Next Article in Journal
Utilizing TabNet Deep Learning for Elephant Flow Detection by Analyzing Information in First Packet Headers
Previous Article in Journal
Parameterized Multipartite Entanglement and Genuine Entanglement Measures Based on q-Concurrence
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on Variable Parameter Color Image Encryption Based on Five-Dimensional Tri-Valued Memristor Chaotic System

School of Electronics and Information Engineering, Heilongjiang University of Science and Technology, Harbin 150022, China
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(7), 536; https://doi.org/10.3390/e26070536
Submission received: 25 April 2024 / Revised: 14 June 2024 / Accepted: 18 June 2024 / Published: 22 June 2024
(This article belongs to the Section Multidisciplinary Applications)

Abstract

:
To construct a chaotic system with complex characteristics and to improve the security of image data, a five-dimensional tri-valued memristor chaotic system with high complexity is innovatively constructed. Firstly, a pressure-controlled tri-valued memristor on Liu’s pseudo-four-wing chaotic system is introduced. Through analytical methods, such as Lyapunov exponential map, bifurcation map and attractor phase diagram, it is demonstrated that the new system has rich dynamical behaviors with periodic limit rings varying with the coupling parameter of the system, variable airfoil phenomenon as well as transient chaotic phenomenon of chaos-periodic depending on the system parameter and chaos-quasi-periodic depending on the memristor parameter. The system is simulated with dynamic circuits based on Simulink. Secondly, the differently structured synchronous controls of chaotic systems are realized using a nonlinear feedback control method. Finally, based on the newly constructed five-dimensional chaotic system, a variable parameter color image encryption scheme is proposed to iteratively generate varying chaotic pseudo-random sequences by varying the system parameters, which will be used for repetition-free disambiguation, additive modulo left-shift diffusion and DNA encryption for the three components of RGB of the color image after chunking. The simulation results are analyzed by histogram, information entropy, adjacent pixel correlation, etc., and the images are tested using differential attack, noise attack and geometric attack, as well as analyzing the PSNR and SSIM of the decrypted image quality. The results show that the encryption method has a certain degree of security and can be applied to medical, military and financial fields with more complex environmental requirements.

1. Introduction

With the continuous development of information technology, ensuring information security has become an important issue, and images, as the most frequently used multimedia tools, are widely used in medical, military, education, finance and other fields, often facing the risk of leakage, resulting in incalculable losses. Images are characterized by large amounts of data, redundancy and high correlation, so traditional encryption algorithms are not suitable for image encryption [1], and it is crucial to design an effective encryption algorithm to protect the relevant information of images. Chaotic systems are suitable for image encryption due to their properties such as ergodicity, initial value sensitivity and non-periodicity, which are similar to cryptography. The common chaotic systems are logistic mapping, Henon mapping, Lorenz chaotic system, etc. The research history of chaos theory can be traced back to the late 19th century at the earliest, but it is only in recent decades that it has begun to be applied to image encryption. Previous studies have shown that applying chaos to encryption algorithms can effectively improve the security of encryption algorithms.
In recent years, an in-depth study of the electrical characteristics of memristors and their application to chaotic systems has become one of the important research directions, and most of the studies on memristor chaotic systems are centered around magnetically controlled memristors and charge-controlled memristors. In 2024, Li Ping et al. proposed an image encryption algorithm combining the disruption–diffusion algorithm by constructing a five-dimensional memristor chaotic system using a magnetically controlled memristor [2]. In 2023, Liu Ni constructed a four-dimensional fractional-order chaotic system using magnetically controlled memristors, designed a diffusion algorithm encryption scheme based on heteroscedasticity and applied it to a power system, and the experiment proved that the encryption scheme has good security performance [3]. In 2023, Du Chuanhong designed a conservative system using a charge-controlled memristor to make a pseudo-random signal generator and used it for image encryption work [4]. In summary, the sequences generated by the chaotic system based on magnetically controlled memristors and charge-controlled memristors have strong pseudo-randomness and can be well applied in image encryption.
A number of scholars have begun to study other types of memristors. In 2020, Wang Xiaoyuan et al. first proposed the concept and mathematical model of a multi-valued memristor, deeply analyzed the mathematical model of a tri-valued memristor [5] and constructed a new four-dimensional tri-valued memristor chaotic system in the same year, which was proved experimentally to have a complex dynamical behavior [6]. With the continuous efforts of the team, in 2023, two four-dimensional memristor chaotic systems were constructed by introducing two-valued and tri-valued memristors into Chen’s system, respectively, and the differences between the two chaotic systems were compared from several angles, proving that the chaotic system constructed by tri-valued memristors could produce more complex dynamics [7]. In summary, a tri-valued memristor not only enriches the types of nonlinear systems compared to a two-valued and continuous memristor, but also broadens the design of chaotic systems, increases the stability and robustness of the system and produces rich and diverse dynamic behaviors. At this stage, the research on tri-valued memristor chaos is relatively small and limited to the basis of four-dimensional chaotic systems, and the constructed four-dimensional chaotic systems have the problems of simple structure and low sequence randomness, whereas the high-dimensional chaotic systems have more complex dynamical behaviors and a richer class of stochastic phenomena in comparison with the four-dimensional chaotic systems [8,9,10,11]. Therefore, it is challenging research to introduce tri-valued memristors into high-dimensional chaotic systems, and in this paper, we address the above problems by constructing high-dimensional chaotic systems using tri-valued memristors to produce richer dynamical behaviors and more stochastic sequences.
Synchronous control is the key to achieving confidential communication and has important applications in the fields of communication, secure transmission and information processing [12,13,14]. In 2019, Yu Fei et al. achieved synchronization between five-dimensional memristor hyperchaotic systems with different structures by actively controlling the synchronization and successfully applied it in the field of confidential communication [15]. In 2021, Liu Li combined a newly constructed five-dimensional memristor hyperchaotic system with a chaotic system of the same number of dimensions to achieve different structures’ synchronous control of the two systems [16]. In 2023, Dong Wu et al. designed a combinatorial synchronization scheme for differently structured hyperchaotic systems based on finite time theory using the backstepping method to improve the security of the secure communication system and verified the effectiveness of the scheme through experimental simulation [17]. In summary, the synchronous control of chaotic systems lays the foundation for the development of the communication field. Although some progress has been made in the research on the synchronous control of differently structured chaotic systems, the theoretical research on the synchronization of the high-dimensional differently structured chaotic systems containing different memristors is still insufficient. In this paper, we design a new synchronous controller to achieve the synchronous control of the newly constructed tri-valued memristor chaotic system and the magnetically controlled memristor chaotic system of the five-dimensional differently structured chaotic system synchronization control.
Chaotic systems have the properties of initial value sensitivity, boundedness, ergodicity and randomness [18], which can produce rich dynamical behaviors and have important applications in the fields of image encryption, neural networks and confidential communications. Chaotic encryption has the advantages of larger key space and faster encryption speed compared to traditional image encryption methods, which has become one of the important topics in the field of nonlinear research [19,20,21]. In 2022, Wang Simiao et al. proposed a chaotic encryption scheme combining three-dimensional logical mapping and Secure Hash Algorithm-3 to improve encryption effectiveness [22]. In 2023, Li Jian et al. proposed a semiconductor 32 image encryption method based on a smooth memristor with a conservative memristor chaotic system, which provided a reference for further research on the application of conservative memristor chaotic systems in the field of image encryption [23]. In 2023, Wang Yiming et al. designed a fast image encryption algorithm with an adaptive mechanism based on a 3D chaotic system [24]. The above research is limited to the encryption of a chaotic system with fixed parameters, the key space is insufficient, the complexity is low, it is easy to be affected by the short period and chaotic degradation and the security is poor as the same key flow is used for each image. Therefore, it is necessary to improve the current encryption method of the chaotic image to enhance its security and reliability. In this paper, we will focus on the above problems, and based on the principle of one-key-at-a-time, we will design a variable parameter encryption scheme, which can solve the above problems well.
Based on the above research, this paper further enriches the type of chaotic system based on a tri-valued memristor and proposes a more effective secrecy scheme based on this system. The remainder of this study is structured as follows. Section 2 constructs a five-dimensional tri-valued memristor system, which is verified as a chaotic system without equilibrium using a combination of theory and experiments. Section 3 explores the effects of the system parameters and the memristor parameters on the dynamical properties of the system and demonstrates that the system parameters are highly sensitive and can be better applied in image encryption. Section 4 uses the Simulink circuit implementation to simulate the chaotic system and verifies the correctness of the chaotic system. Section 5 uses a nonlinear feedback synchronization method to design a nonlinear feedback controller to synchronize a chaotic system containing two different memristors, which lays the foundation for the field of confidential communication applications. Section 6 summarizes the work of this paper and provides a future outlook.

2. Construction of a Five-Dimensional Tri-Valued Memristor Chaotic System

2.1. Voltage-Controlled Tri-Valued Memristor Model

In 2020, Wang Xiaoyuan et al. [5] proposed a voltage-controlled tri-valued memristor, which describes the adopted tri-valued memristor model φ q relation in terms of an asymmetric segmented linear function, as shown in Equation (1):
q = e 0 + a 0 φ + b 0 φ + c 0 d 0 φ c 0
where the parameters a 0 , b 0 , c 0 , d 0 and e 0 are non-zero constants and c 0 is positive (Equation (1)). Both sides of the equation are simultaneously derived for the flux φ to obtain the φ G relation for this tri-valued memristor model as a segmented functional relation, as shown in Equation (2):
dq d φ = G ( φ ) = a 0 + b 0 sgn ( φ + c 0 ) d 0 sgn ( φ c 0 )   = a 0 b 0 + d 0 , φ < c 0 a 0 + b 0 + d 0 , c 0 < φ < c 0 a 0 + b 0 d 0 , φ > c 0
where G ( φ ) is the memristor conductance of the memristor in Siemens (S), and sgn denotes the sign function. Let a 0 = 0.5 , b 0 = 0.5 , c 0 = 1 , d 0 = 0.25 and e 0 = 0.75 , and the corresponding curves φ q and φ G are shown in Figure 1a,b. From Figure 1, the memristor is modeled as a three-part line segment passing through the origin, exhibiting three stable memristor values of 0.25 S, 1.25 S and 0.75 S. Figure 1b shows more intuitively the effect of the change in magnetic flux on the tri-valued memristor value of the voltage-controlled tri-valued memristor. When φ < 1 , G ( φ ) = 0.25 S; when 1 < φ < 1 , G ( φ ) = 1.25 S; and when φ > 1 , G ( φ ) = 0.75 S. Applying an excitation voltage with a sinusoidal signal of v = v 0 sin ( 2 π f t ) to this tri-valued memristor model, taking v 0 = 4 V, f = 0.159 Hz and an initial value of φ ( 0 ) = 1.5 , the v - i characteristic curve can be obtained, as shown in Figure 1c. The v - i plane shows a tight “8” contraction hysteresis curve over the origin, which satisfies the non-volatile nature of the memristor and proves that the voltage-controlled tri-valued memristor is effective.

2.2. Construction of the System

Liu’s pseudo-quadruple chaotic system [25] to be improved is shown in Equation (3).
x = ax byz y = c y + x z z = d z + x y
In Equation (3), x , y and z are the state variables of the system; a , b , c and d are the system parameters. On this basis, a tri-valued memristor is added to the second equation to form a state feedback, a state variable w is added to the third equation, the sum of state variables x and y are used as the fourth equation and the sum of state variables w and u are used as the fifth equation, thus obtaining a new five-dimensional tri-valued memristor chaotic system with the following mathematical model:
x = ax byz y = c y + x z G ( u ) z = d z + x y w w = x + y u = w + u
In Equation (4), x , y , z , w and u are the state variables of the system; a , b , c and d are the system parameters.

2.3. Validation of the System

Simulation software MATLAB 2018a is used to verify whether the newly constructed five-dimensional memristor system is chaotic, and the system is analyzed by the 0–1 test, time-domain waveform map and attractor phase diagram, as follows:
The 0–1 test [8], which determines whether the sequences generated by the system exhibit chaotic behavior, shows an interesting feature: it provides a simple and intuitive test for the trajectory of the system in the ( p , s ) plane, regardless of whether the dynamical system is chaotic. Let the discrete time series φ ( i ) at sampling time j = 1 ,   2 ,   ,   N , with c chosen as a random constant in the interval ( 0 , 2 π ) , define the functions p ( n ) and q ( n ) as follows:
p ( n ) = j = 1 n φ ( j ) cos ( θ ( j ) ) , n = 1 ,   2 ,   ,   N
s ( n ) = j = 1 n φ ( j ) sin ( θ ( j ) ) , n = 1 ,   2 ,   ,   N
where φ ( j ) is the observable data set and parameter θ ( j ) = j c + i = 1 j φ ( i ) , j = 1 ,   2 ,   ,   N .
Based on the functions p ( n ) and q ( n ) , the mean square displacement M ( n ) is as follows:
M ( n ) = M c ( n ) ( E ( φ ) ) 2 ( 1 cos n c ) / ( 1 cos c )
Included among these,
M c ( n ) = lim N 1 N J = 1 N [ ( p ( j + n ) ( p ( j ) ) 2 ( q ( j + n ) ( q ( j ) ) 2 ]
E ( φ ) = lim N 1 N j = 1 N φ ( j )
If the trajectories of the functions p ( n ) and q ( n ) appear to be in irregular Brownian motion, the system is in a chaotic state; if the trajectories of p ( n ) and q ( n ) are bounded, the system is in a periodic state.
The asymptotic growth rate K c of the mean square displacement M ( n ) is defined to be
K c = lim N log M ( n ) / log n
The test method can determine the chaotic properties of a time series of finite length simply based on whether the asymptotic growth rate K c is closer to 0 or 1, as shown in Table 1.
According to the 0–1 test method, the dynamic system will provide a simple visual test in the plane of ( p , s ) . The trajectory within ( p , s ) provides a judgement on the state that the dynamic system is in. Let a = 3 , b = 3 , c = 8 and d = 5 , and the initial condition is ( 0.1 ,   0.1 ,   0.1 ,   0.1 ,   0.1 ) . Numerical simulation using MATLAB 2018a yields the time-domain waveform and 0–1 test plot of the system, which are shown in Figure 2, and the attractor phase diagrams of the x y , x z , y z , x w , z w and x u planes obtained by numerical simulation using MATLAB 2018a are shown in Figure 3. As can be seen from Figure 2, the 0–1 test plot is an irregular Brownian motion, and the value of K c is 1. The time-domain waveform trajectory of the system is always an irregular clutter wave.
In summary, the time-domain waveform map of the system is non-periodic and the 0–1 test map shows Brownian motion, so the newly constructed system is chaotic.

2.4. Equilibrium Stability and Dissipative Analysis

Let the right-hand side of the system (4) be zero, and the condition that the system has an equilibrium point can be obtained as x = 0 ,   y = 0 ,   z = 0 ,   w = 0 ,   u = 0 and G ( u ) = 0 . From the defined tri-valued memristor model, it can be seen that the tri-valued memristor exhibits only three stable memristor conductance values of 0.25 S, 1.25 S and 0.75 S. The absence of G ( u ) 0 indicates that the above condition for the existence of equilibrium points does not hold and, therefore, the chaotic system has no equilibrium points and the attractors produced are all hidden attractors.
In order to obtain the dissipation of the system, Equation (11) is used for calculation:
v = x . x + y . y + z . z + w . w + u . u = a c d + 1
When a = 3 , b = 3 , c = 8 and d = 5 , the initial condition is ( 0.1 ,   0.1 ,   0.1 ,   0.1 ,   0.1 ) , respectively, v = 9 is calculated, which indicates that the system is dissipative, the volume of the phase space will be contracted exponentially to e 9 t and all the trajectories of the system are compressed to 0, which is one of the most important bases for the existence of chaotic phenomena in the system.

3. Analysis of the Dynamical Behavior of the System

Chaotic properties are to some extent susceptible to the influence of system parameters, i.e., small perturbations in the system parameters are prone to cause changes in the dynamical behavior of the system, and this sensitivity can limit the application of chaotic systems in practice, so it is crucial to explore the influence of system parameters on the dynamics of chaotic systems [26]. The Lyapunov exponential and bifurcation diagrams are classical methods for analyzing the behavior of nonlinear dynamics.
The Lyapunov exponent is a numerical feature of the average exponential divergence rate of neighboring trajectories in phase space and is one of several numerical features used to identify chaotic motion. Whether a particular system is chaotic or not can be visualized by the image of the Lyapunov exponential spectrum, where only one positive Lyapunov exponent implies chaos, and two or more positive Lyapunov exponents imply hyperchaotic and the trajectory will exhibit greater complexity and unpredictability. The equation for the Lyapunov exponent [27] is as follows:
λ L i = lim t 1 T ln d y ( T ) dy 0
where λ L i is the i Lyapunov index, y ( T ) is the state vector at time T and y 0 is the initial state vector.
The bifurcation diagram of the chaotic system is a tool for visualizing stability and periodicity in the evolution of a system, usually using the system parameters as horizontal coordinates and the values of the system state, stability points or periodic orbits as vertical coordinates. In chaotic systems, small parameter changes may lead to significant changes in the behavior of the system, resulting in bifurcation. The different attractor states of the system can be observed from it, and if the bifurcation diagram appears as one or more straight lines consisting of dots, it indicates that the system is in a periodic or multiply-periodic state. If the bifurcation diagram appears with patches of dots, it indicates that the system is in a chaotic state.
Therefore, by fixing the other parameters, the data variations in Lyapunov exponent spectrum and bifurcation diagram in different ranges of the system coupling parameters a , d and memristor parameter b 0 , respectively, are observed to understand the complex dynamic properties of the system.

3.1. Dependent on the Dynamics of Parameter a

Let parameter a be a variable control parameter, when b = 3 , c = 8 and d = 5 , the initial condition is ( 0.1 ,   0.1 ,   0.1 ,   0.1 ,   0.1 ) , the fixed step time is 0.01 s and the total duration is t = 200 s. The fourth-order Runge–Kutta method and wolf algorithm are used to simulate the Lyapunov exponent spectrum and bifurcation diagrams for the evolution of the system variable z within the parameter a 0 , 5 . The size of the value obtained from different sampling points when experimenting is not the same, which also depends on the performance of the computer, in the case of ensuring that the computer can run, as many as possible to obtain the sampling points, to improve the accuracy of the value, in which the Lyapunov exponential spectrum of 500 sampling points, bifurcation diagram sampling points of 500, the obtained image is shown in Figure 4. The principle adhered to is to take the second Lyapunov exponent value close to 0 as 0, and the value with a large difference from 0 is taken by the normal value, using this way of taking the value, which will result in a certain degree of error, so the attractor phase diagrams and the time-domain waveform diagrams are re-simulated at the special point and the critical point, to re-verify the data correctness as well as the correctness of the system state in the interval and the accuracy of the data as well as the state of the system are greatly improved correctness of the data and the system state. It can be seen that the system goes through three different states, first changing from periodic to chaotic and then to quasi-periodic: when a 0 , 2.66 , the system is in a periodic state; when a 2.66 , 3.3 , the system is in a chaotic state; and when a 3.3 , 5 , the system is in a quasi-periodic state.
From Figure 4, the values of Lyapunov exponents of the system are L E 1 = 0.1957 , L E 2 = 0.002379 , L E 3 = 0.02751 , L E 4 = 0.2597 and L E 5 = 9.91 . Based on the above values of Lyapunov exponents, the following can be obtained:
i = 1 3 L E i = 0.170569 > 0
i = 1 4 L E i = 0.089131 < 0
The fractional dimension of the system is calculated using the wolf algorithm [28], as shown in Equation (15):
D L = j + 1 L E j + 1 i + 1 j L E i
where j is to ensure that i = 1 j L E i 0 and i = 1 j + 1 L E i 0 , and thus one obtains the following:
D L = 3 + 1 L E 4 1 = 1 3 L E 3 = 3 + 0.170569 0.2597 = 3.657
It shows that the Lyapunov exponential dimension D L of the system is fractional dimensional, further verifying that the system is chaotic at this point.
To investigate the periodic limit ring of the system, a number of parameter a values are selected, as shown in Table 2, and their attractor phase diagrams are shown in Figure 5, where Table 2 corresponds to the attractor phase diagrams of Figure 5. It can be seen that the system has a periodic limit ring and chaotic attractor dependent on the different parameters a .

3.2. Dependent on the Dynamics of Parameter d

Let parameter d be a variable control parameter, when a = 3 , b = 3 and c = 8 , the initial condition is ( 0.1 ,   0.1 ,   0.1 ,   0.1 ,   0.1 ) , the fixed step time is 0.01 s and the total duration is t = 200 s. The fourth-order Runge–Kutta method and wolf algorithm are used to simulate the Lyapunov exponent spectrum and bifurcation diagrams for the evolution of the system variable z within the parameter d 0 , 30 . The Lyapunov exponent spectrum is sampled at 600 points and the bifurcation diagram at 600 points, and the obtained images are shown in Figure 6.
As can be seen in Figure 6, when parameter d is used as a variable control parameter, the system varies between three states: periodic, chaotic and quasi-periodic. In system d 0 , 3.2 it is in a periodic state; in systems d 3.2 , 5.5 and d 9.2 , 30 , it is in a chaotic state; and in system d 5.5 , 9.2 , it is in a quasi-periodic state.
When d = 9 , the system undergoes a transition from a quasi-periodic state to a chaotic state, and the simulation obtains the time-domain waveform of the system as shown in Figure 7a, where the system behaves chaotically for a shorter period and enters into a periodic behavior after a certain period, which is referred to as transient chaos, which is due to the presence of non-attractive saddle points in the phase space [29]. At t 0 , 20 , the system is in a chaotic state and its attractor phase diagram is shown in Figure 7b, and at t 20 , 50 , the system is in a periodic state and its attractor phase diagram is shown in Figure 7c.
The different types of attractors that the system will produce when the parameter d is varied: when d = 1 the periodic state attractor of the system is shown in Figure 8a; when d 3.2 , 4.7 the system has two positive values of the Lyapunov exponent and the system has significant quadruple-winged hyperchaos in the phase plane, such that d = 4 , whose attractor phase diagram is shown in Figure 8b; when d 4.7 , 5.5 the system has significant two-wing hyperchaos in the phase plane, let d = 5 and its attractor phase diagram is shown in Figure 8c; when d = 8 the quasi-periodic state attractor of the system is shown in Figure 8d; when d = 10 the system is in a weakly chaotic state and its attractor phase diagram is shown in Figure 8e; and when d 9.2 , 30 , the system is in a chaotic state and its attractor still presents a quadruple-winged state, but its quadruple-winged attractor is more regular compared to d 3.2 , 4.7 . Let d = 30 and its attractor phase diagram is shown in Figure 8f. Thus, the system has a large adjustable space for the parameter d and has a variable wing phenomenon dependent on the parameter d .

3.3. Dependence on the Kinetic Properties of the Memristor Parameter b 0

Let parameter b 0 be a variable control parameter, when a = 3 , b = 3 , c = 8 and d = 5 , the initial condition is ( 0.1 ,   0.1 ,   0.1 ,   0.1 ,   0.1 ) , the fixed step time is 0.01 s and the total duration is t = 200 s. The fourth-order Runge–Kutta method and wolf algorithm are used to simulate the Lyapunov exponent spectrum and bifurcation diagrams for the evolution of the system variable z within the parameter b 0 0 , 5 . The Lyapunov exponent spectrum is sampled at 500 points and the bifurcation diagram at 500 points, and the obtained images are shown in Figure 9.
From Figure 9, it can be seen that when parameter b 0 is used as a variable control parameter, the system is in the three states of periodic, chaotic and quasi-periodic and constantly switches between the two states of periodic and chaotic, as shown in Table 3.
The different types of attractors that the system will produce when the parameter b 0 is varied are as follows: when b 0 = 1 , the attractors of the system present a chaotic state, as shown in Figure 10a, at which time the system (4) has two positive Lyapunov exponent values and the system has significant biplane hyperchaos in the phase plane; when b 0 = 4 , the phase diagram of the attractor obtained from the simulation is shown in Figure 10b and the chaotic attractor presents a four-winged state. Thus, the memristor parameter b 0 of the system likewise has a large adjustable space, and the system has a variable wing phenomenon that depends on the memristor parameter b 0 .
When parameter b 0 is in the quasi-periodic state interval, the system will have transient chaos phenomenon, which is different from the transient chaos phenomenon depending on the coupling parameter d in Figure 7, and this time, the transient chaos phenomenon is a transition from chaotic to quasi-periodic state. b 0 = 3.5 is taken randomly in the quasi-periodic b 0 2.81 , 3.94 interval, and the simulation yields the time-domain waveform as shown in Figure 11a. The system exhibits chaotic behavior on a finite time scale, transforming to a quasi-periodic state after a period of time: inside t 0 , 140 , the system is in a chaotic state and its attractor phase diagram is shown in Figure 11b; inside t 140 , 200 , the system is in a quasi-periodic state and its attractor phase diagram is shown in Figure 11c.

3.4. Complexity Analysis

The spectral entropy value of a chaotic system (SE) [30] is an important index for evaluating the complexity and stochasticity of chaotic sequences, which as an optimization algorithm of approximate entropy approximation can measure the complexity of chaotic sequences and can reflect the structural complexity of chaotic systems. In the field of communication, the system complexity is closely related to the communication security. The specific spectral entropy complexity calculation process is as follows:
Step 1: Remove the direct current (DC). For a chaotic pseudo-random sequence { x ( n ) , n = 0 , 1 , 2 , M × N 1 } of length M × N , the following equation is used to remove the DC part, so that the spectrum can reflect the signal energy information more effectively, i.e.,
x ( n ) = x ( n ) x
where x = 1 M × N n = 0 M × N 1 x ( n ) .
Step 2: Fourier transform. Perform a discrete Fourier transform on the sequence x ( n ) .
X ( k ) = n = 0 M × N 1 x ( n ) e j 2 π M × N nk = n = 0 M × N 1 x ( n ) W M × N nk
where k = 0 ,   1 ,   2 M × N 1 .
Step 3: Calculate the relative power spectrum. For the transformed X ( k ) sequence, take the first half for calculation, according to Paserval’s theorem, and calculate the power spectrum value of a certain frequency point as
p ( k ) = 1 M × N X ( k ) 2
where k = 0 ,   1 ,   2 M × N / 2 1 , and the total power of the sequence can be defined as
p tot = 1 M × N k = 0 M × N / 2 1 X ( k ) 2
Then, the relative power spectrum probability of the sequence is P k :
P k = p ( k ) p t o t = 1 M × N X ( k ) 2 1 M × N k = 0 M × N / 2 1 X ( k ) 2 = X ( k ) 2 k = 0 M × N / 2 1 X ( k ) 2
Easy to know k = 0 M × N / 2 1 P k = 1 .
Step 4: Calculate the spectral entropy. Using the relative power spectral density P k , combined with the Shannon concept, the spectral entropy se of the signal is obtained as
s e = k = 0 M × N / 2 1 P k ln P k
where P k ln P k is defined to be 0 if P k is 0. It can be proved that the magnitude of the spectral entropy converges to ln ( M × N / 2 ) . In order to facilitate the comparative analysis, the spectral entropy is normalized, and the normalized spectral entropy (SE) is obtained as
S E ( N ) = s e ln ( M × N / 2 )
It can be seen that when the sequence power spectrum distribution is more unbalanced, the simpler the sequence spectral entropy structure is, the more obvious oscillation laws are in the signal, and the smaller the value of SE measure obtained, i.e., the smaller the complexity is, otherwise the greater the complexity is. For spatial spectral entropy complexity maps, the darker the image color, the greater the complexity of the system, the better the pseudo-randomness of the resulting sequence and the better it can be applied in the field of encryption [31].
To better analyze the dynamic behavior and complexity characteristics of the chaotic system, the spectral entropy complexity SE cure of the chaotic system at a 0 , 5 , as shown in Figure 12a, and at d 0 , 30 , as shown in Figure 12b, are plotted by MATLAB 2018a. From Figure 12a,b, it can be seen that the maximum value of SE is about 0.65, which corresponds to the maximum Lyapunov exponential map, and the complexity of the system appears to have a higher value at d 0 , 3.2 . However, at this time, the system is in a cyclic state, and this phenomenon may be because the system has a high degree of sensitivity and small parameter variations can cause the system to be in a different state of the limit loop.
The system parameters a and d are divided into 51 × 51 parts, where a 0 , 5 and d 0 , 5 . The spectral entropy complexity of each point ( a , d ) in the parameter space is obtained by simulation, as shown in Figure 13. As can be seen from Figure 13, the complexity is mainly concentrated between a 2.66 , 3.3 and d 3.2 , 5 .
The complexity of the system proposed in this study is compared with the literature [32,33,34,35], and the results are shown in Table 4. Therefore, the four-dimensional chaotic system of system four has the highest complexity and has a greater advantage in practical more complex encryption environments.

4. Circuit Simulation

Based on the obtained model of the tri-valued memristor chaotic system, the circuit is built using the DSP Builder element in MATLAB/Simulink library [36], as shown in Figure 14, and the attractor phase diagram of the system is obtained using an oscilloscope, as shown in Figure 15. The chaotic attractor trajectories in the x y , x z , y z and x w planes obtained through numerical experiments are almost the same as the attractor phase diagrams obtained through Simulink, which verifies the correctness of this chaotic system.

5. Synchronized Control of Differently Structured Five-Dimensional Memristor Chaotic Systems

There are relatively few studies on the synchronization of differently structured chaotic systems based on different memristors. When high-dimensional chaotic systems containing different memristors are synchronized, it is almost impossible to predict the synchronized chaotic system at the receiver due to the different system structures at the sender and the receiver, so the synchronization of differently structured chaotic systems improves the confidentiality and security of information transmission. In this paper, we use the nonlinear feedback synchronous control method to synchronize the new fifth-order third-valued memristor chaotic system and the five-dimensional magnetically controlled memristor hyperchaotic system of the literature [37] by designing a feedback controller, which is rewritten as a five-dimensional tri-valued memristor chaotic system as the main system:
x 1 = a 1 x 1 b 1 y 1 z 1 y 1 = c 1 y 1 + x 1 z 1 G ( u 1 ) z 1 = d 1 z 1 + x 1 y 1 w 1 w 1 = x 1 + y 1 u 1 = w 1 + u 1
The five-dimensional magnetically controlled memristor chaotic system of the literature [37] is rewritten as a slave system as
x 2 = ( m + n u 2 2 ) y 2 a 2 x 2 + a 2 z 2 y 2 + b 2 w 2 + v 1 y 2 = x 2 z 2 + c 2 y 2 + d 2 x 2 + v 2 z 2 = x 2 y 2 h 2 z 2 + y 2 2 + v 3 w 2 = y 2 z 2 f 2 w 2 + v 4 u 2 = g 2 y 2 + v 5
In Equation (25), v 1 , v 2 , v 3 , v 4 and v 5 are synchronization controllers.
The total slave system is realized to be synchronized in different initial states, defining the error between the two systems as
e 1 = x 2 x 1 e 2 = y 2 y 1 e 3 = z 2 z 1 e 4 = w 2 w 1 e 5 = u 2 u 1
Bringing Equations (24) and (25) into Equation (26), the error system equation is obtained as
e 1 = m e 2 ( a 2 a 1 ) e 1 + b 2 e 4 + n u 2 2 y 2 + a 2 y 2 z 2 + b 1 y 1 z 1 + m y 1 a 2 x 1 + b 2 w 1 a 1 x 2 + v 1 e 2 = ( c 2 c 1 ) e 2 + d 2 e 1 x 2 z 2 x 1 z 1 + G ( u 1 ) + c 2 y 1 + d 2 x 1 + c 1 y 2 + v 2 e 3 = ( h 2 + d 1 ) e 3 e 4 + x 2 y 2 x 1 y 1 + y 2 2 h 2 z 1 + d 1 z 2 + w 2 + v 3 e 4 = e 1 + e 2 f 2 e 4 + y 2 z 2 f 2 w 1 x 2 y 2 + v 4 e 5 = g 2 e 2 + e 4 + e 5 + g 2 y 1 w 2 u 2 + v 5
Designed synchronous controllers are as follows:
v 1 = n u 2 2 y 2 a 2 y 2 z 2 b 1 y 1 z 1 m y 1 + a 2 x 1 b 2 w 1 + a 1 x 2 v 2 = ( c 2 c 1 + k 1 ) e 2 + x 2 z 2 + x 1 z 1 G ( u 1 ) c 2 y 1 d 2 x 1 c 1 y 2 v 3 = x 2 y 2 + x 1 y 1 y 2 2 + h 2 z 1 d 1 z 2 w 2 v 4 = f 2 e 4 y 2 z 2 + f 2 w 1 + x 2 + y 2 v 5 = ( k 2 + 1 ) e 5 g 2 y 1 + w 2 + u 2
The controller (28) is brought into the error system (27) to obtain a linear error system written as
e 1 = m e 2 ( a 2 a 1 ) e 1 + b 2 e 4 e 2 = ( c 2 c 1 + k 1 ) e 2 + d 2 e 1 e 3 = ( h 2 + d 1 ) e 3 e 4 e 4 = e 1 + e 2 f 2 e 4 e 5 = g 2 e 2 + e 4 + ( k 2 + 1 ) e 5
Construct the Lyapunov function as
V = 1 2 ( e 1 2 + e 2 2 + e 3 2 + e 4 2 + e 5 2 )
Derivation of Equation (28) and combining Equation (30) gives
V = e 1 e 1 + e 2 e 2 + e 3 e 3 + e 4 e 4 + e 5 e 5 = ( a 2 a 1 ) e 1 2 + ( c 2 c 1 + k 1 ) e 2 2 ( h 2 + d 1 ) e 3 2 f 2 e 4 2 + ( k 2 + 1 ) e 5 2
When k 1 < c 1 c 2 , k 2 < 1 , V < 0 , the error system (27) converges exponentially to the global equilibrium point and the error system tends to zero, i.e., the two differently structured systems are synchronized.
Experimental simulation of the proposed nonlinear feedback synchronous control is carried out, the initial value of the master system is ( 0.1 ,   0.1 ,   0.1 ,   0.1 ,   0.1 ) and the initial value of the slave system is ( 1 ,   1 ,   0.5 ,   1 ,   1 ) . Taking the k 1 = 3 , k 2 = 2 of the controller, the error curves are obtained as shown in Figure 16, from which it can be seen that the master and slave systems are synchronized at t = 13 . This verifies the correctness and validity of the design of the controller and proves that the newly proposed chaotic system can be applied in the field of encryption.

6. Variable Parameter Color Image Encryption Scheme

6.1. Encryption and Decryption Program

Traditional chaos-based encryption regimes generally use fixed parameters, and the analysis and deciphering of system tracks make the algorithms less secure. Therefore, a dynamic parameter encryption scheme is proposed based on the framework system of diffusion, disruption and DNA encryption algorithms by taking advantage of the parameter tunability of five-dimensional tri-valued memristor chaotic systems. The process is described below:
Step 1: Determining the key. The three color components of the plaintext color image P are transformed into one-dimensional vectors R , G and B . The pixel averages of their components are found separately and combined as the key and as the initial value of the chaotic system, as shown in Equations (32) and (33) below.
a v R = x = 1 M y = 1 N R ( x , y ) M × N a v G = x = 1 M y = 1 N G ( x , y ) M × N a v B = x = 1 M y = 1 N B ( x , y ) M × N
x 0 = a v R y 0 = a v G z 0 = a v B w 0 = ( a v R + a v G ) / 2 u 0 = ( a v G + a v B ) / 2
Step 2: Chunking. M × N chunking operation is performed on the color image P of size M × N , which is uniformly divided into images of size M / 4 × N / 4 . The chunked images are transformed into one-dimensional vectors, denoted as P 1 , P 2 , P 3 and P 4 , respectively.
Step 3: Diagonal block encryption methods P 1 and P 4 .
1.
Generate a chaotic pseudo-random sequence S i of length M × N using chaotic system, discard the first 1500 points of the transition state and perform additive modulo left-shift diffusion operation on a component of the image P i obtained from the chunking. Convert the component into a gray-scale image with eight bits for each pixel point. The lower three bits of any data range from zero to seven as the effective range of cyclic shifting of a pixel point’s data, then the plaintext after the cyclic left shift of the data and the chaotic sequence are added and each byte is summed and modeled to obtain the encrypted sequence C i . The computation is shown in Equation (34).
C i = ( C i 1 + S i + P i ) mod 256 < < < L S B 3 ( C i 1 )
where C i is a ciphertext sequence, S i is a chaotic sequence, P i is a plaintext vector and < < < L S B 3 is a cyclic left shift to the lowest three bits of the data.
2.
From the dynamical behavior of the new system, it can be seen that the complexity of the system is higher when parameter d = 9.648 . Take this time to generate a pseudo-random sequence M / 4 × N / 4 of length S 12 . Perform a modulo left-shift diffusion operation on the P 1 component of image G obtained from the chunking to obtain the encrypted sequence C 1 G .
3.
When parameter a = 2.764 , the complexity of the system is the highest. Take this time to produce a pseudo-random sequence M / 4 × N / 4 of length S 13 . The repeated pseudo-random numbers in S 13 are eliminated and only the first occurrence of the value is retained, and then the elements in the set { 1 , 2 , , M N / 16 } that do not appear in S 13 are ranked from smallest to largest. Then, P 1 ( S i ) is swapped with P 1 ( S M N 16 i + 1 ) to change the position and component B of image P 1 obtained from the chunking is dislocated without repetition to obtain the encrypted sequence C 1 B .
Similarly, the R , G and B of the chunked P 4 are encrypted in the same way as P 1 .
Step 4: Diagonal block encryption methods P 2 and P 3 .
1.
Keeping the system parameters unchanged and making the system parameters d = 9.648 , the components R and G of P 2 are encrypted without repetitive disruption, respectively, in the same way as in Step 3 of 3.
2.
Let parameter a = 2.764 , generate a pseudo-random sequence S 23 and perform a modulo left-shift diffusion operation on the component B of P 2 , encrypted in the same way as in Step 3 of 1.
Similarly, the R , G and B of the chunked P 3 are encrypted in the same way as P 2 .
Step 5: Combining the images. The sub-blocks that have been diffused and encrypted are recombined to obtain image E .
Step 6: DNA encryption.
1.
Separate the components R , G and B of image E .
2.
Keeping the parameters unchanged, sequences { x } , { y } , { z } , { w } and { u } of length M × N are generated and sequence { u } is transformed into a two-dimensional matrix Q , which is used for DNA operations with component R of image E .
Q = r e s h a p e ( U , M , N )
3.
Sequence { x } determines the encoding mode of the DNA of each component R of image E , and sequence { y } determines the DNA encoding mode of matrix Q . There are a total of eight modes of DNA encoding and decoding, which need to be transformed into { x } and { y } . After the transformation, the value of each sequence is a random integer from one to eight, and the transformation equation is shown in Equation (36):
X = mod ( f l o o r ( X × 10 4 ) , 8 ) + 1 Y = mod ( f l o o r ( Y × 10 4 ) , 8 ) + 1
4.
The decoding of DNA is determined by sequence { w } . DNA decoding is the inverse process of DNA coding, and there are eight ways of decoding, i.e., decoding A , G , C and T into specific binary values.
W = mod ( f l o o r ( W × 10 4 ) , 8 ) + 1
5.
There are three algorithms for defining DNA, and the DNA algorithm is determined by the system-generated sequence { z } . If Z i = 0 , additive, if Z i = 1 , subtractive and if Z i = 2 , different-or. Sequence { z } is transformed according to Equation (38) into integers ranging from zero to three.
Z = mod ( f l o o r ( Z × 10 4 ) , 3 )
Similarly, make d = 9.648 and repeat Step 6 for DNA encryption of component G ; make a = 2.764 and repeat Step 6 for DNA encryption of component B .
Step 7: Combining the three 2D matrices encrypted by DNA into a 3D matrix to obtain the encrypted image.
The encryption flowchart is shown in Figure 17.
The encryption algorithms used are all reversible, so the decryption process is the inverse of the encryption process. The encrypted image is subjected to DNA encoding, DNA inverse operation, DNA decoding, inverse scrambling and inverse diffusion in order to obtain the decrypted image. The decrypted image can be obtained. The specific decryption steps are as follows:
Step 1: Determining the key. Same as the first step of the encryption process.
Step 2: DNA decoding. The reverse process of DNA coding is known as DNA decoding.
1.
Separate the components R , G and B of ciphertext image E .
2.
Keeping the parameters unchanged, sequences { x } , { y } , { z } , { w } and { u } of length M × N are generated, and sequence { u } is transformed into a two-dimensional matrix Q , which is used for DNA operations with component R of image E .
Q = r e s h a p e ( U , M , N )
3.
Sequence { x } determines the decoding method of DNA for each component R of image E , and sequence { y } determines the decoding method of DNA for matrix Q . There are eight ways to encode and decode DNA, which need to transform { x } and { y } . The value of each sequence after transformation is a random integer from one to eight, and transformation Equation (40) is as follows:
X = mod ( f l o o r ( X × 10 4 ) , 8 ) + 1 Y = mod ( f l o o r ( Y × 10 4 ) , 8 ) + 1
4.
Sequence { w } determines how the DNA is encoded, and there are eight ways to decode it, i.e., A , G , C and T are encoded into specific binary values.
W = mod ( f l o o r ( W × 10 4 ) , 8 ) + 1
5.
There are three algorithms for defining DNA, and the DNA algorithm is determined by the system-generated sequence { z } . If Z i = 0 , subtraction is used; if Z i = 1 , addition is used; and if Z i = 2 , inverse heteroscedasticity is used. Sequence { z } is transformed into an integer in the range zero to three by the transformation of Equation (42).
Z = mod ( f l o o r ( Z × 10 4 ) , 3 )
Similarly, let d = 9.648 , repeat Step 6 for DNA decryption of component G ; let a = 2.764 , repeat Step 6 for DNA decryption of component B .
Step 3: Combining the 2D vectors of the three-component RGB after performing DNA decryption to obtain color cipher image C .
Step 4: Chunking. The chunking operation is performed on the color ciphertext image C of size M × N , which is uniformly divided into images of size M / 4 × N / 4 . The chunked image is converted into one-dimensional vectors, denoted as C 1 , C 2 , C 3 and C 4 , respectively.
Step 5: Diagonal block decryption method C 1 and C 4 .
1.
Using the chaotic system to generate a chaotic pseudo-random sequence S i of length M / 4 × N / 4 , discard the first 1500 points of the transition state, carry out the reverse additive modulo left-shift diffusion operation on a certain component of the ciphertext image C obtained from the chunking and transform the component into a gray-scale image with eight bits for each pixel point. The low three bits of any piece of data are taken as the value range of 0~7 as the effective range of cyclic shifting of a pixel point’s data, and then after the cyclic right shift the plaintext data and the chaotic sequence for the addition operation, each byte is added and modulo to obtain the decrypted sequence P i . Equation (43) is as follows:
P i = ( 2 × 256 + C i C i 1 S i ) mod 256 > > > L S B 3 ( C i 1 )
where C i is a ciphertext sequence, S i is a chaotic sequence, P i is a plaintext vector and > > > L S B 3 is a cyclic right shift of the lowest three bits of the data.
2.
From the dynamical behavior of the new system, it can be seen that the complexity of the system is higher when parameter d = 9.648 . Taking this time, a pseudo-random sequence S 12 of length M / 4 × N / 4 is generated and an inverse modulo left-shift diffusion operation is performed on the component P 1 of image G obtained from the chunking to obtain decrypted sequence C 1 G .
3.
When parameter a = 2.764 , the complexity of the system is the highest. Take this time to produce a pseudo-random sequence S 13 of length M / 4 × N / 4 . The repeated pseudo-random numbers in S 13 are eliminated and only the first occurrence of the value is retained, and then the elements in the set { 1 ,   2 ,   ,   M N 16 } that do not appear in S 13 are ranked from smallest to largest. Then, C 1 ( S M N 16 i + 1 ) and C 1 ( S i ) are swapped for the position of components B of image C 1 obtained from the chunking to perform a repetition-free disarray and to obtain the decrypted sequence C 1 B .
Similarly, the R , G and B of the chunked C 4 are decrypted in the same way as image C 1 .
Step 6: Decrypting the diagonal blocks way C 2 and C 3 .
1.
Keeping the system parameters unchanged and letting system parameters d = 9.648 , the inverse non-repetitive disambiguation operation is performed on component G and component R of C 2 , respectively, decrypted in the same way as in the third step (3).
Let parameter a = 2.764 , generate a pseudo-random sequence S 23 and perform a reverse modulo left-shift diffusion operation on component B of C 2 . The decryption in the same way as in Step 5 of 3.
Step 7: Combining the images. The sub-blocks that have been diffused and decrypted are recombined to obtain original image P .
Using the above proposed variable parameter encryption and decryption scheme, the encryption and decryption operations are carried out on RGB color Lena, Baboon and Peppers images of size 512 × 512 pixels using MATLAB 2018a, and the encryption results are shown in Figure 18. It is difficult to see the information of the original image from the encrypted images, and the decrypted images do not differ much from the original images, which proves that the encryption and decryption algorithm is feasible.

6.2. Performance Analysis

6.2.1. Histogram Tests

The distribution of the number of pixel points can be seen from the histograms. The histograms of the RGB components of the color Lena image, Baboon image and Peppers image are shown in Figure 19. The histogram of the plaintext image falls and falls, while the encrypted images have a uniform distribution, based on which the encryption algorithm effectively hides the statistical features of the original image, and it is difficult for the attacker to predict the original image using statistical analysis.

6.2.2. Pixel Distributions

The correlation coefficient is a quantitative expression of the image pixel correlation, and to prevent statistical attacks, the correlation needs to be reduced to hide the statistical information of the plaintext. The distributions of neighboring pixels in the horizontal, vertical and diagonal directions for the Lena, Baboon and Peppers plaintext images and the encrypted images are shown in Figure 20. Taking Lena image as an example, the correlation coefficients of this paper’s algorithm are compared with those of the algorithms in the literature [38,39,40], and the results are shown in Table 5. The correlation of neighboring pixel points of plaintext images is stronger and the pixel points are concentrated in the nearby distribution, while the correlation of encrypted images encrypted by the encryption algorithm is close to zero and the distribution of pixel points is more randomized and close to a uniform distribution, which is more conducive to hide the plaintext information.

6.2.3. Information Entropy

The information entropy reflects the uncertainty of the image information, the greater the entropy (close to eight), the greater the uncertainty and the less the visible information, calculated as
H = i = 0 L 1 p ( x i ) log 2 p ( x i )
where x i , i = 0 ,   1 ,   2 L 1 denote the gray value of the image, and p ( x i ) denote the probability of occurrence of the gray values.
The distribution of gray values of the three channels RGB of the color image is counted using the above equation, and the percentage of gray values of the component RGB, i.e., the probability of each gray value, is calculated. The final information entropy of the color image is calculated by calculating the average of the three channels as the information entropy of the color image and will be compared with the literature [41,42,43], as shown in Table 6. In this paper, the information entropy is closer to eight, so the algorithm can be more resistant to entropy attacks.

6.2.4. Differential Attack

Differential attack is a powerful crypt analysis method that focuses on inferring the key by using the difference information between plaintext and ciphertext pairs. The number of pixels change rate (NPCR) and Unified Average Changing Intensity (UACI) are usually used to evaluate whether an algorithm can resist differential attacks. In general, the closer the NPCR is to 99.6094% and the UACI is to 33.4635% [44], the better the performance of the encryption algorithm.
A pixel is randomly selected from the original image, and one of the pixel values is modified according to Equation (45) to acquire image P . The original image and modified image P are encrypted using the algorithm proposed in this paper to obtain cipher images P 1 and P 2 . The difference between P 1 and P 2 is quantified by NPCR and UACI, and the NPCR and UACI values are computed as shown in Equations (46)–(48).
v a l u e = mod ( v a l u e + 1 , 256 )
N P C R ( P 1 , P 2 ) = 1 M N i = 1 M j = 1 N D ( i , j ) × 100 %
U A C I ( P 1 , P 2 ) = 1 M N i = 1 M j = 1 N P 1 ( i , j ) P 2 ( i , j ) 255 × 100 %
D ( i , j ) = 0 , P 1 ( i , j ) = P 2 ( i , j ) 1 , P 1 ( i , j ) P 2 ( i , j )
where P 1 is the original cipher image, P 2 is the cipher image with one pixel point changed, P 1 ( i , j ) is any position of the P 1 image, P 2 ( i , j ) is any position of the P 2 image, M and N are the image size, when P 1 ( i , j ) is equal to P 2 ( i , j ) , the value of D ( i , j ) is 0 and when P 1 ( i , j ) is not equal to P 2 ( i , j ) , the value of D ( i , j ) is 1.
The values of NPCR and UACI of Lena image are calculated using the above equation and compared with the literature [45,46] methods. The specific results are shown in Table 7, and the encryption algorithm in this paper is closer to the ideal values compared to the other literature. The difference in NPCR is 0.0009, while the difference in the literature [45] is 0.001, the difference in the literature [46] is 0.0013 and the difference between this paper and the ideal value of NPCR is the smallest; the difference in UACI is 0.0057, while the difference in the literature [45] is 0.0122, the difference in the literature [46] is 0.0157 and the difference between this paper and the ideal value of UACI is the smallest. It is proved that the encryption scheme has good sensitivity and high resistance to differential attacks. The algorithm proposed in this paper is parametrically dynamic compared to the literature [45,46], and the proposed DNA encryption scheme is parametrically dynamic, which greatly improves the ability to be deciphered.
In this paper, we propose a dynamic variable parameter encryption scheme based on more complex new five-dimensional tri-valued memristor chaotic systems, combining repeat-free disruption and additive mode left-shift diffusion methods, as well as DNA encryption methods. A differential attack is one of the more difficult attacks to resist among all the attacks, and the algorithm proposed in this paper can resist differential attacks better as compared to other encryption methods. This result is mainly because the parameters chosen for the encryption scheme in this paper are dynamically changing, and the attacker cannot simply perform a differential attack by analyzing a fixed parameter, which greatly increases the difficulty of deciphering and thus improves the security of the crypto system. This is the biggest advantage and difference in the dynamic variable parameter encryption scheme proposed in this paper over other advanced encryption methods.

6.2.5. Noise Attack

Strong encryption algorithms are tolerant to noise attacks to protect the image. To test the noise immunity of the encryption scheme, the encryption performance is tested in this paper by adding salt-and-pepper noise (SPN) and Gaussian noise (GN). The peak signal-to-noise ratio (PSNR) is used to measure the ability to resist noise attacks; in general, the larger the PSNR, the stronger the noise resistance of the encryption algorithm.
Salt-and-pepper noise is a common type of noise caused by variations in the intensity of signal pulses. When salt-and-pepper noise with densities of 0.01%, 0.1% and 1% is added to the Lena image, Baboon image and Peppers image for testing, the decrypted images obtained are shown in Figure 21. The PSNR values of the decrypted images containing densities of 0.01%, 0.1% and 1% salt-and-pepper noise obtained by numerical computation using MATLAB 2018a are shown in Table 8. When affected by salt-and-pepper noise with a density of 0.01%, the PSNR value of the decrypted images is greater than 31 dB, indicating that the quality of the decrypted images is better, even if there are distortions that cannot be detected by the naked eye. The PSNR value of the decrypted images is greater than 25 dB when affected by salt-and-pepper noise with a density of 0.1%, indicating that the decrypted images are of average quality with distortion. When subjected to salt-and-pepper noise with a density of 1%, the PSNR value of the decrypted images is greater than 16 dB and the presence of variability from the original images are already evident. Thus, it is proved that the algorithm can resist a certain degree of noise attack with high robustness.
Gaussian noise is a class of noise whose probability of occurrence obeys a Gaussian distribution and noise with a random depth of noise occurs at each pixel point of an image affected by Gaussian noise. Keeping the mean value as 0, when Gaussian noises with variance 1 × 10 10 , variance 1 × 10 6 and variance 2 × 10 6 are added to Lena image, Baboon image and Peppers image for testing, the decrypted images obtained are shown in Figure 22. The PSNR values of the decrypted images obtained for Gaussian noise with different variances and means are shown in Table 9. When the effect of Gaussian noise with variance 1 × 10 10 is added, the PSNR values of the decrypted images are greater than 33 dB, the quality of the decrypted images are better and the distortion is not detectable by the naked eye. When the effect of Gaussian noise with variance 1 × 10 6 is added, the PSNR values of the decrypted images are greater than 10 dB, indicating that the decrypted images are already distorted. When the effect of Gaussian noise with variance 2 × 10 6 is added, the PSNR values of the decrypted images are greater than 6.9 dB, which can largely reveal the outline of the images and the general information of the subject, but the encryption algorithm is not as good at resisting Gaussian noise as it is at resisting salt-and-pepper noise.
In summary, the increase in the intensity of salt-and-pepper noise and Gaussian noise gradually affects the quality of the decrypted image, but the main features of the image are still recognizable. This indicates that the proposed dynamic encryption scheme can resist the attack of salt-and-pepper noise and Gaussian noise to a certain extent with high robustness.

6.2.6. Geometric Attack

The Lena image is used as an experimental object to verify the resistance of this encryption algorithm to geometric attacks. The most common attack means of geometric attacks is the cropping attack, so the cropping attack is used as an example to decrypt the cipher image that has been missing information blocks with the same and correct key as the encryption process. The encrypted images are cropped uniformly, and the cropping sizes are 0.0976%, 0.391%, 1.56% and 6.25% of the original images, respectively. The resulting cropped encrypted images as well as decrypted images are shown in Figure 23. The main information of the decrypted images can still be recognized, and the recovery of the decrypted images becomes weaker as the clipped area increases. Therefore, the algorithm is resistant to cropping.

6.2.7. Image Quality Analysis

To test and measure the quality of encrypted and decrypted images, PSNR and Structural Similarity (SSIM) are quantitatively analyzed, in which the higher the value of PSNR, the better the quality of the reconstructed image and the higher the degree of restoration of the image information. The closer the value of SSIM is to one means the more similar the two images are. Lena image, Baboon image and Pepper image are selected and analyzed to calculate the PSNR value and SSIM value of the encrypted and decrypted images, as shown in Table 10. The PSNR values of all three groups of encrypted images are less than 4.1 dB and the SSIM values are less than 0.0094, which indicate that the encrypted images are so different from the original images that the useful information of the original image can not be directly observed and the encryption effect is better. The PSNR values of the three groups of decrypted images are all greater than 33 dB and the SSIM values are greater than 0.9993, indicating that the decrypted images are very similar to the original images, visually close to the plaintext images and the quality of the decrypted images are more satisfactory.

6.2.8. Key Space

This algorithm takes the pixel average of the plaintext image as the initial value of the new chaotic system and also as the key for encryption, and the accuracy of the initial value can reach 10 15 . Therefore, the size of the key space is 10 75 . The value is much larger than 2 128 . It can be regarded that the key space is a secure key space, which is able to resist the exhaustive attack. When any one of the fifteen-bit error keys are changed for decryption, the decrypted image obtained is shown in Figure 24, which shows that the key based on the dynamic parameter encryption scheme has a certain degree of sensitivity.

6.3. Analysis of Application Scenarios

For the current more complex encryption environment, the encryption performance, key management and encryption quality and other requirements are higher, such as military, medical, financial and other fields, which often need to use very strong encryption algorithms. The dynamic encryption algorithm can resist statistical attacks, differential attacks, noise attacks and shear attacks, the ciphertext information of the neighboring pixel points are more uniformly distributed, from which the original plaintext information can not be observed. The image quality is higher and the key space is larger, which can well ensure the confidentiality, integrity and availability of information. Therefore, it can be applied to military, medical, financial and other fields.
Encryption of medical data in healthcare organizations to protect patient privacy and data confidentiality from unauthorized access and leakage, where medical images, medical records, prescriptions, etc., can be stored or transmitted, can be encrypted using this encryption technology. In military institutions where the security of sensitive data such as operational plans, intelligence information, map data, etc., needs to be protected, the encryption scheme can be used by military command, control and intelligence departments to protect the confidentiality of sensitive information against eavesdropping and theft by hostile forces. The encryption technology can help financial institutions protect the confidentiality of large amounts of sensitive customer information and financial data, including personal identification information, account balances, transaction records, etc., against data leakage and illegal access.

7. Summary and Outlook

In this paper, a new five-dimensional memristor chaotic system with rich dynamical behavior is firstly constructed by using a tri-valued memristor. Compared with the previous chaotic systems, the new system improves the complexity and exhibits strong sensitivity to parameter variations, with the existence of not only the periodic limit ring and chaotic attractor depending on the system coupling parameter, but also the variable wing phenomenon depending on the system parameter and the memristor parameter. In addition to this, the system has two different types of transient chaotic phenomena, chaos-periodic and chaos-quasi-periodic depending on the coupling parameter of the system and the memristor parameter. Secondly, the circuits of the new five-dimensional memristor chaotic system are constructed by using the simulation devices in the Simulink platform, which are consistent with the numerical simulation results and verify the correctness of the new system. Finally, a variable parameter color image encryption method is proposed based on this chaotic system, which associates the values of the three component pixel points of the color image with the key according to the principle of one image, one key, to enhance the sensitivity and security of the plaintext and the key. The sequence generated by the parametric dynamic characteristics of the new system is used to encrypt the three color components of the RGB of the color image after chunking by combining additive mode left-shift diffusion and no-repeat disambiguation. DNA encoding and operations are performed on the 2D matrix of the combined color image, and the three channels are finally combined to obtain the encrypted image. In addition, the security analysis of the encrypted image shows that the algorithm can effectively counter the statistical analysis attack, differential attack, noise attack and cropping attack, the information entropy of the encrypted image is close to eight, the correlation coefficient is close to zero, the PSNR values of the decrypted image quality are all greater than 33 dB and the SSIM values are all greater than 0.9990, which verify the security and effectiveness of the algorithm. However, the algorithm is weak against filtering attacks and image compression attacks, and the algorithm will be optimized for these two parts subsequently. In the future, hardware implementations based on this encryption scheme could be considered for implementation in areas such as medical imaging, military encryption and financial data protection.

Author Contributions

L.D. gave some theoretical guidance. P.W. conceived and wrote the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by scientific project under Grant NO. HKD202212, the name of the project is the Introduction of High Level Talents Research Initiation Fund Project of Heilongjiang University of Science and Technology. This work is also supported by scientific project under Grant NO. 2023-KYYWF-0537, the name of the project is the High Level Cultivation Project for Basic Research Business Expenses of Provincial Undergraduate Universities in Heilongjiang Province 2023.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

The author would like to thank the anonymous reviewers and editors for their comments that improved the quality of this paper.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Yang, Y.; Wang, J. Quantum logistic map image encryption algorithm based on SHA-256 and Arnold map. J. Anhui Univ. Nat. Sci. Ed. 2024, 48, 35–42. [Google Scholar]
  2. Li, P.; Xia, L.; Fan, Y.; Qian, J. Five-dimensional magnetically controlled memristor chaotic system and its applicationto image encryption. Complex Syst. Complex. Sci. 2024, 1–8. Available online: http://kns.cnki.net/kcms/detail/37.1402.N.20240116.1629.004.html (accessed on 24 April 2024).
  3. Liu, N. Dynamic Behavior Analysis of Fractional Memristive Chaotic Circuits and Its Application in Power System Image Encryption. Master’s Thesis, Xi’an University of Technology, Xi’an, China, 2024. [Google Scholar] [CrossRef]
  4. Du, Z. Analysis of the Dynamic Behavior of Amnesia Coupled Systems and Its Applications. Master’s Thesis, Guizhou Universitym, Guiyang, China, 2023. [Google Scholar] [CrossRef]
  5. Wang, X.; Zhou, P.; Jin, C.; Wang, G.; Lu, H. Mathematic modeling and circuit implementation on multi valued memristor. IEEE Int. Symp. Circuits Syst. (ISCAS) 2020, 1–5. [Google Scholar] [CrossRef]
  6. Wang, X.; Zhang, X.; Gao, M. A novel voltage-controlled tri-valued memristor and its application in chaotic system. Complexity 2020, 1–8. [Google Scholar] [CrossRef]
  7. Wang, X.; Tian, Y.; Cheng, Z. Characteristic Analysis of Chaotic System Based on Binary-valued and Tri-valued MemristorModels. J. Electron. Inf. Technol. 2023, 45, 4556–4565. [Google Scholar]
  8. Yan, M.; Zhu, J. Coexistence of attractors in four-dimensional chaotic system with a wide range of parameters. J. Shenzhen Univ. Sci. Eng. 2024, 41, 108–117. [Google Scholar] [CrossRef]
  9. Zang, H.; Liu, J.; Li, J. Construction of a Class of High-Dimensional Discrete Chaotic Systems. Mathematics 2021, 9, 365. [Google Scholar] [CrossRef]
  10. Wormell, C. Non-hyperbolicity at large scales of a high-dimensional chaotic system. Proc. R. Soc. A 2022, 478, 20210808. [Google Scholar] [CrossRef]
  11. Guo, D.; Bai, C. Synchronization for a Hyper-chaotic Lǔ System and lts Application. Comput. Meas. Control 2022, 30, 103–110. [Google Scholar] [CrossRef]
  12. Birs, I.; Muresan, C.; Nascu, I.; Ionescu, C. A survey of recent advances in fractional order control for time delay systems. IEEE Access 2019, 7, 30951–30965. [Google Scholar] [CrossRef]
  13. Fu, Q.; Xu, X.; Chu, W. LQR Chaos Synchronization for a Novel Memristor-Based Hyperchaotic Oscillator. Mathematics 2022, 11, 11. [Google Scholar] [CrossRef]
  14. Mao, B.; Wang, D. Self-Adaptive Sliding Mode Synchronization of Uncertain Fractional-Order High-DimensionChaotic Systems. Acta Electron. Sin. 2021, 49, 775–780. [Google Scholar]
  15. Yu, F.; Liu, L.; He, B.; Huang, Y.; Chang, Q.; Cai, S.; Song, Y.; Du, S.; Wan, Q. Analysis and FPGA Realization of a Novel 5D Hyperchaotic Four-Wing Memristive System, Active Control Synchronization, and Secure Communication Application. Complexity 2019, 2019, 4047957. [Google Scholar] [CrossRef]
  16. Liu, L. Design and FPGA Implementation of Five-Dimensional Hyperchaotic System Based on Emristor. Master’s Thesis, Changsha University of Technology, Changsha, China, 2021. [Google Scholar] [CrossRef]
  17. Dong, W.; Wang, C.; Zhang, H.; Ma, P. Finite-time Combination-Combination Synchronization of Hyperchaotic Systems with Different Structures and lts Application. J. Syst. Simul. 2023, 35, 1590–1601. [Google Scholar] [CrossRef]
  18. Du, P.; Cui, Q.; Wang, S.; Dong, Y.; Li, H. Privacy lmage Encryption Algorithm Based on Novel Spatiotemporal Chaotic System. Comput. Eng. 2024, 50, 140–153. [Google Scholar] [CrossRef]
  19. Yang, F.; Mou, J.; Sun, K.; Cao, Y.; Jin, J. Color Image Compression-Encryption Algorithm Based on Fractional-Order Memristor Chaotic Circuit. IEEE Access 2019, 7, 58751–58763. [Google Scholar] [CrossRef]
  20. Lai, Q.; Wang, Z.; Kamdem, P. Dynamical analysis, FPGA implementation and synchronization for secure communication of new chaotic system with hidden and coexisting attractors. Mod. Phys. Lett. B 2022, 36, 2150538. [Google Scholar] [CrossRef]
  21. Yan, M.; Zhang, P. Coexistence analysis and image encryption of chaos-like attractors in conservative systems. J. Lanzhou Univ. Technol. 2023, 49, 102–111. [Google Scholar]
  22. Wang, S.; Peng, Q.; Du, B. Chaotic color image encryption based on 4D chaotic maps and DNA sequence. Opt. Laser Technol. 2022, 148, 107753. [Google Scholar] [CrossRef]
  23. Li, J.; Liang, B.; Zhang, X.; Yu, Z. A Conservative Memristive Chaotic System with Extreme Multistability and Its Application in Image Encryption. Entropy 2023, 25, 1656. [Google Scholar] [CrossRef]
  24. Wang, Y.; Leng, X.; Zhang, C.; Du, B. Adaptive Fast Image Encryption Algorithm Based on Three-Dimensional Chaotic System. Entropy 2023, 25, 1399. [Google Scholar] [CrossRef] [PubMed]
  25. Yao, W. Research on Extreme ulti-stability ofFour-dimensional Chaotic System with DiscreteBifurcation Diagrams. Master’s Thesis, Harbin Engineering University, Harbin, China, 2022. [Google Scholar] [CrossRef]
  26. Wang, Q.; Hu, C.; Tian, Z.; Wu, X.; Sang, H.; Cui, Z. A 3D memristor-based chaotic system with transition behaviors of coexisting attractors between equilibrium points. Results Phys. 2024, 56, 107201. [Google Scholar] [CrossRef]
  27. Yuan, T.; Qu, Q.; Jiang, Q. An Encrypted DNA Encoding Method Based on Chaotic System and Fountain Code. J. Integr. Technol. 2024, 13, 4–24. [Google Scholar]
  28. Leutcho, G.; Wang, H.; Fozin, T.; Sun, K.; Njitacke, Z.; Kengne, J. Dynamics of a new multistable 4D hyperchaotic Lorenz system and its applications. Int. J. Bifurc. Chaos 2022, 32, 2250001. [Google Scholar] [CrossRef]
  29. Yan, S.; Song, J.; Sun, X.; Wang, E.; Zhang, Y. A non-autonomous chaotic system and its application in weak signal detection. J. Shenzhen Univ. Sci. Eng. 2023, 40, 227–235. [Google Scholar] [CrossRef]
  30. Niu, S.; Xue, R.; Ding, C. A color image encryption method based on improved 3D _Henon chaos mapping. Comput. Eng. Sci. 2024, 46, 657–666. [Google Scholar]
  31. Lei, T.; Zhou, Y.; Fu, H.; Huang, L.; Zang, H. Multistability Dynamics Analysis and Digital Circuit Implementation of Entanglement-Chaos Symmetrical Memristive System. Symmetry 2022, 14, 2586. [Google Scholar] [CrossRef]
  32. Liu, X.; Liu, J. Five-dimensional Lorentz chaotic system and its circuit implementation. J. Dalian Polytech. Univ. 2024, 41, 220–227. [Google Scholar] [CrossRef]
  33. Yan, S.; Shi, W.; Song, Z.; Wang, E.; Sun, X.; Huang, Y. A new 3D chaotic circuit design and its synchronous control. Comput. Eng. Sci. 2022, 44, 1409–1417. [Google Scholar]
  34. Hu, G.; Wang, K.; Liu, L. Detection line spectrum of ship radiated noise based on a new 3D chaotic system. Sensors 2021, 21, 1610. [Google Scholar] [CrossRef]
  35. Zhang, J.; Hou, J.; Xu, L.; Zhu, X.; Xie, Q. Dynamical analysis, circuit implementation, and simultaneous application of a novel four-dimensional hyperchaotic system based on cosine functions. Microelectron. Eng. 2023, 271, 111939. [Google Scholar] [CrossRef]
  36. Zhao, H.; Yan, S.; Yu, Q. Simulation experiment of linear state feedback control with hyperchaotic Bao system. J. Mach. Des. 2020, 37, 9–12. [Google Scholar] [CrossRef]
  37. Ding, L.; Wang, P.; Ma, L.; Wu, Z. Study On Five—Dimensional Chaotic System Based On Flux-controlled Memristor. In Proceedings of the International Conference on Blockchain Technology and Information Security (ICBCTIS), Xi’an, China, 26–28 May 2023; pp. 138–143. [Google Scholar]
  38. Xie, D.; Chen, F.; Luo, Y.; Li, L. One-to-many image encryption with privacy-preserving homomorphicoutsourced decryptionbased on compressed sensing. Digit. Signal Process. 2019, 95, 102587. [Google Scholar] [CrossRef]
  39. Ma, C.; Li, G. Color bit-level image encryption algorithm based on L-K double chaotic system. Comput. Appl. Softw. 2020, 37, 321–326. [Google Scholar]
  40. Ravichandran, D.; Praveenkumar, P.; Balaguru Rayappan, J.; Amirtharajan, R. Chaos based crossover and mutation for securing DICOM image. Comput. Biol. Med. 2016, 72, 170–184. [Google Scholar] [CrossRef] [PubMed]
  41. Zhang, R.; Yu, L.; Jiang, D.; Ding, W.; Ding, Q. A novel plaintext-related color image encryption scheme based on cellular neural network and Chen’s chaotic system. Symmetry 2021, 13, 393. [Google Scholar] [CrossRef]
  42. Cheng, G.; Wang, C.; Chen, H. A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Int. J. Bifurc. Chaos 2019, 29, 1950115. [Google Scholar] [CrossRef]
  43. Mollaeefar, M.; Sharif, A.; Nazari, M. A novel encryption scheme for colored image based on high level chaotic maps. Multimed. Tools Appl. 2017, 76, 607–629. [Google Scholar] [CrossRef]
  44. Li, N.; Xie, S.; Zhang, J. A color image encryption algorithm based on double fractional order chaotic neural network and convolution operation. Entropy 2022, 24, 933. [Google Scholar] [CrossRef]
  45. Li, X.; Zeng, J.; Ding, Q.; Fan, C. A novel color image encryption algorithm based on 5-D hyperchaotic system and DNA sequence. Entropy 2022, 24, 1270. [Google Scholar] [CrossRef]
  46. Wu, Y.; Zeng, J.; Dong, W.; Li, X.; Qin, D.; Ding, Q. A novel color image encryption scheme based on hyperchaos and Hopfield chaotic neural network. Entropy 2022, 24, 1474. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Characteristic curves of tri-valued memristor: (a) φ q curve; (b) φ G curve; (c) v - i characteristic curve.
Figure 1. Characteristic curves of tri-valued memristor: (a) φ q curve; (b) φ G curve; (c) v - i characteristic curve.
Entropy 26 00536 g001
Figure 2. Time-domain waveform and 0–1 test plot with parameters a = 3 , b = 3 , c = 8 and d = 5 : (a) time-domain waveform; (b) 0–1 test plot.
Figure 2. Time-domain waveform and 0–1 test plot with parameters a = 3 , b = 3 , c = 8 and d = 5 : (a) time-domain waveform; (b) 0–1 test plot.
Entropy 26 00536 g002
Figure 3. Basic phase diagrams of the system: (a) the x y plane; (b) the x z plane; (c) the y z plane; (d) the x w plane; (e) the z w plane; and (f) the x u plane.
Figure 3. Basic phase diagrams of the system: (a) the x y plane; (b) the x z plane; (c) the y z plane; (d) the x w plane; (e) the z w plane; and (f) the x u plane.
Entropy 26 00536 g003
Figure 4. Lyapunov exponent spectrum and bifurcation diagram of chaotic system with a 0 , 5 : (a) Lyapunov exponent spectrum; (b) bifurcation diagram.
Figure 4. Lyapunov exponent spectrum and bifurcation diagram of chaotic system with a 0 , 5 : (a) Lyapunov exponent spectrum; (b) bifurcation diagram.
Entropy 26 00536 g004
Figure 5. Phase portraits of the system with different parameter a (Table 2) on x - y plane: (a) a = 0.3 ; (b) a = 0.7 ; (c) a = 0.8 ; (d) a = 0.9 ; (e) a = 1.2 ; (f) a = 1.6 ; (g) a = 2.8 ; (h) a = 4.2 ; (i) a = 4.8 .
Figure 5. Phase portraits of the system with different parameter a (Table 2) on x - y plane: (a) a = 0.3 ; (b) a = 0.7 ; (c) a = 0.8 ; (d) a = 0.9 ; (e) a = 1.2 ; (f) a = 1.6 ; (g) a = 2.8 ; (h) a = 4.2 ; (i) a = 4.8 .
Entropy 26 00536 g005
Figure 6. Lyapunov exponent spectrum and bifurcation diagram of chaotic system with d 0 , 20 : (a) Lyapunov exponent spectrum; (b) bifurcation diagram.
Figure 6. Lyapunov exponent spectrum and bifurcation diagram of chaotic system with d 0 , 20 : (a) Lyapunov exponent spectrum; (b) bifurcation diagram.
Entropy 26 00536 g006
Figure 7. Transient chaos phenomenon of the system from chaos-period when d = 9 : (a) time-domain waveform; (b) transient chaos at t 0 , 20 ; (c) steady state period at t 20 , 50 .
Figure 7. Transient chaos phenomenon of the system from chaos-period when d = 9 : (a) time-domain waveform; (b) transient chaos at t 0 , 20 ; (c) steady state period at t 20 , 50 .
Entropy 26 00536 g007
Figure 8. Attractor phase diagrams for variable wings dependent on parameter d : (a) d = 1 ; (b) d = 4 ; (c) d = 5 ; (d) d = 8 ; (e) d = 10 ; (f) d = 30 .
Figure 8. Attractor phase diagrams for variable wings dependent on parameter d : (a) d = 1 ; (b) d = 4 ; (c) d = 5 ; (d) d = 8 ; (e) d = 10 ; (f) d = 30 .
Entropy 26 00536 g008
Figure 9. Lyapunov exponent spectrum and bifurcation diagram of chaotic system with b 0 0 , 5 : (a) Lyapunov exponent spectrum; (b) bifurcation diagram.
Figure 9. Lyapunov exponent spectrum and bifurcation diagram of chaotic system with b 0 0 , 5 : (a) Lyapunov exponent spectrum; (b) bifurcation diagram.
Entropy 26 00536 g009
Figure 10. Attractor phase diagrams for variable wings dependent on parameter b 0 : (a) b 0 = 1 ; (b) b 0 = 4 .
Figure 10. Attractor phase diagrams for variable wings dependent on parameter b 0 : (a) b 0 = 1 ; (b) b 0 = 4 .
Entropy 26 00536 g010
Figure 11. Time-domain waveform and attractor phase diagrams: (a) time-domain waveforms; (b) transient chaos at t 0 , 140 ; (c) steady state period at t 140 , 200 .
Figure 11. Time-domain waveform and attractor phase diagrams: (a) time-domain waveforms; (b) transient chaos at t 0 , 140 ; (c) steady state period at t 140 , 200 .
Entropy 26 00536 g011
Figure 12. SE complexity analysis: (a) The spectral entropy complexity SE of a 0 , 5 ; (b) the spectral entropy complexity SE of d 0 , 30 .
Figure 12. SE complexity analysis: (a) The spectral entropy complexity SE of a 0 , 5 ; (b) the spectral entropy complexity SE of d 0 , 30 .
Entropy 26 00536 g012
Figure 13. The spectral entropy complexity of a 0 , 5 and d 0 , 5 .
Figure 13. The spectral entropy complexity of a 0 , 5 and d 0 , 5 .
Entropy 26 00536 g013
Figure 14. Simulink circuit diagram.
Figure 14. Simulink circuit diagram.
Entropy 26 00536 g014
Figure 15. Attractor phase diagrams: (a) the x y plane; (b) the x z plane; (c) the y z plane; (d) the x w plane.
Figure 15. Attractor phase diagrams: (a) the x y plane; (b) the x z plane; (c) the y z plane; (d) the x w plane.
Entropy 26 00536 g015
Figure 16. Nonlinear feedback synchronization error plot.
Figure 16. Nonlinear feedback synchronization error plot.
Entropy 26 00536 g016
Figure 17. Encryption flowchart.
Figure 17. Encryption flowchart.
Entropy 26 00536 g017
Figure 18. Original images, encrypted images and decrypted images: (a) the Lena original image; (b) the Baboon original image; (c) the Peppers original image; (d) the Lena encrypted image; (e) the Baboon encrypted image; (f) the Peppers encrypted image; (g) the Lena decrypted image; (h) the Baboon decrypted image; (i) the Peppers decrypted image.
Figure 18. Original images, encrypted images and decrypted images: (a) the Lena original image; (b) the Baboon original image; (c) the Peppers original image; (d) the Lena encrypted image; (e) the Baboon encrypted image; (f) the Peppers encrypted image; (g) the Lena decrypted image; (h) the Baboon decrypted image; (i) the Peppers decrypted image.
Entropy 26 00536 g018
Figure 19. Histogram tests: (a) the Lena plaintext image; (b) the Baboon plaintext image; (c) the Peppers plaintext image; (d) the Lena encrypted image; (e) the Baboon encrypted image; (f) the Peppers encrypted image.
Figure 19. Histogram tests: (a) the Lena plaintext image; (b) the Baboon plaintext image; (c) the Peppers plaintext image; (d) the Lena encrypted image; (e) the Baboon encrypted image; (f) the Peppers encrypted image.
Entropy 26 00536 g019
Figure 20. Pixel distributions: (a) the Lena plaintext image; (b) the Baboon plaintext image; (c) the Peppers plaintext image; (d) the Lena encrypted image; (e) the Baboon encrypted image; (f) the Peppers encrypted image.
Figure 20. Pixel distributions: (a) the Lena plaintext image; (b) the Baboon plaintext image; (c) the Peppers plaintext image; (d) the Lena encrypted image; (e) the Baboon encrypted image; (f) the Peppers encrypted image.
Entropy 26 00536 g020
Figure 21. Decrypted images with different levels of salt-and-pepper noise added: (a) the Lena image with 0.01% salt-and-pepper noise; (b) the Baboon image with 0.01% salt-and-pepper noise; (c) the Peppers image with 0.01% salt-and-pepper noise; (d) the Lena image with 0.1% salt-and-pepper noise; (e) the Baboon image with 0.1% salt-and-pepper noise; (f) the Peppers image with 0.1% salt-and-pepper noise; (g) the Lena image with 1% salt-and-pepper noise; (h) the Baboon image with 1% salt-and-pepper noise; (i) the Peppers image with 1% salt-and-pepper noise.
Figure 21. Decrypted images with different levels of salt-and-pepper noise added: (a) the Lena image with 0.01% salt-and-pepper noise; (b) the Baboon image with 0.01% salt-and-pepper noise; (c) the Peppers image with 0.01% salt-and-pepper noise; (d) the Lena image with 0.1% salt-and-pepper noise; (e) the Baboon image with 0.1% salt-and-pepper noise; (f) the Peppers image with 0.1% salt-and-pepper noise; (g) the Lena image with 1% salt-and-pepper noise; (h) the Baboon image with 1% salt-and-pepper noise; (i) the Peppers image with 1% salt-and-pepper noise.
Entropy 26 00536 g021
Figure 22. Decrypted images with different levels of Gaussian noise added: (a) the Lena decrypted image of Gaussian noise with variance 1 × 10 10 ; (b) the Baboon decrypted image of Gaussian noise with variance 1 × 10 10 ; (c) the Peppers decrypted image of Gaussian noise with variance 1 × 10 10 ; (d) the Lena decrypted image of Gaussian noise with variance 1 × 10 6 ; (e) the Baboon decrypted image of Gaussian noise with variance 1 × 10 6 ; (f) the Peppers decrypted image of Gaussian noise with variance 1 × 10 6 ; (g) the Lena decrypted image of Gaussian noise with variance 2 × 10 6 ; (h) the Baboon decrypted image of Gaussian noise with variance 2 × 10 6 ; (i) the Peppers decrypted image of Gaussian noise with variance 2 × 10 6 .
Figure 22. Decrypted images with different levels of Gaussian noise added: (a) the Lena decrypted image of Gaussian noise with variance 1 × 10 10 ; (b) the Baboon decrypted image of Gaussian noise with variance 1 × 10 10 ; (c) the Peppers decrypted image of Gaussian noise with variance 1 × 10 10 ; (d) the Lena decrypted image of Gaussian noise with variance 1 × 10 6 ; (e) the Baboon decrypted image of Gaussian noise with variance 1 × 10 6 ; (f) the Peppers decrypted image of Gaussian noise with variance 1 × 10 6 ; (g) the Lena decrypted image of Gaussian noise with variance 2 × 10 6 ; (h) the Baboon decrypted image of Gaussian noise with variance 2 × 10 6 ; (i) the Peppers decrypted image of Gaussian noise with variance 2 × 10 6 .
Entropy 26 00536 g022
Figure 23. Lena encrypted and decrypted images under cropping attack: (a) Cropping 0.0976% of Lena encrypted image; (b) cropping 0.391% of Lena encrypted image; (c) cropping 1.56% of Lena encrypted image; (d) cropping 6.25% of Lena encrypted image; (e) cropping 0.0976% of Lena decrypted image; (f) cropping 0.391% of Lena decrypted image; (g) cropping 1.56% of Lena decrypted image; (h) cropping 6.25% of Lena decrypted image.
Figure 23. Lena encrypted and decrypted images under cropping attack: (a) Cropping 0.0976% of Lena encrypted image; (b) cropping 0.391% of Lena encrypted image; (c) cropping 1.56% of Lena encrypted image; (d) cropping 6.25% of Lena encrypted image; (e) cropping 0.0976% of Lena decrypted image; (f) cropping 0.391% of Lena decrypted image; (g) cropping 1.56% of Lena decrypted image; (h) cropping 6.25% of Lena decrypted image.
Entropy 26 00536 g023
Figure 24. Error key decryption diagram.
Figure 24. Error key decryption diagram.
Entropy 26 00536 g024
Table 1. State of the system corresponding to the 0–1 test value K c .
Table 1. State of the system corresponding to the 0–1 test value K c .
K c System Status
0periodicity
1chaotic
Table 2. Attractor categories and numbers corresponding to different values of parameter a .
Table 2. Attractor categories and numbers corresponding to different values of parameter a .
System Parameter a Attractor SubcategoryCorresponding NumberSystem Parameter a Attractor SubcategoryCorresponding Number
0.3Cycle 3 limit ringFigure 5a0.7Cycle 6 limit ringFigure 5b
0.8Cycle 8 limit ringFigure 5c0.9Cycle 9 limit ringFigure 5d
1.2Cycle 2 limit ringFigure 5e1.6Cycle 4 limit ringFigure 5f
2.8chaoticFigure 5g4.2quasi-cycleFigure 5h
4.8quasi-cycleFigure 5i
Table 3. System states corresponding to different values of parameter b 0 .
Table 3. System states corresponding to different values of parameter b 0 .
Parameter   b 0 IntervalSystem Status Parameter   b 0 IntervalSystem Status
b 0 0 , 1.22 chaotic b 0 1.22 , 1.56 periodicity
b 0 1.56 , 2.14 chaotic b 0 2.14 , 2.39 periodicity
b 0 2.39 , 2.81 chaotic b 0 2.81 , 3.94 quasi-cycle
b 0 3.94 , 5 chaotic
Table 4. Comparison of SE complexity of this paper with the other literature.
Table 4. Comparison of SE complexity of this paper with the other literature.
ReferenceSystem Dimension S E m a x
ours50.65
[32]50.60
[33]30.52
[34]30.53
[35]40.53
Table 5. Relevance of the adjacent pixels of the Lena image.
Table 5. Relevance of the adjacent pixels of the Lena image.
ArithmeticHorizontalVerticallyDiagonally
original image0.988600.981970.97485
ours−0.020990.016680.00132
[38]0.06350.19810.1698
[39]−0.02080.04240.0212
[40]−0.0519−0.03850.0046
Table 6. Comparison of Lena’s information entropy.
Table 6. Comparison of Lena’s information entropy.
ArithmeticChannelMean
RGB
ours7.99927.99927.99947.9993
[41]7.99977.99377.99767.9970
[42]7.99917.99937.99937.9992
[43]7.99147.99077.99077.9909
Table 7. The NPCR and UACI results compared with the other referenced literature.
Table 7. The NPCR and UACI results compared with the other referenced literature.
ArithmeticNPCRDifference from Ideal ValueUACIDifference from Ideal Value
ours99.6103%0.000933.4692%0.0057
[45]99.6084%0.001033.4513%0.0122
[46]99.6081%0.001333.4478%0.0157
Table 8. Adding varying degrees of salt-and-pepper noise to the PSNR of the decrypted images.
Table 8. Adding varying degrees of salt-and-pepper noise to the PSNR of the decrypted images.
ImagePSNR
0.01% Salt-and-Pepper noise0.1% Salt-and-Pepper Noise1% Salt-and-Pepper Noise
Lena33.764326.773517.1403
Baboon34.194326.892317.5167
Peppers31.524125.749816.5099
Table 9. Adding varying degrees of noise to the PSNR of the decrypted images.
Table 9. Adding varying degrees of noise to the PSNR of the decrypted images.
PSNRImage
LenaBaboonPeppers
Gaussian noise with variance 1 × 10 10 37.076937.349533.3407
Gaussian noise with variance 1 × 10 6 11.530311.877810.8550
Gaussian noise with variance 2 × 10 6 7.497107.892106.93400
Table 10. Decrypting PSNR and SSIM of images.
Table 10. Decrypting PSNR and SSIM of images.
ImagePSNRSSIM
encrypted imageLena3.84480.0075332
Baboon4.01040.0093269
Peppers3.30490.0072834
decrypted imageLena37.07690.99959
Baboon37.34950.99948
Peppers33.34070.99934
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, P.; Ding, L. Research on Variable Parameter Color Image Encryption Based on Five-Dimensional Tri-Valued Memristor Chaotic System. Entropy 2024, 26, 536. https://doi.org/10.3390/e26070536

AMA Style

Wang P, Ding L. Research on Variable Parameter Color Image Encryption Based on Five-Dimensional Tri-Valued Memristor Chaotic System. Entropy. 2024; 26(7):536. https://doi.org/10.3390/e26070536

Chicago/Turabian Style

Wang, Pan, and Lina Ding. 2024. "Research on Variable Parameter Color Image Encryption Based on Five-Dimensional Tri-Valued Memristor Chaotic System" Entropy 26, no. 7: 536. https://doi.org/10.3390/e26070536

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop