Next Article in Journal
Caching Method for Information-Centric Ad Hoc Networks Based on Content Popularity and Node Centrality
Previous Article in Journal
Video Colorization Based on Variational Autoencoder
Previous Article in Special Issue
A Closer Look at the Statistical Behavior of a Chaotic System with Message Inclusion for Cryptographic Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multistable Memristor Synapse-Based Coupled Bi-Hopfield Neuron Model: Dynamic Analysis, Microcontroller Implementation and Image Encryption

by
Victor Kamdoum Tamba
1,2,
Arsene Loic Mbanda Biamou
2,
Viet-Thanh Pham
3,* and
Giuseppe Grassi
4
1
Department of Telecommunication and Network Engineering, IUT-Fotso Victor of Bandjoun, University of Dschang, Bandjoun P.O. Box 134, Cameroon
2
Research Unit of Automation and Applied Computer, Department of Electrical Engineering, IUT-FV Bandjoun, University of Dschang, Bandjoun P.O. Box 134, Cameroon
3
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Ho Chi Minh City 70000, Vietnam
4
Department of Engineering for Innovation, University of Salento, 73100 Lecce, Italy
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(12), 2414; https://doi.org/10.3390/electronics13122414
Submission received: 9 May 2024 / Revised: 14 June 2024 / Accepted: 17 June 2024 / Published: 20 June 2024

Abstract

:
The memristor, a revolutionary electronic component, mimics both neural synapses and electromagnetic induction phenomena. Recent study challenges are the development of effective neural models and discovering their dynamics. In this study, we propose a novel Hopfield neural network model leveraging multistable memristors, showcasing its efficacy in encoding biomedical images. We investigate the equilibrium states and dynamic behaviors of our designed model through comprehensive numerical simulations, revealing a rich array of phenomena including periodic orbits, chaotic dynamics, and homogeneous coexisting attractors. The practical realization of our model is achieved using a microcontroller, with experimental results demonstrating strong agreement with theoretical analyses. Furthermore, harnessing the chaos inherent in the neural network, we develop a robust biomedical image encryption technique, validated through rigorous computational performance tests.

1. Introduction

Hopfield networks have emerged as pivotal models in the field of neuroscience owing to their dynamic behavior and efficient structure [1]. These networks provide a valuable framework for exploring human memory mechanisms, with both continuous and discrete models being extensively studied [2,3,4]. Their practicality lies in their ability to capture associative memory processes, making them indispensable tools for investigating cognition and learning [5,6,7,8].
Recent research has exposed an overabundance of intriguing dynamics within memristor-based Hopfield networks. Notably, Sun et al. introduced the concept of boosting dynamics, amplifying the network’s computational capabilities [9]. Investigations into multistability have shed light on the diverse states these networks can exhibit, offering potential avenues for information storage and retrieval [8,10]. Furthermore, the exploration of chaos and multiple scrolls in memristor-cascaded Hopfield networks underscores their rich dynamical repertoire [11,12,13]. Symmetric behaviors observed in bi-neuron Hopfield networks hint at their robustness and potential for pattern recognition tasks [14]. Synapse-coupled architectures have revealed intriguing phenomena such as initial sensitivity, further enhancing our understanding of network dynamics [15]. Additionally, the incorporation of hidden neurons has bolstered the recognition abilities of Hopfield models, paving the way for more sophisticated cognitive architectures capable of long-term memory storage [16,17,18,19].
The attraction of Hopfield networks lies not only in their theoretical elegance but also in their myriad practical applications. Image encryption utilizing Hopfield networks has garnered considerable attention due to its promise of robust security and efficient encoding schemes [20,21,22,23]. Beyond encryption, these networks have found utility in various artificial intelligence applications, harnessing their associative memory properties for tasks such as pattern recognition and optimization [24]. Implementation-wise, the realization of both continuous and discrete Hopfield networks has been achieved using diverse hardware platforms, ranging from STM32 microcontrollers to DSPs and analog circuits [25,26]. In other papers, authors focus on optimizing the realization of Hopfield networks through both analog and digital circuit implementations, aiming to harness the full potential of these networks in practical applications [27,28,29,30].
This paper introduces a novel approach to a coupled bi-Hopfield network, unraveling its dynamics and laying the groundwork for its practical deployment. By delving into the intricacies of network realization and dynamics, we aim to facilitate its application. A comparison of this work related to published ones is made in Table 1.

2. System Description and Mathematical Model

In this work, we consider a multi-state flux-controlled memristor described as
i M = W z V M = cos z V M z ˙ = sin z V M
where W ( z ) is the memductance.
In order to characterize the elaborated memristor described above, we apply an external force v M = A sin 2 π f t into the memristor. The I-V characteristics of the considered memristor are presented in Figure 1. All system parameter values are given in the figure caption. From Figure 1c, we can remark that the hysteresis loop areas retain the same shapes and the characteristic has different states depending on the initial conditions. Thus, the considered memristor is multistable.
We use the multi-state flux-controlled memristor described above to couple two neurons, as shown in Figure 2.
In Figure 2, an electromagnetic induction current, created by the difference in membrane potential between the two neurons, flows between the two neurons. This electromagnetic induction current influences the two neurons, and the state equations can be expressed as follows
x ˙ = x + T 11 f x + T 12 f ( y ) + k W ( φ ) V M y ˙ = y T 21 f x + T 22 f ( y ) k W ( φ ) V M z ˙ = V M φ
The parameters T 11 , T 12 , T 21 , and T 22 represent the synaptic connection weights considering constant. ρ represents the memristor coupling strength parameter, f x and f y are applied to activate the neurons and expressed as
f u = tanh 2 u 3 + tanh 2 u + 3 2 tanh 2 u
By taking a synaptic weight matrix as follows
T = T 11 T 12 T 21 T 22 = 0 γ 1 0
We obtain the multistable memristor synapse-based coupled bi-Hopfield neuron model as
x ˙ = x + γ f y + ρ cos z y x y ˙ = y f x ρ cos z y x z ˙ = sin z y x
In system (5), the auto-connection weights for the two Hopfield neurons are set to zero in order to simplify the final model.

3. Equilibrium Analysis

The equilibrium can be expressed as
P = x 0 ,   y 0 ,   z 0
in which z 0 = sin 1 y 0 x 0 , x 0 and y 0 are solved using the following equations
H 1 x 0 ,   y 0 = x 0 + γ f y 0 + ρ y 0 x 0 1 y 0 x 0 2 H 2 x 0 ,   y 0 = y 0 f x 0 ρ y 0 x 0 1 y 0 x 0 2
where f x 0 and f y 0 are the functions used to activate the neurons.
The Jacobin matrix can be calculated at P as
J P = 1 ρ cos z 0 γ f y 0 + ρ cos z 0 ρ sin z 0 y 0 x 0 ρ cos z 0 f x 0 1 ρ cos z 0 ρ sin z 0 y 0 x 0 1 1 cos z 0
in which f u = 2 sech 2 2 u 3 + sech 2 2 u + 3 2 sech 2 2 u .
According to Equation (7), the features of the equilibrium states P are studied based on the system parameters γ and ρ . The two functions H 1 x 0 ,   y 0 and H 2 x 0 ,   y 0  given in Equation (7) with the parameters γ ,   ρ = 0.7 ,   1  are plotted in Figure 3. The values of x 0 and y 0 are determined at the intersections of the two function curves.
From Figure 3, system (5) has three equilibrium states for γ ,   ρ = 0.7 ,   1 . The analysis of these equilibrium states is presented in Table 2.
From the results in Table 2, we can conclude that the equilibrium points are unstable saddle points for the considered values of the system parameters γ and ρ .

4. Numerical Study

Bifurcation diagrams associated with corresponding Lyapunov exponents as a function of system parameters, as well as initial states, phase portraits, and basin of attraction, are computed to illustrate the complicated behaviors of the model under consideration.
Figure 4 shows the bifurcation diagram and Lyapunov exponents versus ρ  computed from 1 to 2, for γ = 0.7 and x ( 0 ) ,   y ( 0 ) ,   z ( 0 ) = 0 ,   10 9 ,   0 .
Figure 4 reveals that chaos occurs in the considered model through period-doubling bifurcation. We can identify some windows indicating periodic oscillations intercalated by chaos. The route to chaos is confirmed by plotting phase spaces presented in Figure 5, for γ = 0.7 and diverse selected values of ρ .
It is very clear from Figure 5 that the system in the study displays complex and abundant patterns.
The impact of the initial state z 0 associated with the memristor on the comportments of the model is shown in Figure 6, for γ = 0.7 and ρ = 1.97 .
The initial state z 0 considerably impacts the dynamic behavior of the considered model (see Figure 6).
Phase portraits and basin of attraction are shown in Figure 7 and Figure 8 in order to support the result carried out in Figure 6, for γ = 0.7 and ρ = 1.97 .

5. Experimental Study

We carried out here a microcontroller implementation of the system. Implementing chaotic systems using microcontrollers has many advantages over using electronic components. These advantages include high computing performances, excellent precision, flexibility and stability, and the facility to manage the system parameters conveniently [25,26,27,28,29]. In this work, we use an Arduino Due microcontroller card, which is constructed with an Atmel SAM3X8E ARM Cortex-M3 processor having a clock frequency of 84 MHz. Compared with other boards, this card has the advantage of incorporating two digital-to-analog converters, which makes it easy to implement chaotic systems. The main steps, which describe the implementation procedure of the elaborated multistable memristor synapse-based coupled bi-Hopfield neuron model, are shown in Figure 9.
The microcontroller implements the discrete form of system (5) using the Runge–Kutta algorithm with a fixed iteration step size of 0.01. The model parameters and initial conditions are chosen as they have identical values to those used in the numerical simulations. The hardware implementation devices are shown in Figure 10.
Figure 11 shows the route to chaos for a fixed value of γ and specific values of the coupling strength ρ .
The results carried out from the microcontroller implementation (see Figure 11) are very similar to those obtained from numerical simulations (see Figure 5). This confirms that the Arduino Due microcontroller card is able to investigate the complete dynamics of the designed multistable memristor synapse-based coupled bi-Hopfield neuron model.

6. Application of the Designed Model for Biomedical Encryption Image

We exploit here the abundant dynamics of the elaborated model for image encryption.

6.1. Designing of Encryption Algorithm

Figure 12 presents the encryption algorithm.
There are five steps in the algorithm:
(1)
Integrate the chaotic system and carry out the public key K P ( i ) ;
(2)
Generate and test the random bits to construct the key K S ( i ) ;
(3)
In the layer of permutation, build the permuted image P ( i ) with the initial image and the public key K P ( i ) ;
(4)
Introduce the permuted image into the layer of confusion, which works with the S-box function to construct the confused image C ( i ) ;
(5)
Using a substitution operation (XOR), combine the image resulting from the confusion layer C ( i ) with the key K S ( i ) to obtain the masked image.
For the decryption process, we apply the reverse of all operations realized during the encryption procedure.
The NIST test results are shown in Table 3.

6.2. Numerical Results

The numerical results are carried out in MATLAB16b environment. We use biomedical images of size 256 × 256 for cerebrovascular accident, pulmonary fibrosis, and lung cancer. Applying the encryption and decryption algorithm described below, the results for encrypted and decrypted biomedical images are shown in Figure 13.
We can see that the unencrypted biomedical images (see Figure 13a–c) are very different from those obtained after the decryption process (see Figure 13d–f). Thus, the algorithm is efficient.

6.3. Analysis of Performances of the Elaborated Biomedical Image Encryption Method

6.3.1. Analysis of Key Space and Key Sensibility

To withstand exhaustive attacks, the key space of the cryptosystem must exceed 2 100 [31]. Our elaborated multistable memristor synapse-based coupled bi-Hopfield neuron model involves two constant system parameters and three initial states. For a precision of 10 17 , the key space is 10 17 × 3 = 10 85 , which exceeds the required value. This confirms that the developed algorithm will be able to withstand exhaustive attacks.
The key sensitivity is analyzed by introducing a small perturbation of 10 17 to all parameters of the system before the decryption of the sending image (cerebrovascular accident), as reported in Figure 14.
Looking at Figure 14, the key changes 10 17 , generating a high impact on the decrypted image. The initial image can no longer be received after a small key modification. We can conclude that this algorithm is very sensitive to secret keys.

6.3.2. Information Entropy

The entropy is examined using its expression [32]
H m = i = 0 N P ( m i ) log 2 P ( m i )
in which N and P ( m i ) refer to the total number and frequency of occurrences of symbol m i , respectively.
The entropy is reported in Table 4, and its value for encrypted images approaches the standard value 8, which means that the encrypted image is more random. This confirms the good performance of the scheme.

6.3.3. Correlation Analysis

The correlation coefficient (CC) is calculated using its expression [33]
E x = 1 N i = 1 N x i D x = 1 N i = 1 N x i E x 2 cov x , y = 1 N i = 1 N x i E x y i E y r x y = cov x , y D x D y
in which x and y are the pixel values. The CC is reported in Table 5.
Looking at the values in Table 5, we can remark that the values of correlation coefficient in horizontal, vertical, and diagonal directions of the image approach the standard values (i.e., CC is 1 for initial biomedical images and 0 for their encrypted versions). This means that the correlation coefficients of the initial image are highly correlated and those for the encrypted image are uncorrelated. In conclusion, the designed encryption algorithm will resist statistical aggressions.

6.3.4. Histogram Study

The histogram should dispose uniformly for an encrypted image and randomly for an unencrypted one. Figure 15 illustrates the distribution of the pixels of biomedical images.
From Figure 15, we can see that the histograms of the unencrypted images and those of the encrypted ones are completely different. The distribution of the pixels of the initial image is random and the one of the encrypted image is uniform, respecting the above characteristics. Thus, the biomedical image encryption system can resist differential attacks.

6.3.5. Impacts of External Perturbations and Information Loss on the Performances of the Scheme

Every encryption system is subjected to external perturbations and information loss. Therefore, it is necessary to study their impacts on the performance of the encryption system. Two different external perturbations, namely, Gaussian and Salt and Pepper noise, are subjected to the initial images before using them in the encryption system. The results for decrypted images are shown in Figure 16(a2(i)–a2(iii)) for Gaussian noise and Figure 16(b2(i)–b2(iii)) for Salt and Pepper noise. The intensity of each noise is indicated in the figure caption. Similarly, a part of the unencrypted image (see Figure 16(c1(i)–c1(iii)) is canceled before encryption. Figure 16(c2(i)–c2(iii)) present decrypted images. The percentage of the canceled data is indicated in the figure caption.
From Figure 16, we observe that, although a part of the initial image has been canceled and the noise has been subjected to the encryption system, the decrypted images remain exploitable. These results mean that the designed encryption algorithm has the ability to prevent noise and occlusion attacks.

6.3.6. NPCR and UACI Analysis

The performance of an encryption system is influenced by differential attacks. Common methods called NPCR and UACI are used to study their effects on the encryption system. They are expressed as [34]:
N P C R = i = 1 m j = 1 n d i , j m × n × 100
in which d i , j is defined by: d i , j = 1 ,       i f     p i , j p i , j , 0 ,     e l s e .
U A C I = 100 m × n i = 1 m j = 1 n p i , j p i , j 2 l 1
NPCR and UACI are computed and their values are recorded in Table 6.
From the data in Table 6, we can conclude that the encryption system is impacted by small modifications of the image’s pixels. This means that the studied image encryption algorithm has a strong capacity to resist differential attacks.

6.3.7. Comparison of this Scheme with Certain Recent Encryption Methods

The performance of the image encryption scheme is compared with that of certain recent studies and the comparisons are recorded in Table 7.

7. Conclusions

We designed a Hopfield neural network with a multistable memristor and its use for encoding biomedical image encryption. The equilibrium states, their stability, and the dynamics of the model were studied. Numerical simulations revealed that the model exhibits abundant and complicated comportments such as periodic orbits, chaos, and homogenous coexisting chaotic attractors. The model was realized using a microcontroller board. Numerical results and those obtained from the microcontroller looked very similar. The attractive behaviors of the Hopfield neural network were used to construct a scheme to mask images of cerebrovascular accidents, pulmonary fibrosis, and lung cancer. The performance of the scheme was verified by computing different statistical and security tests.
In future work, to construct a high-order neural network model that is closer to the biological one, we will use a non-polynomial memristor to couple two sub-neural networks. The two sub-neural networks will represent two different encephalic regions in the brain.

Author Contributions

Conceptualization, V.K.T.; Investigation, A.L.M.B.; Methodology, V.K.T.; Resources, V.-T.P.; Software, A.L.M.B.; Visualization, G.G.; Writing—original draft, V.-T.P.; Writing—review and editing, G.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Gerstner, W.; Kistler, W.M.; Naud, R.; Paninski, L. Neuronal Dynamics: From Single Neurons to Networks and Models of Cognition; Cambridge University Press: Cambridge, UK, 2014. [Google Scholar] [CrossRef]
  2. Yu, Z.; Abdulghani, A.M.; Zahid, A.; Heidari, H.; Imran, M.A.; Abbasi, Q.H. An overview of neuromorphic computing for artificial intelligence enabled hardware-based hopfield neural network. IEEE Access 2020, 8, 67085–67099. [Google Scholar] [CrossRef]
  3. Sun, J.; Sathasivam, S.; Ali, M.K.B.M. Analysis and Optimization of Network Properties for Bionic Topology Hopfield Neural Network Using Gaussian-Distributed Small-World Rewiring Method. IEEE Access 2022, 10, 95369–95389. [Google Scholar] [CrossRef]
  4. Tsodyks, M.V. Hierarchical associative memory in Neural Networks with Low Activity Level. Mod. Phys. Lett. B 1990, 4, 259–265. [Google Scholar] [CrossRef]
  5. Miller, N.E.; Mukhopadhyay, S. A quantum Hopfield associative memory implemented on an actual quantum processor. Sci. Rep. 2021, 11, 23391. [Google Scholar] [CrossRef] [PubMed]
  6. Alway, A.; Zamri, N.E.; Mansor, M.A.; Kasihmuddin, M.S.M.; Jamaludin, S.Z.M.; Marsani, M.F. A novel Hybrid Exhaustive Search and data preparation technique with multi-objective Discrete Hopfield Neural Network. Decis. Anal. J. 2023, 9, 100354. [Google Scholar] [CrossRef]
  7. Karpov, Y.L.; Karpov, L.E.; Smetanin, Y.G. Some Aspects of Associative Memory Construction Based on a Hopfield Network. Program. Comput. Softw. 2020, 46, 305–311. [Google Scholar] [CrossRef]
  8. Huang, L.L.; Zhang, Y.; Xiang, J.H.; Liu, J. Extreme Multistability in a Hopfield Neural Network Based on Two Biological Neuronal Systems. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 4568–4572. [Google Scholar] [CrossRef]
  9. Sun, L.; Luo, J.; Qiao, Y. Initial Offset Boosting Dynamics in A Memristive Hopfield Neural Network and Its Application in Image Encryption. Jisuan Wuli/Chin. J. Comput. Phys. 2023, 40, 106. [Google Scholar] [CrossRef]
  10. Lin, H.; Wang, C.; Tan, Y. Hidden extreme multistability with hyperchaos and transient chaos in a Hopfield neural network affected by electromagnetic radiation. Nonlinear Dyn. 2020, 99, 2369–2386. [Google Scholar] [CrossRef]
  11. Lin, H.; Wang, C.; Yao, W.; Tan, Y. Chaotic dynamics in a neural network with different types of external stimuli. Commun. Nonlinear Sci. Numer Simul. 2020, 90, 105390. [Google Scholar] [CrossRef]
  12. Li, R.; Dong, E.; Tong, J.; Wang, Z. A Novel Multiscroll Memristive Hopfield Neural Network. Int. J. Bifurc. Chaos 2022, 32, 2250130. [Google Scholar] [CrossRef]
  13. Chen, C.; Min, F.; Cai, J.; Bao, H. Memristor Synapse-Driven Simplified Hopfield Neural Network: Hidden Dynamics, Attractor Control, and Circuit Implementation. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 71, 2308–2319. [Google Scholar] [CrossRef]
  14. Chen, C.; Min, F. Memristive bi-neuron Hopfield neural network with coexisting symmetric behaviors. Eur. Phys. J. Plus 2022, 137, 841. [Google Scholar] [CrossRef]
  15. Biamou, A.L.M.; Tamba, V.K.; Kuate, G.C.G.; Tagne, F.K.; Takougang, A.C.N.; Fotsin, H.B. Initial states-induced complex behaviors in a memristive coupled Hopfield neural network model and its application in biomedical image encryption. Phys. Scr. 2024, 99, 015215. [Google Scholar] [CrossRef]
  16. Benedetti, M.; Dotsenko, V.; Fischetti, G.; Marinari, E.; Oshanin, G. Recognition capabilities of a Hopfield model with auxiliary hidden neurons. Phys. Rev. E 2021, 103, L060401. [Google Scholar] [CrossRef]
  17. Wen, L.; Ong, C.K. Study of Short-Term and Long-Term Memories by Hodgkin-Huxley Memristor. Int. J. Bifurc. Chaos 2024, 34, 2450040. [Google Scholar] [CrossRef]
  18. Chen, C.; Min, F.; Zhang, Y.; Bao, B. Memristive electromagnetic induction effects on Hopfield neural network. Nonlinear Dyn. 2021, 106, 2559–2576. [Google Scholar] [CrossRef]
  19. Li, C.; Yang, Y.; Yang, X.; Zi, X.; Xiao, F. A tristable locally active memristor and its application in Hopfield neural network. Nonlinear Dyn. 2022, 108, 1697–1717. [Google Scholar] [CrossRef]
  20. Isaac, S.D.; Njitacke, Z.T.; Tsafack, N.; Tchapga, C.T.; Kengne, J. Novel compressive sensing image encryption using the dynamics of an adjustable gradient Hopfield neural network. Eur. Phys. J. Spec. Top. 2022, 231, 1995–2016. [Google Scholar] [CrossRef]
  21. Deng, Q.; Wang, C.; Lin, H. Chaotic dynamical system of Hopfield neural network influenced by neuron activation threshold and its image encryption. Nonlinear Dyn. 2024, 112, 1–18. [Google Scholar] [CrossRef]
  22. Xu, S.; Wang, X.; Ye, X. A new fractional-order chaos system of Hopfield neural network and its application in image encryption. Chaos Solitons Fractals 2022, 157, 111889. [Google Scholar] [CrossRef]
  23. Venkatesh, J.; Pchelintsev, A.N.; Karthikeyan, A.; Parastesh, F.; Jafari, S. A Fractional-Order Memristive Two-Neuron-Based Hopfield Neuron Network: Dynamical Analysis and Application for Image Encryption. Mathematics 2023, 11, 4470. [Google Scholar] [CrossRef]
  24. Ji, Y.; Wang, L.; Xie, D. Balance optimization method of energy shipping based on Hopfield neural network. Alex. Eng. J. 2023, 67, 171–181. [Google Scholar] [CrossRef]
  25. Bao, H.; Ding, R.; Liu, X.; Xu, Q. Memristor-cascaded hopfield neural network with attractor scroll growth and STM32 hardware experiment. Integration 2024, 96, 102164. [Google Scholar] [CrossRef]
  26. Ma, T.; Mou, J.; Yan, H.; Cao, Y. A new class of Hopfield neural network with double memristive synapses and its DSP implementation. Eur. Phys. J. Plus 2022, 137, 1135. [Google Scholar] [CrossRef]
  27. Tlelo-Cuautle, E.; Díaz-Muñoz, J.D.; González-Zapata, A.M.; Li, R.; León-Salas, W.D.; Fernández, F.V.; Guillén-Fernández, O.; Cruz-Vega, I. Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA. Sensors 2020, 20, 1326. [Google Scholar] [CrossRef]
  28. Yu, F.; Lin, Y.; Xu, S.; Yao, W.; Gracia, Y.M.; Cai, S. Dynamic Analysis and FPGA Implementation of a New Fractional-Order Hopfield Neural Network System under Electromagnetic Radiation. Biomimetics 2023, 8, 559. [Google Scholar] [CrossRef]
  29. Chen, C.; Min, F.; Hu, F.; Cai, J.; Zhang, Y. Analog/digital circuit simplification for Hopfield neural network. Chaos Solitons Fractals 2023, 173, 113727. [Google Scholar] [CrossRef]
  30. Chen, C.; Min, F.; Zhang, Y.; Bao, H. ReLU-type Hopfield neural network with analog hardware implementation. Chaos Solitons Fractals 2023, 167, 113068. [Google Scholar] [CrossRef]
  31. Seyedzadeh, S.M.; Mirzakuchaki, S. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 2012, 92, 1202–1215. [Google Scholar] [CrossRef]
  32. Zhu, S.; Zhu, C. Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system. Multimed. Tools Appl. 2018, 77, 29119–29142. [Google Scholar] [CrossRef]
  33. Gao, T.G.; Chen, Z.Q. A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 2008, 372, 394–400. [Google Scholar] [CrossRef]
  34. Behnis, S.; Akhshani, A.; Ahadpour, S.; Mahnodi, H.; Akhavan, A. A fast-chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys. Lett. A 2007, 366, 391–396. [Google Scholar] [CrossRef]
  35. Faragallah, O.S. Efficient confusion–diffusion chaotic image cryptosystem using enhanced stan-dard map. SIViP 2015, 9, 1917–1926. [Google Scholar] [CrossRef]
  36. De Dieu, N.J.; Ruben FS, V.; Nestor, T.; Zeric, N.T.; Jacques, K. Dynamic analysis of a novel chaotic system with no linear terms and use for DNA-based image encryption. Multimed. Tools Appl. 2022, 81, 10907–10934. [Google Scholar] [CrossRef]
  37. Chai, X.; Chen, Y.; Broyde, L. A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers. Eng. 2017, 88, 197–213. [Google Scholar] [CrossRef]
  38. Wei, X.; Guo, L.; Zhang, Q.; Zhang, J.; Lian, S. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 2012, 85, 290–299. [Google Scholar] [CrossRef]
Figure 1. I-V characteristics of the considered memristor. (a) A = 1 V, 2 V, 3 V, 4 V and f = 1 Hz; (b) f = 1 Hz, 2 Hz, 3 Hz, 4 Hz and A = 4 V. The initial state x 0 = 0 ; (c) initial states: x0 = ±1, ±7, ±14, ±21, A = 4 V and f = 1 Hz.
Figure 1. I-V characteristics of the considered memristor. (a) A = 1 V, 2 V, 3 V, 4 V and f = 1 Hz; (b) f = 1 Hz, 2 Hz, 3 Hz, 4 Hz and A = 4 V. The initial state x 0 = 0 ; (c) initial states: x0 = ±1, ±7, ±14, ±21, A = 4 V and f = 1 Hz.
Electronics 13 02414 g001
Figure 2. The designed multistable memristor synapse-based coupled bi-Hopfield neuron model.
Figure 2. The designed multistable memristor synapse-based coupled bi-Hopfield neuron model.
Electronics 13 02414 g002
Figure 3. Determination of the equilibrium states x 0 and y 0 , which are indicated by the intersections of two function curves.
Figure 3. Determination of the equilibrium states x 0 and y 0 , which are indicated by the intersections of two function curves.
Electronics 13 02414 g003
Figure 4. Influence of ρ on the behaviors of the model: (a) bifurcation diagram (b) Lyapunov exponents for γ = 0.7 and x ( 0 ) ,   y ( 0 ) ,   z ( 0 ) = 0 ,   10 9 ,   0 .
Figure 4. Influence of ρ on the behaviors of the model: (a) bifurcation diagram (b) Lyapunov exponents for γ = 0.7 and x ( 0 ) ,   y ( 0 ) ,   z ( 0 ) = 0 ,   10 9 ,   0 .
Electronics 13 02414 g004
Figure 5. Phase spaces confirming the occurrence of chaos in the system for γ = 0.7 , x ( 0 ) ,   y ( 0 ) ,   z ( 0 ) = 0 ,   10 9 ,   0 and diverse selected values of ρ : (a) period-1 for ρ = 1.087 , (b) period-2 for ρ = 1.1 , (c) period-3 for ρ = 1.105 , (d) chaos for ρ = 1.107 , (e) period-3 for ρ = 1.13 , (f) period-6 for ρ = 1.134 , (g) chaos for ρ = 1.14 , (h) chaos for ρ = 1.15 , (i) chaos for ρ = 1.4 , (j) period-3 for ρ = 1.728 , (k) period-6 for ρ = 1.972 .
Figure 5. Phase spaces confirming the occurrence of chaos in the system for γ = 0.7 , x ( 0 ) ,   y ( 0 ) ,   z ( 0 ) = 0 ,   10 9 ,   0 and diverse selected values of ρ : (a) period-1 for ρ = 1.087 , (b) period-2 for ρ = 1.1 , (c) period-3 for ρ = 1.105 , (d) chaos for ρ = 1.107 , (e) period-3 for ρ = 1.13 , (f) period-6 for ρ = 1.134 , (g) chaos for ρ = 1.14 , (h) chaos for ρ = 1.15 , (i) chaos for ρ = 1.4 , (j) period-3 for ρ = 1.728 , (k) period-6 for ρ = 1.972 .
Electronics 13 02414 g005aElectronics 13 02414 g005b
Figure 6. Impact of the initial state z 0 on the comportment of the model: (a) bifurcation diagram and (b) maximum Lyapunov exponent, for γ = 0.7 , ρ = 1.97 , and x ( 0 ) ,   y ( 0 ) ,   z ( 0 ) = 0 ,   10 9 ,   z ( 0 ) .
Figure 6. Impact of the initial state z 0 on the comportment of the model: (a) bifurcation diagram and (b) maximum Lyapunov exponent, for γ = 0.7 , ρ = 1.97 , and x ( 0 ) ,   y ( 0 ) ,   z ( 0 ) = 0 ,   10 9 ,   z ( 0 ) .
Electronics 13 02414 g006
Figure 7. Several coexisting chaotic attractors at diverse positions for several value initial states z 0 with γ = 0.7 , ρ = 1.97 , and x ( 0 ) ,     y ( 0 ) = 0 ,     10 9 .
Figure 7. Several coexisting chaotic attractors at diverse positions for several value initial states z 0 with γ = 0.7 , ρ = 1.97 , and x ( 0 ) ,     y ( 0 ) = 0 ,     10 9 .
Electronics 13 02414 g007
Figure 8. Cross section of the basin of attraction for γ = 0.7 , ρ = 1.97 , and x ( 0 ) ,     y ( 0 ) = 0 ,     10 9 . Each domain of initial states leads to a color representing a particular phase space.
Figure 8. Cross section of the basin of attraction for γ = 0.7 , ρ = 1.97 , and x ( 0 ) ,     y ( 0 ) = 0 ,     10 9 . Each domain of initial states leads to a color representing a particular phase space.
Electronics 13 02414 g008
Figure 9. Implementation procedure of the elaborated multistable memristor synapse-based coupled bi-Hopfield neuron model.
Figure 9. Implementation procedure of the elaborated multistable memristor synapse-based coupled bi-Hopfield neuron model.
Electronics 13 02414 g009
Figure 10. Hardware implementation devices. The dual-channel digital oscilloscope displays a chaotic attractor in the plane ( V z V y ) for γ = 0.7 , ρ = 1.15 , and x 0 ,     y 0 ,     z 0 = 0 ,     10 9 ,     0 .
Figure 10. Hardware implementation devices. The dual-channel digital oscilloscope displays a chaotic attractor in the plane ( V z V y ) for γ = 0.7 , ρ = 1.15 , and x 0 ,     y 0 ,     z 0 = 0 ,     10 9 ,     0 .
Electronics 13 02414 g010
Figure 11. Phase portraits for γ = 0.7 and specific values of the coupling strength ρ : (a) period-1 for ρ = 1.087 , (b) period-2 for ρ = 1.1 , (c) period-3 for ρ = 1.105 , (d) chaos for ρ = 1.107 , (e) period-3 for ρ = 1.13 , (f) period-6 for ρ = 1.134 , (g) chaos for ρ = 1.14 , (h) chaos for ρ = 1.15 , (i) chaos for ρ = 1.4 , (j) period-3 for ρ = 1.728 , (k) period-6 for ρ = 1.972 , and x 0 ,     y 0 ,     z 0 = 0 ,     10 9 ,     0 .
Figure 11. Phase portraits for γ = 0.7 and specific values of the coupling strength ρ : (a) period-1 for ρ = 1.087 , (b) period-2 for ρ = 1.1 , (c) period-3 for ρ = 1.105 , (d) chaos for ρ = 1.107 , (e) period-3 for ρ = 1.13 , (f) period-6 for ρ = 1.134 , (g) chaos for ρ = 1.14 , (h) chaos for ρ = 1.15 , (i) chaos for ρ = 1.4 , (j) period-3 for ρ = 1.728 , (k) period-6 for ρ = 1.972 , and x 0 ,     y 0 ,     z 0 = 0 ,     10 9 ,     0 .
Electronics 13 02414 g011
Figure 12. Complete diagram of the encryption algorithm.
Figure 12. Complete diagram of the encryption algorithm.
Electronics 13 02414 g012
Figure 13. Numerical results: (a) initial image of cerebrovascular accident, (b) initial image of pulmonary fibrosis, (c) initial image of lung cancer, (d) encrypted image of cerebrovascular accident, (e) encrypted image of pulmonary fibrosis, (f) encrypted image of lung cancer, (g) decrypted image of cerebrovascular accident, (h) decrypted image of pulmonary fibrosis, (i) decrypted image of lung cancer.
Figure 13. Numerical results: (a) initial image of cerebrovascular accident, (b) initial image of pulmonary fibrosis, (c) initial image of lung cancer, (d) encrypted image of cerebrovascular accident, (e) encrypted image of pulmonary fibrosis, (f) encrypted image of lung cancer, (g) decrypted image of cerebrovascular accident, (h) decrypted image of pulmonary fibrosis, (i) decrypted image of lung cancer.
Electronics 13 02414 g013aElectronics 13 02414 g013b
Figure 14. Results of slight key modification: (a) correct keys, (b)   γ + 10 17 , (c)   ρ + 10 17 , (d) x ( 0 ) + 10 17 , (e)     y ( 0 ) + 10 17 , and (f)   z ( 0 ) + 10 17 .
Figure 14. Results of slight key modification: (a) correct keys, (b)   γ + 10 17 , (c)   ρ + 10 17 , (d) x ( 0 ) + 10 17 , (e)     y ( 0 ) + 10 17 , and (f)   z ( 0 ) + 10 17 .
Electronics 13 02414 g014aElectronics 13 02414 g014b
Figure 15. The distribution of the pixels of the unencrypted images (a), encrypted images (b), and decrypted images (c).
Figure 15. The distribution of the pixels of the unencrypted images (a), encrypted images (b), and decrypted images (c).
Electronics 13 02414 g015
Figure 16. Impacts of external perturbations and information loss on the performances of the algorithm: (a1(i)–a1(iii)) encrypted images with 0.001 , 0.005 , and 0.01 Gaussian noise, respectively. (a2(i)–a2(iii)) corresponding decrypted images. (b1(i)–b1(iii)) encrypted images with 0.001 , 0.005 , and 0.01 salt and pepper noise, respectively. b2(i)–b2(iii) corresponding decrypted images. (c1(i)–c1(iii)) encrypted image with 1 / 32 , 1 / 16   , and   1 / 4 information loss, respectively. (c2(i)–c2(iii)) corresponding decrypted images.
Figure 16. Impacts of external perturbations and information loss on the performances of the algorithm: (a1(i)–a1(iii)) encrypted images with 0.001 , 0.005 , and 0.01 Gaussian noise, respectively. (a2(i)–a2(iii)) corresponding decrypted images. (b1(i)–b1(iii)) encrypted images with 0.001 , 0.005 , and 0.01 salt and pepper noise, respectively. b2(i)–b2(iii) corresponding decrypted images. (c1(i)–c1(iii)) encrypted image with 1 / 32 , 1 / 16   , and   1 / 4 information loss, respectively. (c2(i)–c2(iii)) corresponding decrypted images.
Electronics 13 02414 g016aElectronics 13 02414 g016b
Table 1. A comparison of this work related to published ones.
Table 1. A comparison of this work related to published ones.
ReferencesNumber of NeuronsCoexisting AttractorsImplementationApplications
[8]3YesPspice and DSP boardNA
[9]4YesNAImage encryption
[10]3YesHardware breadboardNA
[12]3YesPSIM simulationNA
[14]2YesPSIM circuit simulationNA
This work2YesMicrocontrollerBiomedical image encryption
Table 2. Equilibria and their stability.
Table 2. Equilibria and their stability.
ργEquilibriaEigenvaluesStability
10.7 P 0 = 0 ,   0 ,   0 1 ,   1.1 ± j 3.2941 Unstable saddle point (USP)
P 1 ,   2 = ± 0.62 ,   ± 0.29 ,   0 . 3363 1.0927 ± j 2.3594 ,     0.9406 Unstable saddle point (USP)
Table 3. NIST test results.
Table 3. NIST test results.
Name of the Considered Testp-ValueTest Results
xyz
Frequency0.173600.507900.49918Validated
Block-frequency0.181890.144090.18861Validated
Runs0.965990.153810.21472Validated
Longest runs of ones0.633500.652670.74264Validated
Rank0.498850.499280.44669Validated
DFT0.792190.304420.25890Validated
No overlapping templates0.598500.077900.04530Validated
Overlapping templates0.285480.377280.79657Validated
Universal0.761800.999020.35890Validated
Linear complexity0.799800.222410.94489Validated
Serial test 10.818700.684890.22395Validated
Serial test 20.340900.708140.11562Validated
Approximate entropy0.431620.727340.61123Validated
Cumulative sums (forward)0.261000.828750.45276Validated
Random excursions x = 10.510450.578600.35246Validated
Random excursions variant x = 10.961690.598970.84990Validated
As all p-values in Table 3 are greater than the standard value 0.001, all NIST tests are validated.
Table 4. Information entropies of initial images and their corresponding encrypted versions.
Table 4. Information entropies of initial images and their corresponding encrypted versions.
EntropyGray-Scale Images
Cerebrovascular AccidentPulmonary FibrosisLung Cancer
Initial image5.90297.30896.0119
Encrypted version7.99727.99747.9973
Table 5. Computed correlation coefficients.
Table 5. Computed correlation coefficients.
DirectionGray-Scale Images
Initial ImageEncrypted Version
Cerebrovascular AccidentPulmonary FibrosisLung CancerCerebrovascular AccidentPulmonary FibrosisLung Cancer
Horizontal0.94400.99230.94340.0048−0.0019−0.0024
Vertical0.94870.99270.96680.0022−0.0020−0.0034
Diagonal0.90040.98680.92550.0064−0.0026−0.0025
Average0.93100.99060.94520.0045−0.0022−0.0027
Table 6. NPCR and UACI test results.
Table 6. NPCR and UACI test results.
Plaintext Sensitivity
ImagesNPCR (%)UACI (%)
Cerebrovascular accident99.620130.5290
Pulmonary fibrosis99.609428.3197
Lung cancer99.577333.3278
Table 7. Comparison of this image encryption scheme with certain recent encryption methods.
Table 7. Comparison of this image encryption scheme with certain recent encryption methods.
AlgorithmEntropyCorrelation Coefficients of Adjacent PixelsNPCR (%)UACI (%)
HVD
Our algorithm7.9971−0.00480.0034−0.001399.565130.6253
Ref. [35]7.81520.06920.05440.039696.4227.35
Ref. [36]7.9964−0.0057−0.00340.007399.618533.6245
Ref. [37]7.9972−0.0245−0.0193−0.022699.6028.62
Ref. [38]7.99690.00590.00160.002999.217233.4639
The results of Table 7 confirm that the developed image encryption algorithm is more robust than some of the ones studied in recent works.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Tamba, V.K.; Biamou, A.L.M.; Pham, V.-T.; Grassi, G. Multistable Memristor Synapse-Based Coupled Bi-Hopfield Neuron Model: Dynamic Analysis, Microcontroller Implementation and Image Encryption. Electronics 2024, 13, 2414. https://doi.org/10.3390/electronics13122414

AMA Style

Tamba VK, Biamou ALM, Pham V-T, Grassi G. Multistable Memristor Synapse-Based Coupled Bi-Hopfield Neuron Model: Dynamic Analysis, Microcontroller Implementation and Image Encryption. Electronics. 2024; 13(12):2414. https://doi.org/10.3390/electronics13122414

Chicago/Turabian Style

Tamba, Victor Kamdoum, Arsene Loic Mbanda Biamou, Viet-Thanh Pham, and Giuseppe Grassi. 2024. "Multistable Memristor Synapse-Based Coupled Bi-Hopfield Neuron Model: Dynamic Analysis, Microcontroller Implementation and Image Encryption" Electronics 13, no. 12: 2414. https://doi.org/10.3390/electronics13122414

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop