{"title":"A New Memristive System with Extreme Multistability and Hidden Chaotic Attractors and with Application to Image Encryption","authors":"Guangzhe Zhao, He Zhao, Yunzhen Zhang, Xinlei An","doi":"10.1142/s021812742450010x","DOIUrl":null,"url":null,"abstract":"Chaotic systems have proven highly beneficial in engineering applications. Pseudo-random numbers produced by chaotic systems have been used for secure communication, notably image encryption. Specific characteristics can increase the chaotic behavior of the system by adding complexity and nonlinearity. The three most well-known characteristics are memristive properties, multistability (coexisting attractors), and hidden attractors. These characteristics strengthen the produced time series’ unpredictability and randomness, strengthening an encryption algorithm’s resistance to many attacks. This study introduces a unique four-dimensional chaotic system with extreme multistability with respect to three initial conditions (including the memristor initial condition) and all previously known properties. It is rare to find an extreme multistable system like this. This system is coupled with a quadratic flux-controlled memristor based on the well-known Sprott J system. This system has a line of unstable equilibrium points with hidden attractors. The memristor displays the characteristic pinched hysteresis loops, where the area inside a loop and the voltage frequency are inversely related. A comprehensive dynamical analysis thoroughly examines all system characteristics and initial conditions. The numerical findings are carefully verified, and an analog circuit is successfully built and simulated. The chaotic sequences generated by this system are combined with deoxyribonucleic acid (DNA) operations and the global bit scrambling (GBS) technique to create an image encryption algorithm that has strong resistance to a variety of potential attacks, including noise, statistical, exhaustive, differential, and cropping attacks.","PeriodicalId":13688,"journal":{"name":"Int. J. Bifurc. Chaos","volume":"18 1-2","pages":"2450010:1-2450010:25"},"PeriodicalIF":0.0000,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Bifurc. Chaos","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1142/s021812742450010x","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Chaotic systems have proven highly beneficial in engineering applications. Pseudo-random numbers produced by chaotic systems have been used for secure communication, notably image encryption. Specific characteristics can increase the chaotic behavior of the system by adding complexity and nonlinearity. The three most well-known characteristics are memristive properties, multistability (coexisting attractors), and hidden attractors. These characteristics strengthen the produced time series’ unpredictability and randomness, strengthening an encryption algorithm’s resistance to many attacks. This study introduces a unique four-dimensional chaotic system with extreme multistability with respect to three initial conditions (including the memristor initial condition) and all previously known properties. It is rare to find an extreme multistable system like this. This system is coupled with a quadratic flux-controlled memristor based on the well-known Sprott J system. This system has a line of unstable equilibrium points with hidden attractors. The memristor displays the characteristic pinched hysteresis loops, where the area inside a loop and the voltage frequency are inversely related. A comprehensive dynamical analysis thoroughly examines all system characteristics and initial conditions. The numerical findings are carefully verified, and an analog circuit is successfully built and simulated. The chaotic sequences generated by this system are combined with deoxyribonucleic acid (DNA) operations and the global bit scrambling (GBS) technique to create an image encryption algorithm that has strong resistance to a variety of potential attacks, including noise, statistical, exhaustive, differential, and cropping attacks.