ArticlePDF Available

Analysis of Chaotic Logistic Map used to Generate Secret Keys

Authors:
  • Al-Balqa Applied University

Abstract

Chaotic logistic map is a good model which can be used to generate various secret keys used in data cryptography. In this paper research a detailed analysis of CLM will be introduced. The behavior of CLM will be studied to show how to select the best values of the CLM parameters (growth rate, initial population and the length of the population). Various ranges of the population growth and the initial population will be tested. It will be shown how to use the generated populations to form various secret keys. The sensitivity of CLM will be studied, and it will be shown that any minor changes in the CLM parameters will lead to change the generated population. The population generation time will be tested using various in length generated population, and some recommendation will be provided when dealing with data with big size. It will be shown that using CLM will provide a good security level when using the CLM parameters as a private key.
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 25
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320088X
IMPACT FACTOR: 7.056
IJCSMC, Vol. 13, Issue. 4, April 2024, pg.25 40
Analysis of Chaotic Logistic Map
used to Generate Secret Keys
Prof. Ziad Alqadi
Albalqa Applied University, Faculty of Engineering Technology, Jordan-Amman
DOI: https://doi.org/10.47760/ijcsmc.2024.v13i04.004
Abstract:
Chaotic logistic map is a good model which can be used to generate various secret keys used in data cryptography.
In this paper research a detailed analysis of CLM will be introduced. The behavior of CLM will be studied to show
how to select the best values of the CLM parameters (growth rate, initial population and the length of the
population). Various ranges of the population growth and the initial population will be tested. It will be shown how
to use the generated populations to form various secret keys. The sensitivity of CLM will be studied, and it will be
shown that any minor changes in the CLM parameters will lead to change the generated population. The population
generation time will be tested using various in length generated population, and some recommendation will be
provided when dealing with data with big size. It will be shown that using CLM will provide a good security level
when using the CLM parameters as a private key.
Keywords: CLM, population, growth rate, initial population, length, private key, secret key, indices key.
Introduction
Chaotic logistic map (CLM) is a nonlinear difference equation (see equation 1), which maps the maps the population
value at any time step to its value at the next time step [77-84].
CLM is a system, nonlinear and dynamic; a system is just a set of interacting components that form a larger
whole. Nonlinear means that due to feedback or multiplicative effects between the components, the whole becomes
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 26
something greater than just adding up the individual parts. Lastly, dynamical means the system changes over time
based on its current state [1-10].
The CLM equation is so simple, but it produces chaos at certain growth rate parameters values, table 1 shows the
populations values for various values of r using x=0.2 as initial population value.
Table 1: Population values using various growth rates (X1=0.2)
Iteration
r=0.5
r=1
r=1.5
r=2
r=2.5
r=3
r=3.5
1
0.2000
0.2000
0.2000
0.2000
0.2000
0.2000
0.2000
2
0.0800
0.1600
0.2400
0.3200
0.4000
0.4800
0.5600
3
0.0368
0.1344
0.2736
0.4352
0.6000
0.7488
0.8624
4
0.0177
0.1163
0.2981
0.4916
0.6000
0.5643
0.4153
5
0.0087
0.1028
0.3139
0.4999
0.6000
0.7376
0.8499
6
0.0043
0.0922
0.3230
0.5000
0.6000
0.5806
0.4465
7
0.0021
0.0837
0.3280
0.5000
0.6000
0.7305
0.8650
8
0.0011
0.0767
0.3306
0.5000
0.6000
0.5906
0.4088
9
0.0005
0.0708
0.3320
0.5000
0.6000
0.7254
0.8459
10
0.0003
0.0658
0.3327
0.5000
0.6000
0.5976
0.4563
11
0.0001
0.0615
0.3330
0.5000
0.6000
0.7214
0.8683
12
0.0001
0.0577
0.3332
0.5000
0.6000
0.6029
0.4002
13
0.0000
0.0544
0.3332
0.5000
0.6000
0.7182
0.8401
14
0.0000
0.0514
0.3333
0.5000
0.6000
0.6072
0.4700
15
0.0000
0.0488
0.3333
0.5000
0.6000
0.7156
0.8719
16
0.0000
0.0464
0.3333
0.5000
0.6000
0.6106
0.3910
17
0.0000
0.0442
0.3333
0.5000
0.6000
0.7133
0.8334
18
0.0000
0.0423
0.3333
0.5000
0.6000
0.6135
0.4859
19
0.0000
0.0405
0.3333
0.5000
0.6000
0.7113
0.8743
20
0.0000
0.0389
0.3333
0.5000
0.6000
0.6160
0.3846
The calculated populations of the CLM can be used to generate various types of secret keys [11-20], which can be
used in data security applications such as message, image and speech cryptography [21-30].
