Research Proposal Final
Research Proposal Final
1. Introduction
In today’s interconnected world, securing information during transmission has become critical,
especially with the exponential rise in digital communication. The internet and social media
platforms are widely used to share multi-modal information, including text, images, videos, and
other data types. However, the open nature of these networks exposes this information to risks
such as theft, unauthorized alteration, and dissemination, making robust information security
measures essential.
Digital images are particularly vulnerable due to their large data size, high redundancy, and
significant correlation between neighboring pixels. These unique characteristics necessitate
specialized encryption techniques to ensure their confidentiality, integrity, and availability.
Cryptography, a foundational method in information security, plays a vital role in protecting digital
images. By employing encryption and decryption, cryptography converts readable data (plaintext)
into unreadable formats (cipher text) and vice versa, safeguarding sensitive information from
unauthorized access.
Encryption processes rely heavily on Random Number Generators (RNGs) for generating secure
keys. RNGs can be categorized into True Random Number Generators (TRNGs), Pseudo-random
Number Generators (PRNGs), and Cryptographically Secure Random Number Generators (CS-
RNGs). TRNGs are based on non-deterministic physical processes, while PRNGs and CS-RNGs
use mathematical algorithms to produce pseudo-random sequences. Chaos-based PRNGs,
characterized by their deterministic yet unpredictable behavior, have gained prominence in
cryptographic applications due to their extreme sensitivity to initial conditions and ability to
generate complex sequences.
Chaotic systems, derived from nonlinear equations, are particularly suitable for image encryption.
They offer advantages such as large key spaces, sensitivity to initial parameters, and simplicity in
implementation. However, existing chaotic systems face challenges, including limited randomness
and high computational costs, particularly for high-dimensional maps. To address these issues, this
research proposes the development of a novel chaotic system that enhances pseudo-random
number generation and improves the cryptographic security of digital images.
The proposed system will be evaluated through rigorous metrics, including uniform distribution,
key space analysis, Lyapunov exponents, and randomness tests based on the National Institute of
Standards and Technology (NIST) SP 800-22 framework. By integrating the novel chaotic system
into an image encryption algorithm, this study aims to demonstrate its effectiveness in providing
secure and efficient encryption for digital images.
2. Literature Review
Recent advancements in encryption technologies have significantly enhanced the security of
digital images, with a particular focus on chaos theory-based techniques. Chaos theory, known for
its non-periodicity, sensitivity to initial conditions, and randomness, offers a powerful approach to
encryption due to its ability to generate unpredictable and complex behavior. These properties
make chaotic systems ideal for secure image encryption, as they can generate key streams that are
difficult to predict or reproduce, ensuring higher levels of security.
Chaos-based encryption techniques can be categorized into spatial and frequency domain
approaches. In the spatial domain, techniques like permutation, substitution, and transformation
are employed, where pixel values are either substituted or shuffled based on a secret key. In
contrast, frequency domain encryption techniques operate by transforming the image into the
frequency domain using methods such as Discrete Fourier Transform (DFT) or Discrete Cosine
Transform (DCT), ensuring secure transmission while preserving image integrity.
2. Neural Networks and Chaos-Based Systems
Another promising approach to image encryption is the integration of artificial neural networks
(ANNs) with chaotic systems. Kassem proposed a neural chaotic generator for image encryption,
which utilizes a chaotic generator modified by an ANN to extend the cycle and prevent dynamical
damage. This hybrid approach has been shown to improve encryption security by creating more
complex key sequences and enhancing the overall robustness of the encryption system.
The use of ANNs in conjunction with chaotic systems helps in generating pseudo-random
sequences that can be highly sensitive to changes in initial conditions, making the encryption
system more secure. Moreover, these hybrid systems can adapt to new data inputs, allowing for
dynamic encryption that is more difficult to crack using traditional methods.
Other studies, such as those by Liu, H. and Wang have proposed encryption techniques based on
piecewise linear mapping of DNA (PWLCM), which expands the key space and improves the
encryption system’s complexity. Additionally, Elamrawy et al. [40] introduced an encryption
technique that integrates DNA coding with a 2D logistic chaotic map, offering a novel solution to
image encryption that incorporates the parallel processing strengths of DNA with the
unpredictability of chaotic maps.
Shafique et al. proposed an image encryption technique that combines both spatial and frequency
domain techniques, leveraging the unique characteristics of each domain to strengthen the
encryption process. This hybrid method ensures higher security levels by exploiting both pixel
manipulation in the spatial domain and frequency transformation for more complex encryption.
Azman Samsudin proposed a hybrid system that cascades two chaotic maps, presenting a novel
approach to chaotification. This method improves the chaotic parameter range, sensitivity, and
overall complexity of the encryption system, thus offering a higher degree of security compared
to traditional chaotic systems.
Patidar et al. presented a unique pseudo-random bit generator based on two chaotic standard maps
and two chaotic logistic maps. The system generates random sequences that pass rigorous
statistical tests, such as NIST and DIEHARD, ensuring the randomness and security of the
generated keys.
3. Objectives
To propose a new 1-D Chaotic system with large key space and an increased range of control
parameter.
The uniform distribution, Lyapunov exponent, correlation, and information entropy of new
system will be analyzed.
To evaluate the applicability of the new 1-D Chaotic system using the NIST Test Suite
SP800–22, with the expectation that all tests will pass at a significance level of p-value ≥
0.01.
To apply the new chaotic system into a color image encryption to demonstrate its security
and efficiency.
4. Research Methodology
This research methodology outlines a proposed chaotic system designed for use in cryptographic
applications, focusing on generating pseudo-random number sequences (PRNG) and evaluating
the system's security. The methodology is divided into three phases:
This phase utilizes a 1-D chaotic map to generate random number sequences. The key parameters
involved are the initial seed (x) and control parameter (r), both chosen from the range [0, 1]. A key
space is computed based on these values, and a Lyapunov exponent is calculated to assess the
chaotic behavior of the system. A positive Lyapunov exponent indicates chaotic behavior, which
is essential for cryptographic security.
In this phase, various system behaviors are analyzed, including the bifurcation diagram, uniformity,
phase space, correlation, and equilibrium analysis. These tests aim to evaluate the stability,
randomness, and uniformity of the PRNG output. Bifurcation diagrams show how system behavior
changes with control parameters, while uniformity and correlation analyses ensure that the random
numbers are evenly distributed and uncorrelated, which is critical for secure encryption.
Phase 3: NIST Statistical Testing
The system’s randomness is evaluated using the NIST SP800-22 test suite. This suite includes 15
statistical tests to assess whether the generated binary sequence exhibits true randomness. The
sequence is considered random if its p-values exceed the threshold of 0.01 for all tests.
Key Components:
Proposed Chaotic Equation: The new chaotic equation is derived from a 1-D chaotic map
with a variable control parameter (α) tested in the range [-1, 1]. The key space is computed
from different values of α, and the chaotic behavior is evaluated through Lyapunov
exponents and bifurcation diagrams.
Lyapunov Exponent: A positive Lyapunov exponent indicates chaotic behavior. Both the
logistic map and the proposed PRNG show positive Lyapunov exponents, indicating their
suitability for generating random sequences.
Bifurcation and Phase Space Diagrams: These diagrams are used to visualize the
system's chaotic behavior and the stability of its states. The phase space diagram helps in
understanding the random behavior of the PRNG over time.
Uniformity and Correlation Analysis: These analyses ensure that the PRNG generates a
uniform distribution of random numbers and that the numbers are not correlated, which is
essential for cryptographic security.
Equilibrium and Entropy: Equilibrium analysis ensures the system stabilizes over time,
while information entropy measures the randomness of the system, which is essential for
high-quality encryption.
5. Problem Statement
1-D chaotic maps are used as PRNG methods for improving the security of images because
of their simple structure and ease of implementation, but they are less secure due to their small key
space, weak security, and limited chaotic range. To overcome this, a novel 1-D chaotic system is
developed with following key properties:
This research will contribute to the field of information security by addressing the unique
challenges of digital image encryption. The proposed chaotic system will offer a more secure
and efficient solution, benefiting various applications that rely on secure image transmission,
such as social media, medical imaging, and defense systems. Current communication systems
relies extensively on cryptography as it gives methods for securing both the transmission and
storage of data or Cryptography plays a significant role in advanced communication systems
by providing techniques to secure information transmission and storage. It includes using
mathematical algorithms to encrypt plaintext information into ciphertext, making it unreadable
to unauthorized users. The efficiency of encryption relies on the private key, which is necessary
for methods of cryptography. The private key is needed for data encryption and decryption.
The security level of a cryptographic system is determined by the key strength and key space
of the system. The use of a random number generator can enable the encryption of large
amounts of data, which can be obtained through private keys. For the purpose of generating
keys for encryption techniques, a chaotic system with a huge key space would be more safe.
The need for robust and secure encryption methods has increased with the use of digital
communication. The huge key space of the proposed random number generator makes it more
difficult for attackers to decrypt the cipher messages, which would be useful in providing
enhanced data security. This research has the potential to contribute to the development of a
highly secure encryption algorithm. These algorithms can be practically implemented for the
privacy and security in the digital media. . It may protect an extensive variety of sensitive data
especially that used in national security, industry, banking, and healthcare. By using this
technique, we can better protect sensitive information from hackers and other threats.
8. Conclusion
This research aims to develop an advanced one-dimensional chaotic system to overcome the
limitations of existing models, such as small key space and weak security. By systematically
analyzing the proposed system through Lyapunov exponents, bifurcation diagrams, and NIST
statistical tests, this study seeks to ensure enhanced randomness, efficiency, and applicability in
cryptographic systems. The outcomes will contribute to advancing chaos-based cryptography,
offering a secure and efficient solution for modern secure communications.