Next Article in Journal
Gram Points in the Universality of the Dirichlet Series with Periodic Coefficients
Previous Article in Journal
Quasi-Statistical Schouten–van Kampen Connections on the Tangent Bundle
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Hidden Dynamics of a New Jerk-like System with a Smooth Memristor and Applications in Image Encryption

1
School of Mathematics and Statistics, Yancheng Teachers University, Yancheng 224002, China
2
School of Information Engineering, Yancheng Teachers University, Yancheng 224002, China
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(22), 4613; https://doi.org/10.3390/math11224613
Submission received: 28 September 2023 / Revised: 20 October 2023 / Accepted: 22 October 2023 / Published: 10 November 2023
(This article belongs to the Section Dynamical Systems)

Abstract

:
Considering the dynamic characteristics of memristors, a new Jerk-like system without an equilibrium point is addressed based on a Jerk-like system, and the hidden dynamics are investigated. When changing system parameter b and fixing other parameters, the proposed system shows various hidden attractors, such as a hidden chaotic attractor (b = 5), a hidden period-1 attractor (b = 3.2), and a hidden period-2 attractor (b = 4). Furthermore, bifurcation analysis suggests that not only parameter b, but also the initial conditions of the system, have an effect on the hidden dynamics of the discussed system. The coexistence of various hidden attractors is explored and different coexistences of hidden attractors can be found for suitable system parameters. Offset boosting of different hidden attractors is discussed. It is observed that offset boosting can occur for hidden chaotic attractor, period-1 attractor, and period-2 attractor, but not for period-3 attractor and period-4 attractor. The antimonotonicity of the proposed system is debated and a full Feigenbaum remerging tree can be detected when system parameters a or b change within a certain range. On account of the complicated dynamics of the proposed system, an image encryption scheme is designed, and its encryption effectiveness is analyzed via simulation and comparison.

1. Introduction

As an exciting and fascinating phenomenon in nonlinear systems, chaos has experienced development through the decades and has achieved remarkable results since being discovered in 1963 [1]. Its application has received much attention in various fields [2,3,4,5,6,7].
Some published works show that a nonlinear system can generate two types of attractors: one is a self-excited attractor and the other is a hidden attractor [8,9]. As a new class of attractor, the hidden attractor is distinct from the traditional attractor (self-excited attractor) [10], and its attractive basin does not intersect with any unstable equilibrium point. Therefore, hidden attractors can be detected in some continuous chaotic or hyperchaotic systems with no equilibrium point or only with a stable equilibrium point. Researchers have widely researched hidden attractors and obtained many meaningful results [11,12,13,14,15,16]. In the mentioned results, the existence condition of the hidden attractor, the coexistence and transition of various hidden attractors, and localization of hidden attractors have been investigated, which enriched the research results of nonlinear dynamics.
As a famous chaotic system, the Jerk system attracted researchers’ attention. Regarding high-order Jerk Equations, high-order general Jerk circuits were designed and multi-scrolls were found in the circuit [17]. Some basic qualitative properties of a novel Jerk system were described, and complete chaos synchronization was realized when two parameters were unknown [18]. N-dimensional multi-scroll attractors have been generated in Jerk-like systems by designing nonlinear controllers [19]. A new dissipative Jerk system was presented, and bifurcation analysis revealed its multi-stability [20]. Two primary mechanisms of Jerk systems producing chaotic behavior were discovered [21]. Double-scroll chaotic attractors and multi-stability were detected in a 3D memristive Jerk system, and a scheme for controlling the system from multi-stability to monostability was designed [22]. The effects of the initial conditions of the memristor were disclosed [23]. Infinite equilibrium points were found in a 3D Jerk system disturbed by sinusoidal signal [24]. At the same time, hidden attractors of the Jerk system or Jerk-like systems were explored. Various hidden attractors in a 3D Jerk system were discovered using numerical simulations [25]. Different hidden behaviors were found in a new hyper-Jerk system [26]. Reference [27] introduced some Jerk systems with hidden chaotic behaviors. The above publications have investigated various aspects of the Jerk system and found some complicated behaviors. Some preliminary research about hidden attractors of Jerk systems was carried out.
Analysis of the existing research suggests that, although Jerk and Jerk-like systems have been explored widely and various dynamics have been detected, the considered Jerk or Jerk-like systems seldom involved memristors, which can exhibit interesting complex characteristics [28,29] and draw much attention. In particular, the hidden dynamics of Jerk or Jerk-like systems with memristors were hardly studied. The application of Jerk or Jerk-like systems has mainly focused on designing the circuit.
Motivated by the abovementioned findings, a new Jerk-like system with a smooth memristor without equilibrium is constructed, and some hidden dynamics of the proposed system are investigated. Research results will complement the dynamic theory of Jerk-like systems. On the basis of the complicated dynamics of a Jerk-like system with a smooth memristor, an image encryption method is designed, which will expand the application scope of the Jerk-like system.
Other parts of this paper are arranged as follows. A system description is given in Section 2. In Section 3, hidden dynamics of the new Jerk-like system with a smooth memristor are discussed. In Section 4, an image encryption algorithm is designed based on the chaotic series produced by the Jerk-like system with a smooth memristor, and its effectiveness is verified via experiments.

2. System Description

To construct a new system, Jerk-like system [30],
x ˙ = y y ˙ = z z ˙ = a y + b z + c x z + x 2 + 0.1
is taken into account with positive parameters a , b , c , and state variables x , y , z . a , b , c are tunable parameters controlling the dynamics of system (1). By choosing different values of a , b , c , system (1) can produce various dynamics. System (1) involves seven terms, including only two quadratic nonlinearities. It is relatively simple and elegant. It consists of three general equations, with the third equation containing two quadratic items.
According to the characteristics of memristors, a flux-controlled memristor [31],
W ( w ) = α + 3 β w 2
is considered, where α and β are two positive memristor parameters. And then, a Jerk-like chaotic system with a smooth memristor is written as
x ˙ = y y ˙ = z d ( α + 3 β w 2 ) y z ˙ = a y + b z + c x z + x 2 + 0.1 w ˙ = r ( w y )
where d and r are positive parameters. Other parameters are the same as those in system (1) and flux-controlled memristor (2).
It is obvious that Equations
y = 0 z d ( α + 3 β w 2 ) y = 0 a y + b z + c x z + x 2 + 0.1 = 0 r ( w y ) = 0
have no real solutions, namely, system (3) has no equilibrium point. Therefore, the attractors in following discussion of system (3) should be hidden attractors [32,33].

3. Dynamics Analysis of the New Jerk-like System with a Smooth Memristor

3.1. The Variety of Hidden Dynamics Induced by Parameter Changing

Choose initial value ( x 0 , y 0 , z 0 , w 0 ) = ( 1.61 , 1.5 , 6 , 0.01 ) , a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and for different values of b , the time series of system (3) can be calculated and depicted in Figure 1 and Figure 2, which indicates that various values of b can make system (3) take on different hidden attractors. To further study this phenomenon, a bifurcation diagram with parameter b is depicted in Figure 3. Figure 3 confirms the results in Figure 1 and Figure 2.
Then, when we choose system parameters a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and initial values ( x 0 , y 0 , z 0 , w 0 ) = ( 2 , 0 , 2 , 0 ) and (−2,−1,−2,0), respectively, the bifurcation diagram of variable y with parameter b are drawn in Figure 4a,b, respectively. Figure 1, Figure 2, Figure 3 and Figure 4 indicate that parameter b has much effect on the dynamics of system (3). When fixing other parameters, the change of b can induce the diversity of the dynamic behaviors of system (3). To confirm this result, the corresponding Lyapunov exponents are calculated and given in Figure 5a,b, respectively, which coincide with the result in Figure 4. Figure 4 and Figure 5 suggest that the hidden dynamics of system (3) is not only dependent on system parameter b , but also relative to the initial value of the system.

3.2. Hidden Dynamics to Initial Values

In this section, the effect of initial value on the hidden dynamics of the addressed system is to be discussed.
Firstly, the effect of initial state of memristor on the hidden dynamics of system (3) is concerned. To this end, select system parameters a = 11.2 , b = 5.0 , c = 2 , d = 0.3 , r = 0.1 , α = 1 , β = 0.1 , x 0 = 0 , y 0 = 0 , z 0 = 0 , we change w 0 from −3 to 3, and the bifurcation diagram of variable y is shown in Figure 6, which suggests that system (3) shows different dynamics with w 0 increasing from −3 to 3, such as period and chaos.
Secondly, three cases are considered: ① fix y 0 = 0 , z 0 = 2 , w 0 = 0 , let x 0 change; ② fix x 0 = 2 , z 0 = 2 , w 0 = 0 , let y 0 change; ③ fix x 0 = 2 , y 0 = 2 , w 0 = 0 , let z 0 change. The bifurcation diagrams of system (3) for the above three cases are depicted in Figure 7, from which we can know that when one of x 0 , y 0 , z 0 varies, system (3) exhibits different behaviors, such as chaotic attractors and period attractors.
From Figure 6 and Figure 7, we know that both the initial condition of a Jerk-like system and the initial value of a memristor have an effect on the hidden dynamics of the proposed system (3).
Based on the above, numerical simulations are performed to demonstrate the coexistence of various hidden attractors via examples. Relative results are depicted in Table 1, from which it is obvious that, by selecting various system parameters, the coexistence of different hidden attractors can be observed. This phenomenon indicates that the proposed system has complicated dynamics.

3.3. Offset Boosting of the Hidden Attractors

As we all know, offset boosting is a distinguishing property of a chaotic system. Offset boosting is an effective technique for editing an attractor or an attractor self-reproducing by changing the offset gate. It can be regarded as a useful method to take on attractor-doubling or multistability. It makes sense for exploring the complex dynamics of nonlinear systems. Results in [34,35] indicate that the change in amplitude can induce different attractors. In addition, hidden attractors were detected in some quadratic Jerk systems [36]. The coexistence of multiple attractors and boosting were found by changing parameters [37,38]. Existing results suggest that the feedback state is an effective alternative for controlling the amplitude of relative variables. Considering model (3), state variable x is only involved in the third Equation. Therefore, the transformation x x + k with constant k is used to explore the offset boosting of system (3). x is considered to be offset boostable. And then, system (3) can be rewritten as
x ˙ = y y ˙ = z d ( α + 3 β w 2 ) y z ˙ = a y + b z + c ( x + k ) z + ( x + k ) 2 + 0.1 w ˙ = r ( w y ) .
For a chaotic attractor, choose a = 7 , b = 5.0 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , initial value ( x ( 0 ) , y ( 0 ) , z ( 0 ) , w ( 0 ) ) = ( 1.61 , 1.5 , 6 , 0.01 ) , and the property of offset boosting by changing k is illustrated in Figure 8.
Next, the offset boosting of the period attractors are to be discussed with initial value ( 2 , 0 , 2 , 0 ) . Choose a = 7 , b = 3.2 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , with which system (3) appears as the period-1 attractor, and the property of offset boosting by changing boosting controller k is illustrated in Figure 9. Select a = 7 , b = 4 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , with which system (3) appears as the period-2 attractor, and the property of offset boosting by changing boosting controller k is illustrated in Figure 10. Consider a = 13 , b = 5.2 , c = 2 , d = 0.1 , r = 0.1 , α = 0.1 , β = 0.3 , with which system (3) shows the period-3 attractor, and the property of offset boosting by changing k is depicted in Figure 11. Choose a = 11.2 , b = 4.5 , c = 2 , d = 0.1 , r = 0.01 , α = 0.1 , β = 0.3 with which system (3) shows the period-4 attractor, and the property of offset boosting by changing k is depicted in Figure 12. From Figure 8, Figure 9, Figure 10, Figure 11 and Figure 12, one can know that the offset boosting of the chaotic attractor, period-1 attractor, and period-2 attractor can be provided by varying the boosting controller k , while offset boosting of the period-3 attractor and the period-4 attractor cannot be provided by varying the boosting controller k .

3.4. Antimonotonicity of a Jerk-like System with a Memristor

As we all know, the process of period-doubling bifurcation to chaos is an interesting behavior worth further study. In some nonlinear dynamical systems, reverse period-doubling sequences can be observed after period-doubling bifurcation. Periodic orbits can occur and then disappear via reverse bifurcation sequences. The phenomenon of the creation and annihilation of periodic orbits was named antimonotonicity [39]. It can be detected in system (3) by changing the value of a in a certain range for several discrete values of b when c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and initial value ( x ( 0 ) , y ( 0 ) , z ( 0 ) , w ( 0 ) ) = ( 1.61 , 1.5 , 6 , 0.01 ) . The bifurcation diagrams with controlling parameter a changing are calculated and drawn in Figure 13. From Figure 13, we can know that the period-2 bubble (primary bubble) is obtained for b = 3.8 , and the period-6 bubble is observed for b = 4.7 . With b increasing, more full bubbles appear until chaos occurs (full Feigenbaum remerging tree (fFrt) at b = 4.9 and b = 5.1 ). Similarly, the antimonotonicity in system (3) can also be detected with controlling parameter b changing for discrete values of a when c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 and initial value ( x ( 0 ) , y ( 0 ) , z ( 0 ) , w ( 0 ) ) = ( 1.61 , 1.5 , 6 , 0.01 ) . The bifurcation diagrams when controlling parameter b changing are depicted in Figure 14, which indicates that when a = 5 , system (3) shows a period-2 bubble (Figure 14a); when a = 6.7 , system (3) exhibits a period-6 bubble (Figure 14b); when a = 6.8 or a = 6.9 , fFrt is also found in system (3).

4. An Image Encryption Algorithm Based on the Jerk-like System with a Smooth Memristor

At present, multimedia technology is an important means of information transmission. To avoid information leakage, various information encryption methods were proposed [40,41,42]. Because many digital images contain private information, such as confidential and personal privacy, image encryption algorithms attracted the attention of researchers [43,44,45,46,47]. Due to the complexity of a chaotic system, image encryption based on chaos theory received much attention [44,45,46,47].

4.1. Image Encryption Algorithm

According to Section 3, the new Jerk-like system with a memristor is provided with complex dynamics closely related to values of system parameters and initial conditions. According to this property, the pseudo-random sequences used in the image encryption algorithm can be generated by the proposed system. An image encryption algorithm based on the new Jerk-like system with a memristor is addressed, and the performance analysis is carried out. Suppose the size of a picture is M × N , the pseudo-random sequences produced by the Jerk-like system with a memristor are denoted as S = x j , y j ,   z j , w j   j = 1 , 2 , 3 , , which can be used in the process of scrambling and diffusion of image pixels.
Suppose x i , y i and x i + 1 , y i + 1 are the positions before and after scrambling, respectively, formulas
x i + 1 = ( x i + y i + a b s ( f i x ( z j ) ) + a b s ( f i x ( z j + f ) ) ) mod M y i + 1 = ( x i + y i + a b s ( f i x ( z j ) ) + K sin ( 2 π x i + 1 N ) ) mod N
are utilized in the process of pixel position scrambling with constant K . a b s x means the absolute value of x , f i x x represents a minimum integer greater than or equal to x . f is an integer.
In the process of pixel diffusion, pixel values are modified via formula
v = p ( c × x i + d × y i ) mod L
with   c and d determined by
c = a b s ( 10 l ) x j r o u n d ( 10 l x j ) ) × 10 3 d = a b s ( 10 l ) y j r o u n d ( 10 l y j ) ) × 10 3
where p and v are the pixel values before and after the diffusion, respectively. x i , y i is the position of the pixel. L represents the grayscale of the pixel. R o u n d ( ) is the rounding function. l is a positive integer determined by the computer’s accuracy.
The image can be decrypted according to the inverse of the above encryption process. It should be noted that the parameter selections in the decryption progress are the same as those in the encryption process.
In following simulations, the MATLAB computing environment is used as the programming environment.

4.2. Simulations of the Encryption and Decryption

In the simulations, when choosing a = 7 , b = 5.0 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and initial value ( 1.61 , 1.5 , 6 , 0.01 ) , system (3) is chaotic. l = 3.0 and f = 20 are selected. According to the encryption method in Section 4.1, some gray images are encrypted and decrypted (Figure 15). Figure 15 confirms the effectiveness of the encryption method based on the new Jerk-like system with a memristor. And then, encryption and decryption results for a color Lenna image are depicted in Figure 16, which means that the proposed method is also effective for color images. The time required to encrypt the images in Figure 15 and Figure 16 are listed in Table 2, which illustrates that the proposed encryption method do not need much time to execute the image encryption.

4.3. Performance Analysis of the Encryption Method Based on the New Jerk-like System with a Memristor

4.3.1. Size of the Key Space

According to [48], if an algorithm can resist a brute force attack, the size of the key space must be greater than 2 100 . In the proposed encryption method, there are 13 keys, including four initial values, seven system parameters, and two integers, f and l . In the MATLAB computing environment, the computer has an accuracy of 10 16 . Therefore, the key space of the addressed encryption method is 10 192 , which is far greater than 2 100 and can make the cipher image effectively resist a brute force attack.

4.3.2. Statistical Feature Analysis

The histograms of Figure 15a,b are depicted in Figure 17a,b, respectively, from which we can see that the original image has prominent statistical characteristics. In contrast, the encrypted image has strong randomness. This result illustrates that the proposed encryption method can successfully hide much information about the original image, which makes it difficult to be attacked by statistical attackers.

4.3.3. Test of the Key Sensitivity

Firstly, the encryption process is sensitive to the key. To verify this result, the encryption test is performed for Figure 15a. Make one of the keys slightly change while other keys remain unchanged, and then we can observe the changes in the encrypted images. The test results are given in Table 3.
  • Test 1. Change one initial value; for example, let x 0 = x 0 + 10 5 .
  • Test 2. Change one system parameter; for example, let a = a + 10 5 .
  • Test 3. Change parameter l , and let l = l + 10 5 .
  • Test 4. Change one memristor parameter α , and let   α = α + 10 5 .
From Table 3, it is easy to know that, even though only one key changes slightly, the percentage difference of ciphertext images is very large and close to 100%. It means that the encryption process of the proposed method is susceptible to the key. Furthermore, comparing the percentage difference of the proposed algorithm with the traditional scrambling diffusion algorithm using the random sequences automatically generated by the computer as the pseudorandom sequence, it can be found that, using a pseudorandom sequence automatically generated by computer, the percentage difference is 99.76% when l is altered to l + 10 5 . It suggests that the proposed image encryption algorithm after improving the key space has slightly stronger sensitivity than the traditional scrambling diffusion algorithm. Both of them have an excellent encryption effect.
Secondly, the sensitivity of the decryption process to the key is discussed.
The degree of agreement between the decrypted image and the original image is observed by slightly changing the partial key during the decryption process. With all correct keys, x 0 = 1.61 , y 0 = 1.5 ,   z 0 = 6 ,   w 0 = 0.01 , a = 7.0 ,   b = 5.0 ,   c = 2.0 ,   d = 0.5 ,   r = 0.1 , α = 0.1 ,   β = 0.3 , l = 3.0 , f = 20 , the decrypted result is depicted in Figure 18a. Decryption results by changing the key x 0 , a , l slightly are given in Figure 18b–d, respectively. From Figure 18, we know that even if only one key changes slightly, the decryption result is a messy image, which is meaningless. This result suggests that the decryption process of the proposed method has strong sensitivity to the key.

4.3.4. Correlation Analysis between Adjacent Pixels

The correlation coefficients between adjacent pixels in images Figure 15a,b,d,e,g,h and Figure 16a,b are calculated and listed in Table 4, which suggests that the original images are highly correlated with adjacent pixels, while the correlation between adjacent pixels in the encrypted images are very weak. Furthermore, the results in Table 4 are very close to correlation coefficients [49]. It means that, via the proposed image encryption, the statistical characteristic of the considered images has been spread into the encrypted images with high randomness so that the encrypted images can effectively resist statistical attack.
And then, 2500 pairs of pixels are selected from the Lenna image (Figure 15a) and the encrypted image (Figure 15b), respectively. The scatter diagram about the correlation of adjacent pixels of these points are depicted in Figure 19, from which it is known that, compared with Lenna image, the relevance of the encrypted image is significantly reduced. This result is consistent with Table 4.

4.3.5. Analysis of Information Entropy

As one statistical feature, the information entropy reflects the average amount of information in an image. The information entropy of the encrypted images Figure 15b and Figure 16b can be calculated as 7.9914 and 7.9919, respectively, both of which are very close to the maximum ideal value 8 of original image. This means that the proposed encryption method maintains the integrity of the information and has strong capability of anti-entropy attack.

4.3.6. Analysis of Differential Attack

The number of pixels change rate (NPCR) and the unified average changing intensity (UACI) are two indicators to evaluate whether the encryption algorithm can resist differential attacks. In this section, some images are tested (Figure 15a,d,g and Figure 16a). The values of NPCR and UACI of the encrypted images (Figure 15b,e,h and Figure 16b) via the proposed encryption method are calculated and depicted in Table 5. Comparing the result in Table 5 with Reference [48], it can be found that the gap is very small. The values of NPCR and UACI all approach 99.6093% and 33.4635%, respectively. It means that the values are satisfactory. Then, it means that the proposed image encryption method based on chaotic Jerk-like system with memristor has good ability to avoid the differential attack.

4.3.7. Analysis of the Robustness

Robustness to crop attack and noise disturbance are two important indicators to evaluate the stability of encryption algorithm.
To demonstrate the robustness of the proposed encryption algorithm. Crop attack and noise disturbance have been considered. A block of 100 × 100 pixels was removed from the encrypted image (Figure 20b) and the decrypted image can be gained as Figure 20c. Figure 20 shows that, even if part of the image information is lost, it can recover the original image very well. It suggests that the proposed encryption algorithm can resist a crop attack effectively.
Then, multiplicative noise with a variance of 0.5 and Gauss noise with a mean of zero and a variance of 0.3 were added to the encrypted image (Figure 21b). The corresponding decryption result is depicted in Figure 21c, which means that the proposed encryption algorithm can effectively resist noise disturbance.
Figure 20 and Figure 21 indicate that the proposed encryption algorithm has good robustness to information loss and noise.

5. Conclusions

Considering the complex dynamics of memristor, a new 4D Jerk-like system with a memristor is proposed. Theoretical analysis indicates that the addressed system has no equilibrium point. The following results are obtained:
(1)
System parameters can affect the types of hidden dynamics. The change in parameter can induce various hidden attractors in the new 4D Jerk-like system with a memristor, such as hidden chaotic attractor and hidden period attractors with different periods.
(2)
The coexistence of different kinds of hidden attractors can be found. By choosing appropriate system parameters, different kinds of hidden attractors can coexist, such as chaotic attractor and multi-period, period-1 attractor and chaotic attractor, multi-period attractor and period-1 attractor, multi-period attractor and multi-period attractor.
(3)
Offset boosting in system (3) is analyzed via transformation. Results suggest that, for the chaotic attractor, period-1 attractor, and period-2 attractor, offset boosting can be realized by altering the boosting controller, while offset boosting of the period-3 attractor and period-4 attractor cannot be gained by changing the boosting controller.
(4)
Antimonotonicity has also been demonstrated in the new Jerk-like system with a memristor. Namely, with parameters a or b changing, full Feigenbaum remerging tree appears.
(5)
An image encryption algorithm based on the new 4D Jerk-like system with a memristor is designed. By experiments with their analysis and some comparisons with other results, the effectiveness of the proposed encryption method is verified.

Author Contributions

Conceptualization, L.Z. and J.Y.; methodology, Z.W. and X.S.; software, W.X.; validation, H.J., Z.W. and X.S.; writing—original draft preparation, X.S.; writing—review and editing, H.J.; funding acquisition, X.S., Z.W. and H.J. All authors have read and agreed to the published version of the manuscript.

Funding

This work is funded by the National Natural Science Foundation of China (Grant No. 11872327), the National Natural Science Foundation of China (Grant No. 51777180), the Fundamental Science (Natural Science) Foundation of the Jiangsu Higher Education Institutions of China (20KJA190001) and the Fundamental Science (Natural Science) Foundation of the Jiangsu Higher Education Institutions of China (23KJA120004).

Data Availability Statement

No new data were created. The images that appeared in this article were all completed by the authors.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lorenz, E.N. Deterministic non-periodic flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef]
  2. Norouzi, B.; Mirzakuchaki, S. A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn. 2014, 78, 995–1015. [Google Scholar] [CrossRef]
  3. Gokyildirim, A. Circuit realization of the fractional-order Sprott K chaotic system with standard components. Fractal Fract. 2023, 7, 470. [Google Scholar] [CrossRef]
  4. Inoue, K.; Mao, T.; Okutomi, H.; Umeno, K. An extension of the entropic chaos degree and its positive effect. Jpn. J. Ind. Appl. Math. 2021, 38, 611–624. [Google Scholar] [CrossRef]
  5. Wang, Y.M.; Leng, X.X.; Zhang, C.K.; Du, B.X. Adaptive fast image encryption algorithm based on three-dimensional chaotic system. Entropy 2023, 25, 1399. [Google Scholar] [CrossRef]
  6. Beal, A.N. Extracting communication, ranging and test waveforms with regularized timing from the chaotic Lorenz system. Signals 2023, 4, 507–523. [Google Scholar] [CrossRef]
  7. Takatsuka, K. Quantum chaos in the dynamics of molecules. Entropy 2023, 25, 63. [Google Scholar] [CrossRef]
  8. Leonov, G.A.; Kuznetsov, N.V.; Vagaitsev, V.I. Hidden attractor in smooth Chua systems. Phys. D 2012, 241, 1482–1486. [Google Scholar] [CrossRef]
  9. Leonov, G.A.; Kuznetsov, N.V.; Mokaev, T.N. Homoclinic orbits, and self-excited and hidden attractors in a Lorenz-like system describing convective fluid motion. Eur. J. Phys. 2015, 224, 1421–1458. [Google Scholar] [CrossRef]
  10. Leonov, G.A.; Kuznetsov, N.V.; Mokaev, T.N. Hidden attractor and homoclinic orbit in Lorenz-like system describing convective fluid motion in rotating cavity. Comm. Nonlinear Sci. 2015, 28, 166–174. [Google Scholar] [CrossRef]
  11. Leonov, G.A.; Kuznetsov, N.V.; Vagaitsev, V.I. Localization of hidden Chua’s attractors. Phys. Lett. A 2011, 375, 2230–2233. [Google Scholar] [CrossRef]
  12. Vo, T.P.; Shaverdi, Y.; Khalaf, A.J.M.; Alsaadi, F.E.; Hayat, T.; Pham, V.T. A giga-stable oscillator with hidden and self-excited attractors: A megastable oscillator forced by his twin. Entropy 2019, 21, 535. [Google Scholar] [CrossRef] [PubMed]
  13. Nestor, T.; Dieu, N.J.D.; Jacques, K.; Yves, E.J.; Iliyasu, A.M.; El-Latif, A.A.A. A multidimensional hyperjerk oscillator: Dynamics analysis, analogue and embedded systems implementation, and its application as a cryptosystem. Sensors 2020, 20, 83. [Google Scholar] [CrossRef] [PubMed]
  14. Lawnik, M.; Moysis, L.; Volos, C. A family of 1D chaotic maps without equilibria. Symmetry 2023, 15, 1311. [Google Scholar] [CrossRef]
  15. Matouk, A.E.; Abdelhameed, T.N.; Almutairi, D.K.; Abdelkawy, M.A.; Herzallah, M.A.E. Existence of self-excited and hidden attractors in the modified autonomous Van Der Pol- Duffing systems. Mathematics 2023, 11, 591. [Google Scholar] [CrossRef]
  16. Ahmad, I.; Srisuchinwong, B.; Jamil, M.U. Coexistence of hidden attractors in the smooth cubic Chua’s Circuit with two stable equilibria. Int. J. Bifurc. Chaos 2023, 33, 2330010. [Google Scholar] [CrossRef]
  17. Liu, M.H.; Yu, S.M. Multi-scroll high-order general Jerk circuits. Acta Phys. Sin.-Chin. Ed. 2006, 55, 5707–5713. [Google Scholar] [CrossRef]
  18. Vaidyanathan, S. Analysis, control, and synchronization of a 3-D novel Jerk chaotic system with two quadratic nonlinearities. Kyungpook Math. J. 2015, 55, 563–586. [Google Scholar] [CrossRef]
  19. He, S.B.; Sun, K.H.; Wang, H.H.; Ai, X.X.; Xu, Y.X. Design of n-dimensional multi-scroll Jerk chaotic system and its performances. J. Appl. Anal. Comput. 2016, 6, 1180–1194. [Google Scholar] [CrossRef]
  20. Vaidyanathan, S.; Benkouider, K.; Sambas, A. A new multistable jerk chaotic system, its bifurcation analysis, backstepping control-based synchronization design and circuit simulation. Arch. Control Sci. 2022, 32, 123–152. [Google Scholar] [CrossRef]
  21. Hu, X.Y.; Sang, B.; Wang, N. The chaotic mechanisms in some jerk systems. AIMS Math. 2022, 7, 15714–15740. [Google Scholar] [CrossRef]
  22. Kengne, L.K.; Muni, S.S.; Chedjou, J.C.; Kyandoghere, K. Various coexisting attractors, asymmetry analysis and multi-stability control in a 3D memristive jerk system. Eur. Phys. J. Plus 2022, 137, 848. [Google Scholar] [CrossRef]
  23. Bao, H.; Ding, R.Y.; Hua, M.J.; Wu, H.G.; Chen, B. Initial-condition effects on a two-memristor-based Jerk system. Mathematics 2022, 10, 411. [Google Scholar] [CrossRef]
  24. Li, F.D.; Zeng, J.R. Multi-scroll attractor and multi-stable dynamics of a three-dimensional Jerk system. Energies 2023, 16, 2494. [Google Scholar] [CrossRef]
  25. Wang, Z.; Lin, X.L. Dynamics analysis and periodic solution of a 3D Jerk system with hidden attractor. J. Southwest Univ. (Nat. Sci. Ed.) 2017, 39, 1–10. [Google Scholar]
  26. Vijayakumar, M.D.; Natiq, H.; Leutcho, G.D.; Rajagopal, K.; Jafari, S.; Hussain, I. Hidden and self-excited collective dynamics of a new multistable hyper-Jerk system with unique equilibrium. Int. J. Bifurc. Chaos 2022, 32, 2250063. [Google Scholar] [CrossRef]
  27. Li, B.X.; Sang, B.; Liu, M.; Hu, X.Y.; Zhang, X.; Wang, N. Some Jerk systems with hidden chaotic dynamics. Int. J. Bifurc. Chaos 2023, 33, 2350069. [Google Scholar] [CrossRef]
  28. Wang, L.Y. Research progress of the memristor and its application foreground. Electron. Compon. Mater. 2010, 29, 71–74. [Google Scholar]
  29. Mou, J. Editorial: Advances in memristor and memristor-based applications. Front. Phys. 2022, 10, 1005216. [Google Scholar] [CrossRef]
  30. Zhang, S.; Zeng, Y.C. A simple Jerk-like system without equilibrium: Asymmetric coexisting hidden attractors, bursting oscillation and double full Feigenbaum remerging trees. Chaos Solitons Fractals 2019, 120, 25–40. [Google Scholar] [CrossRef]
  31. Bao, B.C.; Liu, Z.; Xu, J.P. Dynamical analysis of memristor chaotic oscillator. Acta Phys. Sin.-Chin. Ed. 2010, 59, 3785–3793. [Google Scholar] [CrossRef]
  32. Sharma, P.R.; Shrimali, M.D.; Prasad, A.; Kuznetsov, N.V.; Leonov, G.A. Controlling dynamics of hidden attractors. Int. J. Bifurc. Chaos 2015, 25, 1550061. [Google Scholar] [CrossRef]
  33. Dudkowski, D.; Jafari, S.; Kapitaniak, T.; Kuznetsov, N.V.; Leonov, G.A.; Prasad, A. Hidden attractors in dynamical systems. Phys. Rep. 2016, 637, 1–50. [Google Scholar] [CrossRef]
  34. Li, C.; Wang, X.; Chen, G. Diagnosing multi-stability by offset boosting. Nonlinear Dyn. 2017, 90, 1335–1341. [Google Scholar] [CrossRef]
  35. Leutcho, G.D.; Kengne, J. A unique chaotic snap system with a smoothly adjustable symmetry and nonlinearity: Chaos, offset-boosting, antimonotonicity, and coexisting multiple attractors. Chaos Soliton. Fract. 2018, 113, 275–293. [Google Scholar] [CrossRef]
  36. Liu, M.; Sang, B.; Wang, N.; Ahmad, I. Chaotic dynamics by some quadratic Jerk systems. Axioms 2021, 10, 227. [Google Scholar] [CrossRef]
  37. Zhou, L.; You, Z.Z.; Liang, X.L.; Li, X.W. A memristor-based colpitts oscillator circuit. Mathematics 2023, 10, 4820. [Google Scholar] [CrossRef]
  38. Guo, Z.G.; Wen, J.J.; Mou, J. Dynamic analysis and DSP implementation of memristor chaotic systems with multiple forms of hidden attractors. Mathematics 2023, 11, 24. [Google Scholar] [CrossRef]
  39. Dawson, S.P.; Grebogi, C.; Yorke, J.A.; Kan, I.; Ko, C.H. Antimonotonicity: Inevitable reversals of period-doubling cascades. Phys. Lett. A 1992, 162, 249–254. [Google Scholar] [CrossRef]
  40. Ava, H.; Nicole, M.F. An encryption architecture suitable for on chip integration with sensors. IEEE J. Emerg. Sel. Top. Circuits Syst. 2021, 11, 395–404. [Google Scholar] [CrossRef]
  41. Kadhim, A.; Khalaf, S. New approach for security chatting in real time. Int. J. Emerg. Trends Technol. Comput. Sci. 2015, 4, 30–36. [Google Scholar]
  42. Zhang, X.; Seo, S.H.; Wang, C. A lightweight encryption method for privacy protection in surveillance videos. IEEE Access 2018, 6, 18074–18087. [Google Scholar] [CrossRef]
  43. Alhussan, A.A.; Farhan, A.K.; Abdelhamid, A.A.; El-Kenawy, E.S.M.; Ibrahim, A.; Khafaga, D.S. Optimized ensemble model for wind power forecasting using hybrid whale and dipper-throated optimization algorithms. Front. Energy. Res. 2023, 11, 1174910. [Google Scholar] [CrossRef]
  44. Zhu, C.X.; Xu, S.Y.; Hu, Y.P.; Sun, K.H. Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 2015, 79, 1511–1518. [Google Scholar] [CrossRef]
  45. Wang, J.; Liu, W.Y.; Zhang, S. Adaptive encryption of digital images based on lifting wavelet optimization. Multimed. Tools Appl. 2020, 79, 9363–9386. [Google Scholar] [CrossRef]
  46. Alhudhaif, A.D.I.; Ahmad, M.; Alkhayyat, A.; Tsafack, N.; Farhan, A.K.; Ahmed, R. Block cipher nonlinear confusion components based on new 5-D hyperchaotic system. IEEE Access 2021, 9, 87686–87696. [Google Scholar] [CrossRef]
  47. Naif, J.R.; Abdul-majeed, G.H.; Farhan, A.K. Internet of things security using new chaotic system and lightweight AES. J. Al-Qadisiyah Comput. Sci. Math. 2019, 11, 45–52. [Google Scholar] [CrossRef]
  48. Alvarez, G.; Li, S.J. Some basic cryptographic requirements for chaos-based cryptosystem. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
  49. Wang, X.Y.; Zhu, X.Q.; Zhang, Y.Q. An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 2018, 6, 23733–23746. [Google Scholar] [CrossRef]
Figure 1. The hidden chaotic attractor of system (3) for b = 5 when parameters a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and initial value ( x 0 , y 0 , z 0 , w 0 ) = ( 1.61 , 1.5 , 6 , 0.01 ) . (a) Time series of variable x ; (b) phase portrait in the x y plane.
Figure 1. The hidden chaotic attractor of system (3) for b = 5 when parameters a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and initial value ( x 0 , y 0 , z 0 , w 0 ) = ( 1.61 , 1.5 , 6 , 0.01 ) . (a) Time series of variable x ; (b) phase portrait in the x y plane.
Mathematics 11 04613 g001
Figure 2. The hidden period attractors of system (3) for different values of b when a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and initial value ( x 0 , y 0 , z 0 , w 0 ) = ( 1.61 , 1.5 , 6 , 0.01 ) . (a) Period-1 attractor for b = 3.2 ; (b) period-2 attractor for b = 4 .
Figure 2. The hidden period attractors of system (3) for different values of b when a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and initial value ( x 0 , y 0 , z 0 , w 0 ) = ( 1.61 , 1.5 , 6 , 0.01 ) . (a) Period-1 attractor for b = 3.2 ; (b) period-2 attractor for b = 4 .
Mathematics 11 04613 g002
Figure 3. The bifurcation diagram of variable y with parameter b when a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and initial value ( x 0 , y 0 , z 0 , w 0 ) = ( 1.61 , 1.5 , 6 , 0.01 ) .
Figure 3. The bifurcation diagram of variable y with parameter b when a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and initial value ( x 0 , y 0 , z 0 , w 0 ) = ( 1.61 , 1.5 , 6 , 0.01 ) .
Mathematics 11 04613 g003
Figure 4. The bifurcation diagram of variable y maxima with b changing for a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and different initial values. (a) Initial value ( 2 , 0 , 2 , 0 ) ; (b) initial value ( 2 , 1 , 2 , 0 ) .
Figure 4. The bifurcation diagram of variable y maxima with b changing for a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and different initial values. (a) Initial value ( 2 , 0 , 2 , 0 ) ; (b) initial value ( 2 , 1 , 2 , 0 ) .
Mathematics 11 04613 g004
Figure 5. Lyapunov exponents of system (3) for parameter b with a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and different initial values. (a) Initial value ( 2 , 0 , 2 , 0 ) ; (b) initial value ( 2 , 1 , 2 , 0 ) .
Figure 5. Lyapunov exponents of system (3) for parameter b with a = 7 , c = 2 , d = 0.5 , r = 0.1 , α = 0.1 , β = 0.3 , and different initial values. (a) Initial value ( 2 , 0 , 2 , 0 ) ; (b) initial value ( 2 , 1 , 2 , 0 ) .
Mathematics 11 04613 g005
Figure 6. Bifurcation diagram of y in system (3) with w 0 changing.
Figure 6. Bifurcation diagram of y in system (3) with w 0 changing.
Mathematics 11 04613 g006
Figure 7. The bifurcation diagrams of the local maxima of coordinate y in system (3) when one of x 0 , y 0 , z 0 changes for a = 11.2 , b = 5.0 , c = 2 , d = 0.3 , r = 0.1 , α = 0.1 , β = 0.3 . (a) x 0 changing while y 0 = w 0 = 0 , z 0 = 2 ; (b) y 0 changing while x 0 = z 0 = 2 , w 0 = 0 ; (c) z 0 changing while x 0 = y 0 = 2 , w 0 = 0 .
Figure 7. The bifurcation diagrams of the local maxima of coordinate y in system (3) when one of x 0 , y 0 , z 0 changes for a = 11.2 , b = 5.0 , c = 2 , d = 0.3 , r = 0.1 , α = 0.1 , β = 0.3 . (a) x 0 changing while y 0 = w 0 = 0 , z 0 = 2 ; (b) y 0 changing while x 0 = z 0 = 2 , w 0 = 0 ; (c) z 0 changing while x 0 = y 0 = 2 , w 0 = 0 .
Mathematics 11 04613 g007
Figure 8. Offset boosting of the chaotic attractor in system (5). (a) Phase portrait in x z plane; (b) phase portrait in x w plane. In (a,b), the lines with different colors correspond to different values of k : red line for k = 0 , green line for k = 4 , blue line for k = 8 , and black line for k = 12 .
Figure 8. Offset boosting of the chaotic attractor in system (5). (a) Phase portrait in x z plane; (b) phase portrait in x w plane. In (a,b), the lines with different colors correspond to different values of k : red line for k = 0 , green line for k = 4 , blue line for k = 8 , and black line for k = 12 .
Mathematics 11 04613 g008
Figure 9. Offset boosting of the period-1 attractor. (a) Phase portrait in the x z plane; (b) phase portrait in the x w plane. In (a,b), the lines with different colors correspond to different values of k : red line for k = 0 , green line for k = 1 , blue line for k = 2 , and black line for k = 3 .
Figure 9. Offset boosting of the period-1 attractor. (a) Phase portrait in the x z plane; (b) phase portrait in the x w plane. In (a,b), the lines with different colors correspond to different values of k : red line for k = 0 , green line for k = 1 , blue line for k = 2 , and black line for k = 3 .
Mathematics 11 04613 g009
Figure 10. Offset boosting of the period-2 attractor. (a) Phase portrait in the x z plane; (b) phase portrait in the x w plane. In (a,b), the lines with different colors correspond to different values of k : red line for k = 2 , green line for k = 0 , blue line for k = 2 , and black line for k = 4 .
Figure 10. Offset boosting of the period-2 attractor. (a) Phase portrait in the x z plane; (b) phase portrait in the x w plane. In (a,b), the lines with different colors correspond to different values of k : red line for k = 2 , green line for k = 0 , blue line for k = 2 , and black line for k = 4 .
Mathematics 11 04613 g010
Figure 11. Offset boosting of the period-3 attractor via transformation x x + k with a = 13 , b = 5.2 , c = 2 , d = 0.1 , r = 0.6 , α = 0.1 , β = 0.3 , initial value ( 2 , 0 , 2 , 0 ) . (a) Phase portrait in the x z plane; (b) phase portrait in the x w plane. In (a,b), the lines with different colors correspond to different values of k : red line for k = 2 , green line for k = 0 , blue line for k = 2 , and black line for k = 4 .
Figure 11. Offset boosting of the period-3 attractor via transformation x x + k with a = 13 , b = 5.2 , c = 2 , d = 0.1 , r = 0.6 , α = 0.1 , β = 0.3 , initial value ( 2 , 0 , 2 , 0 ) . (a) Phase portrait in the x z plane; (b) phase portrait in the x w plane. In (a,b), the lines with different colors correspond to different values of k : red line for k = 2 , green line for k = 0 , blue line for k = 2 , and black line for k = 4 .
Mathematics 11 04613 g011
Figure 12. Offset boosting of the period-4 attractor doesn’t appear via transformation x x + k with a = 11.2 , b = 4.5 , c = 2 , d = 0.1 , r = 0.01 , α = 0.1 , β = 0.3 , initial value ( 2 , 0 , 2 , 0 ) . (a) Phase portrait in the x z plane; (b) phase portrait in the x w plane. In (a,b), the lines with different colors correspond to different values of k : red line for k = 2 , green line for k = 0 , blue line for k = 2 , and black line for k = 4 .
Figure 12. Offset boosting of the period-4 attractor doesn’t appear via transformation x x + k with a = 11.2 , b = 4.5 , c = 2 , d = 0.1 , r = 0.01 , α = 0.1 , β = 0.3 , initial value ( 2 , 0 , 2 , 0 ) . (a) Phase portrait in the x z plane; (b) phase portrait in the x w plane. In (a,b), the lines with different colors correspond to different values of k : red line for k = 2 , green line for k = 0 , blue line for k = 2 , and black line for k = 4 .
Mathematics 11 04613 g012
Figure 13. The bifurcation diagrams of local maxima of the coordinate y about a . (a) Period-2 at b = 3.8 , (b) period-6 at b = 4.7 , (c,d) fFrt at b = 4.9 and b = 5.1 .
Figure 13. The bifurcation diagrams of local maxima of the coordinate y about a . (a) Period-2 at b = 3.8 , (b) period-6 at b = 4.7 , (c,d) fFrt at b = 4.9 and b = 5.1 .
Mathematics 11 04613 g013
Figure 14. The bifurcation diagrams of local maxima of the coordinate y about b . (a) Period-2 at a = 5 , (b) period-6 at a = 6.7 , (c,d) fFrt at a = 6.8 and a = 6.9 .
Figure 14. The bifurcation diagrams of local maxima of the coordinate y about b . (a) Period-2 at a = 5 , (b) period-6 at a = 6.7 , (c,d) fFrt at a = 6.8 and a = 6.9 .
Mathematics 11 04613 g014
Figure 15. Encryption and decryption of some gray images via the method based on the new Jerk-like system with a memristor. (a) Original Lenna image; (b) encrypted Lenna image; (c) decrypted Lenna image. (d) Original Peppers image; (e) encrypted Peppers image; (f) decrypted Peppers image. (g) Original image of camera man; (h) encrypted image of camera man; (i) decrypted image of camera man.
Figure 15. Encryption and decryption of some gray images via the method based on the new Jerk-like system with a memristor. (a) Original Lenna image; (b) encrypted Lenna image; (c) decrypted Lenna image. (d) Original Peppers image; (e) encrypted Peppers image; (f) decrypted Peppers image. (g) Original image of camera man; (h) encrypted image of camera man; (i) decrypted image of camera man.
Mathematics 11 04613 g015
Figure 16. Encryption and decryption of color Lenna image via the method based on the new Jerk-like system with a memristor. (a) Original image; (b) encrypted image; (c) decrypted image.
Figure 16. Encryption and decryption of color Lenna image via the method based on the new Jerk-like system with a memristor. (a) Original image; (b) encrypted image; (c) decrypted image.
Mathematics 11 04613 g016
Figure 17. Histograms of the gray Lenna image and the encrypted image based on the Jerk-like system with a memristor. (a) Histogram of the gray Lenna image; (b) histogram of the encrypted Lenna image.
Figure 17. Histograms of the gray Lenna image and the encrypted image based on the Jerk-like system with a memristor. (a) Histogram of the gray Lenna image; (b) histogram of the encrypted Lenna image.
Mathematics 11 04613 g017
Figure 18. Sensitivity of the decryption process to the key. (a) Decryption result with correct keys; (b) decryption result with x 0 = 1.61 + 10 8 and other keys being correct; (c) decryption result with a = 3.0 + 10 8 and other keys being correct; (d) decryption result with l = 1.0 + 10 8 and other keys being correct.
Figure 18. Sensitivity of the decryption process to the key. (a) Decryption result with correct keys; (b) decryption result with x 0 = 1.61 + 10 8 and other keys being correct; (c) decryption result with a = 3.0 + 10 8 and other keys being correct; (d) decryption result with l = 1.0 + 10 8 and other keys being correct.
Mathematics 11 04613 g018
Figure 19. Scatter diagrams for the correlation in the Lenna image and the encrypted one. (ac) are the scatter diagrams of Figure 15a, and (df) are the scatter diagrams of Figure 15b. (a,d) are horizontal scatters; (b,e) are vertical scatters; (c,f) are diagonal scatters.
Figure 19. Scatter diagrams for the correlation in the Lenna image and the encrypted one. (ac) are the scatter diagrams of Figure 15a, and (df) are the scatter diagrams of Figure 15b. (a,d) are horizontal scatters; (b,e) are vertical scatters; (c,f) are diagonal scatters.
Mathematics 11 04613 g019
Figure 20. Resisting-cropping test of image encryption. (a) Plain Lenna image; (b) encrypted Lenna image with a block of 100 × 100 pixels being removed; (c) decrypted image of cropped image.
Figure 20. Resisting-cropping test of image encryption. (a) Plain Lenna image; (b) encrypted Lenna image with a block of 100 × 100 pixels being removed; (c) decrypted image of cropped image.
Mathematics 11 04613 g020
Figure 21. Resisting-noise test of image encryption. (a) Plain Lenna image; (b) encrypted Lenna image added with multiplicative noise and Gauss noise; (c) decrypted image of noise disturbed image.
Figure 21. Resisting-noise test of image encryption. (a) Plain Lenna image; (b) encrypted Lenna image added with multiplicative noise and Gauss noise; (c) decrypted image of noise disturbed image.
Mathematics 11 04613 g021
Table 1. Coexistence of various hidden attractors with different system parameters.
Table 1. Coexistence of various hidden attractors with different system parameters.
ParametersType of Hidden AttractorsDiagrams
a = 11.35 , b = 6.0 , c = 2 , d = 0.1 , r = 0.1 , α = 0.1 , β = 0.3 Coexistence of chaotic attractor (red line for initial value (−2, 0, −2, 0)) and periodic-6 attractor (blue line for initial value (−2, 1, −2, 0)).Mathematics 11 04613 i001
a = 11.2 , b = 5.0 , c = 2 , d = 0.5 , r = 0.01 , α = 0.1 , β = 0.3 Coexistence of periodic-1 attractor (red line for initial value (−2, 0, −2, 0)) and chaotic attractor (blue line for initial value (−2, 1, −2, 0)).Mathematics 11 04613 i002
a = 11.2 , b = 4.5 , c = 2 , d = 0.1 , r = 0.01 , α = 0.1 , β = 0.3 Coexistence of periodic-4 attractor (red line for initial value (−2, 0, −2, 0)) and periodic-1 attractor (blue line for initial value (−2, 1, −2, 0)).Mathematics 11 04613 i003
a = 13 , b = 5.2 , c = 2 , d = 0.1 , r = 0.6 , α = 0.1 , β = 0.3 Coexistence of periodic-3 attractor (red line for initial value (−2, 0, −2, 0)) and periodic-4 attractor (blue line for initial value (−2, 1, −2, 0)).Mathematics 11 04613 i004
Table 2. The time required to encrypt images in Figure 15 and Figure 16.
Table 2. The time required to encrypt images in Figure 15 and Figure 16.
Gray Lenna ImagePeppersCamara ManColor Lenna Image
Required time34 s33 s32 s35 s
Note. In Table 2, s means time unit second.
Table 3. Percentage difference of the cipher image based on the new Jerk-like system with a memristor when only one key changes slightly.
Table 3. Percentage difference of the cipher image based on the new Jerk-like system with a memristor when only one key changes slightly.
Test 1Test 2Test 3 Test 4
Percentage difference of
cipher image
99.73%99.82%99.90%99.93%
Table 4. Correlation coefficient between adjacent pixels in some original images and encrypted images.
Table 4. Correlation coefficient between adjacent pixels in some original images and encrypted images.
ImagesOriginal ImageEncrypted Image
HorizontalVerticalDiagonalHorizontalVerticalDiagonal
Gray Lenna0.96040.98460.9811−0.0220−0.0006−0.0194
Peppers0.96010.96880.95020.00350.00790.0008
Camera man0.95890.97120.94030.0045−0.00560.0029
Color Lenna0.96290.98790.9838−0.0233−0.0002−0.0205
Table 5. NPCR and UACI evaluations.
Table 5. NPCR and UACI evaluations.
Test ImagesNPCRUACI
Gray Lenna 99.6194%33.4635%
Peppers99.4936%33.3988%
Camera man99.5738%33.4406%
Color Lenna99.5987%33.4589%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Z.; Zhuang, L.; Yu, J.; Jiang, H.; Xu, W.; Shi, X. Hidden Dynamics of a New Jerk-like System with a Smooth Memristor and Applications in Image Encryption. Mathematics 2023, 11, 4613. https://doi.org/10.3390/math11224613

AMA Style

Wang Z, Zhuang L, Yu J, Jiang H, Xu W, Shi X. Hidden Dynamics of a New Jerk-like System with a Smooth Memristor and Applications in Image Encryption. Mathematics. 2023; 11(22):4613. https://doi.org/10.3390/math11224613

Chicago/Turabian Style

Wang, Zuolei, Lizhou Zhuang, Jianjiang Yu, Haibo Jiang, Wanjiang Xu, and Xuerong Shi. 2023. "Hidden Dynamics of a New Jerk-like System with a Smooth Memristor and Applications in Image Encryption" Mathematics 11, no. 22: 4613. https://doi.org/10.3390/math11224613

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop