<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">IASC</journal-id>
<journal-id journal-id-type="nlm-ta">IASC</journal-id>
<journal-id journal-id-type="publisher-id">IASC</journal-id>
<journal-title-group>
<journal-title>Intelligent Automation &#x0026; Soft Computing</journal-title>
</journal-title-group>
<issn pub-type="epub">2326-005X</issn>
<issn pub-type="ppub">1079-8587</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">30597</article-id>
<article-id pub-id-type="doi">10.32604/iasc.2023.030597</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>A New Sine-Ikeda Modulated Chaotic Key for Cybersecurity</article-title><alt-title alt-title-type="left-running-head">A New Sine-Ikeda Modulated Chaotic Key for Cybersecurity</alt-title><alt-title alt-title-type="right-running-head">A New Sine-Ikeda Modulated Chaotic Key for Cybersecurity</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Hanis</surname><given-names>S.</given-names></name><email>haniss@ssn.edu.in</email>
</contrib>
<aff id="aff-1"><institution>Department of Electronics and Communication Engineering, Sri Sivasubramania Nadar College of Engineering</institution>, <addr-line>Chennai, 603110</addr-line>, <country>India</country></aff>
</contrib-group><author-notes><corresp id="cor1"><label>&#x002A;</label>Corresponding Author: S. Hanis. Email: <email>haniss@ssn.edu.in</email></corresp></author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2022-08-24"><day>24</day>
<month>08</month>
<year>2022</year></pub-date>
<volume>36</volume>
<issue>1</issue>
<fpage>865</fpage>
<lpage>878</lpage>
<history>
<date date-type="received"><day>29</day><month>3</month><year>2022</year></date>
<date date-type="accepted"><day>22</day><month>6</month><year>2022</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2023 Hanis</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Hanis</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_IASC_30597.pdf"></self-uri>
<abstract>
<p>In the recent past, the storage of images and data in the cloud has shown rapid growth due to the tremendous usage of multimedia applications. In this paper, a modulated version of the Ikeda map and key generation algorithm are proposed, which can be used as a chaotic key for securely storing images in the cloud. The distinctive feature of the proposed map is that it is hyperchaotic, highly sensitive to initial conditions, and depicts chaos over a wide range of control parameter variations. These properties prevent the attacker from detecting and extracting the keys easily. The key generation algorithm generates a set of sequences using a designed chaos map and uses the harmonic mean of the generated sequences as the seed key. Furthermore, the control parameters are modified after each iteration. This change in the control parameters after each iteration makes it difficult for an attacker to predict the key. The designed map was tested mathematically and through simulations. The performance evaluation of the map shows that it outperforms other chaotic maps in terms of its parameter space, Lyapunov exponent, bifurcation entropy. Comparing the designed chaotic map with existing chaotic maps in terms of average cycle length, maximum Lyapunov exponent, approximate entropy, and a number of iterations, it is found to be very effective. The existence of chaos is also proved mathematically using Schwartz&#x2019;s derivative theorem. The proposed key generation algorithm was tested using the National Institute of Standards and Technology (NIST) randomness test with excellent results.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Bifurcation</kwd>
<kwd>chaos</kwd>
<kwd>entropy</kwd>
<kwd>keyspace</kwd>
<kwd>cybersecurity</kwd>
<kwd>key generation</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Recently, cryptographic systems have gained importance because of the broad usage of multimedia in various fields. Hence, it is essential to strengthen the security of multimedia content against illegitimate users. Recently, chaotic map-based security algorithms have gained much attention and are being widely used to conceal intelligible information that is present in images. Hence, it becomes essential to construct a chaotic map that offers excellent security. One of the primary reasons for emphasizing security in chaotic maps is the keyspace. The keyspace can be expanded by increasing the space of control parameter, initial value, or iteration time. The work presented here focuses on expanding the chaotic range of chaotic control parameters using a novel chaotic map and the development of a key generation algorithm to conceal information stored in the cloud.</p>
<p>In general, most prevailing image encryption techniques depend on chaotic maps [<xref ref-type="bibr" rid="ref-1">1</xref>&#x2013;<xref ref-type="bibr" rid="ref-12">12</xref>]. In [<xref ref-type="bibr" rid="ref-13">13</xref>], the designed map exhibits chaos when the chaotic parameter varies from 0 to 1.7, so the keys expansion technique was additionally applied. In [<xref ref-type="bibr" rid="ref-14">14</xref>], the logistic map has been used as chaotic map. The adversary can very easily detect the keys due to the restricted chaotic range and the presence of blank windows in the bifurcation plot. In [<xref ref-type="bibr" rid="ref-15">15</xref>], the Lyapunov exponent value is very low which shows the presence of weak keys, and in some regions the Lyapunov exponent is negative. The negative Lyapunov exponent indicates the presence of blank windows in the bifurcation plot.</p>
<p>However, many encryption techniques are crypt analyzed due to inadequate key space and weak keys. For instance, [<xref ref-type="bibr" rid="ref-16">16</xref>] deals with a cryptanalysis scheme on a logistic map based on a limited choice of logistic parameters. In [<xref ref-type="bibr" rid="ref-17">17</xref>], it has been pointed out that the presence of weak keys in chaotic maps causes security issues in cryptosystems. Recently, in [<xref ref-type="bibr" rid="ref-18">18</xref>], cryptanalysis has been performed by locating the elementary value of the logistic map related to the notion of reduced key space. New chaotic equations [<xref ref-type="bibr" rid="ref-19">19</xref>,<xref ref-type="bibr" rid="ref-20">20</xref>] have been developed based upon which encryption algorithms have been proposed. These chaotic expressions require little iteration to satisfy the property of sensitive dependence on initial conditions. Furthermore, the proposed 2D chaotic maps in [<xref ref-type="bibr" rid="ref-21">21</xref>&#x2013;<xref ref-type="bibr" rid="ref-26">26</xref>] exhibit hyperchaotic properties for a subset of chaotic parameters but are not chaotic outside of this subset.</p>
<p>In this article, we propose a Sine Ikeda modulated map and a key generation algorithm to improve the security of images stored in the cloud. The designed map provides sufficient keyspace, optimum sensitivity to initial conditions and hyperchaotic behavior throughout the chaotic range. The proposed algorithm behaves like a one-time pad and offers considerable security. Moreover, the randomness of the key generated has been tested using the standard NIST test, and the results are found to be excellent. The designed chaotic key can be used to secure stored medical images, military-related images, intelligent transportation images [<xref ref-type="bibr" rid="ref-27">27</xref>,<xref ref-type="bibr" rid="ref-28">28</xref>] and so on.</p>
<p>The subsequent sections are framed as follows. Section 2 describes the basic and Sine Ikeda modulated maps. Section 3 describes the designed key generation algorithm. In Section 4, performance analysis for the chaotic maps and the key generation algorithm has been performed and Section 5 concludes the article.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Description of the Chaotic Map</title>
<p>An Ikeda map [<xref ref-type="bibr" rid="ref-29">29</xref>] is a 2D iterative chaotic map that was first used in optics to model light passing around an optical cavity consisting of a nonlinear dielectric medium, and is described mathematically in parametric form as follows:</p>
<p><disp-formula id="eqn-1"><label>(1)</label>
<mml:math id="mml-eqn-1" display="block"><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:msub><mml:mi>&#x03C6;</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:msub><mml:mi>&#x03C6;</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-2"><label>(2)</label>
<mml:math id="mml-eqn-2" display="block"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:msub><mml:mi>&#x03C6;</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:msub><mml:mi>&#x03C6;</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-3"><label>(3)</label>
<mml:math id="mml-eqn-3" display="block"><mml:msub><mml:mi>&#x03C6;</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03B3;</mml:mi><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>n</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>y</mml:mi><mml:mi>n</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula></p>
<p>This map acts chaotic for values <inline-formula id="ieqn-1">
<mml:math id="mml-ieqn-1"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mn>0.5</mml:mn><mml:mo>&#x2264;</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo>&#x2264;</mml:mo><mml:mn>0.95</mml:mn></mml:math>
</inline-formula>, <inline-formula id="ieqn-2">
<mml:math id="mml-ieqn-2"><mml:mi>&#x03B2;</mml:mi><mml:mo>=</mml:mo><mml:mn>0.4</mml:mn><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow></mml:math>
</inline-formula> and <inline-formula id="ieqn-3">
<mml:math id="mml-ieqn-3"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>&#x03B3;</mml:mi><mml:mo>=</mml:mo><mml:mn>6</mml:mn></mml:math>
</inline-formula>.</p>
<sec id="s2_1">
<label>2.1</label>
<title>Proposed Chaotic Map</title>
<p>The proposed chaotic map (Sine Ikeda modulated map) has been constructed by adding sine and Ikeda maps. The chaotic region of the map is stretched over a wide range. Thus, the keyspace of the designed map is expanded. Moreover, the total number of chaotic parameters and the sensitivity of the map to initial conditions increase compared to the Ikeda map. The proposed chaotic map can be defined mathematically as follows:</p>
<p><disp-formula id="eqn-4"><label>(4)</label>
<mml:math id="mml-eqn-4" display="block"><mml:mspace width="thickmathspace" /><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:msub><mml:mi>&#x03C6;</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:msub><mml:mi>&#x03C6;</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mi mathvariant="normal">s</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">n</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x03C0;</mml:mi><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-5"><label>(5)</label>
<mml:math id="mml-eqn-5" display="block"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:msub><mml:mi>&#x03C6;</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:msub><mml:mi>&#x03C6;</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mi mathvariant="normal">s</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">n</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x03C0;</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-6"><label>(6)</label>
<mml:math id="mml-eqn-6" display="block"><mml:msub><mml:mi>&#x03C6;</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03B3;</mml:mi><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>n</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>y</mml:mi><mml:mi>n</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula></p>
<p>The control parameters <inline-formula id="ieqn-4">
<mml:math id="mml-ieqn-4"><mml:mi>&#x03BC;</mml:mi><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow></mml:math>
</inline-formula> and <inline-formula id="ieqn-5">
<mml:math id="mml-ieqn-5"><mml:mi>&#x03B3;</mml:mi></mml:math>
</inline-formula> act chaotic when <inline-formula id="ieqn-6">
<mml:math id="mml-ieqn-6"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mn>0</mml:mn><mml:mo>&#x2264;</mml:mo><mml:mi>&#x03BC;</mml:mi><mml:mo>&#x003C;</mml:mo><mml:mi mathvariant="normal">&#x221E;</mml:mi></mml:math>
</inline-formula>, <inline-formula id="ieqn-7">
<mml:math id="mml-ieqn-7"><mml:mn>0</mml:mn><mml:mo>&#x2264;</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo>&#x2264;</mml:mo><mml:mn>1.18</mml:mn></mml:math>
</inline-formula> and <inline-formula id="ieqn-8">
<mml:math id="mml-ieqn-8"><mml:mn>0</mml:mn><mml:mo>&#x2264;</mml:mo><mml:mi>&#x03B3;</mml:mi><mml:mo>&#x003C;</mml:mo><mml:mi mathvariant="normal">&#x221E;</mml:mi><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow></mml:math>
</inline-formula> and the parameter <inline-formula id="ieqn-9">
<mml:math id="mml-ieqn-9"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>&#x03B2;</mml:mi><mml:mo>=</mml:mo><mml:mn>0.4</mml:mn></mml:math>
</inline-formula>. The state space plot helps us to visualize the dynamics of the chaotic map. <xref ref-type="fig" rid="fig-1">Fig. 1</xref> shows the state space plot of the Ikeda and the Sine Ikeda modulated map for <inline-formula id="ieqn-10">
<mml:math id="mml-ieqn-10"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>&#x03B1;</mml:mi><mml:mo>=</mml:mo><mml:mn>0.95</mml:mn><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>&#x03B3;</mml:mi><mml:mo>=</mml:mo><mml:mn>6</mml:mn></mml:math>
</inline-formula> and <inline-formula id="ieqn-11">
<mml:math id="mml-ieqn-11"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>&#x03BC;</mml:mi><mml:mo>=</mml:mo><mml:mn>10</mml:mn></mml:math>
</inline-formula>.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>2D state space plot of the (a) Ikeda and (b) Sine Ikeda modulated map</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30597-fig-1.png"/>
</fig>
<p>The chaotic nature of the proposed map can be proved mathematically by using Schwarzian derivative, considering the <xref ref-type="disp-formula" rid="eqn-4">Eqs. (4)</xref> and <xref ref-type="disp-formula" rid="eqn-5">(5)</xref> separately.</p>
<p><bold>Definition:</bold> The Schwarzian derivative [<xref ref-type="bibr" rid="ref-30">30</xref>] of the differentiable function <italic>f</italic> at point <inline-formula id="ieqn-12">
