Next Article in Journal
Architecting and Deploying IoT Smart Applications: A Performance–Oriented Approach
Next Article in Special Issue
Separation of Partial Discharge Sources Measured in the High-Frequency Range with HFCT Sensors Using PRPD-teff Patterns
Previous Article in Journal
TiO2-x/TiO2-Structure Based ‘Self-Heated’ Sensor for the Determination of Some Reducing Gases
Previous Article in Special Issue
Fringe Phase-Shifting Field Based Fuzzy Quotient Space-Oriented Partial Differential Equations Filtering Method for Gaussian Noise-Induced Phase Error
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Multidimensional Hyperjerk Oscillator: Dynamics Analysis, Analogue and Embedded Systems Implementation, and Its Application as a Cryptosystem

by
Tsafack Nestor
1,2,
Nkapkop Jean De Dieu
3,4,
Kengne Jacques
1,
Effa Joseph Yves
3,
Abdullah M. Iliyasu
5,6,7,* and
Ahmed A. Abd El-Latif
8,9,10
1
Research Unit of Laboratory of Automation and Applied Computer, Electrical Engineering Department of IUT-FV, University of Dschang, P.O. Box 134 Bandjoun, Cameroon
2
Research Unit of Laboratory of Condensed Matter, Electronics and Signal Processing, Department of Physics, Faculty of Sciences, University of Dschang, P.O. Box 67 Dschang, Cameroon
3
Department of Electrical Engineering and Industrial Computing, University Institute of Technology, P.O. Box 8698 Douala, Cameroon
4
Department of Communications, Technical University of Cluj-Napoca, 26-28 Baritiu Street, 400027 Cluj-Napoca, Romania
5
Electrical Engineering Department, College of Engineering, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia
6
School of Computing, Tokyo Institute of Technology, Yokohama 226-8502, Japan
7
School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China
8
Mathematics and Computer Science Department, Faculty of Science, Menoufia University, P.O. Box 32511 Shebin El-Koom, Egypt
9
Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, P.O. Box 23890 Jeddah, Saudi Arabia
10
School of Computer Science and Technology, Harbin Institute of Technology, Harbin P.O. Box 150080, China
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(1), 83; https://doi.org/10.3390/s20010083
Submission received: 9 November 2019 / Revised: 16 December 2019 / Accepted: 16 December 2019 / Published: 21 December 2019
(This article belongs to the Special Issue Data, Signal and Image Processing and Applications in Sensors)

Abstract

:
A lightweight image encryption algorithm is presented based on chaos induction via a 5-dimensional hyperjerk oscillator (5DHO) network. First, the dynamics of our 5DHO network is investigated and shown to exhibit up to five coexisting hidden attractors in the state space that depend exclusively on the system’s initial values. Further, a simple implementation of the circuit was used to validate its ability to exhibit chaotic dynamical properties. Second, an Arduino UNO platform is used to confirm the usability of our oscillator in embedded system implementation. Finally, an efficient image encryption application is executed using the proposed chaotic networks based on the use of permutation-substitution sequences. The superior qualities of the proposed strategy are traced to the dynamic set of keys used in the substitution process which heralds the generation of the final ciphered image. Based on the average results obtained from the entropy analysis (7.9976), NPCR values (99.62), UACI tests (33.69) and encryption execution time for 512 × 512 images (0.1141 s), the proposed algorithm is adjudged to be fast and robust to differential and statistical attacks relative to similar approaches.

1. Introduction

A lot of development in internet and multimedia technology has been witnessed over the past decade. This has facilitated seamless exchange and transfer of confidential information. Moreover, the confidentiality, authentication and integrity (CIA) triad is widely cited as the cornerstone of information security. Among others, it provides the effective copyright protection and confidentiality needed in business, entertainment, healthcare, military, etc. communication. Encryption of sensitive data is one of the most important information security strategies that is necessary for confidentiality. Available encryption and decryption algorithms used to forestall malicious attacks from unauthorised parties include DES, 3-DES, AES, IDEA, RSA, etc. [1,2,3]. However, due to data capacity resource demands and high correlation among pixels in image files, these standard algorithms withered in providing efficient protection for images [4]. Moreover, although widely used in cryptanalysis, computer science and electrical engineering, pseudo random number generators (PRNG) are less effective in cryptography. As a solution, chaos-based protocols have continued to gain traction in mitigating image security issues [5,6,7,8,9,10,11].
Many studies have focused on ergodicity, deterministic dynamics, unpredictable behaviors, non-linear transformation, sensitivity dependence, etc. of the system. Research efforts have explored the use of striking periodic attractors, chaotic attractors or hyperchaotic attractors, antimonotonicity, period doubling, hysteresis, coexisting bifurcations, etc. in investigating the dynamic behaviours of systems and their possible applications [12,13,14,15,16,17]. Interestingly, some of these characteristics have been found useful in image encryption [6,18]. In [19], Shuqin and collaborators presented a novel encryption algorithm based on chaos and SHA-256 whose experimental results show that it was efficient and reliable. This was further enhanced in [12], wherein Quing et al. proposed an S-box design algorithm based on a new compound chaotic system. In their effort, in [20], Biham et al. demonstrated the exploitation of the weakness inherent to piecewise linearity of the tent map and its limitation to 75 random bits to violate the intensity of the system using a pair of known and chosen plain text attacks. Similarly, in [21], Baptista suggested the use of a chaotic attractor, plaintext and logistic map for image encryption.
Due largely to its relatively cheap pricing and utility, a large community has arisen around the Arduino open-source computer hardware and software platforms and through them hundreds of free scripts for different projects are easily available. Mauricio et al., presented a communication system based on chaotic logistic maps and an experimental realization of it using Arduino board. Therein, the input message was moderated using a Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map but with different initial conditions. On the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through a communication channel. In [22], Adolfo and collaborators designed, implemented and evaluated a compact two axes solar tracking system. The system incorporates a video processing-based sensor connected to an Arduino board that computes a sun-positioning algorithm. The main advantage of such systems is the elimination of expensive computing systems where closed loop solar tracking is facilitated via simple, low cost networks with minimal configuration. The assessment of their results indicates the system’s efficiency relative to some existing approaches. Arduino have also been used to handle sensor- and vision-based image processing techniques [23,24]. In [24], Nikhil et al. studied a traffic monitoring system for road vehicle traffic. The study in [25] is aimed at minimising human support and avoiding accidents on the roads.
Motivated by the applications of Arduino networks highlighted above, we consider its deployment in the embedded system implementation [26] of our 5DHO chaos generation network. The contributions of our study are enunciated in the sequel.

Our Contributions

In this study, we present a multidimensional oscillator (5DHO) network for use as a chaos generator and cubic nonlinearity to the network in [27]. The choice of the proposed system utilises semiconductor diodes rather than analogue multipliers. Specifically, we utilise a network of diode operational amplifiers and resistors to derive a piecewise linear (PWL) approximation of the cubic and quadratic functions needed for chaotic non-linearity [28]. Therefore, low cost, convenient circuits whose output is the square or cube of their input are used to realise 5-D hyperjerk characteristics. Additionally, an Arduino UNO board is used to establish the dynamics of our oscillator and its usability in embedded systems technologies.
Finally, a lightweight encryption algorithm is designed based on permutation-substitution boxes and the sequences of the 5DHO. Our strategy offers a dynamic set of keys for use in generating the ciphered image.
The remainder of paper is structured as follows: Section 2 introduces the dynamics of the proposed multidimensional hyperjerk oscillator. Analogue and embedded systems implementations of the proposed network are presented in Section 3. Following that, Section 4 presents our proposed encryption and decryption procedures as well as their performance analysis are also reported.

2. Dynamics of the Proposed Multidimensional Hyperjerk Oscillator

2.1. Mathematical Formulation of Proposed 5-D Hyperjerk Oscillator Network

The mathematical model of the proposed 5-D hyperjerk system is formalised in the set of differential equations in (1).
{ x ˙ 1 = x 2 x ˙ 2 = x 3 x ˙ 3 = x 4 x ˙ 4 = b x 5 x ˙ 5 = a 0 x 5 a 1 x 3 a 2 x 2 a 3 x 1 y
where y = a 4 x 4 ( x 4 l 1 ) ( x 4 l 2 ) = a 4 l 1 l 2 x 4 a 4 ( l 1 + l 2 ) x 4 2 + a 4 x 4 3 is the nonlinear function containing both cubic and quadratic nonlinearities. In the present study, these nonlinearities are implemented without any analog multiplier. x i ( i = 1 , 2 , 3 , 4 , 5 ) are state variables and and a 0 [ 0.8 ; 2 ] , a 1 [ 2.7 ; 6 ] , a 2 [ 1 ; 5 ] , a 3 [ 0.1 ; 1.5 ] , a 4 [ 0.1 ; 1.5 ] , b [ 0.1 ; 1.5 ] , l 1 [ 0 ; 3 ] , l 2 [ 0 ; 3 ] are positively valued constants.
The fourth order Runge-Kutta algorithm with a trifling integration step to will be used analyse the behaviour of the 5-D hyperjerk system in (1) through Hopf bifurcation diagrams, Lyapunov exponents and phase space trajectories.

2.2. Fixed Point and Stability

Since the unique equilibrium (origin) point O ( 0 , 0 , 0 , 0 , 0 ) of the proposed model in (1) is the solution of the nonlinear system: x ˙ 1 = x ˙ 2 = x ˙ 3 = x ˙ 4 = x ˙ 5 = 0 , the stability of the equilibrium can be described by the following characteristic equation:
λ 5 + a 0 λ 4 + a 4 b l 1 l 2 λ 3 + a 1 b λ 2 + a 2 b λ + a 3 b = 0
As the real parts of the correlated eigen values are always negatively valued; the equilibrium is stable for the entire region of system parameters. For instance, if we set b = 3 ;   a 0 = 1.5 ;   a 1 = 3 ;   a 2 = 2 ;   a 3 = 1 ;   a 4 = 1 ;   l 1 = 1 ;   l 2 = 2.6 then its eigen values can be calculated as:
λ 1 =     0.1194   +   2.5677 i ;   λ 2 =     0.1194     2.5677 i ;   λ 3 =     0.8425   +   0.0000 i λ 4 =     0.2094   +   0.7036 i ;   λ 5 =     0.2094     0.7036 i
It is a general conclusion that since the equilibrium point is always stable, it can be predicted that a point attractor coexists with a strange attractor [27,28]. This is further clarified later in the next section.

2.3. Bifurcations and Multistability

The bifurcations of an oscillator with respect to parameter a2 can be investigated when parameters values are assigned as ( a 0   , a 1   , a 3   , a 4   ,   b   ,   l 1   ,   l 2 ) = ( 1.5   ,   2.6   ,   1   , 0.6 ,   3   ,   1   ,   2.6 ) . Figure 1a shows that the oscillator studied in our study exhibits the reverse period doubling paths to chaos with the primary value ( 6 , 0 , 0 , 0 , 0 ) . It is patent that the oscillator experiences antimonotonicity behaviour. Lyapunov spectrum [29,30,31,32] is also used to attest the chaotic dynamics of the system (Figure 1b). Figure 2 provides four views of the 5-D Hyperjerk chaotic attractor where the stable equilibrium point is shown as a red dot.
Furthermore, coexisting bifurcation diagrams are used to illustrate the phenomenon of multistability in the system (1) (see Figure 3 and Figure 4) where we point out that these graphs are the plots of the local maximums of the variable x1 against parameter a2.
While details of strategies used are presented in Table 1, it is evident from these graphics that up to four attractors can coexist (Figure 5 and Figure 6). Table 2 provides initial solution and system parameters in each case. Offset boosting is another striking behaviour observed in the system presented in (1). For illustration, (1) is rewritten by replacing the state x1 with x1+k as presented in (4).
{ x ˙ 1 = x 2 x ˙ 2 = x 3 x ˙ 3 = x 4 x ˙ 4 = b x 5 x ˙ 5 = a 0 x 5 a 1 x 3 a 2 x 2 a 3 ( x 1 + k ) a 4 x 4 ( x 4 l 1 ) ( x 4 l 2 )
When switching parameter k, the chaotic signal x1 can be transferred from a bipolar signal to a unipolar signal as illustrated in Figure 7.

3. Experimental Analysis of Proposed Oscillator

3.1. Analogue Simulation Results on the Designed Circuit Using Spice

This section highlights the intricacies in the design of our proposed 5-D hyperjerk oscillator and its simulation. We start by recalling that this system exhibits both cubic and quadratic polynomials. The circuit in Figure 8 produces an output that is the square of its input, while the one in Figure 9 implements a PWL approximation of a circuit whose output is the cube of its input. These circuits are convenient for low-cost analogue realization of our proposed network that is depicted in Figure 10. Here, state variables xi (i = 1…5) of the system in (1) are associated with the voltages vi (i = 1…5) across the capacitors Ci (i = 1…5) respectively. By linking the state variable xi (i = 1…5) with the voltages vi (i = 1…5) across the capacitors Ci (i = 1…5), we derive circuit equations in the form presented in (5).
{ C 1 d υ 1 d t = υ 2 R C 2 d υ 2 d t = υ 3 R C 3 d υ 3 d t = υ 4 R C 4 d υ 4 d t = υ 5 R b C 5 d υ 4 d t = υ 5 R a 0 υ 3 R a 1 υ 2 R a 2 υ 1 R a 3 υ 4 R 1 υ 4 2 R 2 + υ 4 3 R 3
Similarly, by rescaling time and other variables: t e = t R C ;     υ i = x i n V T   ( i = 1 , 2 , 3 ) and subject to adjustments in parameter values in (6), the system in (5) can be seen to be identical to the one in (1).
a 0 = R R a 0 ;     a 1 = R R a 1 ;     a 2 = R R a 2 ;     a 3 = R R a 3 ;     a 4 l 1 l 2 = R R 1 ;     a 4 ( l 1 + l 2 ) = R R 2 ;     a 4 = R R 3 ;  
Pspice simulation is used to validate the theoretical expectations of the circuit in Figure 9 in terms of coexistence of hidden attractors. R a 2 is used as the main control resistor and the rest of circuit components are fixed as mentioned in Table 3. The synergy between the theoretical results (i.e., in Figure 2 and Figure 5) and the Pspice simulation results (in Figure 11 and Figure 12) shows the feasibility of the suggested chaotic system with hidden attractors based on the stated electronic components whose evidence of presence of coexisting hidden chaotic attractors are presented in Figure 13.

3.2. Arduino Based Implementation of Proposed Oscillator

While Field Programmable Gate Arrays (FPGA) are the popular option for providing configurable circuits practical implementation of embedded systems using chaos [33], recently some microcontroller-based chaotic systems have been considered due to their equally flexible and cheap pricing for different programming applications [34,35,36,37,38,39,40,41]. In this study, we use an Arduino UNO board platform to compute and visualise the solutions (for example, using an oscilloscope) of our chaos generator. The Arduino board used in our study is presented in Figure 14 and further details pertaining to its implementation are outlined in the sequel.
  • Step 1: Set pins 1 and 2 as outputs. The solutions of our chaotic oscillator will be written here.
  • Step 2: Define the discrete chaotic oscillator, its parameters and initial conditions under an infinite loop.
  • Step 3: Write the solutions of the discrete chaotic oscillator on Arduino pins. Pin 1 is activated when x2 > 0.5 and pin 2 is activated when x1 > 1.
The above algorithm is executed using the open-source platform Arduino 1.8.9 and the experimental result (in Figure 15) is recovered via traces on an oscilloscope connected at pin 2 with scales set at X = 2 V/div and Y = 500 ms/div.
Meanwhile, by using “millis()”function on the Arduino platform, the experimental time can be printed. Here, a readout of 0.064 ms for a 16 MHz crystal oscillator (the frequency of the quartz mounted on the card) using only 10% of the Arduino memory is obtained.

4. Application of Proposed Network as a Cryptosystem

4.1. Chaos-Based Image Encryption Using Proposed 5-D Hyperjerk Oscillator Network

Employing a permutation-substitution procedure, we propose the use of our 5-D hyperjerk chaos generator for image encryption, which requires refinements to our 5-D hyperjerk chaos generator as presented in (7):
{ x ˙ 1 = x 2 mod 1 x ˙ 2 = x 3 mod 1 x ˙ 3 = x 4 mod 1 x ˙ 4 = b x 5 mod 1 x ˙ 5 = ( a 0 x 5 a 1 x 3 a 2 x 2 a 3 x 1 a 4 x 4 ( x 4 l 1 ) ( x 4 l 2 ) ) mod 1
This proposed scheme is outlined in Figure 16 and its execution is realized via the following steps where we use a plain image (P) and key parameters (x1, x2, x3, x4, x5, a0, a1, a2, a3, a4, b, l1, l2) for iterating 5-D hyperjerk chaos generator as input and the cipher-image (c) as output.
  • Step 1: Iterate the 5-D hyperjerk chaos generator for h*w times, where h*w is the size of the plain image P, which produces output is five sequences x1, x2, x3, x4, and x5 as output.
  • Step 2: Using the first sequence x1, construct a permutation sequence of length h with h distinct elements from 1 to h as follows:
    Order the elements of first h elements and discard the first 10 elements in ascending order.
      Eh= order (x1(11:h+10))
    Obtain the index of each element of the sequence Eh as a sequence x1(11:h+10).
      Ph=index (Eh in x1(11:h+10))
    Step 3: Using the first sequence x2, construct a permutation sequence of length w with distinct elements from 1 to w.
    Order the elements of first w elements and discard the first 10 elements in ascending order.
      Ew= order (x2(11:w+10))
    Obtain the index of each element of the sequence Ew as a sequence x2(11:h+10).
      Pw=index (Ew in x2(11:w+10))
  • Step 4: Using the first sequence the third and fourth sequences x3 and x4, construct the substitution sequence of length 256, which have 256 distinct elements in the range 0 to 255
    Y=x3(11:266) + x4(11:266)
    Order the elements of Y sequence in ascending order.
      Ey= order(Y)
    Obtain the index of each element of the sequence Ey as a sequence Y.
      Sb=index (Ey in Y)
  • Step 5: Using the fifth sequence X5, construct the key matrix K with size h×w.
    K = f i x ( X 5 × 10 12 ) mod 256
  • Step 6: Permute the plain image P using the permutation sequences Ph and Pw (which originate from Step 2 and Step 3, respectively), each targeting the rows and columns.
    •   for i=1 to h
    •    for j=1 to w
    •     Per(i,j)=P(Ph(i),Pw(j));
    •    end
    •   end
  • Step 7: Substitute the permutated image ‘Per’ (in Step 6) using Sb substitution sequence (in Step 4).
    •   Sub=zeros(a,b);
    •   for i=1 to h
    •    for j=1 to w
    •     Sub (i,j)=Sb(Per(i,j)+1);
    •    end
    •   end
  • Step 8: Perform bitwise XOR operation on substituted image ‘Sub’ (in Step 7) using key matrix K (in Step 5). C=bitxor(Sub,K)

4.2. Performance Tests

To test the performances of our encryption scheme, we set system parameters and initial values within the window of coexisting attractors as ( a 0 , a 1 , a 2 , a 3 , a 4 , b , I 1 , I 2 ) = ( 1.5 , 3 , 3.454 , 1 , 1 , 3 , 1 , 2.6 ) respectively ( x 1 , x 2 , x 3 , x 4 , x 5 ) = ( 0.7752 , 0.6733 , 0.9534 , 0.8735 , 0.8736 ) . Further, we simulated implementation of the proposed scheme using 256×256 sized versions of the Boats, Bridge, and Clock greyscale images in Figure 17a–c on an Intel® coreTM i5-2450M and 6 GB RAM workstation with a preinstalled MATLAB R2016b software. As seen from the outcome in Figure 17d–f, the encrypted images are visually imperceptible. However, the simple visual inspection remains insufficient to judge the quality of a good encryption scheme. It is well known that many encryption schemes have been successfully violated using simple statistical and differential analysis are widely used to successfully validate the efficiency of encryption schemes [42,43,44,45,46,47,48,49,50,51,52,53,54]. The robustness of our proposed technique is similarly established via these simple, yet important tests as presented in the remainder of this subsection.

4.2.1. Statistical Tests

Correlation of Adjacent Pixels

In sensitivity analysis of encryption keys, quantitative analyses are undertaken using the correlation coefficient [40] metric. In such analysis, the neighbouring pixels of a plain image should be highly correlated with correlation coefficient close to unity (i.e., 1) in each direction. Furthermore, an ideal encryption scheme must produce cipher image with no correlation between neighboring pixels (i.e., correlation coefficient should be close to 0 in each direction). For this purpose, correlation coefficient is computed using the definition in (8).
r x y = i = 1 M ( x i x ¯ ) ( y i y ¯ ) i = 1 M ( x i x ¯ ) 2 i = 1 M ( y i y ¯ ) 2
where a pixel r is defined by r(xi,yi) and M is the total number of pixels in the cipher image. Table 4 provides the correlation coefficients for the plain and encrypted versions of images in Figure 17 and from this table it is apparent that the input and encrypted images are highly correlated since correlation coefficient of the encrypted images are very close to 0 in each direction. Consequently, we conclude that the proposed encryption algorithm produces efficiently correlated ciphered images.

Histogram Tests

An image histogram is the representation of each pixel in the image with respect to its intensity value [55,56,57]. This analysis is very useful in deciding the statistical strength of an encryption algorithm. As a representation of incomprehensible information, the histogram of a cipher image is uniformly distributed, while the non-uniform nature of a pristine un-enciphered image depicts the details therein. Figure 18 presents the histograms of the plain and ciphered images used in our experiment, outcomes of which further establish the performance of our proposed scheme in resisting statistical manipulations to the content of the encrypted image.

Information Entropy

Another statistical metric that is widely used to assess the capability of a cipher scheme to resist statistical attacks is the measure of its information entropy. The distribution (entropy) of each pixel xi with the probability p(xi) in a given image can be defined as:
E ( X ) = i = 1 2 L 1 p ( x i ) log 2 ( p ( x i ) )
Given that a greyscale image has 256 possible values, the ideal entropy value should be close to 8. Table 5 provides information entropy values for the encrypted images in comparison with values obtained via previous studies as indicated in the table.

4.2.2. Differential Test: NPCR and UACI

In addition to performing well in the statistical tests reported above, a well design encryption algorithm should be very sensitive to slight changes in the composition of the plain image [51,52,53,54]. This sensitivity can be evaluated by computing the Number of Pixels Change Rate (NPCR) and the Unified Average Changing Intensity (UACI) which are defined in (10) and (11) respectively.
N P C R = i ; j D ( i , j ) w × h × 100 % , D ( i , j ) = { 0     i f     I C 1 ( i , j ) = I C 2 ( i , j ) 1     i f     I C 1 ( i , j ) I C 2 ( i , j )
U A C I = 100 w × h 1 w 1 h | I C 1 ( i , j ) I C 2 ( i , j ) | 255
where I C 1 and I C 2 are two encrypted images obtained from plain images different in just one pixel, w and h are the dimensions of the images. For an image to be uniformly distributed, the minimum expected values of NPCR and UACI should satisfy (12) and (13) respectively.
N P C R max = ( 1 2 8 ) × 100 = 99.609375 %
U A C I max = j = 1 2 8 1 j ( j + 1 ) 2 8 ( 2 8 1 ) × 100 = 33.46354 %
The results in Table 6 validate the sensitivity and ability of images obtained via proposed scheme to withstand differential attacks aimed at violating their integrity.

4.2.3. Key Sensitivity Test

An efficient and robust encryption algorithm must show sensitivity to even the slightest changes in the composition of its secret key [38,39,40,41,55,56,57]. This is especially important in resisting brute force attacks. To evaluate the key sensitivity of our proposed scheme, the encrypted image is decrypted using four slightly different test keys. The results presented in Figure 19 show the impact of slight modifications to key parameters in yielding erroneous outcomes, i.e., ensuring the encrypted image is inaccessible unless with the exact key parameters.

4.2.4. Time and Complexity Analysis

The speed of an algorithm depends on some important factors such as the specifications and structure of the CPU, the size of memory, the size of image, the software used, etc. To assess our algorithm with those in [43,52,53,54], we ensured a level playing ground by first attuning it with those in compared studies using 512 × 512 sized images. Second, we simulate the execution under the same environment: A laptop with Intel coreTM i5-2450M 6 GB RAM and a preinstalled MATLAB R2016b software. The total encryption time of the proposed approach includes iterating the 5-D hyperjerk chaos generation, constructing permutation sequences (Ph and Pw), constructing substitution sequence (Sb), and encryption process. Table 7 gives the detailed time analysis for each process in the encryption procedure. Consequently, only temporal constraints arising from diffusion and confusion procedures of each algorithm are assessed. Further, Table 8 provides the time analysis for our scheme based on the specs outlined in comparison with results from similar techniques as reported.
In addition to encryption time tests, we also undertook a complexity analysis [56] as outlined here. For uniformity and level playing ground, this analysis is done in terms of CPU operations required to execute the different methods. Therefore, each step of our proposed method as well as those to be used in the comparison are used to estimate the complexity cost.
-
Step 1: (5*h*w) steps are required to iterate the chaotic map
-
Step 2: (h2) steps each are required to retrieve h elements and obtain the index
-
Step 3: (w2) steps each are required to retrieve w elements and obtain the index
-
Step 4: (256*256) steps each are required to retrieve 256 elements, and obtain the index of h elements
-
Step 5: (h*w) steps are each required for the multiplication mod operations
-
Step 6: (h*w) steps are required for the permutation operation
-
Step 7: (h*w) steps are required for substitution operation
-
Step 8: (h*w) steps are required for number of exclusive-XOR operations in the final step
Therefore, the complexity of the algorithm proposed to execute the encryption procedure is O(max(h2, w2, h*w) which is an improvement over the complexity reported in [55].

4.2.5. NIST Test

To establish the effectiveness of the presented encryption mechanism, we assessed the randomness property of the resulting fifth sequence (for example) as stipulated via NIST SP 800-22 tests, which are considered as the industry standard. These tests consist of 15 examinations that are performed on the fifth generated sequence with 106 bits length and as presented in Table 9 the generated sequence passed tests administered.

4.2.6. Key Space Analysis

A well-designed image encryption approach should have a sufficiently large key-space which is known as the several keys that can be used in brute-force attacks [38,39,40,41,55,56,57]. For our proposed technique, the image encryption algorithm utilizes the key parameters (a,b,y,x1,x2,x3,x4,x5) to generate the encryption key K. For context, suppose that the calculation precision (floating point operations) for each key is 1016, then the total key space of whole system is 10128, which is within thresholds expected from state-of-the-art encryption algorithms.

4.2.7. Impact of Noise on the Transmission of Cipher Images

In providing a thorough assessment of our proposed technique, it is important to evaluate the effect of noise on the cipher image during the transmission. For this, we consider a black cut out that is obtained by modifying 1024 pixels ( 32 × 32 ) in the encrypted image and setting their values to zero. We then execute the decryption procedure on the noisy encrypted image as presented in Figure 20. From this result we observe that despite the noise, the original boats image can be recovered with high visual fidelity (see Figure 20b). Consequently, we can infer the utility of our proposed scheme for public transmission.

5. Concluding Remarks

This study has proposed, designed, and implemented a 5-D hyperjerk oscillator for chaos generation. Extensive numerical analysis employed showed that the proposed oscillator network comprised of diodes and resistors can produce nonlinearities (both square and cubic) required to generate chaos. Moreover, in addition to being cheaper than standard analogue multipliers, our proposed network was shown to exhibit the capacity to experience coexistence of hidden attractors in the phase space. Furthermore, we exploited the efficient cost-effective design of our network to explore deployment of its lightweight version as an image cryptosystem. Based on this application and outcomes of standard security analysis that were undertaken, the performance and utility of our proposed image encryption scheme were validated. Additionally, an Arduino UNO set up was utilized to implement the network and experimental results showed that our proposed chaos generator could have useful applications in emerging paradigms for information and communication security. For future and ongoing work, our study is being improved in the following directions. First, we note that despite their relative objectivity, statistical tests do not cover all aspects of cryptanalytical attacks. Therefore, following necessary refinements, we plan on integrating differential trails over the encryption process. These are reputed to be more powerful then permutation-only and substitution paradigms. Additionally, in ongoing work, we are exploring the use of Cobweb diagrams (representation of phase plot for digital systems) for chaos generation based on the Arduino platform. Insights from this and other improvements to this study will be used to improve image complexity analysis, develop faster and more robust encryption strategies for colour images aimed primarily at securing medical images for applications in telemedicine.

Author Contributions

Conceptualisation, T.N., N.J.D.D., E.J.Y., and A.A.A.E.-L.; methodology, K.J., A.A.A.E.-L. and E.J.Y.; software, T.N., A.A.A.E.-L., and N.J.D.D.; validation, K.J., A.A.A.E.-L., and A.M.I.; formal analysis, T.N., E.J.Y., A.A.A., and N.J.D.D.; investigation, T.N., A.A.A.E.-L. and A.M.I.; writing—original draft preparation, T.N., A.A.A.E.-L. and K.J.; writing—review and editing, T.N., A.A.A.E.-L. and A.M.I.; visualisation, A.M.I. and A.A.A.E.-L.; supervision, K.J. and A.M.I.; project administration K.J., A.A.A.E.-L. and A.M.I. All authors have read and agreed to the published version of the manuscript.

Funding

This study is sponsored by the Prince Sattam Bin Abdulaziz University, Saudi Arabia via the Deanship for Scientific Research funding for the Advanced Computational Intelligence & Intelligent Systems Engineering (ACIISE) Research Group Project Number 2019/01/9862.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. FIPS PUB. Data Encryption Standard (DES); NIST, Publication 46; 1999. Available online: https://csrc.nist.gov/csrc/media/publications/fips/46/3/archive/1999-10-25/documents/fips46-3.pdf (accessed on 15 December 2019).
  2. Diffie, W.; Hellman, M. New direction in cryptograph. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef] [Green Version]
  3. Abid, Z.; Wang, W. Countermeasures for hardware fault attack in multiprime RSA cryptosystems. Int. J. Netw. Secur. 2008, 6, 190–200. [Google Scholar]
  4. Li, S.; Chen, G.; Cheung, A.; Bhargava, B.; Lo, K.T. On the design of perceptual MPEG-video encryption algorithms. IEEE Trans. Circuits Syst. Video Technol. 2007, 17, 214–223. [Google Scholar] [CrossRef] [Green Version]
  5. Nkapkop, J.D.D.; Effa, J.Y.; Borda, M.; Terebes, R. A Novel Fast and Secure Chaos Based Algorithm for Image Encryption. In Innovative Security Solutions for Information Technology and Communications; Springer: Berlin, Germany, 2015; pp. 87–101. [Google Scholar]
  6. Tsafack, N.; Kengne, J.; Abd-El-Atty, B.; Iliyasu, A.M.; Hirota, K.; Abd EL-Latif, A.A. Design and implementation of a simple dynamical 4-D chaotic circuit with its cryptographic applications. Inf. Sci. 2020, 515C, 191–217. [Google Scholar] [CrossRef]
  7. El-Latif, A.A.A.; Li, L.; Wang, N.; Han, Q.; Niu, X. A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Sign. Proces. 2013, 93, 2986–3000. [Google Scholar] [CrossRef]
  8. Li, L.; Abd-El-Atty, B.; El-Latif, A.A.A.; Ghoneim, A. Quantum color image encryption based on multiple discrete chaotic systems. In Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS), Prague, Czech Republic, 3–6 September 2017; pp. 555–559. [Google Scholar]
  9. Luo, X.; Zhou, R.; Liu, J.; Cao, Y.; Ding, X. A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn. 2018, 93, 1165–1181. [Google Scholar] [CrossRef] [Green Version]
  10. Khan, J.S.; Ahmad, J. Chaos based efficient selective image encryption. Multidimens. Syst. Signal Process. 2019, 30, 943–961. [Google Scholar] [CrossRef]
  11. Ahmad, J.; Khan, M.A.; Ahmed, F.; Khan, J.S. A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput. Appl. 2018, 30, 3847–3857. [Google Scholar] [CrossRef]
  12. Lu, Q.; Zhu, C.; Wang, G. A novel S-Box design Algorithm based on new compound chaotic system. Entropy 2019, 21, 1004. [Google Scholar] [CrossRef] [Green Version]
  13. Folifack, V.R.; Kengne, J. Coexistence of hidden attractors, 2-torus and 3-torus in a new simple 4-D chaotic system with hyperbolic cosine nonlinearity. Int. J. Bifurc. Chaos 2018, 6, 1421–1428. [Google Scholar]
  14. Njitacke, Z.T.; Kengne, J. Nonlinear Dynamics of Three-Neurons-Based Hopfield Neural Networks (HNNs): Remerging Feigenbaum Trees, Coexisting Bifurcations and Multiple Attractors. J. Circuits Syst. Comput. 2019, 28, 1950121. [Google Scholar] [CrossRef]
  15. Tsafack, N.; Kengne, J. A Particular Class of Simple Chaotic Circuits: Multistability Analysis; Lap LAMBERT Academic Publishing: Riga, Latvia, 2019; ISBN 978-613-9-46143-1. [Google Scholar]
  16. Kengne, J.; Jafari, S.; Njitacke, Z.T.; Yousefi, K.M.; Cheukem, A. Dynamic analysis and electronic circuit implementation of a novel 3D autonomous system without linear terms. Commun. Nonlinear Sci. Numer. Simul. 2017. [Google Scholar] [CrossRef]
  17. Kengne, J.; Njikam, S.M.; Folifack, V.R. A plethora of coexisting strange attractors in a simple jerk system with hyperbolic tangent nonlinearity. Chaos Solitons Fractals 2018, 106, 201–213. [Google Scholar] [CrossRef]
  18. Wang, B.; Xie, Y.; Zhou, C.; Zhou, S.; Zheng, X. Evaluating the permutation and diffusion operations used in image encryption based on chaotic map. Optik 2016, 127, 3541–3545. [Google Scholar] [CrossRef]
  19. Zhu, S.; Zhu, C.; Wang, W. A new image encryption algorithm based on chaos and secure Hash SHA-256. Entropy 2018, 20, 716. [Google Scholar] [CrossRef] [Green Version]
  20. Benrhouma, O.; Hermassi, H.; El-Latif, A.A.A.; Belghith, S. Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain. Signal Image Video Process. 2015, 9, 1281–1286. [Google Scholar] [CrossRef]
  21. Belazi, A.; Khan, M.; El-Latif, A.A.A.; Belghith, S. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn. 2017, 87, 337–361. [Google Scholar] [CrossRef]
  22. De la Hoz, M.Z.; Leonardo, A.; Yolanda, V. An experimental realization of a chaos-based secure communication using arduino microcontrollers. Sci. World. J. 2015. [Google Scholar] [CrossRef] [Green Version]
  23. Adolfo, R.; Nicolás, V.; Luis, G.; Carlos, V.A.; Onofre, G. Design, implementation and evaluation of a solar tracking system based on a video processing sensor. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2013, 3, 172–178. [Google Scholar]
  24. Nikhil, L.; Paygude, S.S. Survey on traffic monitoring system using image processing. Int. J. Adv. Res. Comput. Eng. Technol. 2014, 3, 4374–4377. [Google Scholar]
  25. Pukale, D.D.; Palak, C.; Adhikari, S.S. Density based traffic control system using video processing (hardware and software implementation). Imp. J. Interdiscip. Res. 2016, 2, 293–297. [Google Scholar]
  26. Preeti, N.; Neha, K. Hardware Design of Embedded Systems for Security Applications; INTECH: Copenhagen, Denmark, 2012. [Google Scholar] [CrossRef] [Green Version]
  27. Tsafack, N.; Kengne, J. A novel autonomous 5-d hyperjerk RC circuit with hyperbolic sine function. Sci. World J. 2018, 17. [Google Scholar] [CrossRef] [PubMed]
  28. Fortuna, L.; Rizzo, A.; Xibilia, M.G. Modeling complex dynamics via extended PWL-based CNNS. Int. J. Bifurc. Chaos 2003, 13, 3273–3286. [Google Scholar] [CrossRef]
  29. Li, C.; Sprott, J.C. Coexisting hidden attractors in a 4-D simplified Lorenz system. Int. J. Bifurc. Chaos 2014, 24, 1450034. [Google Scholar] [CrossRef]
  30. Dudkowski, D.; Prasad, A.; Kapitaniak, T. Perpetual points and hidden attractors in dynamical systems. Phys. Lett. A 2015, 379, 2591–2596. [Google Scholar] [CrossRef]
  31. Prasad, A. Existence of perpetual points in nonlinear dynamical systems and its applications. Int. J. Bifurc. Chaos 2015, 25, 1530005. [Google Scholar] [CrossRef] [Green Version]
  32. Song, X.H.; Wang, H.Q.; Venegas-Andraca, S.E.; El-Latif, A.A.A. Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map. Phys. A Stat. Mech. Appl. 2020, 537, 122660. [Google Scholar] [CrossRef]
  33. Azzaz, M.S.; Tanougast, C.; Sadoudi, S. A new auto-switched chaotic system and its FPGA implementation. Commun. Nonlinear Sci. Numer. Simul. 2013, 18, 1792–1804. [Google Scholar] [CrossRef]
  34. Murillo-Escobar, M.; Cruz-Hernández, C.; Abúndiz-Pérez, F. A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Exp. Syst. Appl. 2015, 42, 8198–8211. [Google Scholar] [CrossRef]
  35. Jasio, L.D. Programming 32-Bit Microcontrollers in C: Exploring the PIC32; Newnes: Burlington, VT, USA, 2008. [Google Scholar]
  36. Rodrigo, M.; Adrian, A.; Cesar, C.; Fausto, A.; Rigoberto, M. Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation. Front. Inf. Technol. Electron. Eng. 2018. [Google Scholar] [CrossRef]
  37. Veronique, G.; Pierre, P.; Daniel, F.; Taha, A. Chaos based cryptosystem on DSP. Chaos Solitons Fractals 2009, 42, 2135–2144. [Google Scholar]
  38. Siddiqui, R.A.; Grosvenor, R.I.; Prickett, P.W. dsPIC-based advanced data acquisition system for monitoring, control and security applications. In Proceedings of the 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 13–17 January 2015; pp. 293–298. [Google Scholar] [CrossRef]
  39. Uriz, A.J.; Agüero, P.D.; Moreira, J.C. Flexible pseudorandom number generator for tinnitus treatment implemented on a dsPIC. IEEE Latin Am. Trans. 2016, 14, 72–77. [Google Scholar] [CrossRef]
  40. Zhu, S.; Zhu, C. Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system. Multimed. Tools Appl. 2018, 77, 29119–29142. [Google Scholar] [CrossRef]
  41. Zhu, C.; Wang, G.; Sun, K. Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D chaotic maps. Entropy 2018, 20, 843. [Google Scholar] [CrossRef] [Green Version]
  42. Li, L.; Abd-El-Atty, B.; Elseuofi, S.; El-Rahiem, B.A.; El-Latif, A.A.A. Quaternion and multiple chaotic systems based pseudo-random number generator. In Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 1–3 May 2019. [Google Scholar]
  43. Deng, Z.; Zhong, S. A digital image encryption algorithm based on chaotic mapping. J. Algorithms Comput. Technol. 2019, 13, 1–11. [Google Scholar] [CrossRef]
  44. Chong, F.; Chen, J.J.; Zou, H.; Meng, W.H.; Zhan, Y.F. A chaos-based digital image encryption with an improved permutation strategy. Opt. Express 2012, 20, 2363–2378. [Google Scholar]
  45. Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Inf. Sci. 2019, 480, 403–419. [Google Scholar] [CrossRef]
  46. Wang, X.; Feng, L.; Zhao, H. Fast image encryption algorithm based on parallel computing system. Inf. Sci. 2019, 486, 340–358. [Google Scholar] [CrossRef]
  47. Ravichandran, D.; Praveenkumar, P.; Rayappan, J.B.B.; Amirtharajan, R. Dna chaos blend to secure medical privacy. IEEE Trans. Nanobiosci. 2017, 16, 850–858. [Google Scholar] [CrossRef]
  48. Lv, X.; Liao, X.; Yang, B. A novel scheme for simultaneous image compression and encryption based on wavelet packet transform and multi-chaotic systems. Multimed. Tools Appl. 2018, 77, 28633–28663. [Google Scholar] [CrossRef]
  49. Xu, M.; Tian, Z. A novel image cipher based on 3d bit matrix and latin cubes. Inf. Sci. 2019, 478, 1–14. [Google Scholar] [CrossRef]
  50. Abd-El-Atty, B.; El-Latif, A.A.A.; Venegas-Andraca, S.E. An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quantum Inf. Process. 2019, 18, 272. [Google Scholar] [CrossRef]
  51. Deb, S.; Biswas, B.; Bhuyan, B. Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field. Multimed. Tools Appl. 2019, 78, 34901–34925. [Google Scholar] [CrossRef]
  52. Behnis, S.; Akhshani, A.; Ahadpour, S.; Mahnodi, H.; Akhavan, A. A fast-chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys. Lett. A 2007, 366, 391–396. [Google Scholar] [CrossRef]
  53. Wang, X.Y.; Zhao, J.F.; Liu, H.J. A new image encryption algorithm based on chaos. Opt. Commun. 2012, 285, 562–566. [Google Scholar] [CrossRef]
  54. Gao, T.G.; Chen, Z.Q. A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 2008, 372, 394–400. [Google Scholar] [CrossRef]
  55. Zhu, C.; Wang, G.; Sun, K. Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos-based S-box. Symmetry 2018, 10, 399. [Google Scholar] [CrossRef] [Green Version]
  56. Zhu, S.; Wang, G.; Zhu, C. A secure and fast image encryption scheme based on double chaotic s-boxes. Entropy 2019, 21, 790. [Google Scholar] [CrossRef] [Green Version]
  57. Peng, J.; El-Latif, A.A.A.; Belazi, A.; Kotulski, Z. Efficient chaotic nonlinear component for secure cryptosystems. In Proceedings of the 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), Milan, Italy, 4–7 July 2017; pp. 989–993. [Google Scholar]
Figure 1. Dynamics of the 5-D oscillator for conditions ( a 0   ,   a 1   ,   a 3   ,   a 4   ,   b   ,   l 1   ,   l 2 ) = ( 1.5   ,   2.6   ,   1   , 0.6 ,   3   ,   1   ,   2.6 ) . (a) bifurcation diagram and (b) Lyapunov spectrum.
Figure 1. Dynamics of the 5-D oscillator for conditions ( a 0   ,   a 1   ,   a 3   ,   a 4   ,   b   ,   l 1   ,   l 2 ) = ( 1.5   ,   2.6   ,   1   , 0.6 ,   3   ,   1   ,   2.6 ) . (a) bifurcation diagram and (b) Lyapunov spectrum.
Sensors 20 00083 g001
Figure 2. Four views of the 5D Hyperjerk attractor with stable equilibrium point (shown as a red dot) with various projections: (a) x 1 x 2 , (b) x 3 x 1 , (c) x 2 x 4 , (d) x 3 x 5 .
Figure 2. Four views of the 5D Hyperjerk attractor with stable equilibrium point (shown as a red dot) with various projections: (a) x 1 x 2 , (b) x 3 x 1 , (c) x 2 x 4 , (d) x 3 x 5 .
Sensors 20 00083 g002
Figure 3. Dynamics of the 5-D Hyperjerk oscillator illustrating multistability.
Figure 3. Dynamics of the 5-D Hyperjerk oscillator illustrating multistability.
Sensors 20 00083 g003
Figure 4. Blow-up of bifurcation plot in Figure 3 for the range 3.405 a 2 3.455 .
Figure 4. Blow-up of bifurcation plot in Figure 3 for the range 3.405 a 2 3.455 .
Sensors 20 00083 g004
Figure 5. Evidence of strange attractor coexisting with period-2 limit cycle.
Figure 5. Evidence of strange attractor coexisting with period-2 limit cycle.
Sensors 20 00083 g005
Figure 6. Illustration of coexistence of strange atrractor with limit cycles for different initial conditions: (a) (0.4,0,0,0,0) and (1.2,0,0,0,0); (b) (5.2,0,0,0,0); (c) (4,0,0,0,0); (d) (4.4,0,0,0,0).
Figure 6. Illustration of coexistence of strange atrractor with limit cycles for different initial conditions: (a) (0.4,0,0,0,0) and (1.2,0,0,0,0); (b) (5.2,0,0,0,0); (c) (4,0,0,0,0); (d) (4.4,0,0,0,0).
Sensors 20 00083 g006
Figure 7. Offset-boosting of chaotic attractor for varying control parameter (k) values: (a) in x 1     x 2 plane, (b) in x 1     x 3 plane and (c) in x 1     x 4 plane for k = 0 (black) k = 4 (red), and k = 8 (green).
Figure 7. Offset-boosting of chaotic attractor for varying control parameter (k) values: (a) in x 1     x 2 plane, (b) in x 1     x 3 plane and (c) in x 1     x 4 plane for k = 0 (black) k = 4 (red), and k = 8 (green).
Sensors 20 00083 g007
Figure 8. Design of square nonlinearity for circuit values R 1 = 10 k Ω ;     R 2 = 4 k Ω ;     R 3 = 30 k Ω .
Figure 8. Design of square nonlinearity for circuit values R 1 = 10 k Ω ;     R 2 = 4 k Ω ;     R 3 = 30 k Ω .
Sensors 20 00083 g008
Figure 9. Circuit design for implementation of proposed 5-D hyperjerk system.
Figure 9. Circuit design for implementation of proposed 5-D hyperjerk system.
Sensors 20 00083 g009
Figure 10. Design of the cube function for circuit values R 1 = 200 k Ω ; R 2 = 100 k Ω ;     R 3 = 12 k Ω ; R 4 = 2 k Ω ; R 5 = 15 k Ω ;     R 6 = 10 k Ω .
Figure 10. Design of the cube function for circuit values R 1 = 200 k Ω ; R 2 = 100 k Ω ;     R 3 = 12 k Ω ; R 4 = 2 k Ω ; R 5 = 15 k Ω ;     R 6 = 10 k Ω .
Sensors 20 00083 g010
Figure 11. Transfer functions for the cube square functions as obtained Pspice simulation of the circuits in Figure 8 and Figure 10.
Figure 11. Transfer functions for the cube square functions as obtained Pspice simulation of the circuits in Figure 8 and Figure 10.
Sensors 20 00083 g011
Figure 12. Phase plots for of the proposed 5D Hyperjerk system as observed via Pspice simulation of the network for component values listed in Table 3 and initial conditions set at (1, 1, 1, 1, 1).
Figure 12. Phase plots for of the proposed 5D Hyperjerk system as observed via Pspice simulation of the network for component values listed in Table 3 and initial conditions set at (1, 1, 1, 1, 1).
Sensors 20 00083 g012
Figure 13. Evidence of presence of coexistence of hidden chaotic attractor with a hidden limit cycle as observed via Pspice simulation of the network for component values listed in Table 3 and initial conditions are set at (1, 1, 1, 1, 1) and (10, 0, 0, 0, 0).
Figure 13. Evidence of presence of coexistence of hidden chaotic attractor with a hidden limit cycle as observed via Pspice simulation of the network for component values listed in Table 3 and initial conditions are set at (1, 1, 1, 1, 1) and (10, 0, 0, 0, 0).
Sensors 20 00083 g013
Figure 14. Chaos generation via experimental operation using Arduino Uno board.
Figure 14. Chaos generation via experimental operation using Arduino Uno board.
Sensors 20 00083 g014
Figure 15. Experimental result at pin 5 of Arduino Uno.
Figure 15. Experimental result at pin 5 of Arduino Uno.
Sensors 20 00083 g015
Figure 16. Outline of proposed permutation-substitution image encryption scheme based on sequences x1, x2, x3, x4, x5 of the 5-D hyperjerk chaotic generator.
Figure 16. Outline of proposed permutation-substitution image encryption scheme based on sequences x1, x2, x3, x4, x5 of the 5-D hyperjerk chaotic generator.
Sensors 20 00083 g016
Figure 17. Visual test results showing the plain image and its cipher version.
Figure 17. Visual test results showing the plain image and its cipher version.
Sensors 20 00083 g017
Figure 18. Histograms of original and encrypted images in Figure 17.
Figure 18. Histograms of original and encrypted images in Figure 17.
Sensors 20 00083 g018
Figure 19. Correct decoding of Boats image and decoding by a slightly changed keys.
Figure 19. Correct decoding of Boats image and decoding by a slightly changed keys.
Sensors 20 00083 g019
Figure 20. Effect of noise on the cipher Boats image: (a) Noise infected cipher image; (b) successful decrypted image.
Figure 20. Effect of noise on the cipher Boats image: (a) Noise infected cipher image; (b) successful decrypted image.
Sensors 20 00083 g020
Table 1. Strategies and parameter settings used to obtain coexisting bifurcations (as indicated in the table).
Table 1. Strategies and parameter settings used to obtain coexisting bifurcations (as indicated in the table).
Figure NumberGraph ColourParameter RangeSweeping DirectionInitial State
(x1(0),x2(0),x3(0),x4(0),x5(0))
7Green 2 a 2 4 Downward(4,0,0,0,0,0)
Red 2 a 2 4 Downward(4.4,0,0,0,0,0)
Blue 3.212 a 2 4 Upward(5.2,0,0,0,0,0)
Black 2 a 2 4 Downward(0.4,0,0,0,0,0)
10Green 3.405 a 2 3.454 Downward(4,0,0,0,0,0)
Red 3.405 a 2 3.454 Downward(4.4,0,0,0,0,0)
Blue 3.405 a 2 3.454 Upward(5.2,0,0,0,0,0)
Black 3.405 a 2 3.454 Downward(0.4,0,0,0,0,0)
Cyan 3.405 a 2 3.454 Downward (1.2,0,0,0,0)
Table 2. Numerical initial conditions for multistability analysis for selected parameters ( a 0   ,   a 1 ,   a 3   ,   a 4   ,   b   ,   l 1   ,   l 2 ) = ( 1.5   ,   3   ,   1   , 1   ,   3   ,   1   ,   2.6 ) .
Table 2. Numerical initial conditions for multistability analysis for selected parameters ( a 0   ,   a 1 ,   a 3   ,   a 4   ,   b   ,   l 1   ,   l 2 ) = ( 1.5   ,   3   ,   1   , 1   ,   3   ,   1   ,   2.6 ) .
Figure NumberType of Coexistence Control Parameter (a2)Numerical Initial Conditions
8One cycle and a chaotic attractor with fixed point2.9(4,0,0,0,0,0), (6,0,0,0,0,0)
11Three different limit cycles and a chaotic attractor with fixed point3.454(a) (0.4,0,0,0,0), (1.2,0,0,0,0);
(b) (5.2,0,0,0,0);
(c) (4,0,0,0,0);
(d) (4.4,0,0,0,0)
Table 3. Component values used in circuit simulation analysis.
Table 3. Component values used in circuit simulation analysis.
ComponentsPropertyRating
RResistance10 kΩ
Ra0Resistance6.66 kΩ
Ra1Resistance3.33 kΩ
Ra2Resistance3.5 kΩ
Ra3Resistance10 kΩ
RbResistance3.33 kΩ
R1Resistance3.85 kΩ
R2Resistance277.77 kΩ
R3Resistance0.1 kΩ
Ci(i = 1,…5)Capacitance 10 η F
Ui(i = 1,…5)Operational AmplifierTL084
Table 4. Correlation coefficients for the plain image and the related encrypted version.
Table 4. Correlation coefficients for the plain image and the related encrypted version.
Correlation Coefficients
ImagePlain ImageCipher Version
DirectionDiagonalHorizontalVerticalDiagonalHorizontalVertical
[10]0.94660.98390.9526−0.0474−0.0330.0068
[11]0.91160.92820.9644−0.03190.02450.0295
[55]0.88880.95670.9239−0.000120.0006−0.0052
Proposed method
Boats0.94520.92660.8855−0.00070.0007−0.0015
Bridge0.92030.94030.8866−0.00270.0008−0.001
Clock0.97670.95780.9426−0.00010.0007−0.0023
Table 5. Assessment of information entropy for encrypted image.
Table 5. Assessment of information entropy for encrypted image.
Encryption AlgorithmEntropy
[10] Greyscale flower image7.9969
[11] Cameraman image 7.9455
Proposed method
Boats7.9976
Bridge7.9974
Clock7.9975
Table 6. Comparative analysis of UACI and NPCR values with respect to encrypted image.
Table 6. Comparative analysis of UACI and NPCR values with respect to encrypted image.
Encryption AlgorithmNPCR (%)UACI (%)
[10] Grey flower image99.1533.21
[11] Cameraman image99.3433.61
Proposed method
Boats99.6233.69
Bridge99.6033.24
Clock99.6435.26
Table 7. Encryption time (in seconds).
Table 7. Encryption time (in seconds).
ProcessImage Size
32 × 3264 × 64128 × 128256 × 256512 × 5121024 × 1024
Iterations for 5DHO chaos generation0.0001660.0007280.0029000.0106000.0412000.178700
Constructing permutation sequences (Ph and Pw)0.0001050.0001720.0004330.0022000.0095000.032100
Constructing substitution sequence (Sb)0.0007300.0007300.0007300.0007300.0007300.000730
Encryption process0.0011000.0045000.0149000.0537000.0627000.968700
Total time0.0021000.0061300.0189630.0672300.1141301.180230
Table 8. Encryption time (in seconds) where N.R. = Not reported implies that the parameter was not reported in the cited study.
Table 8. Encryption time (in seconds) where N.R. = Not reported implies that the parameter was not reported in the cited study.
Encryption AlgorithmImage Size
32 × 3264 × 64128 × 128256 × 256512 × 5121024 × 1024
[43]N.R0.00450.0163 0.0629 0.2673 1.2157
[52]N.RN.RN.R0.04600.23000.9530
[53]N.RN.RN.R0.07900.2454N.R
[54]N.RN.RN.RN.R0.2141N.R
Proposed method0.00210.00620.01900.06720.11411.1802
Table 9. NIST SP 800-22 tests results.
Table 9. NIST SP 800-22 tests results.
Test-NameP-ValueResult
Frequency0.890240Passed
Block-frequency0.563092Passed
DFT0.378341Passed
Rank0.236565Passed
Runs0.089504Passed
Longest runs of ones0.172795Passed
Overlapping templates0.320178Passed
No overlapping templates0.465065Passed
Universal0.518372Passed
Approximate entropy0.844091Passed
Linear complexity0.042035Passed
Cumulative sums (forward)0.793995Passed
Cumulative sums (reverse)0.899532Passed
Serial test 10.179396Passed
Serial test 20.662233Passed
Random excursions x = 10.207249Passed
Random excursions variant x = 10.042985Passed

Share and Cite

MDPI and ACS Style

Nestor, T.; De Dieu, N.J.; Jacques, K.; Yves, E.J.; Iliyasu, A.M.; Abd El-Latif, A.A. A Multidimensional Hyperjerk Oscillator: Dynamics Analysis, Analogue and Embedded Systems Implementation, and Its Application as a Cryptosystem. Sensors 2020, 20, 83. https://doi.org/10.3390/s20010083

AMA Style

Nestor T, De Dieu NJ, Jacques K, Yves EJ, Iliyasu AM, Abd El-Latif AA. A Multidimensional Hyperjerk Oscillator: Dynamics Analysis, Analogue and Embedded Systems Implementation, and Its Application as a Cryptosystem. Sensors. 2020; 20(1):83. https://doi.org/10.3390/s20010083

Chicago/Turabian Style

Nestor, Tsafack, Nkapkop Jean De Dieu, Kengne Jacques, Effa Joseph Yves, Abdullah M. Iliyasu, and Ahmed A. Abd El-Latif. 2020. "A Multidimensional Hyperjerk Oscillator: Dynamics Analysis, Analogue and Embedded Systems Implementation, and Its Application as a Cryptosystem" Sensors 20, no. 1: 83. https://doi.org/10.3390/s20010083

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop