Next Article in Journal
Modelling the Stages of Pre-Project Preparation and Design Development in the Life-Cycle of an Investment and Construction Project
Previous Article in Journal
Classification and Object Detection of 360° Omnidirectional Images Based on Continuity-Distortion Processing and Attention Mechanism
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Two-Dimensional Dynamic Pseudo-Random Coupled Map Lattices System Based on Partitioned Elementary Cellular Automata

1
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
Beijing Electronic Science and Technology Institute, Beijing 100070, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(23), 12399; https://doi.org/10.3390/app122312399
Submission received: 10 October 2022 / Revised: 23 November 2022 / Accepted: 1 December 2022 / Published: 4 December 2022

Abstract

:
This paper proposes a novel spatiotemporal chaotic system with two-dimensional dynamic pseudo-random coupled map lattices (2D-DPRCML) based on partitioned elementary cellular automata (PECA). In the system iteration, coupling lattices are chosen based on the chaotic PECA, and the iterative results of PECA are also employed as the perturbation for the system. We investigate the system’s chaotic properties, including bifurcation diagrams, Kolmogorov-Sinai entropy density and universality. In addition, the output sequences were analyzed for uniformity and randomness. The correlations between the system lattices are also explored. The simulation results and theoretical analysis demonstrate that the 2D-DPRCML system possesses excellent chaotic performance, and the output sequences show good uniformity and randomness, indicating that the 2D-DPRCML system is capable of resisting the return maps attack. It is evident from all these advantages that the proposed system is ideal for use in cryptography.

1. Introduction

Chaotic systems are complex nonlinear dynamic systems with special properties, including initial condition sensitivity, aperiodicity, pseudo-randomness and non-predictability [1,2]. In 1963, Lorenz proposed the chaotic system [3], which has been widely applied ever since. At the same time, as many properties are well suited to the design philosophy of cryptographic algorithms, numerous scholars have applied chaotic maps in the field of cryptography [4,5,6,7,8] and secure communication [9,10,11]. However, while chaotic systems are implemented in computers or other digital systems, their state space becomes finite, which causes the output sequence to exhibit short periods, strong correlations and local linearity drawbacks. This phenomenon is called dynamical degeneration [12,13,14], reducing the security of digital chaotic cryptosystems. Many schemes have been proposed to solve this problem, and these schemes can be divided into three categories: implementing digital chaotic maps on higher precision devices [15], cascading multiple chaotic maps [16,17] and introducing the perturbation [18]. Li et al. [12] provided the following analysis of these three schemes. Firstly, by increasing precision, we only extend the mean period length of all pseudo-orbits instead of the period length of each of them, so this is not a suitable solution for addressing numerically chaotic systems’ dynamic degradation. Secondly, when multiple chaotic maps are cascaded together, the orbital period becomes longer, but the dynamical properties of the system become more anomalous as a result Finally, the perturbation-based algorithm is more effective in mitigating the dynamic degradation than the first two methods. Furthermore, in the perturbation scheme, perturbation output is more effective than perturbing the input or control parameters [19,20,21].
The irreversibility, good diffusivity and initial value sensitivity of the spatiotemporal chaotic (SC) system [22,23,24] make it a hot research topic in the area of chaotic cryptography. In the spatiotemporal chaotic system, the mutual perturbation between different lattices enables the system to have a more complex dynamical behavior, which effectively alleviates the dynamical degradation. Since Kaneko initially proposed the coupled map lattices (CMLs) in 1985 [25], an increasing number of scholars have studied them and designed CML-based spatiotemporal chaotic systems. In general, SC systems can be classified into two categories according to their dimensionality: one-dimensional (1D) [4,26,27] and high-dimensional [7,28,29]. In one-dimensional SC systems, the lattices have only one direction, so their processing capacity is limited. In high-dimensional SC systems, two-dimensional (2D) SC systems are the most common. They not only possess a larger lattice space, but also possess better chaotic properties which are more suitable for image encryption [30]. Compared to 1D CML, 2D CML possesses faster energy transfer rates. At the same time, the increased dimensionality can enhance the system’s complexity and make it more difficult to be cracked by inverse operations. Refs. [29,30] developed a 2D nonlinear coupling scheme. In their scheme, the coupled approach is on the basis of the chaotic Arnold cat map, and this coupling approach reinforces the chaotic behavior of the system. However, although coupling is performed using the nonlinear function, the choice of the coupling lattices in each iteration is fixed because the parameters of the nonlinear function are fixed and iterate only once. Moreover, the periodic window is still present in its bifurcation diagram. Ref. [7] designed 2D mixed pseudo-random coupled map lattices based on the piecewise linear chaotic maps and Sin (PWLCM-Sin) map, which possesses excellent aperiodicity. In this coupling scheme, the choice of coupling lattice changes continuously with iteration, which significantly enhances the performance of the chaotic system. However, in the performance analysis of this system, its return map is easily recognizable, and the uniformity of its output sequences is not very good, indicating that it is sensitive to attacks based on the return map technique or statistics.
Although the above schemes effectively alleviate dynamic degradation, with the development of computer technology, chaotic systems are increasingly vulnerable to attacks by phase space reconstruction or return map methods. Zhang et al. [31] utilized a conceptual network based on phase space reconstruction to forecast the time series produced by chaotic systems. In their scheme, the prediction accuracy is significantly improved. Moreover, Peng et al. [32] proposed a modified return maps technique for estimating the parameters of chaotic systems. The modified approach can even estimate the parameters in the fractional-order chaotic system effectively. To sum up, there is no doubt that the improvement of these schemes has brought security threats to chaotic encryption.
In order to remedy the drawbacks mentioned above, a novel two-dimensional dynamic pseudo-random CML (2D-DPRCML) system is developed, and a new perturbation scheme is applied to this system. The computation of the index of the coupled lattice in this system is dynamic and pseudo-random, and it is based on the output of chaotic partitioned elementary cellular automata (PECA). Furthermore, the output of PECA is also employed to calculate perturbations. The approach in this paper is an extension and improvement of our previous work [33]. The two-dimensional coupling scheme proposed in this paper attempts to select coupling lattices at different orientations and positions pseudo-randomly, and a new perturbation algorithm is devised. The PECA designed in the proposed system can increase the perturbation period further compared to the elementary cellular automata used in the previous system. Additionally, in the previous system, the perturbation value of each lattice must be calculated separately in each iteration. However, in the proposed system, only one perturbation is computed per iteration, and the variation in the perturbation for different lattices is achieved by adding different symbols, which reduces the computational effort and speeds up the operation of the proposed system in comparison to the previous method. The points of innovation in this paper are as follows:
A partitioned elementary cellular automata (PECA) is designed for the coupling scheme and perturbation algorithm. The elementary cellular automata (ECA) [34] is only one-dimensional, and its data volume is insufficient for a two-dimensional SC system. Therefore, in this article, a special PECA with two different chaos rules is devised. This chaotic PECA can generate two-dimensional iterative results with pseudo-randomness.
A new PECA-based dynamic pseudo-random coupling scheme is devised. Instead of employing fixed lattices for coupling, the lattices selected for coupling by the 2D-DPRCML system are determined by the iterative outputs of PECA. The PECA is iterated when calculating each lattice, so the process of selecting the coupling lattice by the system becomes dynamic and pseudo-random. Moreover, the 2D-DPRCML system can be reproduced as long as the initial values and local transition rules of PECA are known, which means that this system is applicable to cryptography.
A novel PECA-based perturbation algorithm is proposed. The iterative results of PECA are used to add different perturbations to each lattice in the DPRCML system. Such an approach brings several advantages. Firstly, the period window in the bifurcation graph vanishes, indicating the better aperiodicity of the proposed system. Secondly, according to certain analysis [12], the dynamical degradation is further alleviated. On the one hand, PECA is essentially a discrete dynamical system whose iterations are not affected by the precision of digital systems, so there is no degradation in PECA. On the other hand, some special local transition rules of the ECA lead to chaos [34], which is pseudo-random and unpredictable. Thirdly, the correlation among different lattices is considerably reduced due to the addition of different perturbations to individual lattices. Fourthly, the fixed shape in the return map is broken. In addition, a remarkable enhancement of uniformity and randomness is achieved by this system. In conclusion, the PECA-based perturbation improves the unpredictability and complexity of the 2D-DPRCML system, which can effectively resist the attack of phase space reconstruction or the return maps method.
The following contents of this paper are as follows: Section 2 presents the preliminary knowledge of 2D CML and PECA a complete description of the 2D-DPRCML system is presented in Section 3, Section 4 analyzes the performance of the 2D-DPRCML system and Section 5 summarizes the full article.

2. Preliminaries

2.1. D CML System

The mathematical structure of the two-dimensional coupled map lattices (2D-CML) system is expressed as:
x n + 1 ( i , j ) = ( 1 ε ) f [ x n ( i , j ) ] +                                     ε 4 { f [ x n ( i + 1 , j ) ] + f [ x n ( i 1 , j ) ] + f [ x n ( i , j + 1 ) ] + f [ x n ( i , j 1 ) ] } ,
where n = 1, 2, 3, … represents the time dimension. i = 1, 2, 3, …, R and j = 1, 2, 3, …, L denote the row and column indexes of the system, respectively. The number of lattices is R  ×  L in the system. ε (ε ∈ (0, 1)) indicates the coupling coefficient. The periodic boundary condition of the system is denoted as:
{ i 1 = R , i = 1 i + 1 = 1 , i = R j 1 = L , j = 1 j + 1 = 1 , j = L ,
f(x) denotes the logistic map:
f ( x ) = μ x ( 1 x ) ,
where μ (μ ∈ (0,4]) indicates the control parameter. The state of f(x) is chaotic when μ is between 3.57 and 4.

2.2. Partitioned Elementary Cellular Automata

The Cellular Automata (CA) [35] is a dynamic model with discreteness in the time and space dimensions. The mathematical expression of a CA is shown as:
C A = ( A N , , f , E ) ,
in which AN denotes a cell space with N dimension. ∑ is a discrete finite set to represent the states of the cell. f is a mapping function generally referred to as the local transition rule. E represents the set of neighbors of the cell.
ECA is a simple CA in one dimension [36]. In the ECA, each cell has two state values: 0 and 1, meaning that ∑ is denoted as {0, 1}. When the radius of CA is equal to 1, the i − 1th cell and the i + 1th cell can be considered as the ith cell’s neighbors. Furthermore, the periodicity of the ECA’s border condition is indicated as follows:
{ i + 1 = 1 , i = M i 1 = M , i = 1 ,
in which we designate M as the total quantity of cells. The result after an iteration of a cell in ECA is jointly influenced by the three cells in the current iteration, which are this cell itself and its two neighbors. It can be formulated as follows:
S t + 1 ( i ) = f r ( S t ( i 1 ) , S t ( i ) , S t ( i + 1 ) ) ,
in which S t ( i ) stands for the state value of the ith cell, and the t in it refers to the time dimension. f represents a Boolean state function that specifies a local transition rule r, implementing a mapping from the set of states {111, 110, 101, 100, 011, 010, 001, 000} to the set of states {0, 1}, so it can be inferred that there are 256 rules in total. For instance, when r = 102, f can be represented in Table 1.
In Table 1, the value of S t + 1 ( i ) is ‘011000110’, which can be expressed as a decimal as ‘102’. Previous researchers have categorized all ECAs into five types [34,37,38,39]: null rules, fixed-point rules, periodic rules, locally chaotic rules and global chaotic rules. We construct the 2D-DPRCML system using any two ECAs with global chaotic rules. Table 2 lists all the global chaotic rules.
The Partitioned Elementary Cellular Automata (PECA) is a high-dimensional dynamic system that consists of at least two ECAs with different local transition rules. The 2D-PECA is composed of two different ECAs, and it can be described by Equation (7):
{ x t + 1 ( i ) = f r x [ x t ( i 1 ) , x t ( i ) , x t ( i + 1 ) ] y t + 1 ( i ) = f r y [ y t ( i 1 ) , y t ( i ) , y t ( i + 1 ) ] ,
where x and y represent two ECAs with different local transition rules rx and ry, respectively. x and y contain M cells each. i and t represent the space and time dimensions, respectively, as in Equation (6). For example, we assign rx = 102, ry = 105, M = 100 and the initial values of two ECAs in 2D-PECA are random. The iterative result of the 2D-PECA is shown in Figure 1. The blue cells refer to cells with a status of 1, and the white cells refer to cells with a status of 0.
In Figure 1, both ECAs x and y are in chaotic states when the local transition rules are 102 and 105, respectively. It is obvious that they possess pseudo-randomness. Thus, chaotic PECA is applicable to perturbed spatiotemporal chaotic systems and dynamic pseudo-random coupling.

3. Introduction of 2D-DPRCML

The 2D-PECA is employed for dynamic pseudo-random coupling and perturbing the proposed 2D-DPRCML system. We assign two ECAs in 2D-PECA as x and y, respectively. A single ECA contains M cells. The 2D-DPRCML system contains R   ×   L lattices. The proposed system is described as follows:
x n + 1 ( i , j ) = { ( 1 ε ) f ( x n ( i , j ) ) + ε 4 [ f ( x n ( a 1 , b 1 ) ) + f ( x n ( a 1 , b 2 ) ) + f ( x n ( a 2 , b 1 ) ) + f ( x n ( a 2 , b 2 ) ) ] + p n × δ n ( i , j ) } mod 1 ,
n = floor ( t R × L + 1 ) ,
{ a 1 = ( bin 2 dec ( S x t ( c 1 c 2 c 3 c 32 ) ) mod R ) + 1 a 2 = ( bin 2 dec ( S x t ( c 33 c 34 c 35 c 64 ) ) mod R ) + 1 b 1 = ( bin 2 dec ( S y t ( c 1 c 2 c 3 c 32 ) ) mod L ) + 1 b 2 = ( bin 2 dec ( S y t ( c 33 c 34 c 35 c 64 ) ) mod L ) + 1 ,
{ a 2 = ( ( a 1 + 1 ) mod R ) + 1 , if   a 1 = a 2 b 2 = ( ( b 1 + 1 ) mod L ) + 1 , if   b 1 = b 2
In Equation (8), i = 1, 2, 3, …, R and j = 1, 2, 3, …, L denote the system’s row and column indexes, respectively. Both n and t stand for time series. In addition, n = n + 1 when all the lattices are iterated once. t = t + 1 when 2D-PECA is iterated once. From Equation (8), we can find that the updated value of each lattice is influenced by itself and the four coupling lattices during the iteration of the system. Such a process occurs in all lattices in each iteration. In other words, the coupling process enables the influence of each lattice to gradually spread to the other lattices as the system iterates, which can be regarded as the mutual perturbation between the individual lattices. This perturbation enables the system to have a more complex dynamical behavior. The relationship between n and t is shown in Equation (9), where the floor (x) corresponds to the largest integer less than or equal to x. ε (ε ∈ (0, 1)) stands for the coupling coefficient. A modulo operation is denoted by mod and returns the remainder of a division. x mod 1 is associated with obtaining the decimal component of x, and keeps the outcome of Equation (8) in the interval (0, 1). Moreover, a1, a2, b1 and b2 are pseudo-randomness coordinates of coupled lattices calculated in Equation (10), whereby a and b represent the row and column indexes, respectively. S x t and S y t are iterative results of x and y in the 2D-PECA separately at t times. ci is the ith cell in an ECA, and its value is in {0,1}, thus the iterative result c1c2c3cM can be expressed as a binary number as in Equations (10) and (12), or as a vector in GF(2) as in Equation (13). bin2dec(•) is the conversion from binary to decimal. In addition, the purpose of Equation (11) is to handle the conflict.
p n = { bin 2 dec ( S x t ( c M 31 c M 30 c M 29 c M ) ) 2 32 1 , if n odd bin 2 dec ( S y t ( c M 31 c M 30 c M 29 c M ) ) 2 32 1 , if n even ,
δ n = [ S x t ( c 1 , c 2 , c 3 , , c R ) T × S y t ( c 1 , c 2 , c 3 , , c L ) 0.5 ] × 2
Equation (12) is the formula for calculating the perturbation pn, in which the operation is determined by the time n. The result of pn is also in the interval (0, 1). There are two reasons for designing different expressions for the perturbation coefficient for even and odd clock cycles: the first is to improve data utilization. Since there are two dimensions of 2D-PECA, the different odd and even clock cycles allow the iterative results of both dimensions to be utilized. The second is to extend the perturbation period further. Although the ECA is long-periodic, its period is always limited by the number of cells to less than 2M, so the added perturbation cannot exceed this period. If different perturbations are added by odd-even transformation, and the perturbations are obtained from different ECAs in the 2D-PECA, the perturbation period can be significantly extended, theoretically reaching a maximum period of 22M. The introduction of perturbation enhances the complexity and effectively alleviates the degradation in the chaotic system [12]. It should be noted that the number of cells M in x or y is larger than the largest of 64, R and L. δ n is a sign matrix calculated as Equation (13), in which S x t ( c 1 , c 2 , c 3 , , c R ) and S y t ( c 1 , c 2 , c 3 , , c L ) are row vectors in GF. (2), and its result is an R   ×   L matrix containing the elements ‘−1’ and ‘1’. In Equation (13), we intercept the first R and the first L cells in ECA x and ECA y, respectively, to generate the sign matrix, ensuring that every lattice in the system can correspond to a sign in the sign matrix. In addition to reducing dynamical degradation, another purpose of adding perturbations is to reduce the correlation between different lattices [12]. If we simply add the same perturbation to all lattices in each iteration without the sign matrix, the lattices will still be strongly correlated due to the coupling. The purpose of designing the sign matrix is to add perturbations with different and varying signs to each lattice during the iterations of the system, which successfully diminish the correlation between different lattices. The process of nth iteration in the 2D-DPRCML system is portrayed in Figure 2.
As shown in Figure 2, the choice of coupled lattices is determined by the iterative results of 2D-PECA. 2D-PECA is iterated once to update the value of a1, a2, b1 and b2 before calculating the value of one lattice. Consequently, when 2D-PECA is in chaos, a1, a2, b1 and b2 are pseudo-random and dynamic rather than fixed as in Refs. [29,30].

4. Analysis on the Features of 2D-DPRCML

For comparison purposes, we separately set the control parameters to μ ∈ (3, 4) and set the coupling coefficients to ε ∈ (0, 1). The number of lattices R   ×   L is 10   ×   10 . In the 2D-DPRCML system, x1(1,1) is set to 0.05, and the logistic map’s initial value is also set to 0.05. Then, we let the logistic map iterate 99 times to fill the rest lattices (x1(1,2), x1(1,3), …, x1(10,10)). As for the 2D-PECA, the number of cells in both ECAs (x and y) is 100. Two random numbers of size 100 bits are utilized for initializing x and y, respectively, which are set as follows:
{ S x 0 = 02 D 1 _ 990 D _ D F 84 _ 2 E 15 _ E 308 _ D 744 _ 1 S y 0 = 041 C _ E 93 F _ 6597 _ 1 D 2 F _ 71 C 4 _ A 442 _ D ,
where S x 0 and S y 0 are represented as two hexadecimal numbers. As the rules for x and y, 102 and 105 are chosen, respectively, which ensures that the 2D-PECA is in chaos.
In the subsequent comparative analysis, we compare the proposed system with the conventional two-dimensional coupled map lattices (2D-CML) system based on adjacent coupling. In addition, we also compare the proposed system with the 2D nonlinear coupled map lattices (2D-NLCML) system [29,30] based on the chaotic Arnold cat map, and the 2D mixed pseudo-random coupling PWLCM-Sin map lattices (2D-MCPML) system [7] based on pseudo-random coupling with a novel PWLCM-Sin map.

4.1. Analysis on Coupling Scheme

The conventional 2D-CML system’s coupling method is adjacent and fixed. The coupled lattices of xn (i, j) in 2D-CML are always xn (I + 1, j), xn (I − 1, j), xn (i, j + 1) and xn (i, j − 1) at each iteration. Figure 3a illustrates 2D-CML‘s coupling method.
The indexes of the coupling lattices for 2D-NLCML are calculated from the Arnold cat map:
[ a b ] = [ 1 p q p q + 1 ] [ i + 1 i 1 ] ( mod R ) ,
[ c d ] = [ 1 p q p q + 1 ] [ j + 1 j 1 ] ( mod L )
in which p and q are control parameters. The number of the lattices is R   ×   L . The coupled lattices are denoted by xn (a, j), xn (b, j), xn (i, c) and xn (i, d). Even though Equations (15) and (16) are nonlinear and some values of p and q can lead to chaos, p and q are fixed at each iteration. Moreover, Equations (15) and (16) only iterate one time in the system. Thus, the coupling lattices of xn (i, j) are invariant in any iteration. It means that this system’s coupling method is non-adjacent and fixed, as shown in Figure 3b.
The coupling method is improved in 2D-MCPML and is not fixed as in the above two systems. Besides the two adjoining lattices x n   ( i + 1 ,   j ) and x n   ( i ,   j   1 ) , a non-adjacent lattice x n   ( a ,   b ) with a random location is also coupled with a lattice of x n   ( i ,   j ) . Furthermore, a and b are decided by the state value of x n   ( a ,   b ) . For instance, we assign the size of the lattices as R   ×   L if x n   ( i ,   j ) = 0 . 40967142 , a = ( 40   mod   R ) + 1 and b = ( 96   mod   L ) + 1 . Therefore, a and b are changed at each iteration, increasing the instability of potential periodic orbits, and enhancing the system’s complexity. The coupling of a 2D-MCPML system is illustrated in Figure 3c.
In contrast, the coupling method in 2D-DPRCML presented in Figure 3d varies considerably from that of the above three systems. This coupling scheme is somewhat similar to Leon Chua’s method of selecting neighboring cells in cellular neural networks [40]. However, in the proposed scheme, the coupling lattices are not centered on the current lattice, and only four lattices are involved in the coupling rather than all lattices in a range. Its coupling is pseudo-random and dynamic rather than fixed or adjacent. The four coupled lattices break the constraints of row i and column j, and they can be lattices at any position in the system. Moreover, the four coupled lattices are all changeable at each iteration. Thus, the complexity of the system is enhanced efficiently.

4.2. Analysis on the Lyapunov Exponent and Kolmogorov-Sinai Entropy

The Lyapunov exponent (LE) [4] is a vital measure for evaluating the separation rate of infinitely approaching trajectories in phase space. It is a universal methodology for characterizing the predictability of dynamic systems. It is defined as:
λ = lim n     1 n i = 0 n 1 ln | d F ( x ) d x | x = x i ,
where λ stands for the LE of a dynamic system F ( x ) and i stands for the time dimension. The system requires at least one LE greater than zero to be in chaos. In addition, the higher the λ, the better the system exhibits chaotic properties. Without loss of generality, we employ the Wolf method [41] utilized in the literature [6,26,27] to calculate LE. On this basis, Kolmogorov-Sinai entropy density (KED) is the mean value of LEs greater than zero in all lattices. It is introduced to characterize the chaotic properties of the system [1,4,27]. The KED is calculated as follows:
h = i = 1 R j = 1 L λ + ( i , j ) R × L ,
in which h denotes the KED and λ+ is the positive LE of R   ×   L lattices. Here, i and j are space dimensions. An h value higher than zero means that the system contains lattices existing in chaos. Moreover, the magnitude of h determines the strength of the system’s chaotic properties. The performance of the KEDs of the four systems is displayed in Figure 4.
In Figure 4, the X-axis, Y-axis and Z-axis denote coupling coefficient ε, control parameter μ and KED h, respectively. In Figure 4a,b, the KEDs of these two systems are positive only when μ > 3.6, which means that chaotic lattices only exist in interval μ ∈ (3.6, 4]. Moreover, the chaos is weak around ε = 0.2 in the 2D-CML system shown in Figure 4a, while this drawback is ameliorated in 2D-NLCML shown in Figure 4b. In the first two systems, only 2.24% and 1.12% of the parameter pairs, respectively, make the system’s KED higher than 0.5. By contrast, as shown in Figure 4c,d, 89.76% and 97.76% of the control parameters in 2D-MCPML and 2D-DPRCML, respectively, make the KED of the system higher than 0.5, and some KEDs of these two systems even reach 0.8. The KEDs of these two systems are positive in the entire interval of ε and μ. All the above analyses indicate that the chaotic behaviors of the latter two CMLs are stronger than those of the former two systems. Additionally, more parameters are available to be used as keys when the latter two systems are employed in cryptosystems. In other words, using 2D-MCPML and 2D-DPRCML systems can efficiently broaden the key space of cryptography. Furthermore, the minimum and average values of KED in Figure 4d are 0.4266 and 0.7034, respectively, which are higher than 0.1994 and 0.6487 in Figure 4c. Therefore, the chaotic properties of 2D-DPRCML are superior to those of 2D-MCPML.
In addition to the KED, Zhang [22,42] proposed the Kolmogorov-Sinai entropy breadth (KEB) to indicate the proportion of chaotic lattices in the CML systems. The KEB is calculated as follows:
h u = L + L ,
in which hu is the KEB. L+ refers to the number of lattices where LE is greater than zero. The system’s lattice count is indicated by L. KEB which is employed to evaluate the chaotic performance of the spatiotemporal chaotic system from the spatial perspective. A larger hu value implies that more lattices are in chaos, and the system possesses stronger chaotic properties. The KEBs of the four systems mentioned above are shown in Figure 5.
In Figure 5a,b, the KEBs reach ‘1’ only when μ   >   3 . 6 , which corresponds to the KEDs in Figure 4a,b, which means that all lattices are in chaos only when μ   >   3 . 6 in 2D-CML and 2D-NLCML systems. Moreover, only 28.96% and 29.76% of KEBs reach ‘1’ in Figure 5a,b, respectively, indicating that the chaotic properties of these two systems are weak. In contrast, the chaotic lattice exists under the entire interval of control parameters in 2D-MCPCML and 2D-DPRCML presented in Figure 5c,d. Furthermore, 99.84% and 92.8% of KEBs reach ‘1’ in Figure 5c,d, respectively. In addition, the minimum of KEBs reaches 0.95 in Figure 5d, implying that at least 95% of lattices are chaotic in 2D-DPRCML, indicating the proposed system’s stronger chaotic properties.

4.3. Bifurcation Diagram

Bifurcation indicates period doublings, such as doubling from a single fixed point to two. In chaotic systems, this phenomenon may appear as the control parameters change. It is utilized to illustrate the period doubling in a chaotic system, and it can also be employed to assess the aperiodicity of a chaotic system.
In our research, we assign the coupling coefficient ε = 0.375. The constant σ = 0.5 in 2D-MCPML [7]. Without loss of generality, the bifurcation diagrams of lattice x (5, 5) in the systems mentioned above are depicted in Figure 6.
From Figure 6a,b, we can see that the periodic windows exist in these two systems, and it is apparent that 2D-CML outperforms 2D-NLCML in terms of aperiodicity when μ   <   3 . 6 . Moreover, the iterative results can fill the whole interval (0, 1) only for μ = 4 in Figure 6a,b. In comparison, as Figure 6c,d illustrates, the periodic windows disappear in 2D-MCPML and 2D-DPRCML, and there is no fixed or periodic point in these two systems. Furthermore, as illustrated in Figure 6d, the performance of 2D-DPRCML is the best in the four systems mentioned above since the outputs are able to fill the whole interval irrespective of the size of the control parameter μ. In other words, the 2D-DPRCML system is chaotic throughout the control parameter interval (μ ∈ [3,4]). Therefore, the aperiodicity is enhanced significantly in the 2D-DPRCML system. In addition, the space of optional parameters leading to chaos is expanded efficiently. Accordingly, the key space will be enlarged when the 2D-DPRCML system is employed for building a crypto-system.

4.4. Return Map and Uniformity Analysis

The return maps can be employed to assess the uniformity of the sequence generated by a chaotic system. Furthermore, the character of a return map can be employed to judge whether the chaotic system is able to withstand attacks by the return maps approach [32,43].
We assign μ to 4. The sequences selected for describing return maps are generated by lattice x (5, 5) in these four systems. The return maps are listed in Figure 7.
From the results displayed in Figure 7a–c, the points in the maps progressively scatter as ε increases. Nevertheless, the shape of the return map is clearly recognizable. Thus, an attacker can easily attack these three systems through the return map approach. Moreover, the return maps are prone to change with ε in Figure 7a–c. It implies that the change of coupling coefficient can influence the chaotic behaviors of 2D-CML, 2D-NLCML and 2D-MCPML systems. In contrast, the return map in 2D-DPRCML is insensitive to ε because the points in Figure 7d are uniformly distributed in phase space irrespective of the ε. Hence, the space of the optional coupling coefficient in the proposed system has been enlarged. Furthermore, the unrecognizable shape of the return map means that the return maps method or phase-space reconstruction is ineffective for the 2D-DPRCML system.
In addition to analyzing return maps in phase space, the uniformity of the chaotic system’s output sequence is another essential measure for evaluating the system’s randomness. In this paper, we set iteration number n = 5000 , coupling coefficient ε = 0 . 375 and control parameter μ = 4 in chaotic systems. Then, the 100 sequences that are 5000 in length produced by the 100 lattices in the 4 chaotic systems mentioned above are acquired, respectively. The range from 0 to 1 is equally partitioned into 200 segments, and the points of the sequences acquired in every segment are measured. Statistical results are illustrated in Figure 8.
In Figure 8, the X-axis denotes the segments in the range (0, 1), the Y-axis denotes the indexes of the 10   ×   10 lattices and the Z-axis represents the number of points in a segment. It is clear that the points of sequences generated by the first two systems shown in Figure 8a,b are primarily centered around the zones 0.8 and 0.5. Moreover, in Figure 8c, the sequence points produced by 2D-MCPML are mostly distributed in the interval [0.5, 0.8]. On the contrary, the points in Figure 8d uniformly distribute throughout the interval (0, 1), indicating that the sequences produced by any lattice in 2D-DPRCML possess better uniformity. Consequently, the uniformity of our system outperforms that of the system in Figure 8a–c.

4.5. Correlation Analysis

In traditional spatiotemporal chaotic systems, coupled processes cause high correlations among lattices. At the same time, the literature [44] points out that whether in temporal or spatial dimensions, the correlations of CMLs are sensitive to the coupling coefficient and control parameter. However, high correlations make it easy for an attacker to infer a particular lattice’s output from some given lattices’ outputs, causing the cryptosystem to be insecure when CML is applied to the cryptosystem. Therefore, analyzing the correlation of spatiotemporal chaotic systems is helpful in assessing their applicability to cryptosystems. In this paper, we let the system iterate 5000 times and obtain the output sequences of all lattices, after which we calculate the Pearson correlation coefficients between these sequences and derive the mean value. Similarly, the mean values of Pearson correlation coefficients are calculated for all pairs of parameters. We plotted these values to obtain the correlation analysis of the four systems under different parameter pairs, which are presented in Figure 9.
In statistics, the correlation intensity between any two variables is judged by the Pearson correlation coefficient ρ. The correlation intensities are weak and irrelevant when ρ ∈ [0.2, 0.4) and ρ ∈ [0, 0.2), respectively. In the two systems shown in Figure 9a,b, when μ ∈ [3.5, 4] the correlation coefficients rapidly as μ increases, indicating that the correlation coefficients of these two systems are sensitive to the coupling coefficients. The overall correlation coefficients of 2D-CML are even lower than those of 2D-NLCML when μ ∈ [3.5, 4] and ε ∈ [0.5, 1]. In addition, the average of the correlation coefficients were below 0.4 for only 10.6% and 8.96% of the parameter pairs in the systems presented in Figure 9a,b, respectively. At the same time, 79.48% and 76.84% of the cases in the first two systems result in correlation coefficients higher than 0.8, respectively. In addition, almost all correlation coefficients in these systems are equal to 1 when μ ∈ [3, 3.5], indicating that the sequences produced by different lattices in the first two systems are closely related to each other that make them insecure when applied to cryptosystems. By contrast, 2D-MCPML and 2D-DPRCML optimize the correlation between the lattices significantly, but the correlation coefficient of the 2D-MCPML system increases rapidly as μ approaches four. Furthermore, 92.72% and 98.08% of the parameter pairs in Figure 9c,d, respectively, make the correlation coefficients less than 0.4, demonstrating that the correlation among any 2 sequences produced by various lattices is significantly decreased in the latter 2 systems. The low correlation coefficients of the 2D-DPCML make an attacker less likely to extrapolate a particular lattice’s output from known lattices’ outputs, demonstrating that it can enhance the security of cryptosystems when it is applied to them.

4.6. The NIST Test

The National Institute of Standards and Technology (NIST) SP800-22 suite, as an important test tool, is commonly used to assess the randomness of sequences, and it consists of 15 subtests [45]. In these tests, p-value refers to the degree of randomness of the tested sequence. p = 1 denotes that the sequence is perfectly random, and p = 0 denotes that the sequence is totally non-random. The significance level α is typically a decimal number between 0.001 and 0.01. In this paper, we set α = 0.01. If the p-value is higher than 0.01, then the tested sequence is random, and the reliability of the test is 99%. Otherwise, the tested sequence is non-random.
In our test, μ is set to 4, and ε is set to 0.375. We let 2D-DPRCML iterate 50,000 times to obtain the test sequence, and then we eliminate the first 10,000 points in the sequence to minimize the influence of starting values. We selected the sequence X ( x ( 1 ) ,   x ( 2 ) , ,   x ( 31250 ) ) produced by the lattice x(6, 5) for testing, and the decimals in the sequence are quantized to 32bit unsigned numbers as follows:
y ( t ) = x ( t ) × ( 2 32 1 ) ,
in which the length of Y ( y ( 1 ) ,   y ( 2 ) , ,   y ( 31250 ) ) is 106 bits, which is used for testing. Table 3 displays the testing results.
It can be seen from Table 3 that the 2D-DPRCML’s output sequence passes all the subtests. In addition, we also test the sequences generated by the lattices x(1, 3), x(5, 4) and x(10, 7), and all of them pass the randomness test. For comparison purposes, we performed a pass frequency-based test [45] on the sequences produced by the four systems, and the results are presented in Table 4.
In Table 4, it is clear that the first three systems’ output sequences rarely pass the frequency test, which is the reason why the sequences generated by these chaotic systems cannot be directly used in cryptosystems [12,46]. In general, when chaotic systems are applied to cryptosystems, bit-extraction algorithms and nonlinear functions are commonly used to obtain better randomness and uniformity. However, the proposed 2D-DPRCML system exhibits excellent chaotic properties even without using the above methods, which is a good indication of its promising applications in cryptography.

5. Conclusions

By employing 2D-PECA for building a 2D spatiotemporal chaotic system, this paper proposes a novel 2D-DPRCML system. There are three innovations in the proposed system: a dynamically pseudo-random coupling scheme based on the iterative results of 2D-PECA, the introduction of perturbations generated by the 2D-PECA and the different and variable sign of perturbation for each lattice. The simulation and comparison analysis results demonstrate that the 2D-DPRCML system possesses stronger chaotic properties, including higher KED and KEB, and better aperiodicity in the bifurcation diagram. The good chaotic behavior of 2D-DPRCML enlarges the optional parameter pair space, which indicates that the key space can be extended when the proposed system is implemented in cryptography. Moreover, the return map in phase space is uniform, implying that 2D-DPRCML is resistant to the attack of phase-space reconstruction. Statistics and simulation results illustrate the excellent uniformity, randomness and unpredictability of 2D-DPRCML’s output sequence. Additionally, the correlation intensity among any two lattices in this system is weak, thus strengthening the system’s security. To sum up, all these good properties of 2D-DPRCML enable it to be well applied in the field of cryptography, such as the S-box generation, pseudo-random number generators and image encryption.

Author Contributions

Conceptualization, H.N. and Y.D.; methodology, H.N.; software, H.N. and Y.D.; validation, H.N., G.Z. and Y.D.; formal analysis, H.N. and Y.D.; investigation, H.N.; resources, G.Z. and Y.M.; data curation, H.N.; writing—original draft preparation, H.N.; writing—review and editing, H.N., G.Z., Y.M. and Y.D.; visualization, H.N. and Y.D.; supervision, G.Z.; project administration, G.Z.; and funding acquisition, G.Z. and Y.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the First-class Discipline Construction Project of Beijing Electronic Science and Technology Institute (No: 3201017) and the National Natural Science Foundation of China (No: 61772047).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wang, X.Y.; Chen, S.N.; Zhang, Y.Q. A chaotic image encryption algorithm based on random dynamic mixing. Opt. Laser Technol. 2021, 138, 106837. [Google Scholar] [CrossRef]
  2. Alawida, M.; Samsudin, A.; Teh, J.S. Enhanced digital chaotic maps based on bit reversal with applications in random bit generators. Inform. Sci. 2020, 512, 1155–1169. [Google Scholar] [CrossRef]
  3. Lorenz, E.N. Deterministic nonperiodic flow. J. Atoms. 1963, 20, 130–141. [Google Scholar] [CrossRef]
  4. Wang, M.X.; Wang, X.Y.; Zhao, T.T.; Zhang, C.; Xia, Z.Q.; Yao, N.M. Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Inform. Sci. 2021, 544, 1–24. [Google Scholar] [CrossRef]
  5. Hu, G.Z.; Li, B.B. Coupling chaotic system based on unit transform and its applications in image encryption. Signal Process. 2021, 178, 107790. [Google Scholar] [CrossRef]
  6. Wang, X.Y.; Yang, J.J.; Guan, N.N. High-sensitivity image encryption algorithm with random cross diffusion based on dynamically random coupled map lattice model. Chaos Solitons Fractals 2021, 143, 110582. [Google Scholar] [CrossRef]
  7. Zhou, P.Z.; Du, J.X.; Zhou, K.; Wei, S.F. 2D mixed pseudo-random coupling PS map lattice and its application in S-box generation. Nonlinear Dyn. 2021, 103, 1151–1166. [Google Scholar] [CrossRef]
  8. Dridi, F.; El Assad, S.; Youssef, W.E.; Machhout, M.; Lozi, R. The Design and FPGA-Based Implementation of a Stream Cipher Based on a Secure Chaotic Generator. Appl. Sci. 2021, 11, 625. [Google Scholar] [CrossRef]
  9. Samimi, M.; Majidi, M.H.; Khorashadizadeh, S. Secure communication based on chaos synchronization using brain emotional learning. AEU-Int. J. Electron. Commun. 2020, 127, 153424. [Google Scholar] [CrossRef]
  10. Aliabadi, F.; Majidi, M.H.; Khorashadizadeh, S. Chaos synchronization using adaptive quantum neural networks and its application in secure communication and cryptography. Neural Comput. Appl. 2022, 34, 6521–6533. [Google Scholar] [CrossRef]
  11. Khorashadizadeh, S.; Majidi, M.H. Synchronization of two different chaotic systems using Legendre polynomials with applications in secure communications. Front. Inform. Technol. Elect. Eng. 2018, 19, 1180–1190. [Google Scholar] [CrossRef]
  12. Li, S.J.; Chen, G.R.; Mou, X.Q. On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos 2005, 15, 3119–3151. [Google Scholar] [CrossRef] [Green Version]
  13. Binder, P.M.; Jensen, R.V. Simulating chaotic behavior with finite-state machines. Phys. Rev. A 1986, 34, 4460–4463. [Google Scholar] [CrossRef] [PubMed]
  14. Beck, C.; Roepstorff, G. Effects of phase space discretization on the long-time behavior of dynamical systems. Phys. D Nonlinear Phenom. 1987, 25, 173–180. [Google Scholar] [CrossRef]
  15. Flores-Vergara, A.; Garcia-Guerrero, E.E.; Inzunza-Gonzalez, E.; Lopez-Bonilla, O.R.; Rodriguez-Orozco, E.; Cardenas-Valdez, J.R.; Tlelo-Cuautle, E. Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic. Nonlinear Dyn. 2019, 96, 497–516. [Google Scholar] [CrossRef]
  16. Chen, C.; Sun, K.; He, S. An improved image encryption algorithm with finite computing precision. Signal Process. 2020, 168, 107340. [Google Scholar] [CrossRef]
  17. Abd El-Latif, A.A.; Abd-El-Atty, B.; Amin, M.; Iliyasu, A.M. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci. Rep. 2020, 10, 1930. [Google Scholar] [CrossRef] [Green Version]
  18. Luo, Y.; Liu, Y.; Liu, J.; Tang, S.; Harkin, J.; Cao, Y. Counteracting dynamical degradation of a class of digital chaotic systems via Unscented Kalman Filter and perturbation. Inform. Sci. 2021, 556, 49–66. [Google Scholar] [CrossRef]
  19. Wang, R.; Ma, H.G.; Li, X.Y.; Zhu, X.F. A Novel Encryption Method. In Chinese Control Conference; Chen, J., Zhao, Q., Eds.; IEEE: New York, NY, USA, 2016; pp. 5185–5189. ISBN 978-9-8815-6391-0. [Google Scholar]
  20. Liu, L.; Lin, J.; Miao, S.; Liu, B. A Double Perturbation Method for Reducing Dynamical Degradation of the Digital Baker Map. Int. J. Bifurc. Chaos 2017, 27, 1750103. [Google Scholar] [CrossRef]
  21. Liu, Y.; Luo, Y.; Song, S.; Cao, L.; Liu, J.; Harkin, J. Counteracting Dynamical Degradation of Digital Chaotic Chebyshev Map via Perturbation. Int. J. Bifurc. Chaos 2017, 2, 1750033. [Google Scholar] [CrossRef]
  22. Zhang, Y.Q.; Wang, X.Y.; Liu, L.Y.; He, Y.; Liu, J. Spatiotemporal chaos of fractional order logistic equation in nonlinear coupled lattices. Commun. Nonlinear Sci. 2017, 52, 52–61. [Google Scholar] [CrossRef]
  23. Zhang, Y.Q.; He, Y.; Wang, X.Y. Spatiotemporal chaos in mixed linear-nonlinear two-dimensional coupled logistic map lattice. Physica A 2018, 490, 148–160. [Google Scholar] [CrossRef]
  24. Huang, R.; Han, F.; Liao, X.J.; Wang, Z.J.; Dong, A.H. A Novel Intermittent Jumping Coupled Map Lattice Based on Multiple Chaotic Maps. Appl. Sci. 2021, 11, 3797. [Google Scholar] [CrossRef]
  25. Kaneko, K. Spatiotemporal intermittency in coupled map lattices. Prog. Theor. Phys. 1985, 74, 1033–1044. [Google Scholar] [CrossRef]
  26. Wang, X.Y.; Guan, N.N.; Zhao, H.Y.; Wang, S.W.; Zhang, Y.Q. A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Sci. Rep. 2020, 10, 9784. [Google Scholar] [CrossRef]
  27. Wang, M.X.; Wang, X.Y.; Wang, C.P.; Xia, Z.Q.; Zhao, H.Y.; Gao, S.; Zhou, S.; Yao, N.M. Spatiotemporal chaos in cross coupled map lattice with dynamic coupling coefficient and its application in bit-level color image encryption. Chaos Soliton. Fractals 2020, 139, 110028. [Google Scholar] [CrossRef]
  28. Liu, Z.; Wang, Y.; Zhao, Y.; Zhang, L.Y. A stream cipher algorithm based on 2D coupled map lattice and partitioned cellular automata. Nonlinear Dyn. 2020, 101, 1383–1396. [Google Scholar] [CrossRef]
  29. Zhang, Y.Q.; He, Y.; Li, P.; Wang, X.Y. A new color image encryption scheme based on 2DNLCML system and genetic operations. Opt. Laser. Eng. 2020, 128, 106040. [Google Scholar] [CrossRef]
  30. He, Y.; Zhang, Y.Q.; Wang, X.Y. A new image encryption algorithm based on two-dimensional spatiotemporal chaotic system. Neural Comput. Appl. 2020, 32, 247–260. [Google Scholar] [CrossRef]
  31. Zhang, A.G.; Xu, Z. Chaotic time series prediction using phase space reconstruction based conceptor network. Cogn. Neurodyn. 2020, 14, 849–857. [Google Scholar] [CrossRef]
  32. Peng, Y.; Sun, K.; He, S. An Improved Return Maps Method for Parameter Estimation of Chaotic Systems. Int. J. Bifurc. Chaos 2020, 30, 2050058. [Google Scholar] [CrossRef]
  33. Ning, H.; Zhao, G.; Dong, Y.H.; Ma, Y.J.; Jia, J. Spatiotemporal chaos in two-dimensional dynamic coupled map lattices system based on elementary cellular automata. Nonlinear Dyn. 2022, 109, 2143–2161. [Google Scholar] [CrossRef]
  34. Li, W.; Packard, N. The Structure of the Elementary Cellular Automata Rule Space. Complex Syst. 2000, 4, 281–297. [Google Scholar]
  35. Von Neumann, J.; Burks, A.W. Theory of self-reproducing automata. IEEE Trans. Neural Netw. 1966, 5, 3–14. [Google Scholar]
  36. Naskar, P.K.; Bhattacharyya, S.; Nandy, D.; Chaudhuri, A. A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dyn. 2020, 100, 2877–2898. [Google Scholar] [CrossRef]
  37. Wolfram, S. Cellular automata as models of complexity. Nature 1984, 311, 419–424. [Google Scholar] [CrossRef]
  38. Wolfram, S.; Mallinckrodt, A.J. Cellular automata and complexity. Comput. Phys. 1995, 9, 55. [Google Scholar] [CrossRef] [Green Version]
  39. Langton, C.G. Self-reproduction in cellular automata. Phys. D Nonlinear Phenom. 1984, 10, 135–144. [Google Scholar] [CrossRef]
  40. Chua, L.O.; Yang, L. Cellular neural networks: Theory. IEEE Trans. Circuits Syst. 1988, 35, 1257–1272. [Google Scholar] [CrossRef]
  41. Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining Lyapunov exponents from a time series. Phys. D Nonlinear Phenom. 1985, 16, 285–317. [Google Scholar] [CrossRef] [Green Version]
  42. Zhang, Y.Q.; Wang, X.Y. Spatiotemporal chaos in Arnold coupled logistic map lattice. Nonlinear Anal.-Model. 2013, 18, 526–541. [Google Scholar] [CrossRef]
  43. Li, S.; Chen, G.; Alvarez, G. Return-map cryptanalysis revisited. Int. J. Bifurc. Chaos 2006, 16, 1557–1568. [Google Scholar] [CrossRef]
  44. Jin, Y.; Christian, B. Distinguished correlation properties of Chebyshev dynamical systems and their generalisations. Chaos Solitons Fractals X 2020, 5, 100035. [Google Scholar]
  45. Bassham, L.; Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; National Institute of Standards and Technology: Gaithersburg, MA, USA, 2010.
  46. Tutueva, A.V.; Nepomuceno, E.G.; Karimov, A.I.; Andreev, V.S.; Butusov, D.N. Adaptive chaotic maps and their application to pseudo-random numbers generation. Chaos Soliton. Fractals 2020, 133, 109615. [Google Scholar] [CrossRef]
Figure 1. The Partitioned Elementary Cellular Automata.
Figure 1. The Partitioned Elementary Cellular Automata.
Applsci 12 12399 g001
Figure 2. The process of nth iteration in the 2D-DPRCML system.
Figure 2. The process of nth iteration in the 2D-DPRCML system.
Applsci 12 12399 g002
Figure 3. The coupling schemes of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML. The dark blue lattice denotes the current lattice for calculation, and the light blue lattices represent the lattices for coupling.
Figure 3. The coupling schemes of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML. The dark blue lattice denotes the current lattice for calculation, and the light blue lattices represent the lattices for coupling.
Applsci 12 12399 g003aApplsci 12 12399 g003b
Figure 4. KEDs of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML.
Figure 4. KEDs of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML.
Applsci 12 12399 g004
Figure 5. KEBs of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML.
Figure 5. KEBs of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML.
Applsci 12 12399 g005
Figure 6. Bifurcation diagrams of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML.
Figure 6. Bifurcation diagrams of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML.
Applsci 12 12399 g006
Figure 7. Return maps of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML at ε = 0.125, 0.625 and 0.875.
Figure 7. Return maps of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML at ε = 0.125, 0.625 and 0.875.
Applsci 12 12399 g007
Figure 8. Distribution of sequences generated by the (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML at ε = 0.375, μ = 4.
Figure 8. Distribution of sequences generated by the (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML at ε = 0.375, μ = 4.
Applsci 12 12399 g008
Figure 9. The correlation analysis of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML.
Figure 9. The correlation analysis of (a) 2D-CML, (b) 2D-NLCML, (c) 2D-MCPML and (d) 2D-DPRCML.
Applsci 12 12399 g009
Table 1. The function f with a local transition rule r = 102.
Table 1. The function f with a local transition rule r = 102.
S t ( i 1 ) , S t ( i ) , S t ( i + 1 ) 111110101100011010001000
S t + 1 ( i ) 01100110
Table 2. The global chaotic rules. The rules in parentheses are similar to the representation rules preceding the parentheses.
Table 2. The global chaotic rules. The rules in parentheses are similar to the representation rules preceding the parentheses.
ClassRule Number
Global chaotic18(183), 22(151), 30(86, 135, 149), 45(75, 89, 101), 60(102, 153, 195), 90(165), 105, 106(120, 169, 225), 129(126), 137(110, 124, 193), 146(182), 150, 161(122)
Table 3. Test results of NIST 800-22.
Table 3. Test results of NIST 800-22.
No.Sub-Testsp-Value Result
1Frequency0.547174Pass
2Block frequency0.067007Pass
3Runs0.617330Pass
4Longest runs of ones0.405138Pass
5Rank0.305160Pass
6FFT0.349265Pass
7Non-overlapping template matching (average)0.463683Pass
8Overlapping template matching (all ones)0.455667Pass
9Universal statistical0.430132Pass
10Linear complexity0.605678Pass
11Serial 10.953191Pass
Serial 20.799506Pass
12Approximate entropy0.629571Pass
13Cumulative sums (forward)0.695145Pass
Cumulative sums (reverse)0.883695Pass
14Random excursions
x = −40.486479Pass
x = −30.735904Pass
x = −20.622806Pass
x = −10.82144Pass
x = 10.527469Pass
x = 20.413015Pass
x = 30.604139Pass
x = 40.631688Pass
15Random excursions variant
x = −90.520664Pass
x = −80.552538Pass
x = −70.715424Pass
x = −60.802102Pass
x = −50.846715Pass
x = −40.47397Pass
x = −30.494628Pass
x = −20.823367Pass
x = −10.907663Pass
x = 11Pass
x = 20.623372Pass
x = 30.183073Pass
x = 40.111202Pass
x = 50.118907Pass
x = 60.140314Pass
x = 70.146234Pass
x = 80.157794Pass
x = 90.15543Pass
Table 4. The results of frequency test.
Table 4. The results of frequency test.
SystemTotal Number of LatticesPass Rate/%Pass Rate of All Sub-Tests/%
2D-CML1000
2D-NLCML1000
2D-MCPML1000
2D-DPRCML1009843
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ning, H.; Zhao, G.; Dong, Y.; Ma, Y. A Novel Two-Dimensional Dynamic Pseudo-Random Coupled Map Lattices System Based on Partitioned Elementary Cellular Automata. Appl. Sci. 2022, 12, 12399. https://doi.org/10.3390/app122312399

AMA Style

Ning H, Zhao G, Dong Y, Ma Y. A Novel Two-Dimensional Dynamic Pseudo-Random Coupled Map Lattices System Based on Partitioned Elementary Cellular Automata. Applied Sciences. 2022; 12(23):12399. https://doi.org/10.3390/app122312399

Chicago/Turabian Style

Ning, Hao, Geng Zhao, Youheng Dong, and Yingjie Ma. 2022. "A Novel Two-Dimensional Dynamic Pseudo-Random Coupled Map Lattices System Based on Partitioned Elementary Cellular Automata" Applied Sciences 12, no. 23: 12399. https://doi.org/10.3390/app122312399

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop