearity. Chaos Soliton Fract. 2025;191(9):115952. doi:10.1016/j.chaos.2024.115952. [Google Scholar] [CrossRef]
48. Garipcan AM, Aydın Y, Özkaynak F. A novel S-box generation method based on metastable inducing over FPGA for block ciphers. Knowl Based Syst. 2025;310:112968. [Google Scholar]
49. Aydin Y, Garipcan AM, Özkaynak F. A novel secure S-box design methodology based on FPGA and SHA-256 hash algorithm for block cipher algorithms. Arab J Sci Eng. 2025;50(2):1247–60. doi:10.1007/s13369-024-09251-8. [Google Scholar] [CrossRef]
50. Wu W, Kong L. Image encryption algorithm based on a new 2D polynomial chaotic map and dynamic S-box. Signal Image Video Processing. 2024;18(4):3213–28. doi:10.1007/s11760-023-02984-3. [Google Scholar] [CrossRef]
51. Savadkouhi MB, Tootkaboni MA. S-boxes design based on the Lu-Chen system and their application in image encryption. Soft Comput. 2024;28(20):12119–40. doi:10.1007/s00500-024-09912-8. [Google Scholar] [CrossRef]
52. Haider T, Azam NA, Hayat U. A novel image encryption scheme based on ABC algorithm and elliptic curves. Arab J Sci Eng. 2023;48(8):9827–47. doi:10.1007/s13369-022-07383-3. [Google Scholar] [CrossRef]
53. Corona-Bermúdez E, Chimal-Eguía JC, Corona-Bermúdez U, Rivero-Ángeles ME. Chaos meets cryptography: developing an S-box design with the Rössler attractor. Mathematics. 2023;11(22):4575. [Google Scholar]
54. Khan H, Hazzazi MM, Jamal SS, Hussain I, Khan M. New color image encryption technique based on three-dimensional logistic map and grey wolf optimization based generated substitution boxes. Multimed Tools Appl. 2023;82(5):6943–64. [Google Scholar]
55. Hayat U, Ullah I, Murtaza G, Azam NA, Bustamante MD. Enumerating discrete resonant rossby/drift wave triads and their application in information security. Mathematics. 2022;10(23):4395. doi:10.3390/math10234395. [Google Scholar] [CrossRef]
56. Murtaza G, Azam NA, Hayat U. Designing an efficient and highly dynamic substitution-box generator for block ciphers based on finite elliptic curves. Secur Commun Netw. 2021;2021:3367521. doi:10.1155/2021/3367521. [Google Scholar] [CrossRef]
57. Farah MB, Farah A, Farah T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 2020;99(4):3041–64. doi:10.1007/s11071-019-05413-8. [Google Scholar] [CrossRef]
Cite This Article
Copyright © 2026 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools