This is an open access article under the CC BY license: Al-Khwarizmi Engineering Journal Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, December, (2022) P. P. 32- 44 BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System Lwaa Faisal Abdulameer * U. Sripati** Muralidhar Kulkarni*** *Department of Information and Communication/ Al-khwarizmi College of Engineering/ University of Baghdad/ Iraq **,***Electronics and Communication Engineering Department/ NITK. Mangalore/ India *Email: lwaa@kecbu.uobaghdad.edu.iq sripati_achary@yahoo.co.in :Email** mkuldc@gmail.comEmail: *** (2022 October 4 2022; Accepted May 15 Received) https://doi.org/10.22153/kej.2022.10.001 Abstract Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps have been computed numerically. Increasing the dynamical behavior of the system by using more complex chaotic maps leads to inferiority in the overall system performance. So, in this work, the BER performance for the dual and single chaotic maps by exploiting the benefits of a hybrid Chaos Shift Keying- Multiple-Input-Multiple-Output (CSK-MIMO) communication system has been investigated. The results show that the dual tent map has more randomness, whereas the single logistic map has the least randomness. As well as the CSK-MIMO gives an outstanding BER performance when it compared with the SISO system which helps in reducing the systemโ€™s inferiority. Keywords: Chaotic technique, dual, Lyapunov Exponent, STBC. 1. Introduction A chaotic waveform is characterized as being deterministic, non-periodic, and very sensitive to any change in initial conditions, i.e., initializing the system with a slight difference in initial conditions generates a new sequence completely different from the original signal [1]. So, to encrypt sensitive data, a chaotic technique can be utilized to produce a key stream with high randomness. In any case, a single chaotic map is attackable to be descended by chaotic reconstruction since it has a simple structure and weak control boundaries. Dual dimensional chaos has a complicated structure and more parameters [2,3]. To adjust these two factors, a dual chaotic system can be considered [4]. In this paper, dual- chaotic systems that consist of two one- dimensional tent and logistic maps have been designed. The chaotic attractor can be characterized by measuring the degree of sensitivity to initial conditions. Lyapunov Exponents (LEs) describe the increase of very small perturbations in different directions of the state space on a logarithmic scale, when at least one LE is positive, the attractor under mailto:lwaa@kecbu.uobaghdad.edu.iq mailto:sripati_achary@yahoo.co.in mailto:mkuldc@gmail.com https://doi.org/10.22153/kej.2022.10.001 Lwaa Faisal Abdulameer Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, P.P. 32- 44 (2022) 33 realization characterize by sensitive dependence on initial conditions property and this is termed chaotic [5]. Chaos is utilized in many research areas, such as engineering, mathematics, chemistry, and biology. In communication engineering, chaos introduces important aspects in security as well as multiuser applications in cellular communications. Therefore, chaotic communications is a promising technique in the next wireless generation. A compound of two 1-D chaotic maps suggests by I. Aouissaoui et al. [6] for information security. Which achieved a logistic-sine map based on a tent chaotic map as well as a cubic-tent map but for SISO channel. The analysis of LE for the proposed maps has been achieved. The bifurcation diagram was plotted to measure the chaotic range but the authors did not calculate the BER for the proposed system. J. Pedro et al. [7] propose a compound of two 1- D chaotic maps; logistic and tent maps for the deep zoom technique. They found that the random quality of chaos improved with PRNG when the chaotic parameter and a are increased for SISO communication systems. But also they did not compute the BER to ensure the system performance is not affected by the changing in chaotic behavior. M. Lawnik et al. [8] suggest M- map chaotic system for cryptography applications. They measured the LE and plotted the bifurcation diagram. They showed that the minimum value for LE for the proposed analysis was 2 and the maximum value was 12. A dual map is suggested to resolve the problem of dynamical degradation. A significant advantage in the dynamical systems analysis is the stability of the system, which can be satisfied by using the LE. In this paper, the LEs for dual tent and logistic maps have been derived. This paper realizes the feasibility of using MIMO to improve the performance of the communication system due to chaotic degradation. We have studied the performance of CSK with the Alamouti scheme for these dual chaotic maps under the AWGN channel. The use of these schemes allows us to enhance security without degrading the BER performance. An exact method to compute the BER has been utilized and analyzed. This method considers the aperiodicity nature of the chaotic signals [9]. The simulation results refer to the combination of STBC and a single chaotic map can degrade the BER when compared to a dual chaotic map in cost of reducing the information protection. 2. Iteration of Chaotic Map 2.1 Tent Map Iteration Consider the tent map trajectory ๐‘ฅ: [0,1] is expressed as [10] xn+1 = { xn a , 0 โ‰ค xn < ๐‘Ž 1โˆ’xn 1โˆ’a , a โ‰ค xn < 1 โ€ฆ(1) The dynamical system trajectory ๐‘ฅ(๐‘ฅ) is obtained by iterating the chaotic map, i.e., ๐‘ฅ(๐‘˜) = ๐‘“๐‘˜ [๐‘ฅ(0)] = ๐‘“({โ€ฆ ๐‘“[๐‘ฅ(0)] โ€ฆ }), k=0,1,2,โ€ฆโ€ฆ โ€ฆ(2) 2.2 Logistic Map Iteration The non-linear paradigm of the logistic map is given in equation (3) [11] xn+1 = ฮผxn(1 โˆ’ xn), ฮผ โˆˆ [0,4], xn โˆˆ (0,1) โ€ฆ(3) The sequence {๐‘ฅ1, ๐‘ฅ2, โ€ฆ ๐‘ฅ๐‘›} is generated by initializing the initial value ๐‘ฅ0 โˆˆ (0,1) depending on the value of a parameter ๐œ‡ . A new sequence generates when a small change in the initial value occurs and changes in the value๐œ‡. The chaos state behavior occurs with the increase of ๐œ‡ values and achieving a chaos state ultimately. When ๐œ‡ > 3.75, movement from the sequence {๐‘ฅ๐‘›} appears chaotic behavior. 3. Dual Chaotic Iteration As mentioned above, a single chaotic system is attackable to be attacked by chaotic reconstruction since it has a simple structure and weak control boundaries. A 2-D chaotic map has more parameters and a complex form, but it has a more complex load. To balance these two factors, a dual chaotic map may be utilized. A dual-maps that consists of two 1-D maps has been implemented. 3.1 Dual-Logistic Map Chaos may be appeared by LOGISTIC 1 and LOGISTIC 2 such as, LOGISTIC 1: xn+1 = ฮผxn(1 โˆ’ xn), ฮผ โˆˆ [3.757,4], xn โˆˆ (0,1) โ€ฆ (4) LOG2: xn+1 = ฮทxn(1 โˆ’ xn), ฮท โˆˆ [3.57,4], xn โˆˆ (0,1) โ€ฆ (5) where ๐œ‡ and ฮท represent the control parameters. In this case, ๐‘ฅ๐‘›+1 represents the output sequence of LOGISTIC 1, while ๐‘ฆ๐‘›+1 represents the output sequence of LOGISTIC 2 considering ๐‘ฆ0 = ๐‘ฅ๐‘›+1. So, {๐‘ฆ๐‘›} is the last output of those two sequences. Lwaa Faisal Abdulameer Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, P.P. 32- 44 (2022) 34 It is produced by composing the sequences of LOGISTIC 1 and LOGISTIC 2 [4,12]. 3.2 Dual-Tent Map TENT MAP 1 and TENT MAP 2 are represented as follows, TENT MAP 1: xn+1 = { xn a , 0 โ‰ค xn < ๐‘Ž 1โˆ’xn 1โˆ’a , a โ‰ค xn < 1 โ€ฆ (6) TENT MAP 2: yn+1 = { yn b , 0 โ‰ค xn < ๐‘ 1โˆ’yn 1โˆ’b , b โ‰ค xn < 1 โ€ฆ(7) where ๐‘Ž and ๐‘ are the control parameter, ๐‘ฅ0 and ๐‘ฆ0 are initial values, ๐‘ฅ๐‘›+1 is the output sequence of TENT MAP 1, and ๐‘ฆ๐‘›+1 is the output sequence of TENT MAP 2 considering ๐‘ฆ0 = ๐‘ฅ๐‘›+1. So, {๐‘ฆ๐‘›} is the last output of these two sequences. It is produced by composing the two sequences of TENT MAP 1 and TENT MAP 2 leading to increasing the complexity of chaotic behavior. 4. Lyapunov Exponent Consider |๐›ฟ๐‘›| = ๐‘“ ๐‘› (๐‘ฅ0 + ๐›ฟ0) โˆ’ ๐‘“๐‘› (๐‘ฅ0) being the ๐‘› iteration number of the chaotic sequence, ๐‘ฅ0 denotes the initial condition, and ๐›ฟ0 be the small random number. However, LE formula can be given as, ๐œ† = 1 ๐‘› ๐‘™๐‘› | ๐›ฟ๐‘› ๐›ฟ0 | = 1 ๐‘› ๐‘™๐‘›|(๐‘“๐‘›)ฬ(๐‘ฅ0)| โ€ฆ (8) By expanding the term within algorithm, the approximation value of the LE can be given as, ๐œ† = 1 ๐‘› โˆ‘ ๐‘™๐‘›|๏ฟฝฬ๏ฟฝ(๐‘ฅ๐‘– )| ๐‘›โˆ’1 ๐‘–=0 โ€ฆ(9) If the equation (10) have limit when ๐‘› โ†’ โˆž, then the LE for the orbit that begins in ๐‘ฅ0 is ๐œ† = lim ๐‘›โ†’โˆž { 1 ๐‘› โˆ‘ ๐‘™๐‘›|๏ฟฝฬ๏ฟฝ(๐‘ฅ๐‘– )| ๐‘›โˆ’1 ๐‘–=0 } โ€ฆ(10) Note that ฮป depends on ๐‘ฅ0 . For points and cycles stable, ฮป is negative and for chaotic attractors, ฮป is positive [13]. 4.1 LE of Single Logistic [14] According to equations (3 and 10), ๐œ† = lim ๐‘›โ†’โˆž { 1 ๐‘› โˆ‘ ln(๐œ‡) โˆ’ ln (2๐œ‡๐‘ฅ๐‘– ) ๐‘›โˆ’1 ๐‘–=0 } โ€ฆ (11) 4.2 LE of Single Tent [15-17] According to Equs. (3) and (10), ๐œ† = โˆซ ๐‘™๐‘› | 1 ๐‘Ž | ๐‘‘๐‘ฅ + โˆซ | 1 1โˆ’๐‘Ž | ๐‘‘๐‘ฅ 1 ๐‘Ž ๐‘Ž 0 โ€ฆ (12) 4.3 LE of Dual Logistic LEs of a ๐‘ฅ๐‘› sequence denoted by, ๐œ† = lim ๐‘›โ†’โˆž 1 2๐‘› ln [๐ท๐‘› ๐‘‡ ๐ท๐‘› ] โ€ฆ (13) whenever ๐ท๐‘› is the limit exists. Uppercase T represents the transpose. From Equs. (10, 11 and 13), a dual logistic map can be expressed as, Let , xn+1 = ฮผxn(1 โˆ’ xn), ๐‘ฅ๐‘›+1ฬ = ๐œ‡ โˆ’ 2๐œ‡๐‘ฅ๐‘› For Dual; ๐œ† = lim ๐‘›โ†’โˆž 1 2๐‘› โˆ‘ ln {[๐œ‡ โˆ’ 2๐œ‡๐‘ฅ๐‘›] ๐‘‡ [๐œ‡ โˆ’ 2๐œ‡๐‘ฅ๐‘›] โˆ’ ๐‘›โˆ’1 ๐‘–=1 ๐‘‘} = lim ๐‘›โ†’โˆž 1 2๐‘› โˆ‘ ln {๐œ‡(1 โˆ’ 2๐‘ฅ๐‘› )] ๐‘‡ [๐œ‡(1 โˆ’๐‘›โˆ’1๐‘–=1 2๐‘ฅ๐‘›)] โˆ’ ๐‘‘} โ€ฆ (14) where ๐‘‘ is the change in initial value. 4.4 LE of Dual Tent According to equations (10,12 and 13), a dual tent map can be derived as, Let, xn+1 = { xn a , 0 โ‰ค xn < ๐‘Ž 1โˆ’xn 1โˆ’a , a โ‰ค xn < 1 For dual; ๐œ† = lim ๐‘›โ†’โˆž 1 2๐‘› {[โˆซ ๐‘™๐‘› | 1 ๐‘Ž | ๐‘‘๐‘ฅ + ๐‘Ž 0 โˆซ | 1 1โˆ’๐‘Ž | ๐‘‘๐‘ฅ 1 ๐‘Ž ]๐‘‡ [โˆซ ๐‘™๐‘› | 1 ๐‘Ž | ๐‘‘๐‘ฅ + โˆซ | 1 1โˆ’๐‘Ž | ๐‘‘๐‘ฅ 1 ๐‘Ž ๐‘Ž 0 ] โˆ’ ๐‘‘} โ€ฆ(15) 5. CSK-MIMO Communication System Let us consider x(t) as the signal that is generated by any chaotic map and defined in the previous section. In CSK, the chaotic signal will occur If a โ€ฒ + 1โ€ฒ is transmitted and an inverted copy of the chaotic signal will appear If โ€ฒ โˆ’ 1โ€ฒ is transmitted. Therefore, the transmitted signal can be denoted as [18-20,24], s(t) = { x(t), if โ€ฒ+1' is transmitted โˆ’x(t), otherwise โ€ฆ(16) Let us consider the time interval of the data symbols (sl = ยฑ1) denoted by Ts , then the chip interval of the chaotic sequence will be Tc(xk = x(kTC)) . However, The transmitted signal is expressed as, u(t) = โˆ‘ โˆ‘ slxlฮฒ+k ฮฒโˆ’1 k=0 โˆž l=0 โ€ฆ(17) where ๐›ฝ represents the spreading factor (ฮฒ = Ts Tc ). Then, the signal received at the receiver side is denoted as, r(t)=u(t) + n(t) โ€ฆ(18) Lwaa Faisal Abdulameer Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, P.P. 32- 44 (2022) 35 where n(t) represents the AWGN with zero mean and variance ๐œŽ๐‘› 2 . At the receiver, the received signal is first despreaded by generating an exact replica of the chaotic signal that is generated at the transmitter, after that the symbols are integrated over symbol duration Ts . at last, the sign of the decision variable will be computed [9,21], such as, Dsl = sign (slTc โˆ‘ (xlฮฒ+k) 2 + wl) ฮฒโˆ’1 k=0 = sign(slEb (l) + wl) โ€ฆ(19) Where sign(. ) represents the sign operator, E b (l) denotes lth bit energy and wl is the AWGN computed after despreading processing. 