..............................
            ..............................
            ..............................
            
A New Image Encryption Scheme Using Dual Chaotic Map Synchronization
        
        Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using 
chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as 
the  random-like  behavior  which  resembles  the  main  ingredients  of  a  good  cipher  namely  the  confusion and  diffusion 
properties.  In this article, we  present a new scheme based  on the  synchronization of dual chaotic systems namely Lorenz and 
Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions 
and specific parameters  that  make  a  new  addition  to  the  chaotic  based  encryption systems.  This addition provides a  master-
slave  configuration that  is utilized  to  construct the proposed dual  synchronized chaos-based  cipher  scheme.  The  common 
security analyses  are  performed  to validate  the  effectiveness  of  the  proposed  scheme.  Based  on  all  experiments  and analyses, 
we  can  conclude  that  this  scheme  is  secure,  efficient,  robust,  reliable,  and  can  be  directly  applied  successfully for  many 
practical security applications in insecure network channels such as the Internet.    
            [1] Al-hazaimeh O., “Increase the Security Level for Real-Time Application Using New Key Management Solution,” International Journal of Computer Science Issues, vol. 9, no. 3, pp. 240- 247, 2012.
[2] Al-hazaimeh O., “A Novel Encryption Scheme for Digital Image-Based on one Dimensional Logistic Map,” Computer and Information Science, vol. 7, no. 4, pp. 64-73, 2014.
[3] Al-hazaimeh O., “A New Dynamic Speech Encryption Algorithm Based on Lorenz Chaotic Map over Internet Protocol,” International Journal of Electrical and Computer Engineering, vol. 10, no. 5, pp. 4824-4834, 2020.
[4] Al-hazaimeh O., Al-Jamal M., Alhindawi N., and Omari A., “Image Encryption Algorithm Based on Lorenz Chaotic Map with Dynamic Secret Keys,” Neural Computing and Applications, vol. 13, no. 3, pp. 2395-2405, 2017.
[5] Arthanari S., Mastan M., and Bagank B., “Chaotic Image Encryption using Modular Addition and Combinatorial Techniques,” The International Arab Journal of Information Technology, vol. 12, no. 2, pp. 110-117, 2015.
[6] Bhalekar S. and Daftardar-Gejji V., “Synchronization of Different Fractional Order Chaotic Systems Using Active Control,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 11, pp. 3536- 3546, 2010.
[7] Boccaletti S., Kurths J., Osipov G., Valladares D., and Zhou C., “The Synchronization of Chaotic Systems,” Physics Reports, vol. 366, no. 1-2, pp. 1-101, 2002.
[8] Coppersmith D., “The Data Encryption Standard (DES) and its Strength Against Attacks,” IBM journal of Research and Development, vol. 38, no. 3, pp. 243-250, 1994.
[9] El-Samie A., Ahmed H., Elashry F., Shahieen H., Faragallah S., El-Rabaies M., and Alshebeili A., Image Encryption: A Communication Perspective, CRC Press, 2013.
[10] Fraser M., “Information and Entropy in Strange Attractors,” IEEE Transactions on Information Theory, vol. 35, no. 2, pp. 245-262, 1989.
[11] Fridrich J., “Symmetric Ciphers Based on Two- Dimensional Chaotic Maps,” International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259-1284, 1998.
[12] Govorukhin V., “Calculation Lyapunov exponents for ODE,” MATLAB Central File Exchange, File ID: 4628, 2004.
[13] Guan Z., Huang F., and Guan W., “Chaos-based Image Encryption Algorithm,” Physics Letters A, vol. 346, no. 1-3, pp. 153-157, 2005.
[14] Ho M. and Hung Y., “Synchronization of Two Different Systems By Using Generalized Active Control,” Physics Letters A, vol. 301, no. 5-6, pp. 424-428, 2002.
[15] Kocarev L., “Chaos-Based Cryptography: A Brief Overview,” IEEE Circuits and Systems Magazine, vol. 1, no. 3, pp. 6-21, 2001.
[16] Lü H., Wang S., Li X., Tang G., Kuang J., Ye W., and Hu G., “A New Spatiotemporally Chaotic Cryptosystem and its Security and Performance Analyses,” Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 14, no. 3, pp. 617-629, 2004.
