Nonlinear Dynamics

, Volume 95, Issue 3, pp 1781–1805 | Cite as

A novel image encryption scheme based on improved random number generator and its implementation

  • Bo Li
  • Xiaofeng LiaoEmail author
  • Yan Jiang
Original Paper


Based on an improved random number generator which is designed mainly by Gauss error function and digital discarding technology, a multi-rounds image encryption algorithm is proposed and implemented in this paper. The structure of the thesis is mainly composed of three modules: The first one is the random number generation module, and the second one is the pixel encryption module and the last one is the algorithm implementation module. First, the chaotic sequence derived from a first-order time-delay differential equation is mapped to another sequence by using the improved Gauss error function, and then the data are truncated and recombined to obtain the random numbers. After scrambling the pixels of the original image by using the generated random numbers, the first round encrypted pixels can be obtained by performing XOR operation between the scrambled pixel sequence and another sequence which derived from the improved random number generator. And then, the generator is used for the next round encryption after selecting an encrypted pixel value of the previous round. Finally, the implementation methods of encryption algorithm in embedded hardware are discussed, and two prototypes are developed on STM32. Simulation experiments demonstrate that this cryptosystem is secure enough to resist brute force attacks, differential attacks, entropy attacks, and statistical attacks. In addition, the cryptosystem has high key sensitivity and large key space.


Delay differential equation Digital discarding Random number generator Image encryption Embedded hardware 



This study was funded in part by the National Key Research and Development Program of China Under Grant (2016YFB0800601), and in part by the National Natural Science Foundation of China Under Grant (61472331).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.


  1. 1.
    Knuth, D.E.: The Art of Computer Programming, 2: Seminumerical Algorithms, 3rd edn. Addison Wesley, Boston (1997)zbMATHGoogle Scholar
  2. 2.
    Mandrona, M.M., Maksymovych, V.M.: Implementation of modified additive lagged Fibonacci generator. Chall. Mod. Technol. 7(1), 3–6 (2016)Google Scholar
  3. 3.
    Tausworthe, R.C.: Random numbers generated by linear recurrence modulo two. Math. Comput. 19, 201–209 (1965)MathSciNetCrossRefGoogle Scholar
  4. 4.
    L’Ecuyer, P.: Random number generation. In: Handbook of Computational Statistics, Chapter 3, pp. 35–71 (2012)Google Scholar
  5. 5.
    Pomeranz, I.: Computation of seeds for LFSR-based diagnostic test generation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(12), 2004–2012 (2015)CrossRefGoogle Scholar
  6. 6.
    Zheng, X.L., Shi, R.: Jumping linear feedback shift registers over Fp. J. Beijing Electron. Sci. Technol. Inst. 22(4), 14–17 (2014)Google Scholar
  7. 7.
    Jansen, C.J.A.: Stream cipher design based on jumping finite state machine. IACR Cryptology Eprint Archive. Accessed June 2017
  8. 8.
    Matsumoto, M., Kurita, Y.: Twisted GFSR generators. ACM Trans. Model. Comput. Simul. 2(3), 179–194 (1992)CrossRefGoogle Scholar
  9. 9.
    Liang, Z., Meng-tian, R.: The ASIC design and realization of a truly random number generator based on chaos. J. Shanghai Jiaotong Univ. 40(3), 421–424 (2006)Google Scholar
  10. 10.
    Gopalsamy, K., Leung, I.K.C.: Convergence under dynamical thresholds with delays. IEEE Trans. Neural Netw. 8(2), 342–348 (1997)CrossRefGoogle Scholar
  11. 11.
    Liao, X.F., Wang, K.W., Leung, C.: Hopf bifurcation and chaos in a single delayed neuron equation with non-monotonic activation function. Chaos Solution Fractals 12(8), 1535–1547 (2001)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Ye, G., Wong, K.-W.: An image encryption scheme based on time-delay and hyper chaotic system. Nonlinear Dyn. 71(1–2), 259–267 (2013)CrossRefGoogle Scholar
  13. 13.
    Kadir, A., Aili, M., Sattar, M.: Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections. Optik Int. J. Light Electron Opt. 129, 231–238 (2017)CrossRefGoogle Scholar
  14. 14.
    Wu, X., Bin, Z., Hu, Y.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5, 6429–6436 (2017)Google Scholar
  15. 15.
    Annaby, M.H., Rushdi, M.A., Nehary, E.A.: Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion. Opt. Lasers Eng. 103, 9–23 (2018)CrossRefGoogle Scholar
  16. 16.
    Annaby, M., Rushdi, M., Nehary, E.: Image encryption via discrete fractional Fourier-type transforms generated by random matrices. Signal Process. Image Commun. 49, 25–46 (2016)CrossRefGoogle Scholar
  17. 17.
    Zhou, N., Wang, Y., Gong, L.: Novel single-channel color image encryption algorithm based on chaos and fractional Fourier transform. Opt. Commun. 284(12), 2789–2796 (2011)CrossRefGoogle Scholar
  18. 18.
    Lan, R., He, J., Wang, S.: Integrated chaotic systems for image encryption. Signal Process. 1(47), 133–145 (2018)CrossRefGoogle Scholar
  19. 19.
    Tuna, M., Fidan, C.B.: A study on the importance of chaotic oscillators based on FPGA for true random number generating (TRNG) and chaotic systems. J. Fac. Eng. Archit. Gazi Univ. 33(2), 469–486 (2018)Google Scholar
  20. 20.
    Li, C., Luo, G., Li, C.: A parallel image encryption algorithm based on chaotic Duffing oscillators. Multimed. Tools Appl. 77(15), 19193–19208 (2017)CrossRefGoogle Scholar
  21. 21.
    Ning, L., Ding, J., Chuang, B.: Design and validation of high speed true random number generators based on prime-length ring oscillators. J. China Univ. Posts Telecommun. 22(4), 1–6 (2015)CrossRefGoogle Scholar
  22. 22.
    Rajagopalan, S., Rethinam, S., Deepika, AN.: Design of boolean chaotic oscillator using CMOS technology for true random number generation. In: International Conference on Microelectronic Devices, Circuits and Systems, vol. 8, pp. 1–6 (2017)Google Scholar
  23. 23.
    Mannai, O., Bechikh, R., Hermassi, H.: A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity. Nonlinear Dyn. 82(1–2), 107–117 (2015)MathSciNetCrossRefGoogle Scholar
  24. 24.
    Lei, J.Z., Mackey, M.C.: Deterministic Brownian motion generated from differential delay equations. Phys. Rev. E. 84, 1–16 (2011)CrossRefGoogle Scholar
  25. 25.
    Self, J., Mackey, M.C.: Random numbers from a delay equation. J. Nonlinear Sci. 26, 1311–1327 (2016)MathSciNetCrossRefGoogle Scholar
  26. 26.
    Falcioni, M., Palatella, L., Pigolotti, S.: Properties making a chaotic system a good pseudo random number generator. Phys. Rev. E 72(2), 1–10 (2005)MathSciNetGoogle Scholar
  27. 27.
    Liao, X.-F.: Theory and Applications of Chaotic Cryptography, pp. 9–11. China Science Publishing, Beijing (2009)Google Scholar
  28. 28.
    Soto J.: Statistical testing of random number generators. In: The 22nd National Information Systems Security Conference, vol. 10/99 (1999)Google Scholar
  29. 29.
    L’Ecuyer, P., Simard, R.: Testu01: AC library for empirical testing of random number generators. ACM Trans. Math. Softw. 33(4), 1–40 (2007)zbMATHGoogle Scholar
  30. 30.
    Huang, C.K., Liao, C.W., Hsu, S.L.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst. 52(2), 563–571 (2013)Google Scholar
  31. 31.
    Patidar, V., Pareek, N.K., Purohit, G.: A robust and secure chaotic standard map based pseudo random permutation–substitution scheme for image encryption. Opt. Commun. 184(19), 4331–4339 (2011)CrossRefGoogle Scholar
  32. 32.
    Huang, X.: Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 67(4), 2411–2417 (2012)MathSciNetCrossRefGoogle Scholar
  33. 33.
    Teng, L., Wang, X.: A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt. Commun. 285(20), 4048–4054 (2012)CrossRefGoogle Scholar
  34. 34.
    Zhang, Q., Xue, X., Wei, X.: A novel image encryption algorithm based on DNA subsequence operation. Sci. World J. 2012, 1–10 (2012)Google Scholar

Copyright information

© Springer Nature B.V. 2018

Authors and Affiliations

  1. 1.College of Electronic and Information EngineeringSouthwest UniversityChongqingChina
  2. 2.Department of MathematicsArmy Logisticals University of PLAChongqingChina
  3. 3.Department of MathematicsChong Qing Energy CollegeChongqingChina

Personalised recommendations