2ร—2 Space Time Block Code (STBC) Fig. 1 shows the block diagram of CSK- MIMO transmitter with two antennas and two receive antenna. Fig. 1 ๐Ÿ ร— ๐Ÿ MIMO-CSK communication scheme. The designed symbols for STBC denoted by, S = [ s1 โˆ’s2 โˆ— s2 s1 โˆ— ] โ€ฆ (20) Table. 1, The transmitted signa Time interval ๐ฌ๐Ÿ(๐ญ)๐Ÿ๐ซ๐จ๐ฆ first transmitter ๐ฌ๐Ÿ(๐ญ)๐Ÿ๐ซ๐จ๐ฆ second transmitter [0, ฮฒTc ] s1xk s2xk [ฮฒTc , 2ฮฒTc ] โˆ’s2 โˆ— xk+ฮฒ s1 โˆ— xk+ฮฒ Table. 2, The signal received by the first receiving antenna Time Received signal on ๐Ÿ๐ข๐ซ๐ฌ๐ญ ๐ซ๐ž๐œ๐ž๐ข๐ฏ๐ข๐ง๐  ๐š๐ง๐ญ๐ž๐ง๐ง๐š [0, ฮฒTc ] h11s1xk + h21s2xk + nk 1 [ฮฒTc , 2ฮฒTc ] โˆ’h11s2 โˆ— xk+ฮฒ + h21s1 โˆ— xk+ฮฒ + nk 2 Noise Noise Chaotic generator เท โฌš ๐›ฝ เท โฌš ๐›ฝ STBC decoder ฮฒTc s1,ฬ s2ฬ x(t) h11 h21 h12 h22 ๐‘‡๐‘ฅ1 ๐‘‡๐‘ฅ2 Data Alamouti encoder Chaotic generator s1, s2 Tx1 Tx2 Lwaa Faisal Abdulameer Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, P.P. 32- 44 (2022) 36 Table. 3, The signal received by the second receiving antenna Time Received signal on second receiving antenna [0, ฮฒTc ] h12s1xk + h22s2xk + nk 1 [ฮฒTc , 2ฮฒTc ] โˆ’h12s2 โˆ— xk+ฮฒ + h22s1 โˆ— xk+ฮฒ + nk 2 The t th bit energy is denoted by E b (l) = โˆ‘ x k (l)2ฮฒ k=1 . Table. 4, The equivalent baseband of the symbol at ๐‘น๐’™๐Ÿ Time The equivalent baseband of the symbol at ๐‘น๐’™๐Ÿ [0, ฮฒTc ] Y11 = Eb(h11s1 + h21s2) + N11 [ฮฒTc , 2ฮฒTc ] Y21 = Eb(โˆ’h11s2 โˆ— + h21s1 โˆ— ) + N21 Where, N11 = โˆ‘ nk 1ฮฒ K=1 xk and ๐‘21 = โˆ‘ ๐‘›๐‘˜ 2๐›ฝ ๐พ=1 ๐‘ฅ๐‘˜+๐›ฝ represent AWGN components. Table .5, The equivalent baseband of the symbol at ๐‘น๐’™๐Ÿ Time The equivalent baseband of the symbol at ๐‘น๐’™๐Ÿ [0, ฮฒTc ] Y12 = Eb(h12s1 + h22s2) + N12 [ฮฒTc , 2ฮฒTc ] Y22 = Eb(โˆ’h12s2 โˆ— + h22s1 โˆ— ) + N22 N12 = N11 and ๐‘22 = ๐‘21 represent AWGN components and h11, h21 , h12 and h22 are the channel coefficients for 2 ร— 2 scheme. The above formulas are derived in [6]. The received vector is expressed as, Y = Eb HS + N โ€ฆ (21) The data are estimated by multiplying the vector ๐‘Œ by the conjugate transpose of H (equation 22) and then computed by the decision variable (equation 23); ( Ds1 Ds2 ) = H*Y โ€ฆ(22) The estimated bits are computed from the sign of the decision variables, s1ฬ = sign Ds1; s2ฬ = sign Ds2 โ€ฆ(23) 5.1 Performance Analysis Let us consider the channel coefficient is constant for 2ร—2 STBC under the assumption of AWGN. The BER formula of the proposed scheme is expressed in (24) [21,22,24]. ๐‘ƒ๐‘’ (๐ธ๐‘ (๐‘™) ) = 1 2 ๐‘’๐‘Ÿ๐‘“๐‘(โˆš (โ„Ž11 2 +โ„Ž21 2 +โ„Ž12 2 +โ„Ž22 2 )๐ธ ๐‘ (๐‘™) ๐‘0 ) Now, ๐ธ๐‘ฅ๐‘– [๐‘„{๐ธ(๐‘ฅ)/โˆš๐‘‰๐‘Ž๐‘Ÿ(๐‘ฅ)}] where ๐‘„(๐‘ฅ) = โˆซ 1 โˆš2๐œ‹ exp (โˆ’๐‘ข2 /2 +โˆž ๐‘ฅ ) ๐ต๐ธ๐‘… = เท โ„Ž๐‘›,๐‘ 2 2 ๐‘›,๐‘=1 เท ๐ธ๐‘ฅ๐‘– ๐›ฝโˆ’1 ๐‘™=0 (เท ๐‘ฅ๐‘– 2 ๐‘0 ๐›ฝโˆ’1 ๐‘– =0 )2 = เท ๐ธ๐‘ฅ๐‘– ๐›ฝโˆ’1 ๐‘™=0 (เท ๐‘ฅ๐‘– 2 ๐‘0 ๐›ฝโˆ’1 ๐‘– =0 ) 1 2 (โ„Ž11 2 + โ„Ž21 2 + โ„Ž12 2 + โ„Ž22 2 )๐ธ๐‘ (๐‘™) โˆ‘ ๐‘ฅ๐‘– 2๐›ฝโˆ’1 ๐‘–=0 =E b (l) is the chaotic symbol energy, and ๐ธ๐‘ฅ๐‘– = โˆซ p (Eb (l) ) dE b (l)โˆž 0 , The BER formula for 2ร—2 STBC is formulated as, BER = โˆซ 1 2 โˆž 0 erfc (โˆš (h11 2 +h12 2 +h21 2 +h22 2 )E b (l) N0 ) p (E b (l) ) dE b (l) โ€ฆ (24) Where p (E b (l) ) is the PDF of the E b (l) . The BER formula resulted from integration given in equation (24). To compute the integral in equation (24), the distributed energy must be considered. Because of the PDF consider to be intractable, the method to compute the BER is evaluating the histogram of E b (l) followed by a numerical integration [18,19,18]. Fig. (2) presents the histogram of the E b (l) , for 50000 samples obtained by simulation and ๐›ฝ=4. Lwaa Faisal Abdulameer Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, P.P. 32- 44 (2022) 37 Fig. 2 ๐„ ๐› (๐ฅ) histogram. Applying numerical integration, the BER formula is expressed as, BER = โˆ‘ 1 2 erfc (โˆš (h11 2 +h12 2 +h21 2 +h22 2 )E b (l) N0 ) p(E b (l) )ml=1 โ€ฆ (25) In the above equations, ๐‘š denotes the number of histogram classes and p (E b (l) )is the probability of the energy in interval centered on E b (l) . 