Next Article in Journal
Novel “Anti-Zeolite” Ba3Sr3B4O12: Eu3+ Phosphors: Crystal Structure, Optical Properties, and Photoluminescence
Next Article in Special Issue
A Class of Discrete Memristor Chaotic Maps Based on the Internal Perturbation
Previous Article in Journal
Special Issue: Machine Learning and Data Analysis
Previous Article in Special Issue
A New Pelican Optimization Algorithm for the Parameter Identification of Memristive Chaotic System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Fractional-Order Memristive Chaotic Circuit with Coexisting Double-Layout Four-Scroll Attractors and Its Application in Visually Meaningful Image Encryption

School of Electrical and Opto-Electronic Engineering, West Anhui University, Lu’an 237012, China
*
Author to whom correspondence should be addressed.
Symmetry 2023, 15(7), 1398; https://doi.org/10.3390/sym15071398
Submission received: 14 May 2023 / Revised: 20 June 2023 / Accepted: 22 June 2023 / Published: 11 July 2023
(This article belongs to the Special Issue Discrete and Continuous Memristive Nonlinear Systems and Symmetry II)

Abstract

:
This paper proposes a fractional-order chaotic system using a tri-stable locally active memristor. The characteristics of the memristor, dynamic mechanism of oscillation, and behaviors of the proposed system were analyzed, and then a visually meaningful image encryption scheme was designed based on the chaotic system, DNA encoding, and integer wavelet transform (IWT). Firstly, the mathematical model of the memristor was designed, which was nonvolatile, locally active, and tri-stable. Secondly, the stability, dynamic mechanism of oscillation, bifurcation behaviors, and complexity of the fractional-order memristive chaotic system were investigated and the conditions of stability were obtained. Thirdly, the largest Lyapunov exponent, bifurcation diagram, and complexity of the novel system were calculated and the coexisting bifurcation, coexisting attractors, spectral entropy, and so on are shown. Finally, a visually meaningful image encryption scheme based on the proposed system was designed, and its security was assessed by statistical analysis and different attacks. Numerical simulation demonstrated the effectiveness of the theoretical analysis and high security of the proposed image encryption scheme.

1. Introduction

Prof. Chua predicted that there should be four fundamental elements of the theory of completeness in nature, namely resistance, capacitance, inductance, and memristance [1]. As a possible component, initial research on memristors was slow and very few researchers were interested because there was no physical device to support memristance. With the development of technology, HP Labs first reported a physical device of a nano-size memristor in 2008, which was of groundbreaking significance [2]. From then on, research on memristors has attracted a huge amount of attention in industry and academia. Their natural nonlinear and non-volatile characteristics give memristors great potential for data storage and computation [3,4], artificial neural networks [5,6,7], nonlinear circuits [8,9,10], secure communication [11], image encryption [12,13,14], and other fields.
Chua proposed that local activity is the origin of complexity in 2005 [15]. The first locally active memristor was designed and called the Chua corsage memristor [16]. In order to analyze the characteristics of the memristor, some new methods such as DC V-I Plot, Power-Off Plot (POP), and Dynamic Route Map (DRM) were proposed. These methods can analyze the locally active and non-volatile characteristics of the memristor. Research showed that the memristor has negative differential memristance or memductance in some regions, called locally active memristors [17]. According to the conservation of energy, a memristive system can produce and maintain continuous self-excited oscillation in the locally active regions of the memristor, resulting in rich dynamic behaviors.
Recently, research on locally active memristors and their applications are going through a blowout period. In 2013, a NbO2 Mott locally active memristor was first realized by Williams et al. [18]. Later, in 2021, the Williams team used a resistor, capacitor, and NbO2 Mott locally active memristor to build a neuron chaotic system and analyzed the dynamic behaviors of the neuron system. Their research indicated that the physical locally active memristor could greatly improve the efficiency and accuracy of the computation when it was applied in a Hopfield neural network [19]. In 2016, Mannan et al. demonstrated a nonautonomous system based on the Chua corsage memristor and analyzed the edge of chaos and the Hopf bifurcation of the system. The results showed that the system would oscillate near locally active operating points located on the memristor’s DC V-I curve [16]. In 2017, Mannan et al. further studied the Chua corsage memristor and found that the memristor has two asymptotically stable equilibrium points and two distinct coexisting pinched hysteresis loops [20]. In 2018, Mannan et al. designed 4-lobe Chua corsage memristor and a 6-lobe Chua corsage memristor and analyzed their characteristics [21,22]. In 2020, Mannan et al. reviewed the nonlinear dynamic attributes, switching kinetics, bifurcation analysis, and physical realization of a family of Chua corsage memristors and analyzed the nonautonomous system based on the Chua corsage memristors, finding unique stable limit cycles from a supercritical Hopf bifurcation along with static attractors [23]. We find that all systems based on locally active memristors only produce periodic oscillations and no chaotic oscillations. In 2020, Dong et al. designed a bistable nonvolatile locally active memristor and added an inductor to the periodic oscillating circuit of the memristor. The coexisting chaotic attractors and various complex dynamic phenomena were reported in [24]. Tan et al. designed a simple locally active memristor and established HR neurons on the memristor. Complicated firing behaviors and coexisting position symmetry for different attractors were found in [25]. All of these studies showed that the locally active memristor has extensive application prospects and potential in chaotic oscillations.
As we all know, almost all systems are fractional-order systems in nature, and the integer-order system is a special case of fractional-order systems. Fractional calculus has the same historical memory function as a memristor; therefore, all memristive systems can be extended to fractional order. However, research on fractional-order chaotic systems based on locally active memristors is still in its infancy. Xie et al. proposed a fractional-order chaotic system based on a designed locally active memristor model, and dynamics analysis indicated that the system not only had diverse nonlinear dynamics, such as infinitely many discrete equilibrium points, multistability, and anti-monotonicity, but it also produced two new phenomena [26]. Ding et al. designed a fractional-order Hopfield neural network system based on a coupled locally active memristor, and the simulation results displayed that the fractional-order system not only had rich dynamic phenomena but also had some special transient transition process [27]. Yang et al. devised a fractional-order simplest chaotic system based on a bi-stable locally active memristor. Rich coexisting phenomena were found and some transient transition behaviors were analyzed [28]. It can be found that fractional-order systems based on locally-active memristors can generate richer dynamic behaviors and some new phenomena that have not been found in other chaotic systems.
Nowadays, digital images are ubiquitous, and yet the security of their transmission and storage causes anxiety. Research shows that there is higher security for image encryption in a chaotic system, which has better security than other methods because of the initial value sensitivity as well as the pseudo-random and aperiodic characteristics of chaotic systems. In recent years, many image encryption schemes based on chaotic systems have been proposed; however, these ciphertext images are noise-like or texture-like and easily distinguished from normal visually meaningful images. These visually meaningless noise-like images can only protect the security of image data but they fail to protect the security of image visual data. In pursuit of dual security of image data and visual data, the noise-like or texture-like ciphertext image should be converted into a visually meaningful image after the plain image is encrypted by existing encryption algorithms.
In order to achieve visual security, Bao et al. first proposed an image encryption scheme to encrypt plain images into visually meaningful ciphertext images [29]. This scheme added an embedding process on the basis of the existing image encryption algorithm. When the visually meaningful cipher image emerged in an insecure channel, it was difficult to catch the attention of attackers; therefore, the carrier image and the original image were more secure. Chai et al. proposed a novel visually secure image encryption scheme based on compressive sensing. Simulation results and performance analyses both demonstrated high sensitivity to the plain image and availability to known- and chosen-plaintext attacks [30]. Wang et al. proposed a visually meaningful scheme by employing the parallel compressive sensing method and embedding technique. Simulation analysis demonstrated that the cipher image exhibited excellent security and the reconstructed image had higher quality [31]. Ping et al. designed a visually meaningful image encryption scheme using the compressive sensing and partial block pairing substitution technique. Experimental results demonstrated that the scheme had higher quality and higher security [32]. It can be observed that the style of image decomposition is discrete wavelet transform (DWT); however, the DWT is irreversible, and the quality of the final reconstructed image will be poor during decryption. To solve this problem, the integer wavelet transform (IWT) is used to decompose and reconstruct the carrier image, which is fully reversible. Owing to the fact that IWT and inverse IWT are completely reversible, the obtained image is exactly the same as the original carrier image after the carrier image undergoes IWT and inverse IWT transformation. Based on this, we used this method to complete the embedding and extracting processes of the secret image.
Based on the above discussions, this study proposed a new continuous nonlinear tri-bistable locally active memristor model, and we studied its nonlinear characteristics. Then, we analyzed the features of the locally active memristor, including time-domain waveforms, three coexisting pinched hysteresis loops, Power-Off Plot, and DC V-I Curve. Next, we designed a fractional-order simple circuit system using our memristor, a linear passive inductor, and a linear passive capacitor in series. We observed that the system could produce oscillation under some conditions and had abundant dynamic behaviors. Finally, we used the fractional-order memristive chaotic system to design an image encryption scheme and analyzed its security. The contributions of this paper are listed as follows: (1) A tri-stable locally active memristor was designed and analyzed. (2) A fractional-order chaotic system was built based on the proposed memristor, and we discovered its rich coexisting dynamic behaviors. In order to apply the chaotic system, we analyzed the complexity when some parameters were changed. (3) A visually secure image encryption scheme was proposed based on the fractional-order memristive chaotic system and integer wavelet transform (IWT) embedding. The analysis results pointed out that our algorithm not had only higher security, but it also enabled dual protection of data security and visual security.
The remainder of this paper is organized as follows. The tri-stable locally-active memristor model is built in Section 2. Section 3 shows the dynamic characteristics of the designed memristor. The new fractional-order chaotic system based on the tri-stable locally-active memristor is presented, and the dynamic behavior of the chaotic system is analyzed in Section 4. Section 5 designs a visually meaningful image encryption scheme to use the chaotic system. Finally, Section 6 is the conclusion.

2. New Locally Active Memristor

Based on Chua’s definition and classification of memristors, this paper designed a new tri-stable locally-active memristor model, which can be described by the voltage–current relationship and the state equation as follows:
dx dt = k 1 ax + bx x + c x 3 + dx v 2 + ev
i = k 2 x 2   m v
where v and i are the input and output of the memristor, respectively. x is the state variable of the memristor. k 1 , k 2 , e, and m are parameters.
According to Equations (1) and (2), when the parameters are set as k 1 = 1 ,   k 2 = 1 ,   a = 4.7 ,   b = 10 ,   c = 4.7 ,   d = 0.1 ,   m = 10 ,   a n d   e = 10 , the color POP of Equation (1) with arrow heads is shown in Figure 1. It can be observed that there are five intersections with d x / d t = 0 , namely E1, E2, E3, E4, and E5. By adjusting the dynamic route of the five points, we can judge that the equilibrium points E1, E3, and E5 are asymptotically stable, whereas the equilibrium points E2 and E4 are unstable. The green lines represent the negative slope ranges, while the blue lines represent the positive slope ranges. The arrow above the x = 0 axis faces right, and the curve arrow below the x = 0 axis faces left.

2.1. Pinched Hysteresis Loops

When the memristor is driven by a periodic signal source with amplitude A and frequency ω , the v i curves of the memristor are pinched hysteresis loops passing through the origin. While the parameters of the memristor and the periodic signal source take different values, and the initial values of Equation (1) also take different values, the memristor will exhibit a variety of characteristics. The parameters of Equations (1) and (2) are set as k 1 = 1 ,   k 2 = 1 ,   a = 4.7 , b = 10 ,   c = 4.7 ,   d = 0.1 ,   m = 10 ,   a n d   e = 10 .
Let A = 4 , ω = 10 r a d / s , and the parameter d is changed. When d [ 0.048 , 0.17 ] , the dynamic trajectory displays three coexisting pinched hysteresis loops, as shown in Figure 2b, and the corresponding time-domain waveforms are shown in Figure 2a.
It can be observed from Figure 2 that if the initial value x ( 0 ) > 0.12 , the pinched hysteresis loop is the red curve of Figure 2b; if the initial value 0.744 x 0 0.12 , the pinched hysteresis loop is the blue curve of Figure 2b; if the initial value x 0   <   0.744 , the pinched hysteresis loop is the green curve of Figure 2b. The red and green curves are symmetrical hysteresis loops about the origin. When d   >   0.17 , the dynamic trajectories display double coexisting pinched hysteresis loops, as shown in Figure 3b, and the corresponding time-domain waveforms are shown in Figure 3a. It can be observed from Figure 3 that if the initial value x 0   >   0.32 , the pinched hysteresis loop is the red curve of Figure 3b; if the initial value x 0   < 0.32 , the pinched hysteresis loop is the green curve of Figure 3b. The red and blue curves are symmetrical hysteresis loops about the origin, and they have two pinched points. When d   < 0.048 , the dynamic trajectory displays only one pinched hysteresis loop, as shown in Figure 4b, and the corresponding time-domain waveforms are shown in Figure 4a. It can be observed that the dynamic trajectories have three stable states at the beginning, and as time goes on, the final curves are independent of the initial values and eventually converge to the same curve.
Let the amplitude A = 4   V ,   ω = 10   rad / s , and the parameter e is changed. When e 1 ,   0.958 , the dynamic trajectory displays three coexisting pinched hysteresis loops, as shown in Figure 5b, and the corresponding time-domain waveforms are shown in Figure 5a. It can be observed from Figure 5 that if the initial value x 0   >   0.077 , the pinched hysteresis loop is the red curve of Figure 5b; if the initial value − 0.745 x 0 0.077 , the pinched hysteresis loop is the blue curve of Figure 5b; if the initial value x 0   <   0.745 , the pinched hysteresis loop is the green curve of Figure 5b. The red and green curves are symmetrical hysteresis loops about the origin. When e   >   0.958 and − 3.6 e   <   1 , the dynamic trajectories display double coexisting pinched hysteresis loops, as shown in Figure 5d, and the corresponding time-domain waveforms are shown in Figure 5c. It can be observed that if the initial value x 0   >   0.6 , the pinched hysteresis loop is the red curve of Figure 5b; if the initial value x 0 0.6 , the pinched hysteresis loop is the green curve of Figure 5b. The red and blue curves are symmetrical hysteresis loops about the origin, and they have two pinched points. When e   >   3.6 , the dynamic trajectory displays only one pinched hysteresis loop, as shown in Figure 5f, and the corresponding time-domain waveforms are shown in Figure 5e. It can be observed that the pinched hysteresis loop has three pinched points and is symmetric about the origin.
Let the amplitude e = 0.5 ,   d = 0.1 ,   ω = 10   rad / s , and the parameter A is changed. When A 5.7 , the dynamic trajectory displays three coexisting pinched hysteresis loops, as shown in Figure 6b, and the corresponding time-domain waveforms are shown in Figure 6a. It can be seen that if the initial value x 0   >   0.61 , the pinched hysteresis loop is the red curve of Figure 6b; if the initial value − 0.12 x 0 0.61 , the pinched hysteresis loop is the blue curve of Figure 6b; if the initial value x 0   <   0.12 , the pinched hysteresis loop is the green curve of Figure 6b. The red and green curves are symmetrical hysteresis loops about the origin. When A   >   5.7 , the dynamic trajectories display double coexisting pinched hysteresis loops, as shown in Figure 6d, and the corresponding time-domain waveforms are shown in Figure 6c. It can be observed that if the initial value x 0   >   0.3 , the pinched hysteresis loop is the red curve of Figure 6d; if the initial value x 0 0.3 , the pinched hysteresis loop is the green curve of Figure 6d. The red and blue curves are symmetrical hysteresis loops about the origin and they have two pinched points.
Let the amplitude e = 0.5 ,   d = 0.1 ,   A = 4   V , and the parameter ω is changed. When ω 5 , the dynamic trajectory displays double coexisting pinched hysteresis loops, as shown in Figure 7b, and the corresponding time-domain waveforms are shown in Figure 7a. It can be observed that if the initial value x 0   0.66 , the pinched hysteresis loop is the red curve of Figure 7b; if the initial value x 0 <   0.66 , the pinched hysteresis loop is the blue curve of Figure 7b. The red and green curves are symmetrical hysteresis loops about the origin. When ω > 5 , the dynamic trajectories display three coexisting pinched hysteresis loops, as shown in Figure 7d, and the corresponding time-domain waveforms are shown in Figure 7c. It can be observed that if the initial value x 0 > 0.1 , the pinched hysteresis loop is the red curve of Figure 7d; if the initial value − 0.72 x 0 0.1 , the pinched hysteresis loop is the blue curve of Figure 7d; if the initial value x 0 < 0.72 , the pinched hysteresis loop is the green curve of Figure 7d. The red and blue curves are symmetrical hysteresis loops about the origin. It can be seen from the above analysis that the memristor presented different stable states with changes in parameters and input signals.

2.2. Local Activity

The DC V-I plot reflects Ohm’s law for the memristor, which describes the DC characteristics of the memristor and can analyze the intrinsic locally active features of the memristor. Let x = X , d x / d t | x = X = 0 in Equation (1), we can obtain the relationship between voltage V and state variable X :
aX + bX X + c X 3 + dX V 2 + eV = 0
Then, setting a = 4.7 ,   b = 10 ,   c = 4.7 ,   d = 0.1 ,   a n d   e = 0.5 . Based on Equation (3), we can obtain a function between the state variable X and the DC voltage V :
V 1 = 5 + 25 + 4 X 47 X   100 X X + 47 X 3 2 X
V 2 = 5   25 + 4 X 47 X 100 X X + 47 X 3 2 X
Substituting Equations (4) and (5) into Equation (2), the DC current I can be calculated, respectively:
I 1 = X 2     m V 1
I 2 = X 2     m V 2
Let m = 10 , based on Equations (4) and (6), when − 2 < X < 2 , we drew points X , V 1 ,   X , I 1 , and V 1 , I 1 in the X V 1   ,   X I 1   and V 1   I 1   planes, respectively, and obtained the DC V 1 I 1 plots shown in Figure 8a–c. Based on Equations (5) and (7), we drew points V 2 , I 2 in the V 2 I 2   plane and obtained the DC V 2     I 2 plot shown in Figure 8d in the same way. It was observed that the slopes of all of the curves had negative values; therefore, we determined that the memristor was a locally active memristor.
Comparison with the existing memristor model is shown in Table 1. It was found that the model proposed in this paper had more parameters and equilibrium points. In order to verify the correctness of the analysis, we designed a circuit on the proposed memristor, as shown in Figure 9. When we placed a sinusoidal excitation at both ends of the memristor, pinched hysteresis loops were observed, as shown in Figure 10. It could be concluded that the analysis was correct by comparison.

3. Fractional-Order Memristive Chaotic System

A fractional-order capacitor, fractional-order inductance, and our proposed fractional-order memristor were connected in series to construct a third-order fractional-order circuit, as shown in Figure 11. The new 3D fractional-order memristive system may generate chaotic oscillation because it contained a locally active memristor.
According to Kirchhoff’s laws, we could obtain the fractional-order differential equations as follows:
d q x d t q = k ax + bx x + c x 3   + ex y 2   + fy d q y d t q = x 2   m y + z L d q z d t q = y C
where a ,   b ,   c ,   e ,   a n d   f are the parameters of the designed system, L represents the inductance of an inductor, C represents the capacitance of the capacitor, q represents the order of the system, x is the internal state variable of the memristor, y is the current value through the inductor L , and z is the voltage value of the capacitor C .

3.1. Fractional Calculus

Definition 1
([35]). The Caputo fractional derivation definition of fractional-order α is:
D t α f ( t ) = 1 Γ ( m α ) 0 t ( t τ ) m α 1 f ( m ) ( τ ) d τ , m 1 < α < m
where Γ ( · ) is the Gamma function, and α R , m Z + . When 0 < α < 1 , D t α = 1 Γ ( 1 α ) 0 t f ( τ ) ( t τ ) α d τ , 0 < α < 1 .
In this paper, we used the Adomian Decomposition Method (ADM) to solve the proposed fractional-order differential equations.

3.2. The Stability of the System

Let the right side of Equation (8) be equal to zero:
d q x d t q = 0 d q y d t q = 0 d q z d t q = 0
and the equilibrium points x e , y e , z e of Equation (8) can be obtained as e 1 1.4268,0 , 0 , e 2 ( 0.7009,0 , 0 ) , e 3 0,0 , 0 , e 4 0.7009,0 , 0 , and e 5 ( 1.4268,0 , 0 ) . The Jacobian matrix of system (8) at x e , y e , z e = ( x * , 0 , 0 ) is:
J E = f x * 0 0 0 m x * 2 L 1 L 0 1 C 0
where f x * = k a + b x * + b x * 2 x * + 3 c x * 2 . The corresponding characteristic equation is:
λ f x * λ 2 m x * 2 L λ + 1 LC = 0
Based on Equation (12), we could calculate its three eigenvalues as follows:
λ 1 = f x *
λ 2 , 3 = ( m x * 2 ) / L ± ( ( m x * 2 ) / L ) 2 4 / LC 2
In order to analyze the stability of the system (8), we discuss the characteristic roots at the equilibrium points, respectively, and we obtained the conditions of stability of the system.
Obviously, when L > 0 , C > 0 , then L / C > 0 . When the equilibrium point was set as (x*,0,0), then λ 1 = f x * ,   a n d   λ 2,3 = m ± m 2 4 L / C / 2 L . If f x * < 0 , m < 0 , then all of the characteristic roots had negative real parts, namely R e ( λ 1 ) < 0 , R e ( λ 2,3 ) < 0 . Clearly, the system (8) was asymptotically stable at the equilibrium point. If f x * > 0 or m > 0 , then at least one of the eigenvalues had a positive real part, namely R e ( λ 1 ) > 0 or R e ( λ 2,3 ) > 0 . Clearly, the system (8) was unstable and chaotic oscillation may occur.

3.3. Mechanism of Chaotic Oscillation

We set the parameters as a = 4.7 , b = 10 , c = 4.7 , k = 20,000 , m = 160 , e = 10 , f = 10 , L = 1 e 7 , C = 1 e 7 , a n d   q = 0.9 , and we set the initial value as x , y , z = 12.5 , 2,0.1 . The phase diagram of chaotic oscillation of system (8) is shown in Figure 9d. In order to explore the mechanism of chaotic oscillation of system (8), we took several values of discretized voltage V = V 1 , V 2 , , V k , and plotted dynamic routes in the d x / d t   v s . x phase plane. Part of the routes of the dynamic switching process for values of discretized voltage V are shown in Figure 12a, where the step length was 1 u s . In Figure 12a, different colors indicate different dynamic routes obtained by the different voltages. The red points and short blue lines indicate the dynamic evolution when the state variable x was changed. In order to observe the results more clearly, we enlarged the local area in the black box of Figure 12a, as shown in Figure 12b. The corresponding phase diagram is shown in Figure 12c. When we set the initial values as x , y , z = 12.5 , 0.53,0.3 and x , y , z = 12.5 , 0.53,0.3 , double coexisting routes of the dynamic switching process could be observed in Figure 12d. The phase diagram corresponding to Figure 12d is shown in Figure 12e. When we took smaller step lengths and more points, a smooth dynamic trajectory and chaotic attractor were generated, which possessed a double layout and four scrolls, as shown in Figure 12f.

3.4. Dynamic Behaviors

In order to clearly show the dynamic behaviors of the system (8) when some relevant parameters were changed in a certain range, a phase diagram, bifurcation diagram, and the largest Lyapunov exponents [36] should first be drawn. In this paper, we used the QR algorithm to calculate the Lyapunov exponents.

3.4.1. Dynamic Depending on C

There were nine parameters in the system (8); therefore, we could only select some different types of parameters to study the impact on the dynamic behaviors of the system. Firstly, we set initial values as x 0 , y 0 , z 0 = ( 12.5 , 0.5,0.3 ) and x 0 , y 0 , z 0 = ( 12.5 , 0.5,0.3 ) , and some parameters as a = 4.7 , b = 10 , c = 4.7 , k = 20,000 , m = 160 , e = 10 , f = 10 , L = 1 e 7 , a n d   q = 0.9 . When the parameter C was changed, the resulting bifurcation diagram and the largest Lyapunov exponent are shown in Figure 13.
It can be seen that the system (8) was in a periodic state when C < 13   n F , while it was in a chaotic state when C > 13   n F . The LLE diagram on the right and the bifurcation diagram on the left strictly corresponded. They were symmetrical and separated when the parameter C was changed from 1 to 243   n F . To further illustrate the status of the system, we selected different values of the parameter C and the same initial conditions, and we obtained the coexisting attractors of the system in Figure 11. In Figure 11, the three-dimensional coexisting attractors and their projection in the x y ,   x z , and y z coordinate axes can be clearly observed. Figure 14a,b shows the phase diagrams of different periodic states. Figure 14c,d shows the phase diagrams of the chaotic state, which possessed a double layout and four scrolls, but their oscillation amplitudes and frequencies were different. As the parameter C was increased, the system (8) shifted from periodic to chaotic.

3.4.2. Dynamic Depending on L

Setting the initial values as x 0 , y 0 , z 0 = ( 12.5 , 0.5,0.3 ) and x 0 , y 0 , z 0 = ( 12.5 , 0.5,0.3 ) , some parameters were confirmed as a = 4.7 , b = 10 , c = 4.7 , k = 20,000 , m = 160 , e = 10 , f = 10 , C = 1 e 7 , a n d   q = 0.9 . When the parameter L was changed, the resulting bifurcation diagram and the largest Lyapunov exponent are shown in Figure 15.
It can be seen that the system (8) was in a chaotic state when L < 1.590   u H , while it was in three cycle state when L < 8.678   u H and in a two cycle state when L 8.678   u H . The LLE diagram on the right and the bifurcation diagram on the left strictly corresponded. To further illustrate the status of the system, we selected several values of the parameter C and the same initial conditions, and we obtained the coexisting attractors of the system in Figure 16. In Figure 16, three-dimensional coexisting attractors and their projection in the x y ,   x z , and y z coordinate axes can be clearly seen. Figure 16a,b shows the phase diagrams of the chaotic state. When the parameter L was increased, the oscillation amplitude of system (8) increased. Figure 16c,d shows the phase diagrams of different cycle states, but the numbers of periods were different. As the parameter L was increased, the system (8) shifted from chaotic to periodic, which was the opposite result of changes in the parameter C .

3.4.3. Dynamic Depending on k

Setting the initial values as x 0 , y 0 , z 0 = ( 12.5 , 0.5,0.3 ) and x 0 , y 0 , z 0 = ( 12.5 , 0.5,0.3 ) , some parameters were confirmed as a = 4.7 , b = 10 , c = 4.7 , m = 160 , e = 10 , f = 10 , L = 1 e 7 , C = 1 e 7 , a n d   q = 0.9 . When the parameter k was change, the resulting bifurcation diagram and the largest Lyapunov exponent are shown in Figure 17.
In Figure 18, the three-dimensional coexisting attractors and their projection in the x y ,   x z , and y z coordinate axes can be clearly seen. Figure 18a–c shows the phase diagrams of cycle states. When the parameter k was increased, the oscillation amplitude and number of cycles of the system (8) increased. Figure 18d shows the phase diagrams of the chaotic state. As the parameter k was increased, the system (8) shifted from periodic to chaotic.

3.4.4. Dynamic Depending on m

Setting the initial values as x 0 , y 0 , z 0 = ( 12.5 , 0.5,0.3 ) and x 0 , y 0 , z 0 = ( 12.5 , 0.5 , 0.3 ) , some parameters were confirmed as a = 4.7 , b = 10 , c = 4.7 , k = 20,000 , e = 10 , f = 10 , L = 1 e 7 , C = 1 e 7 , a n d   q = 0.9 . When the parameters m was changed, the resulting bifurcation diagram and the largest Lyapunov exponent are shown in Figure 19.
It can be seen that the system (8) was in a periodic state when m < 38, while it was in a chaotic state when m ≥ 38. The LLE diagram on the right and the bifurcation diagram on the left strictly corresponded. To further illustrate the status of the system, we selected several values of the parameter m and the same initial conditions, and we obtained the coexisting attractors of the system in Figure 20. In Figure 20, the three-dimensional coexisting attractors and their projection in the x y ,   x z , and y z coordinate axes can be clearly observed. Figure 20a–c shows the phase diagrams of different periodic states. Figure 20d shows the phase diagram of the chaotic state. As the parameter m was increased, the system (8) shifted from periodic to chaotic.

3.4.5. Dynamic Depending on q

Setting the initial values as x 0 , y 0 , z 0 = ( 12.5 , 0.5,0.3 ) and x 0 , y 0 , z 0 = ( 12.5 , 0.5,0.3 ) , some parameters were confirmed as a = 4.7 , b = 10 , c = 4.7 , k = 20,000 , m = 160 , e = 10 , f = 10 , C = 1 e 7 , a n d   L = 1 e 7 . When the parameter q was changed, the resulting coexisting bifurcation diagram is shown in Figure 21a. It can be seen that no matter how q changed, the system (8) was always in a chaotic state. Although the state of the system had not changed, the frequency of system oscillation underwent significant changes from the time-domain diagram in Figure 21b–d. When q was increased, the frequency of the system rapidly decreased.

3.5. Complexity Analysis

Complexity analysis is an important aspect of chaotic dynamics research, which includes two aspects: behavioral complexity and structural complexity. The complexity of a chaotic system is a measurement of the degree of a chaotic sequence approaching a random sequence. The closer the sequence is to a random sequence, the higher the complexity, and the higher the corresponding security. In this paper, we mainly studied the structural complexity of the system (8), which consisted of spectral entropy (SE) and C 0 complexity.
Spectral entropy is a measure of disorder applied to the power spectrum of periods of time series data [36]. The principle of C 0 complexity is as follows: Calculate the amplitude spectrum of the signal and its mean value, and keep the amplitude spectrum components unchanged if their amplitude values are no less than the mean value while replacing all the other components with zero. Calculate the inverse FFT of the new spectra and obtain a new signal. The ratio of the area of the original signal to the area of the new signal and its mean value over the area between the original signal and its mean value is defined as the C 0 complexity of the original system [37].
The chaos diagrams of the system (8) based on the C 0 algorithm and the spectral entropy algorithm are shown in Figure 22. From the diagrams, it can be seen that the boundaries were more obvious between high complexity regions and low complexity regions. Comparing the C 0 algorithm and the spectral entropy algorithm, the C 0 algorithm performed better.

4. Visually Meaningful Image Encryption and Decryption Scheme

In this section, the visually meaningful image encryption and decryption scheme is described. First, the fractional-order memristive chaotic sequences were generated. Second, image encryption based on DNA coding is described in detail, and the flow chart of the proposed scheme is shown as Figure 23a. Third, the embedding process of the encrypted images by IWT is described, and the flow chart of the proposed scheme is shown as Figure 23b. Finally, the simulation results and performance analysis are presented.

4.1. Chaotic Sequence Generation

The fractional-order memristive chaotic system could stably and continuously generate chaotic sequences, which had strong pseudo-random and statistical characteristics, thus providing a solid foundation for their application. The detailed process is as follows.
Step 1: In order to increase security, we selected the region with the highest complexity, as shown in Figure 22, and removed the initial N 0 iteration data. Then, four different sets of initial values were used in Equation (8), generating four sets of chaotic sequences: x 1 , y 1 , z 1 ; x 2 , y 2 , z 2 ; x 3 , y 3 , z 3 ; a n d   x 4 , y 4 , z 4 . Next, we chose s 1 i , j = x j i ,   i = 1 , 2 , , m n ,   j = 1 , 2 , 3 , 4 , and s 2 i , j = { y j ( i ) ,   i = 1,2 , , m n ,   j = 1,2 , 3,4 } as two four-dimensional sequences.
Step 2: The two new sequences s 1 and s 2 were used to generate two special sequences s 1 i , j 0 , 255 ,   j = 1,2 , 3,4 and s 2 i , j 0 , 255 ,   j = 1,2 , 3,4 , respectively. Their transformation process is as follows:
s 1 i , j = m o d f l o o r a b s x j i f l o o r a b s x j i × 10 6 , 256 ,
i = 1,2 , , m n , j = 1,2 , 3,4
s 2 i , j = m o d f l o o r a b s y j i f l o o r a b s y j i × 10 6 , 256
i = 1,2 , , m n , j = 1,2 , 3,4
where m o d { · } denotes the modulo operation, f l o o r ( · ) denotes the flooring operation, and a b s ( · ) denotes the absolute value operation. Then, we merged s 1 and s 2 as vector s s :
s s i = [ s 1 ( i , 1 ) , s 2 ( i , 1 ) , s 1 ( i , 2 ) , s 2 ( i , 2 ) , s 1 ( i , 3 ) , s 2 ( i , 3 ) , s 1 ( i , 4 ) , s 2 ( i , 4 ) ]
Step 3: Then, s s was composed for a sequence of k , and every element of k was translated into a binary number of 8 bits. The sequence of k can be represented as:
k = [ s s ( 1 ) , s s ( 3 ) , , s s ( 2 ) , s s ( 4 ) , , s s ( m n ) ]

4.2. Image Encryption

The methods of DNA encoding [38] and bit confusion are used to encrypt images, thereby resulting in changes in pixel values and pixel positions. Based on DNA encoding rules, the combination of two binary bits stands for a nucleotide, e.g., A-00, C-01, G-10, and T-11. There are eight combinations that are frequently used in all combinations, as shown in Table 2. If one wants to encode an image using the DNA rule, all pixels of the image need to be converted into 8-bit binary sequences, and then encoded using DNA rules. For instance, the 135-pixel value is defined as a 10000111 binary array and it can be encoded as 01111000 by utilizing rule 8 in Table 2. It can be seen that the DNA encoding rules can change the pixel values of the image and have an effect on encryption. The specific scheme can be divided into five steps:
Step 1: Transform the plaintext image P to binary matrix P b m with the size of m × 8 n . The pixel values of the image P are confused by bits, and the pixel positions are also simultaneously changed to reduce the correlation between adjacent pixels. The special process of the scheme is as follows: First, transform the two-dimension binary matrix P b m into the one-dimension binary sequence s b i n . Second, arrange the binary sequence of k in special order, and acquire a new sequence k n e w . Third, use the sequence k n e w to scramble the one-dimension sequence s b i n , and obtain binary sequence s b i n = s b i n ( k n e w ) .
Step 2: First, encode the binary sequence s b i n as DNA sequence s D N A using the final DNA encoding rule (Table 2). Second, transform sequence s 2 into a binary sequence s 2 b i n , then encode binary sequence s 2 b i n as DNA sequence s 2 D N A using the first DNA encoding rule. Third, conduct the DNA XNOR operation (Table 3) on DNA sequences s D N A and s 2 D N A , and obtain a new DNA sequence s D N A .
s D N A i = s 2 D N A i s D N A i , i [ 1,4 m n ]
where denotes the DNA XNOR operation.
Step 3: Extract the odd terms of sequence k n e w , and obtaining a new sequence k n e w o d d = [ k n e w ( 1 ) , k n e w ( 3 ) , , k n e w ( 8 m n 1 ) ] . Then, transform sequence s D N A into the sequence s D N A on the value of k n e w o d d : if 0 < k n e w o d d / 255 < 0.5 , the corresponding s D N A i is performed in reverse operation, otherwise it remains unchanged.
Step 4: The fourth DNA encoding rule is used to decode the DNA sequence s D N A to obtain the binary sequence s b i n .
Step 5: The binary sequence s b i n is converted to the corresponding cipher image P c i p h e r .
According to the five steps above, we summarize them into the following Algorithm 1.
Algorithm 1: The image encryption process.
(1) Convert P into a binary matrix P b m
(2) Convert P b m into a binary sequence s b i n
(3) Arrange the k sequence order, and acquire a new sequence k n e w
(4) for i = 1:mn × 8 do
S b i n (i) = s b i n ( k n e w (i))
End for
(5) Encode the sequence S b i n as a DNA sequence s D N A using the eighth DNA encoding rule
(6) Transform the sequence s 2 into a binary sequence s 2 b i n
(7) Encode the sequence s 2 b i n as a DNA sequence s 2 D N A using the first DNA encoding rule
(8) for i = 1:mn × 4 do
s D N A i = s 2 D N A i s D N A i
End for
(9) Extract the odd term of k sequence as a new sequence k n e w o d d
(10) Transform the sequence s D N A into the sequence s D N A on the value of k n e w o d d
(11) Decode the sequence s D N A to a binary sequence s b i n using the fourth DNA encoding rule
(12) Convert binary sequence s b i n into decimal matrix P c i p h e r
In order to elaborate on this encryption process, an illustrative example for a 5 × 5 pixel sample of the Barbara image is presented in Figure 24 on Algorithm 1.

4.3. Cipher Image Embedding Process

In order to obtain a visually meaningful cipher image, we embedded the cipher image P c i p h e r into the carrier image P c a r r i e r using the IWT and Least Significant Bit (LSB) methods. LSB replacement is a well-known steganographic scheme, in which the LSBs of the carrier image are replaced by cipher image data bits to obtain the stego image. The method has the advantages of sufficient payload, good visual and statistical imperceptibility, and ease of implementation. The specific steps of the embedding process are as follows:
Step 1: Decompose the carrier image P c a r r i e r to obtain the wavelet coefficient matrices L L , L H , H L , a n d   H H by IWT, and then transform them into one-dimensional sequences, labeled as s L L , s L H , s H L , a n d   s H H , respectively.
Step 2: Transform s L L , s L H , s H L , a n d   s H H as 8-bit binary sequences s b i n L L = { l l i , i = 1,2 , , m n } , s b i n L H = { l h i , i = 1,2 , , m n } , s b i n H L = { h l i , i = 1,2 , , m n } , a n d   s b i n H H = { h h i , i = 1,2 , , m n } , respectively.
Step 3: Convert the secret image P c i p h e r into a one-dimensional sequence s P c i p h e r = { y i , i = 1,2 , , m n } , and then transform the sequence s P c i p h e r into 8-bit binary sequence s b i n P c i p h e r .
Step 4: Replace the lowest 2 bits of s b i n L L , s b i n L H , s b i n H L , a n d   s b i n H H with the bits of s b i n P c i p h e r as follows:
l l i 1 l l i 2 = y i 1 y i 8 ,   l h i 1 l h i 2 = y i 2 y i 7 ,
h l i 1 h l i 2 = y i 3 y i 6 ,   h h i 1 h h i 2 = y i 3 y i 4 .
Step 5: Obtain four new binary sequences s b i n L L , s b i n L H , s b i n H L , a n d   s b i n H H , which contain the secret image. Transform the binary sequences s b i n L L , s b i n L H , s b i n H L , and s b i n H H into decimal sequences s L L , s L H , s H L , a n d   s H H , respectively, and then arrange the sequences s L L , s L H , s H L , a n d   s H H into two-dimensional forms. Finally, use inverse IWT to convert them into a visually meaningful cipher image.
According to the five steps above, we summarize them into the following Algorithm 2.
Algorithm 2: The cipher embedding process.
(1) Decompose the carrier image P c a r r i e r by IWT, and then transform it into the sequences s L L , s L H , s H L , a n d   s H H
(2) Transform s L L , s L H , s H L , a n d   s H H as 8-bit binary sequences s b i n L L , s b i n L H , s b i n H L , a n d   s b i n H H
(3) Convert the secret image P c i p h e r into 8-bit binary sequence s b i n P c i p h e r
(4) Replace the lowest 2 bits of s b i n L L , s b i n L H , s b i n H L , a n d   s b i n H H with the bits of s b i n P c i p h e r
(5) s b i n L L = [ s b i n L L (:,1:6), s b i n P c i p h e r (:,1:2)]
(6) s b i n L H = [ s b i n L H (:,1:6), s b i n P c i p h e r (:,3:4)]
(7) s b i n H L = [ s b i n H L (:,1:6), s b i n P c i p h e r (:,5:6)]
(8) s b i n H H = [ s b i n H H (:,1:6), s b i n P c i p h e r (:,7:8)]
(9) Transform the sequences s b i n L L , s b i n L H , s b i n H L , a n d   s b i n H H into decimal sequences s L L , s L H , s H L , a n d   s H H
(10) Use inverse IWT to convert s L L , s L H , s H L , a n d   s H H into a visually meaningful cipher image
In order to elaborate on this embedding process, an illustrative example is presented for a 3 × 3 pixel sample of the cipher image and a 6 × 6 pixel sample of the carrier image in Figure 25 on Algorithm 2.

4.4. Image Decryption Scheme

The image decryption and image encryption processes are opposite. First, extract the secret image from the visually secure cipher image, and then recover the plain image from the secret image. The flow chart of the image decryption scheme is shown in Figure 26.

4.5. Extracting the Cipher Image

Step 1: Decompose the visually meaningful cipher image by IWT, and obtain four modified wavelet coefficient matrices: M L L , M L H , M H L , and M H H .
Step 2: Transform the four modified wavelet coefficient matrices M L L , M L H , M H L , and M H H into one-dimensional sequences s M L L , s M L H , s M H L , a n d   s M H H , and then decompose them into 8-bit binary sequences s b i n M L L , s b i n M L H , s b i n M H L , a n d   s b i n M H H .
Step 3: Extract the final 2 bits of every pixel as follows:
y i 1 y i 8 = l l i 1 l l i 2 ,   y i 2 y i 7 = l h i 1 l h i 2 ,
y i 3 y i 6 = h l i 1 h l i 2 ,   y i 3 y i 4 = h h i 1 h h i 2 .
Step 4: Compose the bit values and transform them into decimals, and then arrange them in two-dimensions to obtain the secret image.

5. Numerical Simulation and Analysis

The simulation test results and performance analysis of the proposed visually meaningful image encryption algorithm are described in this section. Some classic metrics such as histograms, correlation coefficients, secret key sensitivity, NPCR, UACI, noise attacks, and cropping attacks were measured. The size of the plain image was 256 × 256 , and the size of the carrier image was 512 × 512 .

5.1. Simulated Results

The visual security performance of our encryption scheme was tested, the results are displayed in Figure 27. The first row shows four plain images, and the second row shows the visually secret cipher images corresponding to the four plain images of the first row. The third row shows the carrier images. It can be seen that the carrier images look like the normal images, and therefore they are visually safe and would not motivate an attacker. The fourth row shows the corresponding cipher images extracted from the carrier images. The final row shows the corresponding decryption images.
It can be seen from Figure 27 that the decryption images were almost the same as the plain images, which indicated that the quality of the reconstructed images was pretty good. Peak Signal-to-Noise Ratio ( P S N R ) and Mean Structure Similarity ( M S S I M ) [39] are often used to evaluate the performance of proposed schemes, which are defined as
P S N R = 10 l o g 255 2 1 n 2 i = 1 n j = 1 n R i , j P i , j 2
S S I M D i , I i = 2 μ D i μ I i + 0.01   ×   255 2 μ D i 2 + μ I i 2 + 0.01   ×   255 2 × 2 σ D i σ I i + 0.03   ×   255 2 σ D i 2 + σ I i 2 + 0.03   ×   255 2 × 2 σ D I i + 0.03   ×   255 2 2 σ D i σ I i M S S I M D , I = 1 L i = 1 L S S I M D i , I i
where R and P refer to the reconstructed image and the plain image, respectively. L is the gross of the selected image subblocks, μ I i and σ I i are the mean value and variance of the i - t h subblock selected in image I , respectively.
The M S S I M value quantitatively describes the similarity of two images in terms of brightness, contrast, and structure. The experimental results are listed in Table 4, where the symbol “p-r” represents the value between the plain image and the reconstructed image, and ‘‘c-v” represents the value between the carrier image and the visually meaningful cipher image. The numerical results indicated that the similarities among the plain images and the reconstructed images were very high. Additionally, the mean values of P S N R c-v and M S S I M c-v were 43.8008 dB and 0.9956, respectively. In short, the above numerical values implied that the proposed scheme could provide good visual security and data security.

5.2. Performance Analyses

In order to analyze the security and robustness of the proposed scheme, some quantitative indexes were defined, calculated, and then compared with existing visually meaningful image encryption schemes.

5.2.1. Key Security Analysis

Key sensitivity is an important parameter to evaluate the security of an image encryption algorithm. In this subsection, the plain image is labeled as P , and the carrier image is labeled as P c a r r i e r . In the simulation, the key parameters were fixed as a = 4.7 , b = 10 , c = 4.7 , k = 20,000 , m = 160 , e = 10 , f = 10 , C = 1 e 7 , L = 1 e 7 , a n d   q = 0.9 . When we added 10 16 to one of the parameters and the others were constant, the cipher image was incorrectly decrypted, as shown in Figure 28d. It can be seen that the decrypted image was completely different from the plain image. When we used the correct key to decrypt the cipher, it was almost the same as the plain image. In addition, we can observe that the embedded images w i t h   t h e   c o r r e c t   k e y were almost the same as those with the modified keys, and their similar histograms are shown in Figure 28g,h. Obviously, our encryption algorithm was extremely sensitive to keys, yet modifying the keys had little effect on the carrier image. When the modified keys were used in the decryption process, the recovered images were in noisy-like form, and the change in their pixel values was more than 99% between the wrongly decrypted image and the plain image. These results plainly evidenced that the proposed encryption method had high sensitivity to secret keys in the decryption process.

5.2.2. Histogram Analysis

The histogram of an image reflects the frequency of image pixel values. Traditional image encryption algorithms can generate a secret image with a uniform histogram to resist statistical attack. When we used our algorithm to generate a visually meaningful cipher image, the histogram of the encrypted image was uniform, as shown in Figure 29b,d, and the histogram of the embedded image was similar to that of the carrier image, as shown in Figure 29e–l. The histograms of the plain images (Barbara and cameraman) and their cipher images are shown in Figure 29a–d. The histograms of the carrier images (third row) and four cipher images (fourth row) in Figure 27 are shown in the second and third row of Figure 29. It can be seen that the histograms of the encrypted images were completely different from those of the plain images, and the histograms of the embedded images and the carrier images were nearly similar, which showed that the attacker would be unable to obtain relevant information by analyzing the histograms of the encrypted images and the embedded images. These results implied that the pixel value distributions of the carrier images were effectively preserved by the embedding method, and the pixel value distributions of the plain images were effectively hidden by the encryption method.

5.2.3. Correlation Analysis

As we all know, there is strong correlation between adjacent pixels in a natural image. In order to quantitatively measure the correlation, we randomly selected three sets of pixel pairs ( x i , y i ) from the plain image, carrier image, and cipher image, where i is from 0 to 3000, and then calculated in the horizontal, vertical, and diagonal directions according to:
r x y = i = 1 N x i x ¯ y i y ¯ i = 1 N x i x ¯ 2 × i = 1 N y i y ¯ 2
where x i and y i are the values of two adjacent pixels in the image, x ¯ = 1 N i = 1 N x i and y ¯ = 1 N i = 1 N y i are the mean values, respectively.
Here, the plain image ‘‘Barbara” and the carrier image ‘‘peppers” were employed to evaluate the correlation coefficients between two adjacent pixels in the horizontal, vertical, and diagonal directions. The plain image ‘Barbara’ (first row and first column in Figure 27), carrier image ‘peppers’ (second row and first column in Figure 27), and the cipher image ‘peppers’ (second row and fifth column in Figure 27) were calculated using Equation (15), and the corresponding correlation coefficients in the horizontal direction are plotted in Figure 30. From these results one can see that the correlation distributions of the plain image and encrypted image were completely different, and the correlation distribution of the visually meaningful cipher image was very similar to that of the carrier image but was quite different from those of the plain image and encrypted image. All of these results indicated that it was difficult to distinguish between the visually meaningful cipher image and the carrier image through correlation analysis, and the visual security of our proposed scheme was achieved. Moreover, an attacker could not seek out the connection between the cipher image and plain image through correlation analysis.

5.3. Various Attacks

In this subsection, the abilities of the proposed scheme to resist noise attack, cropping attack, differential attack, and chosen-plaintext attack are evaluated.

5.3.1. Noise Attack

When the cipher image is transferred in real image communication, noise will inevitably be added to the cipher image. In order to test the ability of our scheme to defend against noise attack, salt-and-pepper noise (SPN) was added to the cipher image. The resulting images are shown in Figure 31. It can be seen that SPN had different impacts on different noise densities, and the recovered images are shown in Figure 31a–e. The P S N R values were 25.13, 23.52, 19.41, 18.71, and 17.78 dB, respectively. In a word, the proposed encryption scheme had a strong capability for resisting SPN.

5.3.2. Cropping Attack

When the image is transferred over the internet, data loss of the visually meaningful cipher image can greatly affect the recovered image. Cropping attack is a factor that causes data loss. We randomly cut a few regions in these images and recovered the plain images using our decryption algorithm. The visually meaningful cipher images with three manners of data loss are depicted in Figure 32a–c, and the extracted cipher images and the recovered images are shown in Figure 32d–i. It can be seen that our scheme had higher robustness. The results implied that the proposed scheme could resist large-scale cropping attack to a certain extent.

5.3.3. Differential Attack

Hackers often use differential attacks to attack some target images. By changing a pixel value in the plain image and analyzing the difference between two cipher images, attackers attempt to seek out the relationship between the plain image and the cipher image and then reconstruct the original image without secret keys. In the proposed scheme, we first assumed the cipher images were obtained from the carrier images. Then we tested the ability of the encryption algorithm to defend against differential attack. First, suppose P 1 and P 2 are two plain images with one bit difference. Second, encrypt P 1 and P 2 using the same chaotic sequence. Third, obtain the corresponding secret images S 1 and S 2 . Finally, calculate the N P C R (Number of Pixels Change Rate) and U A C I (Unified Average Changing Intensity) values of S 1 and S 2 . N P C R and U A C I are usually applied to check the performance of the system against differential attack, and they are calculated as follows:
N P C R = 1 W × H i = 1 W j = 1 H D i , j × 100 %
U A C I = 1 W × H i = 1 W j = 1 H C 1 i , j C 2 i , j 255 × 100 %
where C 1 ( i , j ) and C 2 ( i , j ) are cipher images, both of which are W × H in size. If C 1 ( i , j ) = C 2 ( i , j ) , then D ( i , j ) = 0, otherwise D ( i , j ) = 1. The results are shown in Table 5.
Table 5 shows the results for four different plain images. One can observe that when the plain image changed by one bit, the N P C R value of the corresponding cipher image was about 99.592% and the U A C I value was 33.65%. Comparing the results reported in [40] with our results, it could be seen that the values of N P C R and U A C I were higher. This meant that the cipher image remained almost unchanged and the proposed encryption algorithm had a strong resistance capability against differential attack.

5.3.4. Chosen-Plain Attack

Chosen-plain attack can break a variety of image encryption schemes. An encryption scheme should have the ability to resist such an attack. For an entirely black image, as shown in Figure 33a, its secret image was obtained, as shown in Figure 33b. It can be seen that there was no obvious difference between the secret image and the secret images of other plain images. The visually meaningful cipher image obtained through the embedding process is shown in Figure 33e, and its appearance was similar to that of the carrier image, as shown in Figure 33d. Finally, the noise-like cipher image in Figure 33e was extracted, as shown in Figure 33c. Therefore, it would be difficult for the attacker to obtain any useful information through this method, which implied that the encryption scheme could better resist the chosen-plain attack.

5.4. Comparison with Existing Schemes

An excellent scheme should have good comprehensive performance. In this section, we compare our scheme with existing image encryption schemes in terms of safety and time efficiency. For this purpose, we list some data to highlight the advantages of our algorithm in Table 6 and Table 7, which mainly include the following two aspects: various attacks and execution efficiency.
In Table 6, we compare some of the latest encryption schemes with our scheme in terms of robustness. It can be seen that our scheme had stronger resistance to attacks under the same conditions. In Table 7, we compare another scheme with our scheme in terms of running time. Obviously, our scheme had a shorter running time and higher efficiency. In a word, our scheme was robust and efficient.

6. Conclusions

In this paper, a tri-bistable locally active memristor model was proposed, and its nonlinear characteristics were studied, including time-domain waveforms, three coexisting pinched hysteresis loops, Power-Off Plot, and DC V-I Curve. Then, a fractional-order chaotic system was built based on the proposed memristor. Research results showed that the system could generate abundant chaotic dynamic behaviors, including coexisting attractors with four scrolls, two channels, and complexity. Finally, a visually secure image encryption scheme was proposed, which consisted of two parts: the pre-encryption process based on DNA coding, and the embedding process based on IWT. In the pre-encryption process, bit scrambling, bit transformation, and DNA coding were used and a secret image was obtained, which protected the data security of the plain image. In the embedding process, the carrier image was decomposed by IWT, the secret image was embedded into the carrier image by bits, and finally a visually meaningful cipher image was obtained, which protected the visual security of the plain image. The simulation experiment and attack analysis showed that the proposed visually secure image encryption scheme could resist statistical analysis attack, chosen-plain attack, and differential attack.

Author Contributions

Validation, T.Z., D.W. and J.Z. (Jinzhong Zhang); writing—original draft preparation, Y.W.; writing—review and editing, J.Z. (Jian Zhou). All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Research Foundation for Advanced Talents of West Anhui University (grant number WGKQ2021050) and the Anhui Provincial Natural Science Foundation (grant number 2008085MA20).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Chua, L.O. Memristor-The missing circuit element. IEEE Trans. Circuit Theory 1971, 18, 159–182. [Google Scholar] [CrossRef]
  2. Strukov, D.B.; Snider, G.S.; Stewart, D.R.; Williams, R.S. The missing memristor found. Nature 2008, 453, 80–83. [Google Scholar] [CrossRef]
  3. Zhong, Y.; Tang, J.; Li, X.; Gao, B.; Qian, H.; Wu, H. Dynamic memristor-based reservoir computing for high-efficiency temporal signal processing. Nat. Commun. 2021, 12, 408. [Google Scholar] [CrossRef]
  4. Gul, F. Addressing the sneak-path problem in crossbar RRAM devices using memristor-based one schottky diode-one resistor array. Results Phys. 2019, 12, 1091–1096. [Google Scholar] [CrossRef]
  5. Bao, H.; Zhu, D.; Liu, W.; Xu, Q.; Chen, M.; Bao, B. Memristor synapse-based morris-lecar model: Bifurcation analyses and FPGA-based validations for periodic and chaotic bursting/spiking firings. Int. J. Bifurc. Chaos 2020, 30, 2050045. [Google Scholar] [CrossRef]
  6. Zhang, S.; Zheng, J.; Wang, X.; Zeng, Z.; He, S. Initial offset boosting coexisting attractors in memristive multi-double-scroll hopfield neural network. Nonlinear Dyn. 2020, 102, 2821–2841. [Google Scholar] [CrossRef]
  7. Zhou, P.; Yao, Z.; Ma, J.; Zhu, Z. A piezoelectric sensing neuron and resonance synchronization between auditory neurons under stimulus. Chaos Solit. Fract. 2021, 145, 110751. [Google Scholar] [CrossRef]
  8. Wu, X.; He, S.; Tan, W.; Wang, H. From Memristor-Modeled Jerk System to the Nonlinear Systems with Memristor. Symmetry 2022, 14, 659. [Google Scholar] [CrossRef]
  9. Lei, T.; Zhou, Y.; Fu, H.; Huang, L.; Zang, H. Multistability Dynamics Analysis and Digital Circuit Implementation of Entanglement-Chaos Symmetrical Memristive System. Symmetry 2022, 14, 2586. [Google Scholar] [CrossRef]
  10. Yang, B.; Wang, Z.; Tian, H.; Liu, J. Symplectic Dynamics and Simultaneous Resonance Analysis of Memristor Circuit Based on Its van der Pol Oscillator. Symmetry 2022, 14, 1251. [Google Scholar] [CrossRef]
  11. Dai, W.; Xu, X.; Song, X.; Li, G. Audio Encryption Algorithm Based on Chen Memristor Chaotic System. Symmetry 2022, 14, 17. [Google Scholar] [CrossRef]
  12. Rajagopal, K.; Kacar, S.; Wei, Z.; Duraisamy, P.; Kifle, T.; Karthikeyan, A. Dynamical investigation and chaotic associated behaviors of memristor chua’s circuit with a non-ideal voltage-controlled memristor and its application to voice encryption. AEU-Int. J. Electron. Commun. 2019, 107, 183–191. [Google Scholar] [CrossRef]
  13. Chen, J.; Yan, D.-W.; Duan, S.-K.; Wang, L.-D. Memristor-based hyper-chaotic circuit for image encryption. Chin. Phys. B 2020, 29, 110504. [Google Scholar] [CrossRef]
  14. Zhu, L.; Jiang, D.; Ni, J.; Wang, X.; Rong, X.; Ahmad, M. A visually secure image encryption scheme using adaptive thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf. Sci. 2022, 607, 1001–1022. [Google Scholar] [CrossRef]
  15. Tsafack, N.; Iliyasu, A.M.; De Dieu, N.J.; Zeric, N.T.; Kengne, J.; Abd-El-Atty, B.; Belazi, A.; Abd EL-Latif, A.S. A memristive RLC oscillator dynamics applied to image encryption. J. Info. Sec. App. 2021, 61, 102944. [Google Scholar] [CrossRef]
  16. Chua, L.O. Local activity is the origin of complexity. Int. J. Bifur. Chaos 2005, 15, 3435–13456. [Google Scholar] [CrossRef] [Green Version]
  17. Mannan, Z.I.; Choi, H.; Kim, H. Chua corsage memristor oscillator via Hopf bifurcation. Int. J. Bifur. Chaos. 2016, 26, 1630009. [Google Scholar] [CrossRef]
  18. Chua, L.O. If it’s pinched it’s a memristor. Semicond. Sci. Technol. 2014, 29, 104001. [Google Scholar] [CrossRef]
  19. Williams, R.S.; Pickett, M.D. The Art and Science of Constructing a Memristor Model: Memristors and Memristive Systems; Springer: New York, NY, USA, 2013; pp. 93–104. [Google Scholar]
  20. Messaris, I.; Brown, T.D.; Demirkol, A.S.; Ascoli, A.; Al Chawa, M.M.; Williams, R.S.; Tetzlaff, R.; Chua, L.O. NbO2-Mott memristor: A circuit-theoretic investigation. IEEE Trans. Circuits Syst. I Regul. Pap. 2021, 68, 4979–4992. [Google Scholar] [CrossRef]
  21. Mannan, Z.I.; Choi, H.; Rajamani, V.; Kim, H.; Chua, L. Chua corsage memristor: Phase portraits, basin of attraction, and coexisting pinched hysteresis loops. Int. J. Bifur. Chaos 2017, 27, 1730011. [Google Scholar] [CrossRef]
  22. Mannan, Z.I.; Choi, H.; Rajamani, V. Oscillation with 4-lobe Chua corsage memristor. IEEE Circuits Syst. Mag. 2018, 18, 14–27. [Google Scholar] [CrossRef]
  23. Mannan, Z.I.; Yang, C.; Adhikari, S.P.; Kim, H. Exact analysis and physical realization of the 6-lobe Chua corsage memristor. Complexity 2018, 2018, 1–12. [Google Scholar] [CrossRef]
  24. Dong, Y.; Wang, G.; Chen, G.; Shen, Y.; Ying, J. A bistable nonvolatile locally-active memristor and its complex dynamics. Commun. Nonlinear Sci. 2020, 84, 105203. [Google Scholar] [CrossRef]
  25. Tan, Y.; Wang, C. A simple locally active memristor and its application in HR neurons. Chaos 2020, 30, 053118. [Google Scholar] [CrossRef]
  26. Xie, W.; Wang, C.; Lin, H. A fractional-order multistable locally active memristor and its chaotic system with transient transition, state jump. Nonlinear Dyn. 2021, 104, 4523–4541. [Google Scholar] [CrossRef]
  27. Ding, D.; Xiao, H.; Yang, Z.; Luo, H.; Hu, Y.; Zhang, X.; Liu, Y. Coexisting multi-stability of Hopfield neural network based on coupled fractional-order locally active memristor and its application in image encryption. Nonlinear Dyn. 2022, 108, 4433–4458. [Google Scholar] [CrossRef]
  28. Yang, Z.-L.; Liang, D.; Ding, D.-W.; Hu, Y.-B.; Li, H. Transient transition behaviors of fractional-order simplest chaotic circuit with bi-stable locally-active memristor and its ARM-based implementation. Chin. Phy. B. 2021, 30, 120515. [Google Scholar] [CrossRef]
  29. Bao, L.; Zhou, Y. Image encryption: Generating visually meaningful encrypted images. Info. Sci. 2015, 324, 197–207. [Google Scholar] [CrossRef]
  30. Chai, X.; Gan, Z.; Chen, Y.; Zhang, Y. A visually secure image encryption scheme based on compressive sensing. Signal Process. 2017, 134, 35–51. [Google Scholar] [CrossRef] [Green Version]
  31. Wang, H.; Xiao, D.; Li, M.; Xiang, Y.; Li, X. A visually secure image encryption scheme based on parallel compressive sensing. Signal Process. 2019, 155, 218–232. [Google Scholar] [CrossRef]
  32. Ping, P.; Yang, X.; Zhang, X.; Mao, Y.; Khalid, H. Generating visually secure encrypted images by partial block pairing-substitution and semi-tensor product compressed sensing. Digit. Signal Process. 2022, 120, 103263. [Google Scholar] [CrossRef]
  33. Li, R.H.; Dong, E.Z.; Tong, J.G. A Novel Multiscroll Memristive Hopfield Neural Network. Int. J. Bifur. Chaos. 2022, 32, 2250130. [Google Scholar] [CrossRef]
  34. Ying, J.; Liang, Y.; Wang, J.; Dong, Y.; Wang, G.; Gu, M. A tristable locally-active memristor and its complex dynamics. Chaos Solitons Fractals 2022, 160, 112241. [Google Scholar] [CrossRef]
  35. Carpinteri, A.; Mainardi, F. Fractals and Fractional Calculus in Continuum Mechanics; International Centre for Mechanical Sciences; Springer: Berlin/Heidelberg, Germany, 1997; Volume 378. [Google Scholar]
  36. Bremen, H.F.V.; Udwadia, F.E.; Proskurowski, W. An efficient QR based method for the computation of Lyapunov exponents. Physica D 1997, 101, 1–16. [Google Scholar] [CrossRef]
  37. Shen, E.H.; Cai, Z.J.; Gu, F.J. Mathematical foundation of a new complexity measure. Appl. Math. Mech. 2005, 26, 1188–1196. [Google Scholar]
  38. Erkan, U.; Toktas, A.; Enginoğlu, S.; Akbacak, E.; Thanh, D.N.H. An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN. Multimed. Tools Appl. 2022, 81, 7365–7391. [Google Scholar] [CrossRef]
  39. Wang, Z.; Bovik, A.; Sheikh, H.; Simoncelli, E. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [Green Version]
  40. Wang, X.Y.; Liu, C.; Jiang, D.H. Visually meaningful image encryption scheme based on new-designed chaotic map and random scrambling diffusion strategy. Chaos Solitons Fractals 2022, 164, 112625. [Google Scholar] [CrossRef]
  41. Zhu, L.; Song, H.; Zhang, X.; Yan, M.; Zhang, T.; Wang, X.; Xu, J. A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process. 2020, 175, 107629. [Google Scholar] [CrossRef]
Figure 1. POP of Equation (1).
Figure 1. POP of Equation (1).
Symmetry 15 01398 g001
Figure 2. The dynamic trajectory of the memristor when d = 0.1 : (a) time-domain waveforms; (b) three coexisting pinched hysteresis loops.
Figure 2. The dynamic trajectory of the memristor when d = 0.1 : (a) time-domain waveforms; (b) three coexisting pinched hysteresis loops.
Symmetry 15 01398 g002
Figure 3. The dynamic trajectory of the memristor when d = 0.15 : (a) time-domain waveforms; (b) double coexisting pinched hysteresis loops.
Figure 3. The dynamic trajectory of the memristor when d = 0.15 : (a) time-domain waveforms; (b) double coexisting pinched hysteresis loops.
Symmetry 15 01398 g003
Figure 4. The dynamic trajectory of the memristor when d = 0.05 : (a) time-domain waveforms; (b) double coexisting pinched hysteresis loops.
Figure 4. The dynamic trajectory of the memristor when d = 0.05 : (a) time-domain waveforms; (b) double coexisting pinched hysteresis loops.
Symmetry 15 01398 g004
Figure 5. The dynamic trajectory of the memristor: (a) time-domain waveforms when e = 0.5 ; (b) double coexisting pinched hysteresis loops when e = 0.5 ; (c) when e = 1.5 ; (d) when e = 1.5 ; (e) when e = 3.9 ; (f) when e = 3.9 .
Figure 5. The dynamic trajectory of the memristor: (a) time-domain waveforms when e = 0.5 ; (b) double coexisting pinched hysteresis loops when e = 0.5 ; (c) when e = 1.5 ; (d) when e = 1.5 ; (e) when e = 3.9 ; (f) when e = 3.9 .
Symmetry 15 01398 g005
Figure 6. The dynamic trajectory of the memristor: (a) time-domain waveforms when A = 5 ; (b) double coexisting pinched hysteresis loops when A = 5 ; (c) when A = 6 ; (d) when A = 6 .
Figure 6. The dynamic trajectory of the memristor: (a) time-domain waveforms when A = 5 ; (b) double coexisting pinched hysteresis loops when A = 5 ; (c) when A = 6 ; (d) when A = 6 .
Symmetry 15 01398 g006
Figure 7. The dynamic trajectory of the memristor: (a) time-domain waveforms when ω = 3   rad / s ; (b) double coexisting pinched hysteresis loops when ω = 3   rad / s ; (c) when ω = 7   rad / s ; (d) when ω = 7   rad / s .
Figure 7. The dynamic trajectory of the memristor: (a) time-domain waveforms when ω = 3   rad / s ; (b) double coexisting pinched hysteresis loops when ω = 3   rad / s ; (c) when ω = 7   rad / s ; (d) when ω = 7   rad / s .
Symmetry 15 01398 g007
Figure 8. The DC plots of the memristor. (a) X V 1   ; (b) X I 1   ; (c) V 1   I 1   ; (d) V 2   I 2   .
Figure 8. The DC plots of the memristor. (a) X V 1   ; (b) X I 1   ; (c) V 1   I 1   ; (d) V 2   I 2   .
Symmetry 15 01398 g008
Figure 9. The circuit diagram of the proposed memristor.
Figure 9. The circuit diagram of the proposed memristor.
Symmetry 15 01398 g009
Figure 10. The pinched hysteresis loops of the memristor. (a) ω = 10 ; (b) ω = 14 .
Figure 10. The pinched hysteresis loops of the memristor. (a) ω = 10 ; (b) ω = 14 .
Symmetry 15 01398 g010
Figure 11. The memristive chaotic circuit.
Figure 11. The memristive chaotic circuit.
Symmetry 15 01398 g011
Figure 12. Mechanism analysis of chaotic oscillation: (a) the dynamic process with 1   u s step length; (b) an enlarged view of the dynamic process in the black box; (c) the part of the phase diagram corresponding to (a); (d) the coexisting dynamic process with 1 u s step length; (e) the part of the coexisting phase diagram corresponding to (d); (f) co-existing attractors.
Figure 12. Mechanism analysis of chaotic oscillation: (a) the dynamic process with 1   u s step length; (b) an enlarged view of the dynamic process in the black box; (c) the part of the phase diagram corresponding to (a); (d) the coexisting dynamic process with 1 u s step length; (e) the part of the coexisting phase diagram corresponding to (d); (f) co-existing attractors.
Symmetry 15 01398 g012
Figure 13. Dynamic behavior depending on C : (a) coexisting bifurcation diagram; (b) largest Lyapunov exponent.
Figure 13. Dynamic behavior depending on C : (a) coexisting bifurcation diagram; (b) largest Lyapunov exponent.
Symmetry 15 01398 g013
Figure 14. Coexisting attractors: (a) C = 1   n F ; (b) C = 10   n F ; (c) C = 50   n F ; (d) C = 100   n F .
Figure 14. Coexisting attractors: (a) C = 1   n F ; (b) C = 10   n F ; (c) C = 50   n F ; (d) C = 100   n F .
Symmetry 15 01398 g014
Figure 15. Dynamic behavior depending on L : (a) coexisting bifurcation diagram; (b) largest Lyapunov exponent.
Figure 15. Dynamic behavior depending on L : (a) coexisting bifurcation diagram; (b) largest Lyapunov exponent.
Symmetry 15 01398 g015
Figure 16. Coexisting attractors: (a) L = 5   n H ; (b) L = 100.0   n H ; (c) L = 5000   n H ; (d) L = 10,000   n H .
Figure 16. Coexisting attractors: (a) L = 5   n H ; (b) L = 100.0   n H ; (c) L = 5000   n H ; (d) L = 10,000   n H .
Symmetry 15 01398 g016
Figure 17. Dynamic behavior depending on k : (a) coexisting bifurcation diagram; (b) largest Lyapunov exponent.
Figure 17. Dynamic behavior depending on k : (a) coexisting bifurcation diagram; (b) largest Lyapunov exponent.
Symmetry 15 01398 g017
Figure 18. Coexisting attractors: (a) k = 100 ; (b) k = 1000 ; (c) k = 2000 ; (d) k = 6000 .
Figure 18. Coexisting attractors: (a) k = 100 ; (b) k = 1000 ; (c) k = 2000 ; (d) k = 6000 .
Symmetry 15 01398 g018
Figure 19. Dynamic behavior depending on m : (a) coexisting bifurcation diagram; (b) largest Lyapunov exponent.
Figure 19. Dynamic behavior depending on m : (a) coexisting bifurcation diagram; (b) largest Lyapunov exponent.
Symmetry 15 01398 g019
Figure 20. Coexisting attractors: (a) m = 3 ; (b) m = 20 ; (c) m = 50 ; (d) m = 150 .
Figure 20. Coexisting attractors: (a) m = 3 ; (b) m = 20 ; (c) m = 50 ; (d) m = 150 .
Symmetry 15 01398 g020
Figure 21. Dynamic behavior depending on q : (a) coexisting bifurcation diagram; (b) time-domain diagram when q = 0.7 ; (c) time-domain diagram when q = 0.8 ; (d) time-domain diagram when q = 0.9 .
Figure 21. Dynamic behavior depending on q : (a) coexisting bifurcation diagram; (b) time-domain diagram when q = 0.7 ; (c) time-domain diagram when q = 0.8 ; (d) time-domain diagram when q = 0.9 .
Symmetry 15 01398 g021aSymmetry 15 01398 g021b
Figure 22. Complexity diagrams of the system (8): (a) C 0 of L-C plane; (b) C 0 of L-q plane; (c) C 0 of C-q plane; (d) SE of L-C plane; (e) SE of L-q plane; (f) SE of C-q plane.
Figure 22. Complexity diagrams of the system (8): (a) C 0 of L-C plane; (b) C 0 of L-q plane; (c) C 0 of C-q plane; (d) SE of L-C plane; (e) SE of L-q plane; (f) SE of C-q plane.
Symmetry 15 01398 g022
Figure 23. Flow chart of the proposed scheme: (a) encryption scheme; (b) embedding and extracting schemes of a cipher image.
Figure 23. Flow chart of the proposed scheme: (a) encryption scheme; (b) embedding and extracting schemes of a cipher image.
Symmetry 15 01398 g023
Figure 24. Processes of the proposed encryption scheme with an illustrative example.
Figure 24. Processes of the proposed encryption scheme with an illustrative example.
Symmetry 15 01398 g024
Figure 25. Processes of the proposed embedding scheme with an illustrative example.
Figure 25. Processes of the proposed embedding scheme with an illustrative example.
Symmetry 15 01398 g025
Figure 26. Flow chart of the decryption scheme.
Figure 26. Flow chart of the decryption scheme.
Symmetry 15 01398 g026
Figure 27. Encryption and decryption results for carrier images: from the first row to the fifth row: plain images, secret images, carrier images, cipher images, and reconstructed images, respectively.
Figure 27. Encryption and decryption results for carrier images: from the first row to the fifth row: plain images, secret images, carrier images, cipher images, and reconstructed images, respectively.
Symmetry 15 01398 g027aSymmetry 15 01398 g027b
Figure 28. Key sensitivity test: (a) plain image; (b) cipher image; (c) decrypted image; (d) erroneously decrypted image; (e) P c i p h e r with the correct key; (f) P c i p h e r with the modified keys; (g) the histogram of (e); (h) the histogram of (f).
Figure 28. Key sensitivity test: (a) plain image; (b) cipher image; (c) decrypted image; (d) erroneously decrypted image; (e) P c i p h e r with the correct key; (f) P c i p h e r with the modified keys; (g) the histogram of (e); (h) the histogram of (f).
Symmetry 15 01398 g028
Figure 29. Histograms: (a) Barbara; (b) encrypted (a); (c) cameraman; (d) encrypted (c); (eh) carrier images (third row of Figure 27); (il) embedded images (fourth row of Figure 27).
Figure 29. Histograms: (a) Barbara; (b) encrypted (a); (c) cameraman; (d) encrypted (c); (eh) carrier images (third row of Figure 27); (il) embedded images (fourth row of Figure 27).
Symmetry 15 01398 g029
Figure 30. The correlation distributions of two adjacent pixels in the horizontal direction: (a) plain image ‘Barbara’ (first row and first column in Figure 27); (b) encrypted image ‘Barbara’ (c) carrier image ‘peppers’; (d) visually meaningful cipher image ‘peppers’ (second row and fifth column in Figure 27).
Figure 30. The correlation distributions of two adjacent pixels in the horizontal direction: (a) plain image ‘Barbara’ (first row and first column in Figure 27); (b) encrypted image ‘Barbara’ (c) carrier image ‘peppers’; (d) visually meaningful cipher image ‘peppers’ (second row and fifth column in Figure 27).
Symmetry 15 01398 g030
Figure 31. The resistance capability to different SPN densities: (a) d = 0.04; (b) d = 0.08; (c) d = 0.12; (d) d= 0.16; (e) d = 0.2.
Figure 31. The resistance capability to different SPN densities: (a) d = 0.04; (b) d = 0.08; (c) d = 0.12; (d) d= 0.16; (e) d = 0.2.
Symmetry 15 01398 g031
Figure 32. Results of resistance against cropping attack: (ac) schematic of cropping in the visually meaningful cipher images; (df) cipher images extracted from the visually meaningful cipher images; (gi) decrypted results of the proposed scheme.
Figure 32. Results of resistance against cropping attack: (ac) schematic of cropping in the visually meaningful cipher images; (df) cipher images extracted from the visually meaningful cipher images; (gi) decrypted results of the proposed scheme.
Symmetry 15 01398 g032aSymmetry 15 01398 g032b
Figure 33. Chosen-plain attack scheme: (a) all-zero image; (b) all-zero image encrypted; (c) extracted cipher image from the visually meaning cipher image; (d) carrier image; (e) visually meaningful cipher image.
Figure 33. Chosen-plain attack scheme: (a) all-zero image; (b) all-zero image encrypted; (c) extracted cipher image from the visually meaning cipher image; (d) carrier image; (e) visually meaningful cipher image.
Symmetry 15 01398 g033
Table 1. Comparison with the memristor model.
Table 1. Comparison with the memristor model.
Memristor
Models
Number of
Parameters
Number of
Equilibrium Points
Ref. [17]13
Ref. [25]13
Ref. [33]2infinite
Ref. [34]15
Ours75
Table 2. DNA coding rule.
Table 2. DNA coding rule.
Rule12345678
00ACCAGTTG
01CTAGAGCT
10GATCTCGA
11TGGTCAAC
Table 3. DNA XNOR.
Table 3. DNA XNOR.
AGCT
ATCGA
GCTAG
CGATC
TAGCT
Table 4. The values of PSNR and MSSIM.
Table 4. The values of PSNR and MSSIM.
Plain ImageCarrier Image P S N R p-r M S S I M p-r P S N R c-v M S S I M c-v
BarbaraPeppers37.95260.952343.92560.9962
CameramanPirate38.85410.956743.28730.9952
CircuitLiving room39.65120.961243.96380.9937
HouseWalk bridge39.02460.952843.48460.9990
Average 38.87060.9557543.66530.9960
Table 5. The N P C R and U A C I values of the plain images changed by one bit.
Table 5. The N P C R and U A C I values of the plain images changed by one bit.
ItemBarbaraCameramanCircuitHouseAverageRef. [40]
N P C R (%)99.6399.5799.6999.4899.59299.59
U A C I (%)33.6933.5833.6233.6333.6333.5
Table 6. Comparison of the capability to resist SPN and cropping attacks.
Table 6. Comparison of the capability to resist SPN and cropping attacks.
Noise TypeAttack IntensityPSNR
Ref. [14]Ref. [31]Ref. [41]Ours
SPN0.000133.4431.5628.1828.01
0.000333.2630.2228.1827.77
0.000533.0230.0228.1727.58
Cropping 32 × 32 24.9227.2130.1830.35
48 × 48 20.1323.9629.0130.10
Table 7. Running time (Unit: s).
Table 7. Running time (Unit: s).
AlgorithmEncryptionEmbeddingExtractionReconstruction
Ref. [41]0.12620.19950.08330.4374
ours0.13520.10240.08110.1578
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, Y.; Wang, D.; Zhang, T.; Zhang, J.; Zhou, J. A Novel Fractional-Order Memristive Chaotic Circuit with Coexisting Double-Layout Four-Scroll Attractors and Its Application in Visually Meaningful Image Encryption. Symmetry 2023, 15, 1398. https://doi.org/10.3390/sym15071398

AMA Style

Wu Y, Wang D, Zhang T, Zhang J, Zhou J. A Novel Fractional-Order Memristive Chaotic Circuit with Coexisting Double-Layout Four-Scroll Attractors and Its Application in Visually Meaningful Image Encryption. Symmetry. 2023; 15(7):1398. https://doi.org/10.3390/sym15071398

Chicago/Turabian Style

Wu, Yuebo, Duansong Wang, Tan Zhang, Jinzhong Zhang, and Jian Zhou. 2023. "A Novel Fractional-Order Memristive Chaotic Circuit with Coexisting Double-Layout Four-Scroll Attractors and Its Application in Visually Meaningful Image Encryption" Symmetry 15, no. 7: 1398. https://doi.org/10.3390/sym15071398

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop