4.3 Article

Dynamics analysis, FPGA realization and image encryption application of a 5D memristive exponential hyperchaotic system

期刊

INTEGRATION-THE VLSI JOURNAL
卷 90, 期 -, 页码 58-70

出版社

ELSEVIER
DOI: 10.1016/j.vlsi.2023.01.006

关键词

5D memristive exponential hyperchaotic; system (MEHS); Lyapunov exponential; Bifurcation diagram; Field Programmable Gate Array (FPGA); Image encryption

向作者/读者索取更多资源

In this paper, a new 5D memristive exponential hyperchaotic system is proposed and its fundamental dynamics characteristics are analyzed. The system exhibits a rich set of dynamic behaviors when appropriate parameter sets are chosen. The system is implemented using the Field Programmable Gate Array (FPGA) and the experimental results are consistent with the numerical simulation results on MATLAB. An image encryption application based on the system is presented, and the security analysis demonstrates the feasibility and effectiveness of the image encryption algorithm.
The exponential function is one of the basic elementary functions, which plays an irreplaceable role in mathematics and is also widely used in practical activities such as life and production. In this paper, a new 5D memristive exponential hyperchaotic system (MEHS) is proposed, which includes an exponential term and a nonlinear flux-controlled memristive model. Fundamental dynamics characteristics of the system are analyzed using phase diagram, Lyapunov exponential spectrum and bifurcation diagram. When appropriate parameter sets are selected, the MEHS exhibits a rich set of dynamic behaviors, including the coexistence of periodic and periodic attractors, periodic and chaotic attractors, chaotic and hyperchaotic attractors. In addition, the Field Programmable Gate Array (FPGA) is used to realize the 5D MEHS, and the experimental results are consistent with the numerical simulation results on MATLAB. Finally, an image encryption application based on the 5D MEHS is presented. The security analysis shows the feasibility and effectiveness of the image encryption algorithm.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据