[17] Muthukumar P., Balasubramaniam P., and Ratnavelu K., “A Novel Cascade Encryption Algorithm for Digital Images Based on Anti- Synchronized Fractional order Dynamical Systems,” Multimedia Tools and Applications, vol. 76, no. 22, pp. 23517-23538, 2017.
[18] Parlitz U., Chua O., Kocarev L., Halle K., and Shang A., “Transmission of Digital Signals by Chaotic Synchronization,” International Journal of Bifurcation and Chaos, vol. 2, no. 4, pp. 973- 977, 1992.
[19] Pecora M. and Carroll L., “Synchronization of Chaotic Systems,” Chaos: An Interdisciplinary The International Arab Journal of Information Technology, Vol. 18, No. 1, January 2021 102 Journal of Nonlinear Science, vol. 25, no. 9, 2015.
[20] Sayed S. and Radwan G., “Generalized Switched Synchronization and Dependent Image Encryption Using Dynamically Rotating Fractional-Order Chaotic Systems,” AEU- International Journal of Electronics and Communications, vol. 123, no. 1, pp. 153-268, 2020.
[21] Shannon E., “Communication Theory of Secrecy Systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.
[22] Sun F., Liu S., Li Z., and Lü Z., “A Novel Image Encryption Scheme Based on Spatial Chaos Map,” Chaos, Solitons and Fractals, vol. 38, no. 3, pp. 631-640, 2008.
[23] Tahat N., Tahat A., Abu-Dalu M., Albadarneh B., Abdallah E., and Al-Hazaimeh O., “A new RSA Public Key Encryption Scheme with Chaotic Maps,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2 , pp. 1430-1437, 2020.
[24] Tél T. and Gruiz M., Chaotic Dynamics: An Introduction Based on Classical Mechanics, Cambridge University Pres, 2006.
[25] Volos C., Kyprianidis M., and Stouboulos N., “Image Encryption Process Based on Chaotic Synchronization Phenomena,” Signal Processing, vol. 93, no. 5, pp. 1328-1340, 2013.
[26] Wang L., Dong T., and Ge M., “Finite-Time Synchronization of Memristor Chaotic Systems and its Application in Image Encryption,” Applied Mathematics and Computation, vol. 347, pp. 293-305, 2019.
[27] Weng T., Yang H., Gu C., Zhang J., and Small M., “Synchronization of Chaotic Systems And Their Machine-Learning Models,” Physical Review E, vol. 99, no. 4, pp. 042203, 2019. Obaida Al-Hazaimeh is an Associate Professor of Computer Science. Now, he is a lecturer at Department of Computer Science and Information Technology. Al- Balqa' Applied University, Jordan. He has received his Ph.D. in Computer Science-Cryptography from Malaysia in 2010. Mohammad Al-Jamal is an Associate Professor of Mathematics. Now, he is a lecturer at Department of Mathematics, Yarmouk University, Jordan. He has earned his Ph.D. in Mathematics from USA in August 2012. Mohammed Bawaneh is an Associate Professor of Computer science. Now, he is a lecturer at Department of Computer Science and Information Technology. Al- Balqa' Applied University, Jordan. He has earned his Ph.D. in Computer Information Systems in 2010. Nouh Alhindawi is an Associate Professor in Computer Science & Software Engineering Departments at Jadara University, Jordan. He has received his Ph.D. in Computer Science-Software Engineering from USA in 2013. Bara’a Hamdoni received her BSc in Mathematics from Jordan University of Science and Technology in 2012, and MSc in Mathematics with specialization in Image Encryption from Yarmouk University in 2018. Appendix A. Common equations related to security analysis  ENTROPY ()=∑()log21 () 2−1 =1  CORRELATION: =cov(,) √()√() cov(,)=1 ∑(−())(−()) =1 , ()=1 ∑ =1 , ()=1 ∑( =1 −())2  DIFFERENTIALS: NPCR=1 ×
[∑(,) , ] ×100% UACI=1 ×
[∑1 (,)− 2 (,) 255, ]×100%
