scholarly journals Circuit Implementation, Synchronization of Multistability, and Image Encryption of a Four-Wing Memristive Chaotic System

2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Guangya Peng ◽  
Fuhong Min ◽  
Enrong Wang

The four-wing memristive chaotic system used in synchronization is applied to secure communication which can increase the difficulty of deciphering effectively and enhance the security of information. In this paper, a novel four-wing memristive chaotic system with an active cubic flux-controlled memristor is proposed based on a Lorenz-like circuit. Dynamical behaviors of the memristive system are illustrated in terms of Lyapunov exponents, bifurcation diagrams, coexistence Poincaré maps, coexistence phase diagrams, and attraction basins. Besides, the modular equivalent circuit of four-wing memristive system is designed and the corresponding results are observed to verify its accuracy and rationality. A nonlinear synchronization controller with exponential function is devised to realize synchronization of the coexistence of multiple attractors, and the synchronization control scheme is applied to image encryption to improve secret key space. More interestingly, considering different influence of multistability on encryption, the appropriate key is achieved to enhance the antideciphering ability.

2017 ◽  
Vol 27 (02) ◽  
pp. 1750027 ◽  
Author(s):  
Ling Zhou ◽  
Chunhua Wang ◽  
Lili Zhou

By adding only one smooth flux-controlled memristor into a three-dimensional (3D) pseudo four-wing chaotic system, a new real four-wing hyperchaotic system is constructed in this paper. It is interesting to see that this new memristive chaotic system can generate a four-wing hyperchaotic attractor with a line of equilibria. Moreover, it can generate two-, three- and four-wing chaotic attractors with the variation of a single parameter which denotes the strength of the memristor. At the same time, various coexisting multiple attractors (e.g. three-wing attractors, four-wing attractors and attractors with state transition under the same system parameters) are observed in this system, which means that extreme multistability arises. The complex dynamical behaviors of the proposed system are analyzed by Lyapunov exponents (LEs), phase portraits, Poincaré maps, and time series. An electronic circuit is finally designed to implement the hyperchaotic memristive system.


2017 ◽  
Vol 27 (03) ◽  
pp. 1850038 ◽  
Author(s):  
Chunhua Wang ◽  
Ling Zhou ◽  
Renping Wu

In this paper, a flux-controlled memristor with linear memductance is proposed. Compared with the memristor with piecewise linear memductance and the memristor with smooth continuous nonlinearity memductance which are widely used in the study of memristive chaotic system, the proposed memristor has simple mathematical model and is easy to implement. Multisim circuit simulation and breadboard experiment are realized, and the memristor can exhibit a pinched hysteresis loop in the voltage–current plane when driven by a periodic voltage. In addition, a new hyper-chaotic system is presented in this paper by adding the proposed memristor into the Lorenz system. The transient chaos and multiple attractors are observed in this memristive system. The dynamical behaviors of the proposed system are analyzed by equilibria, Lyapunov exponents, bifurcation diagram and phase portrait. Finally, an electronic circuit is designed to implement the hyper-chaotic memristive system.


Circuit World ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Meiting Liu ◽  
Wenxin Yu ◽  
Junnian Wang ◽  
Yu Chen ◽  
Yuyan Bian

Purpose In this paper, a nine-dimensional chaotic system is designed and applied to secure communication. Design/methodology/approach Firstly, the equilibrium characteristics, dissipativity, bifurcation diagram and Lyapunov exponent spectrum are used to analyze the relevant characteristics of the proposed nine-dimensional chaotic system. In the analysis of Lyapunov exponential spectrum, when changing the linear parameters, the system shows two states, hyperchaos and chaos. For secure communication, there is a large secret key space. Secondly, C0 complexity and SEcomplexity of the system are analyzed, which shows that the system has sequences closer to random sequences. Findings The proposed nine-dimensional system has a large key space and more complex dynamic characteristics Originality/value The results show that the proposed nine-dimensional hyperchaotic system has excellent encryption capabilities and can play an important role in the field of secure communication.


Complexity ◽  
2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Wei Feng ◽  
Yi-Gang He ◽  
Chun-Lai Li ◽  
Xun-Min Su ◽  
Xiao-Qing Chen

As a new type of electronic components, a memristive device is receiving worldwide attention and can enrich the dynamical behaviors of the oscillating system. In this paper, we propose a 3D jerk system by introducing a generalized memristive device. It is found that the dynamical behaviors of the system are sensitive to the initial conditions even the system parameters are fixed, which results in the coexistence of multiple attractors. And there exists different transition behaviors depending on the selection of the parameters and initial values. Thereby, it is one important type of the candidate system for secure communication since the reconstruction of accurate state space becomes more difficult. Moreover, we build a hardware circuit and the experimental results effectively confirm the theoretical analyses.


Entropy ◽  
2019 ◽  
Vol 21 (1) ◽  
pp. 44 ◽  
Author(s):  
Sameh Askar ◽  
Abdel Karawia ◽  
Abdulrahman Al-Khedhairi ◽  
Fatemah Al-Ammar

In the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper introduces a new cryptographic algorithm that depends on a logistic and two-dimensional chaotic economic map. The robustness of the introduced algorithm is shown by implementing it on several types of images. The implementation of the algorithm and its security are partially analyzed using some statistical analyses such as sensitivity to the key space, pixels correlation, the entropy process, and contrast analysis. The results given in this paper and the comparisons performed have led us to decide that the introduced algorithm is characterized by a large space of key security, sensitivity to the secret key, few coefficients of correlation, a high contrast, and accepted information of entropy. In addition, the results obtained in experiments show that our proposed algorithm resists statistical, differential, brute-force, and noise attacks.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-19 ◽  
Author(s):  
Fei Yu ◽  
Li Liu ◽  
Shuai Qian ◽  
Lixiang Li ◽  
Yuanyuan Huang ◽  
...  

Novel memristive hyperchaotic system designs and their engineering applications have received considerable critical attention. In this paper, a novel multistable 5D memristive hyperchaotic system and its application are introduced. The interesting aspect of this chaotic system is that it has different types of coexisting attractors, chaos, hyperchaos, periods, and limit cycles. First, a novel 5D memristive hyperchaotic system is proposed by introducing a flux-controlled memristor with quadratic nonlinearity into an existing 4D four-wing chaotic system as a feedback term. Then, the phase portraits, Lyapunov exponential spectrum, bifurcation diagram, and spectral entropy are used to analyze the basic dynamics of the 5D memristive hyperchaotic system. For a specific set of parameters, we find an unusual metastability, which shows the transition from chaotic to periodic (period-2 and period-3) dynamics. Moreover, its circuit implementation is also proposed. By using the chaoticity of the novel hyperchaotic system, we have developed a random number generator (RNG) for practical image encryption applications. Furthermore, security analyses are carried out with the RNG and image encryption designs.


2015 ◽  
Vol 719-720 ◽  
pp. 1030-1037
Author(s):  
Tao Song

In recent years, chaos-based image encryption technologies have been widely studied to meet the increasing demand for real-time secure image transmission applications. To overcome the drawbacks of small key space and weak security in many existing schemes based on low-dimensional chaotic maps, this paper suggests a security improved scheme with a permutation-diffusion architecture. In the permutation stage, baker map is employed to shuffle the pixel positions. In the diffusion stage, the value of each pixel is altered by using a key stream derived from hyperchaotic system. Compared with ordinary chaotic systems, hyperchaotic systems, with more complex dynamical behaviors and number of system variables, offer greater potential for secure cryptosystem construction. Extensive security analysis has been performed on the proposed scheme, including the most important ones like key space analysis, statistical analysis and key sensitivity, which has demonstrated the satisfactory security of the proposed scheme.


2011 ◽  
Vol 480-481 ◽  
pp. 1378-1382
Author(s):  
Yan Hui Chen

The control of chaotic synchronization is the kernel technology in chaos-based secure communication. Those control methods have to transmitting control signal which increase the security risks of the communication system. Attacker can reconstruct the chaotic system or estimate parameters by using the information of the chaotic system. In this paper we propose a hybrid Liu chaotic synchronization control scheme which contains both continuous chaotic system with oscillating parameters approach to 0 and discrete chaotic system. By theory of impulsive differential equations, we proved a theorem that two continuous Liu chaotic systems can get synchronized without control signal transmitting which has reduced the risk of the security.


PLoS ONE ◽  
2020 ◽  
Vol 15 (11) ◽  
pp. e0242110
Author(s):  
Dejian Fang ◽  
Shuliang Sun

Image encryption is an effective method for protecting private images during communication. In this paper, a novel image encryption method is proposed based on a 5D hyperchaotic system. Since a 5D hyperchaotic system can generate more complex dynamic behavior than a low-dimensional system, it is used in this paper to generate pseudorandom number sequences. The generated sequences are processed to obtain new sequences. The randomness of the new sequences is improved by recombination and rearrangement. The experimental results and theoretical analysis show that the method possesses a large key space and can resist differential attacks, statistical analysis, entropy analysis, clipping attacks and noise attacks. Therefore, it is very secure and can be used for secure communication.


2019 ◽  
Vol 13 ◽  
pp. 174830261985347 ◽  
Author(s):  
Zhijuan Deng ◽  
Shaojun Zhong

In this article, we introduced a digital image encryption algorithm based on the chaotic mapping designed by Xiong et al. In their paper, the authors theoretically analyzed the algorithm and pointed out that the algorithm did not need to have the prior knowledge of the orbital distribution and one can select any chaotic model. In this way, the algorithm greatly expanded the cryptographic space and greatly reduced the number of iterations of the mapping. Since the algorithm has many characteristics, for instance, it is sensitive to the secret key, its key space is big, the pixel is well distributed after being encrypted, etc., the security of the encrypted images can be assured effectively. However, since the algorithm applied the image scrambling for encryption, and did not take the chosen-plaintext attacks into consideration, the algorithm is relatively weak in resisting the chosen-plaintext attacks. Therefore, we put forward a kind of image replacement method based on chaos, which can resist the chosen-plaintext attacks. And the experimental simulation proves that this algorithm not only has many characteristics, for instance, it is sensitive to the secret key, its key space is big, the pixel is well distributed after being encrypted, etc., but also can resist the chosen-plaintext attacks effectively. In the meanwhile, the algorithm is very sensitive to the small changes of the plaintexts, and its encrypted images will completely lose the features of the original ones.


Sign in / Sign up

Export Citation Format

Share Document