Next Article in Journal
Auto-Encoding Generative Adversarial Networks towards Mode Collapse Reduction and Feature Representation Enhancement
Previous Article in Journal
The Spectrum of Low-pT J/ψ in Heavy-Ion Collisions in a Statistical Two-Body Fractal Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Conservative Memristive Chaotic System with Extreme Multistability and Its Application in Image Encryption

1
College of Mathematics and Big Data, Guizhou Education University, Guiyang 550018, China
2
College of Big Data and Information Engineering, Guizhou University, Guiyang 550025, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(12), 1656; https://doi.org/10.3390/e25121656
Submission received: 16 October 2023 / Revised: 21 November 2023 / Accepted: 25 November 2023 / Published: 13 December 2023
(This article belongs to the Topic Advances in Nonlinear Dynamics: Methods and Applications)

Abstract

:
In this work, a novel conservative memristive chaotic system is constructed based on a smooth memristor. In addition to generating multiple types of quasi-periodic trajectories within a small range of a single parameter, the amplitude of the system can be controlled by changing the initial values. Moreover, the proposed system exhibits nonlinear dynamic characteristics, involving extreme multistability behavior of isomorphic and isomeric attractors. Finally, the proposed system is implemented using STMicroelectronics 32 and applied to image encryption. The excellent encryption performance of the conservative chaotic system is proven by an average correlation coefficient of 0.0083 and an information entropy of 7.9993, which provides a reference for further research on conservative memristive chaotic systems in the field of image encryption.

1. Introduction

A conservative system is a special system with a conserved volume whose dissipation is zero for all state variables. Conservative systems exhibit rich dynamic properties and have periodic, chaotic, and hyperchaotic behaviors. In past studies, scholars have found excellent chaotic properties in conservative systems. For example, a new five-dimensional conservative chaotic system was constructed and hyperchaotic behavior was discovered in this system [1]. Qi et al. designed a class of conservative chaotic systems with the very largest Lyapunov exponent (LLE) values, which exhibited a high complexity [2]. Wang et al. revealed the coexistence behavior of an infinite number of periodic trajectories by constructing a new conservative chaotic system [3]. Du et al. proposed a conservative chaotic system with two offset boosting behaviors controlled by parameters and initial values [4]. These studies on chaotic characteristics show that conservative chaotic systems have good application prospects. In recent years, to explore more dynamic characteristics of chaotic systems, memristors have been widely used in chaotic systems as special nonlinear components. As a result of the influence of memristors, some special phenomena are found in memristive chaotic systems, such as extreme multistability phenomena [5,6,7,8,9,10], merger crises [10], and multitransient behaviors [8,9,10]. However, most of these memristive systems are dissipative systems, and there are few reports of complex phenomena produced by memristors combined with conservative chaotic systems, which leaves room for the study of memristive conservative chaotic systems.
The extreme multistability of chaotic systems allows for such systems to obtain many different phase trajectories under the same parameter conditions [11], which greatly increases the complexity of the systems. In recent years, some results have been achieved in the multistability of conservative chaotic systems based on memristors. A conservative chaotic system with sinusoidal memory inductors and capacitors has been reported to exhibit homogeneous multistability self-replicating topologies [12]. The hyperchaotic behavior and the coexistence of an infinite number of conservative trajectories were revealed in a new conservative memristive chaotic system [13]. Time-varying hyperchaos and multiple offset boosting were explored in a nonautonomous four-dimensional conservative memristive chaotic system [14]. The results suggest that it is feasible to study unreported properties such as amplitude control by introducing special nonlinear properties of memristors into conservative memristive chaotic systems. For the development of conservative chaotic systems, it is significant to study new conservative chaotic systems.
At present, a large number of dissipative memristive chaotic systems have been applied to image encryption and show good encryption performance. In a chaotic encryption scheme, chaotic attractors generated by dissipative systems can be reconstructed using time delay methods [15] to crack keys and encryption systems [16]. Conservative chaotic systems are more random to motion and do not form chaotic attractors, so conservative systems have the advantage of resisting key reconstruction [17]. According to the above analysis, conservative chaotic systems should show better performance in encrypted communication. However, to the authors’ knowledge, there is currently only one report of image encryption using a conservative memristor chaotic system. A conservative memristive hyperchaotic system without equilibrium points is applied to color image encryption [14]. Therefore, studying conservative chaotic systems is critical for secure communication and engineering applications.
On the basis of the above research, we further enriched the types of conservative memristive chaotic systems. The main contributions of this paper are as follows.
  • A new conservative memristive system is constructed using a quaternary memristor, which is physically realized with an STMicroelectronics (STM, Geneva, Switzerland) 32 digital circuit, which provides a reference for the practical application of the chaotic system.
  • The conservative system presents extreme isomorphic and heterogeneous multistability phenomena. The amplitude control of the initial value can be realized with the isomorphic property. The heterogeneous multistability phenomena greatly enhance the complexity of the system, which provides a guarantee for the application of secure communication.
  • The conservative memristive chaotic system is rarely applied to image encryption, and the excellent encryption performance is verified by a variety of analysis methods. This guides the application of the conservative memristive system in the field of image encryption.
The rest of this paper is organized as follows. The memristor and conservative chaotic system model are introduced in Section 2, the dynamical characteristics of which are explored in Section 3. Section 4 presents the realization of the proposed STM 32 system. Section 5 presents the application of the memristive conservative chaotic system in image encryption. Finally, Section 6 summarizes the current work.

2. System Description

2.1. Memristor Model

In this paper, a smooth memristor [18] is used, and the mathematical model is shown in Equation (1).
i = W ( φ ) v = ( γ + ε φ 2 η φ 4 ) v d φ d t = v ,
where W ( φ ) is the memductance function of the memristor; γ = 1 , E = 0.25 , and η = 0.002 are the constant parameters of the memristor; and i and v denote the output current and voltage of the memristor. The amplitude of the voltage was set to 4 V to obtain a hysteresis curve as shown in Figure 1. It can be noted that the hysteresis curve of the memristor resembles an inclined number “8”. As the frequency increases, the sidelobes of the hysteresis curve gradually decrease, which is consistent with the characteristics of an ideal memristor.

2.2. System Model

A four-dimensional conservative chaotic system was reported in [2]. The mathematical model is shown in the following system (2).
x ˙ = a y y ˙ = b ( x 2 + 1 ) w a x z ˙ = c w w ˙ = b ( x 2 + 1 ) y c z ,
where a, b, and c are constant parameters of the conservative system and x, y, z, and w are state variables. When parameter a is set to 1, the first state variable of the system (2) is the same as the internal state variable of the memristor; this means that the introduction of the memristor does not lead to an increase in the dimensions of the system equation. The (x2 + 1) term in the fourth dimension of system (2) is changed to the memristor memductance function W(x). Then, a new four-dimensional memristive conservative chaotic system is constructed. To explore richer dynamic properties, the coefficient of x still uses parameter a. The mathematical model is shown in the following system (3).
x ˙ = y y ˙ = b ( x 2 + 1 ) w a x z ˙ = c w w ˙ = b ( W ( x ) ) y c z ,
where a, b, and c are the system parameters and W(x) = 1 + 0.25 x2 − 0.002 x4 is the memductance function of the memristor. The conservatism of the system (3) is proven by a dissipation degree of · v = 0 . Letting the left side of system (3) equal zero, we find that the system has a unique equilibrium point O (0,0,0,0). To verify the stability of the equilibrium point, the Jacobian matrix is calculated as follows.
J 0 = 0 1 0 0 a 0 0 b 0 0 0 c 0 b c 0 .
The characteristic values of Equation (4) are calculated as λ 2 = ± ( a + b 2 + c 2 2 ) 2 a c 2 a + b 2 + c 2 2 . When a > 0, the four eigenvalues are imaginary numbers, which is consistent with the characteristics of conservative systems.

3. Analysis of System Dynamic Characteristics

In this section, the MATLAB2018b platform is used to numerically analyze the nonlinear dynamic characteristics of system (3). The fourth-order Runge–Kutta algorithm is used to solve the equations of system (3). The sensitivity and multistability of the system are revealed by numerical analysis. In this paper, we consider the values of the Lyapunov exponents (LEs) to be zero, which satisfies the condition of −0.01< LEi < 0.01 (i = 1, 2, 3, 4), due to the certain errors in numerical calculations.

3.1. The Effect of Parameters on the Multitopology Behavior

The parameter sensitivity of chaotic systems directly affects their application. In this section, Lyapunov exponent spectra, bifurcation diagrams, and phase diagrams are used to describe the parameter sensitivity of the system (3).

3.1.1. Multitopology Quasi-Periodic Behavior Dependent on the Parameter a

Setting the system parameters b = 1, c = 1, initial condition (IC) = (1, 0.1, 1, 0.5), and changing the parameter a, the Lyapunov exponent spectra and bifurcation diagrams were determined and are shown in Figure 2. The bifurcation diagram shows significant changes, indicating that system (3) is sensitive to parameter a. In addition, a wide range of quasi-periodic characteristics is shown in the bifurcation diagrams (see Figure 2a). As shown in Figure 2b, when parameter a is around 1.3, the LE curve has a positive value, which indicates the system is in a chaotic state. Some typical trajectories with the change in parameter a are displayed in Figure 3.

3.1.2. The Effect of Parameter c on Topology

Selecting the system parameters as a = 1, b = 1, IC = (1, 0.1, 1, 0.5) and changing the parameter c, the Lyapunov exponent spectra and bifurcation diagrams were determined and are plotted in Figure 4. As parameter c increases, the chaotic and quasi-periodic states are revealed in Figure 4a. In addition, a wide range of chaotic phenomena are exhibited, so the chaotic states of the system can be easily found for engineering. The Lyapunov exponent spectra are illustrated in Figure 4b. The regular and chaotic bifurcation in Figure 4a corresponds to the regions of LLE = 0 and LLE > 0 in Figure 4b, respectively. It is worth noting that the bifurcation diagram shows an quasi-periodic state, when parameter c is close to zero. The accuracy of the above analysis is illustrated by consistent results. The new trajectories are shown in Figure 5.
In summary, the system is sensitive to parameter changes and can produce a variety of novel quasi-periodic trajectories; such systems usually show good potential in practical applications.

3.2. Multistability Analysis

Multistability means that multiple trajectories coexist under the same parameters but with different initial values. Chaotic systems with multistability behavior are more easily applied in engineering. In this section, bifurcation diagrams and the basin of attraction are used to explore the multistability of system (3).

3.2.1. Amplitude Control Depends on the Initial Value z(0) = u

Amplitude control increases the robustness of the system, which is of great significance for engineering. The system parameters and IC were set as a = 1.25, b = 1, c = 1, and IC = (0, 0, u, 0). The bifurcation diagram with initial value z(0) = u is shown in Figure 6a. The bifurcation diagram exhibits symmetry to u = 0. In addition, when u is less than zero, the value of y decreases as the value of u increases; and when u is greater than zero, the value of y increases with the increase in u, indicating the amplitude of the phase trajectories can be controlled through the initial values. To intuitively reflect the changing process of the amplitude, the phase trajectory with different u values is plotted and displayed in Figure 6b. The phase trajectory gradually shrinks from u = −1 to −0.1. It is worth noting that the amplitude regulation of the initial value is also extreme multistability behavior.

3.2.2. Multistability Depends on z(0) and w(0)

In addition to the homomorphic extreme multistability mentioned above, there is also the coexistence behavior of heteromorphic trajectories. Set the parameters a = 1, b = 1, c = 0.81, and IC = (1, 0.1, z0, w0). Figure 7 exhibits the basin of attraction. Attraction domains of eight different colors are shown in the basin of attraction, indicating that at least eight trajectories coexist. The corresponding trajectories of different colors in the basin of attraction are plotted in Figure 8a–e, and heteromorphic trajectories can be found. It is worth noting that there are also some other coexistence trajectories besides the coexistence trajectories shown in the basin of attraction.
In summary, extreme multistability behavior is investigated in the proposed system. Furthermore, the phenomenon is also revealed that the amplitude of the phase trajectory can be controlled by the initial value.

4. Hardware Implementation Based on STM32

To verify the physical feasibility of the proposed system, in this section, STM32-based digital hardware is used to implement the system.
Analog circuits and digital circuits are two ways to achieve chaotic systems. Compared to the uncontrollable initial value of analog circuits, digital circuits have programmable characteristics, so digital circuits can realize the complex phenomena of chaotic systems. The digital circuit scheme is shown in Figure 9. A continuous chaotic system is fed into the STM32. The 32-bit main chip STM32F103C8T6 is used for data processing. The continuous signals are discretized using Euler’s algorithm as follows.
x ( n + 1 ) = x ( n ) + ( y ( n ) ) Δ T y ( n + 1 ) = y ( n ) + ( b ( x 2 ( n ) + 1 ) w ( n ) a x ( n ) ) Δ T z ( n + 1 ) = z ( n ) + ( c w ( n ) ) Δ T w ( n + 1 ) = w ( n ) + ( b y ( n ) ( 1 + 0.25 x 2 ( n ) 0.002 x 4 ( n ) ) ) Δ T ,
where the precision parameter T = 0.001 . A 16-bit dual channel digital to analog converter (model DAC8552) is then used to convert the iteratively generated digital signal. Finally, the converted analog signal is sent to the oscilloscope for display. With the parameters of a = 1, b = 1, and c = 0.81, the y-w phase trajectories with different ICs are shown in Figure 10. Ignoring the small error between theory and practice, it can be considered that the STM32 experimental results are consistent with the numerical simulations, which proves the physical feasibility of the proposed system.

5. Application in Image Encryption

Since conservative chaotic systems are highly random and ergodic, conservative systems are more suitable for applications in the field of secure communication. Therefore, it is of great significance to investigate the application of conservative chaotic systems in image encryption.

5.1. NIST Test

In encrypted communication, a complete random sequence can guarantee the security of encryption. However, it is hard to decrypt with a true random sequence, so it is often used for irreversible encryption algorithms. The unpredictability and certainty of chaotic systems make the resulting pseudo-random sequences unique. Therefore, the encryption algorithm is usually designed as a chaotic sequence. The NIST test is a quantitative indicator that describes the randomness of chaotic sequences. Usually, the p-value is the reference value for detecting sequence randomness. If p > 0.01, the test is passed. Table 1 provides 15 sets of test results. All 15 tests showed that the chaotic sequence was random and had good application prospects.

5.2. Image Encryption Scheme

In this paper, an image encryption algorithm for plain images is used. The core operations in this encryption scheme are scrambling and diffusion operations. The scrambling algorithm steps are as follows.
Step 1 The values of (m, n) are calculated by Equation (6).
m = ( U ( i , j ) + s u m ( A ( Z ( i , j ) , 1   t o   N ) mod M ) + 1 n = ( V ( i , j ) + s u m ( A ( 1   t o   M , W ( i , j ) ) mod N ) + 1 ,
where i and j are the pixel coordinate values; U, V, W, and Z are the random matrix generated by the chaotic sequence; and M and N are the sizes of the plain image A. If the condition ( m = i | | Z ( i , j ) ) | | ( n = j | | W ( i , j ) ) | | ( Z ( i , j ) = i ) | | ( W ( i , j ) = j ) is satisfied, then the pixel point A (i, j) of the plain image remains unchanged; otherwise, A (i, j) switches positions with A (m, n).
Step 2 Repeat Step 1, traversing all pixels A (i, j) of the plain image A.
The diffusion algorithm steps are as follows.
Step 1 Set i = M and j = N.
Step 2 Image B is diffused into C by Equation (7).
C ( i , j ) = B ( i , j ) + Y ( i , j ) + r 2   mod   2 l i = M ,   j = N C ( i , j ) = B ( i , j ) + C ( i , j + 1 ) + Y ( i , j )   mod   2 l i = M ,   1 j < N C ( i , j ) = B ( i , j ) + s u m ( C ( i + 1 , 1   to   N ) ) + Y ( i , j )   mod   2 l 1 i < M ,   j = N ,
where r2 is a random number key, l is the gray level of the image B, and i and j are the coordinates of the pixels. i and j are changed by the control variable method, and the change is −1. When j is reduced to 1, the next change will go to N, and i returns to M. After a complete operation, image B can be diffused into image C.
The whole process of the image encryption system is as follows.
Step 1 The four initial values of the conservative chaotic system and two random numbers r1 and r2 were chosen as the keys K for the encryption scheme, K = (x0, y0, z0, w0, r1, r2).
Step 2 Four pseudo-random sequences are generated through the proposed conservative chaotic system. Convert pseudo-random sequences into 6 M*N matrices X, Y, Z, W, U, and V (M and N are the length and width of the plain image).
Step 3 A diffusion operation is performed, where a random matrix X is used to change the pixel values of the plain image p. Let us call the image after diffusion A.
Step 4 A scrambling operation is performed; that is, four random matrices Z, W, U, and V are used to shuffle the position of pixels in image A. After the scrambling operation, the correlation between neighboring pixels is reduced. Let us call the image after scrambling B.
Step 5 Repeat Step 3 using matrix Y to obtain the final encrypted image C.
The decryption process is inverse to the encryption process. Under the condition of the same random sequence, the encrypted image can be completely restored.

5.3. Histogram Analysis

Encrypting images Goldhill, Lena, and Pepper took 0.698834 s, meaning that the encryption speed was 1.25 Mbps. Compared with the literature [19], this speed is within the acceptable range. The results of the histogram are shown in Figure 11. Figure 11a–c shows the plain images. The histograms corresponding to the plain images are shown in Figure 11d–f. Obvious pixel features and strong recognizability are displayed in the histograms of the plain images. The ciphered images are shown in Figure 11g–i. The histogram of the ciphered images can hide the image features well due to the uniform distribution of pixels, and the information of the image cannot be distinguished, as shown in Figure 11j–l. A histogram analysis shows that the encryption scheme based on the conservative memristive chaotic system has an excellent encryption effect, and ciphered images can resist attacks. To verify the regularity of the histogram, the numerical method of the Chi-square( χ 2 ) test was used [20], and the results are shown in Table 2. The test value of the plain image far exceeds the threshold value χ 0.05 2 255 = 293.2478 , while the cipher image is less than this value. This shows that the histogram of the ciphered image is approximately a uniform distribution.

5.4. Correlation Analysis

In digital images, the correlation between adjacent pixels is strong. After using an ideal encryption scheme, the correlation is greatly reduced. The superiority of the encryption scheme is verified by testing the correlation between neighboring pixels in the ciphered image.
The correlation coefficient quantitatively reflects the correlation degree of adjacent pixels in images. The numerical value of the image correlation coefficient is positively correlated with the correlation. The closer the correlation coefficient is to 1, the stronger the correlation of the image. N pairs of neighboring pixel values are selected in the image, and their gray values are recorded with (xi, yi), where i = 1,2,3…n. The correlation coefficient is calculated as follows.
r x y = cov ( x , y ) D ( x ) D ( y ) , cov ( x , y ) = 1 N i = 1 N ( x i E ( x ) ) ( y i E ( y ) ) , D ( x ) = 1 N i = 1 N ( x i E ( x ) ) 2 , E ( x ) = 1 N i = 1 N x i . ,
where x and y are gray values of ciphered images; Cov (x, y) is the covariance; and rxy is the correlation coefficient. Table 3 shows the results of correlation coefficients for different encryption schemes. The correlation coefficients of the three directions of the plain image are close to 1, which is a strong correlation. However, the correlation coefficient of the encrypted image is very low and the correlation of the image is almost negligible, which is close to the ideal encryption effect. The conservative memristive chaotic system has an excellent encryption performance and can effectively prevent information leakage.

5.5. Information Entropy

Information entropy reflects the uncertainty of image information, and it is generally believed that the greater the entropy, the greater the uncertainty and the less visible the information. The information entropy is calculated as follows:
H = i = 0 255 p ( i ) log 2 p ( i )
where p(i) is the probability of the grayscale value i. For grayscale levels of 256, an image has an ideal information entropy of 8. The closer the value of the information entropy is to 8, the less likely the image is to the information and the more random the pixels. Table 4 shows the information entropy before and after encryption of the Goldhill, Lena, and Pepper images. By comparing different encryption schemes, we can see that the proposed encryption scheme is safe against entropy attacks [26].
To obtain the information distribution of different regions in the image, the analysis method of local information entropy is used. A high local information entropy is represented by a complex and random distribution of pixels in an image block. A low local information entropy is represented by a consistent distribution of pixel values. The average local information entropy is shown in Table 5. The local information entropy after encryption is close to 0, indicating that the information distribution is consistent, which can prevent information leakage.

5.6. Key Sensitivity Analysis

In the encryption system, the sensitivity of the key determines the security of the encryption system. Three indicators, the Number of Pixels Change Rate (NPCR), Unified Average Change Intensity (UACI), and Block Average Change Intensity (BACI), were used to quantitatively measure the sensitivity of the key. Two keys with only a 10−13 level difference were used to encrypt the plain image. The sensitivity of the key is reflected by the difference between the two ciphered images. Table 6 shows the calculation results and theoretical values of the three indicators. It is found that the calculation values are very close to the theoretical values, which indicates that the encryption system key is very sensitive and has an excellent security performance.
From all the above comparative analysis, it can be concluded that the image encryption scheme proposed in this paper has a good encryption performance and can resist most external attacks.

6. Conclusions

In this paper, a novel four-dimensional conservative memristive chaotic system with an equilibrium point is formulated. A numerical analysis reveals the proposed system is extremely sensitive to parameters, and a variety of novel chaotic and quasi-periodic trajectories can be found through small adjustments to these parameters. In addition, the introduction of memristors enhances the nonlinear dynamic characteristics of the proposed system, leading to the emergence of extreme multistability phenomena. Interestingly, the amplitude of the trajectory of the conservative memristive system can be regulated by the initial values, which simplifies the control strategy and enhances the robustness and complexity. The multistability phenomenon of the conservative system is realized by the digital circuit STM32, which proves the physical feasibility of the proposed conservative chaotic system. Finally, the application of conservative memristive chaotic systems in the field of image encryption is systematically analyzed. The excellent encryption performance is verified by histograms, a correlation analysis, and information entropy and key sensitivity analyses. This paper fills the gap for conservative memristive chaotic systems in image encryption applications and provides a significant guide for the application of conservative chaotic systems in secure communication. At present, there is relatively little research on image encryption schemes for conservative memristive chaotic systems, and further research is needed. At the same time, the security performance, anti-interference ability, and encryption speed of the image encryption algorithm are worth optimizing in future work.

Author Contributions

J.L.: system analysis, circuit design, and draft writing. B.L.: system analysis, circuit design. X.Z.: supervising the whole analysis and manuscript revision. Z.Y.: reviewing. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the General Project of Guizhou Education University in 2022 (No. 2022YB005), the Natural science research project of Guizhou Provincial Department of Education, China (QianJiaoJi[2022]029, QianJiaoHeKY[2021]022), the Guizhou Education Department Youth Science and Technology Talent Growth Project (QianJiaoJi-KY-Zi[2022]263), and the Science and Technology Foundation of Guizhou Province (No. QianKeHeJiChu-ZK[2021]YiBan 309).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, Z.; Huang, L. A new 5D Hamiltonian conservative hyperchaotic system with four center type equilibrium points, wide range and coexisting hyperchaotic orbits. Nonlinear Dyn. 2022, 108, 637–652. [Google Scholar] [CrossRef]
  2. Qi, G. Modelings and mechanism analysis underlying both the 4D Euler equations and Hamiltonian conservative chaotic systems. Nonlinear Dyn. 2019, 95, 2063–2077. [Google Scholar] [CrossRef]
  3. Wang, N.; Zhang, G.; Bao, H. Infinitely many coexisting conservative flows in a 4D conservative system inspired by LC circuit. Nonlinear Dyn. 2020, 99, 3197–3216. [Google Scholar] [CrossRef]
  4. Du, C.; Liu, L.; Zhang, Z.; Yu, S. A memristive conservative chaotic circuit with two different offset boosting behaviors. AEU-Int. J. Electron. Commun. 2022, 147, 154146. [Google Scholar] [CrossRef]
  5. Bao, B.C.; Li, Q.D.; Wang, N.; Xu, Q. Multistability in Chua’s circuit with two stable node-foci. Chaos Interdiscip. J. Nonlinear Sci. 2016, 26, 043111. [Google Scholar] [CrossRef] [PubMed]
  6. Jaros, P.; Perlikowski, P.; Kapitaniak, T. Synchronization and multistability in the ring of modified Rössler oscillators. Eur. Phys. J. Spec. Top. 2015, 224, 1541–1552. [Google Scholar] [CrossRef]
  7. Njitacke, Z.T.; Fotsin, H.B.; Negou, A.N.; Tchiotsop, D. Coexistence of multiple attractors and crisis route to chaos in a novel memristive diode bidge-based Jerk circuit. Chaos Solitons Fractals 2016, 91, 180–197. [Google Scholar] [CrossRef]
  8. Sprott, J.C.; Jafari, S.; Khalaf AJ, M.; Kapitaniak, T. Megastability: Coexistence of a countable infinity of nested attractors in a periodically-forced oscillator with spatially-periodic damping. Eur. Phys. J. Spec. Top. 2017, 226, 1979–1985. [Google Scholar] [CrossRef]
  9. Li, C.; Hu, W.; Sprott, J.C.; Wang, X. Multistability in symmetric chaotic systems. Eur. Phys. J. Spec. Top. 2015, 224, 1493–1506. [Google Scholar] [CrossRef]
  10. Sriram, S.; Danao, A.A.; Fonzin, T.F.; Rajagopal, K.; Kengne, J. Coexistence of multiscroll chaotic attractors in two coupled inertial hopfield neurons: Numerical simulations and experiment. Phys. Scr. 2022, 97, 125207. [Google Scholar] [CrossRef]
  11. Li, C.; Sprott, J.C. Coexisting hidden attractors in a 4-D simplified Lorenz system. Int. J. Bifurc. Chaos 2014, 24, 1450034. [Google Scholar] [CrossRef]
  12. Yuan, F.; Jin, Y.; Li, Y. Self-reproducing chaos and bursting oscillation analysis in a meminductor-based conservative system. Chaos Interdiscip. J. Nonlinear Sci. 2020, 30, 053127. [Google Scholar] [CrossRef] [PubMed]
  13. Wang, Q.; Yan, S.; Wang, E.; Ren, Y.; Sun, X. A simple Hamiltonian conservative chaotic system with extreme multistability and offset-boosting. Nonlinear Dyn. 2023, 111, 7819–7830. [Google Scholar] [CrossRef]
  14. Pratyusha, N.; Mandal, S. Design and Implementation of a Novel Circuit-Based Memristive Non-autonomous Hyperchaotic System with Conservative and Offset Boosting for Applications to Image Encryption. Circuits Syst. Signal Process. 2023, 42, 3812–3834. [Google Scholar] [CrossRef]
  15. Pecora, L.M.; Moniz, L.; Nichols, J.; Carroll, T.L. A unified approach to attractor reconstruction. Chaos Interdiscip. J. Nonlinear Sci. 2007, 17, 013110. [Google Scholar] [CrossRef]
  16. Ji’e, M.; Yan, D.; Du, X.; Duan, S.; Wang, L. A novel conservative system with hidden flows evolved from the simplest memristive circuit. Chaos Interdiscip. J. Nonlinear Sci. 2022, 32, 033111. [Google Scholar] [CrossRef]
  17. Jafari, S.; Sprott, J.C.; Dehghan, S. Sprott, and Soroush Dehghan. Categories of conservative flows. Int. J. Bifurc. Chaos 2019, 29, 1950021. [Google Scholar] [CrossRef]
  18. Prousalis, D.A.; Volos, C.K.; Stouboulos, I.N.; Kyprianidis, I. Hyperchaotic memristive system with hidden attractors and its adaptive control scheme. Nonlinear Dyn. 2017, 90, 1681–1694. [Google Scholar] [CrossRef]
  19. Abd-El-Atty, B. Quaternion with quantum walks for designing a novel color image cryptosystem. J. Inf. Secur. Appl. 2022, 71, 103367. [Google Scholar] [CrossRef]
  20. Abd-El-Atty, B. Efficient S-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem. Complex Intell. Syst. 2023, 9, 4817–4835. [Google Scholar] [CrossRef]
  21. Hu, C.; Tian, Z.; Wang, Q.; Zhang, X.; Liang, B.; Jian, C.; Wu, X. A memristor-based VB2 chaotic system: Dynamical analysis, circuit implementation, and image encryption. Optik 2022, 269, 169878. [Google Scholar] [CrossRef]
  22. Liang, B.; Hu, C.; Tian, Z.; Wang, Q.; Jian, C. A 3D chaotic system with multi-transient behavior and its application in image encryption. Phys. A Stat. Mech. Its Appl. 2023, 616, 128624. [Google Scholar] [CrossRef]
  23. Hu, T.; Liu, Y.; Gong, L.H.; Ouyang, C.J. An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dyn. 2017, 87, 51–66. [Google Scholar] [CrossRef]
  24. Wang, L.; Jiang, S.; Ge, M.F.; Hu, C.; Hu, J. Finite-/fixed-time synchronization of memristor chaotic systems and image encryption application. IEEE Trans. Circuits Syst. I Regul. Pap. 2021, 68, 4957–4969. [Google Scholar] [CrossRef]
  25. Li, H.; Wang, L.; Lai, Q. Synchronization of a memristor chaotic system and image encryption. Int. J. Bifurc. Chaos 2021, 31, 2150251. [Google Scholar] [CrossRef]
  26. Abd El-Latif, A.A.; Abd-El-Atty, B.; Mazurczyk, W.; Fung, C.; Venegas-Andraca, S.E. Secure data encryption based on quantum walks for 5G Internet of Things scenario. IEEE Trans. Netw. Serv. Manag. 2020, 17, 118–131. [Google Scholar] [CrossRef]
  27. Chen, J.-J.; Yan, D.-W.; Duan, S.-K.; Wang, L.-D. Memristor-based hyper-chaotic circuit for image encryption. Chin. Phys. B 2020, 29, 110504. [Google Scholar] [CrossRef]
  28. Zhu, S.; Deng, X.; Zhang, W.; Zhu, C. A new one-dimensional compound chaotic system and its application in high-speed image encryption. Appl. Sci. 2021, 11, 11206. [Google Scholar] [CrossRef]
  29. Zheng, J.; Hu, H. A symmetric image encryption scheme based on hybrid analog-digital chaotic system and parameter selection mechanism. Multimed. Tools Appl. 2021, 80, 20883–20905. [Google Scholar] [CrossRef]
Figure 1. γ = 1, ε = 0.25, and η = 0.002. The i–v curve of the memristor with different frequencies (f), with an amplitude of 4 V for the sinusoidal signal input.
Figure 1. γ = 1, ε = 0.25, and η = 0.002. The i–v curve of the memristor with different frequencies (f), with an amplitude of 4 V for the sinusoidal signal input.
Entropy 25 01656 g001
Figure 2. The bifurcation diagram and Lyapunov exponent spectra of system (3): (a) the bifurcation diagram of a ϵ (1, 2); and (b) the Lyapunov exponent spectra of a ϵ (1, 2).
Figure 2. The bifurcation diagram and Lyapunov exponent spectra of system (3): (a) the bifurcation diagram of a ϵ (1, 2); and (b) the Lyapunov exponent spectra of a ϵ (1, 2).
Entropy 25 01656 g002
Figure 3. With the parameters b = 1, c = 1, and IC = (1, 0.1, 1, 0.5), the phase portraits vary with the parameter a. (a) a = 1; (b) a = 1.1; (c) a = 1.18; (d) a = 1.25; (e) a = 1.28; (f) a = 1.5; (g) a = 1.7; and (h) a = 1.93.
Figure 3. With the parameters b = 1, c = 1, and IC = (1, 0.1, 1, 0.5), the phase portraits vary with the parameter a. (a) a = 1; (b) a = 1.1; (c) a = 1.18; (d) a = 1.25; (e) a = 1.28; (f) a = 1.5; (g) a = 1.7; and (h) a = 1.93.
Entropy 25 01656 g003
Figure 4. The bifurcation diagram and Lyapunov exponent spectra of system (3): (a) the bifurcation diagram of c ϵ (0, 4); and (b) the Lyapunov exponent spectra of c ϵ (0, 4).
Figure 4. The bifurcation diagram and Lyapunov exponent spectra of system (3): (a) the bifurcation diagram of c ϵ (0, 4); and (b) the Lyapunov exponent spectra of c ϵ (0, 4).
Entropy 25 01656 g004
Figure 5. With the parameters a = 1, b = 1, and IC = (1, 0.1, 1, 0.5), the phase portraits vary with the parameter c. (a) c = 0.31; (b) c = 0.38; (c) c = 0.81; and (d) c = 3.7.
Figure 5. With the parameters a = 1, b = 1, and IC = (1, 0.1, 1, 0.5), the phase portraits vary with the parameter c. (a) c = 0.31; (b) c = 0.38; (c) c = 0.81; and (d) c = 3.7.
Entropy 25 01656 g005
Figure 6. The parameters a = 1.25, b = 1, c = 1, and IC = (0, 0, u, 0) results in the following: (a) the bifurcation diagrams with initial value z(0) = u; and (b) the trajectories at different u values.
Figure 6. The parameters a = 1.25, b = 1, c = 1, and IC = (0, 0, u, 0) results in the following: (a) the bifurcation diagrams with initial value z(0) = u; and (b) the trajectories at different u values.
Entropy 25 01656 g006
Figure 7. With a = 1, b = 1, and c = 0.81, the basin of attraction at x0 = 1.
Figure 7. With a = 1, b = 1, and c = 0.81, the basin of attraction at x0 = 1.
Entropy 25 01656 g007
Figure 8. With a = 1, b = 1, and c = 0.81. The phase diagrams at different ICs: (a) IC = (1,0.1,0.1,0.2) and (1,0.1,0.5,0.5); (b) IC = (1,0.1,0.87,0.94) and (1,0.1,1,0.5); (c) IC = (1,0.1,0.6,0.95) and (1,0.1,0.934,1); (d) IC = (1,0.1,0.2,0.8); and (e) IC = (1,0.1,1,0.67).
Figure 8. With a = 1, b = 1, and c = 0.81. The phase diagrams at different ICs: (a) IC = (1,0.1,0.1,0.2) and (1,0.1,0.5,0.5); (b) IC = (1,0.1,0.87,0.94) and (1,0.1,1,0.5); (c) IC = (1,0.1,0.6,0.95) and (1,0.1,0.934,1); (d) IC = (1,0.1,0.2,0.8); and (e) IC = (1,0.1,1,0.67).
Entropy 25 01656 g008
Figure 9. A schematic diagram of a microcontroller-based digital circuit.
Figure 9. A schematic diagram of a microcontroller-based digital circuit.
Entropy 25 01656 g009
Figure 10. The experimental result diagrams with a = 1, b = 1, c = 0.81, and IC = (1, 0.1, z0, w0). (a) z0 = 0.2 and w0 = 0.2; (b) z0 = 1 and w0 = 0.5; and (c) z0 = 0.934 and w0 = 1.
Figure 10. The experimental result diagrams with a = 1, b = 1, c = 0.81, and IC = (1, 0.1, z0, w0). (a) z0 = 0.2 and w0 = 0.2; (b) z0 = 1 and w0 = 0.5; and (c) z0 = 0.934 and w0 = 1.
Entropy 25 01656 g010
Figure 11. Encryption results of images Goldhill, Lena, and Pepper and their histograms. Plain images of (a) Goldhill, (b) Lena, and (c) Pepper; histograms of plain images of (d) Goldhill, (e) Lena, and (f) Pepper; ciphered images of (g) Goldhill, (h) Lena, and (i) Pepper; histograms of ciphered images of (j) Goldhill, (k) Lena; and (l) Pepper.
Figure 11. Encryption results of images Goldhill, Lena, and Pepper and their histograms. Plain images of (a) Goldhill, (b) Lena, and (c) Pepper; histograms of plain images of (d) Goldhill, (e) Lena, and (f) Pepper; ciphered images of (g) Goldhill, (h) Lena, and (i) Pepper; histograms of ciphered images of (j) Goldhill, (k) Lena; and (l) Pepper.
Entropy 25 01656 g011
Table 1. Results of the NIST test.
Table 1. Results of the NIST test.
Statistical Testp-ValueResult
Monobit0.5485pass
Block Frequency0.8862pass
Runs0.6310pass
Longest Runs0.6912pass
Rank0.0352pass
DFT0.7941pass
Nonoverlapping Template0.9754pass
Overlapping Template0.0623pass
Universal0.9118pass
Linear Complexity0.7493pass
Serial 0.711pass
Approximate Entropy0.0345pass
Cumulative Sums 0.945pass
Random Excursions0.454pass
Random Excursions Variant0.697pass
Table 2. χ 2 test.
Table 2. χ 2 test.
ImagesGoldhillLenaPepper
plain1.6162 × 1051.5835 × 1051.2016 × 105
ciphered256.7324186.0684243.4199
Table 3. Correlation coefficients of each image in each direction.
Table 3. Correlation coefficients of each image in each direction.
Test ImagePlain ImageCiphered Image
HorizontalVerticalDiagonalHorizontalVerticalDiagonal
Lena (proposed)0.98450.970.9632−0.00490.0095−0.0106
Lena (ref. [21])0.98500.97190.95760.02310.0138−0.0002
Lena (ref. [22])0.98540.97360.9552−0.00840.00650.0036
Lena (ref. [23])0.96730.94120.91320.0171−0.0013−0.0005
Lena (ref. [24])0.976880.98350.9534−0.00880.00480.0053
Lena (ref. [25])0.90240.92870.8856−0.00820.00940.0102
Goldhill0.9740.97390.94450.0049−0.0069−0.0158
Pepper0.98130.98040.9676−0.0143−0.060.00249
Table 4. Information entropy of test images.
Table 4. Information entropy of test images.
Test ImagePlain ImageCiphered Image
Goldhill7.44517.99936
Pepper7.59377.99928
Pepper (ref. [20])7.66987.9998
Lena (proposed)7.47787.99933
Lena (ref. [27])7.39827.9692
Lena (ref. [28])7.56837.9978
Lena (ref. [29])7.44517.9993
Table 5. Average local information entropy of test images.
Table 5. Average local information entropy of test images.
Test ImagePlain ImageCiphered Image
Goldhill4.71130.0293
Lena4.3470.0282
Pepper4.43840.0308
Table 6. Key sensitivity analysis results.
Table 6. Key sensitivity analysis results.
IndicatorGoldhillLenaPepperTheoretical Value
X0NPCR (%)99.609699.609899.608999.6094
UACI (%)33.465333.464933.465333.4635
BACI (%)26.773026.771426.773026.7712
Y0NPCR (%)99.609799.609999.609499.6094
UACI (%)33.462533.465433.460533.4635
BACI (%)26.770926.770926.770526.7712
Z0NPCR (%)99.608999.609599.608399.6094
UACI (%)33.462533.465233.463333.4635
BACI (%)26.770226.770926.770926.7712
W0NPCR (%)99.609999.608999.609999.6094
UACI (%)33.464033.462533.464033.4635
BACI (%)26.769826.769926.779826.7712
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, J.; Liang, B.; Zhang, X.; Yu, Z. A Conservative Memristive Chaotic System with Extreme Multistability and Its Application in Image Encryption. Entropy 2023, 25, 1656. https://doi.org/10.3390/e25121656

AMA Style

Li J, Liang B, Zhang X, Yu Z. A Conservative Memristive Chaotic System with Extreme Multistability and Its Application in Image Encryption. Entropy. 2023; 25(12):1656. https://doi.org/10.3390/e25121656

Chicago/Turabian Style

Li, Jian, Bo Liang, Xiefu Zhang, and Zhixin Yu. 2023. "A Conservative Memristive Chaotic System with Extreme Multistability and Its Application in Image Encryption" Entropy 25, no. 12: 1656. https://doi.org/10.3390/e25121656

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop