Skip to main content
Log in

Analysis and implementation of no-equilibrium chaotic system with application in image encryption

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

The study of no-equilibrium chaotic system is one of the recent hot topics. This paper constructs a new no-equilibrium chaotic system by introducing an additional variable and a constant term to a three-dimensional chaotic system. Different from the previous no-equilibrium chaotic system, the new system has period-doubling bifurcation and performs hidden chaotic attractors for a large constant term. The analog circuit and field-programmable gate array (FPGA) implementation are given to illustrate the existence of the system. By utilizing the new system, a chaotic magic cube transformation image encryption algorithm (CMCT-IEA) is proposed, which has a classical permutation-diffusion structure. A new permutation method is designed to scramble image pixels in three-dimensional space, and a diffusion method is developed to diffuse small pixel changes of the original image to all pixels in three-dimensional space. A dynamic key is also designed to improve the security of the encryption algorithm. We also analyze the security of CMCT-IEA in terms of computational complexity, statistical properties, and the ability to defend against several common attacks. Compared with several advanced algorithms, the CMCT-IEA exhibits excellent security characteristics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

References

  1. Lorenz EN (1963) Deterministic nonperiodic flows. J Atmos Sci 20:130–141

    MathSciNet  MATH  Google Scholar 

  2. Sprott JC (1994) Some simple chaotic flows. Phys Rev E 50(2):647–650

    MathSciNet  Google Scholar 

  3. Silva CP (1993) Shilnikov theorem-A tutorial. IEEE Trans Circ Syst-I: Regular Papers 40:675–682

    MathSciNet  MATH  Google Scholar 

  4. Li G, Chen X (2009) Constructing piecewise linear chaotic system based on the heteroclinic Shil’nikov theorem. Commun Nonlinear Sci Numer Simul 14(1):194–203

    MathSciNet  MATH  Google Scholar 

  5. Wang N, Zhang G, Ren L, Bao H (2020) Coexisting asymmetric behavior and free control in a simple 3-D chaotic system. AEU-Int J Electron Commun 122:153234

    Google Scholar 

  6. Bao B, Jiang T, Wang G, Jin P, Bao H, Chen M (2017) Two-memristor-based Chua’s hyperchaotic circuit with plane equilibrium and its extreme multistability. Nonlinear Dyn 89(2):1157–1171

    Google Scholar 

  7. Lai Q (2021) A unified chaotic system with various coexisting attractors. Int J Bifur Chaos 31(1):2150013

    MathSciNet  MATH  Google Scholar 

  8. Lai Q, Wan Z, Kengne LK, Kuate PDK, Chen C (2020) Two-memristor-based chaotic system with infinite coexisting attractors. IEEE Trans Circ Syst-II: Express Briefs 68(6):2197–2201

    Google Scholar 

  9. Lai Q, Wan Z, Kuate PDK (2020) Modeling and circuit realisation of a new no-equilibrium chaotic system with hidden attractor and coexisting attractors. Electron Lett 56(20):1044–1046

    Google Scholar 

  10. Joshi M, Ranjan A (2019) New simple chaotic and hyperchaotic system with an unstable node. AEU-Int J Electron Commun 108:1–9

    Google Scholar 

  11. Kuate PDK, Lai Q, Fotsin H (2019) Complex behaviors in a new 4D memristive hyperchaotic system without equilibrium and its microcontroller-based implementation. Eur Phys J Spec Top 228:2171–2184

    Google Scholar 

  12. Leonov GA, Kuznetsov NV, Vagaitsev VI (2011) Localization of hidden Chua’s attractors. Phys Lett A 375(23):2230–2233

    MathSciNet  MATH  Google Scholar 

  13. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inform Sci 486:340–358

    MATH  Google Scholar 

  14. Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30–41

    Google Scholar 

  15. Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39–49

    Google Scholar 

  16. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Google Scholar 

  17. Wang X, Wang Y, Zhu X, Luo C (2020) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Opt Lasers Eng 125:105851

    Google Scholar 

  18. Zhou Y, Pabetta K, Agaian S, Chen CLP (2012) Image encryption using P-Fibonacci transform and decomposition. Opt Commun 285(5):594–608

    Google Scholar 

  19. Shahna KU, Mohamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl Soft Comput 90:106162

    Google Scholar 

  20. Wang Y, Lei P, Yang H, Cao H (2015) Security analysis on a color image encryption based on DNA encoding and chaos map. Comput Electric Eng 46:433–446

    Google Scholar 

  21. Jafari S, Sprott JC, Golpayegania SM (2013) Elementary quadratic chaotic flows with no equilibria. Phys Lett A 377(9):699–702

    MathSciNet  MATH  Google Scholar 

  22. Pham VT, Volos C, Jafari S, Kapitaniak T (2017) Coexistence of hidden chaotic attractors in a novel no-equilibrium system. Nonlinear Dyn 87(3):2001–2010

    Google Scholar 

  23. Pham VT, Vaidyanathan S, Volos C, Jafari S, Kingni ST (2016) A no-equilibrium hyperchaotic system with a cubic nonlinear term. Optik 127(6):3259–3265

    Google Scholar 

  24. Fang S, Li Z, Zhang X, Li Y (2019) Hidden extreme multistability in a novel no-equilibrium fractional-order chaotic system and its synchronization control. Braz J Phys 49(6):846–858

    Google Scholar 

  25. Shahzad M, Pham VT, Ahmad MA, Jafari S, Hadaeghi F (2015) Synchronization and circuit design of a chaotic system with coexisting hidden attractors. Eur Phys J Spec Top 224(8):1637–1652

    Google Scholar 

  26. Li H, Yang Y, Zhou Y, Li C, Qian K, Li Z, Du J (2019) Dynamics and synchronization of a memristor-based chaotic system with no equilibrium. Complexity 2019:4647608

    Google Scholar 

  27. Daumann CC, Rech PC (2021) Multistability and Period-Adding in a four-Dimensional dynamical system with no equilibrium points. Int J Appl and Comput Math 7(3):1–8

    MathSciNet  MATH  Google Scholar 

  28. Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–48

    Google Scholar 

  29. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inform Sci 480:403–419

    Google Scholar 

  30. Vidhya R, Brindha M, Gounden NA (2019) A secure image encryption algorithm based on a parametric switching chaotic system. Chin J Phys 62:26–42

    MathSciNet  Google Scholar 

  31. Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inform Sci 478:1–4

    Google Scholar 

  32. Yang J, Wu H (2018) Color image encryption algorithm based on chaotic system and dynamic DNA coding and operation. Comput Eng 44(2):151–157

    Google Scholar 

  33. Li T, Shi J, Li X, Wu J, Pan F (2019) Image encryption based on pixel-Level diffusion with dynamic filtering and DNA-Level permutation with 3D Latin cubes. Entropy 21(3):319

    MathSciNet  Google Scholar 

  34. Hua Z, Jin F, Huang H (2018) 2D Logistic-Sine-coupling map for image encryption. Signal Process 149:148–161

    Google Scholar 

  35. Kumar CM, Vidhya R, Brindha M (2021) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell. https://doi.org/10.1007/s10489-021-02508-x

  36. Wang X, Sun H (2020) A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function. Opt Laser Technol 122:10584

    Google Scholar 

  37. Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inform Sci 579:128–149

    MathSciNet  Google Scholar 

  38. Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inform Sci 507:16–36

    MathSciNet  MATH  Google Scholar 

  39. Xian Y, Wang X, Teng L (2021) Double parameters fractal sorting matrix and Its application in image encryption. IEEE Trans Circ Sys Video Technol. https://doi.org/10.1109/TCSVT.2021.3108767

    Article  Google Scholar 

  40. Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inform Sci 539:195–214

    MathSciNet  MATH  Google Scholar 

  41. Zou C, Wang X, Li H (2021) Image encryption algorithm with matrix semi-tensor product. Nonlinear Dyn 105:859–876

    Google Scholar 

  42. Elghandour AN, Salah AM, Elmasry YA, Karawia AA (2021) An Image Encryption Algorithm Based on Bisection Method and One-Dimensional Piecewise Chaotic Map. IEEE Access 9:43411–43421

    Google Scholar 

  43. Liu W, Chen G (2003) A new chaotic system and its generation. Int J Bifur Chaos 13(01):261–267

    MATH  Google Scholar 

  44. Lin Q, Li P, Zhang M, Sui Y, Yang H (2015) A novel image encryption algorithm based on chaos maps with Markov properties. Commun Nonlinear Sci Numer Simul 20(2):506–515

    MATH  Google Scholar 

  45. Bassham III LE, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Barker EB, Leigh SD, Levenson M, Vangel M, Banks DL, Heckert NA, Dray JF, Vo S (2010) Sp 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, Gaithersburg, MD, USA

  46. Wang M, Wang X, Zhao T, Zhang C, Xia Z, Yao N (2021) Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Inform Sci 544:1–24

    MathSciNet  MATH  Google Scholar 

  47. Wu J, Liao X, Yang B (2018) Image encryption using 2D Henon-Sine map and DNA approach. Signal Process 153:11–23

    Google Scholar 

  48. Zhang Y, Wang X (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Google Scholar 

  49. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun(JSAT) 1(2):31–38

    Google Scholar 

  50. Özkaynak F (2018) Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn 92(2):305–313

    Google Scholar 

  51. Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13(9):2137–2150

    Google Scholar 

  52. Pareek NK, Patidar V, Sud KK (2005) Cryptography using multiple one-dimensional chaotic maps. Commun Nonlinear Sci Numer Simul 10(7):715–723

    MathSciNet  MATH  Google Scholar 

  53. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    MathSciNet  Google Scholar 

  54. Li C, Lin D, Feng B, Lü J, Hao F (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834–75842

    Google Scholar 

  55. Khan M (2015) A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dyn 82(1):527–533

    MathSciNet  Google Scholar 

  56. Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41–52

    Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China under Grant 61961019, and the Youth Key Project of Natural Science Foundation of Jiangxi Province of China under Grant 20202ACBL212003.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiang Lai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lai, Q., Zhang, H., Kuate, P.D.K. et al. Analysis and implementation of no-equilibrium chaotic system with application in image encryption. Appl Intell 52, 11448–11471 (2022). https://doi.org/10.1007/s10489-021-03071-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-021-03071-1

Keywords

Navigation