Image Encryption Using Pseudo Random Number and Chaotic Sequence Generators

Similar documents
Direct Sequence Spread Spectrum Technique with Residue Number System

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels

PERFORMANCE AND COMPARISON OF LINEAR MULTIUSER DETECTORS IN DS-CDMA USING CHAOTIC SEQUENCE

J. Electrical Systems 13-3 (2017): Regular paper. An efficient digital signal processing method for RRNS-based DS-CDMA systems

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

Spread Spectrum Techniques

Implementation of DSSS System using Chaotic Sequence using MATLAB and VHDL

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Improved FHSS using QAM/FSK modulation techniques

ECS455: Chapter 4 Multiple Access

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA

ECS455: Chapter 4 Multiple Access

Improved Performance Evaluation of Frequency Hopped Spread Spectrum using QAM/FSK Modulation Techniques

BEING wideband, chaotic signals are well suited for

Lecture 9: Spread Spectrum Modulation Techniques

Prof. P. Subbarao 1, Veeravalli Balaji 2

BER Calculation of DS-CDMA over Communication Channels

Generation of Orthogonal Logistic Map Sequences for Application in Wireless Channel and Implementation using a Multiplierless Technique

QUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61)

Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using DSSS Optimized PN Codes in DS-CDMA Systems

USING CHAOTIC SEQUENCE IN DIRECT SEQUENCE SPREAD SPECTRUM BASED ON CODE DIVISION MULTIPLE ACCESS (DS-CDMA)

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

Part A: Spread Spectrum Systems

Chapter 7 Spread-Spectrum Modulation

Multirate schemes for multimedia applications in DS/CDMA Systems

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang

Chapter 2 Direct-Sequence Systems

Code Division Multiple Access.

CDMA Mobile Radio Networks

BER Analysis for MC-CDMA

Analysis of Interference & BER with Simulation Concept for MC-CDMA

CDMA Technology. Pr. S.Flament Pr. Dr. W.Skupin On line Course on CDMA Technology

Comparative Analysis of the BER Performance of WCDMA Using Different Spreading Code Generator

ORTHOGONAL frequency division multiplexing (OFDM)

Pseudo Chaotic Sequence Generator based DS-SS Communication System using FPGA

Joint Transmitter-Receiver Adaptive Forward-Link DS-CDMA System

PERFORMANCE EVALUATION OF DIRECT SEQUENCE SPREAD SPECTRUM UNDER PHASE NOISE EFFECT WITH SIMULINK SIMULATIONS

Part A: Spread Spectrum Systems

SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS

A Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference

Chaotic Communications With Correlator Receivers: Theory and Performance Limits

Lecture 3. Direct Sequence Spread Spectrum Systems. COMM 907:Spread Spectrum Communications

Performance Analysis Of Multi Carrier CDMA System

Performance Evaluation of ½ Rate Convolution Coding with Different Modulation Techniques for DS-CDMA System over Rician Channel

Performance Analysis of DSSS and FHSS Techniques over AWGN Channel

Simulation of Optical CDMA using OOC Code

Performance of Generalized Multicarrier DS-CDMA Using Various Chip Waveforms

Part 3. Multiple Access Methods. p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)

Performance Comparison of Spreading Codes in Linear Multi- User Detectors for DS-CDMA System

Chapter 7 Spread-Spectrum Modulation

Spread Spectrum (SS) is a means of transmission in which the signal occupies a

Unit 1 Introduction to Spread- Spectrum Systems. Department of Communication Engineering, NCTU 1

Spread spectrum. Outline : 1. Baseband 2. DS/BPSK Modulation 3. CDM(A) system 4. Multi-path 5. Exercices. Exercise session 7 : Spread spectrum 1

Improvement in the Spread Spectrum System in DSSS, FHSS, AND CDMA

A NOVEL FREQUENCY-MODULATED DIFFERENTIAL CHAOS SHIFT KEYING MODULATION SCHEME BASED ON PHASE SEPARATION

Cross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWGN conditions with Error Detecting Code

AN IMPROVED WINDOW BLOCK CORRELATION ALGORITHM FOR CODE TRACKING IN W-CDMA

QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold

Spread Spectrum: Definition

Multiple Access Schemes

COMPARATIVE ANALYSIS OF PEAK CORRELATION CHARACTERISTICS OF NON-ORTHOGONAL SPREADING CODES FOR WIRELESS SYSTEMS

SC - Single carrier systems One carrier carries data stream

A Novel Spread Spectrum System using MC-DCSK

IDMA Technology and Comparison survey of Interleavers

SPREADING CODES PERFORMANCE FOR CORRELATION FUNCTION USING MATLAB

Assignment 1: Solutions to Problems on Direct Sequence Spread Spectrum

BER Comparison of DCT-based OFDM and FFT-based OFDM using BPSK Modulation over AWGN and Multipath Rayleigh Fading Channel

Theory of Telecommunications Networks

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Improving security of communication systems using CHAOS

A MODIFIED DIRECT-SEQUENCE SPREAD SPECTRUM MODULATION SCHEME FOR BURST TRANSMISSIONS. Bart Scheers and Vincent Le Nir

CDMA Technology : Pr. S. Flament Pr. Dr. W. Skupin On line Course on CDMA Technology

Performance Analysis of Rake Receivers in IR UWB System

Objectives. Presentation Outline. Digital Modulation Revision

OFDM Systems For Different Modulation Technique

Performance of a Base Station Feedback-Type Adaptive Array Antenna with Mobile Station Diversity Reception in FDD/DS-CDMA System

Performance Analysis of CDMA System using Direct Sequence Spread Spectrum and Frequency Hopping Spread Spectrum Techniques

Comparative Study of OFDM & MC-CDMA in WiMAX System

Implementation of A Low Power Low Complexity VLSI Architecture for DSSS Signal Transmission and Reception.

Impact of Mobility and Closed-Loop Power Control to Received Signal Statistics in Rayleigh Fading Channels

Journal of American Science 2015;11(7)

Spread Spectrum Basics Spreading Codes IS-95 Features- Transmitter/Receiver Power Control Diversity Techniques RAKE Receiver Soft Handoff

Multi-Carrier Systems

Mobile Radio Systems OPAM: Understanding OFDM and Spread Spectrum

Carrier Frequency Offset Estimation in WCDMA Systems Using a Modified FFT-Based Algorithm

Chapter 4. Part 2(a) Digital Modulation Techniques

CONVOLUTIONAL CODED GENERALIZED DIRECT SEQUENCE SPREAD SPECTRUM

Amplitude Frequency Phase

SIMULATIVE STUDY (LINK/SYSTEM) OF WCDMA SYSTEMS

Pilot-Assisted DFT Window Timing/ Frequency Offset Synchronization and Subcarrier Recovery 5.1 Introduction

EC 6501 DIGITAL COMMUNICATION UNIT - IV PART A

Performance Evaluation of OFDM System with Rayleigh, Rician and AWGN Channels

Update on GPS L1C Signal Modernization. Tom Stansell Aerospace Consultant GPS Wing

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels

C th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2011) April 26 28, 2011, National Telecommunication Institute, Egypt

The BER Evaluation of UMTS under Static Propagation Conditions

Bit Error Simulation of DQPSK for a Slow Frequency Hopping CDMA

An Improved VLSI Architecture Using Galois Sequence for High Speed DSSS Signal Acquisition at Low SNR

Transcription:

Proceedings of the 7th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '8) Image Encryption Using Pseudo Random Number and Chaotic Sequence Generators M. I. YOUSSEF, A. E. EMAM, and M. ABD ELGHANY Faculty of Engineering, Department of Electrical engineering Al-Azhar University Nasr City, Cairo - EGYPT E-mail: mohamedgheth@yahoo.com Abstract:- In this paper, the performance of image encryption using conventional pseudo random code generators as maximum length, gold code generators are analyzed and compared to that using chaotic sequence generator. Applicability of different types of generators is studied by examining their autocorrelation, crosscorrelation performance, measuring the histogram of the spreaded image and the bit error probability for the received data in a communication system. A residue number arithmetic is added to the system; this system is evaluated and compared to that of non residue number system and measuring its performance. Key-Words: - Spread Spectrum, PN code generators, Chaotic sequence, Residue number system 1. Introduction In Spread Spectrum (SS) communication [1] [] the spread is accomplished by utilizing a code which is independent of the data. The code [6] used for spreading the signal is a pseudo-random or pseudo-noise (PN) code that is mixed with the data to spread the signal in a statistically random matter. Conventional PN sequence is generated by linear shift registers which generate a cost problem for making the period of the PN long because a large amount of storage capacity and a large number of circuits is required. It is also it is not considered secure for transmission systems as it can be easily described once a short sequential set of chips from the sequence is known. This is why non-conventional techniques chaos generators [8] [1] are utilized to spread the signal. In Chaotic spread spectrum communication systems the spreading sequence is a chaotic waveform. [7] The performance image encryption using different types of spreading sequences is analyzed and a comparison is performed between chaotic sequence as a spreading code and conventional Pseudo-noise code generators. The bit error performance for the communication system is measured for both chaotic and conventional code generators. Also, residue number system (RNS) is added to the chaotic communication system and measures its performance. The usage of RNS adds more security to the system through encrypting the data signal and converting arithmetic of large numbers to arithmetic on small numbers, thus improving the signal-to-noise ratio of the received signal and decreasing the bit error probability. Following the introduction, in part two of this paper, a brief description of spread spectrum systems is provided. In part three a description of the conventional Pseudo-noise generators are provided, part four provides a definition of chaotic sequence, part five defines the method for generating the chaotic sequence, In part six an introduction to residue number system is provided, part seven provides system model description, part eight shows the simulation results, and finally in part nine the conclusion and future work in this field are indicated. 2. Direct sequence spread spectrum technique In Direct Sequence-Spread Spectrum (Fig 1) the baseband waveform is XOR by the PN sequence in order to spread the signal. After spreading, the signal is modulated and transmitted. The most widely modulation scheme is BPSK. ISSN: 179-117 73 ISBN: 978-96-474-48-2

Proceedings of the 7th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '8) Fig1: DS - SS block diagram The equation that represents this DS-SS signal is shown in equation (1), and the block diagram is shown in Figure 1. S ss = (2 E s /T s ) [m(t) p(t)] cos (2 π f c t + θ ) (1) m(t) is the data sequence, T s is duration of data symbol. p(t) is the PN spreading sequence, f c is the carrier frequency, θ is the carrier phase angle at t=. The demodulator, de-modulates the modulated (PSK) signal first, low Pass Filter the signal, and then de-spreads the filtered signal to obtain the original message, as shown in equation (2). m(t) = [ S ss * cos (2 π f c t + θ ) ] p(t) (2) 3. Pseudo-noise code generator A Pseudorandom sequence is a binary sequence generated using a Shift Register, and a combinational Logic circuit as its feedback. Due to the usage of the PN code, the spread spectrum technique has the ability to discriminate interference signals and detect the received signal by matching received PN code with the local PN code and measuring the number of chips of the code delay between the signal being transmitted and received, and thus determine uniquely the range from the transmitter to the receiver without ambiguity [3]. Consequently the phase of the spread spectrum technique is easily resolved. The M-Sequence and Gold sequences are the most popular conventional spreading sequences in spread spectrum systems. The M-sequences have very desirable autocorrelation properties. However, large spikes can be found in their cross-correlation functions especially when partially correlated. On the other hand, the Gold sequences have better cross-correlation properties than M-sequences. 4. Chaotic sequence code generator A chaotic dynamical system [8] - [11] is an unpredictable, deterministic and uncorrelated system that exhibits noise-like behaviour through its sensitive dependence on its initial conditions which generates sequences similar to PN sequence. Since the signals generated from chaotic dynamic systems are noise-like, super sensitive to initial conditions and have spread and flat spectrum in the frequency domain, it is advantageous to carry messages with this kind of signal that is wide band and has high communication security. For this reason, numerous applications of secure communication with chaos have been developed. A direct application of chaos theory to telecommunication systems appears in a conventional digital spread spectrum [1], where the information, is spread over a wider band by using a chaotic signal instead of the usual periodic PN sequences. The chaotic sequences have Noise-like waveform, and Wide band spectrum properties [1]. Those properties have the following advantages: Firstly the sensitive dependence on the initial conditions which is desirable for multi-user and secure communication. Secondly the Infinitely long period without increasing the generator this is desirable for both multi-user and secure communication. The disadvantage of such system is the complexity to synchronize the receiver chaos sequence with local generated at the receiver end.. Generation of chaotic sequence Various non-linear dynamic systems are used in order to generate the chaotic sequence as: Tent map and logistic map[12] [13]. In this paper the generation of chaotic sequence using the logistic and tent maps are studied through the analysis of the bifurcation diagram for each of them. The state space description of logistical map is: x n+1 = r x n (1 - x n ) x n 1, r 4 (3) Where; r is called the bifurcation parameter. The state space description of tent map is: F(x n ) = x n+1 = k ( 1 1 2 x n ) (4) Where; F is the transformation mapping function, k is arbitrary constant One major difference between chaotic sequences and PN sequences is that the generated chaotic sequences are not binary. Therefore chaotic sequences must be transformed into binary sequences. In order to transfer the real valued chaotic sequence (x) to binary sequence, a threshold function θ t (x) is defined as, θ t (w) =, x < t 1, x t t is the threshold value The threshold value is chosen as an arithmetic mean of a large number of conservative values of x. Thus a binary sequence is obtained and is referred () ISSN: 179-117 74 ISBN: 978-96-474-48-2

Proceedings of the 7th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '8) to as a chaotic threshold sequence. 6. Residue number system (RNS) A residue number system (RNS) [14] [] represents a large integer using a set of smaller integers, so that computation may be performed more efficiently. It relies on the Chinese remainder theorem of modular arithmetic for its operation. The residue number system is defined by the choice of v positive integers m i (i = 1, 2, 3 v) referred to as moduli. If all the moduli are pair-wise relative primes, any integer N, describing a nonbinary message in this letter, can be uniquely and unambiguously represented by the so-called residue sequence (r 1, r 2..r v ) in the range <N<M I,where r i = N (mod m i ) represents the residue digit of N upon division by m i, and M I = m i is the information symbols dynamic range. Conversely, according to the Chinese Reminder Theorem, for any given v- tuple (r 1, r 2..r v ) where r i < m i ; there exists one and only one integer N such that N < M i and r i = N (mod m i ) which allows us to recover the message N from the received residue digits. Residue number system has two inherent features that render the RNS attractive in comparison to conventional weighted number systems, such as for example the binary representation. These two features are []: The carry-free arithmetic and lack of ordered significance amongst the residue digits. 7. System model In this paper, a Lena image as shown in Fig 2, is used as a data source and is encrypted using direct sequence spread spectrum technique as shown in Fig 3. The encrypted image is analyzed when the system is designed with conventional PN sequence, and with chaotic sequence. The bit error performance for a Tx/Rx system is measured for both chaotic and conventional PN sequences. Finally RNS is added and the system performance is measured. The bit error probability (P e ) [2] for BPSK system is used as a reference for comparisons between various schemes. P e = Q [1/ ((K-1)/3N + N o /2E b )], M, Gold (6) P e = Q [1/ ((K-1)/ 3N + N o /2E b )], Chaotic (7) Q(x) =.*erfc(x/ 2) E b is the bit energy N o is the one-sided thermal noise PSD of the receiver. N is the Processing gain (PG), K is the Number of users 12 1 8 6 4 2 1 2 2 Fig 2: Lena image and its histogram before encryption Fig 3: Direct Sequence Spread Spectrum System The equation that measures the autocorrelation and cross correlation functions is as shown in equation (8) and (9). Ra(τ) = Pn(t). Pn(t+τ) dt (8) Rc(τ) = Pn i (t). Pn j (t+τ) dt (9) Ra(τ) is autocorrelation function. Rc(τ) is cross correlation function. Pn = Pseudo random code measured at two intervals of time Pn i,j = Two different Pseudo random codes 8. Simulation results Various simulations were performed using chaotic and conventional pseudorandom sequence. System using chaotic sequence is also compared to with/without RNS. 8.1. The bifurcation and chaotic maps: The bifurcation for each of the chaotic generators is drawn to show its random performance. ISSN: 179-117 7 ISBN: 978-96-474-48-2

. 1 1. 2 2. 3 Proceedings of the 7th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '8) Bifurcation plot of LOGISTIC map..4.3.2.1 -.1 -.2 -.3 -.4 -. x 1 4 Fig 4.a: bifurcation diagram Logistic map, x = -.3 Bifurcation plot of TENT MAP. autocorrelation autocorrelation Fig shows the autocorrelation function for the chaotic sequence is highly compared to that of the conventional PN code generators. In order to demonstrate the extreme sensitivity of the chaotic logistic map the next analysis study the cross correlation between two codes generated by Logistic map with difference of.1 in the initial condition and for the conventional PN code generators, is as shown in Fig 6..4.3.2.1 -.1 -.2 -.3. 1 1. 2 2. x 1 4 Fig 4.b: bifurcation diagram for Tent map, x =. From Fig 4, it indicates that depending on the value of r, the dynamics of system can change attractively exhibiting periodicity or chaos. 8.2. The autocorrelation and crosscorrelation functions: In the next simulations the autocorrelation and cross correlation performance for each of the chaotic and conventional random sequences are analyzed. correlation value 8 7 6 4 3 2 1 Auto correlation correlation value 4 3 2 1 Auto correlation Fig 6.a: cross-correlation Fig 6.b : cross-correlation for logistic Map for M-Sequence Fig 6 shows that chaotic sequences have very low values of the cross correlation function. This is important with regards to security, because the receiver cannot be figured out from a few points of the chaotic sequence. Thus, the chaotic sequence also permits more users in the communication system and the system obtains a greater security. 8.3. Power spectral density distribution In order to see the randomness of the chaotic sequence, the power spectral density for the Logistic map is drawn in comparison with a purely random sequence (n = 6) as foreseen in Fig 7. -6 CHAOTIC POWER SPECTRAL DENSITY 3 RANDOM NUMBER POWER SPECTRAL DENSITY -1 2 4 6 8 1 12 Time Fig.a : Logistic map autocorrelation -1 2 4 6 8 1 12 Time Fig.b : Tent map autocorrelation Power spectral magnituide (db/hz) -7-8 -9-1 -11 Power spectral magnituide (db/hz) 2 1-1 -2 Fig.c : M- Sequence Fig.d : Gold sequence -12.1.2.3.4..6.7.8.9 1 Normalized frequency -3.1.2.3.4..6.7.8.9 1 Normalized frequency Fig 7.a: PSD - Chaotic Fig 7.b: PSD - random sequence sequence It is shown that the density of the chaotic code is close to that of a purely random code sequence. These results suggest that chaotic codes generated by Logistic map satisfy the basic requirements for secure spread spectrum communication. ISSN: 179-117 76 ISBN: 978-96-474-48-2

Proceedings of the 7th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '8) 8.4. Encryption using chaotic, PN sequence The histogram of the encrypted image (Lena) using first chaotic sequence and again using conventional code generator for equal code length (N = 3) is as shown in Fig 8. 2 2 1 3 4 12 36 6 84 18 132 6 18 24 228 2 2 3 3 2 Fig 1.a : Histogram after encryption, using N= 2 3 2 2 2 1 1 1 2 2 2 4 6 8 1 12 14 16 18 2 22 Fig 8.a: Chaotic code Fig 8.b: Conventional Logistic Map PN code From Fig 8, it is shown that chaotic sequence produce a more scrambled sequence compared to that of conventional code sequence. 8.. Effect of initial value of chaotic sequence Using chaotic numbers equal to three (N = 3) and changing the initial value x from -. to. and seeing the change in the histogram of the spreaded image (Lena) as shown in Fig 9. 3 1 2 4 6 8 1 12 14 16 18 2 22 Fig 1.b: Histogram after encryption, using N= From Fig 1, it is shown that as the number of chaotic sequence increases leading to an increase in the spreaded sequence but this consequently leads to a decrease in the performance due to the need of a larger channel bandwidth. 8.7. Bit error probability for various code generators: In this section, the system performance is measured through the probability of error for both M- sequence and Logistic map code generators. Pe for Various Code generators Number of users = 6 2 2 1.E-3-1 - 1 2 2 1 1.E-4 1 2 2 Fig 9.a : Histogram after encryption, x = -.4 3 Pe 1.E- 1.E-6 Chaotic sequence M-Sequence 3 2 2 1 1 2 2 3 Fig 9.b: Histogram after encryption, x =.2 From Fig 9, it is shown that changing the initial condition value for the chaotic sequence would affect the histogram of the spreaded image. 8.6. Effect of increasing number of chaotic sequence Increasing number of chaotic sequence (N) and see the effect on the spreaded image (Lena) and it s histogram as shown in Fig 1. 1.E-7 EbN Fig 11: bit error probability for 6- user DS-SS system using: M- Sequence / Logistic map code The bit error probability for Chaos-based spreading sequence is improved by around % at EbNo = db, thus at any fixed BER their > % more users can be allocated for free for chaoticbased codes. 8.8. Image Histogram with and without RNS The histogram for the spreaded signal is studied with and without RNS for both chaotic and conventional PN code generators. Taking initial value x = -.4, number of chaotic sequence = 3. ISSN: 179-117 77 ISBN: 978-96-474-48-2

Proceedings of the 7th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '8) 8.8.1 For Chaotic code generators 3 2 2 1 1 2 2 18 16 14 12 1 8 6 4 2 1 2 2 Fig 12.a: without RNS Fig 12.b: with RNS 8.8.2 For Conventional PN code generators 4 3 3 2 2 1 2 4 6 8 1 12 14 16 18 2 22 1 1 2 2 3 Fig 13.a: without RNS Fig 13.b: with RNS From Fig 12 and 13, it is shown that using RNS would produce a more spreaded sequence of the data and the image is more scrambled, thus it provides more secure transmission. 9. Conclusion In comparison to conventional codes, chaotic codes, not only have better autocorrelation and cross-correlation performance and lower probability of error for multi-user communication, but also have some properties superior to the former. Firstly, conventional codes generated by linear shift register generators are easily decipherable. In contrast, security of the chaotic sequence is considered extremely high. Secondly, for an m- stage linear shift register generator and Gold sequence, there is a limit on the number of maximum length sequences. In contrast, for the chaotic sequence any change of the initial conditions or parameters will generate a new sequence. Also, chaotic sequence provides a well distributed spreaded signal histogram which indicates a more signal randomness and thus more security compared to PN code sequence. Thus, due to the above advantages that the use of chaotic sequence provides, it is considered a best choice for secure data communication. In this paper an image is used instead of binary data for digital transmission, this open the way for encrypted image transmission over a channel through spreading the information using not only well known maps as logistic or tent maps but also through the usage of modified maps through addition of some constants to the state space equations of the maps to be used as a secret key. And, finally introducing RNS to the model in order provide better security and encryption to the transmitted data as seen from the histogram of the encrypted information. References [1] N.B chakrabarti, A. K. Datta, introduction to the principles of digital communication", New Age Publishers, 27. [2] Erik Storm, Tony Ottosson, Arne Svensson, An introduction to spread spectrum systems, Department of signals and systems, Chalmers university of technology, Sweden, 22. [3] Raymond L. PICKHOLTZ, Theory of spread spectrum communication A tutorial, IEEE Trans. Communication, vol. 3, No., May 1982. [4] Ryuji Kohno, Reuven Meidan, and Laurence B. Milstein, Spread Spectrum Access Methods for Wireless Communications, IEEE Communication magazine, January 199. [] Yong Luo, Spread Spectrum Ranging System Analysis and Simulation, Master Thesis in Electronic systems engineering University of Regina, Saskatchewan, March 1998. [6] Ipsita Bhanja, Performance comparison of various spreading codes in spread spectrum modulation in ranging technique, Proc of national conference on range technology, pp3-3, 26 [7] Carl Andren, A Comparison of Frequency Hopping and Direct Sequence Spread Spectrum Modulation for IEEE 82.11 Applications at 2.4 GHz Harris Semiconductor, Palm Bay, Florida Nov. 1997. [8] S. Mandal and S. Banerjee, "A chaos-based spread spectrum communication system," Nat. Conf. Nonlinear Sys. Dynamics, IndianInstitute of Technology, Kharagpur, Dec 28-3, 23. [9] Predrag Cvitanović, Roberto Artuso, Ronnie Mainieri, Gregor Tanner, Gábor Vattay, Niall Whelan and Andreas Wirzba, "Chaos: Classical and Quantum", ChaosBook.org version12.3, Sep 3 28. [1] Peter Stavroulakis, Chaos Applications in telecommunication, Taylor and Francis Group, LLC, 26. [11] Mario Martelli, Introduction to discrete dynamic systems and chaos, Wiley, Inter-science, 1999 [12] Wang Hai, Hu Jiandong. Logistic-Map chaotic spread spectrum sequence ACTA Electronica sinica, Vol.2 No. 1 19-23, 1997 [13] Jessa, M. The period of sequences generated by tentlike maps, IEEE trans. Circuits syst. I, Fundam. Teory appl., 22, 49,(1), pp.84-88 [14] Lie-Liang, Lajos Hanzo, Performance of residue number system based DS-CDMA over multipath fading channels using orthogonal sequences, department of electronics and computer science, university of Southampton, UK, July 1999. [] K. W. Watson, Self-checking computations using residue arithmetic, Proc. IEEE, vol. 4, pp. 192 1931, Dec. 1966. ISSN: 179-117 78 ISBN: 978-96-474-48-2