Startseite Multistability, chaos and hyperchaos in a novel 3D discrete memristive system: microcontroller implementation and cryptography
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Multistability, chaos and hyperchaos in a novel 3D discrete memristive system: microcontroller implementation and cryptography

  • Brondelle Falonne Namekong Tatang , Adele Armele Ngo Mouelas , Rodrigue Andre Tchamda , Herman Landry Ndassi , Romanic Kengne EMAIL logo und Martin Tchoffo
Veröffentlicht/Copyright: 22. April 2025

Abstract

Discrete nonlinear systems involving memristors have been extensively studied in recent years. In this work, we combine the nonlinearity of a discrete memristor with a sinusoidal transformation scheme to construct a new 3D discrete hyperchaotic circuit, which is useful for image encryption. Firstly, we perform a dynamical analysis of the proposed system. Using analytical and numerical tools, we find that the model exhibits rich and complex dynamics, including fixed-point planes, hidden attractors, hyperchaos, periodicity, and multistability. To demonstrate its practical implementation, the proposed oscillator is integrated into a microcontroller-based laboratory setup, and the experimental results closely match the numerical findings. Secondly, hyperchaotic sequences generated by the new model are used to build a simple 8 × 8 S-box for secure image encryption. The hyperchaotic sequences are first used to shuffle the columns and rows of the original image, which is then substituted using the 8 × 8 substitution box and finally encrypted through nonlinear diffusion. To validate the performance of our protocol, we conduct standard security analyses, including correlation coefficient evaluation, pixel change rate, information entropy, time complexity, and key space analysis. The results are in perfect agreement with those in the literature.


Corresponding author: Romanic Kengne, Laboratory of Condensed Matter, Electronics and Signal Processing, Department of Physics, Faculty of Sciences, University of Dschang, P.O. Box 67, Dschang, Cameroon, E-mail: 

Acknowledgments

The authors express their gratitude to Pr. Robert Tchitnga for his advice during the working out of this manuscript.

  1. Research ethics: Not applicable.

  2. Informed consent: Not Applicable.

  3. Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission. R.K and M.T built the problem and proposed the model. B.N.T and A.A.N.M dealt with the stability and perform numerical simulation. B.N.T, A.A.N.M and H.L.N dealt with the cryptography. A.R.T dealt with the microcontroller implementation. B.N.T and A.A.N.M revised the manuscript.

  4. Use of Large Language Models, AI and Machine Learning Tools: None declared.

  5. Conflict of interest: All other authors state no conflict of interest.

  6. Research funding: None declared.

  7. Data availability: None declared.

References

[1] F. Elashry, O. S. F. Allah, A. M. Abbas, S. El-Rabaie, and F. E. A. El-Samie, “Homomorphic image encryption,” J. Electron. Imag., vol. 18, no. 3, 2009, Art. no. 033002. https://doi.org/10.1117/1.3167847.Suche in Google Scholar

[2] X. Chai, J. Bi, Z. Gan, X. Liu, Y. Zhang, and Y. Chen, “Color image compression and encryption scheme based on compressive sensing and double random encryption strategy,” Signal Process., vol. 176, p. 107684, 2020. https://doi.org/10.1016/j.sigpro.2020.107684.Suche in Google Scholar

[3] L. Huang, S. Cai, X. Xiong, and M. Xiao, “On symmetric color image encryption system with permutation–diffusion simultaneous operation,” Opt. Lasers Eng., vol. 115, pp. 7–20, 2019. https://doi.org/10.1016/j.optlaseng.2018.11.015.Suche in Google Scholar

[4] L. Liu, Q. Zhang, and X. Wei, “A RGB image encryption algorithm based on DNA encoding and chaos map,” Comput. Electr. Eng., vol. 38, pp. 1240–1248, 2012. https://doi.org/10.1016/j.compeleceng.2012.02.007.Suche in Google Scholar

[5] M. François, T. Grosges, D. Barchiesi, and R. Erra, “A new image encryption scheme based on a chaotic function,” Signal Process. Image Commun., vol. 27, no. 3, pp. 249–259, 2012. https://doi.org/10.1016/j.image.2011.11.003.Suche in Google Scholar

[6] T. Farah, R. Rhouma, and S. Belghith, “A novel method for designing S-bsox based on chaotic map and teaching–learning-based optimization,” Nonlinear Dyn., vol. 88, no. 2, pp. 1059–1074, 2017. https://doi.org/10.1007/s11071-016-3295-y.Suche in Google Scholar

[7] J. Zheng, H. Hu, and X. Xia, “Applications of symbolic dynamics in 593 counteracting the dynamical degradation of digital chaos,” Nonlinear Dyn., vol. 94, no. 2, pp. 1535–1546, 2018. https://doi.org/10.1007/s11071-018-4440-6.Suche in Google Scholar

[8] C. Li, D. Lin, J. Lü, and F. Hao, “Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography,” IEEE MultiMedia, vol. 25, no. 4, pp. 46–56, 2018. https://doi.org/10.1109/mmul.2018.2873472.Suche in Google Scholar

[9] M. Itoh and L. O. Chua, “Memristor oscillators,” Int. J. Bifurcat. Chaos, vol. 18, no. 11, pp. 3183–3206, 2008. https://doi.org/10.1142/s0218127408022354.Suche in Google Scholar

[10] A. S. Elwakil and M. P. Kennedy, “Construction of classes of circuit-independent chaotic oscillators using passive-only nonlinear devices,” IEEE Trans. Circ. Syst. I, vol. 48, no. 3, pp. 289–308, 2001. https://doi.org/10.1109/81.915386.Suche in Google Scholar

[11] H. Li, Z. Hua, H. Bao, L. Zhu, M. Chen, and B. Bao, “Two-dimensional memristive hyperchaotic maps and application in secure communication,” IEEE Trans. Ind. Electron., vol. 68, no. 10, pp. 9931–9940, 2021. https://doi.org/10.1109/tie.2020.3022539.Suche in Google Scholar

[12] H. Bao, Z. Hua, N. Wang, L. Zhu, M. Chen, and B. Bao, “Initials-boosted coexisting chaos in a 2-D sine map and its hardware implementation,” IEEE Trans. Ind. Inf., vol. 17, no. 2, pp. 1132–1140, 2021. https://doi.org/10.1109/tii.2020.2992438.Suche in Google Scholar

[13] L. Houzhen, Z. Hua, H. Bao, L. Zhu, M. Chen, and B. Bao, “Two-dimensional memristive hyperchaotic maps and application in secure communication,” IEEE Trans. Ind. Electron., vol. 68, no. 10, pp. 9931–9940, 2020.10.1109/TIE.2020.3022539Suche in Google Scholar

[14] B. A. Mezatio, M. T. Motchongom, B. R. W. Tekam, R. Kengne, R. Tchitnga, and A. Fomethe, “A novel memristive 6D hyperchaotic autonomous system with extreme multistability,” Chaos Solitons Fractals, vol. 120, pp. 100–115, 2019.10.1016/j.chaos.2019.01.015Suche in Google Scholar

[15] X. Ye, X. Wang, H. Zhao, H. Gao, and M. Zhang, “Extreme multistability in a new hyperchaotic meminductive circuit and its circuit implementation,” Eur. Phys. J. Plus, vol. 134, no. 5, p. 206, 2019. https://doi.org/10.1140/epjp/i2019-12535-0.Suche in Google Scholar

[16] F. Min, S. Yin, and Y. Cheng, “Hybrid-diode-based shinriki circuit: coexisting oscillations and bifurcation trees,” IEEE Trans. Circuits Syst. I: Regul. Pap., vol. 72, no. 2, pp. 896–906, 2024. https://doi.org/10.1109/tcsi.2024.3453605.Suche in Google Scholar

[17] F. Min, Y. Cheng, L. Lu, and X. Li, “Extreme multistability and antimonotonicity in a Shinriki oscillator with two flux-controlled memristors,” Int. J. Bifurcat. Chaos, vol. 31, no. 11, p. 2150167, 2021. https://doi.org/10.1142/s0218127421501674.Suche in Google Scholar

[18] F. Min, J. Zhu, Y. Cheng, and Y. Xu, “Dynamical analysis of a tabu learning neuron through the discrete implicit mapping method,” Chaos Solitons Fractals, vol. 181, p. 114716, 2024. https://doi.org/10.1016/j.chaos.2024.114716.Suche in Google Scholar

[19] S. Yang, F. Min, X. Yang, and J. Ying, “FPGA implementation of Hopfield neural network with transcendental nonlinearity,” Nonlinear Dyn., vol. 112, no. 22, pp. 20537–20548, 2024. https://doi.org/10.1007/s11071-024-10052-9.Suche in Google Scholar

[20] C. Li, Y. Zhang, and E. Y. Xie, “When an attacker meets a cipher-image in 2018: a year in review,” J. Inf. Secur. Appl., vol. 48, p. 102361, 2019. https://doi.org/10.1016/j.jisa.2019.102361.Suche in Google Scholar

[21] H. Liu, A. Kadir, and Y. Niu, “Chaos-based color image block encryption scheme using S-box,” AEU Int. J. Electron. Commun., vol. 68, no. 7, pp. 676–686, 2014. https://doi.org/10.1016/j.aeue.2014.02.002.Suche in Google Scholar

[22] I. Khalid, S. S. Jamal, T. Shah, D. Shah, and M. M. Hazzazi, “A novel scheme of image encryption based on elliptic curves isomorphism and substitution boxes,” IEEE Access, vol. 9, pp. 77798–77810, 2021. https://doi.org/10.1109/access.2021.3083151.Suche in Google Scholar

[23] A. H. Zahid, et al.., “Efficient dynamic S-box generation using linear trigonometric transformation for security applications,” IEEE Access, Vol. 9, pp. 98460–98475, 2021.10.1109/ACCESS.2021.3095618Suche in Google Scholar

[24] X. Liu, X. Tong, Z. Wang, and M. Zhang, “Efficient high nonlinearity S-box generating algorithm based on third-order nonlinear digital filter,” Chaos Solitons Fractals, vol. 150, p. 111109, 2021. https://doi.org/10.1016/j.chaos.2021.111109.Suche in Google Scholar

[25] P. Zhou, J. Du, K. Zhou, and S. Wei, “2D mixed pseudo-random coupling PS map lattice and its application in S-box generation,” Nonlinear Dyn., vol. 103, pp. 1151–1166, 2021. https://doi.org/10.1007/s11071-020-06098-0.Suche in Google Scholar

[26] H. Bao, H. Li, Z. Hua, Q. Xu, and B. Bao, “Sine-transform-based memristive hyperchaotic model with hardware implementation,” IEEE Trans. Ind. Inf., vol. 19, no. 3, pp. 2792–2801, 2022. https://doi.org/10.1109/tii.2022.3157296.Suche in Google Scholar

[27] L. O. Chua, “Memristor-the missing circuit element,” IEEE Trans. Circ. Theor., vol. 18, no. 7, pp. 507–519, 1971. https://doi.org/10.1109/tct.1971.1083337.Suche in Google Scholar

[28] D. W. Yan, M. S. Ji’e, L. D. Wang, and S. K. Duan, “Memristor-based chaotic system with abundant dynamical behaviors and its application,” Eur. Phys. J. Plus, vol. 136, pp. 1–27, 2021.10.1140/epjp/s13360-021-02081-9Suche in Google Scholar

[29] X. Zhang, J. Xu, and A. J. Moshayedi, “Design and FPGA implementation of a hyperchaotic conservative circuit with initial offsetboosting and transient transition behavior based on memcapacitor,” Chaos Solitons Fractals, vol. 179, p. 114460, 2024. https://doi.org/10.1016/j.chaos.2024.114460.Suche in Google Scholar

[30] J. Zhang, E. Liu, and Y. Guo, “A new three-dimensional memristor chaotic circuit design and its application in image encryption,” J. Supecomput., pp. 1–31, 2024. https://doi.org/10.1007/s11227-024-05983-4.Suche in Google Scholar

[31] J. Liu and R. Xu, “Adaptive synchronisation of memristor-based neural networks with leakage delays and applications in chaotic masking secure communication,” Int. J. Syst. Sci., vol. 49, no. 6, pp. 1300–1315, 2018. https://doi.org/10.1080/00207721.2018.1443232.Suche in Google Scholar

[32] W. Yao, et al.., “Dynamics analysis and image encryption application of Hopfield neural network with a novel multistable and highly tunable memristor,” Nonlinear Dyn., vol. 112, pp. 693–708, 2024. https://doi.org/10.1007/s11071-023-09041-1.Suche in Google Scholar

[33] Q. Lai, Z. Wan, H. Zhang, and G. Chen, “Design and analysis of multiscroll memristive Hopfield neural network with adjustable memductance and application to image encryption,” IEEE Trans. Neural Netw. Learn. Syst., vol. 34, no. 10, pp. 7824–7837, 2023. https://doi.org/10.1109/tnnls.2022.3146570.Suche in Google Scholar

[34] X. Yao, X. Chen, H. Liu, L. Sun, and L. He, “Adaptive sliding-mode synchronization of the memristor-based sixth-order uncertain chaotic system and its application in image encryption,” Front. Phys., vol. 10, p. 863668, 2022. https://doi.org/10.3389/fphy.2022.863668.Suche in Google Scholar

[35] Q. Lai, L. Yang, and G. Chen, “Design and performance analysis of discrete memristive hyperchaotic systems with stuffed cube attractors and ultraboosting behaviors,” IEEE Trans. Ind. Electron., vol. 71, no. 7, pp. 7819–7828, 2023. https://doi.org/10.1109/tie.2023.3299016.Suche in Google Scholar

[36] I. Vourkas and G. C. Sirakoulis, “Emerging memristor-based logic circuit design approaches: a review,” IEEE Circ. Syst. Mag., vol. 16, no. 3, p. 15, 2016. https://doi.org/10.1109/mcas.2016.2583673.Suche in Google Scholar

[37] H. Bao, Z. Hua, H. Li, M. Chen, and B. Bao, “Discrete memristor 620 hyperchaotic maps,” IEEE Trans. Circuits Syst. I, Regul. Pap., vol. 68, no. 11, pp. 4534–4544, 2021. https://doi.org/10.1109/tcsi.2021.3082895.Suche in Google Scholar

[38] H. Bao, Y. Gu, Q. Xu, X. Zhang, and B. Bao, “Parallel bi-memristor hyperchaotic map with extreme multistability,” Chaos Solitons Fractals, vol. 160, p. 112273, 2022.10.1016/j.chaos.2022.112273Suche in Google Scholar

[39] S. Panahi, J. C. Sprott, and S. Jafari, “Two simplest quadratic chaotic maps without equilibrium,” Int. J. Bifurc. Chaos, vol. 28, no. 12, 2018, Art. no. 1850144. https://doi.org/10.1142/s0218127418501444.Suche in Google Scholar

[40] J. Kengne, Z. T. Njitacke, and H. B. Fotsin, “Dynamical analysis of a simple autono-mous jerk system with multiple attractors,” Nonlinear Dyn., vol. 83, nos. 1–2, pp. 751–765, 2016, https://doi.org/10.1007/s11071-015-2364-y.Suche in Google Scholar

[41] C. Grebogi, E. Ott, and J. A. Yorke, “Crises, sudden changes in chaotic attractors, and transient chaos,” Phys. D: Nonlinear Phenom., vol. 7, nos. 1–3, pp. 181–200, 1983, https://doi.org/10.1016/0167-2789(83)90126-4.Suche in Google Scholar

[42] Q. Dong, Y. Bai, and K. Zhu, “A 5-D memristive hyperchaotic system with extreme multistability and its application in image encryption,” Phys. Scripta, vol. 99, no. 3, p. 035253, 2024. https://doi.org/10.1088/1402-4896/ad2963.Suche in Google Scholar

[43] H. Lin, et al.., “A review of chaotic systems based on memristive Hopfield neural networks,” Mathematics, vol. 11, no. 6, p. 1369, 2023. https://doi.org/10.3390/math11061369.Suche in Google Scholar

[44] G. J. Kitio, C. Ainamon, K. Rajagopal, L. K. Kengne, S. T. Kingni, and J. R. Mboupda Pone, “Four-scroll hyperchaotic attractor in a fivedimensional memristive Wien bridge oscillator: analysis and digital electronic implementation,” Math. Probl. Eng., vol. 2021, no. 1, p. 4820771, 2021. https://doi.org/10.1155/2021/4820771.Suche in Google Scholar

[45] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theor., vol. 22, no. 6, pp. 644–654, 1976. https://doi.org/10.1109/tit.1976.1055638.Suche in Google Scholar

[46] A. Bakshi and A. K. Patel, “Secure telemedicine using RONI halftoned visual cryptography without pixel expansion,” J. Inf. Secur. Appl., vol. 46, pp. 281–295, 2019. https://doi.org/10.1016/j.jisa.2019.03.004.Suche in Google Scholar

[47] Z. Hua, J. Li, Y. Chen, and S. Yi, “Design and application of an S-box using complete Latin square,” Nonlinear Dyn., vol. 104, pp. 807–825, 2021. https://doi.org/10.1007/s11071-021-06308-3.Suche in Google Scholar

[48] G. A. G. Tegue, et al.., “A novel image encryption scheme combining a dynamic S-box generator and a new chaotic oscillator with hidden behavior,” Arab. J. Sci. Eng., vol. 48, no. 8, pp. 10653–10672, 2023. https://doi.org/10.1007/s13369-023-07715-x.Suche in Google Scholar

[49] H. L. Ndassi, R. Kengne, and T. A. G. Q. Gakam, “A robust image encryption scheme based on compressed sensing and novel 7D oscillator with complex dynamics,” Heliyon, vol. 9, no. 6, p. e16514, 2023.10.1016/j.heliyon.2023.e16514Suche in Google Scholar PubMed PubMed Central

[50] N. Khan and P. Muthukumar, “Transient chaos, synchronisation and digital image enhancement technique based on a novel 5d fractional-order hyperchaotic memristive system,” Circ. Syst. Signal Process., vol. 41, no. 4, pp. 2266–2289, 2022. https://doi.org/10.1007/s00034-021-01892-6.Suche in Google Scholar

[51] Z. T. Njitacke, S. D. Isaac, T. Nestor, and J. Kengne, “Window of multistability and its control in a simple 3D Hopfield neural network: application to biomedical image encryption,” Neural Comput. Appl., vol. 33, no. 12, pp. 6733–6752, 2021. https://doi.org/10.1007/s00521-020-05451-z.Suche in Google Scholar PubMed PubMed Central

[52] S. Kayalvizhi and S. Malarvizhi, “A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations,” Multimed. Tools Appl., vol. 79, no. 5, pp. 3957–3974, 2020. https://doi.org/10.1007/s11042-019-7642-0.Suche in Google Scholar

[53] C. Jaephil and Y. Nam Yul, “Secure image encryption based on compressed sensing and scrambling for internet-of-multimedia things,” IEEE Access, vol. 10, pp. 10706–10718, 2022. https://doi.org/10.1109/access.2022.3145005.Suche in Google Scholar

[54] N. J. De Dieu, F. S. V. Ruben, T. Nestor, N. T. Zeric, and K. Jacques, “Dynamic analysis of a novel chaotic system with no linear terms and use for DNA-based image encryption,” Multimed. Tools Appl., vol. 81, no. 8, pp. 10907–10934, 2022. https://doi.org/10.1007/s11042-022-12044-6.Suche in Google Scholar

[55] X. Wang, B. Li, Y. Wang, J. Lei, and J. Xue, “An efficient batch images encryption method based on DNA encoding and PWLCM,” Multimed. Tools Appl., vol. 80, pp. 943–971, 2021. https://doi.org/10.1007/s11042-020-09533-x.Suche in Google Scholar

[56] H. Khalid, T. K. Sara, D. Mohamed, and P. George, “New image encryption algorithm using hyperchaotic system and fibonacci QMatrix,” J. Electron., vol. 10, no. 9, p. 1066, 2021. https://doi.org/10.3390/electronics10091066.Suche in Google Scholar

[57] Q. K. Abed and W. A. Mahmoud Al-Jawher, “A new multiple-chaos image encryption algorithm based on block compressive sensing, swin transformer, and wild horse optimization,” Multidiscip. Sci. J., vol. 7, no. 1, pp. 2025012–2025012, 2024. https://doi.org/10.31893/multiscience.2025012.Suche in Google Scholar

Received: 2025-01-19
Accepted: 2025-03-20
Published Online: 2025-04-22
Published in Print: 2025-06-26

© 2025 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 5.10.2025 von https://www.degruyterbrill.com/document/doi/10.1515/zna-2025-0024/html?lang=de
Button zum nach oben scrollen