Design and Implementation of A Novel Circuit-Based
Design and Implementation of A Novel Circuit-Based
https://doi.org/10.1007/s00034-023-02322-5
Abstract
The research on dissipative-chaotic systems has exhibited plenty of remarkable results
for past few decades. But unfortunately, the attackers can quickly rebuild the attrac-
tors in dissipative systems, causing multiple information security issues. Compared to
the dissipative system, the conservative system can efficiently prevent such external
attacks due to the presence of flows without any attractors. Therefore, the study of
conservative chaotic systems is essential for secure communications and engineering
applications. Presently, a few studies are there for non-autonomous conservative sys-
tems based on simple memristor. For this reason, a circuit-based new simple memristor
is designed and using this, a non-autonomous four-dimensional hyperchaotic conser-
vative system without an equilibrium point is proposed in this paper. The hyperchaotic
behavior and multiple offset boosting are explored by phase portraits, bifurcation dia-
grams, and Lyapunov exponent plots. It is found that due to the presence of applied
stimuli, the proposed system also produces time-varying hyperchaos and offset boost-
ing. Furthermore, different torus structures, triggered by initial conditions and control
parameters are observed here as the prominent property of the conservative system.
An analog circuit of the chaotic system is developed and executed experimentally
to verify the correctness of the numerical model. Concurrently, a new algorithm for
image encryption using the proposed hyperchaotic map is stated and the efficiency of
this algorithm is confirmed by several security tests.
B Santanu Mandal
[email protected]
Nune Pratyusha
[email protected]
1 Introduction
for image encryption and some differential and statistical analysis are executed in
Sect. 5. The final conclusions are presented in last section.
i = g(x, v)v
ẋ = h(x, v) (1)
where v and i represent the input signal and output current of the memristor, respec-
tively, and the state variable is x. The function g(x, v) represents memductance and
h(x, v) represents continued scalar function.
In this paper, a new generic voltage-controlled memristive system is proposed as
follows:
i = ξ x3 + η v
ẋ = αv (2)
where ξ , η, and α are the constant parameters. The mathematical model of the pro-
posed memristor is simple and easy to implement; the fingerprints of the memristor
are verified using Eq. (2) by applying a sinusoidal signal (v = A sin(2π f t)) as input.
The proposed memristor model exhibits a pinched hysteresis loop, which is pinched
at the origin, and the hysteresis lobe area decreases with an increase in frequency
(20 Hz to 3 MHz) (Fig. 1). The memristor emulator circuit design is also developed
here (Fig. 12). Multisim simulations and the breadboard analysis are done for hard-
ware implementation of the proposed mathematical model of a simple memristor (2)
(Fig. 1b, c).
A non-autonomous hyperchaotic conservative system is presented based on the
proposed voltage-controlled memristor (2) as follows:
ẋ1 = δ(x2 − x3 )
ẋ2 = 1 β (−x1 + (ξ x43 + η)A sin(2π f t))
ẋ3 = 1 ρ x1
ẋ4 = α A sin(2π f t) (3)
where x 1 , x 2 , x 3 , x 4 are the state variables of the non-autonomous chaotic system with
parameters δ = 1, ξ = 4.7 × 103 , η = 103 , ρ = 1 × 10−5 , α = 1/(22 × 103 ), β =
1 × 10−6 , f = 30, A = 1 (amplitude of the applied signal) and the initial condition
(1,1,1,1). Phase-portraits of the proposed chaotic system, which are depicted in Fig. 2,
exhibit a chaotic invariant-torus, which is highly useful for secure communication and
cyber security systems.
Fig. 1 v − i characteristics of the proposed memristor a MATLAB simulation result with different frequen-
cies for (2) b Multisim simulation results with frequency f = 300 Hz c Breadboard experimental results
using an oscilloscope (Tektronix TBS 1072B-EDU) with frequency f = 3 MHz
The proposed non-autonomous system does not contain an equilibrium point; there-
fore, the system may generate hidden flows.
The divergence of the system (3) for any initial condition is,
which confirms that the proposed chaotic system (3) is a conservative system [12].
Altering the value of β (from 1 × 10−6 to 2), and fixing the other parameters, the
phase portraits of the system (3) are illustrated in Fig. 3, and β-dependent Lyapunov
exponent plot (Fig. 4) is obtained using MATLAB. The Lyapunov exponents of the
When the parameter ρ changes from 1 × 10−6 to 1, and fixing other parameters (δ =
1, ξ = 4.7 × 103 , η = 103 , β = 1 × 10−6 , α = 1/(22 × 103 ), A = 1, f = 30 and
Fig. 3 Different phase-portraits in x 1 –x 2 plane with fixed δ = 1, ξ = 4.7 × 103 , η = 103 , ρ = 10−5 , α =
1/(22 × 103 ), A = 1, f = 30 and varied β: a β = 10−1 b β = 10−4 c β = 10−5 d β = 10−7
Fig. 4 a Lyapunov exponent plot, b bifurcation plot with varying parameter β (from 1 × 10−6 to 2),
δ = 1, ξ = 4.7 × 103 , η = 103 , ρ = 10−5 , α = 1/(22 × 103 ), A = 1, f = 30
Fig. 5 Different phase-portraits in x 2 –x 1 plane with fixed δ = 1, ξ = 4.7 × 103 , η = 103 , β = 10−6 , α =
1/(22 × 103 ), A = 1, f = 30 and varied ρ: a ρ = 1 b ρ = 10−4 c ρ = 10−6 d ρ = 10−7
The phase portraits of system (3) with varying the values of f is illustrated in Fig. 7.
Fig. 6 a Lyapunov exponent plot, b bifurcation plot with varying parameter ρ (from 1 × 10−6 to 1),
δ = 1, ξ = 4.7 × 103 , η = 103 , β = 10−6 , α = 1/(22 × 103 ), A = 1, f = 30
Fig. 7 Different phase-portraits in x 2 –x 1 plane with fixed δ = 1, ξ = 4.7 × 103 , η = 103 , β = 10−6 , α =
1/(22 × 103 ), A = 1, ρ = 10−5 and varied f : a f = 15 b f = 40 c f = 70 d f = 120
Fig. 8 a Lyapunov exponent plot, b bifurcation plot with varying parameter f (from 1 to 150) δ = 1, ξ =
4.7 × 103 , η = 103 , β = 10−6 , α = 1/(22 × 103 ), A = 1, ρ = 10−5
The Lyapunov exponent diagram with varying parameter f (1 to 150), when the other
parameters δ = 1, ξ = 4.7 × 103 , η = 103 , β = 10−6 , ρ = 10−5 , α = 1/(22 × 103 ),
A = 1, and initial condition (1, 1, 1, 1) is illustrated in Fig. 8a.
The Lyapunov exponent values for system (3) with varying f are L 1 = 2.6187, L 2
= − 6.1779, L 3 = 3.5992, L 4 ≈ 0. The proposed system (3) has two positive Lya-
punov exponent values. So, the proposed system shows hyperchaotic nature. Again,
the system is recognized as a conservative system due to the Kaplan–Yorke dimension
is 4. The bifurcation plot (Fig. 8b) of system (3) with varying the values of f , which
is compatible with Lyapunov spectrum plot (Fig. 8a).
This section investigates another essential characteristic of the proposed system: offset
boosting behavior. The chaotic system exhibits two types of offset boosting behaviors.
First, offset boosting occurs due to initial conditions, and second, it generates offset
boosting with change of amplitude of the applied signal.
Another characteristic of the proposed chaotic system is observed as the initial offset-
boosting. This characteristic appears with the evolution of initial conditions. The
proposed system shows the coexistence of multiple flows (tours) in Fig. 9 with identical
states by altering initial conditions with the remaining other parameters as constant.
In system (3), the parameters are selected as δ = 1, ξ = 4.7 × 103 , η = 103 , β =
10 , ρ = 10−5 , α = 1/(22 × 103 ), f = 30, A = 1, and initial conditions are chosen
−6
to be (1,1,1,x 4 (0)). Initially, x 4 (0) is taken as 1, when the value x 4 (0) is changed to
− 1, the phase portraits on x 4 –x 1 plane move parallel to the x 1 (Fig. 9a). Similarly,
when the values of x 4 (0) changes from 1 to − 1, the phase trajectories on x 2 –x 4 plane
Fig. 9 Offset boosting of the system (3) in a x 4 –x 1 plane and b x 2 –x 4 with fixed δ = 1, ξ = 4.7 × 103 , η =
103 , β = 10−6 , α = 1/(22 × 103 ), ρ = 10−5 , f = 30, A = 1 and initial conditions (1,1,1,1) and (1,1,1, −
1), respectively
move parallel to x 4 (Fig. 9b). Figure 9 exhibits not only shifting of the phase-portraits
diagram with varying initial conditions, but also changes its shapes. Therefore, the
proposed system shows an initial offset boosting characteristic with homogeneous
multistability [17].
Fig. 10 a Offset boosting of the system (3) in the x 2 –x 1 plane with fixed δ = 1, ξ = 4.7×103 , η = 103 , β =
10−6 , α = 1/(22×103 ), ρ = 10−5 , f = 30, and values of A are 3, 5, and 8, respectively. b Offset boosting of
the system (3) in the x 2 –x 4 plane with fixed δ = 1, ξ = 4.7 × 103 , η = 103 , β = 10−6 , α = 1/(22 × 103 ),
ρ = 10−5 , f = 30, and values of A are 1 and 3, respectively
Fig. 11 a Lyapunov exponent plot, b bifurcation plot with offset controller A (from 1 to 15), δ = 1, ξ =
4.7 × 103 , η = 103 , β = 10−6 , α = 1/(22 × 103 ), f = 30, ρ = 10−5
following system:
ẋ1 = x2 − x3
1 1
ẋ2 = −6 −x1 + −3 (4.7x43 + 1) sin(2π f t)
10 10
1
ẋ3 = −5 x1
10
1
ẋ4 = sin(2π f t) (4)
22 × 103
Hardware-based execution is more effective and sufficient way to confirm the fea-
sibility of chaos in an actual intent. Hence, an analog chaotic circuit is designed here
(Fig. 12) for the conservative chaotic system (4). An analog multiplier (AD633AN)
is used to execute the nonlinear representations of the proposed model (4). From the
circuit (Fig. 12), the corresponding state equations can be represented as
1 1
ẋ1 = x2 − x3
R1 C 1 R2 C 1
1 1
ẋ2 = (−x1 ) + W (x4 )v
R6 C 2 R9 C 2
1
ẋ3 = x1
R10 C3
1
ẋ4 = v (5)
R7 C 4
where W (x4 ) = x43 R4 + R5 . The entire circuit design (Fig. 12), which is equivalent
to system (5), is developed and represented with four different circuit blocks. In this
circuit, the capacitances of the circuit are C1 = 1 µF, C2 = C3 = 1 nF, C4 = 22 µF,
and the resistances are R1 = R2 = 1 M , R4 = 4.7 K , R5 = R6 = R7 = R9 =
1 K , R10 = 10 K . Here, the applied voltage v = 0.8 V.
In this circuit design, Op-amp (TL082CD) is used and denoted by UXX, where
U2A performs the integration operation and U6A is inverting the output of U2A in
the first block. The Op-amp U7A is used in the second block to implement the inte-
gral operation. In third block, two Op-amps U8A and U9A are placed to perform
an integration and inversion, respectively. In fourth block, Op-amp U1A place a role
of integration, and three AD633AN multipliers (U3, U4, and U5) are used for mul-
tiplication operation. The last block (bounded by green dotted lines) represents the
memristor part proposed in Eq. (2), and the oscilloscope display is shown in Fig. 1c.
The experimental outcome of the breadboard analysis using proposed circuit design
are verified in digital oscilloscope (TBS 1072B-EDU) (Fig. 13). The outcomes of the
Fig. 13 a Breadboard schematic and phase-portrait in x 2 –x 3 which is similar to numerical simulation Fig. 2a.
b phase-portrait in x 3 –x 1 , which is similar to numerical simulation Fig. 2b
oscilloscope (Fig. 13a, b) are matching with numerical simulations (Fig. 2a, b).
It is difficult to precisely assign the initial condition of the memristor in the hardware
circuit, which is crucial to the generation of the initial offset boosting behaviors.
So, introducing different voltage amplitudes (1 V, 3 V), the amplitude-based offset
boosting phenomena are observed through hardware-based experiments in Fig. 14a,
b, respectively. In Fig. 14, the time series analysis for x 2 and x 4 exhibits shifting of
their positions with time.
However, some minor deviations exist in corresponding outcomes, because no ini-
tial condition is specified for the circuit. A hyperchaotic circuit with complex chaotic
dynamics is quite sensitive to outer circumstances which may restrict it to perform cor-
rectly. But considering all such sensitivities, a perfect circuit design is exhibited here,
for proposed memristor-based conservative hyperchaotic system (3). The hardware-
based laboratory experiment represents the feasibility of the proposed system.
Here, a new algorithm for image encryption with the proposed hyperchaotic map is
described as follows:
Step 1: A color image (256 × 256) is the input for the encryption algorithm. Storing
the dimension of the image in variables.
Step 2: Hyperchaotic system (3) is used to generate a list of keys. Initializing blank
index lists to store the index of pixels.
Step 3: Populating x 1 , x 2 and x 3 indices; Rearranging x 1 , x 2 and x 3 keys to increase
randomness.
Step 4: Shuffling input image pixels and storing them in an empty image.
Step 5: Altering the pseudo-random numbers generated into the digits between 0
and 255.
Defining key as
5.1 Decryption
A histogram for an image displays the density of the pixels for every grey level of
that image. Individual image has an exhaustive histogram, which can instantly present
the statistical differences between before and after the encryption procedure. The
encrypted image histogram must be uniform in gray value allocation to prevent from
decoding of the pattern by attackers. In this analysis, the image [Lena (Fig. 15a)] with
sizes of 256 × 256 is utilized to get the encrypted image (Fig. 15b) using the proposed
algorithm.
Figure 16 illustrates the histograms for Fig. 15a (with R, G, and B channels). It is
Fig. 15 Results obtained by simulations using a newly developed encryption algorithm a original input
image. b Encrypted image
noticed that the histogram figures (Fig. 16a–c) are abrupt and fluctuating. Figure 17
illustrates the histograms analysis of the encrypted image. These figures present the
uniform distribution of pixels of encrypted image compared to the same for input
image. This phenomenon confirms that the proposed algorithm can resist any external
statistical attacks.
Generally, in original image, the pixels are located close to each other. In this process a
good encryption algorithm leads to very less correlation coefficients of adjacent pixels
for the encrypted image.
Correlations between two pixels are measured as follows [41]:
cov(δ, σ )
rδσ = √ √
D(δ) D(σ )
where
⎛ ⎞⎛ ⎞
n n n
1 ⎝δi − 1 1
cov(δ, σ ) = δ j ⎠⎝σi − σj⎠
n n n
i=1 j=1 j=1
⎛ ⎞2
n n
1 ⎝δi − 1
D(δ) = δj⎠
n n
i=1 j=1
Figure 18a–c shows the correlations of the adjacent pixels of input image Fig. 15a
in the diagonal, vertical, and horizontal directions, respectively. Figure 19a–c depicts
the correlations of adjacent pixels in encrypted image of Lena in diagonal, vertical,
and horizontal directions, respectively. Here, the correlation coefficients for pair of
adjacent pixels are near to zero.
Table 1 highlights the comparisons of existing works [5, 20, 50] with the proposed
algorithm to demonstrate the accuracy and effectiveness of this new algorithm. Here,
correlation coefficients are listed for different algorithms. Comparatively, the proposed
Bold represent the results received in this paper from our proposed system are comparatively better than
that of other existing works
algorithm produces very less correlation coefficient value (near to zero) for the same
image of Lena. Therefore, the proposed image encryption algorithm is comparatively
more promising.
To check the offset-boosting behaviors on encryption test results, here in Table 1, the
correlation coefficient test values are calculated with different initial values (1,1,1,1)
and (1,1,1, − 1), respectively. It is observed that the offset boosting criteria does not
affect the test results, but the obtained results still present efficiency of the proposed
algorithm compared to [20, 50] and [5].
Bold represent the results received in this paper from our proposed
system are comparatively better than that of other existing works
N
log2
H (w) = p(wi )
p(wi )
i=1
where p(wi ) is the ratio of image grey values, and w denotes the gray-scale of image,
and H(w) is the maximum information entropy. The estimated information entropy
will be slightly less than the outstanding value. Thus, the information entropy of
the encrypted image of a good encryption algorithm should incredibly be near to 8
(for 256 × 256 image). Table 2 shows the comparisons of the information entropy for
encrypted image (Fig. 16b) of Lena using proposed scheme in context of other existing
algorithm references. The empirical data acquired here are closer to the expected value
8 in comparison with [20, 28, 47], which establishes again the efficiency of the image
encryption algorithm, designed in this paper.
A good image encryption algorithm can able to prevent multiple attacks. Therefore, an
assessment on feasibility and safety of the proposed encryption algorithm is necessary
using NPCR and UACI tests. Such analysis is applied to two different encrypted images
with the same input image and encryption algorithm. The mathematical expressions
[27, 31] of NPCR and UACI are
1
NPCR = D(i, j) × 100
M×N
i, j
N M
|c1 (i, j) − c2 (i, j)|
UACI = × 100
M × N × 255
i=1 j=1
R 100 33.6739
G 99.997 33.6742
B 99.9996 33.6765
Bold represent the results received in this paper from our proposed system are comparatively better than
that of other existing works
If the NPCR value is nearer to 100 and the UACI value for encrypted image is near
34, then the encryption algorithm becomes highly secure. Adequate protection toward
encryption demands larger values of NPCR and UACI. Table 3 displays R, G, and B
values NPCR and UACI, which are close to 100 and 34, respectively. Therefore, the
presented algorithm can effectively defend against various differential attacks, and it
is secure enough.
In Table 4, the proposed system is compared with different chaotic systems [20, 47,
50]. This is observed that the non-autonomous chaotic system with offset-boosting,
hyperchaos exhibits better performance in encryption process compared to others.
6 Conclusions
Data availability The datasets analyzed during the current study are available from the corresponding author
on reasonable request.
Declarations
Conflict of interest The authors report that there is no competing interest to declare.
References
1. M.T. Abuelma’atti, Z.J. Khalifa, A new floating memristor emulator and its application in frequency-
to-voltage conversion. Analog Integr. Circuits Signal Process. 86(1), 141–147 (2016)
2. Y. Babacan, F. Kacar, K. Gürkan, A spiking and bursting neuron circuit based on memristor. Neuro-
computing 203, 86–91 (2016)
3. H. Bao, Y. Zhang, W. Liu, B. Bao, Memristor synapse-coupled memristive neuron network: synchro-
nization transition and occurrence of chimera. Nonlinear Dyn. 100(1), 937–950 (2020)
4. U. Cavusoglu, S. Panahi, A. Akgul, S. Jafari, S. Kacar, A new chaotic system with hidden attractor and
its engineering applications: analog circuit realization and image encryption. Analog Integr. Circuits
Signal Process. 98(1), 85–99 (2019)
5. L. Chen, H. Yin, T. Huang, L. Yuan, S. Zheng, L. Yin, Chaos in fractional-order discrete neural networks
with application to image encryption. Neural Netw. 125, 174–184 (2020)
6. M. Chen, C. Wang, H. Wu, Q. Xu, B. Bao, A non-autonomous conservative system and its reconstitution
in integral domain. Nonlinear Dyn. 103(1), 643–655 (2021)
7. L. Chunbiao, J.C. Sprott, Y. Lu, Z. Gu, J. Zhang, Offset boosting for breeding conditional symmetry.
Int. J. Bifurc. Chaos 6, 66 (2018)
8. L. Chunbiao, T. Lei, X. Wang, G. Chen, Dynamics editing based on offset boosting. Chaos 6, 66 (2020)
9. L. Chunbiao, X. Wang, G. Chen, Diagnosing multistability by offset boosting. Nonlinear Dyn. 90,
1335–1341 (2017)
10. Y. Deng, Y. Li, A memristive conservative chaotic circuit consisting of a memristor and a capacitor.
Chaos 30(1), 66 (2020)
11. D. Dharminder, U. Kumar, P. Gupta, A construction of a conformal Chebyshev chaotic map based
authentication protocol for healthcare telemedicine services. Complex Intell. Syst. 7(5), 2531–2542
(2021)
12. E. Dong, M. Yuan, S. Du, Z. Chen, A new class of Hamiltonian conservative chaotic systems with
multistability and design of pseudo-random number generator. Appl. Math. Model. 73, 40–71 (2019)
13. M. Feki, An adaptive chaos synchronization scheme applied to secure communication. Chaos Solitons
Fract. 18(1), 141–148 (2003)
14. A. Gokyildirim, Y. Uyaroglu, I. Pehlivan, A weak signal detection application based on hyperchaotic
Lorenz system. Tehnicki Vjesnik. 25(3), 701–708 (2018)
15. S. Gu, S. He, H. Wang, B. Du, Analysis of three types of initial offset-boosting behavior for a new
fractional-order dynamical system. Chaos Solitons Fract. 143, 110613 (2021)
16. M.L. Heltberg, S. Krishna, M.H. Jensen, On chaotic dynamics in transcription factors and the associated
effects in differential gene regulation. Nat. Commun. 10(1), 1–10 (2019)
17. L. Huang, W. Yao, J. Xiang, Z. Zhang, Heterogeneous and homogenous multistabilities in a novel 4D
memristor-based chaotic system with discrete bifurcation diagrams. Complexity 6, 66 (2020)
18. S. Jafari, J.C. Sprott, S. Dehghan, Categories of conservative flows. Int. J. Bifurc.Chaos 29(2), 1–16
(2019)
19. Y. Jiang, F. Yuan, Y. Li, A dual memristive Wien-bridge chaotic system with variable amplitude and
frequency. Chaos 30, 66 (2020)
20. A. Kadir, A. Hamdulla, W.Q. Guo, Color image encryption using skew tent map and hyperchaotic
system of 6th-order CNN. Optik 125(5), 1671–1675 (2014)
21. İ Koyuncu, M. Tuna, İ Pehlivan, C.B. Fidan, M. Alçın, Design, FPGA implementation and statistical
analysis of chaos-ring based dual entropy core true random number generator. Analog Integr. Circuits
Signal Process. 102(2), 445–456 (2020)
22. X. Li, C. Jiang, R. Xu, W. Yang, H.H. Wang, Y. Zou, Combining forecast of landslide displacement
based on chaos theory. Arab. J. Geosci. 14(3), 1–10 (2021)
23. C. Li, J.C. Sprott, Variable-boostable chaotic flows. Optik 127, 10389–10398 (2016)
24. Y. Liao, A. Vikram, V. Galitski, Many-body level statistics of single-particle quantum chaos. Phys.
Rev. Lett. 125(25), 250601 (2020)
25. J.R. Mboupda Pone, S. Çiçek, S. TakougangKingni, A. Tiedeu, M. Kom, Passive–active integrators
chaotic oscillator with anti-parallel diodes: analysis and its chaos-based encryption application to
protect electrocardiogram signals. Analog Integr. Circuits Signal Process. 103(1), 1–15 (2020)
26. B. Muthuswamy, L.O. Chua, Simplest chaotic circuit. Int. J. Bifurc. Chaos 20(5), 1567–1580 (2010)
27. C. Nirmal, B.S. Tej, N. Arjun, Secure image encryption using chaotic, hybrid chaotic and block cipher
approach. J. Imaging 8(6), 167 (2022)
28. B. Norouzi, S. Mirzakuchaki, An image encryption algorithm based on DNA sequence operations and
cellular neural network. Multimedia Tools Appl. 76(11), 13681–13701 (2017)
29. G. Qi, Modelings and mechanism analysis underlying both the 4D Euler equations and Hamiltonian
conservative chaotic systems. Nonlinear Dyn. 95(3), 2063–2077 (2019)
30. K. Rajagopal, A. Bayani, A.J.M. Khalaf, H. Namazi, S. Jafari, V.T. Pham, A no-equilibrium memristive
system with four-wing hyperchaotic attractor. AEU Int. J. Electron. Commun. 95, 207–215 (2018)
31. C. Ran, S. Zhang, X. Gao, A novel 3D image encryption based on the chaotic system and RNA
crossover and mutation. Front. Phys. 6, 66 (2022)
32. R.K. Ranjan, N. Rani, R. Pal, S.K. Paul, G. Kanyal, Single CCTA based high frequency floating and
grounded type of incremental/decremental memristor emulator and its application. Microelectron. J.
60, 119–128 (2017)
33. M.E. Sahin, A.S. Demirkol, H. Guler, S.E. Hamamci, Design of a hyperchaotic memristive circuit
based on wien bridge oscillator. Comput. Electr. Eng. 88, 106826 (2020)
34. C. Sanchez-Lopez, J. Mendoza-Lopez, M.A. Carrasco-Aguilar, C. Muniz-Montero, A floating analog
memristor emulator circuit. IEEE Trans. Circuits Syst. II Express Briefs 61(5), 309–313 (2014)
35. J.P. Singh, B.K. Roy, Five new 4-D autonomous conservative chaotic systems with various type of
non-hyperbolic and lines of equilibria. Chaos Solitons Fract. 114, 81–91 (2018)
36. J.C. Sprott, Some simple chaotic flows. Phys. Rev. E 50(2), 66 (1994)
37. S. Vaidyanathan, C. Volos, A conservative hyperchaotic hyperjerk system based on memristive device.
Adv. Memr. Memr. Dev. Syst. 66, 393–423 (2017)
38. Z. Wang, G. Qi, Modeling and analysis of a three-terminal-memristor-based conservative chaotic
system. Entropy 23(1), 1–17 (2021)
39. N. Wang, G. Zhang, H. Bao, Infinitely many coexisting conservative flows in a 4D conservative system
inspired by LC circuit. Nonlinear Dyn. 99(4), 3197–3216 (2020)
40. L. Wang, S. Jiang, M.-F. Ge, C. Hu, J. Hu, Finite-/fixed-time synchronization of memristor chaotic
systems and image encryption application. IEEE Trans. Circuit Syst. I Regul. Pap. 66, 1–13 (2021)
41. X. Wang, X. Qin, C. Liu, Color image encryption algorithm based on customized globally coupled
map lattices. Multimedia Tools Appl. 78(5), 6191–6209 (2019)
42. M.H. Weik, Relaxation oscillator. Comput. Sci. Commun. Dictionary 61(10), 1461–1461 (2000)
43. A. Wolf, J.B. Swift, H.L. Swinney, J.A. Vastano, Determining Lyapunov exponents from a time series.
Phys. D 16(3), 285–317 (1985)
44. A. Wu, S. Cang, R. Zhang, Z. Wang, Z. Chen, Hyperchaos in a conservative system with nonhyperbolic
fixed points. Complexity 6, 66 (2018)
45. Q. Wu, Q. Hong, X. Liu, X. Wang, Z. Zeng, Constructing multi-butterfly attractors based on Sprott C
system via non-autonomous approaches. Chaos 29(4), 66 (2019)
46. H.G. Wu, Y. Ye, B.C. Bao, M. Chen, Q. Xu, Memristor initial boosting behaviors in a two-memristor-
based hyperchaotic system. Chaos Solitons Fract. 121, 178–185 (2019)
47. G. Ye, X. Huang, An efficient symmetric image encryption algorithm based on an intertwining logistic
map. Neurocomputing 251, 45–53 (2017)
48. A. Yesil, Y. Babacan, F. Kacar, Design and experimental evolution of memristor with only one VDTA
and one capacitor. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(6), 1123–1132 (2019)
49. A. Yesil, Y. Babacan, F. Kacar, A new DDCC based memristor emulator circuit and its applications.
Microelectron. J. 45(3), 282–287 (2014)
50. Y. Zhang, Y. Tang, A plaintext-related image encryption algorithm based on chaos. Multimedia Tools
Appl. 77(6), 6647–6669 (2018)
Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps
and institutional affiliations.
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under
a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted
manuscript version of this article is solely governed by the terms of such publishing agreement and applicable
law.
1. use such content for the purpose of providing other users with access on a regular or large scale
basis or as a means to circumvent access control;
2. use such content where to do so would be considered a criminal or statutory offence in any
jurisdiction, or gives rise to civil liability, or is otherwise unlawful;
3. falsely or misleadingly imply or suggest endorsement, approval , sponsorship, or association
unless explicitly agreed to by Springer Nature in writing;
4. use bots or other automated methods to access the content or redirect messages
5. override any security feature or exclusionary protocol; or
6. share the content in order to create substitute for Springer Nature products or services or a
systematic database of Springer Nature journal content.
In line with the restriction against commercial use, Springer Nature does not permit the creation of a
product or service that creates revenue, royalties, rent or income from our content or its inclusion as
part of a paid for service or for other commercial gain. Springer Nature journal content cannot be
used for inter-library loans and librarians may not upload Springer Nature journal content on a large
scale into their, or any other, institutional repository.
These terms of use are reviewed regularly and may be amended at any time. Springer Nature is not
obligated to publish any information or content on this website and may remove it or features or
functionality at our sole discretion, at any time with or without notice. Springer Nature may revoke
this licence to you at any time and remove access to any copies of the Springer Nature journal content
which have been saved.
To the fullest extent permitted by law, Springer Nature makes no warranties, representations or
guarantees to Users, either express or implied with respect to the Springer nature journal content and
all parties disclaim and waive any implied warranties or warranties imposed by law, including
merchantability or fitness for any particular purpose.
Please note that these rights do not automatically extend to content, data or other material published
by Springer Nature that may be licensed from third parties.
If you would like to use or distribute our Springer Nature journal content to a wider audience or on a
regular basis or in any other manner not expressly permitted by these Terms, please contact Springer
Nature at