Abstract
Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly. This new system is thoroughly analyzed by the help of the bifurcation diagram, Lyapunov exponents’ spectrum, and entropy measurement. Bifurcation analysis of the proposed system with two initiation methods reveals its multistability. As an engineering application, the system’s efficiency is tested in image encryption. The complexity of the chaotic attractor of the proposed system makes it a proper choice for encryption. States of the chaotic attractor are used to shuffle the rows and columns of the image, and then the shuffled image is XORed with the states of chaotic attractor. The unpredictability of the chaotic attractor makes the encryption method very safe. The performance of the encryption method is analyzed using the histogram, correlation coefficient, Shannon entropy, and encryption quality. The results show that the encryption method using the proposed chaotic system has reliable performance.
1. Introduction
The chaotic dynamic has been a hot topic recently [,,]. For many years, there was a hypothesis that chaotic attractors are related to a saddle point equilibria [,]. In the last decade, some chaotic systems were proposed, which were counterexamples of that hypothesis [,]. Chaotic systems with stable equilibria [], chaotic flows with no equilibria [,], and chaotic flow with circular equilibria [,] are some of such counterexamples. Investigating new chaotic flows has been done in the literature []. Many chaotic flows with various features are being proposed every year [,,]. Researchers hope that such studies help to investigate the reason of generating chaotic attractors [,,,]. Dynamical properties of two discs with viscous friction and multiple delays have been studied in []. An infinite lattice of chaotic attractors was discussed in []. Chaotic dynamics can be modeled using electronic circuits [,].
Each attractor of a system has a basin of attraction []. Based on the basin of attraction, attractors can be categorized into self-excited or hidden attractors [,]. An attractor is self-excited if its basin of attraction has an intersect with unstable equilibrium, while it is hidden if it does not [,]. Hidden attractors of an economical supply have been studied in []. In [], hidden attractors of Rabinovich-Fabrikant system have been investigated. Multistability is an exciting phenomenon in the study of dynamical systems [,,]. Many studies have been done on chaotic systems with multistability []. In the multistable systems, each attractor has its basin of attraction [].
There are some useful measurements to quantify chaotic dynamics. Lyapunov exponent is one of the most reliable measures in this area []. In the chaotic attractors, there is at least one positive Lyapunov exponent []. Entropy is another measurement which can be used in the study of chaotic attractors []. Different entropy measures have been proposed to study the complexity of chaotic attractors []. Chaotic dynamics and their complexities have been analyzed in [,,]. Local entropy has been used for image segmentation in [].
In these days, the transmission of data without leakage is an important topic. Many methods have been proposed for data encryption [,,]. Chaotic systems have many applications in various areas, such as biology and communication [,,]. In [], chaotic dynamics were investigated in the cryptocurrency market. Some features of chaotic dynamics, such as randomness and sensitivity to initial conditions, are desirable in the field of cryptology [,]. The unpredictability of chaotic time-series is an important feature, which is useful in the encryption []. Many studies have been done on the application of chaotic systems in encryption [,]. In [], a watermarking method to embed an invisible watermark into the intra-frames of a MPEG video sequence has been studied. A hybrid non-blind MPEG video watermarking method was proposed in []. A robust image watermarking method, such as copyright protection, was studied in [].
In this paper, a new chaotic system is proposed. The system has a special property which crosses a pre-defined cylinder repeatedly. The system is introduced in Section 2. The structural features of the proposed system are analyzed in Section 3. Additionally, bifurcation diagram, Lyapunov exponents, and entropy analysis of the system are studied in Section 3. In Section 4, an encryption method based on the proposed system is presented, and its results are discussed. Section 5 is the conclusion.
2. The New Chaotic System and Its Structural Properties
The novel three-dimensional chaotic system is as follows:
The system shows chaotic dynamic in with initial conditions . Figure 1 shows the chaotic attractor in three different projections.
Figure 1.
Chaotic attractor of System (1) in three different planes, (a) plane, (b) plane, (c) plane.
3. Dynamical Properties of the Proposed System
In the study of dynamical systems, bifurcation diagram is handy. It shows various dynamics of the system by changing parameters. In the following parts of this section, dynamical properties of the proposed system have been discussed by changing parameters.
3.1. Equilibrium Points and Their Stability
To investigate equilibrium points of the system, the right-hand side of Equation (1) should be zero as follows:
Therefore, we have four equilibrium points as . The stability of these equilibrium points is investigated using the Jacobian matrix and roots of characteristic equations in each equilibrium point. Figure 2 shows the real and imaginary parts of equilibrium points for . Figure 2a,b shows Eigenvalues of . is a saddle point in the studied interval, and it is not spiral since the imaginary part of Eigenvalues is zero. Figure 2c,d shows Eigenvalues of . It shows that has two complex conjugates with a positive real part and one negative real Eigenvalue. Therefore, it is a spiral saddle point. Eigenvalues of and are shown in Figure 2e–h. It shows that these equilibrium points are saddles and spiral when there are one positive and two negative real parts of Eigenvalues. Numerical investigations show that initial conditions in a small neighborhood of equilibrium points lead to the chaotic attractor, so the attractor is self-excited.
Figure 2.
Real and imaginary parts of equilibrium points in a∈[1.7,2.4]. (a) Real part of Eigenvalues of , (b) imaginary part of Eigenvalues of , (c) real part of Eigenvalues of , (d) imaginary part of Eigenvalues of , (e) real part of Eigenvalues of , (f) imaginary part of Eigenvalues of , (g) real part of Eigenvalues of , (h) imaginary part of Eigenvalues of .
3.2. Attractor around a Pre-Defined Cylinder
The average of , and of the system should be zero to have a bounded solution []. Therefore, in each attractor of the system, such as periodic and chaotic, the average of each derivative is zero. In other words, we have . Thus, , , and . The condition means that the attractor of the system should be above the plane at sometimes and bellow the plane at some other times. Therefore can be zero on the attractor of the proposed system. Condition means that each bounded solution of the proposed system should cross the inside and outside of the cylinder repeatedly. The attractor of the system should cross the manifold to satisfy the condition . Figure 3 shows the chaotic attractor in and these three conditions which are satisfied by the attractor. Figure 3a,b shows the cylinder (from two points of view) which is crossed by the chaotic attractor repeatedly. The manifold and the chaotic attractor are shown in Figure 3c of the figure. Finally, the plane and the attractor are shown in Figure 3d.
Figure 3.
The chaotic attractor in and (a) the condition , (b) the condition from another viewpoint, (c) the condition , (d) the condition .
3.3. Bifurcation Diagram
Here, the bifurcation diagram of System (1) with respect to changing parameter is studied. Bifurcation diagram can be plotted by different initiation methods. Two methods are used in this paper. The first method is backward continuation. In this method, the parameter is decreasing, and initial conditions in each parameter are selected from the end values of the states in the previous parameter, which is higher than the current parameter. The second method is plotting bifurcation diagram with constant initial conditions. Figure 4 shows a bifurcation diagram of System (1) with backward continuation. Initial conditions in the first parameter () are . The system has a period-doubling route to chaos by decreasing parameter . Bifurcation diagram of System (1) with constant initial conditions are plotted in Figure 5. The figure shows a period-doubling route to chaos by decreasing parameter . However, some jumps can be seen in this route. Comparing bifurcation diagrams which are plotted by two initiation methods in Figure 4 and Figure 5, it can be seen that the system has multistability since its attractor can differ by varying initial conditions.
Figure 4.
Bifurcation diagram of System (1) with backward continuation and the first initial conditions . (a) maximum values of variable by changing parameter ; (b) maximum values of variable by changing parameter ; (c) maximum values of variable by changing parameter .
Figure 5.
Bifurcation diagram of System (1) with constant initial conditions . (a) maximum values of variable by changing parameter ; (b) maximum values of variable by changing parameter ; (c) maximum values of variable by changing parameter .
3.4. Lyapunov Exponents
Lyapunov exponents of System (1) related to the bifurcation diagrams of Figure 4 and Figure 5 are calculated using Wolf’s method [] and run time 20000. Figure 6a presents Lyapunov exponents of System (1) with backward continuation. Positive Lyapunov exponents of the system in some intervals of parameter prove the existence of chaos. Figure 6b shows Lyapunov exponents of System (1) with constant initial conditions. Comparing Lyapunov exponents plotting by these two methods shows that however, the system shows multistability by two initiation methods, but the quality of the multistable attractors is the same since their Lyapunov exponents are the same.
Figure 6.
Lyapunov exponents of System (1) (a) with backward continuation, (b) with constant initial conditions.
3.5. Entropy Analysis
Entropy is a measure of complexity. Entropy can be used in the analysis of biological signals [,]. A well-known entropy is Shannon entropy [], as shown in Equation (3). In this equation, is the probability of each possible state.
Another entropy measure which is more applicable in chaotic systems is Kolmogorov–Sinai entropy as Equation (4). is the first Poincaré recurrence times (FPRs). is a D-dimensional box in the state space with side , and the FPRs are observed. is the probability distribution of . This entropy is positive in chaotic dynamics [,]. Moreover, approaching the bifurcation points can be seen in the entropy if it is calculated without removing transient time. It is because of the slowness near bifurcation points, which causes the state to be more distributed.
Figure 7a,b shows the results of Shannon entropy and Kolmogorov–Sinai entropy of the proposed system with respect to changing parameter and backward continuation method. By increasing parameter an inverse route of a period-doubling route to chaos happens. Thus, the entropy is decreased by increasing parameter . Kolmogorov–Sinai entropy shows positive values in chaotic regions and also when approaching bifurcation points.
Figure 7.
(a) Shannon entropy and (b) Kolmogorov–Sinai entropy of the proposed system with respect to changing parameter and backward continuation method.
Investigating variations of the attractor of the system by changing parameter is very interesting. Parameter changes the radios of the cylinder. It was discussed that each attractor of the system should cross the cylinder repeatedly. Therefore, we can change the domain of attractor in the plane by changing parameter . Figure 7 shows the attractor of System (1) which crosses the cylinder with radios in three parameters , as shown in Figure 8a–c.
Figure 8.
The attractor of System (1) in (a) , (b) , (c) .
The system is highly dependent on parameter since it can have various dynamics in a small interval. Moreover, initial conditions are critical in the dynamic of the system since the system is multistable. In overall, the sensitivity of the dynamic of the system to the parameter and initial conditions makes it a proper choice for encryption.
4. Image Encryption
The proposed system has a complex chaotic dynamic. Besides the sensitivity of its chaotic attractor to initial conditions, the system is multistable, which makes it more complex. The encryption method, which is based on [] is discussed below.
4.1. Encryption Method
The parameter and initial conditions of the chaotic attractor of Figure 1 enter the first block of the Algorithm 1. The system is run using the Rung–Kutta method (Ode15s in Matlab program) with constant time steps and run time 300. Therefore, 30000 bits are generated using the time series of each variable. The float values of the time series are transferred to 32-bit binary values with 3 bits for the integer part and 29 bits for fraction part since the maximum amplitude of the chaotic attractor 4. In the next step, the 20 least significant bits are selected to be used in the generation of random numbers. Then the 20 least significant bits of the following values of time series are put in a vector which is used in the encryption process.
Lena image is used to test the power of the chaotic attractor of the proposed system in image encryption. The image is shown in Figure 9a. In the first step of encryption, the Lena image is loaded with the size . Then a random line mixing is used to shuffle rows and columns of the picture. The random vector of variable, which was generated in the previous part, is used to shuffle the rows of the image. Every eight bits of the vector are considered as a row number. In this step, it is possible that some redundancies exist in the generated indices. Therefore, we remove the duplicates until 256 distinct numbers between 1 to 256 are generated. After that, the rows are shuffled using the random indices. Then, the random vector of variable is used to shuffle the columns of the image with the same process. Figure 9b shows the shuffled rows and columns of the Lena image. Then, the shuffled image is converted to a vector. In the next step, the image is converted to binary values with eight bits for the integer part, and its values are XORed with the eight bits sequences of the random generated sequence of and variables. After that, the results are converted to decimal. Next, the encrypted vector is converted into the encrypted image which is shown in Figure 9c. The parameter and initial conditions of System (1) have been sent to the receiver side as the key in the Algorithm 1. In the decryption, the inverse of the encryption steps should be used to obtain the original image, as shown in Figure 9d.
Figure 9.
(a) The original Lena image, (b) the shuffled rows and columns of the Lena image, (c) the encrypted image, (d) the decrypted image.
As another example, the baby image is used (Figure 10a) to test the encryption method using the chaotic attractor of the proposed system. The shuffled rows and columns of the image using the random sequence generated by and variables are shown in Figure 10b. Then, the results are XORed with the random sequences which are generated by and variables and the encrypted image are shown in Figure 10c. The inverse process should be applied to decrypt the image on the receiver side, as shown in Figure 10d.
Figure 10.
(a) The original baby image, (b) the shuffled rows and columns of the baby image, (c) the encrypted image, (d) the decrypted image.
Altogether, the encryption algorithm is as follows:
| Algorithm 1 Encryption Algorithm |
| 1. Parameter and initial conditions are entered into the system. |
| 2. The proper run time’s step is selected. |
| 3. The float values of the time series are transferred to 32-bit binary values with 3 bits for the integer part and 29 bits for the fraction part. |
| 4. The 20 least significant bits are selected to be used in the generation of random numbers, and they are put in a vector. |
| 5. The rows and columns are shuffled using the randomly generated indices from and variable of chaotic attractor. |
| 6. The random vectors generated by and of chaotic attractor are XORed, and then they are XORed with the shuffled image. |
| 7. The results are converted to decimal. |
In the decryption, the inverse of the encryption steps is applied to the encrypted image. The results show that the decrypted images are loss-less since the mean square error of the original and decrypted image in both cases is zero. Dynamical properties of the previous section show that the system is highly dependent on initial conditions, which make the system a proper choice to be used in encryption.
4.2. Encryption’s Performance
To investigate the performance of encryption, some measures are analyzed []. These measures help us to study the security of the encryption method.
Histogram of an image shows its distribution of color values. Figure 11a shows the histogram of the Lena image. It can be seen that the distribution has a special form which depends on the colors of this figure. The desired encryption method should change the distribution of the encrypted image to uniform, so there is no possibility that the encrypted image can be broken. Figure 11b shows the histogram of the encrypted Lena image. It can be seen that the distribution is approximately uniform. Figure 11c,d shows the histogram of the original baby image and its encrypted image. The results present the power of the proposed chaotic system in the encryption.
Figure 11.
(a) The histogram of Lena image, (b) the histogram of the encrypted Lena image, (c) the histogram of the baby image, (d) the histogram of the encrypted baby image.
The second measure is the correlation coefficient. This measure presents the relation between the pixels of the image. Figure 12a,c shows the relationship between the pixels of Lena and baby image, respectively. The correlation coefficient for these two images is and . The graphic of the correlation of the encrypted images of Lena and baby are shown in Figure 12b,d. The results show that the encryption method using the proposed system has a proper correlation distribution. Correlation coefficients of the encrypted image are and , respectively.
Figure 12.
(a) The relation between pixels of Lena, (b) the correlation of the encrypted images of Lena, (c) the relationship between pixels of the baby image, (d) the correlation of the encrypted images of the baby.
Another measure which is used in the calculation of quality of encryption method is Shannon entropy. Entropy calculates the complexity of the encrypted data. The calculated entropy of the original Lena and baby image is and . This measure for encrypted Lena and the baby image is and . The results show an increase in the entropy of the encrypted image.
Encryption quality is another measure for the quality of encryption. This measure quantifies the difference of distribution of gray levels of the original and encrypted image. It is calculated as Equation (5). and are the original and encrypted image. and can have gray levels as . is the number of occurrences of each gray level in the original image, and is the number of occurrences of each gray level in the encrypted image []. In this study, both figures have 256 gray levels. This measure is and for Lena and baby image, respectively.
5. Conclusions
A new three-dimensional chaotic flow has been proposed in this paper. The system has a particular property in which its attractor should cross inside and outside of a determined cylinder. Equilibrium points and their stabilities were analyzed in this paper. Bifurcation diagram of the system was studied using backward continuation method and constant initial conditions method. The results show that the system has multistability. Lyapunov exponents of the system were studied to determine the chaotic regions with respect to changing the bifurcation parameter. Entropy analysis of the system was used to investigate the complexity of attractors by changing the parameter. Finally, the proposed system was applied in an Algorithm 1, and its performance was discussed. Some Matlab codes of the paper are available in the following link, https://drive.google.com/drive/folders/1y96B_VZb1qQ7FLuNDiVEHZoG6K9gJT76?usp=sharing.
Author Contributions
Conceptualization, A.K.F. and A.T.M.; Methodology, N.M.G.A. and A.K.F.; Software, A.K.F. and A.T.M.; Validation, F.N. and I.H.; Formal analysis, N.M.G.A.; Investigation, F.N.; Resources, I.H.; Data Curation, F.N.; Writing-Original Draft Preparation, N.M.G.A.; Writing-Review and Editing, F.N. and I.H.; Visualization, F.N.; Supervision, N.M.G.A. and I.H.; Project Administration, N.M.G.A. and I.H.; Funding acquisition, I.H.; Image Encryption, A.K.F. and A.T.M.
Funding
This research received no external funding.
Conflicts of Interest
The authors declare that there is no conflict of interests regarding the publication of this paper.
References
- Danca, M.F.; Tang, W.K.; Chen, G. Suppressing chaos in a simplest autonomous memristor-based circuit of fractional order by periodic impulses. Chaos Solitons Fractals 2016, 84, 31–40. [Google Scholar] [CrossRef]
- Rajagopal, K.; Kacar, S.; Wei, Z.; Duraisamy, P.; Kifle, T.; Karthikeyan, A.; Wei, Z. Dynamical investigation and chaotic associated behaviors of memristor Chua’s circuit with a non-ideal voltage-controlled memristor and its application to voice encryption. AEU Int. J. Electron. Commun. 2019, 107, 183–191. [Google Scholar] [CrossRef]
- Petržela, J.; Kolka, Z.; Hanus, S. Simple chaotic oscillator: From mathematical model to practical experiment. Radioengineering 2006, 15, 6–11. [Google Scholar]
- Chen, G.; Ueta, T. Yet another chaotic attractor. Int. J. Bifurc. Chaos 1999, 9, 1465–1466. [Google Scholar] [CrossRef]
- Lorenz, E.N. Deterministic nonperiodic flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef]
- Wei, Z. Dynamical behaviors of a chaotic system with no equilibria. Phys. Lett. A 2011, 376, 102–108. [Google Scholar] [CrossRef]
- Wang, X.; Chen, G. A chaotic system with only one stable equilibrium. Commun. Nonlinear Sci. Numer. Simul. 2012, 17, 1264–1272. [Google Scholar] [CrossRef]
- Molaie, M.; Jafari, S.; Sprott, J.C.; Golpayegani, S.M.R.H. Simple chaotic flows with one stable equilibrium. Int. J. Bifurc. Chaos 2013, 23, 1350188. [Google Scholar] [CrossRef]
- Pham, V.T.; Volos, C.; Gambuzza, L.V. A Memristive Hyperchaotic System without Equilibrium. Sci. World J. 2014, 2014, 1–9. [Google Scholar] [CrossRef]
- Pham, V.-T.; Volos, C.; Jafari, S.; Wei, Z.; Wang, X. Constructing a Novel No-Equilibrium Chaotic System. Int. J. Bifurc. Chaos 2014, 24, 1450073. [Google Scholar] [CrossRef]
- Gotthans, T.; Petržela, J. New class of chaotic systems with circular equilibrium. Nonlinear Dyn. 2015, 81, 1143–1149. [Google Scholar] [CrossRef]
- Gotthans, T.; Sprott, J.C.; Petrzela, J. Simple Chaotic Flow with Circle and Square Equilibrium. Int. J. Bifurc. Chaos 2016, 26, 1650137. [Google Scholar] [CrossRef]
- Natiq, H.; Said, M.R.M.; Al-Saidi, N.M.G.; Kilicman, A. Dynamics and Complexity of a New 4D Chaotic Laser System. Entropy 2019, 21, 34. [Google Scholar] [CrossRef]
- Wei, Z.; Sprott, J.; Chen, H. Elementary quadratic chaotic flows with a single non-hyperbolic equilibrium. Phys. Lett. A 2015, 379, 2184–2187. [Google Scholar] [CrossRef]
- Pham, V.T.; Volos, C.; Jafari, S.; Wang, X. Generating a novel hyperchaotic system out of equilibrium. Optoelectron. Adv. Mater. Rapid Commun. 2014, 8, 535–539. [Google Scholar]
- Lai, Q.; Chen, S. Generating Multiple Chaotic Attractors from Sprott B System. Int. J. Bifurc. Chaos 2016, 26, 1650177. [Google Scholar] [CrossRef]
- Pham, V.T.; Jafari, S.; Volos, C.; Wang, X.; Golpayegani, S.M.R.H. Is that Really Hidden? The Presence of Complex Fixed-Points in Chaotic Flows with No Equilibria. Int. J. Bifurc. Chaos 2014, 24, 1450146. [Google Scholar] [CrossRef]
- Wang, Z.; Sun, W.; Wei, Z.; Xi, X. Dynamics analysis and robust modified function projective synchronization of Sprott E system with quadratic perturbation. Kybernetika 2014, 50, 616–631. [Google Scholar] [CrossRef][Green Version]
- Li, C.; Thio, W.J.C.; Sprott, J.C.; Iu, H.H.C.; Xu, Y.; Iu, H.H.C. Constructing Infinitely Many Attractors in a Programmable Chaotic Circuit. IEEE Access 2018, 6, 29003–29012. [Google Scholar] [CrossRef]
- Ma, J.; Zhou, P.; Ahmad, B.; Ren, G.; Wang, C. Chaos and multi-scroll attractors in RCL-shunted junction coupled Jerk circuit connected by memristor. PLoS ONE 2018, 13, e0191120. [Google Scholar] [CrossRef]
- Wei, Z.; Zhu, B.; Yang, J.; Perc, M.; Slavinec, M. Bifurcation analysis of two disc dynamos with viscous friction and multiple time delays. Appl. Math. Comput. 2019, 347, 265–281. [Google Scholar] [CrossRef]
- Li, C.; Sprott, J.C. An infinite 3-D quasiperiodic lattice of chaotic attractors. Phys. Lett. A 2018, 382, 581–587. [Google Scholar] [CrossRef]
- PETRŽELA, J.; HRUBOŠ, Z.; GOTTHANS, T. Modeling Deterministic Chaos Using Electronic Circuits. Radioengineering 2011, 20, 438–444. [Google Scholar]
- Zhou, P.; Huang, K. A new 4-D non-equilibrium fractional-order chaotic system and its circuit implementation. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 2005–2011. [Google Scholar] [CrossRef]
- Danca, M.F.; Bourke, P.; Kuznetsov, N. Graphical Structure of Attraction Basins of Hidden Chaotic Attractors: The Rabinovich–Fabrikant System. Int. J. Bifurc. Chaos 2019, 29, 1930001. [Google Scholar] [CrossRef]
- Kuznetsov, N.V.; Leonov, G.A.; Mokaev, T.N. Localization of a hidden attractor in the Rabinovich system. arXiv 2015, arXiv:150404723. [Google Scholar]
- Kuznetsov, N.V.; Leonov, G.A.; Mokaev, T.N.; Seledzhi, S.M. Hidden Attractor in the Rabinovich System, Chua Circuits and PLL. In AIP Conference Proceedings; AIP Publishing: Melville, NY, USA, 2016. [Google Scholar]
- Kuznetsov, N.V.; Leonov, G.A.; Mokaev, T.N. The Lyapunov dimension and its computation for self-excited and hidden attractors in the Glukhovsky-Dolzhansky fluid convection model. arXiv 2015, arXiv:150909161. [Google Scholar]
- Danca, M.-F.; Fečkan, M. Hidden chaotic attractors and chaos suppression in an impulsive discrete economical supply and demand dynamical system. Commun. Nonlinear Sci. Numer. Simul. 2019, 74, 1–13. [Google Scholar] [CrossRef]
- Danca, M.F.; Kuznetsov, N.; Chen, G. Unusual dynamics and hidden attractors of the Rabinovich–Fabrikant system. Nonlinear Dyn. 2017, 88, 791–805. [Google Scholar] [CrossRef]
- Lai, Q.; Akgul, A.; Zhao, X.W.; Pei, H. Various Types of Coexisting Attractors in a New 4D Autonomous Chaotic System. Int. J. Bifurc. Chaos 2017, 27, 1750142. [Google Scholar] [CrossRef]
- Chen, S.; Lai, Q. Coexisting attractors generated from a new 4D smooth chaotic system. Int. J. Control. Autom. Syst. 2016, 14, 1124–1131. [Google Scholar]
- Bao, B.; Jiang, T.; Xu, Q.; Chen, M.; Wu, H.; Hu, Y. Coexisting infinitely many attractors in active band-pass filter-based memristive circuit. Nonlinear Dyn. 2016, 86, 1711–1723. [Google Scholar] [CrossRef]
- Bao, B.C.; Li, Q.D.; Wang, N.; Xu, Q. Multistability in Chua’s circuit with two stable node-foci. Chaos Interdiscip. J. Nonlinear Sci. 2016, 26, 043111. [Google Scholar] [CrossRef] [PubMed]
- Bao, B.C.; Chen, M.; Bao, H.; Xu, Q. Extreme multistability in a memristive circuit. Electron. Lett. 2016, 52, 1008–1010. [Google Scholar] [CrossRef]
- Danca, M.-F. Lyapunov Exponents of a Discontinuous 4D Hyperchaotic System of Integer or Fractional Order. Entropy 2018, 20, 337. [Google Scholar] [CrossRef]
- Sprott, J.C. Elegant Chaos: Algebraically Simple Chaotic Flows; World Scientific: Singapore, 2010. [Google Scholar]
- Hilborn, R.C. Chaos and Nonlinear Dynamics: An Introduction for Scientists and Engineers; Oxford University Press: Oxford, UK, 2000. [Google Scholar]
- He, S.; Sun, K.; Wang, R. Fractional fuzzy entropy algorithm and the complexity analysis for nonlinear time series. Eur. Phys. J. Spec. Top. 2018, 227, 943–957. [Google Scholar] [CrossRef]
- He, S.-B.; Sun, K.-H.; Zhu, C.X. Complexity analyses of multi-wing chaotic systems. Chin. Phys. B 2013, 22, 050506. [Google Scholar] [CrossRef]
- He, S.; Sun, K.; Wang, H. Complexity Analysis and DSP Implementation of the Fractional-Order Lorenz Hyperchaotic System. Entropy 2015, 17, 8299–8311. [Google Scholar] [CrossRef]
- He, S.; Li, C.; Sun, K.; Jafari, S. Multivariate Multiscale Complexity Analysis of Self-Reproducing Chaotic Systems. Entropy 2018, 20, 556. [Google Scholar] [CrossRef]
- Hržić, F.; Štajduhar, I.; Tschauner, S.; Sorantin, E.; Lerga, J. Local-Entropy Based Approach for X-Ray Image Segmentation and Fracture Detection. Entropy 2019, 21, 338. [Google Scholar] [CrossRef]
- Bourbakis, N.; Alexopoulos, C. Picture data encryption using scan patterns. Pattern Recognit. 1992, 25, 567–581. [Google Scholar] [CrossRef]
- Pareek, N.; Patidar, V.; Sud, K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
- Natiq, H.; Al-Saidi, N.M.G.; Said, M.R.M.; Kilicman, A. A new hyperchaotic map and its application for image encryption. Eur. Phys. J. Plus 2018, 133, 6. [Google Scholar] [CrossRef]
- Nazarimehr, F.; Jafari, S.; Golpayegani, S.M.R.H.; Perc, M.; Sprott, J.C. Predicting tipping points of dynamical systems during a period-doubling route to chaos. Chaos Interdiscip. J. Nonlinear Sci. 2018, 28, 073102. [Google Scholar] [CrossRef]
- Nazarimehr, F.; Ghaffari, A.; Jafari, S.; Golpayegani, S.M.R.H. Sparse Recovery and Dictionary Learning to Identify the Nonlinear Dynamical Systems: One Step Toward Finding Bifurcation Points in Real Systems. Int. J. Bifurc. Chaos 2019, 29, 1950030. [Google Scholar] [CrossRef]
- Beritelli, F.; Di Cola, E.; Fortuna, L.; Italia, F. Multilayer Chaotic Encryption for Secure Communications in Packet Switching Networks. In Proceedings of the International Conference on Communication Technology Proceedings, Beijing, China, 21–25 August 2000. [Google Scholar]
- Gunay, S.; Kaşkaloğlu, K. Seeking a Chaotic Order in the Cryptocurrency Market. Math. Comput. Appl. 2019, 24, 36. [Google Scholar] [CrossRef]
- Álvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
- Wang, J.; Ding, Q. Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction. Entropy 2018, 20, 693. [Google Scholar] [CrossRef]
- Çavuşoğlu, Ü; Kaçar, S.; Pehlivan, I.; Zengin, A. Secure image encryption algorithm design using a novel chaos based S-Box. Chaos Solitons Fractals 2017, 95, 92–101. [Google Scholar]
- Lagmiri, S.; Elalami, N.; Elalami, J. Novel Chaotic System for Color Image Encryption Using Random Permutation. Int. J. Comput. Netw. Commun. Secur. 2018, 6, 9–16. [Google Scholar]
- Çavuşoğlu, Ü.; Panahi, S.; Akgül, A.; Jafari, S.; Kaçar, S. A new chaotic system with hidden attractor and its engineering applications: Analog circuit realization and image encryption. Analog Integr. Circuits Signal Process. 2019, 98, 85–99. [Google Scholar] [CrossRef]
- Abdallah, E.E.; Ben Hamza, A.; Bhattacharya, P. MPEG Video Watermarking Using Tensor Singular Value Decomposition. In Proceedings of the Computer Vision–ECCV 2012, Florence, Italy, 7–13 October 2012; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
- Abdallah, E.E.; Hamza, A.B.; Bhattacharya, P. Video watermarking using wavelet transform and tensor algebra. Signal Image Video Process. 2010, 4, 233–245. [Google Scholar] [CrossRef]
- Ouhsain, M.; Ben Hamza, A. Image watermarking scheme using nonnegative matrix factorization and wavelet transform. Expert Syst. Appl. 2009, 36, 2123–2129. [Google Scholar] [CrossRef]
- Jafari, S.; Sprott, J.C.; Dehghan, S. Categories of conservative flows. Int. J. Bifurc. Chaos 2019, 29, 1950021. [Google Scholar] [CrossRef]
- Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining Lyapunov exponents from a time series. Phys. D Nonlinear Phenom. 1985, 16, 285–317. [Google Scholar] [CrossRef]
- Lerga, J.; Saulig, N.; Mozetič, V. Algorithm based on the short-term Rényi entropy and IF estimation for noisy EEG signals analysis. Comput. Biol. Med. 2017, 80, 1–13. [Google Scholar] [CrossRef]
- Lerga, J.; Saulig, N.; Mozetic, V.; Lerga, R. Number of EEG Signal Components estimated Using the Short-Term Rényi Entropy. In Proceedings of the International Multidisciplinary Conference on Computer and Energy Science (SpliTech), Split, Croatia, 13–15 July 2016. [Google Scholar]
- Cover, T.M.; Thomas, J.A. Elements of Information Theory; John Wiley & Sons: Hoboken, NJ, USA, 2012. [Google Scholar]
- Frigg, R. In What Sense is the Kolmogorov-Sinai Entropy a Measure for Chaotic Behaviour?--Bridging the Gap Between Dynamical Systems Theory and Communication Theory. Br. J. Philos. Sci. 2004, 55, 411–434. [Google Scholar] [CrossRef]
- Mihelich, M.; Dubrulle, B.; Paillard, D.; Herbert, C. Maximum Entropy Production vs. Kolmogorov-Sinai Entropy in a Constrained ASEP Model. Entropy 2014, 16, 1037–1046. [Google Scholar] [CrossRef]
- Jolfaei, A.; Mirghadri, A. A new approach to measure quality of image encryption. Int. J. Comput. Netw. Secur. 2010, 2, 38–44. [Google Scholar]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).