Home Multistability, chaos and hyperchaos in a novel 3D discrete memristive system: microcontroller implementation and cryptography
Article
Licensed
Unlicensed Requires Authentication

Multistability, chaos and hyperchaos in a novel 3D discrete memristive system: microcontroller implementation and cryptography

  • Brondelle Falonne Namekong Tatang , Adele Armele Ngo Mouelas , Rodrigue Andre Tchamda , Herman Landry Ndassi , Romanic Kengne EMAIL logo and Martin Tchoffo
Published/Copyright: April 22, 2025

Abstract

Discrete nonlinear systems involving memristors have been extensively studied in recent years. In this work, we combine the nonlinearity of a discrete memristor with a sinusoidal transformation scheme to construct a new 3D discrete hyperchaotic circuit, which is useful for image encryption. Firstly, we perform a dynamical analysis of the proposed system. Using analytical and numerical tools, we find that the model exhibits rich and complex dynamics, including fixed-point planes, hidden attractors, hyperchaos, periodicity, and multistability. To demonstrate its practical implementation, the proposed oscillator is integrated into a microcontroller-based laboratory setup, and the experimental results closely match the numerical findings. Secondly, hyperchaotic sequences generated by the new model are used to build a simple 8 × 8 S-box for secure image encryption. The hyperchaotic sequences are first used to shuffle the columns and rows of the original image, which is then substituted using the 8 × 8 substitution box and finally encrypted through nonlinear diffusion. To validate the performance of our protocol, we conduct standard security analyses, including correlation coefficient evaluation, pixel change rate, information entropy, time complexity, and key space analysis. The results are in perfect agreement with those in the literature.


Corresponding author: Romanic Kengne, Laboratory of Condensed Matter, Electronics and Signal Processing, Department of Physics, Faculty of Sciences, University of Dschang, P.O. Box 67, Dschang, Cameroon, E-mail: 

Acknowledgments

The authors express their gratitude to Pr. Robert Tchitnga for his advice during the working out of this manuscript.

  1. Research ethics: Not applicable.

  2. Informed consent: Not Applicable.

  3. Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission. R.K and M.T built the problem and proposed the model. B.N.T and A.A.N.M dealt with the stability and perform numerical simulation. B.N.T, A.A.N.M and H.L.N dealt with the cryptography. A.R.T dealt with the microcontroller implementation. B.N.T and A.A.N.M revised the manuscript.

  4. Use of Large Language Models, AI and Machine Learning Tools: None declared.

  5. Conflict of interest: All other authors state no conflict of interest.

  6. Research funding: None declared.

  7. Data availability: None declared.

References

[1] F. Elashry, O. S. F. Allah, A. M. Abbas, S. El-Rabaie, and F. E. A. El-Samie, “Homomorphic image encryption,” J. Electron. Imag., vol. 18, no. 3, 2009, Art. no. 033002. https://doi.org/10.1117/1.3167847.Search in Google Scholar

[2] X. Chai, J. Bi, Z. Gan, X. Liu, Y. Zhang, and Y. Chen, “Color image compression and encryption scheme based on compressive sensing and double random encryption strategy,” Signal Process., vol. 176, p. 107684, 2020. https://doi.org/10.1016/j.sigpro.2020.107684.Search in Google Scholar

[3] L. Huang, S. Cai, X. Xiong, and M. Xiao, “On symmetric color image encryption system with permutation–diffusion simultaneous operation,” Opt. Lasers Eng., vol. 115, pp. 7–20, 2019. https://doi.org/10.1016/j.optlaseng.2018.11.015.Search in Google Scholar

[4] L. Liu, Q. Zhang, and X. Wei, “A RGB image encryption algorithm based on DNA encoding and chaos map,” Comput. Electr. Eng., vol. 38, pp. 1240–1248, 2012. https://doi.org/10.1016/j.compeleceng.2012.02.007.Search in Google Scholar

[5] M. François, T. Grosges, D. Barchiesi, and R. Erra, “A new image encryption scheme based on a chaotic function,” Signal Process. Image Commun., vol. 27, no. 3, pp. 249–259, 2012. https://doi.org/10.1016/j.image.2011.11.003.Search in Google Scholar

[6] T. Farah, R. Rhouma, and S. Belghith, “A novel method for designing S-bsox based on chaotic map and teaching–learning-based optimization,” Nonlinear Dyn., vol. 88, no. 2, pp. 1059–1074, 2017. https://doi.org/10.1007/s11071-016-3295-y.Search in Google Scholar

[7] J. Zheng, H. Hu, and X. Xia, “Applications of symbolic dynamics in 593 counteracting the dynamical degradation of digital chaos,” Nonlinear Dyn., vol. 94, no. 2, pp. 1535–1546, 2018. https://doi.org/10.1007/s11071-018-4440-6.Search in Google Scholar

[8] C. Li, D. Lin, J. Lü, and F. Hao, “Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography,” IEEE MultiMedia, vol. 25, no. 4, pp. 46–56, 2018. https://doi.org/10.1109/mmul.2018.2873472.Search in Google Scholar

[9] M. Itoh and L. O. Chua, “Memristor oscillators,” Int. J. Bifurcat. Chaos, vol. 18, no. 11, pp. 3183–3206, 2008. https://doi.org/10.1142/s0218127408022354.Search in Google Scholar

[10] A. S. Elwakil and M. P. Kennedy, “Construction of classes of circuit-independent chaotic oscillators using passive-only nonlinear devices,” IEEE Trans. Circ. Syst. I, vol. 48, no. 3, pp. 289–308, 2001. https://doi.org/10.1109/81.915386.Search in Google Scholar

[11] H. Li, Z. Hua, H. Bao, L. Zhu, M. Chen, and B. Bao, “Two-dimensional memristive hyperchaotic maps and application in secure communication,” IEEE Trans. Ind. Electron., vol. 68, no. 10, pp. 9931–9940, 2021. https://doi.org/10.1109/tie.2020.3022539.Search in Google Scholar

[12] H. Bao, Z. Hua, N. Wang, L. Zhu, M. Chen, and B. Bao, “Initials-boosted coexisting chaos in a 2-D sine map and its hardware implementation,” IEEE Trans. Ind. Inf., vol. 17, no. 2, pp. 1132–1140, 2021. https://doi.org/10.1109/tii.2020.2992438.Search in Google Scholar

[13] L. Houzhen, Z. Hua, H. Bao, L. Zhu, M. Chen, and B. Bao, “Two-dimensional memristive hyperchaotic maps and application in secure communication,” IEEE Trans. Ind. Electron., vol. 68, no. 10, pp. 9931–9940, 2020.10.1109/TIE.2020.3022539Search in Google Scholar

[14] B. A. Mezatio, M. T. Motchongom, B. R. W. Tekam, R. Kengne, R. Tchitnga, and A. Fomethe, “A novel memristive 6D hyperchaotic autonomous system with extreme multistability,” Chaos Solitons Fractals, vol. 120, pp. 100–115, 2019.10.1016/j.chaos.2019.01.015Search in Google Scholar

[15] X. Ye, X. Wang, H. Zhao, H. Gao, and M. Zhang, “Extreme multistability in a new hyperchaotic meminductive circuit and its circuit implementation,” Eur. Phys. J. Plus, vol. 134, no. 5, p. 206, 2019. https://doi.org/10.1140/epjp/i2019-12535-0.Search in Google Scholar

[16] F. Min, S. Yin, and Y. Cheng, “Hybrid-diode-based shinriki circuit: coexisting oscillations and bifurcation trees,” IEEE Trans. Circuits Syst. I: Regul. Pap., vol. 72, no. 2, pp. 896–906, 2024. https://doi.org/10.1109/tcsi.2024.3453605.Search in Google Scholar

[17] F. Min, Y. Cheng, L. Lu, and X. Li, “Extreme multistability and antimonotonicity in a Shinriki oscillator with two flux-controlled memristors,” Int. J. Bifurcat. Chaos, vol. 31, no. 11, p. 2150167, 2021. https://doi.org/10.1142/s0218127421501674.Search in Google Scholar

[18] F. Min, J. Zhu, Y. Cheng, and Y. Xu, “Dynamical analysis of a tabu learning neuron through the discrete implicit mapping method,” Chaos Solitons Fractals, vol. 181, p. 114716, 2024. https://doi.org/10.1016/j.chaos.2024.114716.Search in Google Scholar

[19] S. Yang, F. Min, X. Yang, and J. Ying, “FPGA implementation of Hopfield neural network with transcendental nonlinearity,” Nonlinear Dyn., vol. 112, no. 22, pp. 20537–20548, 2024. https://doi.org/10.1007/s11071-024-10052-9.Search in Google Scholar

[20] C. Li, Y. Zhang, and E. Y. Xie, “When an attacker meets a cipher-image in 2018: a year in review,” J. Inf. Secur. Appl., vol. 48, p. 102361, 2019. https://doi.org/10.1016/j.jisa.2019.102361.Search in Google Scholar

[21] H. Liu, A. Kadir, and Y. Niu, “Chaos-based color image block encryption scheme using S-box,” AEU Int. J. Electron. Commun., vol. 68, no. 7, pp. 676–686, 2014. https://doi.org/10.1016/j.aeue.2014.02.002.Search in Google Scholar

[22] I. Khalid, S. S. Jamal, T. Shah, D. Shah, and M. M. Hazzazi, “A novel scheme of image encryption based on elliptic curves isomorphism and substitution boxes,” IEEE Access, vol. 9, pp. 77798–77810, 2021. https://doi.org/10.1109/access.2021.3083151.Search in Google Scholar

[23] A. H. Zahid, et al.., “Efficient dynamic S-box generation using linear trigonometric transformation for security applications,” IEEE Access, Vol. 9, pp. 98460–98475, 2021.10.1109/ACCESS.2021.3095618Search in Google Scholar

[24] X. Liu, X. Tong, Z. Wang, and M. Zhang, “Efficient high nonlinearity S-box generating algorithm based on third-order nonlinear digital filter,” Chaos Solitons Fractals, vol. 150, p. 111109, 2021. https://doi.org/10.1016/j.chaos.2021.111109.Search in Google Scholar

[25] P. Zhou, J. Du, K. Zhou, and S. Wei, “2D mixed pseudo-random coupling PS map lattice and its application in S-box generation,” Nonlinear Dyn., vol. 103, pp. 1151–1166, 2021. https://doi.org/10.1007/s11071-020-06098-0.Search in Google Scholar

[26] H. Bao, H. Li, Z. Hua, Q. Xu, and B. Bao, “Sine-transform-based memristive hyperchaotic model with hardware implementation,” IEEE Trans. Ind. Inf., vol. 19, no. 3, pp. 2792–2801, 2022. https://doi.org/10.1109/tii.2022.3157296.Search in Google Scholar

[27] L. O. Chua, “Memristor-the missing circuit element,” IEEE Trans. Circ. Theor., vol. 18, no. 7, pp. 507–519, 1971. https://doi.org/10.1109/tct.1971.1083337.Search in Google Scholar

[28] D. W. Yan, M. S. Ji’e, L. D. Wang, and S. K. Duan, “Memristor-based chaotic system with abundant dynamical behaviors and its application,” Eur. Phys. J. Plus, vol. 136, pp. 1–27, 2021.10.1140/epjp/s13360-021-02081-9Search in Google Scholar

[29] X. Zhang, J. Xu, and A. J. Moshayedi, “Design and FPGA implementation of a hyperchaotic conservative circuit with initial offsetboosting and transient transition behavior based on memcapacitor,” Chaos Solitons Fractals, vol. 179, p. 114460, 2024. https://doi.org/10.1016/j.chaos.2024.114460.Search in Google Scholar

[30] J. Zhang, E. Liu, and Y. Guo, “A new three-dimensional memristor chaotic circuit design and its application in image encryption,” J. Supecomput., pp. 1–31, 2024. https://doi.org/10.1007/s11227-024-05983-4.Search in Google Scholar

[31] J. Liu and R. Xu, “Adaptive synchronisation of memristor-based neural networks with leakage delays and applications in chaotic masking secure communication,” Int. J. Syst. Sci., vol. 49, no. 6, pp. 1300–1315, 2018. https://doi.org/10.1080/00207721.2018.1443232.Search in Google Scholar

[32] W. Yao, et al.., “Dynamics analysis and image encryption application of Hopfield neural network with a novel multistable and highly tunable memristor,” Nonlinear Dyn., vol. 112, pp. 693–708, 2024. https://doi.org/10.1007/s11071-023-09041-1.Search in Google Scholar

[33] Q. Lai, Z. Wan, H. Zhang, and G. Chen, “Design and analysis of multiscroll memristive Hopfield neural network with adjustable memductance and application to image encryption,” IEEE Trans. Neural Netw. Learn. Syst., vol. 34, no. 10, pp. 7824–7837, 2023. https://doi.org/10.1109/tnnls.2022.3146570.Search in Google Scholar

[34] X. Yao, X. Chen, H. Liu, L. Sun, and L. He, “Adaptive sliding-mode synchronization of the memristor-based sixth-order uncertain chaotic system and its application in image encryption,” Front. Phys., vol. 10, p. 863668, 2022. https://doi.org/10.3389/fphy.2022.863668.Search in Google Scholar

[35] Q. Lai, L. Yang, and G. Chen, “Design and performance analysis of discrete memristive hyperchaotic systems with stuffed cube attractors and ultraboosting behaviors,” IEEE Trans. Ind. Electron., vol. 71, no. 7, pp. 7819–7828, 2023. https://doi.org/10.1109/tie.2023.3299016.Search in Google Scholar

[36] I. Vourkas and G. C. Sirakoulis, “Emerging memristor-based logic circuit design approaches: a review,” IEEE Circ. Syst. Mag., vol. 16, no. 3, p. 15, 2016. https://doi.org/10.1109/mcas.2016.2583673.Search in Google Scholar

[37] H. Bao, Z. Hua, H. Li, M. Chen, and B. Bao, “Discrete memristor 620 hyperchaotic maps,” IEEE Trans. Circuits Syst. I, Regul. Pap., vol. 68, no. 11, pp. 4534–4544, 2021. https://doi.org/10.1109/tcsi.2021.3082895.Search in Google Scholar

[38] H. Bao, Y. Gu, Q. Xu, X. Zhang, and B. Bao, “Parallel bi-memristor hyperchaotic map with extreme multistability,” Chaos Solitons Fractals, vol. 160, p. 112273, 2022.10.1016/j.chaos.2022.112273Search in Google Scholar

[39] S. Panahi, J. C. Sprott, and S. Jafari, “Two simplest quadratic chaotic maps without equilibrium,” Int. J. Bifurc. Chaos, vol. 28, no. 12, 2018, Art. no. 1850144. https://doi.org/10.1142/s0218127418501444.Search in Google Scholar

[40] J. Kengne, Z. T. Njitacke, and H. B. Fotsin, “Dynamical analysis of a simple autono-mous jerk system with multiple attractors,” Nonlinear Dyn., vol. 83, nos. 1–2, pp. 751–765, 2016, https://doi.org/10.1007/s11071-015-2364-y.Search in Google Scholar

[41] C. Grebogi, E. Ott, and J. A. Yorke, “Crises, sudden changes in chaotic attractors, and transient chaos,” Phys. D: Nonlinear Phenom., vol. 7, nos. 1–3, pp. 181–200, 1983, https://doi.org/10.1016/0167-2789(83)90126-4.Search in Google Scholar

[42] Q. Dong, Y. Bai, and K. Zhu, “A 5-D memristive hyperchaotic system with extreme multistability and its application in image encryption,” Phys. Scripta, vol. 99, no. 3, p. 035253, 2024. https://doi.org/10.1088/1402-4896/ad2963.Search in Google Scholar

[43] H. Lin, et al.., “A review of chaotic systems based on memristive Hopfield neural networks,” Mathematics, vol. 11, no. 6, p. 1369, 2023. https://doi.org/10.3390/math11061369.Search in Google Scholar

[44] G. J. Kitio, C. Ainamon, K. Rajagopal, L. K. Kengne, S. T. Kingni, and J. R. Mboupda Pone, “Four-scroll hyperchaotic attractor in a fivedimensional memristive Wien bridge oscillator: analysis and digital electronic implementation,” Math. Probl. Eng., vol. 2021, no. 1, p. 4820771, 2021. https://doi.org/10.1155/2021/4820771.Search in Google Scholar

[45] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theor., vol. 22, no. 6, pp. 644–654, 1976. https://doi.org/10.1109/tit.1976.1055638.Search in Google Scholar

[46] A. Bakshi and A. K. Patel, “Secure telemedicine using RONI halftoned visual cryptography without pixel expansion,” J. Inf. Secur. Appl., vol. 46, pp. 281–295, 2019. https://doi.org/10.1016/j.jisa.2019.03.004.Search in Google Scholar

[47] Z. Hua, J. Li, Y. Chen, and S. Yi, “Design and application of an S-box using complete Latin square,” Nonlinear Dyn., vol. 104, pp. 807–825, 2021. https://doi.org/10.1007/s11071-021-06308-3.Search in Google Scholar

[48] G. A. G. Tegue, et al.., “A novel image encryption scheme combining a dynamic S-box generator and a new chaotic oscillator with hidden behavior,” Arab. J. Sci. Eng., vol. 48, no. 8, pp. 10653–10672, 2023. https://doi.org/10.1007/s13369-023-07715-x.Search in Google Scholar

[49] H. L. Ndassi, R. Kengne, and T. A. G. Q. Gakam, “A robust image encryption scheme based on compressed sensing and novel 7D oscillator with complex dynamics,” Heliyon, vol. 9, no. 6, p. e16514, 2023.10.1016/j.heliyon.2023.e16514Search in Google Scholar PubMed PubMed Central

[50] N. Khan and P. Muthukumar, “Transient chaos, synchronisation and digital image enhancement technique based on a novel 5d fractional-order hyperchaotic memristive system,” Circ. Syst. Signal Process., vol. 41, no. 4, pp. 2266–2289, 2022. https://doi.org/10.1007/s00034-021-01892-6.Search in Google Scholar

[51] Z. T. Njitacke, S. D. Isaac, T. Nestor, and J. Kengne, “Window of multistability and its control in a simple 3D Hopfield neural network: application to biomedical image encryption,” Neural Comput. Appl., vol. 33, no. 12, pp. 6733–6752, 2021. https://doi.org/10.1007/s00521-020-05451-z.Search in Google Scholar PubMed PubMed Central

[52] S. Kayalvizhi and S. Malarvizhi, “A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations,” Multimed. Tools Appl., vol. 79, no. 5, pp. 3957–3974, 2020. https://doi.org/10.1007/s11042-019-7642-0.Search in Google Scholar

[53] C. Jaephil and Y. Nam Yul, “Secure image encryption based on compressed sensing and scrambling for internet-of-multimedia things,” IEEE Access, vol. 10, pp. 10706–10718, 2022. https://doi.org/10.1109/access.2022.3145005.Search in Google Scholar

[54] N. J. De Dieu, F. S. V. Ruben, T. Nestor, N. T. Zeric, and K. Jacques, “Dynamic analysis of a novel chaotic system with no linear terms and use for DNA-based image encryption,” Multimed. Tools Appl., vol. 81, no. 8, pp. 10907–10934, 2022. https://doi.org/10.1007/s11042-022-12044-6.Search in Google Scholar

[55] X. Wang, B. Li, Y. Wang, J. Lei, and J. Xue, “An efficient batch images encryption method based on DNA encoding and PWLCM,” Multimed. Tools Appl., vol. 80, pp. 943–971, 2021. https://doi.org/10.1007/s11042-020-09533-x.Search in Google Scholar

[56] H. Khalid, T. K. Sara, D. Mohamed, and P. George, “New image encryption algorithm using hyperchaotic system and fibonacci QMatrix,” J. Electron., vol. 10, no. 9, p. 1066, 2021. https://doi.org/10.3390/electronics10091066.Search in Google Scholar

[57] Q. K. Abed and W. A. Mahmoud Al-Jawher, “A new multiple-chaos image encryption algorithm based on block compressive sensing, swin transformer, and wild horse optimization,” Multidiscip. Sci. J., vol. 7, no. 1, pp. 2025012–2025012, 2024. https://doi.org/10.31893/multiscience.2025012.Search in Google Scholar

Received: 2025-01-19
Accepted: 2025-03-20
Published Online: 2025-04-22
Published in Print: 2025-06-26

© 2025 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 5.10.2025 from https://www.degruyterbrill.com/document/doi/10.1515/zna-2025-0024/html?lang=en
Scroll to top button