4.7 Article

Grid-scroll memristive chaotic system with application to image encryption

期刊

CHAOS SOLITONS & FRACTALS
卷 170, 期 -, 页码 -

出版社

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.chaos.2023.113341

关键词

Grid-scroll attractors; Coexisting attractors; Amplitude control; Circuit implementation; Image encryption

向作者/读者索取更多资源

The paper establishes a four-dimensional multi-scroll chaotic system by adding a flux-controlled non-volatile memristor to a simple three-dimensional chaotic system. The system is extended to generate grid-scroll chaotic attractors by replacing the linear term with a triangular wave function. The evolution of chaos is studied and the existence of coexisting attractors is observed. In addition, the proposed system can be controlled by adjusting the parameters and the circuit implementation results are consistent with numerical simulations.
The construction of multi-scroll chaotic systems has been a hot research topic in recent years. In this paper, a four-dimensional multi-scroll chaotic system is established on the basis of a simple three-dimensional chaotic system by adding a flux-controlled non-volatile memristor. After that, a novel system is extended to generate grid-scroll chaotic attractors by replacing the linear term in the multi-scroll chaotic system with a triangular wave function. The evolution of chaos is studied by means of bifurcation diagrams and Lyapunov exponent diagrams. The existence of coexisting attractors is observed, and the attraction basin of coexisting attractors is drawn. In addition, the partial amplitude of the proposed system can be controlled by adjusting the parameters. The results of circuit implementation are consistent with the numerical simulation, verifying the physical existence of the system. Finally, according to the proposed grid-scroll memristive chaotic system, a new image encryption algorithm is designed. It adopts a novel confusion-diffusion structure to scramble and diffuse all pixels of the plain-image. And the security analysis experiments are performed to verify the good encryption performance of the proposed scheme such as information entropy analysis, correlation coefficient analysis, differential attack analysis and robustness analysis.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据