Next Article in Journal
Material Extrusion Filament Width and Height Prediction via Design of Experiment and Machine Learning
Previous Article in Journal
Modeling a Fluid-Coupled Single Piezoelectric Micromachined Ultrasonic Transducer Using the Finite Difference Method
Previous Article in Special Issue
A Design Methodology for Fault-Tolerant Neuromorphic Computing Using Bayesian Neural Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application

1
Key Laboratory of Hunan Province on Information Photonics and Freespace Optical Communications, Hunan Institute of Science and Technology, Yueyang 414006, China
2
School of Physics and Electronic Science, Hunan Institute of Science and Technology, Yueyang 414006, China
3
School of Mathematics and Computer Science, Panzhihua University, Panzhihua 617000, China
*
Author to whom correspondence should be addressed.
Micromachines 2023, 14(11), 2090; https://doi.org/10.3390/mi14112090
Submission received: 20 October 2023 / Revised: 7 November 2023 / Accepted: 10 November 2023 / Published: 12 November 2023
(This article belongs to the Special Issue Advanced Technologies in Memristor Devices)

Abstract

:
Nowadays, the utilization of memristors to enhance the dynamical properties of chaotic systems has become a popular research topic. In this paper, we present the design of a novel 2D memristor-enhanced polynomial hyper-chaotic map (2D-MPHM) by utilizing the cross-coupling of two TiO 2 memristors. The dynamical properties of the 2D-MPHM were investigated using Lyapunov exponents, bifurcation diagrams, and trajectory diagrams. Additionally, Kolmogorov entropy and sample entropy were also employed to evaluate the complexity of the 2D-MPHM. Numerical analysis has demonstrated the superiority of the 2D-MPHM. Subsequently, the proposed 2D-MPHM was applied to a multi-channel image encryption algorithm (MIEA-MPHM) whose excellent security was demonstrated by key space, key sensitivity, plaintext sensitivity, information entropy, pixel distribution, correlation analysis, and robustness analysis. Finally, the encryption efficiency of the MIEA-MPHM was evaluated via numerous encryption efficiency tests. These tests demonstrate that the MIEA-MPHM not only possesses excellent security but also offers significant efficiency advantages, boasting an average encryption rate of up to 87.2798 Mbps.

1. Introduction

In 1971, Professor Chua [1] first proposed the concept of the memristor. Its expression can be defined by the relationship between charge and magnetic flux. Compared to the three fundamental circuit components, resistors, capacitors, and inductors, memristors possess unique memory resistance functional characteristics. Due to this distinctive memory property, memristors can find applications in various fields, including intelligent computing [2,3], neural networks [4,5,6], data mining [7], memory devices [8,9,10], and chaotic circuits [11,12,13], among others. However, because memristors have not been physically realized in the real world, research on memristors and memristor circuits has not attracted the attention of researchers. The situation remained unchanged until 2008, when HP Labs successfully developed a physical memristor using nanomaterials [14], thereby sparking a surge of research interest in memristors.
The latest research has discovered that the introduction of memristors into certain chaotic maps, such as sine maps [15], Hénon maps [16], and higher-order chaotic maps [12], can enhance the complexity of these maps by generating more diverse dynamical behaviors. Due to the introduction of memristors, new memristor-enhanced chaotic systems can possess one or more sets of equilibrium points. Simultaneously, their dynamical characteristics are not only sensitive to parameters but also strongly dependent on the initial values of the memristors. Therefore, the dynamical characteristics of these new chaotic systems are more complex than those of the original chaotic systems. They exhibit various complex dynamical behaviors, including hyper-chaos, transient chaos, coexisting attractors, multistable states, and state transitions. In [17], Bao et al. proposed a second-order chaotic map model based on a memristor, which has infinite unstable and critical stable fixed points and exhibits hyper-chaotic behavior. In [18], Fang et al. used memristors with coexisting hysteresis curves and dual local active regions to replace diodes in Chua’s circuit, and obtained a multi-scroll fourth-order hyper-chaotic system. In [19], Peng et al. used Caputo fractional-order difference to construct a map model based on a second-order memristor, which shows rich dynamical behaviors in the form of fractional order. Once the aforementioned research was reported, it immediately garnered significant attention from numerous researchers. Subsequently, an increasing amount of related research has emerged on the utilization of memristors to enhance chaotic map [20,21,22,23,24].
In 2014, Professor Chua proposed that local activity is the origin of complexity [25]. Complex behaviors and rich dynamics may arise only in locally active systems. Some studies have shown that materials such as NbO x , TaO x , TiO x , and VO 2 can be used to manufacture memristors [26] and exhibit local active characteristics [27]. The DC voltage–current (V-I) characteristics of a local active memristor have a negative slope region. Therefore, circuit systems constructed with local active memristors can generate more complex and diverse dynamic behaviors. Compared to original chaotic systems, memristor-enhanced chaotic systems are more suitable for applications in security fields, such as image encryption [28,29,30,31,32]. Accordingly, the application of memristor-enhanced chaotic systems in the field of image encryption has become a research hotspot. Lin et al. [29] proposed Chua’s chaotic system composed of piecewise linear (PWL) memristors and utilized it for image encryption. This encryption scheme possesses a larger key space and provides robust security. Li et al. [30] used a third-order magnetron memristor device to construct a chaotic circuit and conducted circuit experiments. The system has rich dynamical behaviors such as antisymmetry, multistable states, and transient chaos. In addition, based on this memristive chaotic system, they designed a chaotic image encryption scheme based on dynamic deoxyribonucleic acid (DNA) operations and dynamic diffusion. Experimental results show that the image encryption system has high security and good anti-attack capabilities. Chen et al. [31] constructed a new 4D hyper-chaotic system based on a magnetic-controlled memristor model that exhibits rich dynamical behaviors. The simulation results indicate that the system can generate complex chaotic attractors. Subsequently, they designed an image encryption scheme based on this system, and further evaluated the performance of the encryption scheme through tests such as key space and correlation analysis. Ye et al. [32] designed a new discrete memristive chaotic system using multiple memristors. They compared this discrete memristive chaotic system with other classical discrete chaotic systems. The comparison results indicate that the chaotic interval of their new system is larger. Consequently, they designed a new encryption algorithm based on this chaotic system and evaluated its security using indicators such as pixel distribution and pixel correlation.
At present, cryptanalysis research on chaotic image encryption shows that some existing chaotic image encryption schemes still have some security, practicality, and efficiency problems [33,34,35,36,37]. For example, the chaotic interval of the system used is narrow, the chaotic interval is discontinuous, the system trajectory distribution is uneven, etc. It is worth noting that existing chaotic image encryption algorithms generally suffer from low encryption efficiency [38,39,40,41,42]. Therefore, in this paper, we first constructed a 2D memristor-enhanced polynomial hyper-chaotic map (2D-MPHM). Then, based on this hyper-chaotic map, we further designed a multi-channel image encryption algorithm (MIEA-MPHM). Overall, the work presented in this paper has the following innovations and contributions:
(1)
We utilized two memristors to construct a 2D discrete polynomial hyper-chaotic map, known as a 2D-MPHM, in a cross-coupled arrangement. Relevant tests and analyses reveal that this hyper-chaotic map possesses various advantages, including a wide chaotic range, uniformly distributed trajectories, high complexity, and excellent randomness.
(2)
With our proposed 2D-MPHM, a novel multi-channel image encryption algorithm called an MIEA-MPHM was devised, which incorporates seven encryption steps, namely the generation of an initial chaotic sequence, multi-channel pixel fusion, generation of image-specific keystreams, and two rounds of double-vector (column or row) staggered diffusion and full-range pixel scrambling.
(3)
Extensive tests and analyses have confirmed that our proposed MIEA-MPHM not only offers exceptionally high security but also demonstrates significant efficiency advantages, boasting an average encryption rate of up to 87.2798 Mbps.
The remaining sections of our work are structured in the following manner: Section 2 introduces the 2D-MPHM and evaluates its performance by employing some chaotic performance indicators; in Section 3, there is a detailed description of both the overall framework of the MIEA-MPHM and the individual encryption steps employed; Section 4 presents a range of tests and analyses aiming to prove and emphasize the superior security and efficiency of the MIEA-MPHM; and our work is concluded in the last section.

2. Proposed 2D-MPHM

This section provides a detailed introduction to our proposed discrete hyper-chaotic map called a 2D-MPHM, which is constructed using the HP memristor model. This hyper-chaotic map is then assessed and analyzed using several chaotic indicators.

2.1. Construction of 2D-MPHM

According to the ion drift model of the classic HP TiO 2 memristor, its memristance M ( q ) is expressed as
M q = R O F F ( 1 μ V R O N D 2 q ( t ) ) ,
where μ V represents the migration rate of doped ions, D denotes the thickness of the semiconductor film of the memory resistor, and R O N and R O F F are the resistance values of the memristor when it is in the low-resistance state and high-resistance state, respectively. These values are determined by the physical properties of the memristor. q ( t ) is the amount of charge passing through the memristor, which is equal to the integral of current intensity over time. Specifically,
q ( t ) = k m t i ( t ) d t = q 0 ( t ) + k m t 0 t i ( t ) d t ,
where k m is a constant, typically taken as 1. The voltage V ( t ) between the two ports of the memristor can be represented as
V t = M ( q ) i ( t ) = ( a m b m ( q 0 + k m t 0 t i ( t ) d t ) ) i ( t ) .
According to the discrete memristor model proposed by Peng et al. [12], the discrete voltage V ( n ) of the TiO 2 memristor can be represented as
V ( n ) = ( a m b m ( q 0 + k m j = 0 n i j ) ) i n ,
where a m = R O F F and b m = R O F F μ V R O N / D 2 represent constants related to memristors. Generally, R O F F R O N . In this study, we set { a m , b m , k m , q 0 } as { 1 , 3 , 1 , 0.1 } . For the discrete memristor model described above, when a sinusoidal excitation signal i n = A sin ( 2 π f n ) is applied, one can observe a pinched hysteresis loop of the memristor, as depicted in Figure 1. As one can see, when the frequency f of sinusoidal signal i n increases, the memristor’s pinched hysteresis loop becomes narrower. As f tends toward infinity, the pinched hysteresis loop contracts into a straight line. These characteristics demonstrate that our adopted discrete memristor model satisfies the definition of a memristor.
In our study, this discrete memristor model is exploited to enhance the chaotic and complex properties of a 2D polynomial map. The coupling schematic diagram for the 2D polynomial map and two memristors is shown in Figure 2.
As can be seen, the two discrete memristors are applied to the system state values x i and y i of the polynomial map, respectively, and then coupled to x i + 1 and y i + 1 in a cross-over manner. Moreover, two system control parameters a and b are set on the exponent with e as the base to speed up the divergence of the system state values. Finally, the sine function is used to constrain the system state values to the range of [ 1 , 1 ] . In this way, we eventually obtained a new memristor-enhanced polynomial map called a 2D-MPHM. Specifically, the definition of the 2D-MPHM is as follows:
x i + 1 = sin ( e a x i ( a m b m ( q 0 + k m n = 1 i y n ) ) + e b y i ) , y i + 1 = sin ( e a y i ( a m b m ( q 0 + k m n = 1 i x n ) ) + e b x i ) ,
where a and b are the control parameters of the 2D-MPHM, and a m , b m , k m , and q 0 are the parameters of the adopted memristor model.

2.2. Lyapunov Exponent

In related research on chaotic systems, the Lyapunov exponent (LE) is commonly utilized to assess the chaotic characteristics of such systems. A system is considered chaotic if it possesses one or more positive LEs. Furthermore, if a system exhibits two or more positive LEs, it signifies that the system is a hyper-chaotic system. Figure 3 shows the LE diagram of the 2D-MPHM. The LEs of the 2D-MPHM were calculated using the QR decomposition method [43]. Both parameters a and b were scanned from 1 to 10 with a step size of 0.01.
Upon observing Figure 3, it is evident that within the provided parameter range, the two LEs owned by the 2D-MPHM are consistently positive. Consequently, it can be concluded that the 2D-MPHM is a hyper-chaotic map. Moreover, the maximum LE of the 2D-MPHM increases as the values of a and b increase. Within the calculation range, the 2D-MPHM’s maximum LE reaches as high as 12.8226, surpassing the majority of existing chaotic maps. Consequently, from the standpoint of LE, the 2D-MPHM demonstrates excellent chaotic performance and can fulfill the requirements of various engineering applications, such as image encryption.

2.3. Bifurcation and Trajectory Diagrams

Bifurcation diagrams are commonly utilized to illustrate the chaotic behaviors of a system, enabling us to visually determine whether the system is in a state of chaos. To plot a bifurcation diagram, one or two specific control parameters of the system are examined, and the corresponding state values are calculated iteratively and presented on the diagram. If the state values exhibit a linear distribution, it indicates that the system is in a periodic state. Conversely, if the state values take on a planar distribution, it indicates that the system is in a chaotic state. Figure 4 presents the bifurcation diagrams of the 2D-MPHM that were obtained under three distinct conditions. These diagrams encompass the bifurcation diagram for the variable parameter a [ 1 , 10 ] and the bifurcation diagram for the variable parameter b [ 1 , 10 ] , as well as the 3D bifurcation diagram when both a and b are variable parameters.
By examining these bifurcation diagrams, it becomes apparent that the 2D-MPHM consistently exhibits chaotic behavior across all parameter ranges, with its state values being uniformly scattered throughout the state space. This reveals that the 2D-MPHM possesses exceptional chaotic characteristics, making it highly suitable for a multitude of potential applications, particularly image encryption.
Additionally, we have also plotted the trajectory diagrams of the 2D-MPHM, which are presented in Figure 5. Upon observing each trajectory diagram, it becomes evident that the trajectory of the 2D-MPHM is highly uniformly in the phase plane and effectively occupies the entire state space. This once again confirms that the 2D-MPHM does possess excellent chaotic properties, making it an ideal choice for applications like image encryption.

2.4. Sample Entropy

Sample entropy (SE) characterizes the complexity of a time series by measuring the probability of generating new patterns in the signal. A higher probability of generating new patterns indicates a higher level of sequence complexity. For the chaotic sequence generated by a chaotic system, we can evaluate its complexity by calculating its SE. If the obtained SE value is large, it indicates that the self-similarity of the sequence is low and the complexity is high. We calculated the SE value of the chaotic sequence generated by the 2D-MPHM and compared it with those of four other newly reported chaotic maps. Figure 6 demonstrates the pertinent test results. As we can see, the SE values achieved by the 2D-MPHM are significantly higher than those of 2D-SCMCI [44], 2D-FOCM [45], 2D-MCS [46], and 2D-PPCS [47]. This indicates that when compared to these recent chaotic maps, the 2D-MPHM holds considerable advantages in terms of chaotic complexity.

2.5. Kolmogorov Entropy

Like SE, Kolmogorov entropy (KE) is often used by researchers to evaluate the chaotic properties of a system. Generally, the larger the KE value of a system, the higher the unpredictability and complexity of the system. Figure 7 shows the KE values of the 2D-MPHM and its comparison with those of the other four 2D chaotic maps. It can be seen from the figure that the 2D-MPHM has the highest KE value in most parameter ranges, and is stable at around 2.3. The results show that the 2D-MPHM has stable and excellent chaotic complexity.

3. Proposed MIEA-MPHM

To highlight the 2D-MPHM’s superiority in engineering applications and improve the security and efficiency of image encryption, we developed a highly efficient multi-channel image encryption algorithm called an MIEA-MPHM based on the 2D-MPHM. This encryption algorithm consists of seven encryption steps, namely the generation of an initial chaotic sequence, multi-channel pixel fusion, generation of image-specific keystreams, and two rounds of double-vector (column or row) staggered diffusion and full-range pixel scrambling. Figure 8 depicts the encryption process of the MIEA-MPHM. In the subsequent subsections, we will provide a comprehensive explanation of the entire encryption process for the MIEA-MPHM.

3.1. Generation of Initial Chaotic Sequence

For images that need to be encrypted and subsequently transmitted over a public channel, we assume that their maximum size is H ( M ) × W ( M ) . In the MIEA-MPHM, we first utilize the proposed 2D-MPHM to generate an initial chaotic sequence. This chaotic sequence is then transformed into image-specific keystreams, thereby enhancing the plaintext sensitivity of the encryption process. Specifically, the process of generating the initial chaotic sequence is as follows:
  • Step 1: Input the four components { x 0 , y 0 , a , b } of the secret key K = { γ , x 0 , y 0 , a , b } into the 2D-MPHM as its initial states and control parameters.
  • Step 2: Initialize the output chaotic sequence Q ( 1 )  with the length of
    L = 512 + γ + 2 11 + 2 × H ( M ) × W ( M ) + H ( M ) + W ( M ) .
    This sequence will be used to save the resulting hyper-chaotic map state values.
  • Step 3: Iterate the 2D-MPHM and sequentially save the two state values obtained for each iteration to Q ( 1 ) ; that is, for the i-th iteration, let Q ( 1 ) ( 2 × i 1 ) = x i and Q ( 1 ) ( 2 × i ) = y i .
  • Step 4: Keep iterating the 2D-MPHM until all elements in Q ( 1 ) have changed to the state values of the 2D-MPHM.
  • Step 5: Perform an interception operation on Q ( 1 ) and discard the first 512 + γ elements to obtain the final initial chaotic sequence Q ( 2 ) ; that is, let
    Q ( 2 ) = Q ( 1 ) ( 512 + γ + 1 : L ) .

3.2. Multi-Channel Pixel Fusion

Currently, the vast majority of encryption algorithms encrypt images in units of bits, double bits (DNA bases), or pixels. This actually does not fully utilize the computing bandwidth of current mainstream 64-bit processors. Therefore, in order to more fully utilize the computing power of 64-bit processors, we perform pixel fusion on the input images. In this way, the calculation amount of subsequent encryption operations will be significantly reduced, thereby greatly promoting the improvement of encryption efficiency. First, we aggregate the input six grayscale images or two color images into a multi-channel image P of size H × W × 6 . Then, we perform multi-channel pixel fusion on the obtained P . Algorithm 1 shows the fusion process performed on P .
Algorithm 1 Multi-channel pixel fusion algorithm.
Input: 
The multi-channel image P with the size of H × W × 6 .
  1:
Initialize an all-zero matrix C ( 1 ) of size H × W ;
  2:
for  r = 1 to 6 do
  3:
    C ( 1 ) = C ( 1 ) + P ( : , : , r ) × 2 48 8 × r ;
  4:
end for
Output: 
The fused image C ( 1 ) .

3.3. Generation of Image-Specific Keystreams

Given the high input sensitivity of hash functions like SHA-256, numerous existing image encryption algorithms make use of them to enhance plaintext sensitivity. This helps in effectively defending against different types of plaintext attacks. However, these encryption algorithms directly employ the hash value of the input image as either the secret key or the input parameters of the chaotic system. Such approaches lead to practical issues, such as the requirement to recreate chaotic sequences or constantly change secret keys. In the MIEA-MPHM, we utilize the image hash value h to transform the initial chaotic sequence Q ( 2 ) into image-specific keystreams S ( 1 ) , S ( 2 ) , S ( 3 ) , and S ( 4 ) . In this way, it is possible to enhance plaintext sensitivity while circumventing potential practical problems. Specifically, the generation process of S ( 1 ) , S ( 2 ) , S ( 3 ) , and S ( 3 ) is as follows:
  • Step 1: Utilize the SHA-256 hash function to obtain the hash value h of the fused image C ( 1 ) . The size of C ( 1 ) is H × W .
  • Step 2: Further split h with the length of 256 bits into 8-bit bytes, which are B 1 , B 2 , , B 32 .
  • Step 3: Sum these hash value bytes and then perform the modular operation to obtain
    σ = ( ( r = 1 32 B r ) mod 2 11 ) + 1 .
  • Step 4: Leverage σ and the initial chaotic sequence Q ( 2 ) to obtain the image-specific keystreams S ( 1 ) , S ( 2 ) , S ( 3 ) , and S ( 4 ) :
    S ( 1 ) = Q ( 2 ) ( σ + 1 : σ + W ) × 10 15 mod 16 ,
    S ( 2 ) = r e s h a p e ( Q ( 2 ) ( σ + W + 1 : σ + W + θ ( 1 ) ) × 10 15 mod F ) , H , W ) ,
    S ( 3 ) = Q ( 2 ) ( σ + W + θ ( 1 ) + 1 : σ + θ ( 1 ) + θ ( 2 ) ) × 10 15 mod 16 ,
    S ( 4 ) = r e s h a p e ( Q ( 2 ) ( σ + θ ( 1 ) + θ ( 2 ) + 1 : σ + θ ( 1 ) + 2 × θ ( 1 ) ) × 10 15 mod F ) , H , W ) ,
where θ ( 1 ) = H × W , θ ( 2 ) = H + W , and F = 2 48 . These image-specific keystreams will be used in subsequent encryption steps. Specifically, S ( 1 ) will be used in dual-column staggered diffusion; S ( 2 ) will be used in dual-column staggered diffusion and the first round of full-range pixel scrambling; S ( 3 ) will be used in dual-row staggered diffusion; and S ( 4 ) will be used in dual-row staggered diffusion and the second round of full-range pixel scrambling.

3.4. Double-Vector Staggered Diffusion

The diffusion process is crucial to guaranteeing the security of image encryption algorithms. However, numerous existing image encryption algorithms have been compromised as a result of relying on a single diffusion method. Thus, in the MIEA-MPHM, we meticulously devised and arranged two rounds of dual-vector staggered diffusion. In these two rounds of diffusion, the double-row staggered diffusion is the first one to be executed. The following steps outline its specific procedure:
  • Step 1: Initialize an all-zero matrix C ( 2 ) with the size of H × W .
  • Step 2: Conduct double-column diffusion on the first column of the fused image C ( 1 ) using modular addition operations:
    C ( 2 ) ( : , 1 ) = ( C ( 1 ) ( : , 1 ) + S ( 1 ) ( 2 ) × C ( 1 ) ( : , N 1 ) + S ( 1 ) ( 1 ) × C ( 1 ) ( : , N ) + S ( 2 ) ( : , 1 ) ) mod F ,
    where S ( 1 ) and S ( 2 ) are the image-specific keystreams defined in Equations (9) and (10), and F = 2 48 .
  • Step 3: Perform double-column diffusion on the second column of C ( 1 ) using XOR operations:
    C ( 2 ) ( : , 2 ) = C ( 1 ) ( : , 2 ) C ( 1 ) ( : , N ) C ( 2 ) ( : , 1 ) S ( 2 ) ( : , 2 ) .
  • Step 4: Set i = 2 , 3 , , N / 2 . For each i, conduct double-column diffusion on the ( 2 × i 1 ) -th column and ( 2 × i ) -th column of C ( 1 ) in a staggered manner using modular addition and XOR operations:
    C ( 2 ) ( : , 2 × i 1 ) =   ( C ( 1 ) ( : , 2 × i 1 ) + S ( 1 ) ( 2 × i 1 ) × C ( 2 ) ( : , 2 × i 3 ) + S ( 1 ) ( 2 × i ) × C ( 2 ) ( : , 2 × i 2 ) + S ( 2 ) ( : , 2 × i 1 ) ) mod F ,
    C ( 2 ) ( : , 2 × i ) = C ( 1 ) ( : , 2 ) C ( 2 ) ( : , 2 × i 2 ) C ( 2 ) ( : , 2 × i 1 ) S ( 2 ) ( : , 2 × i ) ,
The subsequent double-row staggered diffusion is essentially identical to the double-column staggered diffusion, with the difference being the change in the unit of diffusion from columns to rows. Furthermore, in the case of double-column staggered diffusion, the keystreams S ( 1 ) and S ( 2 ) are substituted with S ( 3 ) and S ( 4 ) , respectively.

3.5. Full-Range Pixel Scrambling

As we know, plaintext attacks are the most threatening attack methods for image encryption algorithms. Many existing image encryption algorithms have been broken as they cannot effectively resist such attacks. To enhance the robustness of the MIEA-MPHM and prevent potential plaintext attacks, we incorporated a full-range pixel scrambling process after every round of staggered diffusion. Compared to common scrambling–diffusion structures, the MIEA-MPHM adopts a diffusion–scrambling structure. This design effectively thwarts attackers from employing chosen plaintext images with single pixel values to invalidate scrambling operations. Moveover, the MIEA-MPHM also reuses the key streams S ( 2 ) and S ( 4 ) utilized in the diffusion operations while performing scrambling operations. This reduces the length of the chaotic sequence that needs to be generated, thus promoting the improvement of encryption efficiency. Specifically, the steps for the first round of full-range pixel scrambling are as follows:
  • Step 1: Initialize a matrix C ( 3 ) with the size of H × W , and let C ( 3 ) = C ( 2 ) .
  • Step 2: Transform S ( 2 ) into the required row index matrix
    Φ ( H ) = ( S ( 2 ) mod H ) + 1 .
  • Step 3: Similarly, transform S ( 4 ) into the required column index matrix
    Φ ( W ) = ( S ( 4 ) mod W ) + 1 .
  • Step 4: For each row index α from 1 to H, repeat Step 5 to Step 6.
  • Step 5: For each column index β from 1 to W, repeat Step 6.
  • Step 6: Swap C ( 3 ) ( α , β ) with C ( 3 ) ( Φ ( H ) ( α , β ) , Φ ( W ) ( α , β ) ) .
The subsequent second round of scrambling is basically the same as the first round of scrambling. The only difference is that the conversion method for row and column index matrices is slightly different. In the second round of scrambling,
Φ ( H ) = ( S ( 4 ) mod H ) + 1
and
Φ ( W ) = ( S ( 2 ) mod W ) + 1 .
Since our MIEA-MPHM is a symmetrically structured image encryption algorithm, the decryption process is the reverse of the encryption process. To avoid unnecessary lengthiness, we omit the description of the decryption process here. Next, we will conduct a series of tests and analyses on the MIEA-MPHM to comprehensively evaluate its security and encryption performance.

4. Performance Tests and Analyses

With the aim of verifying and assessing its security and efficiency, we performed an extensive range of tests and analyses on the MIEA-MPHM. In our tests, the test images originate from two widely employed standard test databases, known as USC-SIPI and CVG-UGR. In addition, the hardware configurations utilized are Intel CPU E3-1231 v3 and 8 GB RAM, while the software configurations are Windows 10 and MATLAB R2017a. To ensure more objective assessments and analyses of the MIEA-MPHM’s performance, we employed randomly generated secret keys to conduct various tests. Moreover, to facilitate comparisons and demonstrate the encryption effects, we split the fused form of the ciphertext pixels into 8-bit pixels.

4.1. Visual Effects of Encryption and Decryption

For visual effects, a competent encryption algorithm should be able to entirely remove any meaningful information that can be perceived from the input image. On the other hand, the decrypted output image should fully restore all meaningful information. We conducted numerous tests on the MIEA-MPHM using randomly generated secret keys. In every test, the MIEA-MPHM could convert the input image into an unidentifiable noise image and restore the original image with no loss through decryption. Figure 9 shows the visual effects of our encryption and decryption tests. In the first encryption, six grayscale images (5.1.09, 5.1.10, 5.1.11, 5.1.12, 5.1.13, and 5.1.14) were encrypted simultaneously. In the second encryption, two color images (beeflowr and athens) were encrypted simultaneously. As can be seen, the ciphertext images generated by the MIEA-MPHM are entirely unrecognizable. Attackers cannot perceive any meaningful information from them. By utilizing the correct secret key, all authorized users can effortlessly obtain lossless decrypted images through decryption. Therefore, the visual effects of encryption and decryption provided by the MIEA-MPHM are in line with the requirements.

4.2. Key Space and Key Sensitivity

Among the various attacks against cryptosystems, brute-force attacks are the most common and easiest to implement. In general, brute-force attacks are typically leveraged to break a cryptosystem by exhaustively trying all possible keys within the key space. Therefore, in order to successfully resist different brute force attacks, a proposed image encryption algorithm should possess a key space of sufficient size. Currently, it is widely accepted that the key space should be equivalent to or larger than 2 128 . As described in Section 3.1, the secret key K of the MIEA-MPHM consists of five parts: γ , x 0 , y 0 , a, and b. Accordingly, one can easily determine the key space of the MIEA-MPHM, which is
ϕ ( K ) = ϕ ( γ ) × ϕ ( x 0 ) × ϕ ( y 0 ) × ϕ ( a ) × ϕ ( b ) = 3.3178 × 10 65 2 217 .
Since ϕ ( K ) is much greater than 2 128 , the proposed MIEA-MPHM can effectively resist potential brute-force attacks.
Based on prior cryptography research, it is suggested that the relationship between the secret key and the ciphertext should be as complex as possible. This implies that even if the key changes only slightly, the ciphertext should undergo significant changes. In simpler terms, a suggested image encryption algorithm must exhibit a high degree of sensitivity toward key alterations. Several tests were conducted to evaluate the MIEA-MPHM’s key sensitivity. One of these tests is represented in Figure 10, which shows the corresponding results. In this test, we generated a random secret key
K ( R ) = γ ( R ) = 484 , x 0 ( R ) = 0 . 338090773927741 , y 0 ( R ) = 0 . 075162771765254 , a ( R ) = 0 . 194490737784561 , b ( R ) = 0 . 051605090236889 ,
and adopted it to encrypt the test images 4.2.05 and 4.2.06. Afterwards, we made minimal changes to each component of K ( R ) , resulting in five new secret keys. Finally, we encrypted the same test images using these five secret keys and generated difference images between the new ciphertext images and the original ones. Upon observing Figure 10, it becomes evident that even the slightest alteration in any component will result in completely different ciphertext images. Moreover, if these changes themselves are presented in the form of images, they are also highly unrecognizable quasi-random images. Hence, the MIEA-MPHM has superior key sensitivity and can effectively resist potential attacks related to the statistical relationship between the secret key and ciphertexts.

4.3. Plaintext Sensitivity

To effectively withstand a range of differential attacks, particularly plaintext attacks, a robust cryptosystem should possess a remarkably high level of sensitivity toward plaintext. This means that even if the plaintext undergoes only minimal changes, the corresponding ciphertext should change significantly. In order to evaluate the plaintext sensitivity of the MIEA-MPHM, we performed two minimum modifications on two sets of color image inputs simultaneously. For the first modification, we modified the lowest bit of the first pixel, which is located at (1,1) of the red channel in 4.1.06. In the second modification, the lowest bit of the last pixel was modified, which is located at (256,256) of the blue channel of 4.1.05. Subsequently, we encrypted the four sets of inputs to analyze the ciphertext changes caused by the modifications. As can be observed from Figure 11, for each modification, even though only one channel experiences a minimal change of one bit, all corresponding ciphertext images undergo complete alteration. Moreover, these significant changes are not influenced by the location of the plaintext modification. Thus, our MIEA-MPHM exhibits excellent sensitivity toward plaintext.
Additionally, in order to further emphasize the MIEA-MPHM’s outstanding performance in plaintext sensitivity, we have also conducted a multitude of quantitative analyses utilizing two widely adopted indices. These two indices are the number of pixels change rate (NPCR) and the unified average changing intensity (UACI). For the original ciphertext image C 1 and the changed ciphertext image C 2 , one can use the following definitions to calculate the NPCR and UACI values between them:
N P C R ( C 1 , C 2 ) = m = 1 M n = 1 N D ( m , n ) / M × N × 100 % ,
U A C I ( C 1 , C 2 ) = m = 1 M n = 1 N C 1 ( m , n ) C 2 ( m , n ) / ( 255 × M × N ) × 100 % ,
where M indicates the height of the two images and N represents the width of them. D ( m , n ) stands for the difference value between C 1 ( m , n ) and C 2 ( m , n ) . When C 1 ( m , n ) = C 2 ( m , n ) , D ( m , n ) = 0 ; otherwise, D ( m , n ) = 1 . According to Equations (23) and (24), one can calculate the NPCR and UACI values between a given ciphertext image and a random image to be 99.6094% and 33.4635%, respectively. Therefore, when it comes to plaintext sensitivity tests, the ideal values of NPCR and UACI that an image encryption algorithm can achieve are 99.6094% and 33.4635%, respectively. Table 1 and Table 2 present the test results that we have obtained. As can be seen, the average values obtained by all five algorithms are very close to the ideal values. This demonstrates that all algorithms exhibit good plaintext sensitivity. Significantly, the MIEA-MPHM exhibits two test averages that are closest to the ideal values of 99.6094% and 33.4635%. Moreover, the MIEA-MPHM’s test results are also the most stable. To highlight the advantages of the MIEA-MPHM more intuitively, we plotted the test results of all five algorithms into two diagrams, as shown in Figure 12 and Figure 13. Please note that in Figure 12 and Figure 13, black line represents the image encryption algorithm proposed in [48], violet line represents the image encryption algorithm proposed in [49], green line represents the image encryption algorithm proposed in [50], and blue line represents the image encryption algorithm proposed in [51].Therefore, the MIEA-MPHM has first-class plaintext sensitivity and can resist various potential differential attacks.

4.4. Information Entropy

Since it can reflect the randomness of information sources, information entropy (IE) is commonly utilized for evaluating the randomness and distribution uniformity of ciphertext pixels. For an image with a pixel depth of 8 bits, one can employ the following definition to calculate its IE value:
I E ( S ) = j = 1 q ρ ( S j ) log 2 ρ ( S j ) ,
where S = { S 1 , S 2 , S q } , ρ ( S j ) denotes the probability of S j . Generally, for ciphertext images that need to be evaluated, higher IE values mean higher pixel randomness and distribution uniformity. According to Equation (25), the ideal IE value of a ciphertext image can be ascertained as 8. We encrypted many test images and calculated the IE value of the ciphertext images generated by the MIEA-MPHM. The relevant test results are shown in Table 3. Compared to ciphertext images, original images typically have smaller IE values. The IE values of all ciphertext images generated by the MIEA-MPHM are extremely close to 8. This indicates that the pixels in these ciphertext images are highly random and their distribution is remarkably uniform.
Furthermore, we also performed comparative experiments on IE. As indicated in Table 4, the MIEA-MPHM attains a higher IE value in contrast to the other eight latest encryption algorithms. This demonstrates that the MIEA-MPHM possesses distinct advantages in terms of IE, enabling it to produce ciphertext images with optimal randomness.

4.5. Pixel Distribution

It is common for natural images to have highly prominent distribution characteristics. Accordingly, a proposed encryption algorithm should be capable of effectively eliminating these characteristics, thus preventing any leakage of information. To assess the MIEA-MPHM’s performance in pixel distribution, we simultaneously encrypted two color images using a random secret key. Subsequently, we further plotted 3D pixel distribution diagrams for the input images and the resulting ciphertext images. All these pixel distribution diagrams are provided in Figure 14.
By observing, we can determine that the pixel distribution in each channel of these two color images is highly uneven. Nonetheless, in the corresponding encrypted images output by the MIEA-MPHM, these prominent distribution features have been entirely eradicated. The pixel distribution of each channel becomes highly uniform. Therefore, the MIEA-MPHM exhibits excellent performance in terms of pixel distribution, which helps to prevent attackers from exploiting the distribution characteristics of ciphertext pixels for launching attacks.

4.6. Correlation Analysis

The strong correlation between adjacent pixels is one of the distinctive features of natural images. To counter potential attacks by adversaries who target this feature specifically, a proficient encryption algorithm must be capable of effectively minimizing the correlation between pixels. For the purpose of evaluating the MIEA-MPHM’s performance in decreasing pixel correlation, we encrypted two test images 4.1.04 and 4.1.05 simultaneously with a secret key that was randomly generated. After obtaining corresponding ciphertext images, we further drew correlation analysis diagrams for the original images and their ciphertext counterparts. By observing Figure 15, one can see that in the two original images, for each direction (horizontal, vertical, and diagonal) of each channel (red, green, and blue), adjacent pixels show a strong correlation close to 1. In contrast, the ciphertext images generated by the MIEA-MPHM exhibit complete dissimilarity. We cannot detect any correlation traits in their analysis diagrams.
Additionally, we conducted many quantitative analyses on the effectiveness of the MIEA-MPHM in reducing pixel correlation. The indicator utilized in our analyses is the correlation coefficient (CC). It is also a widely used indicator for security assessment, and its mathematical definition is as follows:
C C = E ( ( V m E ( V m ) ) ( V n E ( V n ) ) D ( V m ) D ( V n ) ,
where V m and V n denote pixel values, E ( V m ) and E ( V n ) stand for expectations, and D ( V m ) and D ( A n ) indicate variances. The relevant analysis results are provided in Table 5. As can be seen, the CC values of two original images are significantly high in every direction of every channel. Conversely, in the ciphertext images generated by the MIEA-MPHM, all pixel correlations are effectively removed. The corresponding CC values plummet to extremely low values, close to 0. This indicates that the MIEA-MPHM features excellent performance in reducing pixel correlation.

4.7. Robustness Analysis

In today’s complex application environment, ciphertext images may experience data loss during transmission or storage. Consequently, a proposed encryption algorithm should be robust enough to endure significant data loss. Two rounds of tests were conducted to evaluate and analyze the robustness of the MIEA-MPHM. In the first round of testing, we intentionally added five different intensities of salt-and-pepper noise to the ciphertext images. Afterwards, we decrypted the ciphertext images that were impacted by noise. The pertinent test results are illustrated in Figure 16. As can be seen, the decrypted images remain essentially unaffected when the noise intensity is low. As the intensity of noise increases, the decrypted image progressively becomes blurry. This implies that the proportion of useful information retained in the decrypted image depends on the level of noise intensity. If the intensity of noise added to the ciphertext image is higher, then less information will be retained, resulting in a higher degree of blurriness in the decrypted image. However, despite the noise intensity being as high as 0.10, the MIEA-MPHM can still effectively restore the vast majority of meaningful visual information presented in the original images.
In the second round of testing, we intentionally removed certain ciphertext pixels, as illustrated in Figure 17. Through observation, one can see that when significant data losses occur in a single channel, the visual quality of the decrypted images is hardly affected. And, when all channels simultaneously suffer data losses, the decrypted images become blurry. Similarly, the proportion of useful information retained in the decrypted image depends on the number of missing ciphertext pixels. If the number of missing ciphertext pixels increases, less information will be retained, leading to a more blurred decrypted image. Significantly, when the data loss is as high as about 20%, the decrypted images can still retain most useful visual information. In summary, the MIEA-MPHM exhibits exceptional robustness and can satisfactorily restore the original images in cases where the ciphertext images experience considerable data losses.

4.8. Encryption Efficiency

As we know, aside from enhancing security, one of the primary motivations for developing new image encryption algorithms is to attain higher encryption rates. In our proposed MIEA-MPHM, we have incorporated several targeted designs to maximize the encryption rate. Firstly, a 2D-MPHM is a hyper-chaotic map with a simple structure, so it can efficiently generate chaotic sequences. Secondly, the MIEA-MPHM optimizes the use of the plaintext hash value. The regeneration of chaotic sequences is no longer necessary for ensuring plaintext sensitivity. Finally, and more importantly, the MIEA-MPHM has introduced an innovative pixel fusion technique, and this technique can more fully utilize the computing bandwidth of today’s mainstream 64-bit processors.
To showcase the MIEA-MPHM’s substantial advantages in encryption efficiency, we conducted comprehensive tests and compared its test results with those of six recent algorithms. By observing Table 6, we can find that the average encryption rate of the MIEA-MPHM is significantly higher than that of other algorithms. Among all of these algorithms, the average encryption rate of the MIEA-MPHM is nearly three times higher than the second-ranked algorithm and nearly eighty times higher than the slowest algorithm. To encrypt an image with a size of 1024 × 1024 , the MIEA-MPHM only takes 0.1036 s on average, and its average encryption rate is as high as 87.2798 Mbps. Hence, when it comes to encryption efficiency, our proposed MIEA-MPHM offers greater practicality and can better fulfill the requirements of diverse practical applications.

5. Conclusions

To enrich the dynamical characteristics and increase the complexity, a 2D polynomial hyper-chaotic map known as a 2D-MPHM was created in this study using the discrete TiO 2 memristor model. The map’s Lyapunov exponents, bifurcation diagrams, trajectory diagrams, sample entropy, and Kolmogorov entropy were calculated numerically. The experimental results show that this map has excellent chaotic performance, including a broad hyper-chaotic range, a uniform trajectory distribution, and a fast trajectory divergence rate. To emphasize the 2D-MPHM’s superiority in engineering applications and improve the security and efficiency of image encryption, we developed a highly efficient multi-channel image encryption algorithm named an MIEA-MPHM based on the 2D-MPHM.
In the MIEA-MPHM, we performed pixel fusion on the input images to better make use of the processing power of 64-bit processors. This significantly cut down on the number of calculations required for subsequent encryption operations, thereby greatly facilitating the improvement of encryption efficiency. The SHA-256 hash function was utilized to transform the initial chaotic sequence into image-specific keystreams. In this way, it is possible to enhance plaintext sensitivity while circumventing potential practical problems. To enhance the robustness of the MIEA-MPHM and prevent potential plaintext attacks, we incorporated a full-range pixel scrambling process after every round of staggered diffusion. Compared to common scrambling–diffusion structures, the MIEA-MPHM adopts a diffusion–scrambling structure. This design effectively thwarts attackers from employing chosen plaintext images with single pixel values to invalidate scrambling operations. Based on extensive tests and analyses, the MIEA-MPHM exhibits outstanding security, surpassing that of latest leading image encryption algorithms. Remarkably, the MIEA-MPHM also has an extremely obvious efficiency advantage, with an average encryption rate of up to 87.2798 Mbps. Consequently, the MIEA-MPHM is able to meet the needs of potential applications better than most existing image encryption algorithms.
Overall, our work possesses scientific novelty in two aspects. Firstly, we designed a 2D discrete hyper-chaotic map with exponential-form parameters and a cross-coupling architecture. Further, we optimized it by incorporating two memristors and thus obtained the final 2D-MPHM. Our proposed 2D-MPHM not only features a simple structure, but it also exhibits excellent chaotic performance, rendering it suitable for various engineering applications, including image encryption. Secondly, we developed a secure and efficient multi-channel image encryption algorithm by introducing several novel designs. These designs include a versatile encryption method capable of simultaneously encrypting multiple grayscale or color images, pixel fusion to significantly reduce encryption computation, and new permutation and diffusion techniques that ensure security while enhancing efficiency. In the future, we will strive to utilize memristors for constructing chaotic systems with improved performance. Concurrently, we will explore the potential of applying a 2D-MPHM to various fields, including neural network optimization and image compression.

Author Contributions

Conceptualization, K.Q. and W.F.; methodology, Y.X., Y.W. and D.L.; software, D.L., Q.W. and W.F.; validation, K.Q., Y.X. and W.F.; formal analysis, K.Q. and W.F.; writing—original draft preparation, K.Q., Y.W. and D.L.; writing—review and editing, K.Q., Q.W. and W.F.; supervision, K.Q. and W.F.; project administration, Y.X. and W.F.; funding acquisition, Y.X., Q.W. and W.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Guiding Science and Technology Plan Project of Panzhihua City (Grant No. 2020ZD-S-40) and the Innovation and Entrepreneurship Project for Chinese University Students (Grant Nos. 202211360021, S202211360072, 202311360019, and 2023cxcy162).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data will be made available on request.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this paper:
2D-MPHM2D memristor-enhanced polynomial hyper-chaotic map
MIEA-MPHMMulti-channel image encryption algorithm based on 2D-MPHM
PWLPiecewise linear
DNADeoxyribonucleic acid
LELyapunov exponent
SESample entropy
KEKolmogorov entropy
NPCRNumber of pixels change rate
UACIUnified average changing intensity
IEInformation entropy
CCCorrelation coefficient

References

  1. Chua, L. Memristor-The missing circuit element. IEEE Trans. Circuit Theory 1971, 18, 507–519. [Google Scholar] [CrossRef]
  2. Yang, J.; Hu, L.; Shen, L.; Wang, J.; Cheng, P.; Lu, H.; Zhuge, F.; Ye, Z. Optically driven intelligent computing with ZnO memristor. Fundam. Res. 2022, in press. [Google Scholar] [CrossRef]
  3. Li, R.; Huang, P.; Feng, Y.; Zhou, Z.; Zhang, Y.; Ding, X.; Liu, L.; Kang, J. Hardware Demonstration of SRDP Neuromorphic Computing with Online Unsupervised Learning Based on Memristor Synapses. Micromachines 2022, 13, 433. [Google Scholar] [CrossRef]
  4. Yu, J.; Zhang, W.; Dong, D.; Sun, W.; Lai, J.; Zheng, X.; Gong, T.; Li, Y.; Shang, D.; Xing, G.; et al. Long-Term Accuracy Enhancement of Binary Neural Networks Based on Optimized Three-Dimensional Memristor Array. Micromachines 2022, 13, 308. [Google Scholar] [CrossRef]
  5. Li, C.; Yang, Y.; Yang, X.; Zi, X.; Xiao, F. A tristable locally active memristor and its application in Hopfield neural network. Nonlinear Dyn. 2022, 108, 1697–1717. [Google Scholar] [CrossRef]
  6. Zhang, X.; Wang, X.; Ge, Z.; Li, Z.; Wu, M.; Borah, S. A Novel Memristive Neural Network Circuit and Its Application in Character Recognition. Micromachines 2022, 13, 2074. [Google Scholar] [CrossRef] [PubMed]
  7. Wang, R.; Shi, T.; Zhang, X.; Wei, J.; Lu, J.; Zhu, J.; Wu, Z.; Liu, Q.; Liu, M. Implementing in-situ self-organizing maps with memristor crossbar arrays for data mining and optimization. Nat. Commun. 2022, 13, 2289. [Google Scholar] [CrossRef] [PubMed]
  8. Sun, J.; Jiang, M.; Zhou, Q.; Wang, C.; Sun, Y. Memristive Cluster Based Compact High-Density Nonvolatile Memory Design and Application for Image Storage. Micromachines 2022, 13, 844. [Google Scholar] [CrossRef] [PubMed]
  9. Abbas, H.; Li, J.; Ang, D.S. Conductive Bridge Random Access Memory (CBRAM): Challenges and Opportunities for Memory and Neuromorphic Computing Applications. Micromachines 2022, 13, 725. [Google Scholar] [CrossRef] [PubMed]
  10. Wu, Z.; Lu, J.; Shi, T.; Zhao, X.; Zhang, X.; Yang, Y.; Wu, F.; Li, Y.; Liu, Q.; Liu, M. A habituation sensory nervous system with memristors. Adv. Mater. 2020, 32, 2004398. [Google Scholar] [CrossRef]
  11. Ma, X.; Mou, J.; Xiong, L.; Banerjee, S.; Cao, Y.; Wang, J. A novel chaotic circuit with coexistence of multiple attractors and state transition based on two memristors. Chaos Solitons Fractals 2021, 152, 111363. [Google Scholar] [CrossRef]
  12. Peng, Y.; He, S.; Sun, K. A higher dimensional chaotic map with discrete memristor. AEU Int. J. Electron. Commun. 2021, 129, 153539. [Google Scholar] [CrossRef]
  13. Dou, G.; Zhang, Y.; Yang, H.; Han, M.; Guo, M.; Gai, W. RC Bridge Oscillation Memristor Chaotic Circuit for Electrical and Electronic Technology Extended Simulation Experiment. Micromachines 2023, 14, 410. [Google Scholar] [CrossRef] [PubMed]
  14. Strukov, D.B.; Snider, G.S.; Stewart, D.R.; Williams, R.S. The missing memristor found. Nature 2008, 453, 80–83. [Google Scholar] [CrossRef]
  15. He, S.; Sun, K.; Peng, Y.; Wang, L. Modeling of discrete fracmemristor and its application. AIP Adv. 2020, 10, 015332. [Google Scholar] [CrossRef]
  16. Peng, Y.; Sun, K.; He, S. A discrete memristor model and its application in Hénon map. Chaos Solitons Fractals 2020, 137, 109873. [Google Scholar] [CrossRef]
  17. Bao, B.C.; Li, H.; Wu, H.; Zhang, X.; Chen, M. Hyperchaos in a second-order discrete memristor-based map model. Electron. Lett. 2020, 56, 769–770. [Google Scholar] [CrossRef]
  18. Yuan, F.; Wang, G.; Wang, X. Extreme multistability in a memristor-based multi-scroll hyper-chaotic system. Chaos Interdiscip. J. Nonlinear Sci. 2016, 26, 73107. [Google Scholar] [CrossRef] [PubMed]
  19. Peng, Y.; He, S.; Sun, K. Chaos in the discrete memristor-based system with fractional-order difference. Results Phys. 2021, 24, 104106. [Google Scholar] [CrossRef]
  20. Wang, L.; Jiang, S.; Ge, M.F.; Hu, C.; Hu, J. Finite-/Fixed-Time Synchronization of Memristor Chaotic Systems and Image Encryption Application. IEEE Trans. Circuits Syst. I Regul. Pap. 2021, 68, 4957–4969. [Google Scholar] [CrossRef]
  21. Guo, Z.; Wen, J.; Mou, J. Dynamic Analysis and DSP Implementation of Memristor Chaotic Systems with Multiple Forms of Hidden Attractors. Mathematics 2023, 11, 24. [Google Scholar] [CrossRef]
  22. Wang, Y.; Li, H.; Guan, Y.; Chen, M. Predefined-time chaos synchronization of memristor chaotic systems by using simplified control inputs. Chaos Solitons Fractals 2022, 161, 112282. [Google Scholar] [CrossRef]
  23. Wang, Z.; Qi, G. Modeling and Analysis of a Three-Terminal-Memristor-Based Conservative Chaotic System. Entropy 2021, 23, 71. [Google Scholar] [CrossRef] [PubMed]
  24. Bao, B.; Rong, K.; Li, H.; Li, K.; Hua, Z.; Zhang, X. Memristor-Coupled Logistic Hyperchaotic Map. IEEE Trans. Circuits Syst. II Express Briefs 2021, 68, 2992–2996. [Google Scholar] [CrossRef]
  25. Chua, L.O. Local activity is the origin of complexity. Int. J. Bifurc. Chaos 2005, 15, 3435–3456. [Google Scholar] [CrossRef]
  26. Shi, T.; Wang, R.; Wu, Z.; Sun, Y.; An, J.; Liu, Q. A review of resistive switching devices: Performance improvement, characterization, and applications. Small Struct. 2021, 2, 2000109. [Google Scholar] [CrossRef]
  27. Liang, Y.; Wang, G.; Chen, G.; Dong, Y.; Yu, D.; Iu, H.H.C. S-type locally active memristor-based periodic and chaotic oscillators. IEEE Trans. Circuits Syst. I Regul. Pap. 2020, 67, 5139–5152. [Google Scholar] [CrossRef]
  28. Hou, Y.Y. Synchronization of Chaotic Systems and Its Application in Security Terminal Sensing Node of Internet of Things. Micromachines 2022, 13, 1993. [Google Scholar] [CrossRef]
  29. Lin, Z.; Wang, H. Efficient image encryption using a chaos-based PWL memristor. IETE Tech. Rev. 2010, 27, 318–325. [Google Scholar] [CrossRef]
  30. Li, C.; Li, Z.; Feng, W.; Tong, Y.; Du, J.; Wei, D. Dynamical behavior and image encryption application of a memristor-based circuit system. AEU Int. J. Electron. Commun. 2019, 110, 152861. [Google Scholar] [CrossRef]
  31. Chen, J.J.; Yan, D.W.; Duan, S.K.; Wang, L.D. Memristor-based hyper-chaotic circuit for image encryption. Chin. Phys. B 2020, 29, 110504. [Google Scholar] [CrossRef]
  32. Ye, X.; Wang, X.; Gao, S.; Mou, J.; Wang, Z.; Yang, F. A new chaotic circuit with multiple memristors and its application in image encryption. Nonlinear Dyn. 2020, 99, 1489–1506. [Google Scholar] [CrossRef]
  33. Feng, W.; Qin, Z.; Zhang, J.; Ahmad, M. Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding. IEEE Access 2021, 9, 145459–145470. [Google Scholar] [CrossRef]
  34. Wen, H.; Lin, Y. Cryptanalyzing an image cipher using multiple chaos and DNA operations. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 101612. [Google Scholar] [CrossRef]
  35. Chen, L.; Li, C.; Li, C. Security Measurement of a Medical Image Communication Scheme based on Chaos and DNA. J. Vis. Commun. Image Represent. 2022, 83, 103424. [Google Scholar] [CrossRef]
  36. Zhang, C.; Chen, J.; Chen, D. Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map. Entropy 2022, 24, 1551. [Google Scholar] [CrossRef]
  37. Wen, H.; Lin, Y. Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst. Appl. 2023, 237, 121514. [Google Scholar] [CrossRef]
  38. Wen, H.; Chen, Z.; Zheng, J.; Huang, Y.; Li, S.; Ma, L.; Lin, Y.; Liu, Z.; Li, R.; Liu, L.; et al. Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM. Entropy 2022, 24, 1332. [Google Scholar] [CrossRef]
  39. Nan, S.; Feng, X.; Wu, Y.; Zhang, H. Remote sensing image compression and encryption based on block compressive sensing and 2D-LCCCM. Nonlinear Dyn. 2022, 108, 2705–2729. [Google Scholar] [CrossRef]
  40. Wen, H.; Huang, Y.; Lin, Y. High-quality color image compression-encryption using chaos and block permutation. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 101660. [Google Scholar] [CrossRef]
  41. Wang, X.; Liu, H. Cross-plane multi-image encryption using chaos and blurred pixels. Chaos Solitons Fractals 2022, 164, 112586. [Google Scholar] [CrossRef]
  42. Wen, H.; Liu, Z.; Lai, H.; Zhang, C.; Liu, L.; Yang, J.; Lin, Y.; Li, Y.; Liao, Y.; Ma, L.; et al. Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key. Mathematics 2022, 10, 3180. [Google Scholar] [CrossRef]
  43. Geist, K.; Parlitz, U.; Lauterborn, W. Comparison of different methods for computing Lyapunov exponents. Prog. Theor. Phys. 1990, 83, 875–893. [Google Scholar] [CrossRef]
  44. Sun, J. 2D-SCMCI Hyperchaotic Map for Image Encryption Algorithm. IEEE Access 2021, 9, 59313–59327. [Google Scholar] [CrossRef]
  45. Zhu, L.; Jiang, D.; Ni, J.; Wang, X.; Rong, X.; Ahmad, M. A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf. Sci. 2022, 607, 1001–1022. [Google Scholar] [CrossRef]
  46. Hua, Z.; Zhang, Y.; Zhou, Y. Two-dimensional modular chaotification system for improving chaos complexity. IEEE Trans. Signal Process. 2020, 68, 1937–1949. [Google Scholar] [CrossRef]
  47. Hua, Z.; Chen, Y.; Bao, H.; Zhou, Y. Two-dimensional parametric polynomial chaotic system. IEEE Trans. Syst. Man, Cybern. Syst. 2021, 52, 4402–4414. [Google Scholar] [CrossRef]
  48. Hua, Z.; Zhu, Z.; Chen, Y.; Li, Y. Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dyn. 2021, 104, 4505–4522. [Google Scholar] [CrossRef]
  49. Hua, Z.; Zhu, Z.; Yi, S.; Zhang, Z.; Huang, H. Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf. Sci. 2021, 546, 1063–1083. [Google Scholar] [CrossRef]
  50. Qian, K.; Feng, W.; Qin, Z.; Zhang, J.; Luo, X.; Zhu, Z. A novel image encryption scheme based on memristive chaotic system and combining bidirectional bit-level cyclic shift and dynamic DNA-level diffusion. Front. Phys. 2022, 10, 718. [Google Scholar] [CrossRef]
  51. Feng, W.; Zhao, X.; Zhang, J.; Qin, Z.; Zhang, J.; He, Y. Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform. Mathematics 2022, 10, 2751. [Google Scholar] [CrossRef]
  52. Li, H.; Li, T.; Feng, W.; Zhang, J.; Zhang, J.; Gan, L.; Li, C. A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusion. J. Inf. Secur. Appl. 2021, 61, 102844. [Google Scholar] [CrossRef]
  53. Li, H.; Yu, S.; Feng, W.; Chen, Y.; Zhang, J.; Qin, Z.; Zhu, Z.; Wozniak, M. Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption. Entropy 2023, 25, 1147. [Google Scholar] [CrossRef] [PubMed]
  54. Wang, X.; Liu, L.; Song, M. Remote sensing image and multi-type image joint encryption based on NCCS. Nonlinear Dyn. 2023, 111, 14537–14563. [Google Scholar] [CrossRef]
  55. Zefreh, E.Z. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed. Tools Appl. 2020, 79, 24993–25022. [Google Scholar] [CrossRef]
  56. Liu, H.; Zhao, B.; Huang, L. A remote-sensing image encryption scheme using DNA bases probability and two-dimensional logistic map. IEEE Access 2019, 7, 65450–65459. [Google Scholar] [CrossRef]
  57. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  58. Hua, Z.; Jin, F.; Xu, B.; Huang, H. 2D Logistic-Sine-coupling map for image encryption. Signal Process. 2018, 149, 148–161. [Google Scholar] [CrossRef]
Figure 1. Pinched hysteresis loops of adopted memristor model.
Figure 1. Pinched hysteresis loops of adopted memristor model.
Micromachines 14 02090 g001
Figure 2. Coupling schematic diagram for 2D-MPHM.
Figure 2. Coupling schematic diagram for 2D-MPHM.
Micromachines 14 02090 g002
Figure 3. LE diagram of 2D-MPHM.
Figure 3. LE diagram of 2D-MPHM.
Micromachines 14 02090 g003
Figure 4. Six bifurcation diagrams for 2D-MPHM: (a) a = 5 ; (b) b = 8 ; (c,d) 3D bifurcation diagrams.
Figure 4. Six bifurcation diagrams for 2D-MPHM: (a) a = 5 ; (b) b = 8 ; (c,d) 3D bifurcation diagrams.
Micromachines 14 02090 g004
Figure 5. Six trajectory diagrams for 2D-MPHM: the first row is the trajectory diagram plotted when ( a , b ) = ( 5 , 8 ) ; the second row is trajectory diagram plotted when b = 8 ; the third row is trajectory diagram plotted when a = 5 .
Figure 5. Six trajectory diagrams for 2D-MPHM: the first row is the trajectory diagram plotted when ( a , b ) = ( 5 , 8 ) ; the second row is trajectory diagram plotted when b = 8 ; the third row is trajectory diagram plotted when a = 5 .
Micromachines 14 02090 g005
Figure 6. SE comparison for 2D-MPHM and four other newly proposed 2D maps.
Figure 6. SE comparison for 2D-MPHM and four other newly proposed 2D maps.
Micromachines 14 02090 g006
Figure 7. KE comparison for 2D-MPHM and four other newly proposed 2D maps.
Figure 7. KE comparison for 2D-MPHM and four other newly proposed 2D maps.
Micromachines 14 02090 g007
Figure 8. Encryption process of MIEA-MPHM.
Figure 8. Encryption process of MIEA-MPHM.
Micromachines 14 02090 g008
Figure 9. Visual effects of encryption and decryption: (a,d): six grayscale images and two color images; (b,e) encrypted ones generated by MIEA-MPHM; (c,f) decrypted ones generated by MIEA-MPHM.
Figure 9. Visual effects of encryption and decryption: (a,d): six grayscale images and two color images; (b,e) encrypted ones generated by MIEA-MPHM; (c,f) decrypted ones generated by MIEA-MPHM.
Micromachines 14 02090 g009
Figure 10. Key sensitivity test results for MIEA-MPHM: (a) 4.2.05 and 4.2.06; (b) ciphertext images generated with γ ( R ) = γ ( R ) + 1 ; (c) generated with x 0 ( R ) = x 0 ( R ) + 10 15 ; (d) y 0 ( R ) = y 0 ( R ) + 10 15 ; (e) a ( R ) = a ( R ) + 10 15 ; (f) b ( R ) = b ( R ) + 10 15 ; (g) original ciphertext images of 4.2.05 and 4.2.06; (h) differences between (b,g); (i) differences between (c,g); (j) differences between (d,g); (k) differences between (e,g); (l) differences between (f,g).
Figure 10. Key sensitivity test results for MIEA-MPHM: (a) 4.2.05 and 4.2.06; (b) ciphertext images generated with γ ( R ) = γ ( R ) + 1 ; (c) generated with x 0 ( R ) = x 0 ( R ) + 10 15 ; (d) y 0 ( R ) = y 0 ( R ) + 10 15 ; (e) a ( R ) = a ( R ) + 10 15 ; (f) b ( R ) = b ( R ) + 10 15 ; (g) original ciphertext images of 4.2.05 and 4.2.06; (h) differences between (b,g); (i) differences between (c,g); (j) differences between (d,g); (k) differences between (e,g); (l) differences between (f,g).
Micromachines 14 02090 g010
Figure 11. Plaintext sensitivity test results for MIEA-MPHM: (a) the first set of input images 4.1.06 and 4.1.08; (b) one pixel bit located at (1,1,1) in 4.1.06 was changed; (c) difference between (a,b); (d) ciphertext of (a); (e) ciphertext of (b); (f) difference between (d,e); (g) the second set of input images 4.1.04 and 4.1.05; (h) one pixel bit located at (256,256,3) in 4.1.05 was changed; (i) difference between (g,h); (j) ciphertext of (g); (k) ciphertext of (h); (l) difference between (j,k).
Figure 11. Plaintext sensitivity test results for MIEA-MPHM: (a) the first set of input images 4.1.06 and 4.1.08; (b) one pixel bit located at (1,1,1) in 4.1.06 was changed; (c) difference between (a,b); (d) ciphertext of (a); (e) ciphertext of (b); (f) difference between (d,e); (g) the second set of input images 4.1.04 and 4.1.05; (h) one pixel bit located at (256,256,3) in 4.1.05 was changed; (i) difference between (g,h); (j) ciphertext of (g); (k) ciphertext of (h); (l) difference between (j,k).
Micromachines 14 02090 g011
Figure 12. NPCR test results of MIEA-MPHM and four state-of-the-art algorithms [48,49,50,51].
Figure 12. NPCR test results of MIEA-MPHM and four state-of-the-art algorithms [48,49,50,51].
Micromachines 14 02090 g012
Figure 13. UACI test results of MIEA-MPHM and four state-of-the-art algorithms [48,49,50,51].
Figure 13. UACI test results of MIEA-MPHM and four state-of-the-art algorithms [48,49,50,51].
Micromachines 14 02090 g013
Figure 14. Three-dimensional pixel distribution diagrams of input images and their ciphertext images: (a) beeflowr; (bd) are three diagrams for R, G, and B channels of (a); (e) ciphertext of (a); (fh) are diagrams for (e); (i) barnfall; (jl) are diagrams for (i); (m) ciphertext of (i); (np) are diagrams for (m).
Figure 14. Three-dimensional pixel distribution diagrams of input images and their ciphertext images: (a) beeflowr; (bd) are three diagrams for R, G, and B channels of (a); (e) ciphertext of (a); (fh) are diagrams for (e); (i) barnfall; (jl) are diagrams for (i); (m) ciphertext of (i); (np) are diagrams for (m).
Micromachines 14 02090 g014
Figure 15. Pixel correlation analysis diagrams of input images and their ciphertext counterparts: (a) 4.1.04; (b) is the diagram for (a) in horizontal direction; (c) is the diagram for (a) in vertical direction; (d) is the diagram for (a) in diagonal direction; (e) 4.1.05; (fh) are three diagrams for (e) in three directions; (i) ciphertext of 4.1.04; (jl) are three diagrams for (i); (m) ciphertext of 4.1.05; (np) are three diagrams for (m).
Figure 15. Pixel correlation analysis diagrams of input images and their ciphertext counterparts: (a) 4.1.04; (b) is the diagram for (a) in horizontal direction; (c) is the diagram for (a) in vertical direction; (d) is the diagram for (a) in diagonal direction; (e) 4.1.05; (fh) are three diagrams for (e) in three directions; (i) ciphertext of 4.1.04; (jl) are three diagrams for (i); (m) ciphertext of 4.1.05; (np) are three diagrams for (m).
Micromachines 14 02090 g015
Figure 16. Robustness analysis on noise for MIEA-MPHM: (a) ciphertext images with salt-and-pepper noise of intensity 0.02; (b) noise of intensity 0.04; (c) noise of intensity 0.06; (d) noise of intensity 0.08; (e) noise of intensity 0.10; (fj) are decrypted images of (ae).
Figure 16. Robustness analysis on noise for MIEA-MPHM: (a) ciphertext images with salt-and-pepper noise of intensity 0.02; (b) noise of intensity 0.04; (c) noise of intensity 0.06; (d) noise of intensity 0.08; (e) noise of intensity 0.10; (fj) are decrypted images of (ae).
Micromachines 14 02090 g016
Figure 17. Robustness analysis on data loss for MIEA-MPHM: (a) 512 × 384 pixels missing in red channel; (b) 512 × 384 pixels missing in blue channel; (c) 128 × 128 pixels missing in all channels; (d) 192 × 192 × 6 pixels missing; (e) 224 × 224 × 6 pixels missing; (fj) are decrypted images of (ae).
Figure 17. Robustness analysis on data loss for MIEA-MPHM: (a) 512 × 384 pixels missing in red channel; (b) 512 × 384 pixels missing in blue channel; (c) 128 × 128 pixels missing in all channels; (d) 192 × 192 × 6 pixels missing; (e) 224 × 224 × 6 pixels missing; (fj) are decrypted images of (ae).
Micromachines 14 02090 g017
Table 1. NPCR test results of MIEA-MPHM and four state-of-the-art algorithms.
Table 1. NPCR test results of MIEA-MPHM and four state-of-the-art algorithms.
SizeNameMIEA-MPHM[48][49][50][51]
256 × 256 5.1.0999.609499.600299.602999.613999.5880
5.1.1099.617099.602399.597199.620199.6094
5.1.1199.610199.580999.609799.592699.6189
5.1.1299.597299.592699.626399.594199.6178
5.1.1399.614099.616599.612199.598799.5956
5.1.1499.607899.589599.605699.589599.6075
512 × 512 5.2.0899.613199.591199.604799.636899.6490
5.2.1099.620199.606399.612599.612499.6033
7.1.0299.598799.604099.619899.600799.6170
7.1.0499.615599.621699.612999.623199.5804
7.1.0699.604899.661399.609899.630799.6246
7.1.0899.601799.597299.622199.600299.6231
Average99.609199.605399.611399.609099.6112
Std. Dev.0.00730.02100.00840.01640.0183
Table 2. UACI test results of MIEA-MPHM and four state-of-the-art algorithms.
Table 2. UACI test results of MIEA-MPHM and four state-of-the-art algorithms.
SizeNameMIEA-MPHM[48][49][50][51]
256 × 256 5.1.0933.482733.481833.487033.452533.4658
5.1.1033.460433.491933.479733.470133.4801
5.1.1133.444633.450733.445233.478733.5077
5.1.1233.486633.390133.480233.467033.4835
5.1.1333.469533.454133.473333.472733.5054
5.1.1433.468233.418333.473833.475133.4667
512 × 512 5.2.0833.461733.462633.478633.487233.4622
5.2.1033.439133.514033.448333.475633.4639
7.1.0233.497133.518033.443433.466133.4628
7.1.0433.459433.411333.480533.532533.4683
7.1.0633.494933.418133.445133.456933.5229
7.1.0833.454833.614033.513433.439733.4205
Average33.468333.468733.470733.474733.4758
Std. Dev.0.01870.06140.02130.02280.0269
Table 3. IE test results of MIEA-MPHM.
Table 3. IE test results of MIEA-MPHM.
SizeNameOriginalCiphertext
256 × 256 5.1.096.70937.9978
5.1.107.31187.9978
5.1.116.45237.9980
5.1.126.70577.9978
5.1.131.54837.9979
5.1.147.34247.9978
512 × 512 5.2.087.20107.9994
5.2.105.70567.9994
7.1.024.00457.9993
7.1.046.10747.9993
7.1.066.69537.9993
7.1.085.05347.9994
Table 4. IE values of MIEA-MPHM and other encryption algorithms.
Table 4. IE values of MIEA-MPHM and other encryption algorithms.
AlgorithmIE
MIEA-MPHM7.9994
[48]7.9992
[50]7.9992
[51]7.9993
[52]7.9993
[53]7.9993
[54]7.9993
[55]7.9976
[56]7.9984
Table 5. Obtained CC values for MIEA-MPHM.
Table 5. Obtained CC values for MIEA-MPHM.
SizeNameOriginalCiphertext
HVDHVD
256 × 256 5.1.090.94070.90050.90640.0036−0.00050.0008
5.1.100.85890.90680.81440.0006−0.00260.0010
5.1.110.94140.95190.89280.00380.00290.0013
5.1.120.96970.95120.9379−0.0015−0.0027−0.0015
5.1.130.87220.87410.7587−0.0009−0.00140.0029
5.1.140.89630.94780.8445−0.00240.00120.0019
512 × 512 5.2.080.90530.94650.85620.0024−0.0023−0.0003
5.2.100.92760.93840.9018−0.00100.00110.0020
7.1.020.95580.94200.90070.0012−0.0027−0.0001
7.1.040.96500.97850.95800.00170.0010−0.0007
7.1.060.91060.94240.8806−0.00140.00040.0022
7.1.080.92770.95940.92220.0016−0.00170.0011
Table 6. Encryption times (rates) of MIEA-MPHM and six recent algorithms.
Table 6. Encryption times (rates) of MIEA-MPHM and six recent algorithms.
Algorithm 256 × 256 512 × 512 1024 × 1024 Average
[50]0.4341 s1.7586 s7.1223 s
(1.1518 Mbps)(1.1373 Mbps)(1.1232 Mbps)(1.1374 Mbps)
[52]0.0768 s0.3213 s1.3806 s
(6.5104 Mbps)(6.2247 Mbps)(5.7946 Mbps)(6.1766 Mbps)
[53]0.0203 s0.0878 s0.3755 s
(24.6305 Mbps)(22.7790 Mbps)(21.3049 Mbps)(22.9048 Mbps)
[55]0.1524 s0.6313 s2.5712 s
(3.2808 Mbps)(3.1681 Mbps)(3.1114 Mbps)(3.1868 Mbps)
[57]0.0915 s0.4088 s2.0314 s
(5.4645 Mbps)(4.8924 Mbps)(3.9382 Mbps)(4.7650 Mbps)
[58]0.0800 s0.4842 s2.2848 s
(6.2500 Mbps)(4.1305 Mbps)(3.5014 Mbps)(4.6273 Mbps)
MIEA-MPHM0.0051 s0.0231 s0.1036 s
(98.0392 Mbps)(86.5801 Mbps)(77.2201 Mbps)(87.2798 Mbps)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qian, K.; Xiao, Y.; Wei, Y.; Liu, D.; Wang, Q.; Feng, W. A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application. Micromachines 2023, 14, 2090. https://doi.org/10.3390/mi14112090

AMA Style

Qian K, Xiao Y, Wei Y, Liu D, Wang Q, Feng W. A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application. Micromachines. 2023; 14(11):2090. https://doi.org/10.3390/mi14112090

Chicago/Turabian Style

Qian, Kun, Yang Xiao, Yinjie Wei, Di Liu, Quanwen Wang, and Wei Feng. 2023. "A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application" Micromachines 14, no. 11: 2090. https://doi.org/10.3390/mi14112090

APA Style

Qian, K., Xiao, Y., Wei, Y., Liu, D., Wang, Q., & Feng, W. (2023). A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application. Micromachines, 14(11), 2090. https://doi.org/10.3390/mi14112090

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop