Next Article in Journal
Mathematical Modeling of the Impact of Desert Dust on Asthma Dynamics
Previous Article in Journal
A Study of Global Dynamics and Oscillatory Behavior of Rational-Type Nonlinear Fuzzy Difference Equations with Exponential Decay
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic Analysis and Application of 6D Multistable Memristive Chaotic System with Wide Range of Hyperchaotic States

1
School of Physics and Electronic Science, Changsha University of Science and Technology, Changsha 410114, China
2
School of Computer Science and Technology, Changsha University of Science and Technology, Changsha 410076, China
3
School of Information Engineering, Changsha Medical University, Changsha 410219, China
4
School of Electronic Information, Central South University, Changsha 410083, China
*
Author to whom correspondence should be addressed.
Axioms 2025, 14(8), 638; https://doi.org/10.3390/axioms14080638
Submission received: 10 July 2025 / Revised: 11 August 2025 / Accepted: 14 August 2025 / Published: 15 August 2025
(This article belongs to the Special Issue Nonlinear Dynamical System and Its Applications)

Abstract

In this study, we present a novel, six-dimensional, multistable, memristive, hyperchaotic system model demonstrating two positive Lyapunov exponents. With the maximum Lyapunov exponents surpassing 21, the developed system shows pronounced hyperchaotic behavior. The dynamical behavior was analyzed through phase portraits, bifurcation diagrams, and Lyapunov exponent spectra. Parameter b was a key factor in regulating the dynamical behavior of the system, mainly affecting the strength and direction of the influence of z 1 on z 2 . It was found that when the system parameter b was within a wide range of [ 13 , 300 ] , the system remained hyperchaotic throughout. Analytical establishment of multistability mechanisms was achieved through invariance analysis of the state variables under specific coordinate transformations. Furthermore, offset boosting control was realized by strategically modulating the fifth state variable, z 5 . The FPGA-based experimental results demonstrated that attractors observed via an oscilloscope were in close agreement with numerical simulations. To validate the system’s reliability for cybersecurity applications, we designed a novel image encryption method utilizing this hyperchaotic model. The information entropy of the proposed encryption algorithm was closer to the theoretical maximum value of 8. This indicated that the system can effectively disrupt statistical patterns. Experimental outcomes confirmed that the proposed image encryption method based on the hyperchaotic system exhibits both efficiency and reliability.

1. Introduction

The origin of chaos theory can be traced back to 1963, when Lorenz [1] discovered one of the earliest chaotic systems in the world while studying air flow problems. Subsequently, research on and applications of chaos theory in the field of nonlinear systems have been widely conducted. In recent years, new chaotic systems have been widely used and studied in the fields of secure communication [2,3,4], system synchronization and control [5,6,7], nonlinear circuits [8,9,10], neural networks [11,12,13], and image encryption [14,15,16]. For three decades, researchers have conducted in-depth explorations of chaotic systems with different types of structures, like chaotic neural networks [17,18,19], discrete chaotic mapping [20,21,22], conservative chaotic systems [23,24,25], and memristive chaotic systems [26,27,28].
Hyperchaotic systems have at least two positive Lyapunov exponents, so hyperchaos is seemingly more random than chaos and oscillations are more complex [29,30,31]. Both chaotic and hyperchaotic systems can be used for secure communication, but hyperchaotic systems are more difficult to decipher than chaotic systems, so hyperchaos is more suitable for secure communication [32,33,34]. Benkouider et al. introduced an innovative, four-dimensional (4D) hyperchaotic system characterized by enhanced dynamical complexity, capable of producing diverse regimes including chaotic oscillations, hyperchaotic states, periodic patterns, and quasi-periodic dynamics through parameter modulation [35]. Zhang et al. proposed a 4D hyperchaotic system with symmetry of topologically attractive substructures in which the inverse multiplication bifurcation and multi-stability phenomena from four periods to two periods to one period are discovered [36]. Based on the 5D Euler equation, Huang et al. proposed a 5D, Hamiltonian, conserved, hyperchaotic system that can have different types of coordinate transformations and time-reversal symmetries [24]. Compared with low-dimensional chaotic systems, high-dimensional chaotic systems have higher mathematical model complexity and larger parameter sets [34]. The complexity of a mathematical model refers to its high dimensionality, multiple nonlinearities, and large number of parameters [37]. Therefore, constructing a higher dimensional hyperchaotic system is an important and challenging task. Based on the modified 3D Lorentz equations, Kopp et al. constructed a new, 6D, hyperchaotic system using the state feedback control method, which produces topologically more complex attractors with a double-winged butterfly structure [38].
In 1971, Leon O. Chua first proposed the nonlinear, passive memristor based on the relationship between magnetic flux and charge. Subsequently, memristors have been widely used in the design of chaotic circuits, and their nonlinearity and memory performance can cause memristor chaotic systems to produce a variety of chaotic attractors and exhibit complex and rich dynamic behaviors [39,40,41]. By adding memristors to a 4D, conservative, chaotic system, a novel 5D, conservative, memristive, hyperchaotic system was proposed in [23], which exhibits hyperchaos and multistability in a wide range of parameters and initial values, accompanied by transient quasi-periodic phenomena. In [42], a 5D, fractional-order, memristive, hyperchaotic system with multiple coexisting attractors was constructed by coupling the magnetron memristor with dimension expansion. In [43], a 6D, memristive, hyperchaotic system with four-wing attractors was proposed by adding magnetron memristors to the 5D, continuous, chaotic system.
In recent years, the analysis of multistable characteristics has become a research hotspot. Multistability means that under the condition of fixed system parameters, when the initial conditions change, the system will produce independent coexisting attractors or topologies of different shapes [44]. Multistability is a common phenomenon in nonlinear systems and reflects the state diversity and structure diversity of a system. Building upon the classical Jerk framework, Wang et al. developed an enhanced, multistable, chaotic system through trigonometric nonlinearity integration, exhibiting unbounded coexisting attractor generation via tangent-based bifurcation control [45]. Zhang et al. proposed a novel, memristive, multiscroll, multistable neural network in which a multistable threshold memristor is used to describe the effects of external electromagnetic radiation [46]. Yuan et al. constructed a neurodynamic, small-world architecture employing Rulkov mapping units, demonstrating initial condition-dependent multimodality that spanned synchronous regimes, chaotic itinerancy, and metastable chimera patterns [47]. Concurrently, Lai et al. engineered a non-ideal memristive oscillator with programmable, piecewise-linear state transitions, achieving topological control of scroll attractors through reel number parameterization and spontaneous decomposition into bistable, double-scroll configurations [48].
FPGAs offer high customizability, parallelism, and reconfigurability, making them ideal for rapid prototyping and efficient real-time implementation of complex chaotic systems. Mohamed Maazouz et al. implemented a chaos-based image encryption algorithm on FPGA [49]. Guohao Pan et al. observed all phenomena associated with coexisting attractors by selecting initial conditions in their FPGA-based implementation [50]. Xiangguang Sun et al. verified the practical feasibility of their dynamic information flow control framework through hardware implementation on FPGA, achieving a throughput of 500 Mbps [51].
This study constructed a 6D, memristive, multistable, hyperchaotic system (MMHS) by integrating a memristor into a 5D hyperchaotic framework. The proposed system demonstrates rich nonlinear phenomena including hyperchaos and multistability across extensive parameter ranges and initial conditions. The principal contributions are summarized as follows:
(1)
A novel, 6D, MMHS architecture was developed, with its hyperchaotic characteristics rigorously verified through the analysis of the Lyapunov exponent spectrum and the quantification of the Kaplan–Yorke dimension. Under specific parameters, the 6D MMHS exhibits either two positive Lyapunov exponents with the maximum exceeding 21 or three positive Lyapunov exponents with the maximum exceeding 4. By analyzing the Lyapunov exponents and Kaplan–Yorke dimension when the parameter b was within a wide range of [ 13 , 300 ] , its hyperchaotic characteristics over the wide range were verified.
(2)
Multistability mechanisms were analytically established through invariance analysis of state variables under specific coordinate transformations. Offset boosting control was successfully implemented via strategic modulation of the fifth state variable ( z 5 ).
(3)
By discretizing the 6D MMHS and performing numerical simulation on an FPGA, the experimental results showed that the attractor on the oscilloscope closely resembled the software simulation results.
(4)
An image encryption scheme derived from the 6D MMHS was proposed, with its cryptographic security systematically evaluated through statistical and differential analyses.
From the summary discussed above, this paper is structured as follows: In Section 2, a novel, 6D MMHS is introduced, characterized by three positive Lyapunov exponents, with the maximum exceeding 21, highlighting its enhanced dynamic complexity. The fundamental dynamical properties of the system were systematically analyzed by evaluating the stability of its equilibrium points. Numerical simulations were performed to obtain the Lyapunov exponents, bifurcation diagrams, and phase portraits of the system under variations of parameters a, b, c, and d. The simulation results reveal that the system transitions gradually from periodic to hyperchaotic states as a, b, c, and d increase. Furthermore, this study demonstrates that the 6D MMHS exhibits multistability with coexisting attractors. Offset-boosting control is successfully achieved by adjusting the state variable z 5 . Section 3 presents an implementation of the system based on a Field-Programmable Gate Array (FPGA), where attractors observed on an oscilloscope showed excellent agreement with numerical simulations. In Section 4, we propose a new image encryption method based on this hyperchaotic system. The experimental results demonstrated the effectiveness and reliability of the encryption system based on the proposed hyperchaotic system. Section 5 summarizes the results and insights from the previous discussions.

2. A 6D, Multistable, Memristive, Hyperchaotic System

2.1. Mathematical Description of the New System

A memristor is regarded as the fourth fundamental electrical element and it is a kind of nonlinear resistor. Based on the fundamental principles of memristor theory and the classification of memristors [52], a flux-controlled memristor can be determined as follows:
i = W ( φ ) v = m + 3 n φ 2 v d φ d t = v
where φ represents the internal state of the memristor and W ( φ ) = m + 3 n φ 2 represents the memductance. i and v represent the output current and input voltage, respectively, while m and n are two adjustable positive parameters within the memristor. Obviously, the memristor in Formula (1) conforms to the definition of an ideal memristor [53].
Traditionally, memristive super-chaos systems have been constructed in four, five, and six dimensions by extending lower-dimensional chaotic systems with additional state variables and memristive nonlinearities. In four-dimensional systems, a memristor is typically introduced to a classical three-dimensional chaotic system, resulting in richer dynamic behaviors such as hyperchaos and multistability. Five-dimensional systems further increase complexity by adding another state variable or coupling term, often leading to more intricate attractor structures and enhanced control capabilities. Six-dimensional memristive super-chaos systems, such as the one proposed in this paper, are developed by incorporating additional feedback loops and nonlinear interactions, which significantly expand the system’s dynamic range and potential for engineering applications. These higher-dimensional extensions allow for the exploration of more complex chaotic phenomena and provide a broader platform for applications in secure communications, encryption, and random number generation.
Memristors, as nonlinear circuit elements with memory, have been widely used to enrich the dynamics of chaotic systems due to their flux-controlled or charge-controlled characteristics [54,55]. In particular, flux-controlled memristor models are often employed, where the memristor’s conductance depends on the time integral of the applied voltage. By introducing a memristor into a lower-dimensional chaotic system, it is possible to increase the system’s dimensionality and generate more complex behaviors such as multistability and hyperchaos.
In this work, we started from the five-dimensional hyperchaotic system described in Ref. [56] and extended it by incorporating the electromagnetic induction current provided by a flux-controlled memristor. Specifically, the input voltage v was identified with the state variable z 4 and the internal state φ of the memristor was introduced as a new state variable, z 6 . This approach allowed the memristive effect to directly influence the system’s dynamics, leading to the construction of a novel, six-dimensional, multistable, memristive, hyperchaotic system (6D MMHS) as described below.
Therefore, by introducing the electromagnetic induction current provided by the memristor into the system described in Ref. [56], a 6D MMHS could be constructed. The input voltage v was regarded as z 4 and the internal state φ of the memristor was treated as a new state variable of the system. Based on the above descriptions, we propose a novel, 6D MMHS described by the following dynamical equations:
z ˙ 1 = a ( z 2 z 1 ) + z 2 z 3 + z 4 z ˙ 2 = z 1 ( b z 3 ) + c z 4 z ˙ 3 = z 1 2 + z 2 z 1 d z 3 z ˙ 4 = z 2 + z 6 z ˙ 5 = z 6 z 5 + k W ( z 6 ) z 4 z ˙ 6 = z 4
where W ( z 6 ) = m + 3 n z 6 2 . In Equation (2), z 1 , z 2 , z 3 , z 4 , z 5 , and z 6 are all state variables. The coupling and control parameters are a, b, c, and d and all of them have positive values. Parameters a , b , c , and d are all used to regulate the dynamical behavior of the system. They can serve as bifurcation parameters to adjust the overall dynamical characteristics of the system, which is demonstrated in the subsequent sections of this paper. The memristor strength is defined by k.
Numerical analysis under the parameterization
a = 50 , b = 190 , c = 100 , d = 21 , k = 1 , m = 0.1 , n = 0.01
reveals that system (2) initialized at Z ( 0 ) = ( 1 , 1 , 1 , 1 , 1 , 1 ) attains strong hyperchaoticity, characterized by three positive Lyapunov and MLE exponents exceeding 21.
The hyperchaotic attractor of the new, 6D MMHS is illustrated in the phase portrait shown in Figure 1. To provide a clearer view of the system’s evolution, the time series of all six state variables in the interval from 200 s to 250 s are presented in Figure 2. The phase portrait was constructed based on these time series data: specifically, by plotting one state variable against another (for example, z 1 versus z 2 ) at each time point within the selected interval. In this way, the phase portrait visualized the trajectory of the system in the state space, revealing the complex structure and dynamic behavior of the hyperchaotic attractor. To further analyze the frequency characteristics of the system, we computed and plotted the power spectrum density (PSD) of four representative state variables ( z 1 , z 2 , z 4 , and z 5 ) over the interval 200–250 s. As shown in Figure 3, all four variables exhibited broadband spectra without dominant frequency peaks, which is a typical feature of hyperchaotic systems. This result further confirms the complex and aperiodic nature of the 6D MMHS.
Figure 4a presents the Poincaré section of the system on the z 1 = 0 plane, where the intersection points are projected onto the ( z 2 , z 3 ) plane. The points are densely and irregularly distributed, forming a clear fractal-like structure. This intricate pattern is a hallmark of chaotic dynamics, indicating sensitive dependence on initial conditions and the absence of periodic or quasi-periodic motion. Figure 4b shows the Poincaré section on the z 4 = 0 plane, with the intersection points projected onto the ( z 5 , z 6 ) plane. Here, the points are also densely scattered, forming a cloud-like distribution without any discernible regularity or closed curves. This further confirms the presence of chaos in the system, as such a distribution is typical for chaotic attractors. Together, these Poincaré sections provide rigorous and visual evidence that the system exhibits chaotic behavior under the given parameter settings.
Under the same parameter conditions, with the total simulation time set to T = 10 4 s, the Lyapunov exponents of the 6D MMHS were calculated in MATLAB 2018b. The calculation followed the classical algorithm proposed by Wolf et al., which integrates the original ODE system together with its variational equations and applies the Gram–Schmidt orthonormalization procedure at regular time intervals. This method tracks the divergence of nearby trajectories in the phase space and computes the exponents as the time-averaged growth rates of infinitesimal perturbations along different directions. The algorithm operates directly on the full set of state variables and their linearized equations, so the embedding dimension is equal to the number of state variables (six in this case), and no time delay is required. Using this approach, the following Lyapunov exponents were obtained:
L E 1 = 21.6825 L E 2 = 0.1079 L E 3 = 0 L E 4 = 0.0083 L E 5 = 1.0000 L E 6 = 92.7858
The Kaplan–Yorke dimension of the 6D MMHS was calculated as follows:
D K Y = 5 + L E 1 + L E 2 + L E 3 + L E 4 + L E 5 | L E 6 | = 5.224
From Equation (4), we deduce that the 6D MMHS is a hyperchaotic system with three positive Lyapunov exponents. Given the large value of the maximum Lyapunov exponent (MLE) in Equation (4), we conclude that the 6D MMHS exhibits strong hyperchaotic behavior, which is highly beneficial for applications of hyperchaotic systems in image encryption and secure communications. The time-varying Lyapunov exponents plot of system (2) is shown in Figure 5. As can be seen from Figure 5, the Lyapunov exponents exhibited an oscillatory state within the first 2000 s, gradually stabilized after 2000 s, and ultimately maintained a state with two positive Lyapunov exponents. Figure 5a describes the evolution of the L E 2 , 3 and L E 4 Lyapunov exponents over time, while Figure 5b depicts the temporal changes of the L E 1 , 5 and L E 6 Lyapunov exponents. The caption indicates that when T = 10 4 s , the values of the system’s Lyapunov exponents were as shown.
Table 1 presents the Lyapunov exponents and Kaplan–Yorke dimension of the new system (2) in comparison with other 6D and 5D hyperchaotic systems. It can be observed that the new system (2) possesses three positive Lyapunov exponents, with its first Lyapunov exponent being significantly larger than those of other reported 6D and 5D systems. This indicates that the trajectories of the new system diverge more rapidly than those of other systems. Furthermore, the Kaplan–Yorke dimension of the new system (2) is substantially higher than those of most 6D hyperchaotic systems. These characteristics demonstrate that this novel, 6D MMHS exhibits stronger chaotic properties than many reported 6D hyperchaotic systems, making it a valuable addition to the family of hyperchaotic systems. Its distinctive features render it particularly suitable for chaos-based applications.
The 6D MMHS exhibits sustained hyperchaotic behavior across extensive parameter ranges. As demonstrated in Figure 6a,b, with fixed parameters a = 50 , c = 100 , d = 21 , k = 1 , m = 0.1 , n = 0.01 and initial conditions Z ( 0 ) = ( 1 , 1 , 1 , 1 , 1 , 1 ) , the system maintained persistent hyperchaos for b [ 13 , 300 ] . The detailed quantification in Figure 6c,d reveals the following:
  • Peak MLE: L E max 23 within b [ 205 , 240 ] ;
  • Maximum Kaplan–Yorke dimension: D K Y > 5.23 .
When extending b to ( 300 , 500 ) , the system transitioned to intermittent chaos (non-persistent hyperchaos) while preserving D K Y > 1 . To demonstrate the hyperchaotic characteristics of the 6D MMHS within the wide parameter range of b [ 13 , 300 ] , Figure 7a shows the L E 1 , L E 2 , and L E 3 values over this interval. It can be seen that the values of L E 1 and L E 2 always remained greater than 0, indicating that the system maintained hyperchaos within this interval. In some sub-intervals, L E 3 was also greater than 0, suggesting that the system exhibited extreme hyperchaos (i.e., three positive Lyapunov exponents) in intervals where L E 3 > 0 .
Moreover, traditional chaotic systems require parameters to be confined within specific intervals or initial values to generate chaotic behavior; otherwise, the systems may exit chaotic states and enter periodic, convergent, or divergent regimes, thereby limiting their applicability in control engineering and related domains. As demonstrated by the comparative analysis in Table 2, the 6D MMHSs with broader parameter adaptability exhibit superior performance in sustaining hyperchaotic characteristics under diverse operational conditions compared to conventional chaotic systems. This observation highlights their notable advantages in dynamic stability.
All numerical simulations in this work were performed using MATLAB’s built-in ode45 function, which is based on an explicit Runge–Kutta (4,5) formula, the Dormand–Prince pair. The time step and integration interval were chosen to ensure both accuracy and computational efficiency. Initial conditions and parameter values are specified in the corresponding figure captions and text. For visualization of high-dimensional dynamics, phase portraits, bifurcation diagrams, and Poincaré sections were plotted.
Figure 6. When the initial condition was Z ( 0 ) = ( 1 , 1 , 1 , 1 , 1 , 1 ) and the parameter settings were ( a , c , d , k , m , n ) = ( 50 , 100 , 21 , 1 , 0.1 , 0.01 ) , the plots of Lyapunov exponents (a,c) and Kaplan–Yorke dimension varied with parameter b (b,d).
Figure 6. When the initial condition was Z ( 0 ) = ( 1 , 1 , 1 , 1 , 1 , 1 ) and the parameter settings were ( a , c , d , k , m , n ) = ( 50 , 100 , 21 , 1 , 0.1 , 0.01 ) , the plots of Lyapunov exponents (a,c) and Kaplan–Yorke dimension varied with parameter b (b,d).
Axioms 14 00638 g006
Figure 7. When b [ 13 , 300 ] , the values of L E 1 , L E 2 , and L E 3 were within this interval.
Figure 7. When b [ 13 , 300 ] , the values of L E 1 , L E 2 , and L E 3 were within this interval.
Axioms 14 00638 g007

2.2. Equilibrium Point and Stability

The equilibrium points of the system (2) were determined by solving equations:
a ( z 2 z 1 ) + z 2 z 3 + z 4 = 0 z 1 ( b z 3 ) + c z 4 = 0 z 1 2 + z 2 z 1 d z 3 = 0 z 2 + z 6 = 0 z 6 z 5 + k W ( z 6 ) z 4 = 0 z 4 = 0
Clearly, E 0 = 0 R 6 is an equilibrium point.
A simple calculation shows that there are two more equilibrium points given by
E 1 , 2 = ± λ ± a a + b λ b 0 ± a a + b λ ± a a + b λ
where
λ = d b ( a + b ) 2 a + b
For ease of calculation, we set the system parameters as ( a , b , c , d , k , m , n ) = ( 40 , 90 , 16 , 15 , 1 , 0.1 , 0.01 ) . At this point, the system remained in a hyperchaotic state, with its Lyapunov exponents being ( L E 1 , L E 2 , L E 3 , L E 4 , L E 5 , L E 6 ) = ( 12.6350 , 0.0538 , 0.0237 , 0.0024 , 1.0000 , 67.6724 ) . Under these conditions, λ = d b ( a + b ) 2 a + b = 32.1302 . Also, the three equilibrium points of the system (2) were obtained as
E 0 = ( 0 , 0 , 0 , 0 , 0 , 0 ) E 1 = ( 32.1302 , 9.8862 , 90 , 0 , 9.8862 , 9.8862 ) E 2 = ( 32.1302 , 9.8862 , 90 , 0 , 9.8862 , 9.8862 )
Based on system (2), it was not difficult to write out its Jacobian matrix as follows:
Jac = a a + z 3 z 2 1 0 0 b z 3 0 z 1 c 0 0 2 z 1 + z 2 z 1 d 0 0 0 0 1 0 0 0 1 0 0 0 k ( 3 n z 6 2 + m ) 1 6 k n z 4 z 6 + 1 0 0 0 1 0 0
First, we calculated the eigenvalues of system (2) at the equilibrium point E 0 = ( 0 , 0 , 0 , 0 , 0 , 0 ) . At this point, the parameters and state variables in the Jacobian matrix were all determined, and the six corresponding eigenvalues could be obtained as follows:
λ 1 = 1.0000 λ 2 = 83.1884 λ 3 = 42.9844 λ 4 = 0.1020 + 0.9982 i λ 5 = 0.1020 0.9982 i λ 6 = 15.0000
Calculations showed that the eigenvalue spectrum consisted of three negative real eigenvalues ( λ 1 = 1.0000 , λ 2 = 83.1884 , and λ 6 = 15.0000 ), one positive real eigenvalue ( λ 3 = 42.9844 ), and a pair of complex conjugate eigenvalues with positive real parts ( λ 4 , 5 = 0.1020 ± 0.9982 i ). According to linear stability theory [68], this equilibrium point is classified as a high-dimensional saddle-focus, characterized by a 3D stable manifold governed by the contracting modes associated with the negative real eigenvalues and a 3D unstable manifold dominated by the expanding mode from the positive real eigenvalue and the spiral divergence induced by the complex eigenvalues. The positive real parts of the complex eigenvalues indicate the presence of locally unstable oscillatory dynamics near the equilibrium, while the positive real eigenvalue λ 3 drives rapid exponential instability along a specific direction. This configuration implies that trajectories in the vicinity of the equilibrium will transiently converge along the stable manifold while escaping via a hybrid multimodal mechanism coupling of spiral divergence with unidirectional exponential growth along the unstable manifold, consistent with phase-space bifurcation mechanisms observed in classical saddle-focus structures [69]. These linearized dynamics establish a foundation for the further investigation of global, nonlinear phenomena in the system, such as chaotic attractors or heteroclinic orbits.
Next, we calculated the eigenvalues of system (2) at the equilibrium point E 1 = ( 32.1302 , 9.8862 , 90 , 0 , 9.8862 , 9.8862 ) . At this point, the system parameters in the Jacobian matrix were already determined. By substituting the calculated equilibrium point E 1 into the Jacobian matrix, the six corresponding eigenvalues could be obtained as follows:
λ 1 = 1.0000 λ 2 = 89.0773 λ 3 = 17.0322 + 60.5004 i λ 4 = 17.0322 60.5004 i λ 5 = 0.0064 + 0.9987 i λ 6 = 0.0064 0.9987 i
The analysis results indicated that the eigenvalue spectrum contained two negative real eigenvalues ( λ 1 = 1.0000 and λ 2 = 89.0773 ) and two pairs of complex conjugate eigenvalues with positive real parts: a high-frequency oscillatory mode ( λ 3 , 4 = 17.0322 ± 60.5004 i ) and a low-frequency weakly unstable mode ( λ 5 , 6 = 0.0064 ± 0.9987 i ). This configuration classifies the equilibrium as a high-dimensional saddle-focus, characterized by a 2D stable manifold (attracting trajectories via the negative real eigenvalues) and a 4D unstable manifold dominated by two distinct oscillatory instabilities. The dominant instability ( λ 3 , 4 ) exhibits rapid exponential growth with strong oscillatory divergence ( | Im ( λ ) | Re ( λ ) ), while the marginally positive real parts of λ 5 , 6 suggest a metastable regime where trajectories transiently follow weakly damped oscillations before escaping the equilibrium neighborhood. Such spectral structure aligns with bifurcation scenarios involving multiscale chaos or intermittent bursting, as the coexistence of high- and low-frequency unstable modes often induces complex transient dynamics and heteroclinic connections in nonlinear systems [70]. These results underscore the equilibrium’s role as an organizing center for nonstationary behavior, providing a foundation for analyzing global phenomena such as chaotic attractors or transient turbulence in subsequent nonlinear studies.
After calculation, for the equilibrium point E 2 , its corresponding eigenvalue spectrum was also obtained by Equation (12). The system admitted an exact involution symmetry under transformation ( z 1 , z 2 , z 3 , z 4 , z 5 , z 6 ) ( z 1 , z 2 , z 3 , z 4 , z 5 , z 6 ) , as verified by the invariance of the governing equations. This symmetry enforced the pairwise emergence of equilibria E 1 = ( 32.1302 , 9.8862 , 90 , 0 , 9.8862 , 9.8862 ) and E 2 = ( 32.1302 , 9.8862 , 90 , 0 , 9.8862 , 9.8862 ) , which were mapped onto one another by the transformation. The Jacobian matrices at E 1 and E 2 were related by a similarity transformation J ( E 2 ) = P · J ( E 1 ) · P 1 , where P = diag ( 1 , 1 , 1 , 1 , 1 , 1 ) encoded the coordinate inversion. Since similarity transformations preserve eigenvalues, we had the spectral equivalence of E 1 and E 2 . Specifically, the identical sets of two negative real eigenvalues (−1.0000, −89.0773) and two pairs of complex-conjugate eigenvalues with positive real parts ( 17.0322 ± 60.5004 i , 0.0064 ± 0.9987 i ) arose directly from this symmetry. Such eigenvalue degeneracy ensured that both equilibria shared identical local stability properties, with 2D stable manifolds and 4D unstable manifolds. The coexistence of symmetric saddle-foci suggested the potential for heteroclinic connections between E 1 and E 2 , a configuration known to underpin complex global dynamics, including chaos and transient metastability, in systems with reflectional symmetries [71,72].
In the study of six-dimensional dynamical systems, the local stability of equilibrium points is determined by the eigenvalue distribution of the Jacobian matrix. Based on the signs of the real parts and the complex nature of the eigenvalues, we established a comprehensive classification system for equilibrium points, comprising 16 topological types. In the stability distribution diagrams on the two-dimensional parameter plane ( a , b ) [ 40 , 40 ] × [ 90 , 90 ] (Figure 8b for the E 1 stability distribution; Figure 8a for the E 0 stability distribution), the types of equilibrium points were rigorously classified according to their topological structure as follows:
  • Stable Node (SN, dark blue regions): All eigenvalues of the Jacobian matrix had negative real parts and were purely real. Trajectories in the phase space exhibited exponential convergence along a six-dimensional stable manifold without oscillation.
  • Stable Focus (SF, light blue regions): All eigenvalues had negative real parts but contained complex conjugate pairs. Trajectories displayed spiral convergence with damped oscillatory characteristics.
  • Unstable Node (UN, dark red regions): All eigenvalues had positive real parts and were purely real. Trajectories diverged exponentially along a six-dimensional, unstable manifold.
  • Unstable Focus (UF, light red regions): All eigenvalues had positive real parts but contained complex conjugate pairs. Trajectories exhibited diverging spiral patterns with amplifying oscillations.
  • Saddle Point with d i m = 1 (S1, dark green regions): Featured one eigenvalue with a positive real part (one-dimensional unstable manifold) and five eigenvalues with negative real parts (five-dimensional stable manifold), all real. Trajectories diverged along one dimension while converging along five dimensions.
  • Saddle-Focus with d i m = 1 (SF1, light green regions): Contained one real eigenvalue with a positive real part (one-dimensional unstable manifold) and complex conjugate pairs with negative real parts (five-dimensional stable manifold with spiral convergence).
  • Saddle Point with d i m = 2 (S2, bright yellow regions): Two real eigenvalues with positive real parts (two-dimensional unstable manifold) and four real eigenvalues with negative real parts (four-dimensional stable manifold).
  • Saddle-Focus with d i m = 2 (SF2, light yellow regions): The two-dimensional unstable manifold or four-dimensional stable manifold contained complex eigenvalues, inducing spiral motion in corresponding subspaces.
  • Saddle Point with d i m = 3 (S3, orange regions): Three real eigenvalues with positive real parts (three-dimensional unstable manifold) and three real eigenvalues with negative real parts (three-dimensional stable manifold).
  • Saddle-Focus with d i m = 3 (SF3, light orange regions): The three-dimensional unstable manifold or stable manifold contained complex eigenvalues. This configuration could induce chaos when satisfying Shilnikov conditions.
  • Saddle Point with d i m = 4 (S4, purple regions): Four real eigenvalues with positive real parts (four-dimensional unstable manifold) and two real eigenvalues with negative real parts (two-dimensional stable manifold).
  • Saddle-Focus with d i m = 4 (SF4, pale purple regions): The four-dimensional unstable manifold or two-dimensional stable manifold contained complex eigenvalues, forming a high-dimensional spiral saddle structure.
  • Saddle Point with d i m = 5 (S5, dark gray regions): Five real eigenvalues with positive real parts (five-dimensional unstable manifold) and one real eigenvalue with negative real part (one-dimensional stable manifold).
  • Saddle-Focus with d i m = 5 (SF5, light gray regions): The five-dimensional unstable manifold contained complex eigenvalues, producing spiral divergence within strongly repulsive domains.
  • Critical Point (CP, black regions): At least one eigenvalue had a real part approaching zero, corresponding to bifurcation points (e.g., Hopf bifurcation, fold bifurcation).
  • Non-existent (NE, white regions): Exclusive to E 1 , undefined when b ( a + b ) ( 2 a + b ) < 0 or 2 a + b = 0 (i.e., when λ did not exist in the set of real numbers.). Under these conditions, the system possessed only the E 0 equilibrium point.
Due to the symmetric properties of the system, equilibrium points E 1 and E 2 shared identical eigenvalues, resulting in identical stability distribution diagrams.
Figure 8. (a) Stability classification of equilibrium point E 0 ; (b) stability classification and existence domain of non-trivial equilibrium E 1 .
Figure 8. (a) Stability classification of equilibrium point E 0 ; (b) stability classification and existence domain of non-trivial equilibrium E 1 .
Axioms 14 00638 g008

2.3. Dynamical Behavior When System Parameters Changed

2.3.1. When a and b Changed

When parameters a and b changed, the system exhibited rich dynamic behavior. We start this discussion with a.
We investigated the dynamical characteristics of the 6D MMHS with parameter a increasing in the interval [ 10 , 40 ] while other parameters remain fixed at b = 90 , c = 16 , d = 12 , k = 1 , m = 0.1 , and n = 0.01 . The initial condition was set to ( 1 , 1 , 1 , 1 , 1 , 1 ) . Numerical simulations revealed significant behavioral variations in system (2) under different values of a. As illustrated in the bifurcation diagram (Figure 9a) and the Lyapunov exponent spectrum (Figure 9b), the 6D MMHS exhibited periodic behavior (with near-zero MLE), chaotic behavior (with one positive Lyapunov exponent), hyperchaotic behavior (with two positive Lyapunov exponents), or extreme hyperchaotic behavior (with two positive Lyapunov exponents and exceptionally high MLE), depending on the control parameter a.
When a [ 10 , 10.57 ] , the state of the system was easily affected by the parameter a. At this time, the system jumped back and forth between the periodic and chaotic states. When a [ 10.57 , 12.88 ] [ 13.63 , 14.2 ] , the maximum Lyapunov exponent (MLE) of the system was always less than 0, and the system was in a periodic state. When the parameter a [ 12.88 , 13.63 ] [ 14.2 , 20.4 ] , the system returned to the state of jumping back and forth between the periodic and chaotic states. Moreover, if the system was in the chaotic state at this time, it had only one positive Lyapunov exponent. Figure 9c,d shows the bifurcation diagrams with parameters a [ 15.7 , 15.95 ] and a [ 16.05 , 16.25 ] , respectively. With parameter a [ 20.4 , 40 ] , the system was in a hyper-chaotic state, but it jumped back and forth between the states with two positive Lyapunov exponents and three positive Lyapunov exponents.
When other parameters were fixed as ( b , c , d , k , m , n ) = ( 90 , 16 , 12 , 1 , 0.1 , 0.01 ) and the initial condition of the system was still set as ( 1 , 1 , 1 , 1 , 1 , 1 ) , changing the value of a caused the system to exhibit rich, dynamic changes. When a = 12 , the system was in a periodic state, and its periodic attractor is shown in Figure 10a. The Lyapunov exponents of the system were ( L E 1 , L E 2 , L E 3 , L E 4 , L E 5 , L E 6 ) = ( 0 , 0.12 , 0.12 , 1.00 , 11.88 , 11.89 ) . When a = 19, the system was in a chaotic state, and its chaotic attractor is shown in Figure 10b. The Lyapunov exponents of the system were ( L E 1 , L E 2 , L E 3 , L E 4 , L E 5 , L E 6 ) = ( 0.012 , 0 , 0.25 , 1.00 , 3.48 , 27.28 ) . When a = 25, the system was in a hyperchaotic state with two positive Lyapunov exponents, and its hyperchaotic attractor is shown in Figure 10c. At this time, the Lyapunov exponents of the system were ( L E 1 , L E 2 , L E 3 , L E 4 , L E 5 , L E 6 ) = ( 10.41 , 0.03 , 0 , 0.01 , 1.00 , 47.44 ) . When a = 39.8, the system was in an extreme hyperchaotic state with three positive Lyapunov exponents, and its hyperchaotic attractor is shown in Figure 10d. At this time, the Lyapunov exponents of the system were ( L E 1 , L E 2 , L E 3 , L E 4 , L E 5 , L E 6 ) = ( 11.82 , 0.06 , 0.02 , 0 , 1.00 , 63.69 ) .
Next, we will discuss the system behavior when the parameter b changed.
Numerical simulations revealed that the 6D system (2) exhibited diverse dynamical behaviors as the parameter b increased within the interval [ 0 , 90 ] while other parameters remained fixed at a = 40 , c = 16 , d = 12 , k = 1 , m = 0.1 , and n = 0.01 . As evidenced by the bifurcation analysis in Figure 11a and Lyapunov exponent in Figure 11b, system (2) underwent four distinct dynamical transitions when varying parameter b: periodic oscillations, dual-exponent hyperchaos (two positive Lyapunov exponents), triply unstable hyperchaos (three positive exponents), and equilibrium stabilization.
Concerning the parameter b within the interval [5, 20], the corresponding bifurcation diagram and Lyapunov exponent spectrum are shown in Figure 11c and Figure 11d, respectively. It can be observed that when b lay in the ranges [0, 8.5] and [10, 14.34], the Maximum Lyapunov Exponent (MLE) of the system remained below zero, indicating that the system was in a periodic state. Figure 12a demonstrates the periodic attractor when b = 4 . When b fell within [8.5, 10], the MLE alternated between positive and negative values, revealing that the system underwent intermittent transitions between chaotic and periodic states. Figure 12b displays the point attractor observed at b = 10 . For b in [14.34, 90], the system exhibited hyperchaotic behavior characterized by an MLE greater than zero and at least two positive Lyapunov exponents. The hyperchaotic attractors are respectively illustrated in Figure 12c,d: Figure 12c shows the attractor with two positive Lyapunov exponents at b = 16 , while Figure 12d presents the attractor possessing three positive Lyapunov exponents at b = 40 .

2.3.2. When c and d Changed

When parameters c and d varied individually, the system’s dynamical behavior was highly sensitive. Let us first examine the effect of parameter c.
We investigated the dynamical evolution of the system as parameter c increased within the interval [0, 30] while keeping other parameters fixed at ( a , b , d , k , m , n ) = ( 40 , 90 , 0.8 , 1 , 0.1 , 0.01 ) and maintaining the initial conditions ( 1 , 1 , 1 , 1 , 1 , 1 ) . Figure 13a,b present the bifurcation diagram and the corresponding Lyapunov exponent spectrum for c [ 0 , 30 ] , respectively. The results revealed that the system underwent transitions between periodic, chaotic, and hyperchaotic states as c varied. Figure 14a,b depict hyperchaotic attractors in the ( z 1 , z 2 ) -plane at c = 1 and c = 28 , respectively. Figure 14c shows a chaotic attractor in the ( z 1 , z 2 ) -plane at c = 14 , while Figure 14d displays a 3D chaotic attractor in the z 2 - z 1 - z 3 phase space at c = 14.3 . Additionally, Figure 14e,f illustrate periodic attractors in the ( z 1 , z 3 ) -plane at c = 11 and in the ( z 1 , z 2 ) -plane at c = 13 , respectively.
Next, we turn to a discussion of parameter d.
Concerning the fixing of parameters ( a , b , c , k , m , n ) = ( 40 , 90 , 16 , 1 , 0.1 , 0.01 ) and maintaining the initial system conditions ( 1 , 1 , 1 , 1 , 1 , 1 ) , the bifurcation diagram and Lyapunov exponent spectrum of the system for d [ 0 , 15 ] are shown in Figure 15a and Figure 15b, respectively. When d lay in the interval [0, 1.1], the system oscillated between periodic and chaotic states. However, for d > 1.1 , the system transitioned to a hyperchaotic state. The corresponding bifurcation diagram and Lyapunov exponent spectrum for d [ 0 , 1.5 ] are presented in Figure 15c,d. Figure 16a,b display phase portraits at d = 0.7 and d = 1 , respectively, where the Maximum Lyapunov Exponent (MLE) remained below zero, indicating periodic behavior. Figure 16c,d illustrate the chaotic attractors in the ( z 1 , z 3 ) -plane and the 3D z 2 - z 1 - z 3 phase space at d = 0.34 . Meanwhile, Figure 16e,f demonstrate hyperchaotic attractors in the ( z 1 , z 3 ) -plane at d = 1.3 and d = 1.4 , respectively.

2.3.3. Multistability and Coexistence of Attractors

Multistability or coexisting attractors represent a nonlinear phenomenon where two or more distinct attractors emerge simultaneously from different initial points [73,74,75]. Numerical simulations revealed that the new, 6D MMHS (2) exhibited rich coexisting attractor behaviors. The system showed the coexistence of two periodic attractors, two chaotic attractors, or two hyperchaotic attractors, depending on the parameter values.
The 6D MMHS (2) remained invariant under the following coordinate transformation: ( z 1 , z 2 , z 3 , z 4 ,   z 5 , z 6 ) ( z 1 , z 2 , z 3 , z 4 , z 5 , z 6 ) . This symmetry allowed for the observation of attractor coexistence through appropriate initial point selection. This transformation was mentioned earlier. Let Z 0 = ( 1 , 1 , 1 , 1 , 1 , 1 ) and W 0 = ( 1 , 1 , 1 , 1 , 1 , 1 ) denote two distinct initial points, with blue/red orbits representing state trajectories from Z 0 / W 0 , respectively.
For parameters a = 40, b = 8, c = 16, d = 12, k = 1, m = 0.1, and n = 0.01, the system exhibited two coexisting periodic attractors (Figure 17a): blue for Z 0 ; red for W 0 .
With parameters a = 20.3, b = 90, c = 16, d = 12, k = 1, m = 0.1, and n = 0.01, the system displayed two coexisting chaotic attractors (Figure 17b) characterized by Lyapunov exponents:
L E 1 = 0.2183 L E 2 = 0 L E 3 = 0.0882 L E 4 = 0.9997 L E 5 = 1.0113 L E 6 = 31.4155
Figure 17. (a) Coexisting periodic attractors in the ( z 1 , z 3 ) plane; (b) coexisting chaotic attractors in the ( z 1 , z 3 ) plane; (c) coexisting hyperchaotic attractors with two positive LEs in the ( z 1 , z 3 ) plane; (d) coexisting hyperchaotic attractors with three positive LEs in the ( z 1 , z 3 ) plane; (e) coexisting hyperchaotic attractors with three positive LEs in the ( z 1 , z 2 ) plane; (f) coexisting hyperchaotic attractors with three positive LEs in the z 1 z 2 z 3 space.
Figure 17. (a) Coexisting periodic attractors in the ( z 1 , z 3 ) plane; (b) coexisting chaotic attractors in the ( z 1 , z 3 ) plane; (c) coexisting hyperchaotic attractors with two positive LEs in the ( z 1 , z 3 ) plane; (d) coexisting hyperchaotic attractors with three positive LEs in the ( z 1 , z 3 ) plane; (e) coexisting hyperchaotic attractors with three positive LEs in the ( z 1 , z 2 ) plane; (f) coexisting hyperchaotic attractors with three positive LEs in the z 1 z 2 z 3 space.
Axioms 14 00638 g017
When parameters a = 40, b = 15, c = 16, d = 12, k = 1, m = 0.1, and n = 0.01, the system generated two coexisting hyperchaotic attractors (Figure 17c) with Lyapunov exponents:
L E 1 = 0.2496 L E 2 = 0.1153 L E 3 = 0 L E 4 = 1.0024 L E 5 = 1.6194 L E 6 = 50.7398
Fixing parameters a = 40, b = 41, c = 16, d = 12, k = 1, m = 0.1, and n = 0.01, the system presented two coexisting hyperchaotic attractors (Figure 17d) with Lyapunov exponents:
L E 1 = 4.4553 L E 2 = 0.1681 L E 3 = 0.1006 L E 4 = 0 L E 5 = 1.0000 L E 6 = 56.7186
Figure 17e and Figure 17f respectively depict the phase portraits of hyperchaotic attractors with three positive Lyapunov exponents in the z 1 z 2 plane and the 3D phase portraits in the z 1 z 2 z 3 space.
Figure 18 illustrates the bifurcation diagrams of the system with respect to parameter a for four representative values of b: (a) b = 8 , (b) b = 90 , (c) b = 15 , and (d) b = 41 , while the other parameters were fixed as c = 16 , d = 12 , k = 1 , m = 0.1 , and n = 0.01 . For each case, the bifurcation diagrams are plotted for two symmetric initial conditions: ( 1 , 1 , 1 , 1 , 1 , 1 ) (blue) and ( 1 , 1 , 1 , 1 , 1 , 1 ) (red). Due to the system’s inherent symmetry, multistability emerged; however, the dynamical behaviors corresponding to these symmetric initial conditions were not identical. As shown in Figure 18, the bifurcation diagrams for the two initial conditions display distinct branches and attractor structures, further confirming the coexistence of multiple attractors and the system’s rich multistable dynamics. These results demonstrate that even under symmetric initial conditions, the system can evolve into different dynamical regimes, which is a hallmark of symmetry-induced multistability.

2.3.4. Offset Boosting Control

Offset boosting control enables amplitude manipulation through state-embedded parametric tuning, where introducing a controlled variable (p) induces spatial translation of a system’s attractor. This bidirectional displacement (along z 5 axes) preserves a system’s fundamental dynamic characteristics while achieving quantitative position control without altering its intrinsic stability properties.
Since the fifth state variable z 5 of the 6D MMHS (2) appeared exclusively in the fifth equation, this system exhibited variable-boostable hyperchaotic characteristics, with z 5 being fully controllable. Enhancement of z 5 could thus be achieved by substituting z 5 with z 5 + p .
For offset-boosting control, the 6D MMHS (2) could be rewritten as
z ˙ 1 = a ( z 2 z 1 ) + z 2 z 3 + z 4 z ˙ 2 = z 1 ( b z 3 ) + c z 4 z ˙ 3 = z 1 2 + z 2 z 1 d z 3 z ˙ 4 = z 2 + z 6 z ˙ 5 = z 6 ( z 5 + p ) + k W ( z 6 ) z 4 z ˙ 6 = z 4
where p serves as the offset-boosting controller.
When the parameters were set to ( a , b , c , d , k , m , n ) = ( 40 , 90 , 16 , 12 , 1 , 0.1 , 0.01 ) and the initial state was Z 0 = ( 1 , 1 , 1 , 1 , 1 , 1 ) , the offset-boosted hyperchaotic attractors of the 6D system (16) were obtained as shown in Figure 19. Figure 19a and Figure 19b respectively depict the phase portraits of hyperchaotic attractors in the ( z 2 , z 5 ) plane and the phase-space z 2 z 5 z 1 for different values of p: negative p shifted the attractor in the positive direction, while positive p shifted it in the negative direction. Consequently, the hyperchaotic signal z 5 transitioned from a bipolar to a unipolar hyperchaotic signal, as demonstrated in the time-series plot of Figure 19c. This unique offset-boosting property holds significant promise for applications in secure communication and other engineering domains.

3. FPGA Implementation

Field-Programmable Gate Arrays (FPGAs) have gained increasing popularity due to their high customizability, parallel processing capabilities, and reconfigurability. These characteristics enable extremely low design and testing cycle costs for FPGA chips, making them particularly suitable for rapid prototyping and efficient implementation of highly complex dynamic chaotic systems where multiple variables interact in a highly nonlinear manner. In such scenarios, the parallel processing capacity of FPGAs facilitates more efficient computations, which is crucial for real-time concurrent processing and dynamic behavior analysis.
The FPGA hardware implementation of the 6D MMHS constitutes a significant research endeavor. In this study, for the FPGA hardware implementation, Vivado 2018.3 served as the primary development environment. The target platform was the ALINX AX7020 development board, which integrates the Xilinx XC7Z020-2CLG400I system-on-chip (SoC). This SoC features an ARM Cortex-A9 core running at 766 MHz and incorporates several key components: an image processing accelerator, internal and external memory controllers, and peripheral interfaces (Ethernet, SD/SDIO, UART), among others. Equipped with dual 40-pin (2.54 mm pitch) connectors, the AX7020 board utilized solely one row of pins in our experiment for routing chaotic signals to an oscilloscope. The post-implementation resource utilization report from Vivado 2018.3 is detailed in Table 3, demonstrating efficient hardware resource consumption. The moderate DSP utilization (37.27%) highlights the computational efficiency achieved in implementing the complex RK4 solver for the 6D system.
The numerical discretization of continuous chaotic systems frequently utilizes the classical fourth-order Runge–Kutta (RK4) algorithm. In contrast to the implicit Euler method, which possesses only first-order algebraic accuracy, the RK4 method achieves fourth-order algebraic precision, offering superior numerical solution accuracy and smaller error ranges in differential equation solving. This study implemented numerical simulations of the 6D MMHS on FPGA using the RK4 method, with its mathematical formulation described in Equation (17). The fixed-point arithmetic implementation utilized 32-bit precision (Q16.16 format) to balance computational accuracy with hardware resource constraints. The sampling frequency ( f s ) was configured at 463 kHz, derived from the primary clock period of 108 × 20 ns = 2.16 μ s within the C l k x module. To assess the impact of finite precision and discretization, the maximum absolute quantization error ( E q ) for state variables was bounded by E q 2 16 1.53 × 10 5 . Phase portrait comparisons between FPGA outputs and MATLAB double-precision simulations confirmed that this error margin did not induce qualitative changes in the observed hyperchaotic attractors or multistable dynamics.
K 1 = f ( x k , y k ) K 2 = f x k + h 2 , y k + K 1 2 K 3 = f x k + h 2 , y k + K 2 2 K 4 = f ( x k + h , y k + K 3 ) y k + 1 = y k + 1 6 ( K 1 + 2 K 2 + 2 K 3 + K 4 )
The implementation process is illustrated in Figure 20. In the C l k x clock module, the clock period was configured as 108 × 20 nanoseconds. Under stable output clock conditions, the original computation module within the X r e g register updated results after each initial value iteration, enabling cyclic iterations to generate stable chaotic signals. Subsequently, a digital-to-analog converter (DAC) transformed the generated digital signals into analog outputs for oscilloscope visualization. Following these procedures, the Vivado 2018.3 simulation platform was utilized for synthesis and implementation to generate a bitstream file, which was programmed into the development board’s chip. Upon connecting the board to an oscilloscope, the corresponding attractor phase diagrams were successfully generated. Figure 21a–d present the circuit implementation results of the 6D MMHS phase diagrams, demonstrating robust consistency with the MATLAB simulation results shown in Figure 1a and Figure 1b, respectively. This visual congruence, maintained across multiple independent experimental runs (>10) and different initial conditions corresponding to distinct attractors, validates the robustness and reproducibility of the FPGA implementation under the chosen discretization parameters (RK4, f s = 463 kHz) and the quantization scheme (Q16.16).

4. Image Encryption

In recent years, with the rapid development of technologies such as artificial intelligence and data networks [76,77,78,79,80], people have paid more attention to their privacy and data security. Chaotic systems have received extensive attention for generating pseudo-random sequences with superior statistical properties. Therefore, chaos-based cryptographic algorithms and their applications in digital image encryption have developed into an important research branch in cryptography [81,82].

4.1. Image Encryption Process

In this section, we propose an image encryption scheme based on a 6D MMHS. In the cipher-generation phase of the proposed algorithm, the input plaintext image was denoted as P, with a size of M × N . The keys were the initial values { x 0 , y 0 , z 0 , w 0 , u 0 , v 0 } of the hyperchaotic system and three 8-bit random numbers { r 1 , r 2 , r 3 } . We substituted the system initial values { x 0 , y 0 , z 0 , w 0 , u 0 , v 0 } into the proposed 6D multistable memristive hyperchaotic system and, through operations, obtained six vectors { x i , y i , z i , w i , u i , v i } of the required length. With the help of these six vectors, we generated three matrices, X, Y, and Z, for the subsequent encryption process. In the encryption process, we used matrix X for the first-step diffusion operation, converting the plaintext image P into matrix A. Using matrix Y to permute matrix A obtained from the first-step diffusion operation, we obtained the permuted matrix B. Using matrix Z for the second-step diffusion operation on the permuted matrix B, we obtained matrix C, which was the encrypted ciphertext image. The specific encryption process was as follows:
Step 1: Select a grayscale image with M N pixels represented in binary form as the original image P to be processed.
Step 2: Use the fourth-order classical Runge–Kutta method to numerically simulate the 6D, multistable, memristive, hyperchaotic system, generating the chaotic sequence { x i , y i , z i , w i , u i , v i } . Generate three matrices X, Y, and Z of size M × N using Equation (18) according to the state variables x, y, z, w, u, and v.
X ( i , j ) = floor ( ( x ( i 1 ) × N + j + z ( i 1 ) × N + j + u ( i 1 ) × N + j + 100 mod 1 ) × 10 13 ) mod 256 , i = 1 , 2 , , M , j = 1 , 2 , , N Y ( i , j ) = floor ( ( y ( i 1 ) × N + j + z ( i 1 ) × N + j + v ( i 1 ) × N + j + 100 mod 1 ) × 10 13 ) mod K , i = 1 , 2 , , M , j = 1 , 2 , , N Z ( i , j ) = floor ( ( x ( i 1 ) × N + j + w ( i 1 ) × N + j + u ( i 1 ) × N + j + 100 mod 1 ) × 10 13 ) mod 256 , i = 1 , 2 , , M , j = 1 , 2 , , N
where M and N are the dimensions of the image, K = max ( M , N ) , X and Z are used for plaintext-irrelevant diffusion operations, and Y is used for plaintext-dependent permutation operations.
Step 3: This step is the first diffusion operation of the encryption algorithm. The plaintext image P is transformed into matrix A through the diffusion operation defined in Equation (19) using matrix X.
A ( 1 , 1 ) = P ( 1 , 1 ) + X ( 1 , 1 ) + r 1 mod 256 A ( 1 , j ) = P ( 1 , j ) + A ( 1 , j 1 ) + X ( 1 , j ) mod 256 , j = 2 , 3 , , N A ( i , 1 ) = P ( i , 1 ) + A ( i 1 , 1 ) + X ( i , 1 ) mod 256 , i = 2 , 3 , , M A ( i , j ) = P ( i , j ) + A ( i , j 1 ) + A ( i 1 , j ) + X ( i , j ) mod 256 , i = 2 , 3 , , M , j = 2 , 3 , , N
The following Step 4–Step 6 describe the permutation operations of the encryption algorithm.
Step 4: Swap the positions of A ( i , j ) and A ( m , n ) , where the position ( m , n ) is obtained by Equation (20). The row M (columns 1 to N) and column N (rows 1 to M) of matrix A are excluded from the permutation.
m = Y ( i , j ) + Y ( i , N ) + A ( i , N ) + A ( M , N ) mod M , i = 1 , 2 , , M 1 , j = 1 , 2 , , N 1 n = Y ( i , j ) + Y ( M , j ) + A ( M , j ) + A ( M , N ) mod M , i = 1 , 2 , , M 1 , j = 1 , 2 , , N 1
If m = 0 or n = 0 is obtained, the corresponding A ( i , j ) does not participate in the permutation. The matrix after permutation is denoted as D.
Step 5: Permute D ( M , 1 to N 1 ) and D ( 1 to M , N ) . The specific permutation steps are as follows:
  • Let D ( M , N ) = ( D ( M , N ) + r 2 ) mod 256 .
  • Swap the positions of D ( M , j ) and D ( m , n ) , where m and n are obtained from Equation (21):
    m = Y ( M , j ) + Y ( M , N ) + D ( M , N ) mod M , j = 1 , 2 , , N 1 n = sum ( D ( 1 : o M 1 , j ) ) + Y ( M , N ) + D ( M , N ) mod N , j = 1 , 2 , , N 1
    Here, sum ( ) represents the summation of a vector. If m = 0 , n = 0 , or n = j is obtained, the position of the corresponding D ( i , j ) remains unchanged.
  • Swap the positions of D ( i , N ) and D ( m , n ) , where m and n are obtained from Equation (22):
    m = Y ( i , N ) + Y ( M , N ) + D ( M , N ) mod M , i = 1 , 2 , , M 1 n = sum ( D ( i , 1 : o N 1 ) ) + Y ( M , N ) + D ( M , N ) mod N , i = 1 , 2 , , M 1
    If m = 0 , n = 0 , or m = i is obtained, the position of the corresponding D ( i , j ) remains unchanged. After the above operations, matrix D is transformed into matrix E.
Step 6: Permute the position of E ( M , N ) . Swap the positions of E ( M , N ) and E ( m , n ) , where m and n are obtained from Equation (23):
m = sum ( Y ( M , 1 : o N 1 ) ) + sum ( E ( M , 1 : o N 1 ) ) mod M n = sum ( Y ( 1 : o M 1 , N ) ) + sum ( E ( 1 : o M 1 , N ) ) mod N
If m = 0 or n = 0 is obtained, the position of E ( M , N ) remains unchanged. After the above operations, matrix E is denoted as matrix B.
C ( M , N ) = B ( M , N ) + Z ( M , N ) + r 3 mod 256 C ( M , j ) = B ( M , j ) + C ( M , j + 1 ) + Z ( M , j ) mod 256 , j = N 1 , N 2 , , 2 , 1 C ( i , N ) = B ( i , N ) + C ( i + 1 , N ) + Z ( i , N ) mod 256 , i = M 1 , M 2 , , 2 , 1 C ( i , j ) = B ( i , j ) + C ( i , j + 1 ) + C ( i + 1 , j ) + Z ( i , j ) mod 256 , i = M 1 , M 2 , , 2 , 1 , j = N 1 , N 2 , , 2 , 1
Step 7: This step is the second diffusion operation of the encryption algorithm. Using matrix Z and performing the operation defined in Equation (24), we obtain the encrypted ciphertext image matrix C.
Figure 22 shows the image encryption process.

4.2. Performance and Security Analysis

4.2.1. Histogram Analysis

A histogram visualizes the spread of pixel intensities within an image. In secure image encryption, achieving a uniform histogram is a key objective as it provides strong resilience against statistical analysis-based attacks. Our evaluation employed two distinct image sets. The outcomes, presented in Figure 23, included the source images (Figure 23a,f), their encrypted counterparts (Figure 23b,g), and the pertinent histograms. The decrypted images are presented in Figure 23c,h. Figure 23d,i illustrate the histograms of the two groups of original images, while Figure 23e,j show the histograms of the encrypted images.
Visually, the encrypted images in Figure 23 exhibited flat histograms, while the histograms of the original images showed significant fluctuations. The χ 2 statistic was commonly used to quantitatively measure the difference between them. For a grayscale image with 256 gray levels and size M × N , we assumed that the frequency of pixel points for each gray value i in the histogram was f i . If the distribution was uniform, then g i = g = M N / 256 for i = 0 , 1 , 2 , , 255 , and we had
χ 2 = i = 0 255 ( f i g ) 2 g
This follows a χ 2 distribution with 255 degrees of freedom, given a significance level α such that
P χ 2 χ a 2 n 1 = α
A commonly used significance level is α = 0.05 , for which we obtain χ 0.05 2 ( 255 ) = 293.24783 . As shown in Table 4, the test statistics of the original images were significantly larger than χ 0.05 2 ( 255 ) , while those of the ciphertext images were all smaller than χ 0.05 2 ( 255 ) . It could be concluded that under the 0.05 significance level, the histogram distribution of the ciphertext images was approximately uniform.

4.2.2. Correlation Analysis of Adjacent Pixels

Furthermore, comparing the correlation traits in plaintext images with those in their encrypted versions was imperative. Generally, adjacent pixels in plaintext images exhibit strong correlations in horizontal, vertical, positive diagonal, and negative diagonal directions, whereas adjacent pixels in ciphertext images should show no such correlations. Suppose N pairs of adjacent pixels were randomly selected from the original image and that their grayscale values were denoted as ( u i , v i ) , where i = 1 , 2 , 3 , , N . The correlation coefficient between vectors u = { u i } and v = { v i } was calculated using the following Formula (27):
r x y = cov ( u , v ) D ( u ) D ( v ) cov ( u , v ) = 1 N i = 1 N ( x i E ( u ) ) ( y i E ( v ) ) D ( u ) = 1 N i = 1 N N u i E ( u ) 2 E ( u ) = 1 N i = 1 u i
Taking the Baboon image as an example, the calculation results are shown in Table 5. It can be seen from Table 5 that adjacent pixels in the plaintext image exhibited strong correlations, while those in the ciphertext image had correlations close to 0, indicating almost no correlation. Figure 24 visualizes adjacent pixel correlations in the plaintext and ciphertext Baboon images across four orientations: horizontal, vertical, and both positive and negative diagonals. In Figure 24, adjacent pixel pairs in the plaintext image are densely clustered along the y = x line in all directions, whereas those in the ciphertext image are uniformly distributed within the rectangular region in all directions. These findings align with the results in Table 5, demonstrating the algorithm’s effective encryption performance.

4.2.3. Information Entropy

Information entropy quantifies the uncertainty within image data. Theoretically, a higher entropy value signifies greater randomness, increased information content, and reduced visual structure. The defining equation for information entropy is presented as Equation (28).
H = i = 0 L p ( i ) log 2 p ( i )
In Equation (28), L represents the number of gray levels in the image and p ( i ) denotes the probability of occurrence of the gray value i. Table 6 presents the entropy values for the plaintext and ciphertext images of Lena, Baboon, and Pepper.
The entropy value for each ciphertext image approached the theoretical maximum of 8. Taking the Baboon image as an example, Table 7 compares the encryption algorithm proposed in this paper with existing methods from the literature. The results indicate that the information entropy of the proposed encryption algorithm is closer to the theoretical maximum of 8. This demonstrates that the system can effectively disrupt the statistical patterns of a plaintext image and efficiently conceal original image information, thereby protecting an image’s privacy and security.

4.2.4. Key Sensitivity Analysis

Within image encryption, key sensitivity analysis serves as a crucial security criterion. This metric quantifies the disparity in ciphertexts generated from encrypting the same plaintext image with slightly altered keys. If the two ciphertext images exhibit a significant difference, the image cryptosystem is said to have strong key sensitivity. Conversely, if the difference is minimal, the key sensitivity of the image cryptosystem is considered poor. NPCR (Number of Pixel Change Rate) and UACI (Unified Average Changing Intensity) are prevalent metrics for assessing key sensitivity. NPCR specifically evaluates the percentage rate of altered pixels resulting from a minimal key modification, as defined by Equation (29):
N P C R ( P 1 , P 2 ) = 1 M N i = 1 M j = 1 N S i g n ( P 1 ( i , j ) P 2 ( i , j ) ) × 100 %
UACI assesses key sensitivity by computing the mean intensity variation per pixel between two ciphertext images. Its defining equation is (30)
U A C I ( P 1 , P 2 ) = 1 M N i M j N P 1 ( i , j ) P 2 ( i , j ) 255 0 × 100 %
The key of the image encryption algorithm was K = { x 0 , y 0 , z 0 , w 0 , u 0 , v 0 , r 1 , r 2 , r 3 } . By slightly perturbing the initial values with a variation of 10 13 and encrypting the same image again, we obtained two ciphertext images. Finally, their NPCR and UACI values were calculated. The results are shown in Table 8. As indicated, the calculated values were close to the theoretical ones.

4.2.5. Plain Image Sensitivity Analysis

Plaintext sensitivity analysis involves encrypting two minimally distinct plaintexts with an identical key and comparing the resulting ciphertext differences. If the two ciphertext images exhibit significant differences, the image cryptosystem is said to have good plaintext sensitivity; conversely, if the differences are minimal, the system is considered to have weak plaintext sensitivity, which generally cannot resist chosen-plaintext attacks or known-plaintext attacks. Implementing stochastic perturbations at selective pixel positions produces functionally differentiable plaintexts from an original image. For example, a pixel ( i , j ) is randomly selected from a plaintext image P 1 , and its value P 1 ( i , j ) is changed by 1, such that the new value becomes ( P 1 ( i , j ) + 1 ) mod 256 , resulting in a slightly different plaintext image P 2 . As evidenced by Table 9, near-optimal NPCR and UACI values substantiate the plaintext attack resilience of the 6D MMHS encryption framework.

5. Conclusions

This study established a 6D MMHS by incorporating a memristor into a 5D hyperchaotic structure, demonstrating sustained hyperchaotic behavior and multistability across wide parameter ranges and diverse initial conditions. The hyperchaotic nature of the 6D MMHS was rigorously confirmed through Lyapunov exponent spectrum analysis and Kaplan–Yorke dimension quantification, with hyperchaos maintained even when the parameter b spanned the broad interval [13, 300]. The underlying mechanisms of multistability were analytically derived via invariance analysis of state variables under coordinate transformations, providing a theoretical foundation for coexisting attractors. Strategic modulation of the fifth state variable ( z 5 ) enabled effective offset boosting control, enhancing the system’s adaptability for dynamic applications. Hardware validation was achieved through FPGA-based implementation, where experimental attractors closely aligned with numerical simulations, verifying the system’s physical realizability. Furthermore, an image encryption scheme leveraging the 6D MMHS was proposed and rigorously evaluated, exhibiting cryptographic resilience through statistical uniformity, correlation coefficient minimization, and robust differential metrics (NPCR, UACI). These contributions underscore the 6D MMHS as a versatile framework for chaos-based engineering applications, with potential extensions to secure communication and nonlinear control systems. It is worth noting that, similar to other six-dimensional memristive super-chaos systems, this work calculated and analyzed key chaos statistical quantities, including phase portraits, Lyapunov exponent spectra, and bifurcation diagrams. In future studies, additional chaos-related measures such as correlation dimension, Kolmogorov–Sinai entropy, and permutation entropy could be further investigated to provide a more comprehensive understanding of the system’s complexity. The proposed 6D MMHS can also be further explored for applications such as secure wireless communication, random number generation, and nonlinear control. Optimizing the hardware implementation for higher speed and lower power consumption, as well as integrating the system into real-time embedded platforms, are promising directions. Additionally, further theoretical studies on the coexistence of attractors and parameter sensitivity, as well as extending the encryption framework to color images, video, or other multimedia data, could broaden the practical impact of this work.

Author Contributions

Conceptualization, methodology, writing—original draft, writing—reviewing and editing, supervision, F.Y.; methodology, formal analysis, writing—original draft, writing—reviewing and editing, software, validation, Y.M.G.; formal analysis, data curation, methodology, visualization, writing—original draft, writing—reviewing and editing, R.G.; methodology, visualization, Z.Y.; writing—reviewing and editing, J.X.; visualization, investigation, W.Y.; visualization, investigation, funding acquisition, project administration, J.J.; investigation, supervision, H.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Natural Science Foundation of Hunan Province under grant 2025JJ50368, the Scientific Research Fund of Hunan Provincial Education Department under grant 24A0248, the National Natural Science Foundation of China under grant 62273141, and the Guiding Science and Technology Plan Project of Changsha City under grant kzd2501129.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Lorenz, E.N. Deterministic Nonperiodic Flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef]
  2. Zhu, J.; Jin, J.; Chen, C.; Wu, L.; Lu, M.; Ouyang, A. A New-Type Zeroing Neural Network Model and Its Application in Dynamic Cryptography. IEEE Trans. Emerg. Top. Comput. Intell. 2025, 9, 176–191. [Google Scholar] [CrossRef]
  3. Deng, Q.; Wang, C.; Sun, Y.; Yang, G. Memristive multi-wing chaotic Hopfield neural network for LiDAR data security. Nonlinear Dyn. 2025, 113, 17161–17176. [Google Scholar] [CrossRef]
  4. Tan, F.; Zhou, L.; Zong, G.; Wang, Z.; Zhuang, G.; Shangguan, X. Fixed Time Control for Interlayer Synchronism under DDMNNs and Application in Secure Communication. IEEE Trans. Autom. Sci. Eng. 2025, 22, 10827–10834. [Google Scholar] [CrossRef]
  5. Zhou, L.; Liu, K.; Tan, F.; Zhang, H.; Li, C. Synchronization for security communication of multi-delay MNNs under uncertain parameters identification: An adaptive time-controllable approach. Nonlinear Dyn. 2025, 113, 13507–135221. [Google Scholar] [CrossRef]
  6. Hua, C.; Cao, X.; Liao, B. Real-Time Solutions for Dynamic Complex Matrix Inversion and Chaotic Control Using ODE-Based Neural Computing Methods. Comput. Intell. 2025, 41, e70042. [Google Scholar] [CrossRef]
  7. Jin, J.; Chen, W.; Ouyang, A.; Yu, F.; Liu, H. A time-varying fuzzy parameter zeroing neural network for the synchronization of chaotic systems. IEEE Trans. Emerg. Top. Comput. Intell. 2024, 8, 364–376. [Google Scholar] [CrossRef]
  8. Hong, Q.; Jiang, H.; Xiao, P.; Du, S.; Li, T. A Parallel Computing Scheme Utilizing Memristor Crossbars for Fast Corner Detection and Rotation Invariance in the ORB Algorithm. IEEE Trans. Comput. 2025, 74, 996–1010. [Google Scholar] [CrossRef]
  9. Xu, Q.; Ding, X.; Chen, B.; Parastesh, F.; Ho-Ching Iu, H.; Wang, N. A Universal Configuration Framework for Mem-Element-Emulator-Based Bionic Firing Circuits. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 71, 4120–4130. [Google Scholar] [CrossRef]
  10. Xiao, P.; Fang, J.; Wei, Z.; Dong, Y.; Du, S.; Wen, S.; Hong, Q. A Riccati Matrix Equation Solver Design Based Neurodynamics Method and Its Application. IEEE Trans. Autom. Sci. Eng. 2025, 22, 15163–15176. [Google Scholar] [CrossRef]
  11. Yu, F.; Zhang, S.; Su, D.; Wu, Y.; Gracia, Y.M.; Yin, H. Dynamic Analysis and Implementation of FPGA for a New 4D Fractional-Order Memristive Hopfield Neural Network. Fractal Fract. 2025, 9, 115. [Google Scholar] [CrossRef]
  12. Wang, C.; Li, Y.; Deng, Q. Discrete-time fractional-order local active memristor-based Hopfield neural network and its FPGA implementation. Chaos Solitons Fractals 2025, 193, 116053. [Google Scholar] [CrossRef]
  13. Yu, F.; He, S.; Yao, W.; Cai, S.; Xu, Q. Bursting Firings in Memristive Hopffeld Neural Network with Image Encryption and Hardware Implementation. IEEE Trans.-Comput.-Aided Des. Integr. Circuits Syst. 2025, 1–13. [Google Scholar] [CrossRef]
  14. Jin, J.; Wu, M.; Ouyang, A.; Li, K.; Chen, C. A Novel Dynamic Hill Cipher and Its Applications on Medical IoT. IEEE Internet Things J. 2025, 12, 14297–14308. [Google Scholar] [CrossRef]
  15. Gao, S.; Zhang, Z.; Iu, H.H.C.; Ding, S.; Mou, J.; Erkan, U.; Toktas, A.; Li, Q.; Wang, C.; Cao, Y. A Parallel Color Image Encryption Algorithm Based on a 2D Logistic-Rulkov Neuron Map. IEEE Internet Things J. 2025, 12, 18115–18124. [Google Scholar] [CrossRef]
  16. Feng, W.; Wang, Q.; Liu, H.; Ren, Y.; Zhang, J.; Zhang, S.; Qian, K.; Wen, H. Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption. Fractal Fract. 2023, 7, 887. [Google Scholar] [CrossRef]
  17. Deng, Q.; Wang, C.; Yang, G. Chaotic Dynamics of Memristor-Coupled Tabu Learning Neuronal Network. Int. J. Bifurc. Chaos 2025, 35, 2550053. [Google Scholar] [CrossRef]
  18. Xiang, Q.; Gong, H.; Hua, C. A new discrete-time denoising complex neurodynamics applied to dynamic complex generalized inverse matrices. J. Supercomput. 2025, 81, 159. [Google Scholar] [CrossRef]
  19. Lin, H.; Deng, X.; Yu, F.; Sun, Y. Diversified Butterfly Attractors of Memristive HNN With Two Memristive Systems and Application in IoMT for Privacy Protection. IEEE Trans.-Comput.-Aided Des. Integr. Circuits Syst. 2025, 44, 304–316. [Google Scholar] [CrossRef]
  20. Deng, Q.; Wang, C.; Yang, G.; Luo, D. Discrete Memristive Delay Feedback Rulkov Neuron Model: Chaotic Dynamics, Hardware Implementation and Application in Secure Communication. IEEE Internet Things J. 2025, 12, 25559–25567. [Google Scholar] [CrossRef]
  21. Gao, S.; Iu, H.H.C.; Erkan, U.; Simsek, C.; Toktas, A.; Cao, Y.; Wu, R.; Mou, J.; Li, Q.; Wang, C. A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption. IEEE Trans. Circuits Syst. Video Technol. 2025, 35, 7706–7718. [Google Scholar] [CrossRef]
  22. Deng, Q.; Wang, C.; Sun, Y.; Yang, G. Discrete Memristive Conservative Chaotic Map: Dynamics, Hardware Implementation, and Application in Secure Communication. IEEE Trans. Cybern. 2025, 55, 3926–3934. [Google Scholar] [CrossRef]
  23. Yu, F.; Tan, B.; He, T.; He, S.; Huang, Y.; Cai, S.; Lin, H. A Wide-Range Adjustable Conservative Memristive Hyperchaotic System with Transient Quasi-Periodic Characteristics and Encryption Application. Mathematics 2025, 13, 726. [Google Scholar] [CrossRef]
  24. Huang, L.L.; Ma, Y.H.; Li, C. Characteristic analysis of 5D symmetric Hamiltonian conservative hyperchaotic system with hidden multiple stability. Chin. Phys. B 2024, 33, 010503. [Google Scholar] [CrossRef]
  25. Yuan, Y.; Yu, F.; Tan, B.; Huang, Y.; Yao, W.; Cai, S.; Lin, H. A class of n-D Hamiltonian conservative chaotic systems with three-terminal memristor: Modeling, dynamical analysis, and FPGA implementation. Chaos 2025, 35, 013121. [Google Scholar] [CrossRef] [PubMed]
  26. Lai, Q.; Liu, Y.; Fortuna, L. Dynamical Analysis and Fixed-Time Synchronization for Secure Communication of Hidden Multiscroll Memristive Chaotic System. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 71, 4665–4675. [Google Scholar] [CrossRef]
  27. Xin, Z.J.; Lai, Q. Dynamical investigation and encryption application of a new multiscroll memristive chaotic system with rich offset boosting features. Chaos Solitons Fractals 2024, 181, 114696. [Google Scholar] [CrossRef]
  28. Shen, Y.; Li, Y.; Li, W.; Yao, Q.; Gao, H. Extremely multi-stable grid-scroll memristive chaotic system with omni-directional extended attractors and application of weak signal detection. Chaos Solitons Fractals 2025, 190, 115791. [Google Scholar] [CrossRef]
  29. Lai, Q.; Yang, L.; Chen, G. Design and performance analysis of discrete memristive hyperchaotic systems with stuffed cube attractors and ultraboosting behaviors. IEEE Trans. Ind. Electron. 2024, 71, 7819–7828. [Google Scholar] [CrossRef]
  30. Feng, W.; Zhang, J.; Chen, Y.; Qin, Z.; Zhang, Y.; Ahmad, M.; Woźniak, M. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst. Appl. 2024, 246, 123190. [Google Scholar] [CrossRef]
  31. Yu, F.; Su, D.; He, S.; Wu, Y.; Zhang, S.; Yin, H. Resonant tunneling diode cellular neural network with memristor coupling and its application in police forensic digital image protection. Chin. Phys. B 2025, 34, 050502. [Google Scholar] [CrossRef]
  32. Deshpande, A.S.; Daftardar-Gejji, V. Enhancing the security of image communication with a new hyper-chaotic system. Phys. Scr. 2024, 99, 115234. [Google Scholar] [CrossRef]
  33. Nabil, H.; Tayeb, H. A secure communication scheme based on generalized modified projective synchronization of a new 4-D fractional-order hyperchaotic system. Phys. Scr. 2024, 99, 095203. [Google Scholar] [CrossRef]
  34. Tang, Z.; Zhang, Y.; Luo, X.; Gou, X.; Xu, B.; Tang, S. n-Dimensional Hyperchaotic Discrete Maps With Desired Positive Lyapunov Exponents and Its Application in Secure Communication. IEEE Trans. Ind. Electron. 2024, 72, 6412–6421. [Google Scholar] [CrossRef]
  35. Benkouider, K.; Sambas, A.; Bonny, T.; Al Nassan, W.; Moghrabi, I.A.; Sulaiman, I.M.; Hassan, B.A.; Mamat, M. A comprehensive study of the novel 4D hyperchaotic system with self-exited multistability and application in the voice encryption. Sci. Rep. 2024, 14, 12993. [Google Scholar] [CrossRef]
  36. Zhang, J.; Bi, J.; Hou, J.; Xie, Q. Dynamical analysis, circuit realization, and applications of 4D hyperchaotic systems with bursty oscillations and infinite attractor coexistence. J. Supercomput. 2024, 80, 8767–8800. [Google Scholar] [CrossRef]
  37. Zhou, S.; Liu, H.; Ho-Ching Iu, H.; Erkan, U.; Toktas, A. Novel n-Dimensional Nondegenerate Discrete Hyperchaotic Map With Any Desired Lyapunov Exponents. IEEE Internet Things J. 2025, 12, 9082–9090. [Google Scholar] [CrossRef]
  38. Kopp, M.; Samuilik, I. A New 6D Two-wing Hyperhaotic System: Dynamical Analysis, Circuit Design, and Sinchronization. Chaos Theory Appl. 2024, 6, 273–283. [Google Scholar] [CrossRef]
  39. Yu, F.; Wu, C.; Xu, S.; Yao, W.; Xu, C.; Cai, S.; Wang, C. Color video encryption transmission in IoT based on memristive hopfield neural network. Signal Image Video Process. 2025, 19, 77. [Google Scholar] [CrossRef]
  40. Peng, Y.; Li, M.; Li, Z.; Ma, M.; Wang, M.; He, S. What is the impact of discrete memristor on the performance of neural network: A research on discrete memristor-based BP neural network. Neural Netw. 2025, 185, 107213. [Google Scholar] [CrossRef]
  41. Liu, X.; Mou, J.; Zhang, Y.; Cao, Y. A New Hyperchaotic Map Based on Discrete Memristor and Meminductor: Dynamics Analysis, Encryption Application, and DSP Implementation. IEEE Trans. Ind. Electron. 2024, 71, 5094–5104. [Google Scholar] [CrossRef]
  42. Yu, F.; Zhang, W.; Xiao, X.; Yao, W.; Cai, S.; Zhang, J.; Wang, C.; Li, Y. Dynamic analysis and field-programmable gate array implementation of a 5D fractional-order memristive hyperchaotic system with multiple coexisting attractors. Fractal Fract. 2024, 8, 271. [Google Scholar] [CrossRef]
  43. Hassan, A.; Zhou, L. A novel 6D four-wing memristive hyperchaotic system: Generalized fixed-time synchronization and its application in secure image encryption. Chaos Solitons Fractals 2025, 192, 115986. [Google Scholar] [CrossRef]
  44. Wan, Q.; Yang, Q.; Liu, T.; Chen, C.; Shen, K. Single direction, grid and spatial multi-scroll attractors in Hopfield neural network with the variable number memristive self-connected synapses. Chaos Solitons Fractals 2024, 189, 115584. [Google Scholar] [CrossRef]
  45. Wang, M.; Ding, J.; Li, J.; He, S.; Zhang, X.; Iu, H.H.C.; Li, Z. A novel multistable chaotic system with 2 m-scroll attractor and its application. Eur. Phys. J. Plus 2024, 139, 64. [Google Scholar] [CrossRef]
  46. Zhang, S.; Peng, X.; Wang, X.; Chen, C.; Zeng, Z. A Novel Memristive Multiscroll Multistable Neural Network With Application to Secure Medical Image Communication. IEEE Trans. Circuits Syst. Video Technol. 2025, 35, 1774–1786. [Google Scholar] [CrossRef]
  47. Yuan, Z.; Wu, Y.; Ou, C.; Zhong, P.; Zhao, X.; Ma, M. Dynamical behavior of SW-SW neural networks. Chinese J. Phys. 2025, 94, 108–120. [Google Scholar] [CrossRef]
  48. Lai, Q.; Liu, Y.; Chen, Z. Multiscroll chaos and extreme multistability of memristive chaotic system with application to image encryption. J. Vib. Eng. Technol. 2024, 12, 3487–3505. [Google Scholar] [CrossRef]
  49. Maazouz, M.; Toubal, A.; Bengherbia, B.; Houhou, O.; Batel, N. FPGA implementation of a chaos-based image encryption algorithm. J. King Saud-Univ.-Comput. Inf. Sci. 2022, 34, 9926–9941. [Google Scholar] [CrossRef]
  50. Pan, G.; Li, C.; Liu, W.; Xue, Y.; Qi, X. Countless coexisting chaotic attractors: From system construction to FPGA-based observation. Chaos Solitons Fractals 2025, 198, 116610. [Google Scholar] [CrossRef]
  51. Sun, X.; Zheng, J. A dynamic information flow control framework for hyperchaos in complex-variable systems and FPGA-based applications. Chaos Solitons Fractals 2025, 199, 116858. [Google Scholar] [CrossRef]
  52. Chua, L. Everything You Wish to Know About Memristors But Are Afraid to Ask. Radioengineering 2015, 24, 319–368. [Google Scholar] [CrossRef]
  53. Chua, L. If it’s pinched it’s a memristor. Semicond. Sci. Technol. 2014, 29, 104001. [Google Scholar] [CrossRef]
  54. Chua, L. Memristor-the missing circuit element. IEEE Trans. Circuit Theory 2003, 18, 507–519. [Google Scholar] [CrossRef]
  55. Chua, L. Resistance switching memories are memristors. In Handbook of Memristor Networks; Springer: Berlin/Heidelberg, Germany, 2019; pp. 197–230. [Google Scholar]
  56. Benkouider, K.; Vaidyanathan, S.; Sambas, A.; Tlelo-Cuautle, E.; Abd El-Latif, A.A.; Abd-El-Atty, B.; Bermudez-Marquez, C.F.; Sulaiman, I.M.; Awwal, A.M.; Kumam, P. A new 5-D multistable hyperchaotic system with three positive Lyapunov exponents: Bifurcation analysis, circuit design, FPGA realization and image encryption. IEEE Access 2022, 10, 90111–90132. [Google Scholar] [CrossRef]
  57. Wang, J.; Yu, W.; Wang, J.; Zhao, Y.; Zhang, J.; Jiang, D. A new six-dimensional hyperchaotic system and its secure communication circuit implementation. Int. J. Circuit Theory Appl. 2019, 47, 702–717. [Google Scholar] [CrossRef]
  58. Sabaghian, A.; Balochian, S.; Yaghoobi, M. Synchronisation of 6D hyper-chaotic system with unknown parameters in the presence of disturbance and parametric uncertainty with unknown bounds. Connect. Sci. 2020, 32, 362–383. [Google Scholar] [CrossRef]
  59. Kopp, M.; Kopp, A. A New 6D Chaotic Generator: Computer Modelling and Circuit Design. Int. J. Eng. Technol. Innov. 2022, 12, 288–307. [Google Scholar] [CrossRef]
  60. Das, B.D.C.; Patra, A.; Saha, A.; Sikder, S.S. Secured communication of multiple compressed infrared images using 6D hyper-chaotic encryption. J. Opt. 2024, 53, 4202–4214. [Google Scholar] [CrossRef]
  61. AL-Azzawi, S.F.; Al-Obeidi, A.S. Chaos synchronization in a new 6D hyperchaotic system with self-excited attractors and seventeen terms. Asian-Eur. J. Math. 2021, 14, 2150085. [Google Scholar] [CrossRef]
  62. Benkouider, K.; Bouden, T.; Yalcin, M.E.; Vaidyanathan, S. A new family of 5D, 6D, 7D and 8D hyperchaotic systems from the 4D hyperchaotic Vaidyanathan system, the dynamic analysis of the 8D hyperchaotic system with six positive Lyapunov exponents and an application to secure communication design. Int. J. Model. Identif. Control 2020, 35, 241–257. [Google Scholar] [CrossRef]
  63. Yang, J.; Feng, Z.; Liu, Z. A new five-dimensional hyperchaotic system with six coexisting attractors. Qual. Theory Dyn. Syst. 2021, 20, 1–31. [Google Scholar] [CrossRef]
  64. Ojoniyi, O.S.; Njah, A.N. A 5D hyperchaotic Sprott B system with coexisting hidden attractors. Chaos Solitons Fractals 2016, 87, 172–181. [Google Scholar] [CrossRef]
  65. Bao, B.; Jiang, T.; Xu, Q.; Chen, M.; Wu, H.; Hu, Y. Coexisting infinitely many attractors in active band-pass filter-based memristive circuit. Nonlinear Dyn. 2016, 86, 1711–1723. [Google Scholar] [CrossRef]
  66. Jia, H.; Shi, W.; Wang, L.; Qi, G. Energy analysis of Sprott-A system and generation of a new Hamiltonian conservative chaotic system with coexisting hidden attractors. Chaos Solitons Fractals 2020, 133, 109635. [Google Scholar] [CrossRef]
  67. Mahmoud, G.M.; Ahmed, M. Analysis of chaotic and hyperchaotic conservative complex nonlinear systems. Miskolc Math. Notes 2017, 18, 315–326. [Google Scholar] [CrossRef]
  68. Brandon, J. Introduction to Applied Nonlinear Dynamical Systems and Chaos; Wiggins, S., Ed.; DM98.00; Springer: Berlin/Heidelberg, Germany, 1990; p. 672. ISBN 3-540-9703-7. [Google Scholar]
  69. Kuznetsov, Y.A.; Kuznetsov, I.A.; Kuznetsov, Y. Elements of Applied Bifurcation Theory; Springer: Berlin/Heidelberg, Germany, 1998; Volume 112. [Google Scholar]
  70. Kuznetsov, Y.A. Elements of applied bifurcation theory. Appl. Math. Sci. 2004, 288, 715–730. [Google Scholar]
  71. Golubitsky, M.; Stewart, I. The Symmetry Perspective; Birkhäuser: Basel, Switzerland, 2002. [Google Scholar]
  72. Ashwin, P.; Orosz, G.; Borresen, J. Heteroclinic Switching in Coupled Oscillator Networks: Dynamics on Odd Graphs; Springer: Berlin/Heidelberg, Germany, 2010. [Google Scholar]
  73. Lai, Q.; Lai, C.; Zhang, H.; Li, C. Hidden coexisting hyperchaos of new memristive neuron model and its application in image encryption. Chaos Solitons Fractals 2022, 158, 112017. [Google Scholar] [CrossRef]
  74. Lai, Q.; Lai, C.; Kuate, P.D.K.; Li, C.; He, S. Chaos in a simplest cyclic memristive neural network. Int. J. Bifurc. Chaos 2022, 32, 2250042. [Google Scholar] [CrossRef]
  75. Lai, Q.; Wan, Z.; Kamdem Kuate, P.D. Modelling and circuit realisation of a new no-equilibrium chaotic system with hidden attractor and coexisting attractors. Electron. Lett. 2020, 56, 1044–1046. [Google Scholar] [CrossRef]
  76. Hu, J.; Rao, S.; Zhu, M.; Huang, J.; Wang, J.; Wang, J. SRCC: Sub-RTT Congestion Control for Lossless Datacenter Networks. IEEE Trans. Ind. Inform. 2025, 21, 2799–2808. [Google Scholar] [CrossRef]
  77. Zhang, J.; Zhang, S.; Li, D.; Wang, J.; Wang, J. Crack segmentation network via difference convolution-based encoder and hybrid CNN-Mamba multi-scale attention. Pattern Recognit. 2025, 167, 111723. [Google Scholar] [CrossRef]
  78. Hu, J.; He, Y.; Luo, W.; Huang, J.; Wang, J. Enhancing Load Balancing with In-Network Recirculation to Prevent Packet Reordering in Lossless Data Centers. IEEE/ACM Trans. Netw. 2024, 32, 4114–4127. [Google Scholar] [CrossRef]
  79. Badshah, A.; Daud, A.; Alharbey, R.; Banjar, A.; Bukhari, A.; Alshemaimri, B. Big data applications: Overview, challenges and future. Artif. Intell. Rev. 2024, 57, 290. [Google Scholar] [CrossRef]
  80. Hu, J.; Huang, J.; Li, Z.; Li, Y.; Rao, S.; Jiang, W.; Chen, K.; Wang, J.; He, T. Proactive Transport with High Link Utilization Using Opportunistic Packets in Cloud Data Centers. IEEE Trans. Mob. Comput. 2025, 1–16. [Google Scholar] [CrossRef]
  81. Feng, W.; Yang, J.; Zhao, X.; Qin, Z.; Zhang, J.; Zhu, Z.; Wen, H.; Qian, K. A novel multi-channel image encryption algorithm leveraging pixel reorganization and hyperchaotic maps. Mathematics 2024, 12, 3917. [Google Scholar] [CrossRef]
  82. Ning, Y.; Jin, J.; Li, Z.; Chen, C.; Ouyang, A. A Time-varying Hill Cipher for Dynamic Image Cryptography. Tsinghua Sci. Technol. 2025. [Google Scholar] [CrossRef]
  83. Kumar, M.; Mohapatra, R.N.; Agarwal, S.; Sathish, G.; Raw, S.N. A new RGB image encryption using generalized Vigenere-type table over symmetric group associated with virtual planet domain. Multimed. Tools Appl. 2019, 78, 10227–10263. [Google Scholar] [CrossRef]
  84. Doubla, I.S.; Njitacke, Z.T.; Ekonde, S.; Tsafack, N.; Nkapkop, J.D.D.; Kengne, J. Multistability and circuit implementation of tabu learning two-neuron model: Application to secure biomedical images in IoMT. Neural Comput. Appl. 2021, 33, 14945–14973. [Google Scholar] [CrossRef]
  85. Zhang, S.; Li, C.; Zheng, J.; Wang, X.; Zeng, Z.; Peng, X. Generating any number of initial offset-boosted coexisting Chua’s double-scroll attractors via piecewise-nonlinear memristor. IEEE Trans. Ind. Electron. 2021, 69, 7202–7212. [Google Scholar] [CrossRef]
Figure 1. (a) ( z 1 , z 2 ) plane; (b) ( z 1 , z 3 ) plane; (c) ( z 1 , z 4 ) plane; (d) ( z 1 , z 5 ) plane; (e) ( z 4 , z 2 ) plane; (f) 3D phase portrait of z 1 , z 2 , z 3 .
Figure 1. (a) ( z 1 , z 2 ) plane; (b) ( z 1 , z 3 ) plane; (c) ( z 1 , z 4 ) plane; (d) ( z 1 , z 5 ) plane; (e) ( z 4 , z 2 ) plane; (f) 3D phase portrait of z 1 , z 2 , z 3 .
Axioms 14 00638 g001
Figure 2. Time series of the six state variables ( z 1 to z 6 ) of the 6D MMHS in the interval 200–250 s, illustrating the complex and aperiodic evolution characteristic of hyperchaotic dynamics.
Figure 2. Time series of the six state variables ( z 1 to z 6 ) of the 6D MMHS in the interval 200–250 s, illustrating the complex and aperiodic evolution characteristic of hyperchaotic dynamics.
Axioms 14 00638 g002
Figure 3. Power spectrum density (PSD) plots of the state variables in the interval 200–220 s: (a) z 1 , (b) z 2 , (c) z 4 , and (d) z 5 . The broadband spectra without dominant peaks indicate the hyperchaotic and aperiodic behavior of the system.
Figure 3. Power spectrum density (PSD) plots of the state variables in the interval 200–220 s: (a) z 1 , (b) z 2 , (c) z 4 , and (d) z 5 . The broadband spectra without dominant peaks indicate the hyperchaotic and aperiodic behavior of the system.
Axioms 14 00638 g003
Figure 4. Poincaré sections of the 6D MMHS under chaotic conditions. (a) Intersection points on the z 1 = 0 plane projected onto the ( z 2 , z 3 ) plane, showing a fractal-like structure; (b) intersection points on the z 4 = 0 plane projected onto the ( z 5 , z 6 ) plane, exhibiting a cloud-like distribution. Both sections demonstrate the dense and irregular point patterns characteristic of chaotic attractors.
Figure 4. Poincaré sections of the 6D MMHS under chaotic conditions. (a) Intersection points on the z 1 = 0 plane projected onto the ( z 2 , z 3 ) plane, showing a fractal-like structure; (b) intersection points on the z 4 = 0 plane projected onto the ( z 5 , z 6 ) plane, exhibiting a cloud-like distribution. Both sections demonstrate the dense and irregular point patterns characteristic of chaotic attractors.
Axioms 14 00638 g004
Figure 5. (a,b) For the 6D MMHS system, when the initial value was Z ( 0 ) = ( 1 , 1 , 1 , 1 , 1 , 1 ) and the parameter settings were ( a , b , c , d , k , m , n ) = ( 50 , 190 , 100 , 21 , 1 , 0.1 , 0.01 ) , the plot of Lyapunov exponents varied with time, where the simulation time was set as T = 10 4 s .
Figure 5. (a,b) For the 6D MMHS system, when the initial value was Z ( 0 ) = ( 1 , 1 , 1 , 1 , 1 , 1 ) and the parameter settings were ( a , b , c , d , k , m , n ) = ( 50 , 190 , 100 , 21 , 1 , 0.1 , 0.01 ) , the plot of Lyapunov exponents varied with time, where the simulation time was set as T = 10 4 s .
Axioms 14 00638 g005
Figure 9. (a,c,d) Bifurcation diagrams when a [ 10 , 40 ] , a [ 15.7 , 15.95 ] , and a [ 16 , 05 , 16.25 ] , respectively; (b) Lyapunov exponent spectrum of the new, 6D MMHS when a [ 10 , 40 ] .
Figure 9. (a,c,d) Bifurcation diagrams when a [ 10 , 40 ] , a [ 15.7 , 15.95 ] , and a [ 16 , 05 , 16.25 ] , respectively; (b) Lyapunov exponent spectrum of the new, 6D MMHS when a [ 10 , 40 ] .
Axioms 14 00638 g009
Figure 10. (a) a = 12 , periodic; (b) a = 19 , chaotic; (c) a = 25 , hyperchaotic; (d) a = 39.8 , hyperchaotic.
Figure 10. (a) a = 12 , periodic; (b) a = 19 , chaotic; (c) a = 25 , hyperchaotic; (d) a = 39.8 , hyperchaotic.
Axioms 14 00638 g010
Figure 11. (a,c) Bifurcation diagram with b [ 0 , 90 ] and a [ 5 , 20 ] , respectively; (b,d) Lyapunov exponent spectrum with b [ 0 , 90 ] and a [ 5 , 20 ] , respectively.
Figure 11. (a,c) Bifurcation diagram with b [ 0 , 90 ] and a [ 5 , 20 ] , respectively; (b,d) Lyapunov exponent spectrum with b [ 0 , 90 ] and a [ 5 , 20 ] , respectively.
Axioms 14 00638 g011
Figure 12. (a) b = 4 , periodic; (b) b = 10 , point attractor; (c) b = 16 , hyperchaotic; (d) b = 40 , hyperchaotic.
Figure 12. (a) b = 4 , periodic; (b) b = 10 , point attractor; (c) b = 16 , hyperchaotic; (d) b = 40 , hyperchaotic.
Axioms 14 00638 g012
Figure 13. (a) Bifurcation diagram when c [ 0 , 30 ] ; (b) Lyapunov exponent spectrum when c [ 0 , 30 ] .
Figure 13. (a) Bifurcation diagram when c [ 0 , 30 ] ; (b) Lyapunov exponent spectrum when c [ 0 , 30 ] .
Axioms 14 00638 g013
Figure 14. (a) c = 1 , hyperchaotic; (b) c = 28 , hyperchaotic; (c) c = 14 , chaotic; (d) c = 14.3 , chaotic; (e) c = 11 , periodic; (f) c = 13 , periodic.
Figure 14. (a) c = 1 , hyperchaotic; (b) c = 28 , hyperchaotic; (c) c = 14 , chaotic; (d) c = 14.3 , chaotic; (e) c = 11 , periodic; (f) c = 13 , periodic.
Axioms 14 00638 g014
Figure 15. (a,c) Bifurcation diagram with d [ 0 , 15 ] and d [ 0 , 1.5 ] , respectively; (b,d) Lyapunov exponent spectrum with d [ 0 , 15 ] and d [ 0 , 1.5 ] , respectively.
Figure 15. (a,c) Bifurcation diagram with d [ 0 , 15 ] and d [ 0 , 1.5 ] , respectively; (b,d) Lyapunov exponent spectrum with d [ 0 , 15 ] and d [ 0 , 1.5 ] , respectively.
Axioms 14 00638 g015
Figure 16. (a) d = 0.7 , periodic; (b) d = 1 , periodic; (c) d = 0.34 , chaotic; (d) d = 0.34 , chaotic; (e) d = 1.4 , hyperchaotic; (f) d = 1.3 , hyperchaotic.
Figure 16. (a) d = 0.7 , periodic; (b) d = 1 , periodic; (c) d = 0.34 , chaotic; (d) d = 0.34 , chaotic; (e) d = 1.4 , hyperchaotic; (f) d = 1.3 , hyperchaotic.
Axioms 14 00638 g016
Figure 18. Bifurcation diagrams of z 1 , max versus a for (a) b = 8 , (b) b = 90 , (c) b = 15 , and (d) b = 41 (with c = 16 , d = 12 , k = 1 , m = 0.1 , and n = 0.01 ). Blue and red dots represent initial conditions ( 1 , 1 , 1 , 1 , 1 , 1 ) and ( 1 , 1 , 1 , 1 , 1 , 1 ) , respectively.
Figure 18. Bifurcation diagrams of z 1 , max versus a for (a) b = 8 , (b) b = 90 , (c) b = 15 , and (d) b = 41 (with c = 16 , d = 12 , k = 1 , m = 0.1 , and n = 0.01 ). Blue and red dots represent initial conditions ( 1 , 1 , 1 , 1 , 1 , 1 ) and ( 1 , 1 , 1 , 1 , 1 , 1 ) , respectively.
Axioms 14 00638 g018
Figure 19. Offset-boosting control of the 6D MMHS (16) with different values of parameter p, including p = 20 (blue), p = 10 (red), p = 0 (cyan), p = 10 (brown), and p = 20 (green): (a) ( z 2 , z 5 ) -hyperchaotic attractors; (b) 3D phase portraits of z 2 z 5 z 1 ; (c) time plot of the state z 5 .
Figure 19. Offset-boosting control of the 6D MMHS (16) with different values of parameter p, including p = 20 (blue), p = 10 (red), p = 0 (cyan), p = 10 (brown), and p = 20 (green): (a) ( z 2 , z 5 ) -hyperchaotic attractors; (b) 3D phase portraits of z 2 z 5 z 1 ; (c) time plot of the state z 5 .
Axioms 14 00638 g019
Figure 20. FPGA-based digital circuit implementation.
Figure 20. FPGA-based digital circuit implementation.
Axioms 14 00638 g020
Figure 21. Experimental results of the 6D MMHS hardware implementation: (a,b) phase diagrams in the ( z 1 , z 2 ) plane; (c,d) phase diagrams in the ( z 1 , z 3 ) plane.
Figure 21. Experimental results of the 6D MMHS hardware implementation: (a,b) phase diagrams in the ( z 1 , z 2 ) plane; (c,d) phase diagrams in the ( z 1 , z 3 ) plane.
Axioms 14 00638 g021
Figure 22. Image encryption and decryption algorithm flowchart.
Figure 22. Image encryption and decryption algorithm flowchart.
Axioms 14 00638 g022
Figure 23. Results for (ac) Baboon and (fh) Peppers images: (a,f) original, (b,g) encrypted, (c,h) decrypted. Histograms: (d,i) original images (Baboon and Peppers, respectively); (e) encrypted Baboon image; (j) Peppers.
Figure 23. Results for (ac) Baboon and (fh) Peppers images: (a,f) original, (b,g) encrypted, (c,h) decrypted. Histograms: (d,i) original images (Baboon and Peppers, respectively); (e) encrypted Baboon image; (j) Peppers.
Axioms 14 00638 g023
Figure 24. Adjacent pixel correlation scatter plots for the Baboon image: (a) horizontal, (b) vertical (original image), (c) main diagonal direction, (d) anti-diagonal direction. Cipher image correlation diagram in (e) horz., (f) vert., (g) main diag., (h) anti-diag. dir.
Figure 24. Adjacent pixel correlation scatter plots for the Baboon image: (a) horizontal, (b) vertical (original image), (c) main diagonal direction, (d) anti-diagonal direction. Cipher image correlation diagram in (e) horz., (f) vert., (g) main diag., (h) anti-diag. dir.
Axioms 14 00638 g024
Table 1. Comparison of Lyapunov exponents and Kaplan–Yorke dimensions.
Table 1. Comparison of Lyapunov exponents and Kaplan–Yorke dimensions.
Dimension LE 1 LE 2 LE 3 LE 4 LE 5 LE 6 D KY Paper
6D0.7994840.2958450−0.407744−0.659364−14.691885.00192Ref. [57]
6D1.05290.62130.03420−13.7815−15.26374.12396Ref. [58]
6D0.09885910.0109865−0.544226−1.00557−1.15581−1.770912.20184Ref. [59]
6D1.06390.601070.04310−13.8708−15.17284.1231Ref. [60]
6D4.13060.4936−0.0033−3.5059−14.8197−99.61874.07523769Ref. [43]
6D0.6530.3260.0001.558−4.419−12.6764.574Ref. [61]
6D1.4620.14330.07250.04490−12.07005.1427Ref. [62]
5D6.0530.0280.000−4.747−46.214/4.029Ref. [63]
5D12.6590.0550.0240−67.701/4.189Ref. [56]
6D21.68250.107900.00831.000092.78585.224Section 2.1
6D4.45530.16810.100601.000056.71865.066Section 2.3.3
Table 2. Parameter range of traditional chaotic system.
Table 2. Parameter range of traditional chaotic system.
DimensionInterval Length of Chaotic StatePaper
5DLess than 100Ref. [64]
4DLess than 6Ref. [65]
4DLess than 10Ref. [66]
4DLess than 50Ref. [67]
6D[13, 300]This paper
Table 3. FPGA resource utilization (XC7Z020-2CLG400I).
Table 3. FPGA resource utilization (XC7Z020-2CLG400I).
Resource TypeUsedAvailableUtilization (%)
LUT530453,2009.97
LUTRAM37617,4002.16
Flip-Flop (FF)9978106,4009.38
DSP48E8222037.27
IO3412527.20
BUFG1323.13
Table 4. χ 2 test result.
Table 4. χ 2 test result.
IndexPlain ImageCipher Image
resultBaboonPeppersBaboonPeppers
1.8735 × 10 5 1.2017 × 10 5 235.2344226.2598
Table 5. Correlation analysis of adjacent pixels.
Table 5. Correlation analysis of adjacent pixels.
ImageHorizontalVerticalMain DiagonalAnti-Diagonal
Plain Image0.7494830.8624690.7404620.706836
Cipher image−0.03479−0.0343690.0056580.001927
Table 6. The results of information entropy.
Table 6. The results of information entropy.
IndexPlain ImageCipher Image
resultLenaBaboonPeppersLenaBaboonPeppers
7.44517.35837.59377.99927.99947.9993
Table 7. Comparison of information entropy.
Table 7. Comparison of information entropy.
ImagePlainCipherRef. [83]Ref. [84]Ref. [85]
Information entropy7.35387.99947.9917.9067.740
Table 8. Coefficient of association.
Table 8. Coefficient of association.
Index x 0 y 0 z 0 w 0 u 0 v 0 r 1 r 2 r 3 Theoretical Value
NPCR99.61199.608199.608299.608599.611899.609499.610199.609799.610799.6094
UACI33.460833.462533.465733.46933.453833.464533.465133.462433.466133.4635
Table 9. Sensitivity analysis of plaintext images (Lena, Baboon, Peppers).
Table 9. Sensitivity analysis of plaintext images (Lena, Baboon, Peppers).
IndexLenaBaboonPepperTheoretical Value
NPCR99.610699.609499.609599.6094
UACI33.456733.465933.462933.4635
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, F.; Gracia, Y.M.; Guo, R.; Ying, Z.; Xu, J.; Yao, W.; Jin, J.; Lin, H. Dynamic Analysis and Application of 6D Multistable Memristive Chaotic System with Wide Range of Hyperchaotic States. Axioms 2025, 14, 638. https://doi.org/10.3390/axioms14080638

AMA Style

Yu F, Gracia YM, Guo R, Ying Z, Xu J, Yao W, Jin J, Lin H. Dynamic Analysis and Application of 6D Multistable Memristive Chaotic System with Wide Range of Hyperchaotic States. Axioms. 2025; 14(8):638. https://doi.org/10.3390/axioms14080638

Chicago/Turabian Style

Yu, Fei, Yumba Musoya Gracia, Rongyao Guo, Zhijie Ying, Jiarong Xu, Wei Yao, Jie Jin, and Hairong Lin. 2025. "Dynamic Analysis and Application of 6D Multistable Memristive Chaotic System with Wide Range of Hyperchaotic States" Axioms 14, no. 8: 638. https://doi.org/10.3390/axioms14080638

APA Style

Yu, F., Gracia, Y. M., Guo, R., Ying, Z., Xu, J., Yao, W., Jin, J., & Lin, H. (2025). Dynamic Analysis and Application of 6D Multistable Memristive Chaotic System with Wide Range of Hyperchaotic States. Axioms, 14(8), 638. https://doi.org/10.3390/axioms14080638

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop