4.4 Article

Hyperchaotic circuit design based on memristor and its application in image encryption

Journal

MICROELECTRONIC ENGINEERING
Volume 265, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.mee.2022.111872

Keywords

Hyper-chaotic system; Memristor; Coexisting attractor; DNA encryption algorithm

Ask authors/readers for more resources

In this study, a self-replicating chaotic system based on memristor was obtained by introducing magnetron memristors model and sinusoidal functions into a simple third-order memristor chaotic system. The experimental results confirmed the feasibility of the constructed system and its high security performance in image encryption.
The active-circuit simulation of magnetron memristors model and sinusoidal functions are introduced into a simple third-order memristor chaotic system to obtain a self-replicating chaotic system based on the memristor. The most remarkable feature is the existence of state transfer in this system, which has infinite line equilibria and exhibits extreme multistability with the coexistence of an infinite number of attractors. The system is a chaotic system with a wide range of parameters, and there is a transfer from periodic to chaotic to hyperchaotic states in a specific parameter range. The experimental simulation circuit was not only developed based on the circuit simulation software Multisim, but also the actual digital circuit of the system was implemented by field pro-grammable gate array (FPGA). The final experimental results were consistent with the numerical simulation, which proved that the constructed system was feasible. Finally, an image encryption algorithm is designed in combination with DNA algorithm, so that the new system chaotic sequence is used to encrypt images, focusing on the analysis of encryption histogram, adjacent pixel correlation. The results show that the new memristor system is very sensitive to both chaotic keys and plaintexts, the key space is large, therefore the proposed chaotic memristor system has high security performance when applied to image encryption.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available