Kybernetika 62 no. 1, 115-132, 2026

Securing images via Vasicek process and chaotic map

Hajar Ahalli, Abderrahim Aslimani, Khalid Charif and Mohamed El OuafiDOI: 10.14736/kyb-2026-1-0115

Abstract:

We propose a novel image encryption algorithm based on the stochastic Vasicek process and a modified chaotic logistic map. The proposed algorithm relies on the Fridrich confusion-diffusion structure. In the initialization step, we generate process parameters and an initialization state from a secret key of arbitrary length. Then the Vasicek process performs several iterations, where the number of iterations is generated at each step by the secret key. The floating point numbers generated by the process are discretized to generate the permutation for pixel confusion, and then generate pseudo-random sequences to diffuse the pixel values. The confusion-diffusion process can be applied for several rounds to improve the encryption performance. Experimental results and security analysis show that our model has good performance. The algorithm has a large key space, passes statistical analysis and has a strong resistance to differential attacks, which confirms that our algorithm is safe and efficient.

Keywords:

image encryption, Vasicek process, logistic map, diffusion, confusion

Classification:

65H05, 65F10

References:

  1. A. Akhshani, A. Akhavan, S.-C. Lim and Z. Hassan: An image encryption scheme based on quantum logistic map. Commun. Nonlinear Sci. Numer. Simul. 17 (2012), 4653-4661.   DOI:10.1016/j.cnsns.2012.05.033
  2. G. Alvarez and S. Li: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation Chaos 16 (2006), 2129-2151.   DOI:10.1142/S0218127406015970
  3. G. Alvarez, F. Montoya, M. Romera and G. Pastor: Cryptanalysis of an ergodic chaotic cipher. Phys. Lett. A 311 (2003), 172-179.   DOI:10.1016/S0375-9601(03)00469-9
  4. G. Bertoni, J. Daemen, M. Peeters and G. Van Assche: Sponge-based pseudo-random number generators. In: Cryptographic Hardware and Embedded Systems (CHES), Springer, Berlin 2010, pp. 33-47.   CrossRef
  5. T. Björk: Arbitrage Theory in Continuous Time. Oxford Univ. Press, Oxford 2009.   CrossRef
  6. K. Charif, A. Drissi and Z. E. A. Guennoun: A pseudo random number generator based on chaotic billiards. A. A. 3 (2017), 2.   CrossRef
  7. K. Charif and Z. E. A. Guennoun: A novel image encryption algorithm based on chaotic billiards. J. Discrete Math. Sci. Cryptogr. 24 (2021), 129-154.   CrossRef
  8. S. Chen and J. Lü: Parameters identification and synchronization of chaotic systems based upon adaptive control. Phys. Lett. A 299 (2002), 353-358.   DOI:10.1016/S0375-9601(02)00522-4
  9. P. P. Deepthi, V. S. Nithin and P. S. Sathidevi: Implementation and analysis of stream ciphers based on elliptic curves. Comput. Electr. Eng. 35 (2009), 300-314.   DOI:10.1134/S0361768809060024
  10. J. Fridrich: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation Chaos 8 (1998), 1259-1284.   CrossRef
  11. C. Fu, J. J. Chen, H. Zou, W. H. Meng, Y. F. Zhan and Y. W. Yu: A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Express 20 (2012), 2363-2378.   DOI:10.1364/OE.20.002363
  12. M. Hamdi, R. Rhouma and S. Belghith: Selective compression-encryption of images based on SPIHT coding and Chirikov standard map. Signal Process. 131 (2017), 514-526.   DOI:10.1016/j.sigpro.2016.09.011
  13. D. J. Higham: An algorithmic introduction to numerical simulation of stochastic differential equations. SIAM Rev. 43 (2001), 525-546.   DOI:10.1137/S0036144500378302
  14. S. P. Indrakanti and P. S. Avadhani: Permutation based image encryption technique. Int. J. Comput. Appl. 28 (2011), 45-47.   DOI:10.1007/s10778-011-0441-6
  15. A. Jolfaei, X.-W. Wu and V. Muthukkumarasamy: On the security of permutation-only image encryption schemes. IEEE Trans. Inf. Forensics Security 11 (2015), 235-246.   DOI:10.1109/TIFS.2015.2489178
  16. M. Joshi, C. Shakher and K. Singh: Image encryption and decryption using fractional Fourier transform and radial Hilbert transform. Opt. Laser Eng. 46 (2008), 522-526.   CrossRef
  17. J. Khan, J. Ahmad and S. O. Hwang: An efficient image encryption scheme based on Henon map, skew tent map and S-Box. In: ICMSAO 2015, IEEE, pp. 1-6.   CrossRef
  18. L. Kocarev, G. Jakimoski, T. Stojanovski and U. Parlitz: From chaotic maps to encryption schemes. In: ISCAS (1998), IEEE, pp. 514-517.   CrossRef
  19. P. R. Krishna, C. V S. Teja and V. Thanikaiselvan: A chaos-based image encryption using Tinkerbell map functions. In: ICECA (2018), IEEE, pp. 578-582.   CrossRef
  20. P. Langevin: Sur la théorie du mouvement Brownien. C. R. Acad. Sci. Paris 146 (1908), 530-533.   CrossRef
  21. C. Li, D. Arroyo and K.-T. Lo: Breaking a chaotic cryptographic scheme based on composition maps. Int. J. Bifurcation Chaos 20 (2010), 2561-2568.   DOI:10.1142/S0218127410027192
  22. C. Li, Y. Liu, L. Y. Zhang and M. Z. Q. Chen: Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation. Int. J. Bifurcation Chaos 23 (2013), 1350075.   DOI:10.1142/S0218127413500752
  23. S. Li, Q. Li, W. Li, X. Mou and Y. Cai: Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. In: Cryptography and Coding (IMA), Springer, Berlin (2001), pp. 205-221.   CrossRef
  24. M. K. Mandal, G. D. Banik, D. Chattopadhyay and D. Nandi: An image encryption process based on chaotic logistic map. IETE Tech. Rev. 29 (2012), 395-404.   DOI:10.4103/0256-4602.103173
  25. A. Mitra, Y. V. S. Rao and S. R. M. Prasanna: A new image encryption approach using combinational permutation techniques. Int. J. Comput. Sci. 1 (2006), 127-131.   CrossRef
  26. C. Nouar and Z. E. A. Guennoun: A pseudo-random number generator using double pendulum. Appl. Math. 14 (2020), 977-984.   DOI:10.2147/OPTH.S237757
  27. F. Omary: Application des algorithmes évolutionnistes à la cryptographie. Univ. Mohammed V-Agdal, Rabat 2006.   CrossRef
  28. D. Pandey, U. S. Rawat and A. Kumar: Robust progressive block based visual cryptography with chaotic map. J. Discrete Math. Sci. Cryptogr. 19 (2016), 1025-1040.   DOI:10.1080/09720529.2015.1132040
  29. H. E. Papadopoulos and G. W. Wornell: Maximum-likelihood estimation of a class of chaotic signals. IEEE Trans. Inf. Theory 41 (1995), 312-317.   DOI:10.1109/18.370091
  30. N. K. Pareek, V. Patidar and K. K. Sud: Image encryption using chaotic logistic map. Image Vision Comput. 24 (2006), 926-934.   DOI:10.1016/j.imavis.2006.02.021
  31. W. Schindler: Random number generators for cryptographic applications. In: Cryptographic Engineering, Springer, Berlin (2009), pp. 5-23.   CrossRef
  32. C. E. Shannon: A mathematical theory of communication. Bell Syst. Tech. J. 27 (1948), 379-423.   DOI:10.1002/j.1538-7305.1948.tb01338.x
  33. C. E. Shannon: Communication theory of secrecy systems. Bell Syst. Tech. J. 28 (1949), 656-715.   DOI:10.1002/j.1538-7305.1949.tb00928.x
  34. M. Sharma, M. Kowar and M. Sharma: An improved evolutionary algorithm for secured image using adaptive genetic algorithm. J. Discrete Math. Sci. Cryptogr. 11 (2008), 673-683.   DOI:10.1080/09720529.2008.10698397
  35. A. Skrobek: Cryptanalysis of chaotic stream cipher. Phys. Lett. A 363 (2007), 84-90.   DOI:10.1016/j.physleta.2006.10.081
  36. A. Skrobek: Approximation of a chaotic orbit as a cryptanalytical method on Baptista’s cipher. Phys. Lett. A 372 (2008), 849-859.   DOI:10.1016/j.physleta.2007.08.041
  37. G. E. Uhlenbeck and L. S. Ornstein: On the theory of the Brownian motion. Phys. Rev. 36 (1930), 823.   DOI:10.1103/PhysRev.36.823
  38. O. Vasicek: An equilibrium characterization of the term structure. J. Financ. Econ. 5 (1977), 177-188.   CrossRef
  39. X. Wang and D. Xu: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 75 (2014), 345-353.   DOI:10.1007/s11071-013-1070-x
  40. X. Wu, H. Hu and B. Zhang: Parameter estimation only from the symbolic sequences generated by chaos system. Chaos Solitons Fractals 22 (2004), 359-366.   DOI:10.1016/j.chaos.2004.02.008
  41. Y. Wu, Y. Zhou, S. Agaian and J. P. Noonan: A symmetric image cipher using wave perturbations. Signal Process. 102 (2014), 122-131.   DOI:10.1016/j.sigpro.2014.03.015
  42. G. Xiao, M. Lu, L. Qin and X. Lai: New field of cryptography: DNA cryptography. Chin. Sci. Bull. 51 (2006), 1413-1420.   DOI:10.1007/s11434-006-2012-5
  43. W. Xiaofu and S. Songgeng: A general efficient method for chaotic signal estimation. IEEE Trans. Signal Process. 47 (1999), 1424-1428.   DOI:10.1109/78.757236
  44. W. Zhen, H. Xia, L. Yu-Xia and S. Xiao-Na: A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system. Chin. Phys. B 22 (2013), 010504.   DOI:10.1088/1674-1056/22/1/010504
  45. C. Zhu, S. Xu, Y. Hu and K. Sun: Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 79 (2015), 1511-1518.   DOI:10.1007/s11071-014-1757-7