Abstract
Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps have been computed numerically. Increasing the dynamical behavior of the system by using more complex chaotic maps leads to inferiority in the overall system performance. So, in this work, the BER performance for the dual and single chaotic maps by exploiting the benefits of a hybrid Chaos Shift Keying-Multiple-Input-Multiple-Output (CSK-MIMO) communication system has been investigated. The results show that the dual tent map has more randomness, whereas the single logistic map has the least randomness. As well as the CSK-MIMO gives an outstanding BER performance when it compared with the SISO system which helps in reducing the system’s inferiority.
References
K. Daniela and E. Marcio, “On the Power Spectral Density of Chaotic Signals Generated by Skew Tent Maps,” IEEE International Symposium on Signals, Circuits and Systems”, Vol. 1, pp. 1-4, 2007.
A. Kathleen, S. Tim and Y. James, Chaos, An Introduction to Dynamical Systems. Springer 1996.
F. Jiu and T. Chi, Reconstruction of Chaotic Signals with Applications to Chaos-Based Communications. Word Scientific, 2008.
C. Yi, Li Z. and W. Yifang, A Data Encryption Algorithm based on Dual Chaotic System: proceeding of the 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), pp. V4-431V4-435, 2010.
Parlitz U.: Lyapunov Exponents from Chau’s Circuit., Journal of Circuits, Systems and Computers, Vol. 3, No. 2, pp. 507-523, 1993.
I. Aouissaoui1, T. Bakir, A. Sakly, and S. Femmam, “Improved One-Dimensional Piecewise Chaotic Maps for Information Security”, “Journal of Communications”, Vol. 17, No. 1 P.P. 1-6,, January 2022.
J. Pedro do V. Alvarenga, J. Machicao, and O. M. Bruno, “Chaotical PRNG based on composition of logistic and tent maps using deep-zoom”, “Chaos, solitons and fractals- Elsevier”, Vol. 161, 2022.
M. Lawnik and M. Berezowski, “New Chaotic System: M-Map and Its Application in Chaos-Based Cryptography”, “Symmetry- MDPI”, Vol. 14, 2022.
G. Kaddoum, Mai V. and F. Gagnon, “On the performance of chaos shift keying in MIMO communications systems”. “IEEE WCNC-PHY”, pp. 1432-1437 ,2011.
A. Mozsary, L. Azzinari, K. Krol and V. Porra, Theoretical connection between PN-sequences and chaos makes simple FPGA pseudo-chaos sources possible: proceeding of the 8th IEEE International Conference on Electronics, Circuits and Systems, February 2001.
A. Abir, A. Safwan, Q. Wang, V. Calin and B. Bassem, “Comparative study of 1-D chaotic generator for digital data encryption”, “IAENG International Journal of Computer Science”, 2008.
K. Ljupco, S. Janusz, A. Jose and T. Igor, “Discrete Chaos-I: Theory”, “IEEE Transaction of Circuits and Systems-I”, Vol 53, No. 6, pp. 1300-1309, 2006.
E. Ibarra, R. Vazquez, M. Cruz and J. Rio, Numerical Calculation of the Lyapunov Exponent for the Logistic Map: proceeding of the 12th International Conference on Mathematical Methods in Electromagnetic Theory, pp. 409-411, 2008.
H. Martin and M. Yuri, “An Introduction to the Synchronization of Chaotic Systems: Coupled Skew Tent Maps”, “IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications”, Vol. 44, No. 10, pp. 856-866, 1997.
G. Kaddoum, P. Charge and D. Roviras, “A generalized methodology for bit-Error-rate reduction in correlation-based communication schemes using chaos”,” IEEE Communication Letters”, Vol. 13, No. 8. , 2009.
L. Abdulameer., D. Jokhakar, U. Sripati and M. Kulkarni: BER Performance Enhancement for Secure Wireless Communication Systems based on Chaotic MIMO Techniques., procedding of the International Conference on Communication and Electronics System Design, 2013.
R. Sankpal, A. Vijaya, Image Encryption Using Chaotic Maps. A Survey, Lecture notes in networks and systems, Springer, p.p. 835-844, 2014.
S. Das, K. Mandal, and M. Chakraborty, “LMMSE equalized DCSK communication system over a multipath fading channel with AWGN noise”, proceeding of the third International Conference on Computer, Communication, Control and Information Technology (C3IT), p.p 1-4, 2015.
V. Manikandan & Rengarajan Amirtharajan, “On dual encryption with RC6 and combined logistic tent map for grayscale and DICOM”,” Multimedia Tools and Applications”, P.P. 1-30, 2021.
A. Imoize , A. Ibhaze , A. Atayero , and K. Kavitha, “Standard Propagation Channel Models for MIMO Communication Systems”, “Hindawi Wireless Communications and Mobile Computing”, PP. 1-36, 2021.
R. Dhia’a, “Design a Security Network System against Internet Worms”, “Al-Khwarizmi Engineering Journal”, Vol. 8, No. 3, PP 40 – 52, p.p. 1-13, 2012.
R. Yamazaki, Y. Shimada, and T. Ikeguchi, “Chaos MIMO system with efficient use of information of bits”, “NOLTA, IEICE”, P.P. 1-15, 2020.
I. Kadhem, “A New Audio Steganography System Based on Auto-Key Generator”, “Al-Khwarizmi Engineering Journal”, Vol. 8, No. 1, p.p. 27 – 36, 2012.
L. Abdulameer, ANALYSIS AND DESIGN OF RELIABLE AND SECURE CHAOTIC COMMUNICATION SYSTEMS FOR OPTICAL AND WIRELESS LINKS, Dept. of Electronics and Communication Engg., NITK, 2014.
Copyright: Open Access authors retain the copyrights of their papers, and all open access articles are distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided that the original work is properly cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations. While the advice and information in this journal are believed to be true and accurate on the date of its going to press, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.