4.3 Article

Dynamics analysis, FPGA realization and image encryption application of a 5D memristive exponential hyperchaotic system

Journal

INTEGRATION-THE VLSI JOURNAL
Volume 90, Issue -, Pages 58-70

Publisher

ELSEVIER
DOI: 10.1016/j.vlsi.2023.01.006

Keywords

5D memristive exponential hyperchaotic; system (MEHS); Lyapunov exponential; Bifurcation diagram; Field Programmable Gate Array (FPGA); Image encryption

Ask authors/readers for more resources

In this paper, a new 5D memristive exponential hyperchaotic system is proposed and its fundamental dynamics characteristics are analyzed. The system exhibits a rich set of dynamic behaviors when appropriate parameter sets are chosen. The system is implemented using the Field Programmable Gate Array (FPGA) and the experimental results are consistent with the numerical simulation results on MATLAB. An image encryption application based on the system is presented, and the security analysis demonstrates the feasibility and effectiveness of the image encryption algorithm.
The exponential function is one of the basic elementary functions, which plays an irreplaceable role in mathematics and is also widely used in practical activities such as life and production. In this paper, a new 5D memristive exponential hyperchaotic system (MEHS) is proposed, which includes an exponential term and a nonlinear flux-controlled memristive model. Fundamental dynamics characteristics of the system are analyzed using phase diagram, Lyapunov exponential spectrum and bifurcation diagram. When appropriate parameter sets are selected, the MEHS exhibits a rich set of dynamic behaviors, including the coexistence of periodic and periodic attractors, periodic and chaotic attractors, chaotic and hyperchaotic attractors. In addition, the Field Programmable Gate Array (FPGA) is used to realize the 5D MEHS, and the experimental results are consistent with the numerical simulation results on MATLAB. Finally, an image encryption application based on the 5D MEHS is presented. The security analysis shows the feasibility and effectiveness of the image encryption algorithm.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available