The CLM can be useful to generate the following kinds of secret key [31-40]:
- Generation 1D key of fractional values:
Here the calculated population values will be used as a key [41-50], the length of the key can be controlled by the
user. The following example shows how to generate a 10 elements key with fractional values:
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 27
- Generation 2D key of fractional values:
Here the calculated population values will be used as a key [51-60], the length (number of rows and number of
columns) of the key can be controlled by the user. The following example shows how to generate a 10 elements key
with fractional values:
- Generation 1D key of integer values:
Here the calculated population values will be used as a key [61-70], the length of the key can be controlled by the
user. The following example shows how to generate a 10 elements key with fractional values:
- Generation 2D key of integer values:
Here the calculated population values will be used as a key, the length (number of rows and number of columns) of
the key can be controlled by the user. The following example shows how to generate a 10 elements key with
fractional values:
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 28
- Generation 1D indices key:
Here the calculated population values will be used as a data set to generate the secret indices key [71-80], the
generated population will be sorted to get the indices key, this key will contain a set of unrepeated integer values,
the first value will point to the minimum element in the data set, the second value will point to the second minimum
and so on, the length of the key can be controlled by the user. The following example shows how to generate a 10
elements key with fractional values:
- Generation 2D indices key:
The generated population can be used to generate a 2D indices key by selecting the values of the rows and columns,
the generated population can by sorted row or columns wise to form a 2D matrix of indices keys, the following
example shows how to generate a set of indices keys, each row of the matrix forms an indices key:
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 29
Analysis of CLM populations
To maximize the benefits of using CLM to generate secret keys, the following must be taken in considerations:
a) CLM population’s behaviors.
b) Key generation time.
c) Required memory space.
d) Key sensitivity.
a) CLM populations behaviors
CLM was implemented varying the value of the population growth r, figure 1 shows the obtained populations:
Here we can see how the population changes over the time, when using different values of r. The line representing a
growth rate of 1 is quickly drops to zero. The population dies out. The line representing a growth rate of 2.0
(remember, the replacement rate) and it stays steady at a population level of 0.5 after 4 iterations. The growth rates
of 2.5 keeps the population value stable) 0.6) after 4 iterations. The growth rates of 2.9 keeps the population stables
with repeated values 0.7 and 06. Based on the previous behaviors of the populations, the values of r must be greater
than 3. Changing the initial value of the population will not enhance the generated values of the population (see
figure 2).
Figure 1: Generated populations when varying r (r<3) with initial population=0.1
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 30
Figure 2: Generated populations when varying r (r<3) with initial population=0.9
An attractor is the value, or set of values, that the system settles toward over time. When the growth rate parameter
is set to 1 or less, the system has a fixed-point attractor at population level 0. In other words, the population value is
drawn toward 0 over time as the model iterates. When the growth rate parameter is set to 3.5 9 (see figure 3), the
system oscillates between four values. This attractor is called a limit cycle.
But when we adjust the growth rate parameter beyond 3.5, we see the onset of chaos. A chaotic system has a strange
attractor, around which the system oscillates forever, never repeating itself or settling into a steady state of
behavior. It never hits the same point twice and its structure has a fractal form, meaning the same patterns exist at
every scale no matter how much you zoom into it.
0 2 4 6 8 10 12 14 16 18 20
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Elem ent
Value
X=0.1
r=3
r=3.1
r=3.4
r=3.7
r=3.9
Figure 3: Generated populations when varying r (r>=3) with initial population=0.1
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 31
Growth rate with value above 3.0 the possible population values fork into two discrete paths (see figure 4). At
growth rate 3.2, the system essentially oscillates exclusively between two population values: one around 0.5 and the
other around 0.8. In other words, at that growth rate, applying the logistic equation to one of these values yields the
other.
Just after growth rate 3.4, the diagram bifurcates again into four paths. When the growth rate parameter is set to 3.5,
the system oscillates over four population values. Just after growth rate 3.5, it bifurcates again into eight paths. Here,
the system oscillates over eight population values.
Beyond a growth rate of 3.6, however, the bifurcations ramp up until the system is capable of eventually landing
on any population value. This is known as the period-doubling path to chaos. As you adjust the growth rate
parameter upwards, the logistic map will oscillate between two then four then eight then 16 then 32 (and on and on)
population values. These are periods, just like the period of a pendulum.
By the time we reach growth rate 3.9, it has bifurcated so many times that the system now jumps, seemingly
randomly, between all population values. We only say seemingly randomly because it is definitely not random.
Rather, this model follows very simple deterministic rules yet produces apparent randomness. This is chaos:
deterministic and periodic.
2.8 3 3.2 3.4 3.6 3.8 4
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Growth Rate r
The Attractor
Figure 4: Bifurcation diagram of the population
Taking the CLM behaviors in consideration the best values to be selected to generate a population to be used to
generate a secret key must be between 3.5 and 4.
The initial value of the population x must be within the range 0 to 1 (0<x<1), for these values the populations will
oscillate between two values as shown in figure 5
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 32
Figure 5: Required values of the initial population
For initial values greater than 2 or less than 0 the population value will have a minus infinite value after 8 to 10
iterations as shown in figure 6:
Figure 6: Infinite populations
It can be hard to tell if certain time series are chaotic or just random when you don’t fully understand their
underlying dynamics. Take these two as an example (see figure 7):
Both of the lines seem to jump around randomly. The blue line does depict random data, but the red line comes from
our logistic model when the growth rate is set to 3.99. This is deterministic chaos, but it’s hard to differentiate it
from randomness.
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 33
For key generation it is better to use CLM and use the generated population to form the secret key because of the
following reasons:
- The generated population using fixed values of r and x remain stable; these values will generate the same
population.
- Using CLM we have to save the values of r, x and the population length, thus we need 24 bytes to store these values
to be used as a private key.
- Random values are changing from time to time, so here we have to store all random numbers, and the private key
here will need 8 multiplied by the key length byte.
Figure 7: Random VS chaos values
b) Key generation time
Despite the simplicity of using CLM to generate a secret key, the key generation requires a key generation time
(KGT),which must be added to the encryption-decryption time, thus the key generation process will affect the
efficiency of the crypto system, increasing the KGT will negatively affect the speed of data cryptography.
The KGT will mainly depend on the length of the key.
To show the required time needed to generate a population, the following CLM was execute varying the population
length, and table 2 shows the obtained results:
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 34
Table 2: KGT results
Length
KGT(second)
Length
KGT(second)
100
0.000001
15000
0.167000
200
0.000001
20000
0.250000
400
0.003000
25000
0.379000
500
0.004000
30000
0.528000
1000
0.017000
40000
0.976000
2000
0.052000
50000
1.549000
2500
0.054000
100000
10.599000
4000
0.060000
200000
57.864000
5000
0.064000
400000
331.892000
10000
0.101000
1000000
2311.878000
As we can see from table 2 the KGT will rapidly increase when increasing the population size (see figure 8), thus it
is recommended to use a population size with size less than 5000.
Digital data (with size greater than 5000) to be encrypted-decrypted must be divided into blocks, block size must be
less than 5000 elements, this will save the generation time and will increase the speed of the crypto system.
Figure 8: KGT vs population size
c) Chaos sensitivity
The generated populations of the CLM are very sensitive to the selected values of the growth rate r, the initial
population x and the length of the population, the generated population will change applying the following:
- Any minor changes in x.
- Any minor changes in r.
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 35
- Any minor changes in both r and x.
- Any minor changed in the length of population.
A CLM with r=3.99 and varying x was used to generate a population with 12 elements, tables 3 and 4 show the
obtained populations:
Table 3: Obtained populations when varying x by small changes
Population index
X=0.1
X=0.11
X=0.111
1
0.3940
0.3906
0.3937
2
0.9527
0.9498
0.9524
3
0.1798
0.1904
0.1807
4
0.5884
0.6150
0.5908
5
0.9663
0.9448
0.9646
6
0.1298
0.2083
0.1363
7
0.4508
0.6579
0.4697
8
0.9879
0.8980
0.9938
9
0.0479
0.3654
0.0245
10
0.1819
0.9252
0.0953
11
0.5938
0.2763
0.3440
12
0.9624
0.7978
0.9003
Table 4: Obtained populations using bigger x
Population index
X=0.2
X=0.3
X=0.4
1
0.8379
0.9576
0.9975
2
0.5419
0.1620
0.0100
3
0.9905
0.5417
0.0393
4
0.0376
0.9906
0.1507
5
0.1444
0.0373
0.5106
6
0.4930
0.1432
0.9971
7
0.9973
0.4894
0.0117
8
0.0107
0.9971
0.0462
9
0.0423
0.0117
0.1759
10
0.1617
0.0462
0.5784
11
0.5408
0.1758
0.9730
12
0.9909
0.5781
0.1050
It is shown from tables 3 and 4 that any minor changes in the initial population x will lead to change the population,
thus the generated secret keys obtained from the population will also change. The values of the population length, x
and are unique and the can be used as a private key. The same things we can see when changing the population
growth r, changing r will also change the generated population as shown in figure 9.
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 36
Figure 9: Changing r will change the generated population
d) Security issues
Using the CLM parameters as a private key will provide a good key space, if one CLM is used to generate the
populations required to form the secret key, then the private key will contain the values of three parameters, each
parameter will have a double type data value, thus the private key length will equal 192 bits, the key space will
calculated using equation 2:
The entropy of the key space equal 192, this entropy (>128) [83] will make the key strong enough to resist hacking
attempts.
Conclusion
The CLM was analyzed, it was shown that the process of population generation is so simple, these population can be
easily used to form the required for data cryptography process. It was shown that the best value of the growth rate
must be between 3 and 4, while the best of the initial population must be between 0 and 1, using these values we can
generate a population with various contents and lengths. The CLM parameters can be used as a PK, and the
generated secret keys will be very sensitive to the selected values of the private key.
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 37
The main disadvantage of CLM is the required population generation time, increasing the population length will
rapidly increase the generation time, in this case we can use a population with smaller length, this population can be
used to process a data block, here the data to be processed must be divided into block to save the population
generation time and to increase the speed of data cryptography.
References
[1]. Kaur, R. Dhir, & G. Sikka,“A new image steganography based on first component alteration technique”, International
Journal of Computer Science and Information Security (IJCSIS), 6, pp.53-56,
2009.http://arxiv.org/ftp/arxiv/papers/1001/1001.1972.pdf
[2]. Alvaro Martin, Guillermo Sapiro, &GadielSeroussi,“Is Steganography Natural”, IEEE Transactions on Image
Processing, 14(12), pp.2040-2050, 2005.doi: 10.1109/TIP.2005.859370
[3]. Bhattacharyya, A. Roy, P. Roy, & T. Kim,“Receiver compatible data hiding in color image”, International Journal of
Advanced Science and Technology, 6, pp.15-24, 2009.http://www.sersc.org/journals/IJAST/vol6/2.pdf
[4]. EE. KisikChang, J. Changho, & L. Sangjin,“High Quality Perceptual Steganographic Techniques”, Springer. 2939,
pp.518-531, 2004.doi: 10.1007/978-3-540-24624-4_42, http://www.springerlink.com/content/c6guuj5xnyy4wj3c/
[5]. C. Kessler,“Steganography: Hiding Data within Data” An edited version of this paper with the title "Hiding Data in
Data", Windows & .NET Magazine, 2001. [Online] Available: http://www.garykessler.net/library/steganography.html
(October 4,2011)
[6]. Gandharba Swain, &S.K.lenka,“Steganography-Using a Double Substitution Cipher”, International Journal of Wireless
Communications and Networking. 2(1), pp.35-39, 2010. ISSN: 0975-7163.
http://www.serialspublications.com/journals1.asp?jid=436&jtype
[7]. Hideki Noda, MichiharuNimi, &EijiKawaguchi,“High- performance JPEG steganography using Quantization index
modulation in DCT domain”, Pattern Recognition Letters, 27, pp.455-46,
2006.http://ds.lib.kyutech.ac.jp/dspace/bitstream/10228/450/1/repository6.pdf
[8]. Kathryn,“A Java Steganography Tool”, 2005.http://diit.sourceforge.net/files/Proposal.pdf
[9]. Motameni, M.Norouzi, M.Jahandar, & A. Hatami,“Labeling method in Steganography”, Proceedings of world academy
of science, engineering and technology, 24, pp.349-354, 2007. ISSN 1307-6884.
http://www.waset.org/journals/waset/v30/v30-66.pdf
[10]. Mohammed A.F Al Husainy, "Message Segmentation to Enhance the Security of LSB Image Steganography",
International Journal of Advanced Computer Science and Applications, 3(3): 57-62, 2012.http://www.ijacsa.thesai.org
[11]. Mohammed A.F Al Husainy, "Developed Segmented LSB Image Steganography", International Science and
Technology Conference (ISTEC 2012), Dubai, December 13-15, 2012. http://www.iste-c.net
[12]. Afjal H. Sarower; Rashed Karim; Maruf Hassan, An Image Steganography Algorithm using LSB Replacement through
XOR Substitution, Computer Science:2019 International Conference on Information and Communications Technology
(ICOIACT), DOI:10.1109/icoiact46704.2019.8938486.
[13]. Rashad J. Rasras1, Mutaz Rasmi Abu Sara2, Ziad A. AlQadi3, Rushdi Abu zneit, Comparative Analysis of LSB,
LSB2, PVD Methods of Data Steganography, International Journal of Advanced Trends in Computer Science and
Engineering, vol. 8, issue 3 ,2019, https://doi.org/10.30534/ijatcse/2019/64832019
[14]. Ziad A. Alqadi, Majed O. Al-Dwairi, Amjad A. Abu Jazar and Rushdi Abu Zneit, 2010, Optimized True-RGB color
Image Processing, World Applied Sciences Journal8 (10): 1175-1182, ISSN 1818-4952.
[15]. Waheeb, A. and Ziad AlQadi, 2009. Gray image reconstruction, Eur. J. Sci. Res., 27: 167-173.
[16]. Akram A. Moustafa and Ziad A. Alqadi, Color Image Reconstruction Using A New R'G'I Model, Journal of Computer
Science 5 (4): 250-254, 2009 ISSN 1549-3636.https://doi.org/10.3844/jcs.2009.250.254
[17]. Musbah J. Aqel, Ziad ALQadi, Ammar Ahmed Abdullah, RGB Color Image Encryption-Decryption Using Image
Segmentation and Matrix Multiplication, International Journal of Engineering & Technology, 7(3.13) (2018) 104-
107.https://doi.org/10.14419/ijet.v7i3.13.16334
[18]. Bilal Zahran, Ziad Alqadi, Jihad Nader, Ashraf Abu Ein,A COMPARISON BETWEEN PARALLEL
ANDSEGMENTATIONMETHODS USED FOR IMAGE ENCRYPTION-DECRYPTION International Journal of
Computer Science & Information Technology (IJCSIT) Vol 8, No 5,October 2016.
[19]. Khaled Matrouk, Abdullah Al- Hasanat, HaithamAlasha'ary, Ziad Al-Qadi, Hasan Al-Shalabi, Analysis of Matrix
Multiplication Computational Methods, European Journal of Scientific Research, ISSN 1450-216X / 1450-202X
Vol.121 No.3, 2014, pp.258-266.
[20]. Ziad A.A. Alqadi, Musbah Aqel, and Ibrahiem M. M. ElEmary, Performance Analysis and Evaluation ofParallel
Matrix Multiplication Algorithms, World Applied Sciences Journal 5 (2): 211-214, 2008.
[21]. Z Alqadi, A Abu-Jazzar, Analysis of program methods used in optimizing matrix multiplication, Journal of
Engineering, 2005.
[22]. Musbah J. Aqel , Ziad A. Alqadi, Ibraheim M. El Emary, Analysis of Stream Cipher Security Algorithm, Journal of
Information and Computing Science Vol. 2,No. 4, 2007, pp. 288-298.
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 38
[23]. J. Al-Azzeh, B. Zahran, Z. Alqadi, B. Ayyoub, M. Abu-Zaher, A Novel zero-error method to create a secret tag for an
image, Journal of Theoretical and Applied Information Technology, Vol. 96. No. 13, pp. 4081-4091, 2018.
[24]. Prof. Ziad A.A. Alqadi, Prof. Mohammed K. Abu Zalata, Ghazi M. Qaryouti, Comparative Analysis of Color Image
Steganography, JCSMC, Vol.5, Issue. 11, November 2016, pg.3743.
[25]. M. Jose, “Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality”, International
Journal of Science and Research, Vol. 3, No. 9, pp. 2281-2284, 2014.
[26]. Emam, M. M., Aly, A. A., & Omara, F. A. An Improved Image Steganography Method Based on LSB Technique with
Random Pixel Selection. International Journal of Advanced Computer Science &Applications,1(7), pp. 361-366,
(2016). https://doi.org/10.14569/IJACSA.2016.070350
[27]. Mohammed Abuzalata; Ziad Alqadi; Jamil Al-Azzeh; Qazem Jaber, Modified Inverse LSB Method for Highly Secure
Message Hiding, IJCSMC, Vol. 8, Issue.2, February 2019, pg.93 103
[28]. Rashad J. Rasras, Mutaz Rasmi Abu Sara, Ziad A. AlQadi, Engineering, A Methodology Based on Steganography and
Cryptography to Protect Highly Secure Messages Engineering Technology & Applied Science Research, Vol.9 Issue 1,
Pages 3681-3684, 2019.
[29]. Zhou X, Gong W, Fu W, Jin L. 2016An improved method for LSB based color image steganography combined with
cryptography. In 2016 IEEE/ACIS 15thInt. Conf. on Computer and Information Science (ICIS), Okayama, Japan, pp.
14 .https://doi.org/10.1109/ICIS.2016.7550955
[30]. Wu D-C, Tsai W-H. A stenographic method for images by pixel value differencing. Pattern Recognition. Lett. 24,
16131626. 2003https://doi.org/10.1016/S0167-8655(02)00402-6
[31]. Das R, Das I. Secure data transfer in IoT environment: adopting both cryptography and steganography techniques. In
Proc. 2nd Int. Conf. on Research in Computational Intelligence and Communication Networks, Kolkata, India, pp.
296301, 2016.https://doi.org/10.1109/ICRCICN.2016.7813674
[32]. M. Abu-Faraj, and Z. Alqadi, “Image Encryption using Variable Length Blocks and Variable Length Private Key,”
International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 11, Iss. 3, pp. 138-151, 2022.
[33]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “A Dual Approach for Audio Cryptography,” Journal of Southwest Jiaotong
University, vol. 57, no. 1, pp. 24-33, 2022.
[34]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “Complex Matrix Private Key to Enhance the Security Level of Image
Cryptography,” Symmetry, vol. 14, Iss. 4, pp. 664-678, 2022.
[35]. M. Abu-Faraj, K. Aldebei, and Z. Alqadi, “Simple, Efficient, Highly Secure, and Multiple Pur- posed Method on Data
Cryptography,” Traitement du Signal, vol. 39, no. 1, pp. 173-178, 2022.
[36]. M. Abu-Faraj, Khaled Aldebe, and Z. Alqadi, “Deep Machine Learning to Enhance ANN Performance: Fingerprint
Classifier Case Study,” Journal of Southwest Jiaotong University, vol. 56, no. 6 , pp. 685-694, 2021.
[37]. M. Abu-Faraj, Z. Alqadi, and K. Aldebei, “Comparative Analysis of Fingerprint Features Ex- Traction Methods,”
Journal of Hunan University Natural Sciences, vol. 48, iss. 12, pp. 177-182, 2021.
[38]. M. Abu-Faraj, and Z. Alqadi, “Improving the Efficiency and Scalability of Standard Meth- ods for Data
Cryptography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 21, no.12 , pp. 451-
458, 2021.
[39]. Abdullah N. Olimat, Ali F. Al-Shawabkeh, Ziad A. Al-Qadi, Nijad A. Al-Najdawi, Forecasting the influence of the
guided flame on the combustibility of timber species using artificial intelligence, Case Studies in Thermal Engineering,
Volume 38, 2022, 102379, ISSN 2214-157X, https://doi.org/10.1016/j.csite.2022.102379.
[40]. M. Abu-Faraj, and Z. Alqadi, “Image Encryption using Variable Length Blocks and Variable Length Private Key,”
International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 11, Iss. 3, pp. 138-151, 2022.
[41]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “A Dual Approach for Audio Cryptography,” Journal of Southwest Jiaotong
University, vol. 57, no. 1, pp. 24-33, 2022.
[42]. M. Abu-Faraj, A. Al-Hyari, and Z. Alqadi, “Complex Matrix Private Key to Enhance the Security Level of Image
Cryptography,” Symmetry, vol. 14, Iss. 4, pp. 664-678, 2022.
[43]. M. Abu-Faraj, K. Aldebei, and Z. Alqadi, “Simple, Efficient, Highly Secure, and Multiple Purr- posed Method on Data
Cryptography,” Traitement du Signal, vol. 39, no. 1, pp. 173-178, 2022.
[44]. M. Abu-Faraj, Khaled Aldebe, and Z. Alqadi, “Deep Machine Learning to Enhance ANN Performance: Fingerprint
Classifier Case Study,” Journal of Southwest Jiaotong University, vol. 56, no. 6 , pp. 685-694, 2021.
[45]. M. Abu-Faraj, and Z. Alqadi, “Improving the Efficiency and Scalability of Standard Meth- odds for Data
Cryptography,” International Journal of Computer Science and Network Security (IJCSNS), vol. 21, no.12 , pp. 451-
458, 2021.
[46]. J. Vilkamo and T. Bäckström, “Time-Frequency Processing: Methods and Tools,” in Parametric Time-Frequency
Domain Spatial Audio, V. Pulkki, S. Delikaris-Manias, and A. Politis, Eds. Wiley, 2017, pp. 324.
[47]. K Matrouk, A Al-Hasanat, H Alasha'ary, Ziad Al-Qadi, H Al-Shalabi, Speech fingerprint to identify isolated word
person, World Applied Sciences Journal, 31 (10), 1767-1771, 2014.
[48]. Ziad alqadi, Analysis of stream cipher security algorithm, Journal of Information and Computing Science, vol. 2, issue
4, pp. 288-298, 2007.
[49]. Jamil Al-Azzeh, Bilal Zahran, Ziad Alqadi, Belal Ayyoub, Muhammed Mesleh, A Novel Based On Image Blocking
Method to Encrypt-Decrypt Color, International Journal on Informatics Visualization, vol. 3, issue 1, pp. 86-93, 2019.
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 39
[50]. Musbah J Aqel, Ziad ALQadi, Ammar Ahmed Abdullah, RGB Color Image Encryption-Decryption Using Image
Segmentation and Matrix Multiplication, International Journal of Engineering and Technology, vol. 7. Issue 3.13, pp.
104-107. 2018.
[51]. Jihad Nadir, Ashraf Abu Ein, Ziad Alqadi, A Technique to Encrypt-decrypt Stereo Wave File, International Journal of
Computer and Information Technology, vol. 5, issue 5, pp. 465-470, 2016.
[52]. Saleh Khawatreh, Belal Ayyoub, Ashraf Abu-Ein, Ziad Alqadi, A Novel Methodology to Extract Voice Signal
Features, International Journal of Computer Applications, vol. 975, pp. 8887, 2018.
[53]. Majed O. Al-Dwairi, Amjad Y. Hendi, Mohamed S. Soliman, Ziad A.A. Alqadi, A new method for voice signal
features creation, International Journal of Electrical and Computer Engineering (IJECE), vol. 9. Issue 9, pp. 4092-4098,
2019.
[54]. Aws Al-Qaisi, Saleh A Khawatreh, Ahmad A Sharadqah, Ziad A Alqadi, Wave File Features Extraction Using
Reduced LBP, International Journal of Electrical and Computer Engineering, vol. 8. Issue 5, pp. 2780-2787, 2018.
[55]. Ayman Al-Rawashdeh, Ziad Al-Qadi, using wave equation to extract digital signal features, Engineering, Technology
& Applied Science Research, vol. 8, issue 4, pp. 1356-1359, 2018.
[56]. Ashraf Abu-Ein, Ziad AA Alqadi, Jihad Nader, A TECHNIQUE OF HIDING SECRETE TEXT IN WAVE FILE,
International Journal of Computer Applications, 2016.
[57]. Ismail Shayeb, Ziad Alqadi, Jihad Nader, Analysis of digital voice features extraction methods, International Journal of
Educational Research and Development, vol. 1, issue 4, pp. 49-55, 2019.
[58]. Jihad Nader Ahmad Sharadqh, Ziad Al-Qadi, Bilal Zahran, Experimental Investigation of Wave File Compression-
Decompression, International Journal of Computer Science and Information Security, vol. 14m issue 10, pp. 774-780,
2016.
[59]. Ziad A AlQadi Amjad Y Hindi, O Dwairi Majed, PROCEDURES FOR SPEECH RECOGNITION USING LPC AND
ANN, International Journal of Engineering Technology Research & Management, vol. 4, issue 2, pp. 48-55, 2020.
[60]. Majed O Al-Dwairi, A Hendi, Z AlQadi, an efficient and highly secure technique to encrypt-decrypt color images,
Engineering, Technology &Applied Science Research, vol. 9, issue 3, pp. 4165-4168, 2019.
[61]. Amjad Y Hendi, Majed O Dwairi, Ziad A Al-Qadi, Mohamed S Soliman, a novel simple and highly secure method for
data encryption-decryption, International Journal of Communication Networks and Information Security, vol. 11, issue
1, pp, 232-238, 2019
[62]. Prof. Ziad Alqadi, Dr. Mohammad S. Khrisat, Dr. Amjad Hindi, Dr. Majed Omar Dwairi, USING SPEECH SIGNAL
HISTOGRAM TOCREATE SIGNAL FEATURES, International Journal of Engineering Technology Research &
Management, vol. 4, issue 3, pp. 144-153, 2020.
[63]. M. Abu-Faraj, Z. Alqadi, and K. Aldebei, “Comparative Analysis of Fingerprint Features Ex- Traction Methods,”
Journal of Hunan University Natural Sciences, vol. 48, iss. 12, pp. 177-182, 2021.
[64]. Alqadi, Z. (2019). A new method for voice signal features creation. International Journal of Electrical and Computer
Engineering (IJECE), 9(5): 4092-4098.https://doi.org/10.11591/ijece.v9i5.pp4092-4098.
[65]. Alqadi, Z. (2009). A practical approach of selecting the edge detector parameters to achieve a good edge map of the
gray image. Journal of Computer Science, 5(5): 355-362.
[66]. Zaini, H., Alqadi, Z.A. (2021). Efficient WPT based speech signal protection. IJCSMC, 10(9): 53-
65.https://doi.org/10.47760/ijcsmc.2021.v10i09.006.
[67]. Zneit, R.A., Khrisat, M.S., Khawatreh, S.A., Alqadi, Z.(2020). Two ways to improve WPT decomposition used for
image features extraction. European Journal of Scientific Research, 157(2): 195-205.
[68]. Hindi, A., Qaryouti, G.M., Eltous, Y., Abuzalata, M.,Alqadi, Z. (2020). Color image compression using linear
prediction coding. International Journal of Computer Science and Mobile Computing, 9(2): 13-20.
[69]. Zaidan, A.A., Majeed, A., Zaidan, B.B. (2009). High securing cover-file of hidden data using statistical technique and
AES encryption algorithm. World Academy of Science Engineering and Technology(WASET), 54: 468-479.
[70]. Zaidan, A.A., Zaidan, B.B. (2009). Novel approach for high secure data hidden in MPEG video using public key
infrastructure. International Journal of Computer and Network Security, 1(1): 1985-1553.
[71]. Khalifa, O.O., Naji, A.W., Zaidan, A.A., Zaidan, B.B.,Hameed, S.A. (2010). Novel approach of hidden data inthe
(unused area 2 within EXE file) using computation between cryptography and steganography. Int. J. Comput.Sci.
Netw. Secur, 9(5): 294-300.
[72]. Majeed, A., Mat Kiah, M.L., Madhloom, H.T., Zaidan,B.B., Zaidan, A.A. (2009). Novel approach for high secure and
high rate data hidden in the image using image texture analysis. International Journal of Engineering and technology,
1(2): 63-69.http://eprints.um.edu.my/id/eprint/4951.
[73]. Zaidan, A.A., Othman, F., Zaidan, B.B., Raji, R.Z.,Hasan, A.K., Naji, A.W. (2009). Securing cover-file without
limitation of hidden data size using computation between cryptography and steganography. In Proceedings of the
World Congress on Engineering, 1: 1-7.
[74]. Aos, A.Z., Naji, A.W., Hameed, S.A., Othman, F.,Zaidan, B.B. (2009). Approved undetectable-antivirussteganography
for multimedia information in PE-file. In 2009 International Association of Computer Science and Information
Technology-Spring Conference, pp. 437-444. https://doi.org/10.1109/IACSIT-SC.2009.103.
[75]. Zaidan, A.A., Zaidan, B.B., Abdulrazzaq, M.M., Raji,R.Z., Mohammed, S.M. (2009). Implementation stage for high
securing cover-file of hidden data using computation between cryptography and steganography. International
Ziad Alqadi, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.4, April- 2024, pg. 25-40
© 2024, IJCSMC All Rights Reserved, ZAIN Publications, Fridhemsgatan 62, 112 46, Stockholm, Sweden 40
Association of Computer Science and Information Technology (IACSIT), indexing by Nielsen,Thomson ISI (ISTP),
IACSIT Database, British Library and EI Compendex, 19: 482-489.
[76]. Naji, A.W., Zaidan, A.A., Zaidan, B.B., Muhamadi, I.A.(2010). Novel approach for cover file of hidden data in the
unused area two within EXE file using distortion techniques and advance encryption standard. Proceeding of World
Academy of Science Engineering and Technology (WASET), 56(5): 498-502.
[77]. M. Bala Kumara, P. Karthikkab , N. Dhivyac , T. Gopalakrishnan, A Performance Comparison of Encryption
Algorithms for Digital Images, International Journal of Engineering Research & Technology (IJERT), Vol. 3 Issue 2,
February 2014.
[78]. Lee Mariel Heucheun Yepdia, Alain Tiedeu, and Guillaume Kom, A Robust and Fast Image Encryption Scheme Based
on a Mixing Technique, Security and Communication Networks, Volume 2021 |Article ID 6615708 |
https://doi.org/10.1155/2021/6615708.
[79]. Z. Hua, Y. Zhou, and H. Huang, “Cosine-transform-based chaotic system for image encryption,” Information Sciences,
vol. 480, pp. 403419, 2019.
[80]. M. Asgari-chenaghlu, M.-A. Balafar, and M.-R. Feizi-Derakhshi, “A novel image encryption algorithm based on
polynomial combination of chaotic maps and dynamic function generation,” Signal Processing, vol. 157, p. 1, 2019.
[81]. X. Zhang and X. Wang, Multiple-image Encryption Algorithm Based on DNA Encoding and Chaotic System,
Springer, New York, NY, USA, 2019.
[82]. J. S. Zhenjun and R. Sun, “Multiple-image encryption with bit-plane decomposition and chaotic maps,” Optics and
Lasers in Engineering, vol. 80, pp. 111, 2016.
[83]. Pleacher, D. (n.d.), Calculating password entropy. Retrieved February 16, 2023, from
https://www.pleacher.com/mp/mlessons/algebra/entropy.htmlPotter,
[84]. Shaza D. Rihan, Ahmed Khalid Saife, Eldin F. Osman, A Performance Comparison of Encryption Algorithms AES and
DES, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 IJERTV4IS120227
www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.) Vol. 4, Issue
12, December-2015.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
This paper anticipates the burning rate and optical obscuration characteristics of a 10 mm thick timber species often used in buildings under the influence of a guided flame condition with heat fluxes of 25 kW/m² and 50 kW/m². The smoke density chamber was used to test the wood species Pinus strobus, Pinus kesiya, Quercus alba, and Faqus sylvatica. The experimental data: time, specific gravity, mass loss, and heat flow were used as input variables to an artificial neural network (ANN) model. ANN with structure of 4-64-32-2 was built and validated, the results revealed that, the correctness of the established simulation was proven by a high value of R² (0.99292 for validation) and highest validation performance (MSE = 17.809 at epoch 12). When the heat flow was reduced from 50 kW/m² to 25 kW/m², Quercus had the greatest drop in mass optical density (MOD). In the case of 25 kW/m², the average charring rate was roughly 0.57 mm/min, compared to 0.96 mm/min in the case of 50 kW/m². The MOD declines asymptotically for all species regardless of heat flux. The findings give statistical support and theoretical reference for fire-related construction norms and standards.
Article
Full-text available
Some digital data circulated through various social media, regardless of its nature, requires high-level protection and security for various reasons. In this research, a multi-purpose method will be presented to be used in encrypting SMS messages, text files regardless of their size, digital images of all kinds and sizes, and audio files of all kinds and sizes. The proposed method will be examined to prove its efficiency, and the practical results will be compared with the implementation results of other internationally approved methods to show the extent to which the method improves efficiency indicators. It will be shown how to use digital color image to generate a highly secure private key which will make the process of hacking impossible. The Quality of the encrypted and decrypted images will be examined to justify the use of the proposed method.
Article
Full-text available
Providing a secure and effective way to protect confidential and private data is an urgent process, and accordingly, we will present in this research paper a new method, which is called multiple rounds variable block method (MRVB) which depends on the use of a colored image that is kept secret to generate needed work and round keys. This method can be used to encrypt-decrypt data using various lengths private key and data blocks with various sizes. The number of rounds also will be variable starting from one round. MRVB will be implemented and compared with the encryption-decryption standards DES and AES to show the improvements provided by the proposed method in increasing the security level and in increasing the throughput of the process of data cryptography. The generated private key contents will depend on the used image_key and on the selected number of rounds and the selected number of bytes in each block of data.
Article
Full-text available
Speech files are now widely circulated using various means of communication, and sometimes the speech file can be secret, which requires protecting it from any unauthorized person to hear and understand it. The methods which use DES standard for data encryption-decryption are considered ineffective because they need a long time to implement the protection of speech files due to their large size and containing double data with fractions. In this paper research a method which uses WPT decomposition will be proposed, tested and implemented. It will be shown how the new introduced method will increase the cryptography process efficiency by minimizing the encryption-decryption times keeping at the same time excellent values for quality parameters.
Article
Full-text available
This paper introduces a new image encryption scheme using a mixing technique as a way to encrypt one or multiple images of different types and sizes. The mixing model follows a nonlinear mathematical expression based on Cramer's rule. Two 1D systems already developed in the literature, namely, the May-Gompertz map and the piecewise linear chaotic map, were used in the mixing process as pseudo-random number generators for their good chaotic properties. The image to be encrypted was first of all partitioned into N subimages of the same size. The subimages underwent a block permutation using the May-Gompertz map. This was followed by a pixel-based permutation using the piecewise linear chaotic map. The result of the two previous permutations was divided into 4 subimages, which were then mixed using pseudo-random matrices generated from the two maps mentioned above. Tests carried out on the cryptosystem designed proved that it was fast due to the 1D maps used, robust in terms of noise and data loss, exhibited a large key space, and resisted all common attacks. A very interesting feature of the proposed cryptosystem is that it works well for simultaneous multiple-image encryption.
Article
Full-text available
Digital color images are very important types of digital data, due to the large number of vital applications they need. To increase the efficiency of any image-based application we have to represent the image by a small size image features vector. In this paper WPT method of data decomposition will be studied and analyzed. A segmented method will be proposed and used based on WPT method. It will be shown how to enhance WPT method to be used as good method of features extraction and how this method will meet the requirements needed to generate color image features.
Article
Full-text available
Data compression is a process of reducing the data size to minimize the storage size and the data transmission time, will decompression means recovering the original data without losing any piece of information. In this research paper we will introduce an efficient method of data compression-decompression, this method will based on using FIR filter coefficients and linear prediction coding, the method will be tested and implemented to show how this method will increase the compression ratio and how to speed up the process of compression-decompression by comparing the obtained experimental results with the results of other existing methods.
Article
Full-text available
K means method and LBP based methods are commonly used for manipulating digital wave files, and they can be used for wave file features extraction, these features can be used later on as a wave file key or signature which refers to the wave file in any application, such as voice recognition or voice retrieval applications. K means method can be used to extract voice features, these features can be represented by clusters points, or within_cluster sums, or by the clusters centroids, and in this paper we will investigate the both methods in order to do some recommendations regarding the efficient method of voice features extraction.
Article
Full-text available
Digital audio is one of the most important types of data at present. It is used in several applications, such as human knowledge and many security and banking applications. A digital voice signal is usually of a large size where the acoustic signal consists of a set of values distributed in one column (one channel) (mono signal) or distributed in two columns (two channels) (stereo signal), these values usually are the results of sampling and quantization of the original analogue voice signal. In this paper we will introduce a method which can be used to create a signature or key, which can be used later to identify or recognize the wave file. The proposed method will be implemented and tested to show the accuracy and flexibility of this method </p
Article
Full-text available
Digital audio is one of the most important types of data at present. It is used in several applications, such as human knowledge and many security and banking applications. A digital voice signal is usually of a large size where the acoustic signal consists of a set of values distributed in one column (one channel) (mono signal) or distributed in two columns (two channels) (stereo signal), these values usually are the results of sampling and quantization of the original analogue voice signal. In this paper we will introduce a method which can be used to create a signature or key, which can be used later to identify or recognize the wave file. The proposed method will be implemented and tested to show the accuracy and flexibility of this method.