<mml:math id="mml-ieqn-12"><mml:mi>z</mml:mi><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</inline-formula> is given by,<disp-formula id="eqn-7"><label>(7)</label>
<mml:math id="mml-eqn-7" display="block"><mml:mi>S</mml:mi><mml:msub><mml:mi>f</mml:mi><mml:mi>z</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mi>U</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mn>3</mml:mn><mml:mn>2</mml:mn></mml:mfrac></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>V</mml:mi><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mn>2</mml:mn></mml:msup></mml:mstyle></mml:math>
</disp-formula>where <inline-formula id="ieqn-13">
<mml:math id="mml-ieqn-13"><mml:mi>U</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mfrac><mml:mrow><mml:msup><mml:mi>d</mml:mi><mml:mn>3</mml:mn></mml:msup><mml:mi>f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>Z</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mi>d</mml:mi><mml:msup><mml:mi>Z</mml:mi><mml:mn>3</mml:mn></mml:msup></mml:mrow><mml:mrow><mml:mi>d</mml:mi><mml:mi>f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>Z</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mi>d</mml:mi><mml:mi>Z</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:math>
</inline-formula> and <inline-formula id="ieqn-14">
<mml:math id="mml-ieqn-14"><mml:mi>V</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:mfrac><mml:mrow><mml:msup><mml:mi>d</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:mi>f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>Z</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mi>d</mml:mi><mml:msup><mml:mi>Z</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:mrow><mml:mrow><mml:mi>d</mml:mi><mml:mi>f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>Z</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mi>d</mml:mi><mml:mi>Z</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:math>
</inline-formula></p>
<p><bold>Theorem:</bold> The map <inline-formula id="ieqn-15">
<mml:math id="mml-ieqn-15"><mml:mi>f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>X</mml:mi><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>Y</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2208;</mml:mo><mml:msup><mml:mi>C</mml:mi><mml:mn>3</mml:mn></mml:msup><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow></mml:math>
</inline-formula> shows the period&#x2013;doubling bifurcation route to chaos when the Schwarzian derivative <inline-formula id="ieqn-16">
<mml:math id="mml-ieqn-16"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>S</mml:mi><mml:msub><mml:mi>f</mml:mi><mml:mi>z</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math>
</inline-formula> is negative for <inline-formula id="ieqn-17">
<mml:math id="mml-ieqn-17"><mml:mi>X</mml:mi><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>Y</mml:mi><mml:mo>&#x2265;</mml:mo><mml:mn>0.</mml:mn></mml:math>
</inline-formula></p>
<p>The evidence of the concept is in [<xref ref-type="bibr" rid="ref-31">31</xref>]. The designed map in <xref ref-type="disp-formula" rid="eqn-4">Eqs. (4)</xref> and <xref ref-type="disp-formula" rid="eqn-5">(5)</xref> meets the condition <inline-formula id="ieqn-18">
<mml:math id="mml-ieqn-18"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>S</mml:mi><mml:msub><mml:mi>f</mml:mi><mml:mi>z</mml:mi></mml:msub><mml:mo>&#x003C;</mml:mo><mml:mn>0</mml:mn></mml:math>
</inline-formula>, as <inline-formula id="ieqn-19">
<mml:math id="mml-ieqn-19"><mml:mo stretchy="false">(</mml:mo><mml:mi>V</mml:mi><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mn>2</mml:mn></mml:msup></mml:math>
</inline-formula> in <xref ref-type="disp-formula" rid="eqn-4">Eqs. (4)</xref> and <xref ref-type="disp-formula" rid="eqn-5">(5)</xref> are much larger than <italic>U</italic> for all values of <inline-formula id="ieqn-20">
<mml:math id="mml-ieqn-20"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>X</mml:mi><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>Y</mml:mi><mml:mo>&#x2265;</mml:mo><mml:mn>0</mml:mn></mml:math>
</inline-formula>.</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Sensitivity of the Designed Map</title>
<p>The most important property of the chaotic map is its sensitive dependence on the initial conditions. <xref ref-type="fig" rid="fig-2">Fig. 2a</xref> shows a time series plot of two Sine Ikeda modulated maps with one-digit variation in their initial conditions. The first map (x<sub>1</sub>) is plotted with the initial condition <inline-formula id="ieqn-21">
<mml:math id="mml-ieqn-21"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mn>0</mml:mn></mml:msub><mml:mo>=</mml:mo><mml:mn>1.8888887</mml:mn></mml:math>
</inline-formula>, and the second map (x<sub>2</sub>) is plotted with the initial condition <inline-formula id="ieqn-22">
<mml:math id="mml-ieqn-22"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mn>0</mml:mn></mml:msub><mml:mo>=</mml:mo><mml:mn>1.8888888</mml:mn></mml:math>
</inline-formula>. Even though, the two maps initially occupy closer points, they take different paths from the second iteration. This outcome shows that the designed map is highly sensitive to the initial conditions. <xref ref-type="fig" rid="fig-2">Fig. 2b</xref> exhibits the difference between maps x<sub>1</sub> and x<sub>2</sub>. <xref ref-type="fig" rid="fig-2">Figs. 2c</xref> and <xref ref-type="fig" rid="fig-2">2d</xref> show the time series plot of two Ikeda maps with one-digit variation in initial conditions and the difference between the two Ikeda maps. Comparing <xref ref-type="fig" rid="fig-2">Figs. 2b</xref> and <xref ref-type="fig" rid="fig-2">2d</xref>, takes approximately thirty-five iterations, whereas <xref ref-type="fig" rid="fig-2">Fig. 2b</xref> takes only two iterations for the two maps to diverge. This outcome shows that the designed map is extremely sensitive to initial conditions.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Plot of (a) Proposed map with a one-digit change in initial conditions (b) The difference between them (c) Ikeda maps with a one-digit change (d) The difference between them</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30597-fig-2a.png"/>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30597-fig-2b.png"/>
</fig>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Key Generation</title>
<p>The algorithm for key generation using the designed chaotic map is stated below in this section.</p>
<p>Step 1: Generate <italic>L</italic> sequences of <italic>x</italic> and <italic>y</italic> using the <xref ref-type="disp-formula" rid="eqn-4">Eqs. (4)&#x2013;</xref><xref ref-type="disp-formula" rid="eqn-6">(6)</xref> by choosing random control parameters <inline-formula id="ieqn-23">
<mml:math id="mml-ieqn-23"><mml:mi>&#x03BC;</mml:mi><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow></mml:math>
</inline-formula> and <inline-formula id="ieqn-24">
<mml:math id="mml-ieqn-24"><mml:mi>&#x03B3;</mml:mi></mml:math>
</inline-formula>. In this work, <inline-formula id="ieqn-25">
<mml:math id="mml-ieqn-25"><mml:mi>&#x03B1;</mml:mi><mml:mo>=</mml:mo><mml:mn>0.95</mml:mn><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>&#x03B3;</mml:mi><mml:mo>=</mml:mo><mml:mn>6</mml:mn></mml:math>
</inline-formula> and <inline-formula id="ieqn-26">
<mml:math id="mml-ieqn-26"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>&#x03BC;</mml:mi><mml:mo>=</mml:mo><mml:mn>10</mml:mn></mml:math>
</inline-formula> and the initial seed keys as <inline-formula id="ieqn-27">
<mml:math id="mml-ieqn-27"><mml:msub><mml:mi>x</mml:mi><mml:mn>0</mml:mn></mml:msub><mml:mo>=</mml:mo><mml:mn>1.8888887</mml:mn></mml:math>
</inline-formula> and <inline-formula id="ieqn-28">
<mml:math id="mml-ieqn-28"><mml:msub><mml:mi>y</mml:mi><mml:mn>0</mml:mn></mml:msub><mml:mo>=</mml:mo><mml:mn>0.9234567</mml:mn></mml:math>
</inline-formula> have been chosen.</p>
<p>Step 2: Calculate the harmonic means of the generated sequences using the formula <inline-formula id="ieqn-29">
<mml:math id="mml-ieqn-29"><mml:msub><mml:mi>h</mml:mi><mml:mi>x</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mfrac><mml:mi>L</mml:mi><mml:mrow><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>+</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mi>L</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:math>
</inline-formula></p>
<p>Step 3: Take the harmonic means <inline-formula id="ieqn-30">
<mml:math id="mml-ieqn-30"><mml:msub><mml:mi>h</mml:mi><mml:mi>x</mml:mi></mml:msub></mml:math>
</inline-formula> and <inline-formula id="ieqn-31">
<mml:math id="mml-ieqn-31"><mml:msub><mml:mi>h</mml:mi><mml:mi>y</mml:mi></mml:msub></mml:math>
</inline-formula> and use it as a seed key for <inline-formula id="ieqn-32">
<mml:math id="mml-ieqn-32"><mml:msub><mml:mi>x</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math>
</inline-formula> and <inline-formula id="ieqn-33">
<mml:math id="mml-ieqn-33"><mml:msub><mml:mi>y</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math>
</inline-formula>.</p>
<p>Step 4: Use the generated seed key and new values of random control parameters <inline-formula id="ieqn-34">
<mml:math id="mml-ieqn-34"><mml:mi>&#x03BC;</mml:mi><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow></mml:math>
</inline-formula> and <inline-formula id="ieqn-35">
<mml:math id="mml-ieqn-35"><mml:mi>&#x03B3;</mml:mi></mml:math>
</inline-formula> to generate a new set of sequences of <italic>x</italic> and <italic>y</italic> using the <xref ref-type="disp-formula" rid="eqn-4">Eqs. (4)&#x2013;</xref><xref ref-type="disp-formula" rid="eqn-6">(6)</xref>.</p>
<p>Step 5: The generated set of sequences of <italic>x</italic> and <italic>y</italic> are then represented as a matrix as the dimension of the image to be concealed.</p>
<p>The key generated can be made more secure by randomly changing the control parameter values after each iteration. Thus, the adversary cannot detect the keys, even using phase plots. The key provided to each image to be encrypted can also be changed by providing the initial seed key as the harmonic mean derived from the image. This acts as a one-time pad, and the adversary cannot hack the key from the image.</p>
</sec>
<sec id="s4">
<label>4</label>
<title>Performance Analysis</title>
<p>In this segment, the bifurcation diagram of the Sine Ikeda modulated map, the Lyapunov exponent and the bifurcation entropy, which are the most important characteristics of the chaotic systems, are analyzed. The parameters used for analysis are <inline-formula id="ieqn-36">
<mml:math id="mml-ieqn-36"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:msub><mml:mi>x</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>=</mml:mo><mml:mn>0.2</mml:mn></mml:math>
</inline-formula>,<inline-formula id="ieqn-37">
<mml:math id="mml-ieqn-37"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:msub><mml:mi>y</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>=</mml:mo><mml:mn>0.8</mml:mn></mml:math>
</inline-formula>, <inline-formula id="ieqn-38">
<mml:math id="mml-ieqn-38"><mml:mi>&#x03B3;</mml:mi><mml:mo>=</mml:mo><mml:mn>6</mml:mn></mml:math>
</inline-formula>,<inline-formula id="ieqn-39">
<mml:math id="mml-ieqn-39"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>&#x03B1;</mml:mi><mml:mo>=</mml:mo><mml:mn>1.18</mml:mn></mml:math>
</inline-formula>, and <inline-formula id="ieqn-40">
<mml:math id="mml-ieqn-40"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mtext>&#xA0;</mml:mtext></mml:mrow><mml:mi>&#x03B2;</mml:mi><mml:mo>=</mml:mo><mml:mn>0.4</mml:mn></mml:math>
</inline-formula>.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Bifurcation Diagram</title>
<p>The bifurcation diagram illustrates the change in qualitative behavior of the map as the chaotic control parameters are varied. <xref ref-type="fig" rid="fig-3">Fig. 3</xref> shows the bifurcation structure of the Ikeda and the Sine Ikeda modulated maps. The bifurcation structure of the Ikeda map has blank windows, but the Sine Ikeda modulated map shows no sign of any blank windows. The blank windows do not exhibit chaos. Moreover, the proposed map exhibits bifurcations over a large chaotic parameter range compared to the state-of-the-art techniques. As a result, when compared to other chaotic maps, the Sine Ikeda modulated map is better suited for cryptographic systems.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Bifurcation plot of (a) The Ikeda map and (b) The Sine Ikeda modulated map</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30597-fig-3.png"/>
</fig>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Lyapunov Exponent</title>
<p>The characteristics of discrete chaotic maps are determined using a tool termed the Lyapunov exponent. A positive Lyapunov exponent signifies the presence of chaos. The Lyapunov exponents are calculated using the Jacobian matrix-based method that is described in [<xref ref-type="bibr" rid="ref-32">32</xref>]. Using <xref ref-type="disp-formula" rid="eqn-4">(4)</xref>, <xref ref-type="disp-formula" rid="eqn-5">(5)</xref> and <xref ref-type="disp-formula" rid="eqn-6">(6)</xref>, the derivatives and the Jacobian matrix (J) can be written as:</p>
<p><disp-formula id="eqn-8"><label>(8)</label>
<mml:math id="mml-eqn-8" display="block"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>=</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">[</mml:mo><mml:mrow><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mn>2</mml:mn><mml:msubsup><mml:mi>x</mml:mi><mml:mi>n</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mn>2</mml:mn><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">]</mml:mo><mml:mo>+</mml:mo><mml:mi>&#x03BC;</mml:mi><mml:mi>&#x03C0;</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>&#x03C0;</mml:mi><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mstyle></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-9"><label>(9)</label>
<mml:math id="mml-eqn-9" display="block"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>=</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">[</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mn>2</mml:mn><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mn>2</mml:mn><mml:msubsup><mml:mi>y</mml:mi><mml:mi>n</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mstyle></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-10"><label>(10)</label>
<mml:math id="mml-eqn-10" display="block"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>=</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">[</mml:mo><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:mn>2</mml:mn><mml:msubsup><mml:mi>x</mml:mi><mml:mi>n</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mn>2</mml:mn><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mstyle></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-11"><label>(11)</label>
<mml:math id="mml-eqn-11" display="block"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>=</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo stretchy="false">[</mml:mo><mml:mrow><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:mn>2</mml:mn><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mn>2</mml:mn><mml:msubsup><mml:mi>y</mml:mi><mml:mi>n</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">]</mml:mo><mml:mo>+</mml:mo><mml:mi>&#x03BC;</mml:mi><mml:mi>&#x03C0;</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>&#x03C0;</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mspace width="thickmathspace" /></mml:mstyle></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-12"><label>(12)</label>
<mml:math id="mml-eqn-12" display="block"><mml:mi>J</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>x</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:mrow></mml:mtd><mml:mtd><mml:mrow><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2202;</mml:mi><mml:msub><mml:mi>y</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<p>Similarly, the Jacobian matrix of the Ikeda map is computed using <xref ref-type="disp-formula" rid="eqn-1">Eqs. (1)&#x2013;</xref><xref ref-type="disp-formula" rid="eqn-3">(3)</xref>. <xref ref-type="fig" rid="fig-4">Fig. 4</xref> provides the Lyapunov exponent plot of the Ikeda, and the Sine Ikeda modulated map. The Lyapunov exponent of the Sine Ikeda modulated map is more positive compared to the Ikeda map. Therefore, the Sine Ikeda modulated map outperforms the basic Ikeda map in terms of the Lyapunov exponent. Furthermore, the Lyapunov exponent value is much larger than the existing chaotic map, which indicates that the proposed map is highly sensitive to initial conditions. Additionally, the two Lyapunov exponent values (LE1 and LE2) are positive in the proposed map, which shows that the Sine Ikeda modulated map exhibits hyperchaotic behavior. The Ikeda map exhibits chaotic behavior because only one Lyapunov exponent is positive. Also, existing 2D maps exhibit hyperchaotic behavior for very few values of the chaotic parameter. Therefore, compared to the Ikeda map and the existing 2D maps, it is very difficult to predict the output of the proposed map because of the hyperchaotic property. Hence, the proposed chaotic map exhibits the desirable characteristics of a cryptographic system.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>The plots of Lyapunov exponent for (a) The Ikeda map and (b) The Sine Ikeda modulated map</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30597-fig-4.png"/>
</fig>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Bifurcation Entropy</title>
<p>The bifurcation entropy specifies the measure of uncertainty present in the bifurcation structure. <xref ref-type="fig" rid="fig-5">Fig. 5</xref> shows the plot of the bifurcation entropy of the Ikeda map and the Sine Ikeda modulated map for 256 samples. The bifurcation entropy of the Ikeda map is maximal for very few values of the chaotic parameter, but the bifurcation entropy of the Sine Ikeda modulated map is always at its peak after some initial iteration. Also, the bifurcation entropy is zero for a few values of the chaotic parameter in the case of the Ikeda map, but the bifurcation entropy is non-zero and is greater than four in the case of the proposed map. Therefore, the Sine Ikeda modulated map outperforms other maps when used in cryptographic systems.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>The plots of bifurcation entropy for (a) The Ikeda map and (b) The proposed map</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30597-fig-5.png"/>
</fig>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>NIST Test for the Randomness of the Designed Chaotic key</title>
<p>The randomness of the keys generated using the proposed sine-modulated Ikeda is verified using the NIST statistical test suite SP 800-22 [<xref ref-type="bibr" rid="ref-33">33</xref>]. First, the keys generated were represented in binary form and tested using hundred samples of ten lakh bit length keys, and their significance level is 0.001. In <xref ref-type="table" rid="table-1">Tab. 1</xref>, all the <italic>P</italic>-values are greater than the significant value and have passed the test. Fifteen test results demonstrate that the designed sine-modulated Ikeda map has enough randomness to be used in cryptographic systems.</p>
<table-wrap id="table-1"><label>Table 1</label>
<caption>
<title>NIST statistical analysis result for the designed key</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Statistical analysis</th>
<th align="left">Proportions</th>
<th align="left"><italic>P</italic>-Values</th>
<th align="left">Result</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Block frequency</td>
<td align="left">0.702187</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Frequency (M&#x2009;&#x003D;&#x2009;128)</td>
<td align="left">0.446271</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Cumulative sums</td>
<td align="left">0.719874</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Runs</td>
<td align="left">0.947386</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Longest run of ones in block</td>
<td align="left">0.543892</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Non overlapping template</td>
<td align="left">0.778451</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Overlapping template</td>
<td align="left">0.218973</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Rank</td>
<td align="left">0.297543</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">FFT</td>
<td align="left">0.227232</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Universal</td>
<td align="left">0.667239</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Approximate entropy</td>
<td align="left">0.799189</td>
<td align="left">1.00</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Serial (m&#x2009;&#x003D;&#x2009;16)</td>
<td align="left">0.948756</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Linear complexity (M&#x2009;&#x003D;&#x2009;500)</td>
<td align="left">0.487254</td>
<td align="left">0.99</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Random excursions</td>
<td align="left">0.297654</td>
<td align="left">1.00</td>
<td align="left">Success</td>
</tr>
<tr>
<td align="left">Random excursions variant</td>
<td align="left">0.643001</td>
<td align="left">1.00</td>
<td align="left">Success</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4_5">
<label>4.5</label>
<title>Comparison of the Existing Technique with the Designed Chaotic Map-Based Key</title>
<p>In this section, the designed chaotic map has been compared with the existing techniques in terms of sensitive dependence on initial conditions, average cycle length, maximum Lyapunov exponent, and approximate entropy. <xref ref-type="table" rid="table-2">Tab. 2</xref> shows the comparison of the existing chaotic map-based key with that of the proposed key.</p>
<table-wrap id="table-2"><label>Table 2</label>
<caption>
<title>Comparison of the different chaotic maps used as a chaotic key</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Parameters</th>
<th align="left">2D LSCM [<xref ref-type="bibr" rid="ref-22">22</xref>]</th>
<th align="left">2D SLMM [<xref ref-type="bibr" rid="ref-23">23</xref>]</th>
<th align="left">Ikeda [<xref ref-type="bibr" rid="ref-29">29</xref>]</th>
<th align="left">Proposed</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">No. of iterations to exhibit sensitive dependence on the initial condition</td>
<td align="left">20</td>
<td align="left">15</td>
<td align="left">35</td>
<td align="left">2</td>
</tr>
<tr>
<td align="left">The average cycle length (Precision <inline-formula id="ieqn-41">
<mml:math id="mml-ieqn-41"><mml:msup><mml:mn>10</mml:mn><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>5</mml:mn></mml:mrow></mml:msup></mml:math>
</inline-formula>)</td>
<td align="left">5431</td>
<td align="left">4858</td>
<td align="left">237</td>
<td align="left">7543</td>
</tr>
<tr>
<td align="left">Maximum Lyapunov exponent</td>
<td align="left">1.403</td>
<td align="left">0.540</td>
<td align="left">1.232</td>
<td align="left">7.032</td>
</tr>
<tr>
<td align="left">Approximate entropy</td>
<td align="left">7.905</td>
<td align="left">7.904</td>
<td align="left">7.901</td>
<td align="left">7.992</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The first parameter from the table shows the number of iterations required for the chaotic maps to change their paths with a one-digit change in the initial condition. The initial conditions for all maps are assumed to be the same. The proposed chaotic map requires only two iterations compared to the existing map. This outcome shows that the sensitive dependence on the initial conditions is high compared to that of the existing 2D maps, which is the desirable characteristic of a chaotic key.</p>
<p>The second parameter is the cycle length. The cycle length of the chaotic map is important to decide on the dynamical degradation of the chaotic map. Also, <xref ref-type="fig" rid="fig-6">Fig. 6</xref> shows the comparison plot for different precisions. From <xref ref-type="table" rid="table-2">Tab. 2</xref> and <xref ref-type="fig" rid="fig-6">Fig. 6</xref>, it could be inferred that the cycle length is larger compared to the existing technique. Therefore, the proposed map can be applied to the cryptographic system.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>The plots of average cycle length <italic>vs.</italic> precision for different chaotic maps</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30597-fig-6.png"/>
</fig>
<p>The last parameter listed in the table is the approximate entropy of the key generated. The entropy is used to measure the randomness of the key. The maximum entropy for an eight-bit key is 8. It can be inferred from the above table that the designed map has an entropy close to 8 compared to the existing technique. As a result, an attacker will find it difficult to decode and interpret the keys.</p>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Conclusions</title>
<p>In this article, a novel chaotic map has been designed that exhibits chaos over a wide range of the chaotic parameters so that the keyspace is increased. The proposed map has excellent sensitivity to the initial conditions. The absence of the blank window in the bifurcation plot of the designed map reduces the possibility of an exhaustive search attack. The increased number of chaotic parameters further enhances the security of cryptographic systems. Furthermore, the uncertainty and the Lyapunov exponent in the chaotic region are maximal and exhibit hyper-chaotic properties compared to the existing maps. Also, NIST test results show that the designed chaotic map provides excellent randomness; this outcome enhances its applications in cybersecurity.</p>
</sec>
</body>
<back><fn-group>
<fn fn-type="other">
<p><bold>Funding Statement:</bold> The author received no specific funding for this study.</p>
</fn>
<fn fn-type="conflict">
<p><bold>Conflicts of Interest:</bold> The author declares that they have no conflicts of interest to report regarding the present study.</p>
</fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Jakimoski</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Kocarev</surname></string-name></person-group>, &#x201C;<article-title>Chaos and cryptography: Block encryption ciphers based on chaotic maps</article-title>,&#x201D; <source>IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications</source>, vol. <volume>48</volume>, no. <issue>2</issue>, pp. <fpage>163</fpage>&#x2013;<lpage>169</lpage>, <year>2001</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Belazi</surname></string-name>, <string-name><given-names>A. A.</given-names> <surname>Abd El-Latif</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Belghith</surname></string-name></person-group>, &#x201C;<article-title>A novel image encryption scheme based on substitution-permutation network and chaos</article-title>,&#x201D; <source>Signal Processing</source>, vol. <volume>128</volume>, no. <issue>1</issue>, pp. <fpage>155</fpage>&#x2013;<lpage>170</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Sun</surname></string-name> and <string-name><given-names>C.</given-names> <surname>Zhu</surname></string-name></person-group>, &#x201C;<article-title>A fast image encryption algorithm based on chaotic map</article-title>,&#x201D; <source>Optics and Lasers in Engineering</source>, vol. <volume>84</volume>, no. <issue>1</issue>, pp. <fpage>26</fpage>&#x2013;<lpage>36</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Abanda1</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Tiedeu</surname></string-name></person-group>, &#x201C;<article-title>Image encryption by chaos mixing</article-title>,&#x201D; <source>IET Image Processing</source>, vol. <volume>10</volume>, no. <issue>10</issue>, pp. <fpage>742</fpage>&#x2013;<lpage>750</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Wong</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Yu</surname></string-name> and <string-name><given-names>Z.</given-names> <surname>Zhu</surname></string-name></person-group>, &#x201C;<article-title>An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion</article-title>,&#x201D; <source>Communications in Nonlinear Science and Numerical Simulation</source>, vol. <volume>18</volume>, no. <issue>8</issue>, pp. <fpage>2066</fpage>&#x2013;<lpage>2080</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N. K.</given-names> <surname>Pareek</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Patidar</surname></string-name> and <string-name><given-names>K. K.</given-names> <surname>Sud</surname></string-name></person-group>, &#x201C;<article-title>Image encryption using chaotic logistic map</article-title>,&#x201D; <source>Image and Vision Computing</source>, vol. <volume>24</volume>, no. <issue>9</issue>, pp. <fpage>926</fpage>&#x2013;<lpage>934</lpage>, <year>2006</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Yi</surname></string-name>, <string-name><given-names>C. H.</given-names> <surname>Tan</surname></string-name> and <string-name><given-names>C. K.</given-names> <surname>Siew</surname></string-name></person-group>, &#x201C;<article-title>A new block cipher based on chaotic tent maps</article-title>,&#x201D; <source>IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications</source>, vol. <volume>49</volume>, no. <issue>12</issue>, pp. <fpage>1826</fpage>&#x2013;<lpage>1829</lpage>, <year>2002</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Kocarev</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Jakimoski</surname></string-name></person-group>, &#x201C;<article-title>Logistic map as a block encryption algorithm</article-title>,&#x201D; <source>Physics Letters A</source>, vol. <volume>289</volume>, no. <issue>4&#x2013;5</issue>, pp. <fpage>199</fpage>&#x2013;<lpage>206</lpage>, <year>2001</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Yuan</surname></string-name> and <string-name><given-names>Q.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>A novel image encryption algorithm based on chaos and line map</article-title>,&#x201D; <source>Neurocomputing</source>, vol. <volume>169</volume>, no. <issue>1</issue>, pp. <fpage>150</fpage>&#x2013;<lpage>157</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Wong</surname></string-name>, <string-name><given-names>B. S. -H.</given-names> <surname>Kwok</surname></string-name> and <string-name><given-names>W. -S.</given-names> <surname>Law</surname></string-name></person-group>, &#x201C;<article-title>A fast image encryption scheme based on chaotic standard map</article-title>,&#x201D; <source>Physics Letters A</source>, vol. <volume>372</volume>, no. <issue>15</issue>, pp. <fpage>2645</fpage>&#x2013;<lpage>2652</lpage>, <year>2008</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Gao</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Liang</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>A new chaotic algorithm for image encryption</article-title>,&#x201D; <source>Chaos Solitons and Fractals</source>, vol. <volume>29</volume>, no. <issue>2</issue>, pp. <fpage>393</fpage>&#x2013;<lpage>399</lpage>, <year>2006</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Ali</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Masud</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Rehman</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Mehmood</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>An effective blockchain based secure searchable encryption system</article-title>,&#x201D; <source>Intelligent Automation &#x0026; Soft Computing</source>, vol. <volume>33</volume>, no. <issue>2</issue>, pp. <fpage>1183</fpage>&#x2013;<lpage>1195</lpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>De</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Bhaumik</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Giri</surname></string-name></person-group>, &#x201C;<article-title>A secure image encryption scheme based on three different chaotic maps</article-title>,&#x201D; <source>Multimedia Tools and Applications</source>, vol. <volume>81</volume>, no. <issue>4</issue>, pp. <fpage>5485</fpage>&#x2013;<lpage>5514</lpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Elghandour</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Salah</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Karawia</surname></string-name></person-group>, &#x201C;<article-title>A new cryptographic algorithm via a two-dimensional chaotic map</article-title>,&#x201D; <source>Ain Shams Engineering Journal</source>, vol. <volume>13</volume>, no. <issue>1</issue>, pp. <fpage>101489</fpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O.</given-names> <surname>Al-Hazaimeh</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Al-Jamal</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Bawaneh</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Alhindawi</surname></string-name> and <string-name><given-names>B.</given-names> <surname>Hamdoni</surname></string-name></person-group>, &#x201C;<article-title>A new image encryption scheme using dual chaotic map synchronization</article-title>,&#x201D; <source>The International Arab Journal of Information Technology</source>, vol. <volume>18</volume>, no. <issue>1</issue>, pp. <fpage>95</fpage>&#x2013;<lpage>102</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Chen</surname></string-name> and <string-name><given-names>W. A.</given-names> <surname>Halang</surname></string-name></person-group>, &#x201C;<article-title>Cryptanalysis of an image encryption scheme based on a compound chaotic sequence</article-title>,&#x201D; <source>Image and Vision Computing</source>, vol. <volume>27</volume>, no. <issue>8</issue>, pp. <fpage>1035</fpage>&#x2013;<lpage>1039</lpage>, <year>2009</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Wei</surname></string-name> and <string-name><given-names>Q.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Cryptanalysis of an image cryptosystem based on logistic map</article-title>,&#x201D; <source>Optik</source>, vol. <volume>124</volume>, no. <issue>14</issue>, pp. <fpage>1773</fpage>&#x2013;<lpage>1776</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Alvarez</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Montoya</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Romera</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Pastor</surname></string-name></person-group>, &#x201C;<article-title>Cryptanalysis of a discrete chaotic cryptosystem using external key</article-title>,&#x201D; <source>Physics Letters A</source>, vol. <volume>319</volume>, no. <issue>3&#x2013;4</issue>, pp. <fpage>334</fpage>&#x2013;<lpage>339</lpage>, <year>2003</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Xiao</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Shu</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations</article-title>,&#x201D; <source>Signal Processing: Image Communication</source>, vol. <volume>28</volume>, no. <issue>3</issue>, pp. <fpage>292</fpage>&#x2013;<lpage>300</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. T.</given-names> <surname>Saleh</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Haeri</surname></string-name></person-group>, &#x201C;<article-title>Chaos in the APFM nonlinear adaptive filter</article-title>,&#x201D; <source>Signal Processing</source>, vol. <volume>89</volume>, no. <issue>5</issue>, pp. <fpage>697</fpage>&#x2013;<lpage>702</lpage>, <year>2009</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X. -Y.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>Y. -Q.</given-names> <surname>Zhang</surname></string-name> and <string-name><given-names>Y. -Y.</given-names> <surname>Zha</surname></string-name></person-group>, &#x201C;<article-title>A novel image encryption scheme based on 2-D logistic map and DNA sequence operations</article-title>,&#x201D; <source>Nonlinear Dynamics</source>, vol. <volume>82</volume>, no. <issue>1</issue>, pp. <fpage>1269</fpage>&#x2013;<lpage>1280</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Hua</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Jin</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Xu</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Huang</surname></string-name></person-group>, &#x201C;<article-title>2D logistic&#x2013;sine-coupling map for image encryption</article-title>,&#x201D; <source>Signal Processing</source>, vol. <volume>149</volume>, no. <issue>1</issue>, pp. <fpage>148</fpage>&#x2013;<lpage>161</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Hua</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>C. -M.</given-names> <surname>Pun</surname></string-name> and <string-name><given-names>C. L.</given-names> <surname>Philip</surname></string-name></person-group>, &#x201C;<article-title>2D sine logistic modulation map for image encryption</article-title>,&#x201D; <source>Information Sciences</source>, vol. <volume>297</volume>, no. <issue>1</issue>, pp. <fpage>80</fpage>&#x2013;<lpage>94</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Jiang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Wei</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>A new class of two-dimensional chaotic maps with closed curve fixed points</article-title>,&#x201D; <source>International Journal of Bifurcation and Chaos</source>, vol. <volume>29</volume>, no. <issue>7</issue>, pp. <fpage>1950094</fpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>Hadjabi</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Ouannas</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Shawagfeh</surname></string-name>, <string-name><given-names>A. -A.</given-names> <surname>Khennaoui</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Grassi</surname></string-name></person-group>, &#x201C;<article-title>On two-dimensional fractional chaotic maps with symmetries</article-title>,&#x201D; <source>Symmetry</source>, vol. <volume>12</volume>, no. <issue>5</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>13</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Elghandour</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Salah</surname></string-name> and <string-name><given-names>A. R.</given-names> <surname>Karawia</surname></string-name></person-group>, &#x201C;<article-title>A new cryptographic algorithm via a two-dimensional chaotic map</article-title>,&#x201D; <source>Ain Shams Engineering Journal</source>, vol. <volume>13</volume>, no. <issue>1</issue>, pp. <fpage>101489</fpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>X. R.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>G. Z.</given-names> <surname>Dai</surname></string-name>, <string-name><given-names>P. S.</given-names> <surname>Chang</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>A multi-feature earning model with enhanced local attention for vehicle re-identification</article-title>,&#x201D; <source>Computers, Materials &#x0026; Continua</source>, vol. <volume>69</volume>, no. <issue>3</issue>, pp. <fpage>3549</fpage>&#x2013;<lpage>3560</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>G. C.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>X. R.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Zhang</surname></string-name> and <string-name><given-names>N. N.</given-names> <surname>Ge</surname></string-name></person-group>, &#x201C;<article-title>Fine-grained vehicle type classification using lightweight convolutional neural network with feature optimization and joint learning strategy</article-title>,&#x201D; <source>Multimedia Tools and Applications</source>, vol. <volume>80</volume>, no. <issue>20</issue>, pp. <fpage>30803</fpage>&#x2013;<lpage>30816</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Kathleen</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Tim</surname></string-name> and <string-name><given-names>J. A.</given-names> <surname>Yorke</surname></string-name></person-group>, <source>Chaos: An Introduction to Dynamical Systems</source>, <publisher-loc>Springer-Verlag, New York</publisher-loc>: <publisher-name>Springer</publisher-name>, <year>1997</year>. [Online]. Available: <uri xlink:href="https://link.springer.com/book/10.1007/b97589">https://link.springer.com/book/10.1007/b97589</uri>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Hanis</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Amutha</surname></string-name></person-group>, &#x201C;<article-title>A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure</article-title>,&#x201D; <source>Nonlinear Dynamics</source>, vol. <volume>95</volume>, no. <issue>1</issue>, pp. <fpage>421</fpage>&#x2013;<lpage>432</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Hacibekiroglu</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Caglar</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Polatoglu</surname></string-name></person-group>, &#x201C;<article-title>The higher order schwarzian derivative: Its applications for chaotic behavior and new invariant sufficient condition for chaos</article-title>,&#x201D; <source>Nonlinear Analysis: Real World Applications</source>, vol. <volume>10</volume>, no. <issue>3</issue>, pp. <fpage>1270</fpage>&#x2013;<lpage>1275</lpage>, <year>2009</year>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Benettin</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Galgani</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Giorgilli</surname></string-name> and <string-name><given-names>J. -M.</given-names> <surname>Strelcyn</surname></string-name></person-group>, &#x201C;<article-title>Lyapunov characteristic exponents for smooth dynamical systems and for Hamiltonian systems: A method for computing all of them</article-title>,&#x201D; <source>Meccanica</source>, vol. <volume>15</volume>, no. <issue>1</issue>, pp. <fpage>9</fpage>&#x2013;<lpage>20</lpage>, <year>1980</year>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Bassham</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Rukhin</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Soto</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Nechvatal</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Smid</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<chapter-title>A statistical test suite for random and pseudorandom number generators for cryptographic applications</chapter-title>,&#x201D; in <source>Special Publication (NIST SP), National Institute of Standards and Technology</source>, <publisher-name>Gaithersburg, MD, USA</publisher-name>, <year>2010</year> [online]. <uri xlink:href="https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762">https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id&#x003D;906762</uri>.</mixed-citation></ref>
</ref-list>
</back>
</article>