Generation Multi-Scroll Chaotic Attractors Using C
Generation Multi-Scroll Chaotic Attractors Using C
Generation Multi-Scroll Chaotic Attractors Using C
1088/1402-4896/ad2b3f
PAPER
Keywords: composite sine function, multi-scroll chaotic attractors, complexity analysis, image encryption, circuit simulation, DNA coding
Abstract
In this paper, a composite sine function is proposed and applied in a chaotic system, which is capable
of generating definite number of chaotic attractors. The proposed composite sine function possesses
infinite breakpoints, but it can produce a fixed number of scrolls by adjusting its parameters.
Compared to other chaotic systems with multiple scrolls chaotic attractors, the realization circuit of
the chaotic system with compound sine function allows obtaining different numbers of scrolls by
adjusting only one resistance value. As a result, the circuit structure remains unchanged despite
variations in the number of scrolls. Various analytical methods are applied to study the dynamical
behaviors of the proposed chaotic system, including Lyapunov exponent, equilibrium point,
bifurcation diagram, phase diagram, spectral entropy and C0-algorithm. Furthermore, based on the
analysis of dynamical characteristics, the electronic circuits of the proposed system are given on
Multisim circuit simulation software, and the multi-scroll chaotic attractors exhibit consistency with
the numerical simulation results. Finally, we incorporated the proposed chaotic system into a
Deoxyribonucleic acid coding algorithm for image encryption, and this method exhibits excellent
encryption efficiency and high level of security.
1. Introduction
The motion trajectory of state variables of a chaotic system is similar to that of a random signal, where slight
changes of initial values lead to different trajectories. However, in contrast to random motion, chaotic motion is
inherently deterministic in a dynamic way, its unpredictability due to the extreme instability of the system’s
internal dynamics. Essentially, chaotic systems present a high sensitivity to a minute variations of their initial
conditions or a tiny perturbations, such that even a very slight disturbance can lead to that the motion track
deviates completely from the system’s original trajectory after a certain period of evolution. so chaotic system is
widely employed in digital watermarking [1–3], pseudo noise code generation [4–6], image encryption [7–9],
weak signal detection [10–12] and so on.
The quantity of scrolls generated by chaotic systems is an indication of their complexity to some extent.
Hence, multi-scroll chaotic system became a widely research topic. Wang et al [13] suggested a chaotic system
with different number of scrolls by changing its system parameter. Zhang et al [14] used triangular waves, saw-
tooth waves and hysteresis sequences as nonlinear functions for generating chaotic attractors with varying
amounts of scrolls. Daras et al [15], recommended a four-dimensional autonomous chaotic system, which can
generate chaotic attractors with either a single scroll, two scrolls, or four scrolls, depending on its system’s
parameters, and it can be utilized for various applications in chaos-based cryptography and secure
communications. Luo et al [16] employed sign function and triangular waves for generating two-scroll grid
multi-scroll attractor. Echenausía-Monroy et al [17] devised a fractional-order chaotic system characterized by a
multi-scroll chaotic attractor. Zhang et al [18] recommended a novel chaotic system incorporating with a
nonlinear functions of sign function and saturated function series. Hu et al [19] introduced multi-wing and
multi-scroll hidden attractors through a 5-dimensional memristive system, which scroll quantity is not related
to the system equilibrium points. Dong et al [20] proposed a method to generate multiple scrolls by utilizing a
sine function. M Yalcin et al [21] suggested a technique to produce chaotic attractors with numerous scrolls by
leveraging a sine function.
The dynamical state and the quantity of scrolls of a dynamical system is directly influenced by its nonlinear
term. For producing more scrolls, the nonlinear function used for chaotic system with more breakpoints is the
key element. One of the widely studied functions is sine function, which has infinite breakpoints, for this reason,
various sine functions are used to generate multiple scroll attractor. However, if the non-modified sine function
is directly employed in a chaotic system, the longer the simulation time, the greater number of scrolls there are.
The amounts of scrolls can be locked at a constant value by reshaping the sine function’s expression. Lü et al [22]
modulated a sine function to produce chaotic attractors with constant amounts of scrolls. Luo [23] proposed a
novel approach to generate various types of chaotic attractors by manipulating the angular frequency of the
utilized sine function. The quantity of scrolls is not varied by using normal sine function and negative feedback
[24]. Ding et al [25] multiplied a sine function by a gate function to produce stable number of scrolls. Motivated
by the above mentioned works, we designed a innovational composite sine function and seamlessly integrated it
into a Jerk system, giving birth to a fresh chaotic system. What sets this system apart is its steadfast characteristic:
its number of scrolls remains unwavering, and unaffected by the passage of simulation time.
The advancement of information technology has underscored the significance of data transmission and
storage, particularly with regard to images. As a result, a series of encryption algorithms have been put forth for
digital images [26]. To enhance encryption efficiency and security, numerous scholars have incorporated chaotic
systems into image encryption techniques. Hagras et al [27] pioneered an encryption scheme rooted in
Deoxyribonucleic acid (DNA) computing, whereas Zhang et al [28] proposed an image encryption algorithm
leveraging a 6D hyperchaotic system and DNA coding. Nevertheless, encryption methods relying on low-
dimensional chaotic systems frequently lack well-defined chaotic characteristics and are constrained by limited
key space. Despite the abundance of encryption algorithms founded on high-dimensional chaotic systems, a
notable concern arises from certain approaches, which exhibit excessively high dimensions. This phenomenon
tends to result in a reduction in encryption efficiency. We enhance the existing DNA coding encryption method
by incorporating multiple chaotic systems, which combines the proposed chaotic system and Chen
hyperchaotic system with DNA coding. The one of three state variable sequences generated by the proposed
chaotic system is utilized in DNA computation while the others to generate the scrambling matrix. Additionally,
Chen hyperchaotic system controls the operation rules of encoding, calculation and decoding of DNA. The
encryption scheme combining the proposed chaotic system and DNA coding offers the benefits of resistance to
statistical attacks, high efficiency of encryption, and a large key space.
The structure of the remaining part is outlined as follows: section 2 presents the construction of a chaotic
system mathematical model based on a composite sine function, along with a comparison of various types of
sine functions for multi-scroll chaotic systems. In section 3, the dynamical properties including phase portraits,
Lyapunov exponents, bifurcation diagrams and equilibrium points are researched. Moreover, to confirm the
chaotic attributes of the proposed system, we apply complexity algorithms, including Spectral Entropy (SE) and
the C0-algorithm for system feature analysis. In section 4, the electronic circuits are carried out on Multisim 10,
and the validity of the novel chaotic system model is demonstrated by the circuit simulation results. In section 5,
based on the multi-scroll chaotic attractors by using composite sine function, an encryption scheme combining
Chen hyperchaotic system and DNA coding is given. In section 6, we provide an analysis of the performance of
the proposed encryption algorithm, while section 7 encapsulates the key conclusions of our study.
The nonlinear term of the mathematical model of the novel chaotic system is a composite sine function, which is
described by differential equations as follows:
⎧ x1 = x2
x2 = x3 (1)
⎨
⎩ x3 = - mg (x1) - nx2 - cx3
where
g (x1) = - sin [2pp (x1 - x13/ d 2)] (2)
From the mathematical expression of g (x1), it can be seen that g (x1) is a composite sine function about state
variable x1. In equation (1), m, n and c are positive real number, while x1, x2 and x3 are state variables of system
(1). p, d are real constants of equation (2), and the quantity of scrolls generated by system (1) is related to d, which
2
Phys. Scr. 99 (2024) 045221 P Ding et al
is the parameter of sine function of g (x1). For generating multiple scrolls in chaotic system, many different types
of sine functions are proposed, such as normal sine function h (x ) [21, 24, 29], modulated sine function j (x )
[22], mathematical expression changed sine function k (x ) [19], s (x ) [30] and t (x ) [31, 32]. These sine functions
are represented as follows.
h (x ) = sin (2ppx ) (3)
j (x ) = - (x - ∣A sin ( px )∣sgn (x )) (4)
1
k (x ) = sin (2ppx )[sgn (x - a) - sgn (x - b)] + x [2 - sgn (x - a) + sgn (x - b)] (5)
2
⎧ b 2 p (x - 2b1 b3) , x 2b1 b3
⎪ 2b1
⎪
⎪ px
s (x ) = - b 2 sin ⎛
⎜ + b4⎞ , - 2b1 b3 < x < 2b1 b3
⎟ (6)
⎨ ⎝ 2b1 ⎠
⎪
b p
⎪ 2 (x + 2b1 b3) , x - 2b1 b3
⎪ 2b1
⎩
⎧- sin (2ppx ) , - m1/ p < x < m2/ p
t (x ) = + sin (2ppx ) , x - m1/ p (7)
⎨
⎩+ sin (2ppx ) , x m2/ p
The oscillograms of sine function of g (x ), h (x ), j (x ), k (x ), s (x ) and t (x ) are displayed in figure 1.
When system (1) under chaotic state, keep m, n, c and d unchanged, the quantity of scrolls of the generated
chaotic attractor by system (1) varies with the parameters of p and d. For instance, let m = n = c = 0.3 and d = 10,
system (1) with p = 0.5 and p = 1 respectively, the corresponding 4-scroll and 8-scroll chaotic attractors can be
obtained, which are depicted in figures 2(a) and (b).
In figures 2(c) and (d), let m = n = c = 0.3 and d = 20, system (1) with p = 0.5 and p = 1 respectively, the
6-scroll and 12-scroll chaotic attractors can be obtained. However, comparing the chaotic attractors in figure 2,
it can be seen that the parameter of d can be employed to fine-tune the quantity of the scrolls generated by System
(1), while keeping all other parameters unchanged.
This section explores the dynamical characteristics of Chaotic System (1), covering an analysis of steady states
and equilibrium points, in addition to an examination of Lyapunov exponents and bifurcation diagrams. For
better understanding of the behavior of system (1), we utilized SE algorithm and C0-algorithm to analyze its
complexity.
⎧ x2 = 0
x3 = 0 (8)
⎨
⎩mg (x1) + nx2 + cx3 = 0
In equation (8), it can be seen that the distribution of equilibrium points is related to the nonlinear function
of g (x1), and the equilibrium points can be written as Ep (x1, 0, 0), where x1 satisfies the following equation ,in
which k is an integer.
2pp (x1 - x13/ d 2) = kp (9)
For simplify the analysis, the parameters of p and d in equation (9) are set as p = 0.5 and d = 10, then
In equation (10), k is integer, which is related to the position of the equilibrium point, and the solutions of
equation (10) are displayed in figure 3. Let k = 1, then x11 = 1.010, x12 = 9.456 and x13 = −10.467. It can be seen
that the point (x11,0,0) is one of the equilibrium points ‘o’, and the equation expression for solving the
equilibrium point at Ep (x11, 0, 0) is:
3
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 1. The oscillograms of the different sine functions: (a) g(x) with p = 0.5 and d = 10; (b) h(x) with p = 0.5; (c) j(x) with A = 6 and
p = 0.5; (d) k(x) with p = 0.5, a = −4 and b = 4; (e) s(x) with b1 = 1, b 2 = 0.1, b 3 = 3 and b 4 = 0; (f) t(x) with p = 0.5 and
m1 = m2 = 3.
⎡ 0 1 0⎤
Jac = ⎢ 0 0 1⎥ (11)
⎢
⎣ 0.3g ¢ ( x11) 0.3 0.3⎥
⎦
According to equation (11), the characteristic equation is given:
l3 - 0.3l2 - 0.3l - 0.3g ¢ (x11) = 0 (12)
its eigenvalues are l1 = -1.192, l2 = 0.446 + 0.751i and l3 = 0.446-0.751i, so the equilibrium point
Ep (x11, 0, 0) is saddle points of index 2. Let k = 0, then x′11 = 0, x′12 = 10 and x′13 = −10, and the the point
(x′11,0,0) is one of the equilibrium points ‘x’. Similarly, its eigenvalues are l¢1 = 0.9823,
l¢2 = -0.6411 + 0.7406i and l¢3 = -0.6411-0.7406i, so the equilibrium point of Ep (x ¢11, 0, 0) is saddle
points of index 1.
In figure 3, Ep1 and Ep2 are two unique equilibrium points, the distance of Ep1 to its left adjacent equilibrium
point is L1, while the distance of Ep1 to its right adjacent equilibrium point is L2. The distance of Ep2 to its left
4
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 2. The chaotic attractors generated by system (1) with (x1(0),x2(0),x3(0)) = (0.1,0,0). (a) 4-scroll chaotic attractor with p = 0.5,
m = n = c = 0.3 and d = 10. (b) 8-scroll chaotic attra-ctor with p = 1, m = n = c = 0.3 and d = 10. (c) 6-scroll chaotic attractor with
p = 0.5, m = n = c = 0.3 and d = 20. (d) 12-scroll chaotic attractor with p = 1, m = n = c = 0.3 and d = 20.
Figure 3. The distribution of equilibrium points of system (1) with p = 0.5 and d = 10.
adjacent equilibrium point is L3, while the distance of Ep2 to its right adjacent equilibrium point is L4. It can be
seen that L1>L2, L4>L3 and upon comparison of figures 2 and 3, it is evident that the scrolls generated by
system (1) are closely related to the equilibrium points ‘o’. In fact, the equilibrium points ‘o’ are saddle point of
index 2, and the equilibrium points ‘x’ are saddle point of index 1.
5
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 4. The Lyapunov exponents and bifurcation diagram of system (1) with d = 10, p = 0.5 , n = c = 0.3 and (x1(0),x2(0),
x3(0)) = (0.1,0.1,0.1). (a) Lyapunov exponents with m Î (0, 1) (b) bifurcation diagram with m Î (0, 1).
1. when m Î (0, 0.08], LE1 < 0, LE 2 < 0, LE3 < 0, the system (1) is in stable state.
2. when m Î (0.08, 0.12] È [0.13, 0.76] È [0.96, 1), LE1 > 0, LE 2 = 0, LE3 < 0, system (1) at chaotic state.
3. when m Î (0.12, 0.13) È (0.76, 0.96), LE1 = 0, LE 2 < 0, LE3 < 0, system (1) at periodic state.
The bifurcation diagram depicted in figure 4(b) for System (1) has a robust correlation with the Lyapunov
exponents, that offering valuable insights into the system’s states.
6
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 5. The phase portraits of system (1) with d = 10, p = 0.5, m = 0.02, n = c = 0.3 and (x1(0),x2(0),x3(0)) = (0.1,0,0). (a) x1-x2-x3
space. (b) x1-x2 plane.
Figure 6. The phase portraits of system (1) with d = 10, p = 0.5, m = 0.13, n = c = 0.3 and (x1(0),x2(0),x3(0)) = (0.1,0,0). (a) x1-x2-x3
space. (b) x1-x2 plane.
With the parameter of m set as 0.13, the phase portraits of System (1) with equation (2) can be generated and
are illustrated in figure 6.
In figure 6, the motion trajectory of system (1) is a closed curve, which denotes that system (1) is in periodic
state.
Keep the parameter of m as 0.3, the phase portraits of System (1) with equation (2) in x1-x2-x3 space and the
x1-x2 plane can be generated and showed in figure 7.
In figure 7, the motion trajectory of system (1) indicates that System (1) is in chaotic state, and a 4-scroll
chaotic attractor is generated.
Take the parameter of m as 0.5, the phase portraits of System (1) with equation (2) can be obtained and
presented in figure 8.
From figures 7 and 8, it becomes evident that the chaotic system yields a 4-scroll chaotic attractor while
m = 0.3 or m = 0.5, the results highly match the bifurcation diagram presented in figure 4(b).
According to the mathematical expression of nonlinear function g(x) and its waveform in figure 1(a), the
number of cycles in the middle part of the composite function will vary with the parameter d. Let
m = n = c = 0.3, p = 0.5 and d = 20, the generated 6-scroll chaotic attractors in x1-x2-x3 space and x1-x2 plane are
displayed in figure 9.
From figures 5–8, it is apparent that the phase portraits of system (1) effectively represent its state. A
comparison between figures 7 and 9 leads to the conclusion that the quantity of scrolls can be adjusted through
changing the parameter d of the composite sine function g(x1).
7
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 7. The phase portraits of system (1) with d = 10, p = 0.5, m = 0.3, n = c = 0.3 and (x1(0),x2(0),x3(0)) = (0.1,0,0). (a) x1-x2-x3
space. (b) x1-x2 plane.
Figure 8. The phase diagrams of system (1) with d = 10, p = 0.5, m = 0.5, n = c = 0.3 and (x1(0),x2(0),x3(0)) = (0.1,0,0). (a) x1-x2-x3
space. (b) x1-x2 plane.
Figure 9. The phase portraits of system (1) with m = n = c = 0.3, p = 0.5, d = 20 and (x1(0),x2(0),x3(0)) = (0.1,0,0). (a) x1-x2-x3 space.
(b) x1-x2 plane.
8
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 10. The SE and C0-complexity of the state variable of system (1) with n = c = 0.3, p = 0.5, d = 10 and (x1(0),x2(0),
x3(0)) = (0.1,0,0). (a) The SE with respect m Î (0, 1). (b) The C0-complexity with respect m Î (0, 1).
length of S, the values of SE and C0 can be defined by equations (13) and (14) respectively.
S/2-1
⎧ SE = - å k = 0 P k ln P k
⎪
⎪P = ∣X (k)∣2
k S/2-1 (13)
⎨ å k = 0 ∣X (k)∣2
⎪ 2p
⎪ X (k) = å S x (s ) e -j S sk
⎩ s=0
S-1
⎧
C0 =
å s = 0 ∣x (s) - x˜(s)∣2
⎪ S-1
⎪ å s = 0 ∣x (s)∣2
⎪ 1 S-1 ˜ 2p
⎪ x˜(s ) =
S
å k=0
X (k) e j S sk
(14)
⎨
⎪ ⎧ X (k), ∣X (k)∣2 > 1 å S - 1∣X (k)∣2
⎪˜ ⎪ S s=0
⎪ X (k ) = ⎨ 1 S-1
⎪ 0 , ∣X (k)∣ S å s = 0 ∣X (k)∣
2 2
⎪
⎩ ⎩
where Pk is the power spectrum denstiy probability of sequence x(s), and X(k) is the sequence of x(s) after a
Fourier transform in equation (13). In equation (14), X˜ (k ) is the sequence of X(k) with the irregular parts
removed, and x˜(s ) is the sequence of X˜ (k ) after an inverse Fourier transform.
To maintain consistency with Lyapunov exponents, we set the system parameters as same as it defined in the
analyses of Lyapunov exponents, where the initial values equal to (0.1, 0, 0), and the parameters of system (1)
with equation (2) are fixed as n = c = 0.3, p = 0.5 and d = 10, and the range of parameter m chosen as m Î (0, 1),
then the curve of SE and C0-complexity of state variable of x3 sequence with parameter m is shown in figure 10.
According to figures 4 and 10, when the maximum Lyapunov exponents LE1 0, the values of SE and
C0-complexity are zero or close to zero, which means the system is stable or in periodic state. When
m Î (0, 0.08) È (0.76, 0.96), the value of C0 is less than 0.01. When m Î (0.08, 0.76), the values of SE and C0
are greater than zero, which are positively correlated with Lyapunov exponents value.
The circuit realization is an effective means to verify the availability of a chaotic system, as a consequence, we designed
the electronic circuit diagram about system (1) on Multisim10. At first, the electronic circuits of the proposed
composite sine function are designed, then the electronic circuits for the new chaotic system are carried out.
9
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 11. The electronic circuits and waveform of composite sine function g(x) with d = 10 and p = 0.5. (a) Electronic circuit
diagram. (b) Simulation result.
horizontal ordinate unit of 2 seconds per division (2s/div) and a vertical ordinate unit of 1 volt per division
(1V/div).
Replace the resistor of R1 with 200 k W and keep the other parameters unchanged, the waveform of
composite sine function g (x ) with p = 0.5, d = 20 can be obtained and shown in figure 12. In figure 12(b), the
units of the horizontal and vertical ordinates are 2s/div and 1v/div, respectively.
Compare figure 11 with figure 12, it can be found that the simulation results of nonlinear function g (x ) with
different value of parameter of d are similar to each other. The parameter of d can be adjusted by replacing the
resistor of R1. For example, when R1 = 100k W and R2 = 10k W, then d = R1/R2 = 10, and if R1 = 200k W,
then d = R1/R2 = 20.
4.2. Circuit design of the proposed chaotic system with composite sine function
Based on the composite sine function circuits, the complete circuits of the new proposed chaotic system are
designed according to the equations (1) and (2), which is given in figure 13. The whole circuits consist of
resistors, capacitors, analog multipliers of ad633 and operational amplifiers uA741, which are used for operation
of addition and amplification. By connecting the signal g (x ) shown in figure 11(a) to the input port g (x )
depicted in figure 13, and the circuits illustrated in figure 13 can exhibit a 4-scroll chaotic attractor. Furthermore,
by connecting the signal g (x ) from figure 12(a) to the input port g (x ) in figure 13, a 6-scroll chaotic attractor can
be generated. The chaotic attractors generated by the circuits shown in figure 13 are presented in figure 14.
The circuit equations of circuits of figure 13 can be obtained according to circuit theory, and the equations
are described as follows:
⎧ R 4 C1 dX = R3 Y
⎪ dt R1
⎪
⎪ dY R
R10 C 2 = 9Z (15)
⎨ dt R8
⎪ dZ R13 R7 R R R R
⎪ R14 C3 = ( - g (X )) + 13 2 ( - Y ) + 13 ⎛- 16 Z ⎞ ⎜ ⎟
⎪ dt R6 R21 R12 R5 R11 ⎝ R15 ⎠
⎩
10
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 12. The electronic circuits and waveform of composite sine function g(x) with d = 20 and p = 0.5. (a) Electronic circuit
diagram. (b) Simulation result.
To ensure that both the circuit equation (15) and the chaotic system (1) have identical parameters, the values
of resistors and capacitor should be selected appropriately. For example, the resistance and capacitance are
chosen as those indicated in figure 13 of equation (1) with the parameter of m = n = c = 0.3 and equation (2)
with d = 10. Figure 14(a) displays the circuit simulation outcomes for the four-scroll chaotic attractor. Keeping
11
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 14. Electronic circuit simulation results with parameter m = n = c = 0.3, p = 0.5 and (x1(0),x2(0),x3(0)) = (0.1,0,0). (a) 4-scroll
chaotic attractor with d = 10. (b) 6-scroll chaotic attractor with d = 20.
m = n = c = 0.3 and parameter d selected as 20, the 6-scroll chaotic attractor generated by the circuits of figure 13
can be obtained and revealed in figure 14(b).
Compare figure 7(b) with 14(a) and figure 9(b) with figure 14(b), respectively, it can be found that the
simulation results of the circuits have an almost identical motion trajectory to the numerical simulation results.
Additionally, the quantity of scrolls produced by system (1) can be regulated by modifying the system parameter
of d, which corresponds to the resistor R1 in circuits of the composite sine function g (x ).
In this section, we propose an encryption scheme based on the proposed novel system combined with DNA
coding, and it is given in figure 15. In addition, the flow chart of the decryption process is given in figure 16.
12
Phys. Scr. 99 (2024) 045221 P Ding et al
1 2 3 4 5 6 7 8
A 11 11 10 10 01 01 00 00
T 00 00 01 01 10 10 11 11
C 10 01 11 00 11 00 01 10
G 01 10 00 11 00 11 10 01
the image E ¢ (i , j ) is divided into three channels R, G and B, which are represented by two-dimensional matrix
E1, E 2 and E3 with size M ¢ ´ N ¢ respectively. Then divide the three matrices into K blocks according to
equation (17).
M¢ ´ N¢
K=
b´b
E1 (1: K ) = fdivide (E1, K , b)
E2 (1: K ) = fdivide (E2, K , b)
E3 (1: K ) = fdivide (E3, K , b) (17)
where K is the number of blocks, the size of each block is b ´ b, the fdivide represent segmentation of the image
matrix, and E1 (1: K ), E 2 (1: K ) and E3 (1: K ) represent the all blocks of image matrix after segmentation,
respectively.
Step2. The generation of chaotic sequences: Set the initial values of the newly proposed chaotic system as
x1 (0), x2 (0) and x3 (0), which are calculated from equation (18).
13
Phys. Scr. 99 (2024) 045221 P Ding et al
¢ ¢ ¢ ¢
å i = 1å j = 1 ´ E1 (i , j ) + å i = 1å j = 1 ´ E2 (i , j )
M N M N
⎧
⎪ x1 (0) =
⎪ 2 ´ 255 ´ M ¢ ´ N ¢
¢ ¢
⎪ M¢ N¢
å i = 1å j = 1 ´ E1 (i , j ) + å i = 1å j = 1 ´ E3 (i , j )
M N
(18)
⎨ x2 (0) = 2 ´ 255 ´ M ¢ ´ N ¢
⎪ ¢ ¢
M¢ N¢
å i = 1å j = 1 ´ E2 (i , j ) + å i = 1å j = 1 ´ E3 (i , j )
⎪ M N
⎪ x3 (0) =
⎩ 2 ´ 255 ´ M ¢ ´ N ¢
where E1 (i , j ), E 2 (i , j ) and E3 (i , j ) are pixel values that the plaintext image at the positiion of (i,j) respectively,
and the obtained initial values are brought into the system (1) to generate three chaotic sequences of x1, x2
and x3.
To avoid the transient characteristics of chaotic sequences, the first 10 000 data points of the chaotic
sequence are discarded. Subsequently, replace the original data with the decimal part from the 10th to 14th of
each data in the chaotic sequence, which are shown in equation (19), and fround and f round ¢ represent the values in
the chaotic sequence are kept to 14 and 10 decimal places, respectively.
¢ (x3 (10001: length (x3)) , 10)
x3 = fround (x3 (10001: length (x3)) , 14) - f round (19)
The values of this new sequence are then constrained to the range of 0 to 255, then the sequence p is obtained
as equation (20).
p = mod (x3 ´ 1014 , 256) (20)
Finally, the sequence p is transformed into a matrix R with size of M ¢ ´ N ¢ expressed as equation (21).
R = freshape ( p , N ¢, M ¢) ¢ (21)
where freshape represent the operation that converts a sequence to a matrix. Then divide the matrix R into K
blocks, which is employed for DNA computations with plaintext images.
R (1: K ) = fdivide (R , K , s ) (22)
A combination of SHA-512 and pixel values of images is used to generate a hash value S with 512-bit, then it
is divided into 64 decimal numbers, each represented by 8 bits. The calculation process is illustrated as shown in
equation (23), in which fSHA512 represent Secure Hash Algorithm.
¢ ¢ ¢ ¢ ¢ ¢
{
S = fSHA512 å iM= 1å Nj = 1 ´ E1 (i , j ) + å iM= 1å Nj = 1 ´ E2 (i , j ) + å iM= 1å Nj = 1 ´ E3 (i , j ) }
S = {s1, s2,,s64} (23)
The initial values for the Chen hyperchaotic system are determined by using the following equations:
where the symbol Å is the Exclusive-or operation and following this, these initial values are incorporated into
the Chen hyperchaotic system in the manner described below:
⎧ X = 35(Y - X ) + X
⎪Y = 7X - XZ + 12Y
(25)
⎨ Z = XY - 3Z
⎪
⎩ H = YZ + 0.2H
where X , Y , Z and H are state variables, then four chaotic sequences: X, Y, Z, and H can be obtained.
Step3. DNA operation: The four chaotic sequences are processed according to equation (26), and the DNA
encoding/decoding and DNA calculation are set according to the values of the chaotic sequence.
X ¢ = fmod ( floor (X ´ 104) , 8) + 1
Y ¢ = fmod ( floor (Y ´ 104) , 8) + 1
Z ¢ = fmod ( floor (Z ´ 104) , 4) + 1
H ¢ = fmod ( floor (H ´ 104) , 8) + 1 (26)
where fmod represent modulo operation, X ¢ , Y ¢ , Z ¢ and H ¢ represent the integer obtained after the modulo
operation, respectively. The encoding of sub-blocks at the same position of E1, E 2 and E3 are determined by the
operation associated with the value of X ¢. Matrix R’s encoding rules are solely contingent upon the value of Y ¢.
14
Phys. Scr. 99 (2024) 045221 P Ding et al
Z 1 2 3 4
where DNA E1 (1: K ) , DNA E2 (1: K ) , DNA E3 (1: K ) and DNAR (1: K ) are the matrices encoded according to the rules of
the corresponding sequence, and the fencoding represents DNA encoding.
The value of Z ¢ governs the operation performed between the image E and matrix R. To achieve a more
pronounced diffusion effect, aside from the initial sub-block, the DNA calculation is reapplied to the encryption
result of the matrix E and R calculated by DNA.
DNA ER1((1:1:KK)) = fcalculation (DNA E1 (1: K ) , fcalculation (DNA E1 (1: K ) , DNAR (1: K ) , Z ¢) , Z ¢)
DNA ER2((1:1:KK)) = fcalculation (DNA E2 (1: K ) , fcalculation (DNA E2 (1: K ) , DNAR (1: K ) , Z ¢) , Z ¢)
DNA ER3((1:1:KK)) = fcalculation (DNA E3 (1: K ) , fcalculation (DNA E3 (1: K ) , DNAR (1: K ) , Z ¢) , Z ¢) (28)
where E1¢ (1: K ), E 2¢ (1: K ) and E3¢ (1: K ) are the matrices after DNA decoding, and the fdecoding represents DNA
decoding.
Step4. Get the ciphertext image: Finally, the subblocks of the three image matrices are merged into a whole
block, respectively.
where E1¢¢, E 2¢¢ and E3¢¢ represent the ciphertext matrix of R, G and B channels respectively. and the fmerge
represents operation of combination.
The sequences x1 and x2 generated by the proposed chaotic system are arranged in descending order to
obtain the sequence of positions Gx and Gy according to the following equations.
where fsort represents the sequence values of Gx , Gy and their corresponding indexes are taken as the exchange
coordinates of rows and columns, respectively, and row and column permutation are carried out on the matrix
of E1¢¢, E 2¢¢ and E3¢¢.
E1C = fscramble (E1¢¢, Gx , Gy )
E2C = fscramble (E2¢¢, Gx , Gy )
E3C = fscramble (E3¢¢, Gx , Gy ) (32)
where E1C , E 2C and E3C represent the ciphertext matrix after the scramble of R, G and B channels respectively,
and fscramble represents operation of scramble.
15
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 17. Visualization of the encryption and decryption results for ‘house’: (a)Original image;(b) Ciphertext image;(c) Decrypted
image.
Subsequent to this process, the three two-dimensional matrices, having undergone extensive scrambling,
and amalgamated into a three-dimensional matrix, thereby resulting in the production of the ciphertext
image C.
2L - 1
I (U ) = - å (P (u i ) ´ log 2 P (u i )) (33)
i=1
where I(U) shows the randomness of message source U, L is the length of pixels and P(ui) is the probability
occurrence of ui. If the information entropy value of an image with grayscale value from 0 to 255 is closer to 8,
there is more disorder.
Table 3 provides an analysis of information entropy for various images, while table 4 offers information
entropy values of different cryptographic systems. In table 4, the proposed encryption algorithm exhibits an
information entropy value of 7.9993, which surpasses that of the other compared encryption algorithms.
16
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 18. Histogram Analysis of the plain image and cipher image results for ‘house’: (a1)-(a3)Histogram of plain images; (b1)–(b3)
Histogram of corresponding cipher images.
Plaintexts Ciphertexts
Images R G B R G B
Algorithm R G B
In pursuit of conducting correlation analysis, a total of 5000 pixels was randomly selected from the ‘house’
image. The results are represented visually in figure 19, elucidating the correlation patterns in three distinct
orientations pertaining to the plaintext image. Correspondingly, the correlation distributions of the encrypted
image are shown in figure 20. To further describe the pixels correlation of the original image and its encrypted
image, table 5 shows the correlation coefficients for the R, G, and B channels of the original and encrypted
images across the three diverse orientations. Additionally, table 6 gives the comparison of correlation
coefficients of the original and encrypted Pepper in R, G, B channels. The correlation point plot reveals that the
17
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 19. The correlation distribution of two adjacent pixels in the horizontal, vertical and diagonal directions of the R, G and B
channels of the original ‘house’: (a1)–(a3) R channel; (b1)–(b3) G channel; (c1)–(c3) B channel.
plaintext image exhibits a strong positive correlation with a coefficient close to 1, while the ciphertext image
shows a low correlation coefficient approached to 0. The findings demonstrate the algorithm’s efficacy in
reducing image correlation, which makes it can be used as a secure and dependable solution.
In order to understand the performance of this image encryption mechanisms in reducing the correlation
between pixels, the correlation coefficient of encrypted imaged of ‘peppers’ with different method are shown in
table 6. From table 6, it can be concluded that the proposed image encryption mechanism can effectively reduce
the correlation coefficient between pixels.
18
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 20. The correlation distribution of two adjacent pixels in the horizontal, vertical and diagonal directions of the R, G and B
channels of the encrypted ‘house’: (a1) -(a3) R channel; (b1)-(b3) G channel; (c1)-(c3) B channel.
Plaintexts Ciphertexts
R G B R G B
the decrypted image obtained after introducing a perturbation of 10-14 to the key x1(0); (d), (e), (f), (g) and (h)
are the decrypted image obtained after adding the perturbation amount of 10-14 to different key, respectively.
In this algorithm, the strong sensitivity to key disturbances is evident from the fact that even a slight
disturbance results in a completely different decryption outcome compared to the original image. This
characteristic highlights its ability to effectively resist exhaustive key attacks.
19
Phys. Scr. 99 (2024) 045221 P Ding et al
Image
Channel Horizontal Vertical Diagonal
1 Sm Sn
NPCR (b1, b 2) = åå (∣f (b1 (i, j ) - b2 (i, j ))∣) ´ 100%
Sm Sn i = 1 j = 1 sign
(35)
1 Sm Sn (∣ b1 (i , j ) - b 2 (i , j )∣)
UACI (b1, b 2) = åå
Sm Sn i = 1 j = 1 255
´ 100% (36)
⎧ 1, i > 0
fsign (i ) = 0, i = 0 (37)
⎨
⎩ 1, i < 0
-
where Sm is the width of the plain image and Snis the height of the plain image. b1 (i , j ) and b 2 (i , j ) are the
position of cipher images before and after modifying the pixel values of the plain image, respectively. To meets
the safety standard, the ideal value of NPCR is 99.6093%, and the ideal value of UACI is 33.4635%. In our
experiments, we firstly change the pixel values of the plaintext image, then get the ciphertext image using the
proposed encryption algorithm, and finally calculate the NPCR and UACI of the ciphertext image encrypted
from the original image and the ciphertext image generated from the original image with pixel values changed.
As shown in table 8, the results indicate that the NPCR and UACI of various images are almost close to the
desired values. In additon, table 9 lists the NPCR and UACI values of the image ‘peppers’ for the proposed
method and other methods. It can be obtained that this algorithm is closer to the ideal value than the other
algorithms.
20
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 21. The decryption diagram obtained by decrypting ciphertext image ‘house’ after changing different key values. (a) ciphertext
image; (b) decrypted image with correct keys; (c) x1(0) = 0.4285+10−14; (d) x2(0) = 0.5378+10−14; (e) x3(0) = 0.0672+10−14; (f) X
(0) = 0.5383+10−14; (g) Y(0) = 0.4461+10−14; (h) Z(0) = 0.5879+10−14; (i) H(0) = 0.7290+10−14.
NPCR(%) UACI(%)
image to test the ability of the proposed image encryption scheme to resist noise attacks.The test results are
shown in figure 22.
The results show that after adding noise of different intensities to the encrypted image, the quality of the
corresponding decrypted image decreases with the increase of noise intensity. After adding noise in a 10%
intensity, the proposed algorithm can still resist noise attacks. Therefore, the algorithm has strong robustness to
noise attacks.
When ciphertext image is damaged during transmission, some image data will be lost, resulting in the
received ciphertext image is incomplete. A high-quality image encryption algorithm should have the ability to
21
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 22. Noise attacks analysis for ‘House’. (a1)–(a4) Ciphertext under different noise attacks; (b1)–(b4) The corresponding
decrypted images.
Table 9. The NPCR and UACI of image peppers with other algorithms.
NPCR(%) UACI(%)
R G B Average R G B Average
22
Phys. Scr. 99 (2024) 045221 P Ding et al
Figure 23. Cropping attacks analysis for ‘House’; (a1)–(a4) Ciphertext subjected to varying degrees of clipping; (b1)–(b4) The
corresponding decrypted images.
resist data loss. Therefore, the ciphertext image may be cropped to different degrees, so the ability of the
proposed image encryption scheme to resist cropping attacks is tested. The simulation results of the anti-
clipping attack are shown in figure 23. From the results, the decrypted images can still contain the main
information of the plaintext images.
In order to further analyze the anti-noise attack and anti-cropping attack ability of the proposed image
encryption algorithm, we calculated the Peak signal-to-noise ratio (PSNR) and the Structural similarity index
measurement (SSIM) values between the plaintext image and the corresponding decrypted image. The
calculation formulas of PSNR and SSIM are described as equations (38) and (39) respectively. It is worth noting
that the caculation of PSNR require the value of mean-square error (MSE), which fomula is presented as
equation (40). In equation (40), Sm and Sn are the height and width of the original plaintext image, P1(i, j)
23
Phys. Scr. 99 (2024) 045221 P Ding et al
Table 10. SSIM between the plain images and the decrypted images under the
Nosie and Cropping attacks.
Noise
Test image level Proposed Cropping size Proposed
Table 11. PSNR between the plain images and the decrypted images under the
SPN and Cropping attacks.
SPN
Test image level Proposed Cropping size Proposed
represents the pixel value of the original plaintext image at position (i, j), and P2(i, j) represents the pixel value of
the decrypted image at position (i, j) after the image information is attacked.
2552 ⎞
PSNR = 10 log10⎛ ⎜ ⎟ (38)
⎝ MSE ⎠
MSE = (40)
Sm ´ Sn
In equation (39), C1 = (K1 L )2 , C2 = (K2 L )2 , K1 = 0.01, K2 = 0.03, L = 255.The means of P1 and P2 are P1
and P2 , respectively. And s 2P1 and s 2P2 represent the variances of P1 and P2, respectively.
In general, the larger the PSNR value, the smaller the distortion between the decrypted image and the
plaintext image, and the better the quality of the decrypted image. In image encryption scheme, it is generally
believed that if the PSNR value is greater than 30dB, the decrypted image can be considered to be highly similar
to the plaintext image. The range of SSIM values is [0,1], and the larger the value of SSIM, the more the encrypted
image similars to its plaintex image. If the SSIM value is equal to 1, the decrypted image can be considered to be
exactly the same as the plaintext image.
The anti-noise attack and anti-cropping attack abilities of the proposed image encryption algorithm are
tested by using different images, and the simulation results are shown in tables 10 and 11. Furthermore, the anti-
noise attack and anti-cropping attack abilities of this image encryption algorithm are compared with others, and
their results are shown in table 12.
24
Phys. Scr. 99 (2024) 045221 P Ding et al
Table 12. Comparison of the capablility to resist SPN and Cropping attacks.
PSNR
Attack
Attack
Type Intensity [49] [50] [51] Proposed
Algorithm Encryption time (s) Decryption time (s) Device specs. (CPU and RAM)
7. Conclusions
In this paper, a novel multi-scroll chaotic system with a composite sine function based on jerk system is
proposed. The number of the scrolls generated by the novel chaotic system can be controlled by the parameter d
of the composite sine function. Moreover, as to the implementing circuits of multi-scroll chaotic attractors, only
one resistor’s resistance is required to adjust for altering the number of scrolls. Compared with the chaotic
system with saturation function, triangular wave, hysteresis function, step function, or piecewise linear function,
the proposed system has the advantage of simpler circuit structure, which means that the circuit implementation
is easier. In addition, the adjustment of the scroll number is more convenient. Besides, the introduction of
complexity testing verifies the occurrence of system chaos. The numerical simulation results are coinciding with
the electronic circuit simulation ones, so the proposed new chaotic system with composite sine function is
feasible. Additionally, we combine the proposed chaotic system with Chen hyperchaotic system and DNA
coding to propose a new image encryption method, which ensures the encryption efficiency while increasing the
key space. The four DNA operations rules are controlled by the Chen hyperchaotic system, and the proposed
chaotic system is used to DNA computation and scrambled the images. Finally, the ciphertext histogram of this
encryption system is evenly distributed, the information entropy reaches 7.9993, the key sensitivity reaches the
order of 10-14 , which signifies that the algorithm exhibits robust security characteristics.
25
Phys. Scr. 99 (2024) 045221 P Ding et al
All data that support the findings of this study are included within the article (and any supplementary files).
Future works
In this paper, the dynamic behavior of the proposed multi-scroll chaotic system as well as its application in image
encryption are analyzed theoretically. In addition, the feasibility of circuit realization and image encryption is
verified by Multisim and Matlab software. However, the time comlexity and time consumption of the proposed
image encrytion/decryption scheme is relatively high, it is difficult to meets real-time requirement. In the
future, we will look for solutions to reduce time complexity and time consumption, and try to implement its
application through FPGA.
Competing interests
Authors contributions
Conceptualization, P F Ding; methodology P F Ding; software, P F Ding; validation, P F Ding and K Li; formal
analysis, P F Ding, K Li. and Z X Wang; writing original draft, P F Ding; writing-review and editing, K Li. and Z X
Wang. All authors have read and agreed to the published version of the manuscript.
ORCID iDs
References
[1] Ali Z, Imran M, Alsulaiman M, Shoaib M and Ullah S 2018 Chaos-based robust method of zero-watermarking for medical signals
Futur. Gener. Comp. Syst. 88 400–12
[2] Wu Q and Wu M 2018 Adaptive and blind audio watermarking algorithm based on chaotic encryption in hybrid domain Symmetry-
Basel 10 284
[3] Chen L, Chen J, Zhao G and Wang S 2019 Cryptanalysis and improvement of a chaos-based watermarking scheme IEEE Access 7 97549
[4] Liao T, Wan P and Yan J 2019 Design of synchronized large-scale chaos random number generators and its application to secure
communication Appl. Sci.-Basel 9 185
[5] Yu F, Li L, Tang Q, Cai S, Song Y and Xu Q 2019 A survey on true random number generators based on chaos Discrete Dyn. Nat. Soc.
2019 2545123
[6] Rezk A, Madian A, Radwan A and Soliman A 2020 Multiplierless chaotic Pseudo random number generators AEU-Int. J. Electron.
Commun. 113 152947
[7] Wang T, Song L, Wang M, Chen S and Zhuang Z 2020 A novel five-dimensional three-leaf chaotic attractor and its application in image
encryption Entropy 22 243
[8] Shao Z, Liu X, Yao Q, Qi N, Shang Y and Zhang J 2020 Multiple-image encryption based on chaotic phase mask and equal modulus
decomposition in quaternion gyrator domain Signal Process.-Image Commun. 80 115662
[9] Luo Y, Tang S, Liu J, Cao L and Qiu S 2020 Image encryption scheme by combining the hyper-chaotic system with quantum coding
Opt. Lasers Eng. 124 105836
[10] Liu J, Yang X, Gao Y and Liu F 2016 Application of similar Liu system in underwater weak signal detection Acta Phys. Sin. 65 070501
[11] Cao B, Li P, Li X, Zhang X, Ning W, Liang R, Li X, Hu M and Zheng Y 2019 Detection and parameter estimation of weak pulse signal
based on strongly coupled Duffing oscillators Acta Phys. Sin. 68 080501
[12] Wu A, Mwachaka S, Pei Y and Fu Q 2018 A novel weak signal detection method of electromagnetic LWD based on a duffing oscillator
J. Sens. 2018 5847081
[13] Wang F Q and Liu C X 2007 A new multi-scroll chaotic generator Chin. Phys.B 16 942
[14] Zhang C X and Yu S M 2009 Design and implementation of a novel multi-scroll chaotic system Chin. Phys.B 18 119
[15] Sara D and Hamid R M 2010 Generating one-, two-, three- and four-scroll attractors from a novel four-dimensional smooth
autonomous chaotic system Chin. Phys.B 19 060506
[16] Luo X H, Tu Z W, Liu X R, Cai C, Liang Y L and Gong P 2010 Implementation of a novel two-attractor grid multi-scroll chaotic system
Chin. Phys. B 19 070510
[17] Hu X, Liu C, Liu L, Yao Y and Zheng G 2017 Multi-scroll hidden attractors and multi-wing hidden attractors in a 5-dimensional
memristive system Chin. Phys. 26 110502
[18] Zhang G T and Wang F Q 2018 A novel multi-scroll chaotic generator_ Analysis, simulation, and implementation Chin. Phys. B 27
018201
26
Phys. Scr. 99 (2024) 045221 P Ding et al
27