{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T04:25:48Z","timestamp":1775190348789,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T00:00:00Z","timestamp":1744243200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T00:00:00Z","timestamp":1744243200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001501","name":"University Grants Commission","doi-asserted-by":"publisher","award":["190520461818"],"award-info":[{"award-number":["190520461818"]}],"id":[{"id":"10.13039\/501100001501","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Chaotic maps are employed in cryptography and secure communications due to their unpredictable and complex dynamics. However, existing chaotic maps, specifically the one-dimensional chaotic maps, often have limited chaotic control parameter ranges, which restricts their effectiveness and applicability in practical low-end applications. This paper proposes an enhanced Logistic map with an infinite chaotic control parameter range to address these limitations.  The performance of the proposed map has been comprehensively evaluated using various chaos dynamical tests, including the bifurcation diagram, Lyapunov exponent, cobweb plots, 2D and 3D phase plots, approximate entropy, and sample entropy, time sensitivity analysis, and the 0\u20131 test. The results demonstrate that the improved Logistic map significantly outperforms its seed map across all evaluation metrics. Additionally, the enhanced Logistic map-based pseudorandom bit generator (PRBG) has been designed and evaluated for resource efficiency and security. The findings validate that the PRBG achieves significant implementation efficiency while also successfully qualifying the fifteen NIST tests, validating its statistical randomness. Thus, the proposed map and the PRBG position themselves as lightweight, highly secure solutions for safeguarding resource-limited smart IoT applications.<\/jats:p>","DOI":"10.1186\/s42400-024-00319-4","type":"journal-article","created":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T03:03:06Z","timestamp":1744254186000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Enhanced logistic map with infinite chaos and its applicability in lightweight and high-speed pseudo-random bit generation"],"prefix":"10.1186","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2488-9054","authenticated-orcid":false,"given":"Mir","family":"Nazish","sequence":"first","affiliation":[]},{"given":"Munika","family":"Javid","sequence":"additional","affiliation":[]},{"given":"M. Tariq","family":"Banday","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,10]]},"reference":[{"key":"319_CR1","doi-asserted-by":"publisher","first-page":"103685","DOI":"10.1016\/j.jisa.2023.103685","volume":"80","author":"M Alawida","year":"2024","unstructured":"Alawida M (2024) Enhancing logistic chaotic map for improved cryptographic security in random number generation. J Inf Secur Appl 80:103685. https:\/\/doi.org\/10.1016\/j.jisa.2023.103685","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"319_CR2","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1007\/s11277-019-06793-1","volume":"110","author":"TS Attaullah","year":"2020","unstructured":"Attaullah TS, Jamal SS (2020) An improved chaotic cryptosystem for image encryption and digital watermarking. Wireless Personal Commun 110(3):1429\u20131442. https:\/\/doi.org\/10.1007\/s11277-019-06793-1","journal-title":"Wireless Personal Commun"},{"issue":"1","key":"319_CR3","doi-asserted-by":"publisher","first-page":"73","DOI":"10.2307\/2944326","volume":"133","author":"M Benedicks","year":"1991","unstructured":"Benedicks M, Carleson L (1991) The dynamics of the Henon map. Ann Math 133(1):73. https:\/\/doi.org\/10.2307\/2944326","journal-title":"Ann Math"},{"key":"319_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4217-6","volume-title":"Pi: a source book","author":"L Berggren","year":"2004","unstructured":"Berggren L, Borwein J, Borwein P (2004) Pi: a source book. Springer, New York"},{"key":"319_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.physa.2016.07.008","volume":"463","author":"RE de Carvalho","year":"2016","unstructured":"de Carvalho RE, Leonel ED (2016) Squared sine logistic map. Phys A Stat Mech Appl 463:37\u201344. https:\/\/doi.org\/10.1016\/j.physa.2016.07.008","journal-title":"Phys A Stat Mech Appl"},{"key":"319_CR6","doi-asserted-by":"publisher","first-page":"105010","DOI":"10.1016\/j.rinp.2021.105010","volume":"31","author":"C Dong","year":"2021","unstructured":"Dong C, Rajagopal K, He S, Jafari S, Sun K (2021) Chaotification of Sine-series maps based on the internal perturbation model. Results Phys 31:105010. https:\/\/doi.org\/10.1016\/j.rinp.2021.105010","journal-title":"Results Phys"},{"issue":"4","key":"319_CR7","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/j.dsp.2012.02.005","volume":"22","author":"QM Gaurav Bhatnagar","year":"2012","unstructured":"Gaurav Bhatnagar QM, Jonathan Wu (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Ing 22(4):648\u2013663. https:\/\/doi.org\/10.1016\/j.dsp.2012.02.005","journal-title":"Digital Signal Ing"},{"key":"319_CR8","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-662-48410-4_7","volume-title":"Chaos Detection and Predictability","author":"GA Gottwald","year":"2016","unstructured":"Gottwald GA, Melbourne I (2016) The 0-1 test for chaos: a review. In: Skokos C, Gottwald GA, Laskar J (eds) Chaos Detection and Predictability. Springer, Berlin, pp 221\u2013247. https:\/\/doi.org\/10.1007\/978-3-662-48410-4_7"},{"key":"319_CR9","doi-asserted-by":"publisher","DOI":"10.3390\/sym13112151","author":"G Grassi","year":"2021","unstructured":"Grassi G (2021) Chaos in the real world: recent applications to communications, computing, distributed sensing, robotic motion, bio-impedance modelling and encryption systems. Symmetry. https:\/\/doi.org\/10.3390\/sym13112151","journal-title":"Symmetry"},{"key":"319_CR10","unstructured":"Griffin J (2013) The sine map. 3: 1\u20139"},{"issue":"1","key":"319_CR11","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s11071-018-4573-7","volume":"95","author":"S Hanis","year":"2019","unstructured":"Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95(1):421\u2013432. https:\/\/doi.org\/10.1007\/s11071-018-4573-7","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"319_CR12","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1049\/iet-ipr.2019.0123","volume":"14","author":"D Herbadji","year":"2020","unstructured":"Herbadji D, Belmeguenai A, Derouiche N, Liu H (2020) Colour image encryption scheme based on enhanced quadratic chaotic map. IET Image Process 14(1):40\u201352. https:\/\/doi.org\/10.1049\/iet-ipr.2019.0123","journal-title":"IET Image Process"},{"issue":"2","key":"319_CR13","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/TIE.2018.2833049","volume":"66","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou B, Zhou Y (2019) Sine chaotification model for enhancing chaos and its hardware implementation. IEEE Trans Ind Electron 66(2):1273\u20131284. https:\/\/doi.org\/10.1109\/TIE.2018.2833049","journal-title":"IEEE Trans Ind Electron"},{"key":"319_CR14","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci (Ny) 480:403\u2013419. https:\/\/doi.org\/10.1016\/j.ins.2018.12.048","journal-title":"Inf Sci (Ny)"},{"key":"319_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10172116","author":"MK Khairullah","year":"2021","unstructured":"Khairullah MK, Alkahtani AA, Bin Baharuddin MZ, Al-Jubari A (2021) Designing 1d chaotic maps for fast chaotic image encryption. Electronics. https:\/\/doi.org\/10.3390\/electronics10172116","journal-title":"Electronics"},{"issue":"1","key":"319_CR16","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1007\/s11042-015-3027-1","volume":"76","author":"R Krishnamoorthi","year":"2017","unstructured":"Krishnamoorthi R, Murali P (2017) A selective image encryption based on square-wave shuffling with orthogonal polynomials transformation suitable for mobile devices. Multimed Tools Appl 76(1):1217\u20131246. https:\/\/doi.org\/10.1007\/s11042-015-3027-1","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"319_CR17","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1016\/j.ipl.2016.06.011","volume":"116","author":"L Liu","year":"2016","unstructured":"Liu L, Miao S, Cheng M, Gao X (2016) A pseudorandom bit generator based on new multi-delayed Chebyshev map. Inf Process Lett 116(11):674\u2013681. https:\/\/doi.org\/10.1016\/j.ipl.2016.06.011","journal-title":"Inf Process Lett"},{"issue":"2","key":"319_CR18","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1201\/9780203734636","volume":"20","author":"EN Lorenz","year":"2017","unstructured":"Lorenz EN (2017) Deterministic nonperiodic flow. Universality Chaos, Second Ed 20(2):367\u2013378. https:\/\/doi.org\/10.1201\/9780203734636","journal-title":"Universality Chaos, Second Ed"},{"issue":"16","key":"319_CR19","doi-asserted-by":"publisher","first-page":"24131","DOI":"10.1007\/s11356-021-17668-z","volume":"29","author":"YD Mammedov","year":"2022","unstructured":"Mammedov YD, Olugu EU, Farah GA (2022) Weather forecasting based on data-driven and physics-informed reservoir computing models. Environ Sci Pollut Res 29(16):24131\u201324144. https:\/\/doi.org\/10.1007\/s11356-021-17668-z","journal-title":"Environ Sci Pollut Res"},{"key":"319_CR20","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2020.02.008","volume":"520","author":"A Mansouri","year":"2020","unstructured":"Mansouri A, Wang X (2020) A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf Sci 520:46\u201362. https:\/\/doi.org\/10.1016\/j.ins.2020.02.008","journal-title":"Inf Sci"},{"issue":"5560","key":"319_CR21","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"RM May","year":"1976","unstructured":"May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459\u2013467. https:\/\/doi.org\/10.1038\/261459a0","journal-title":"Nature"},{"key":"319_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00778-3","author":"JS Muthu","year":"2021","unstructured":"Muthu JS, Murali P (2021a) Review of chaos detection techniques performed on chaotic maps and systems in image encryption. SN Comput Sci. https:\/\/doi.org\/10.1007\/s42979-021-00778-3","journal-title":"SN Comput Sci"},{"key":"319_CR23","doi-asserted-by":"publisher","first-page":"167300","DOI":"10.1016\/j.ijleo.2021.167300","volume":"242","author":"JS Muthu","year":"2021","unstructured":"Muthu JS, Murali P (2021b) A new chaotic map with large chaotic band for a secured image cryptosystem. Optik 242:167300. https:\/\/doi.org\/10.1016\/j.ijleo.2021.167300","journal-title":"Optik"},{"key":"319_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-021-00364-7","author":"RB Naik","year":"2022","unstructured":"Naik RB, Singh U (2022) A review on applications of chaotic maps in pseudo-random number generators and encryption. Ann Data Sci. https:\/\/doi.org\/10.1007\/s40745-021-00364-7","journal-title":"Ann Data Sci"},{"issue":"1","key":"319_CR25","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s40745-021-00364-7","volume":"11","author":"RB Naik","year":"2024","unstructured":"Naik RB, Singh U (2024) A review on applications of chaotic maps in pseudo-random number generators and encryption. Ann Data Sci 11(1):25\u201350. https:\/\/doi.org\/10.1007\/s40745-021-00364-7","journal-title":"Ann Data Sci"},{"key":"319_CR26","doi-asserted-by":"publisher","unstructured":"NazishM, Banday MT (2023) Exploring lightweight encryption for image security using one-dimensional chaotic maps. In: Proc. - 3rd Int. Conf. Smart Technol. Commun. Robot. 2023, STCR 2023, vol. 1, pp. 1\u20136, 2023, https:\/\/doi.org\/10.1109\/STCR59085.2023.10396991","DOI":"10.1109\/STCR59085.2023.10396991"},{"issue":"9","key":"319_CR27","doi-asserted-by":"publisher","first-page":"12027","DOI":"10.1007\/s11042-018-6739-1","volume":"78","author":"C Pak","year":"2019","unstructured":"Pak C, An K, Jang P, Kim J, Kim S (2019) A novel bit-level color image encryption using improved 1D chaotic map. Multimed Tools Appl 78(9):12027\u201312042. https:\/\/doi.org\/10.1007\/s11042-018-6739-1","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"319_CR28","doi-asserted-by":"publisher","first-page":"2297","DOI":"10.1073\/pnas.88.6.2297","volume":"88","author":"SM Pincus","year":"1991","unstructured":"Pincus SM (1991) Approximate entropy as a measure of system complexity. Proc Natl Acad Sci USA 88(6):2297\u20132301. https:\/\/doi.org\/10.1073\/pnas.88.6.2297","journal-title":"Proc Natl Acad Sci USA"},{"issue":"1","key":"319_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5923\/j.ajsp.20160601.01","volume":"6","author":"N Ramadan","year":"2016","unstructured":"Ramadan N, Eldin H, Ahmed H, Elkhamy SE, Abd El-Samie FE (2016) Chaos-based image encryption using an improved quadratic chaotic map. Am J Signal Process 6(1):1\u201313. https:\/\/doi.org\/10.5923\/j.ajsp.20160601.01","journal-title":"Am J Signal Process"},{"key":"319_CR30","doi-asserted-by":"crossref","unstructured":"SDL et al. Bassham III, Lawrence E., Andrew L. Rukhin, Juan Soto, James R. Nechvatal, Miles E. Smid, Elaine B. Barker, \u201cSp 800\u201322 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications,\u201d 2010. [Online]. Available: https:\/\/nvlpubs.nist.gov\/nistpubs\/legacy\/sp\/nistspecialpublication800-22r1a.pdf","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"319_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102421","author":"J Sen-Teh","year":"2020","unstructured":"Sen-Teh J, Alawida M, Sii YC (2020) Implementation and practical problems of chaos-based cryptography revisited. J Inf Secur Appl. https:\/\/doi.org\/10.1016\/j.jisa.2019.102421","journal-title":"J Inf Secur Appl"},{"issue":"October","key":"319_CR32","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.vlsi.2023.01.008","volume":"90","author":"DA Trujillo-Toledo","year":"2023","unstructured":"Trujillo-Toledo DA et al (2023) Real-time medical image encryption for H-IoT applications using improved sequences from chaotic maps. Integration 90(October):131\u2013145. https:\/\/doi.org\/10.1016\/j.vlsi.2023.01.008","journal-title":"Integration"},{"issue":"2","key":"319_CR33","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1007\/s00521-021-06448-y","volume":"34","author":"M Tubishat","year":"2022","unstructured":"Tubishat M et al (2022) Improved sine cosine algorithm with simulated annealing and singer chaotic map for Hadith classification. Neural Comput Appl 34(2):1385\u20131406. https:\/\/doi.org\/10.1007\/s00521-021-06448-y","journal-title":"Neural Comput Appl"},{"issue":"2","key":"319_CR34","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s10439-012-0668-3","volume":"41","author":"JM Yentes","year":"2013","unstructured":"Yentes JM, Hunt N, Schmid KK, Kaipust JP, McGrath D, Stergiou N (2013) The appropriate use of approximate entropy and sample entropy with short data sets. Ann Biomed Eng 41(2):349\u2013365. https:\/\/doi.org\/10.1007\/s10439-012-0668-3","journal-title":"Ann Biomed Eng"},{"key":"319_CR35","doi-asserted-by":"publisher","first-page":"181884","DOI":"10.1109\/ACCESS.2019.2956573","volume":"7","author":"F Yu","year":"2019","unstructured":"Yu F et al (2019) Design and FPGA implementation of a pseudorandom number generator based on a four-wing memristive hyperchaotic system and Bernoulli map. IEEE Access 7:181884\u2013181898. https:\/\/doi.org\/10.1109\/ACCESS.2019.2956573","journal-title":"IEEE Access"},{"issue":"1","key":"319_CR36","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1088\/0951-7715\/10\/1\/016","volume":"10","author":"P Zgliczy\u0144ski","year":"1997","unstructured":"Zgliczy\u0144ski P (1997) Computer assisted proof of chaos in the R\u00f6ssler equations and in the H\u00e9non map. Nonlinearity 10(1):243\u2013252. https:\/\/doi.org\/10.1088\/0951-7715\/10\/1\/016","journal-title":"Nonlinearity"},{"key":"319_CR37","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182. https:\/\/doi.org\/10.1016\/j.sigpro.2013.10.034","journal-title":"Signal Process"},{"issue":"4","key":"319_CR38","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s10207-022-00588-5","volume":"21","author":"U Zia","year":"2022","unstructured":"Zia U et al (2022) Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. Int J Inf Secur 21(4):917\u2013935. https:\/\/doi.org\/10.1007\/s10207-022-00588-5","journal-title":"Int J Inf Secur"},{"issue":"3","key":"319_CR39","doi-asserted-by":"publisher","first-page":"57","DOI":"10.3390\/asi5030057","volume":"5","author":"B Zolfaghari","year":"2022","unstructured":"Zolfaghari B, Koshiba T (2022) Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap. Appl Syst Innov 5(3):57. https:\/\/doi.org\/10.3390\/asi5030057","journal-title":"Appl Syst Innov"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00319-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-024-00319-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00319-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T03:03:08Z","timestamp":1744254188000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-024-00319-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,10]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["319"],"URL":"https:\/\/doi.org\/10.1186\/s42400-024-00319-4","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,10]]},"assertion":[{"value":"30 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The Authors declare that they do not have any conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"24"}}