Figure 1.
Relationships among three kinds of oscillators. Our proposed oscillator is a special one located at the intersection of three areas.
Figure 1.
Relationships among three kinds of oscillators. Our proposed oscillator is a special one located at the intersection of three areas.
Figure 2.
Bifurcation diagram for d, the initial conditions .
Figure 2.
Bifurcation diagram for d, the initial conditions .
Figure 3.
Maximum Lyapunov exponents for d, the initial conditions .
Figure 3.
Maximum Lyapunov exponents for d, the initial conditions .
Figure 4.
Butterfly-shape attractor observed in the oscillator for .
Figure 4.
Butterfly-shape attractor observed in the oscillator for .
Figure 5.
Coexisting chaotic attractors for two initial conditions (blue) and (red).
Figure 5.
Coexisting chaotic attractors for two initial conditions (blue) and (red).
Figure 6.
Adjancency graph of the identical neural network.
Figure 6.
Adjancency graph of the identical neural network.
Figure 7.
Mesh plot of the evolution in time of the identical neural network with neurons.
Figure 7.
Mesh plot of the evolution in time of the identical neural network with neurons.
Figure 8.
Contour plot of the evolution in time of the identical neural network with neurons.
Figure 8.
Contour plot of the evolution in time of the identical neural network with neurons.
Figure 9.
Mesh plot of the evolution in time of the error variables of the identical neural network with neurons.
Figure 9.
Mesh plot of the evolution in time of the error variables of the identical neural network with neurons.
Figure 10.
Contour plot of the evolution in time of the error variables of the identical neural network with neurons.
Figure 10.
Contour plot of the evolution in time of the error variables of the identical neural network with neurons.
Figure 11.
Plot of the evolution in time of the variables of the identical neural network with neurons.
Figure 11.
Plot of the evolution in time of the variables of the identical neural network with neurons.
Figure 12.
Adjacency graph of the non-identical neural network.
Figure 12.
Adjacency graph of the non-identical neural network.
Figure 13.
Mesh plot of the evolution in time of the non-identical neural network with neurons.
Figure 13.
Mesh plot of the evolution in time of the non-identical neural network with neurons.
Figure 14.
Contour plot of the evolution in time of the non-identical neural network with neurons.
Figure 14.
Contour plot of the evolution in time of the non-identical neural network with neurons.
Figure 15.
Mesh plot of the evolution in time of the error variables of the non-identical neural network with neurons.
Figure 15.
Mesh plot of the evolution in time of the error variables of the non-identical neural network with neurons.
Figure 16.
Contour plot of the evolution in time of the error variables of the non-identical neural network with neurons.
Figure 16.
Contour plot of the evolution in time of the error variables of the non-identical neural network with neurons.
Figure 17.
Plot of the evolution in time of the variables of the non-identical neural network with neurons.
Figure 17.
Plot of the evolution in time of the variables of the non-identical neural network with neurons.
Figure 18.
Evolution in time of the neurons while varying the number of pinned nodes for the identical synchronization case.
Figure 18.
Evolution in time of the neurons while varying the number of pinned nodes for the identical synchronization case.
Figure 19.
Evolution in time of the errors while varying the number of pinned nodes for the identical synchronization case.
Figure 19.
Evolution in time of the errors while varying the number of pinned nodes for the identical synchronization case.
Figure 20.
Evolution in time of the neurons while varying the number of pinned nodes for the non-identical synchronization case.
Figure 20.
Evolution in time of the neurons while varying the number of pinned nodes for the non-identical synchronization case.
Figure 21.
Evolution in time of the errors while varying the number of pinned nodes for the non-identical synchronization case.
Figure 21.
Evolution in time of the errors while varying the number of pinned nodes for the non-identical synchronization case.
Figure 22.
Flow chart diagram showing the key steps of the implementation of the oscillator using a microcontroller board.
Figure 22.
Flow chart diagram showing the key steps of the implementation of the oscillator using a microcontroller board.
Figure 23.
Phase portrait of the oscillator with butterfly attractor captured from the oscilloscope after its implementation using a microcontroller board. The oscilloscope probes are numbered 1 and 2.
Figure 23.
Phase portrait of the oscillator with butterfly attractor captured from the oscilloscope after its implementation using a microcontroller board. The oscilloscope probes are numbered 1 and 2.
Figure 24.
Key steps involved in developing the algorithm based on oscillator with butterfly attractors.
Figure 24.
Key steps involved in developing the algorithm based on oscillator with butterfly attractors.
Figure 25.
Implementation results of the encryption algorithm based on oscillator with butterfly attractors. (a) Plain image of Cerebral Infarction, (b) plain image of Kidney Cancer, (c) plain image of Intracerebral Hemorrhage, (d) encrypted image of Cerebral Infarction, (e) encrypted image of Kidney Cancer, (f) encrypted image of Intracerebral Hemorrhage, (g) decrypted image of Cerebral Infarction, (h) decrypted image of Kidney Cancer, (i) decrypted image of Intracerebral Hemorrhage.
Figure 25.
Implementation results of the encryption algorithm based on oscillator with butterfly attractors. (a) Plain image of Cerebral Infarction, (b) plain image of Kidney Cancer, (c) plain image of Intracerebral Hemorrhage, (d) encrypted image of Cerebral Infarction, (e) encrypted image of Kidney Cancer, (f) encrypted image of Intracerebral Hemorrhage, (g) decrypted image of Cerebral Infarction, (h) decrypted image of Kidney Cancer, (i) decrypted image of Intracerebral Hemorrhage.
Figure 26.
Key sensitivity test results. (a) Correct keys, (b) , (c) , (d) , (e) , (f) , (g) , (h) , (i) .
Figure 26.
Key sensitivity test results. (a) Correct keys, (b) , (c) , (d) , (e) , (f) , (g) , (h) , (i) .
Figure 27.
Histogram of input original images (a), encrypted images (b), and decrypted images (c).
Figure 27.
Histogram of input original images (a), encrypted images (b), and decrypted images (c).
Figure 28.
Effects of the Gaussian noise on the performance of the algorithm. (a1–a3) encrypted image with 0.01, 0.05, and 0.1 Gaussian noise, respectively. (b1–b3) Corresponding decrypted images.
Figure 28.
Effects of the Gaussian noise on the performance of the algorithm. (a1–a3) encrypted image with 0.01, 0.05, and 0.1 Gaussian noise, respectively. (b1–b3) Corresponding decrypted images.
Figure 29.
Effects of the Salt and Pepper noise on the performance of the algorithm. (a1–a3) Encrypted image with 0.01, 0.05, and 0.1 Salt and Pepper noise, respectively. (b1–b3) Corresponding decrypted images.
Figure 29.
Effects of the Salt and Pepper noise on the performance of the algorithm. (a1–a3) Encrypted image with 0.01, 0.05, and 0.1 Salt and Pepper noise, respectively. (b1–b3) Corresponding decrypted images.
Figure 30.
Impact of data loss on the performance of the algorithm. (a1–a3) Encrypted image with , , and data loss, respectively. Black squares represent the portion of data that has been lost. (b1–b3) Corresponding decrypted images.
Figure 30.
Impact of data loss on the performance of the algorithm. (a1–a3) Encrypted image with , , and data loss, respectively. Black squares represent the portion of data that has been lost. (b1–b3) Corresponding decrypted images.
Table 1.
Comparison with related models showing the uniqueness of our proposed oscillator.
Table 1.
Comparison with related models showing the uniqueness of our proposed oscillator.
| System | Term | Equilibrium | Butterfly Attractor |
|---|
| [9] | 5 | finite | no |
| [10] | 5 | 4 | no |
| [11] | 5 | 3 | no |
| [12] | 5 | 2 | no |
| [13] | 5 | 1 | no |
| [14] | 5 | none | no |
| This work | 5 | none | yes |
Table 2.
Root mean square error of the error variable for the identical and non-identical cases.
Table 2.
Root mean square error of the error variable for the identical and non-identical cases.
| Synchronization Type | | | | | |
|---|
| Identical | 1.77955 | 1.54799 | 0.487959 | 0.377794 | 0.20718 |
| Non-identical | 1.62723 | 0.784888 | 0.567608 | 0.388094 | 0.275844 |
Table 3.
The implementation details for the Arduino Due (SAM3X8E).
Table 3.
The implementation details for the Arduino Due (SAM3X8E).
| Metric Category | Parameter | Technical Specification or Value |
|---|
| Hardware Platform | Microcontroller | Atmel SAM3X8E (ARM Cortex-M3, 32-bit) |
| Clock Speed | 84 MHz |
| Numerical Accuracy | Arithmetic Format | 64-bit Double Precision |
| Integration Scheme | 4th Order Runge–Kutta (RK4) |
| Integration Step | 0.01 |
| Integration Error | < |
| Timing Constraints | Sampling Period | 1.0 ms |
| Computational Load | Execution Time | 72 μs |
| CPU Utilization | 7.2% |
| Output and Precision | Signal Resolution | 12-bit (Internal DAC0/DAC1) |
| Voltage Resolution | 0.805 mV (per LSB at 3.3 V) |
Table 4.
Information entropies of original and cipher images.
Table 4.
Information entropies of original and cipher images.
| Version of Image | Cerebral Infarction | Kidney Cancer | Intracerebral Hemorrhage |
|---|
| Original image | 5.5625 | 6.7736 | 4.7512 |
| Cipher image | 7.9972 | 7.9973 | 7.9975 |
Table 5.
The degree of resemblance between adjacent pixels of the grey-scale images.
Table 5.
The degree of resemblance between adjacent pixels of the grey-scale images.
| Direction | Gray-Scale Images | Cipher Images |
|---|
|
Cerebral
|
Kidney
|
Intracerebral
|
Cerebral
|
Kidney
|
Intracerebral
|
|---|
|
Infarction
|
Cancer
|
Hemorrhage
|
Infarction
|
Cancer
|
Hemorrhage
|
|---|
| Horizontal | 0.9531 | 0.9409 | 0.9407 | −0.00067 | 0.00092 | −0.00052 |
| Vertical | 0.9539 | 0.9593 | 0.9336 | −0.00017 | −0.00033 | −0.0008 |
| Diagonal | 0.9242 | 0.9112 | 0.8890 | 0.00036 | −0.00036 | 0.00044 |
| Average | 0.9437 | 0.9371 | 0.9211 | −0.00015 | −0.00077 | −0.00029 |
Table 6.
Results of differential attacks analysis.
Table 6.
Results of differential attacks analysis.
| Image | NPCR (%) | UACI (%) |
|---|
| Cerebral Infarction | 99.5972 | 33.4590 |
| Kidney Cancer | 99.5819 | 37.4571 |
| Intracerebral Hemorrhage | 99.6185 | 33.5077 |
Table 7.
Performance comparison between the image encryption algorithm developed in this work with some related image encryption methods.
Table 7.
Performance comparison between the image encryption algorithm developed in this work with some related image encryption methods.
| Algorithm | Entropy | Correlation Coefficients of Adjacent Pixels | NPCR (%) | UACI (%) |
|---|
|
H
|
V
|
D
|
|---|
| Our algorithm | 7.9972 | | | | 99.5972 | 33.4590 |
| Ref. [42] | 7.9788 | | | | 99.6082 | 33.0228 |
| Ref. [43] | 7.9972 | | | | 99.60 | 28.6200 |
| Ref. [44] | 7.9970 | | | | 99.5911 | 33.5648 |
| Ref. [45] | 7.9967 | | | | 99.6307 | 33.1598 |
| Ref. [46] | 7.9964 | | | | 99.6185 | 33.6245 |