Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2018, Article ID 8649294, 13 pages
https://doi.org/10.1155/2018/8649294
Research Article

Circuit Implementation, Synchronization of Multistability, and Image Encryption of a Four-Wing Memristive Chaotic System

School of Electrical and Automatic Engineering, Nanjing Normal University, Nanjing 210042, China

Correspondence should be addressed to Fuhong Min; nc.ude.unjn@gnohufnim

Received 18 July 2017; Revised 22 October 2017; Accepted 28 November 2017; Published 1 February 2018

Academic Editor: Ephraim Suhir

Copyright © 2018 Guangya Peng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. O. Chua, “Memristor—the missing circuit element,” IEEE Transactions on Circuit Theory, vol. 18, no. 5, pp. 507–519, 1971. View at Publisher · View at Google Scholar
  2. D. B. Strukov, G. S. Snider, D. R. Stewart, and R. S. Williams, “The missing memristor found,” Nature, vol. 453, pp. 80–83, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. J. J. Yang, D. B. Strukov, and D. R. Stewart, “Memristive devices for computing,” Nature Nanotechnology, vol. 8, no. 1, pp. 13–24, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. C. Yakopcic, V. Bontupalli, R. Hasan, D. Mountain, and T. M. Taha, “Self-biasing memristor crossbar used for string matching and ternary content-addressable memory implementation,” IEEE Electronics Letters, vol. 53, no. 7, pp. 463–465, 2017. View at Publisher · View at Google Scholar · View at Scopus
  5. Y. Chang, F. Zhou, B. W. Fowler et al., “Memcomputing (Memristor + Computing) in intrinsic SiOx-based resistive switching memory: arithmetic operations for logic applications,” IEEE Transactions on Electron Devices, vol. 64, no. 7, pp. 2977–2983, 2017. View at Publisher · View at Google Scholar
  6. L. Wang, Q. Song, Y. Liu, Z. Zhao, and F. E. Alsaadi, “Finite-time stability analysis of fractional-order complex-valued memristor-based neural networks with both leakage and time-varying delays,” Neurocomputing, vol. 245, pp. 86–101, 2017. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Feng, Q. Ma, and S. Qin, “Exponential stability of periodic solution for impulsive memristor-based Cohen-Grossberg neural networks with mixed delays,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 31, no. 7, 1750022, 17 pages, 2017. View at Google Scholar · View at MathSciNet
  8. R. Rocha, J. Ruthiramoorthy, and T. Kathamuthu, “Memristive oscillator based on Chua’s circuit: stability analysis and hidden dynamics,” Nonlinear Dynamics, vol. 88, no. 4, pp. 2577–2587, 2017. View at Publisher · View at Google Scholar · View at Scopus
  9. J. Kengne, A. N. Negou, and D. Tchiotsop, “Antimonotonicity, chaos and multiple attractors in a novel autonomous memristor-based jerk circuit,” Nonlinear Dynamics, vol. 88, no. 4, pp. 2589–2608, 2017. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Abunahla, D. Shehada, C. Y. Yeun, B. Mohammad, and M. A. Jaoude, “Novel secret key generation techniques using memristor devices,” AIP Advances, vol. 6, no. 2, Article ID 025107, 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. S. Kannan, N. Karimi, O. Sinanoglu, and R. Karri, “Security Vulnerabilities of Emerging Nonvolatile Main Memories and Countermeasures,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 34, no. 1, pp. 2–15, 2015. View at Publisher · View at Google Scholar
  12. Z. Wang, F. Min, and E. Wang, “A new hyperchaotic circuit with two memristors and its application in image encryption,” AIP Advances, vol. 6, no. 9, Article ID 095316, 2016. View at Publisher · View at Google Scholar · View at Scopus
  13. Q. Xu, Y. Lin, B. Bao, and M. Chen, “Multiple attractors in a non-ideal active voltage-controlled memristor based Chua's circuit,” Chaos, Solitons & Fractals, vol. 83, pp. 186–200, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  14. H. Xi, Y. Li, and X. Huang, “Generation and nonlinear dynamical analyses of fractional-order memristor-based Lorenz systems,” Entropy, vol. 16, no. 12, pp. 6240–6253, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. B. Zhang and F. Q. Deng, “Double-compound synchronization of six memristor-based Lorenz systems,” Nonlinear Dynamics, vol. 77, no. 4, pp. 1519–1530, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Wang, X. Wang, and Y. Zhou, “A memristor-based complex lorenz system and its modified projective synchronization,” Entropy, vol. 17, no. 11, pp. 7628–7644, 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Kassim, H. Hamiche, S. Djennoune, and M. Bettayeb, “A novel secure image transmission scheme based on synchronization of fractional-order discrete-time hyperchaotic systems,” Nonlinear Dynamics, vol. 88, no. 4, pp. 2473–2489, 2017. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Wang, J. Zhao, X. Li, and L. Zhang, “Image blocking encryption algorithm based on laser chaos synchronization,” Journal of Electrical and Computer Engineering, vol. 2016, Article ID 4138654, 14 pages, 2016. View at Publisher · View at Google Scholar
  19. Z. Lin and H. Wang, “Image encryption based on chaos with PWL memristor in Chua's circuit,” in Proceedings of the 2009 International Conference on Communications, Circuits and Systems (ICCCAS), pp. 964–968, Milpitas, Ca, USA, July 2009. View at Publisher · View at Google Scholar
  20. C. Yang, Q. Hu, Y. Yu, R. Zhang, Y. Yao, and J. Cai, “Memristor-Based Chaotic Circuit for Text/Image Encryption and Decryption,” in Proceedings of the 8th International Symposium on Computational Intelligence and Design, ISCID 2015, pp. 447–450, China, December 2015. View at Publisher · View at Google Scholar · View at Scopus
  21. J. Ma, Z. Chen, Z. Wang, and Q. Zhang, “A four-wing hyper-chaotic attractor generated from a 4D memristive system with a line equilibrium,” Nonlinear Dynamics, vol. 81, no. 3, pp. 1275–1288, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. L. Zhou, C. Wang, and L. Zhou, “Generating Four-Wing Hyperchaotic Attractor and Two-Wing, Three-Wing, and Four-Wing Chaotic Attractors in 4D Memristive System,” International Journal of Bifurcation and Chaos, vol. 27, no. 2, Article ID 1750027, 2017. View at Publisher · View at Google Scholar · View at Scopus
  23. N. H. Alombah, H. Fotsin, and K. Romanic, “Coexistence of multiple attractors, metastable chaos and bursting oscillations in a multiscroll memristive chaotic circuit,” International Journal of Bifurcation and Chaos, vol. 27, no. 5, 1750067, 20 pages, 2017. View at Google Scholar · View at MathSciNet
  24. Z. T. Njitacke, J. Kengne, H. B. Fotsin, A. N. Negou, and D. Tchiotsop, “Coexistence of multiple attractors and crisis route to chaos in a novel memristive diode bidge-based Jerk circuit,” Chaos, Solitons & Fractals, vol. 91, pp. 180–197, 2016. View at Publisher · View at Google Scholar · View at Scopus
  25. G. Peng and F. Min, “Multistability analysis, circuit implementations and application in image encryption of a novel memristive chaotic circuit,” Nonlinear Dynamics, vol. 90, no. 3, pp. 1607–1625, 2017. View at Publisher · View at Google Scholar
  26. E. N. Lorenz, “Deterministic nonperiodic flow,” Journal of the Atmospheric Sciences, vol. 20, no. 2, pp. 130–141, 1963. View at Publisher · View at Google Scholar
  27. S. M. Yv, Chaotic Systems and Chaotic Circuit: Principle, Design and Its Application in Communications, Xidian University Publishing House, Xi’an, China, 2011.
  28. G. A. Leonov, N. V. Kuznetsov, and T. N. Mokaev, “Hidden attractor and homoclinic orbit in Lorenz-like system describing convective fluid motion in rotating cavity,” Communications in Nonlinear Science and Numerical Simulation, vol. 28, no. 1-3, pp. 166–174, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  29. H. Bao, B. C. Bao, Y. Lin et al., “Hidden attractor and its dynamical characteristic in memristive self-oscillating system,” Acta Physica Sinica, vol. 65, no. 18, article 180501, 2016. View at Google Scholar
  30. B. Bao, T. Jiang, G. Wang, P. Jin, H. Bao, and M. Chen, “Two-memristor-based Chua's hyperchaotic circuit with plane equilibrium and its extreme multistability,” Nonlinear Dynamics, pp. 1–15, 2017. View at Publisher · View at Google Scholar
  31. L. M. Pecora and T. L. Carroll, “Synchronization in chaotic systems,” Physical Review Letters, vol. 64, no. 8, pp. 821–824, 1990. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  32. F. Min and A. C. Luo, “Complex dynamics of projective synchronization of Chua circuits with different scrolls,” International Journal of Bifurcation and Chaos, vol. 25, no. 5, 1530016, 28 pages, 2015. View at Google Scholar · View at MathSciNet
  33. B. S. Reddy and A. Ghosal, “Chaotic Motion in a Flexible Rotating Beam and Synchronization,” Journal of Computational and Nonlinear Dynamics, vol. 12, no. 4, p. 044505, 2017. View at Publisher · View at Google Scholar
  34. L. Shan, J. Li, F. H. Min, and Z. Q. Wang, “Synchronization control of new piecewise fractional-order chaotic systems,” Systems Engineering and Electronics, vol. 32, no. 10, pp. 2198–2202, 2010. View at Google Scholar
  35. C. L. Wang, Z. B. Chen, and G. E. Yong, “Infrared image encryption scheme using Lorenz chaotic system,” Journal of Computer Applications, vol. 35, no. 8, pp. 2205–2209, 2015. View at Google Scholar
  36. J. Zhao, S. Wang, L. Zhang, and X. Wang, “Image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map,” Journal of Electrical and Computer Engineering, vol. 2017, Article ID 8672716, 10 pages, 2017. View at Publisher · View at Google Scholar
  37. I. F. Elashry, O. S. F. Allah, A. M. Abbas, S. El-Rabaie, and F. E. A. El-Samie, “Homomorphic image encryption,” Journal of Electronic Imaging, vol. 18, no. 3, Article ID 033002, 2009. View at Publisher · View at Google Scholar · View at Scopus