6. Results and Discussions Fig.3 shows the single logistic map providing the chaotic behavior beyond ๐œ‡ = 3.57. This map has more randomness ๐œ‡ = 3.8 and LE equals 0.5. Fig.4 presents the single tent map. It is observed that this map has chaotic properties within the range (0,1) of a control parameter (a). It has more randomness when the value of (a) is greater than 0.5 and LE equals 0.85. A dual logistic is provided in Fig.5. It has more randomness when ๐œ‡ > 2.35 and ๐œ‡ < 4. More randomness appeared at ๐œ‡ = 4 and LE equals 0.81. Fig.6 presents the dual tent which has chaos properties in the range (0,1) of ๐‘Ž . It has more randomness when ๐‘Ž = 0.5 and LE at equals 1.2. We observed from Fig. 3 and Fig. 4 that when a very small change in initial values say 10 -16 , a new chaotic sequence is generated completely different from the current state. Therefore, with increasing the time of iteration more than 20 times, the difference exponentially increases. For the dual logistic map in Fig. 5, this difference appears with increasing the iteration time more than 40 times, after this value, the difference exponentially increases. In Fig.6, the dual tent map has the difference between two sequences is very sensitive to a very small change in initial conditions. However, this map shows better sensitivity to initial conditions. Whereas, the single tent map provides the best sensitivity than dual single and logistic maps according to results obtained from LE. Table (6) summarizes the values of LEs for presented chaotic maps Table 6, values of LE Chaotic map LE Single logistic 0.5 Single tent .0.85 Dual logistic 0.81 Dual tent 1.2 From the above table, it is observed that the dual tent has the most randomness whereas the single logistic map has the least randomness. In Fig.7, the BER is degraded for single map when a 2 ร— 2 is considered for the system. Also, for a dual tent, when the system is compensated with 2 ร— 2 STBC, the SNR will gain 0.5 dB as compared to 2 ร— 2 single logistic for the same BER under the AWGN assumption. It is noted that there is a tradeoff between the randomosity and BER performance. So, the BER performance can be achieved by implementing 2 ร— 2 single tent map at the cost of reducing randomosity. From Figs. 3,4, 5, and 6, we observed that chaotic maps give highly distinct sequences as 1.85 1.855 1.86 1.865 1.87 1.875 0 0.5 1 1.5 2 2.5 x 10 4 Bit energy n 0 . o f s a m p le s Lwaa Faisal Abdulameer Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, P.P. 32- 44 (2022) 38 compared to the PN sequence generator. The degree of distinctness is more for the dual chaotic map as compared to the single chaotic map. Now, let us suppose that ๐‘ฅ๐‘› and ๐‘ฆ๐‘› are two- sequence with length ๐‘. The auto-correlation and the cross-correlation are defined in equations (26 and 27) respectively [4]. ๐‘…๐‘ฅ (๐‘—) = 1 ๐‘ โˆ‘ ๐‘ฅ๐‘– ๐‘ฅ๐‘–+๐‘— ๐‘ ๐‘–=1 โ€ฆ(26) ๐‘…๐‘ฅ๐‘ฆ (๐‘—) = 1 ๐‘ โˆ‘ ๐‘ฅ๐‘– ๐‘ฆ๐‘–+๐‘— ๐‘ ๐‘–=1 โ€ฆ(27) where ๐‘ is the sequenceโ€™s length and ๐‘— is the distance between two chaotic elements. Fig.8 shows the auto-correlation of dual tent. The auto-correlation is maximum at zero time shift. Fig. 9 presents that the single tent map provides a cross correlation function near zero (maximum value 0.0085) when compared to dual tent (highest value 0.028). However, the two sequences of single tent satisfy the orthogonality property more than dual tent map Fig. 3. The difference between two single logistic and its LE. 0 10 20 30 40 50 60 70 80 90 100 -4 -2 0 2 4 6 8 x 10 -14 Iterations D if fe re n c e b e tw e e n t w o s e q u e n c e s single logistic map Lwaa Faisal Abdulameer Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, P.P. 32- 44 (2022) 39 Fig. 4. a) The difference between two single tent and its LE. 0 10 20 30 40 50 60 70 80 90 100 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 Iterations D if fe re n c e b e tw e e n t w o s e q u e n c e s Single tent map 0 10 20 30 40 50 60 70 80 90 100 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 Iterations D if fe re n c e b e tw e e n t w o s e q u e n c e s dual logistic logistic Lwaa Faisal Abdulameer Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, P.P. 32- 44 (2022) 40 Fig. 5. The difference between two dual logistic and its L.E Fig. 6. The difference between two dual tent and its LE. 0 10 20 30 40 50 60 70 80 90 100 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 Iterations D if fe re n c e b e tw e e n t w o s e q u e n c e s dual tent maps Lwaa Faisal Abdulameer Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, P.P. 32- 44 (2022) 41 Fig. 7. BER for single and dual maps. Fig. 8. auto-correlation of dual tent. Lwaa Faisal Abdulameer Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, P.P. 32- 44 (2022) 42 Fig. 9. cross-correlation of single and dual tent. 6. Conclusions The data encryption based on the dual chaotic presented in this work has excellent randomness. The LEs for the single and dual maps have been computed numerically. In this work, the exact BER for dual and single chaotic maps modulated CSK 2 ร— 2 STBC under AWGN has been investigated. The final results show that the randomness of the dual tent map is better than the single tent map, single logistic map, and dual logistic map. As well as the 2 ร— 2 CSK-MIMO gives a better BER performance as compared with the SISO system. 7. References [1] K. Daniela and E. Marcio, โ€œOn the Power Spectral Density of Chaotic Signals Generated by Skew Tent Maps,โ€ IEEE International Symposium on Signals, Circuits and Systemsโ€, Vol. 1, pp. 1-4, 2007. [2] A. Kathleen, S. Tim and Y. James, Chaos, An Introduction to Dynamical Systems. Springer 1996. [3] F. Jiu and T. Chi, Reconstruction of Chaotic Signals with Applications to Chaos-Based Communications. Word Scientific, 2008. [4] C. Yi, Li Z. and W. Yifang, A Data Encryption Algorithm based on Dual Chaotic System: proceeding of the 2010 International Conference on Computer Application and https://ieeexplore.ieee.org/xpl/conhome/5602791/proceeding https://ieeexplore.ieee.org/xpl/conhome/5602791/proceeding Lwaa Faisal Abdulameer Al-Khwarizmi Engineering Journal, Vol. 18, No. 4, P.P. 32- 44 (2022) 43 System Modeling (ICCASM 2010), pp. V4- 431V4-435, 2010. [5] Parlitz U.: Lyapunov Exponents from Chauโ€™s Circuit., Journal of Circuits, Systems and Computers, Vol. 3, No. 2, pp. 507-523, 1993. [6] I. Aouissaoui1, T. Bakir, A. Sakly, and S. Femmam, โ€œImproved One-Dimensional Piecewise Chaotic Maps for Information Securityโ€, โ€œJournal of Communicationsโ€, Vol. 17, No. 1 P.P. 1-6,, January 2022. [7] J. Pedro do V. Alvarenga, J. Machicao, and O. M. Bruno, โ€œChaotical PRNG based on composition of logistic and tent maps using deep-zoomโ€, โ€œChaos, solitons and fractals- Elsevierโ€, Vol. 161, 2022. [8] M. Lawnik and M. Berezowski, โ€œNew Chaotic System: M-Map and Its Application in Chaos- Based Cryptographyโ€, โ€œSymmetry- MDPIโ€, Vol. 14, 2022. [9] G. Kaddoum, Mai V. and F. Gagnon, โ€œOn the performance of chaos shift keying in MIMO communications systemsโ€. โ€œIEEE WCNC- PHYโ€, pp. 1432-1437 ,2011. [10] A. Mozsary, L. Azzinari, K. Krol and V. Porra, Theoretical connection between PN- sequences and chaos makes simple FPGA pseudo-chaos sources possible: proceeding of the 8th IEEE International Conference on Electronics, Circuits and Systems, February 2001. [11] A. Abir, A. Safwan, Q. Wang, V. Calin and B. Bassem, โ€œComparative study of 1-D chaotic generator for digital data encryptionโ€, โ€œIAENG International Journal of Computer Scienceโ€, 2008. [12] K. Ljupco, S. Janusz, A. Jose and T. Igor, โ€œDiscrete Chaos-I: Theoryโ€, โ€œIEEE Transaction of Circuits and Systems-Iโ€, Vol 53, No. 6, pp. 1300-1309, 2006. [13] E. Ibarra, R. Vazquez, M. Cruz and J. Rio, Numerical Calculation of the Lyapunov Exponent for the Logistic Map: proceeding of the 12th International Conference on Mathematical Methods in Electromagnetic Theory, pp. 409-411, 2008. [14] H. Martin and M. Yuri, โ€œAn Introduction to the Synchronization of Chaotic Systems: Coupled Skew Tent Mapsโ€, โ€œIEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applicationsโ€, Vol. 44, No. 10, pp. 856-866, 1997. [15] G. Kaddoum, P. Charge and D. Roviras, โ€œA generalized methodology for bit-Error-rate reduction in correlation-based communication schemes using chaosโ€,โ€ IEEE Communication Lettersโ€, Vol. 13, No. 8. , 2009. [16] L. Abdulameer., D. Jokhakar, U. Sripati and M. Kulkarni: BER Performance Enhancement for Secure Wireless Communication Systems based on Chaotic MIMO Techniques., procedding of the International Conference on Communication and Electronics System Design, 2013. [17] R. Sankpal, A. Vijaya, Image Encryption Using Chaotic Maps. A Survey, Lecture notes in networks and systems, Springer, p.p. 835- 844, 2014. [18] S. Das, K. Mandal, and M. Chakraborty, โ€œLMMSE equalized DCSK communication system over a multipath fading channel with AWGN noiseโ€, proceeding of the third International Conference on Computer, Communication, Control and Information Technology (C3IT), p.p 1-4, 2015. [19] V. Manikandan & Rengarajan Amirtharajan, โ€œOn dual encryption with RC6 and combined logistic tent map for grayscale and DICOMโ€,โ€ Multimedia Tools and Applicationsโ€, P.P. 1- 30, 2021. [20] A. Imoize , A. Ibhaze , A. Atayero , and K. Kavitha, โ€œStandard Propagation Channel Models for MIMO Communication Systemsโ€, โ€œHindawi Wireless Communications and Mobile Computingโ€, PP. 1-36, 2021. [21] R. Dhiaโ€™a, โ€œDesign a Security Network System against Internet Wormsโ€, โ€œAl- Khwarizmi Engineering Journalโ€, Vol. 8, No. 3, PP 40 โ€“ 52, p.p. 1-13, 2012. [22] R. Yamazaki, Y. Shimada, and T. Ikeguchi, โ€œChaos MIMO system with efficient use of information of bitsโ€, โ€œNOLTA, IEICEโ€, P.P. 1-15, 2020. [23] I. Kadhem, โ€œA New Audio Steganography System Based on Auto-Key Generatorโ€, โ€œAl- Khwarizmi Engineering Journalโ€, Vol. 8, No. 1, p.p. 27 โ€“ 36, 2012. [24] L. Abdulameer, ANALYSIS AND DESIGN OF RELIABLE AND SECURE CHAOTIC COMMUNICATION SYSTEMS FOR OPTICAL AND WIRELESS LINKS, Dept. of Electronics and Communication Engg., NITK, 2014. https://ieeexplore.ieee.org/xpl/conhome/5602791/proceeding https://ieeexplore.ieee.org/xpl/conhome/4569857/proceeding https://ieeexplore.ieee.org/xpl/conhome/4569857/proceeding https://ieeexplore.ieee.org/xpl/conhome/4569857/proceeding http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6754860&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6754860 http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6754860&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6754860 http://ieeexplore.ieee.org/search/searchresult.jsp?searchWithin=p_Authors:.QT.Das,%20S..QT.&newsearch=true http://ieeexplore.ieee.org/search/searchresult.jsp?searchWithin=p_Authors:.QT.Mandal,%20S.K..QT.&newsearch=true http://ieeexplore.ieee.org/search/searchresult.jsp?searchWithin=p_Authors:.QT.Chakraborty,%20M..QT.&newsearch=true http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7055073 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7055073 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7055073 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7055073 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7055073 (2022) 32-44ุŒ ุตูุญุฉ 4ุงู„ุนุฏุฏุŒ 18ู…ุฌู„ุฉ ุงู„ุฎูˆุงุฑุฒู…ูŠ ุงู„ู‡ู†ุฏุณูŠุฉ ุงู„ู…ุฌู„ุฏ ู„ูˆุงุก ููŠุตู„ ุนุจุฏ ุงุงู„ู…ูŠุฑ 44 ุชุญุณูŠู† ุงุฏุงุก ู…ู†ุธูˆู…ุฉ ุงุงู„ุชุตุงุงู„ุช ุงู„ููˆุถูˆูŠุฉ ุงู„ุซู†ุงุฆูŠุฉ ุจุงุณุชุฎุฏุงู… ุชู‚ู†ูŠุฉ ุงู„ู‡ูˆุงุฆูŠุงุช ุงู„ู…ุชุนุฏุฏุฉ ู„ูˆุงุก ููŠุตู„ ุนุจุฏ ุงุฃู„ู…ูŠุฑ* ุงูˆุฏุจูŠ ุณุฑูŠุจุงุชูŠ** ู…ูˆู„ุฏูŠุฑ ูƒูˆู„ูƒุฑู†ูŠ*** ุงู„ุนุฑุงู‚ /ุฌุงู…ุนุฉ ุจุบุฏุงุฏ /ูƒู„ูŠุฉ ุงู„ู‡ู†ุฏุณุฉ ุงู„ุฎูˆุงุฑุฒู…ูŠ /ู‚ุณู… ู‡ู†ุฏุณุฉ ุงู„ู…ุนู„ูˆู…ุงุช ูˆุงุงู„ุชุตุงุงู„ุช* ุฏุงู„ู‡ู† /ู‚ุณู… ู‡ู†ุฏุณุฉ ุงุงู„ู„ูƒุชุฑูˆู†ูŠูƒ ูˆุงุงู„ุชุตุงุงู„ุช /ุงู„ู…ุนู‡ุฏ ุงู„ูˆุทู†ูŠ ุงู„ุชูƒู†ูˆู„ูˆุฌูŠ ูƒุงุฑู†ุงุชุงูƒุง**ุŒ*** lwaa@kecbu.uobaghdad.edu.iq*ุงู„ุจุฑูŠุฏ ุงุงู„ู„ูƒุชุฑูˆู†ูŠ: sripati_achary@yahoo.co.in:ุงู„ุจุฑูŠุฏ ุงุงู„ู„ูƒุชุฑูˆู†ูŠ** mkuldc@gmail.com:ุงู„ุจุฑูŠุฏ ุงุงู„ู„ูƒุชุฑูˆู†ูŠ*** ุงู„ุฎุงู„ุตุฉ ุชุนุฏ ู…ู† ุงู„ุฎูŠุงุฑุงุช ุงู„ู…ู…ุชุงุฒุฉ ุงู„ููˆุถูˆูŠุฉุงู† ุงู„ุญูุงุธ ุนู„ู‰ ุณุฑูŠุฉ ุงู„ู…ุนู„ูˆู…ุงุช ุนู†ุฏ ุงู†ุชู‚ุงู„ู‡ุง ุฎุงู„ู„ ุงู„ูˆุณุท ู…ู† ูˆุงู„ู‰ ุงู„ู…ุณุชุฎุฏู… ุชุนุฏ ู…ู† ุงุงู„ู…ูˆุฑ ุงู„ุถุฑูˆุฑูŠุฉ ุฌุฏุง. ุงุงู„ุดุงุฑุฉ ุฌุฏุง ููŠุงุงู„ุดุงุฑุฉ ุงู„ ุชูƒุฑุฑ ู†ูุณู‡ุง ุจุนุฏ ู…ุฏุฉ ู…ู† ุงู„ุฒู…ู† ูˆุงู† ุงูŠ ุชุบูŠูŠุฑ ุญุชู‰ ู„ูˆ ูƒุงู† ุตุบูŠุฑุง ู„ุชุดููŠุฑ ุงุงู„ุดุงุฑุงุช ูˆุฎุตูˆุตุง ุงู†ู‡ุง ุชู…ุชุงุฒ ุนู† ุงู„ุฎูˆุงุฑุฒู…ูŠุงุช ุงุงู„ุฎุฑู‰ ุจูƒูˆู† ููˆุถูˆูŠุฉ ู…ู† ุงุงู„ุญุงุฏูŠุฉ ู…ู…ุง ุฃูƒุซุฑ. ุงุงู„ุดุงุฑุฉ ุงู„ููˆุถูˆูŠุฉ ุงู„ุซู†ุงุฆูŠุฉ ุชู…ุชุงุฒ ุจูƒูˆู†ู‡ุง ุงู„ู‚ูŠู… ุงุงู„ุจุชุฏุงุฆูŠุฉ ุณูˆู ูŠูˆู„ุฏ ุงุดุงุฑุฉ ุฌุฏูŠุฏุฉ ู…ู…ุง ูŠุตุนุจ ุนู„ู‰ ุงู„ู…ุชู†ุตุชูŠู† ุงุณุชุฑุงู‚ ุงุงู„ุดุงุฑุฉ ุงู„ููˆุถูˆูŠุฉ ุงู„ุซู†ุงุฆูŠุฉ ูˆู‚ุฏ ุชู… ู‚ูŠุงุณ ู„ุฅู„ุดุงุฑุฉุงู„ููˆุถูˆูŠุฉ ุงุงู„ุญุงุฏูŠุฉ ูˆู†ูˆุนูŠู† ู…ู…ุงุซู„ูŠู† ู„ุฅู„ุดุงุฑุงุชูŠูˆู„ุฏ ุงุดุงุฑุฉ ู…ุนู‚ุฏุฉ ุฌุฏุง ุจุงู„ู†ุณุจุฉ ู„ู„ู…ุชู†ุตุช. ููŠ ู‡ุฐุง ุงู„ุจุญุซุŒ ุชู… ุชุตู…ูŠู… ู†ูˆุนูŠู† (. ุงูŠุถุง ุชู… ููŠ ู‡ุฐุง ุงู„ุจุญุซ ุงุณุชุฎุฏุงู… ุชู‚ู†ูŠุฉ ู…ุชุนุฏุฏุฉ Lyapunov Exponent (LE)ู…ูŠุฉ ู„ูƒู„ ู†ูˆุน ูˆุชุชู…ุซู„ ุจู€ )ู…ุฏู‰ ููˆุถูˆูŠุฉ ูƒู„ ุงุดุงุฑุฉ ู…ู† ุฎุงู„ู„ ุงุดุชู‚ุงู‚ ุฎูˆุงุฑุฒ )ุงู„ุนุงู„ู‚ุฉ ุงู„ุนูƒุณูŠุฉ ุจูŠู† ุงู„ู‡ูˆุงุฆูŠุงุช ู„ุชุญุณูŠู† ุงุงู„ุฏุงุก ุงู„ุนุงู… ู„ู…ู†ุธูˆู…ุฉ ุงุงู„ุชุตุงุงู„ุช ู„ูƒูˆู† ุงุณุชุฎุฏุงู… ุงุงู„ุดุงุฑุงุช ุงู„ููˆุถูˆูŠุฉ ูŠุคุฏูŠ ุงู„ู‰ ุชู‚ู„ูŠู„ ุงุงู„ุฏุงุก ุจุณุจุจ ุฒูŠุงุฏุฉ ุณุฑูŠุฉ ุงู„ู…ุนู„ูˆู…ุฉ ููˆุถูˆูŠุฉ ู…ู† ุจู‚ูŠุฉ ุงุงู„ู†ูˆุงุน ุงู„ู…ุณุชุฎุฏู…ุฉ ููŠ ุงู„ุจุญุซ. ุฃูƒุซุฑู…ู…ุง ูŠุนู†ูŠ ุงู†ู‡ุง (LE)ุงุนุทุช ุงุนู„ู‰ ู‚ูŠู…ุฉ ู…ู† ุงู„ู€ Dual chaotic mapุงู„ู†ุชุงุฆุฌ ุจูŠู†ุช ุจุฃู† ุงุงู„ู†ุชุฑูˆุจูŠ ูˆุงุงู„ุฏุงุก(. ุงุงู„ุฎุฑู‰ ุงู„ู…ุณุชุฎุฏู…ุฉ. ุจุงุฃู„ู†ูˆุงุนุงุฏุงุก ู…ู‚ุงุฑู†ุฉ ุฃุญุณู†ูŠู‚ุฏู… single chaotic mapู…ุน 2x2ุงูŠุถุง ู…ู† ุฎุงู„ู„ ุงุณุชุฎุฏุงู… ุชู‚ู†ูŠุฉ ุงู„ู‡ูˆุงุฆูŠุงุช ุงู„ู…ุชุนุฏุฏุฉ ุชุจูŠู† ุงู† ุงุณุชุฎุฏุงู… mailto:lwaa@kecbu.uobaghdad.edu.iq mailto:sripati_achary@yahoo.co.in**ุงู„ุจุฑูŠุฏ mailto:sripati_achary@yahoo.co.in**ุงู„ุจุฑูŠุฏ mailto:mkuldc@gmail.com***ุงู„ุจุฑูŠุฏ mailto:mkuldc@gmail.com***ุงู„ุจุฑูŠุฏ