Abstract
This paper introduces a new chaotic jerk system with three cubic nonlinear terms. The stability properties of the three equilibrium points of the proposed jerk system are analyzed in detail. We show that the three equilibrium points of the new chaotic jerk system are unstable and deduce that the jerk system exhibits self-excited chaotic attractors. The bifurcation structures of the proposed jerk system are investigated numerically, showing period-doubling, periodic windows and coexisting bifurcations. An electronic circuit design of the proposed jerk system is designed using PSPICE. As an engineering application, a new image-encryption approach based on the new chaotic jerk system is presented in this research work. Experimental results demonstrate that the suggested encryption mechanism is effective with high plain-image sensitivity and the reliability of the proposed chaotic jerk system for various cryptographic purposes.
1. Introduction
Chaotic systems find a wide range of engineering applications such as memristors [1,2,3,4], laser systems [5,6,7], electrical circuits [8,9,10], neural networks [11,12], encryption [13,14,15], memristors [16], neuron models [17], etc. As a particular case, a third-order autonomous jerk differential equation has the general form
Using the state variables , , , one can rewrite the jerk Equation (1) in system form as follows:
Jerk systems with chaotic attractors have several applications such as circuits [18,19,20], memristors [21], encryption [22,23], etc.
There is significant interest regarding chaotic jerk systems in the literature [24,25,26,27,28]. Sprott [24] proposed a simple chaotic jerk system with one quadratic nonlinearity. Sun and Sprott [25] reported a chaotic jerk system with a piecewise exponential nonlinearity. Liu et al. [26] discussed a new chaotic jerk system having two quadratic nonlinearities. Vaidyanathan et al. [27] proposed a new chaotic jerk system having two exponential nonlinearities and presented its electronic circuit simulation. Rajagopal et al. [28] presented a chaotic jerk system with two quadratic nonlinearities, discussed its dynamic properties and gave a circuit realization of the jerk system.
In this paper, we describe a new chaotic jerk system with three cubic nonlinear terms. We show that there are three unstable equilibrium points for the proposed jerk system. The bifurcation structures of the proposed jerk system are investigated numerically, showing period-doubling, periodic windows and coexisting bifurcations.
An electronic circuit design of the proposed jerk system is designed using PSpice. Although PSpice is a useful tool, it has many limitations [27]. Real electronic components can be complex creatures with many behaviors. Simulation of a circuit is only as accurate as the behaviors modeled in the PSpice devices created for it. Many circuit simulations are based on simplified models [27].
Finally, a new image-encryption approach is presented based on the chaotic behavior of the proposed jerk system. Circuit designs of chaotic systems are useful for their practical implementations [8,18].
The security and privacy of digital information play an important role in the digital era, in which images are a common data type for representing and transferring data [29].
Digital images can be secured by applying a reliable image-encryption mechanism. Because of their high sensitivity to primary conditions and their chaotic demeanor, chaotic systems are commonly utilized for developing image cryptosystems [30,31].
In this paper, a new image-encryption approach based on the chaotic behavior of the new jerk system is proposed. The proposed encryption approach consists of two rounds of encryption, in which the substitution phase is performed in the first round, and some information about the substituted image is gained using the SHA-256 algorithm for modernizing the prime conditions of the jerk system. The second round of encryption consists of one permutation phase and one substitution phase. Experimental results demonstrate that the suggested encryption mechanism is effective with high plain-image sensitivity and the reliability of the proposed chaotic jerk system for various cryptographic purposes.
2. A New Jerk System
In this paper, we propose a new 3-D jerk differential equation given by
where z has the physical interpretation of displacement, the velocity, , the acceleration and the jerk. Here, a and b are taken as positive constants.
Using the phase variables , and , it is possible to represent the jerk ODE (3) as a system of first-order differential equations:
In this work, we shall show that the jerk system (4) has a chaotic attractor for . This is verified by calculating the local Lyapunov exponent values for and with simulation time seconds as follows:
Figure 1.
Lyapunov exponents for the new jerk system (4) calculated using the simulation time s for and .
Since the largest Lyapunov exponent (LLE) is positive (), we conclude that the jerk system (4) is chaotic. Moreover, the jerk system (4) is dissipative since
Thus, the jerk system (4) has a chaotic attractor.
We note that the jerk system (4) stays invariant under the coordinates transformation
This shows that the jerk system (4) has a point reflection symmetry about the origin.
Figure 2.
MATLAB simulations of the jerk system (4) for and : (a) plane, (b) plane, (c) plane and (d) .
The rest points of the jerk system (4) are found by solving the following equations.
Using the values and from (8a) and (8b), respectively, we can simplify (8c) as follows:
Since , there are three rest points for the jerk system (4) given by
For the chaotic case, when , the rest points are determined as follows:
If we represent the jerk system (4) as , then the Jacobian matrices of the vector field F at the three rest points , and can be easily calculated and denoted as , and , respectively.
The eigenvalues of are numerically evaluated as
The eigenvalues of are numerically estimated as
The eigenvalues of are the same as those of .
3. Bifurcation Analysis of the New Jerk System
To define different routes to chaos in our system and to investigate the rich behavior as a bifurcation diagram that can be spotted in the new jerk system in Equation (4), a numerical study is carried out using a standard fourth-order Runge–Kutta integration scheme technique. The dynamical study of our model starts by analyzing possible states of fixed points, their stability, and bifurcations that arrive under the control of corresponding parameters of model components.
For this bifurcation study of the jerk system (4), the time step is chosen such that for every set of parameter values, and computations are carried out using variables and constant parameters in extended mode. For each setting, the jerk system (4) is integrated for a sufficiently long time, and the transitional phase is removed.
To call attention to the influence of the system parameters on the dynamics of the jerk system (4), we maintain that and b can be used as bifurcation parameters. Figure 3 supplies the bifurcation diagram of the coordinate versus b and the related plots of the largest Lyapunov exponent () of the jerk system (4) versus b. These figures are obtained by scanning the parameter downward without resetting the initial conditions, beginning the system from the initial state . From Figure 3, we can observe very abundant and remarkable bifurcation scenarios. This bifurcation diagram shows that the jerk system is very sensitive to even a slight variation of the initial conditions. Chaotic motion is achieved progressively within the chaotic oscillator with respect to the control parameter b. Period-doubling bifurcation sequences and periodic windows can be easily identified in the graphs of Figure 3a,b.
Figure 4 shows the stability diagram for which the Lyapunov exponent band is activated for a better decision on the type of behavior. In light of Figure 3, behavior corresponds to a color and is confirmed by the values of the Lyapunov exponent. Thus, the data in blue are the behaviors of periodicities; those in red from represent low chaos, and those in yellow are higher chaos (expressing positive Lyapunov exponents). This spectrum is plotted when two parameters (a and b) vary at the same time. We remark that these Lyapunov stability diagrams are of paramount importance for the choice of parameters a and b, for better control of the system, as well as for a practical study (chaotic behavior is suitable for encryption, for example). This diagram is useful in choosing the range of parameters used in applications including chaos-based encryption.
Figure 4.
Standard Lyapunov stability diagram plot for the jerk system (4) where two control parameters a and b vary at the same time. Each color corresponds to a behavior different from the blue color, which symbolizes the periodicities, red symbolizes low chaos, and yellow symbolizes the higher chaos.
Figure 5 shows many forms of attractors in the plane for the jerk system (4) when the parameter a is fixed at and the values of b are varied. For , we obtain a limit cycle as shown in Figure 5a. For , we obtain a period-2 attractor as shown in Figure 5b. For , we obtain a chaotic attractor as shown in Figure 5c. The jerk system (4) exhibits a chaotic attractor for and for . Figure 5d–f show an abrupt change in the shape of the attractor of the jerk system (4) in the plane as b takes the values , and .
Figure 5.
Attractors of the jerk system (4) in the plane for , and various values of b.
4. Multi-Stability and Coexistence of Attractors
An attractor is a domain of convergence of the evolutions (trajectories) of a system. A system can have several attractors. The coexistence of several attractors or multi-stability is another remarkable property of interactive systems with nonlinear regulation [33]. In numerical simulations, the variation of the initial conditions influences the dynamic behavior of the system. For the jerk system (4), we can observe multi-stability and verify the coexistence of attractors for the range of , when a is fixed at . In this region, we observe the coexistence of two periodic period-2 attractors on the one hand and the coexistence of two chaotic attractors on the other hand. Figure 6 shows the bifurcation diagram and its corresponding maximum Lyapunov exponent () of the jerk system (4) scrolling forward (green) and backward (black) for the parameter b.
Figure 6.
(a) Bifurcation diagram and the corresponding largest Lyapunov exponent for the jerk system (4) with the initial value and , and (b) Lyapunov spectrum.
Figure 7 shows the presence of two different chaotic attractors for and .
Figure 7.
Coexistence of two different chaotic attractors of the jerk system (4) for the parameters and taking initial values for the: (a) black attractor and (b) for the green attractor.
Figure 8 shows the presence of two different periodic attractors for and .
Figure 8.
Coexistence of two different periodic attractors of the jerk system (4) for the parameters and taking initial values for the black attractor and for the green attractor.
Further information about the coexistence of the attractors can be obtained by analyzing the basins of attraction of the different attractors, which are defined as the set of initial conditions whose trajectories converge to the considered attractor. In order to understand the coexistence of attractors, the basin of attraction is studied. Let us take the coexisting periodic attractors of Figure 8. Their basin limits are clearly observed in Figure 9, showing the cross-section of the basin of attraction for .
For studying the influence of the parameter a, we describe the bifurcation diagram and maximum Lyapunov exponent as shown on Figure 10.
Figure 10.
(a) Bifurcation diagram and (b) the corresponding largest Lyapunov exponent for the jerk system (4) with the initial value and for the forward (blue) and backward (red) sweeping of the parameter a.
Figure 10 shows the coexistence of multiple attractors for the jerk system (4). Taking the parameter , the chaotic attractors coexist for the jerk system (4) as shown in Figure 11. Taking the parameter , the periodic attractors coexist for the jerk system (4) as shown in Figure 12.
Figure 11.
Coexistence of two different chaotic attractors of the jerk system (4) for the parameter and taking initial values for the blue attractor and for the red attractor.
Figure 12.
Coexistence of two different periodic attractors of the jerk system (4) for the parameter and taking initial values for the blue attractor and for the red attractor.
Figure 14 shows the two-parameter bifurcation diagram based on the sign of the maximum Lyapunov exponent for the jerk system (4).
Figure 14.
Two parameter bifurcation diagram based on the sign of the maximum Lyapunov exponent for the jerk system (4).
5. Circuit Simulation of the Jerk System
This section details the implementation of an electronic circuit that emulates the jerk system proposed in Equation (4) in PSPICE and performs a series of simulations in order to validate the mathematical model proposed from our circuit. On the other hand, it is interesting to evaluate the effects of the simplifying ideal operational amplifier assumptions adopted during the modeling process on the actual behavior of the oscillator in PSPICE. The circuit of Figure 15 is simulated in PSPICE with the values of the resistances equivalent to the parameters scaled in the numerical study to effectively verify the sensitivity of the model to the control parameter, which for us, will be the resistance from the modeling of the circuit equations.
Figure 15.
Circuit diagram designed for the proposed jerk system (4).
The following circuit can be used to represent the jerk system (4) for an analogical study.
Using Kirchhoff’s circuit analysis laws for the proposed circuit in Figure 15, we derive the circuit model of the jerk system (4), which is described by the following equations:
where correspond to the voltages.
Let , where . Then, we obtain the following system of equations for the circuit model:
We can therefore suggest that the circuit model (15) is equivalent to the jerk system (4). The components of the circuit have been chosen to correspond to Equation (4). In particular, the parameter values can be set according to the following relationships.
By letting , we observe that
The values of the components of the circuit are given as follows:
We vary the values of to obtain different phase portraits for the circuit model (15).
It is easy to see the good agreement between the MATLAB plots of the jerk system (4) and the simulation results of the circuit (15).
The following Figure 16 shows the various phase portraits of circuit (15) illustrating the route to chaos, where the initial values are taken as .
Figure 16.
Phase portraits illustrating the route to chaos for the circuit model (15) for various values of .
6. Encryption Algorithm and Its Performance
Because of their high sensitivity to primary conditions and their chaotic demeanor, chaotic systems are commonly utilized for developing image cryptosystems. In this section, we present the image encryption approach as a cryptographic application of the presented jerk system as well as the experimental results of this encryption mechanism.
6.1. Proposed Encryption Algorithm
For making the presented cryptosystem applicable in real-time applications, the presented jerk system is required to be accommodated as stated in Equation (19).
The proposed encryption approach consists of two rounds of encryption. In the first round, the jerk system (19) is iterated times using the initial conditions (, , and ) and control parameters (a and b) for generating three chaotic sequences (, , and ) in which is the size of the plain image and sequence is utilized in the substitution process. In the second round, some information about the substituted image is gained by using the SHA-256 algorithm for modernizing the prime conditions of the jerk system (, , and ) and for iterating the jerk system for times utilizing the updated primary conditions for generating new three chaotic sequences (, , and ), in which and are used to construct two permutation boxes for permutating the substituted image. Sequence is utilized to substitute the permutated image for constructing the final encrypted image. The general framework of the encryption process is given in Figure 17, while the steps of encryption are itemized as follows.
Figure 17.
Outline of our encryption mechanism.
Step 1: Choose values for primary conditions (, , and ) and control parameters (a and b) for iterating our chaotic jerk system (19) times to construct three chaos sequences , , and . Here, is the size of the original image OIm.
Step 2: Transform the elements of the sequence into integers in the range , and reshape the output into a matrix .
Step 3: Apply the bit XOR operation between the original image OIm and matrix to obtain the substituted image SbIm.
Step 4: Apply the SHA-256 hashing algorithm on the substituted image SbIm to obtain 256 bits (A), then those bits are converted into 32 integers (T), each of 8 bit, and then those integers are converted into three decimals (, , and ) to update the initial values for , , and .
Step 5: Using the modernized initial conditions (, , and ) and the old control parameters (a and b), iterate our jerk system (19) times to construct new three chaos sequences , , and .
Step 6: Arrange the first h elements of sequence from the smallest to the largest to obtain vector ; then, obtain the index of every element of in as a permutation box .
Step 7: Arrange the first w elements of sequence from the smallest to the largest to obtain vector ; then, obtain the index of every element of in as a permutation box .
Step 8: Permutate the substituted image SbIm using the permutation boxes and .
Step 9: Transform the elements of the sequence into integers in the range , and reshape the output into a matrix .
Step 10: Apply the bit XOR operation between the permutated image PrIm and matrix to obtain the final encrypted image EcIm.
6.2. Performance Analysis
To evaluate the proposed encryption mechanism, we used MATLAB R2016b and a PC with an Intel(R) 2 Duo 3.00 GHz CPU and 4 GB of RAM. In addition, four standard test images with dimensions of were used as test images from the SIPI dataset [34] and were labeled as FishingBoat, Stream, Male, and Couple. The initial values of conditions and control parameters for running the jerk system (19) were set as: , , , , and . The visual effects of original images and their encrypted ones utilizing the suggested encryption algorithm and the declared key parameters are given in Figure 18, in which the encrypted images are completely noised.
Figure 18.
Original images and their encrypted ones using the suggested encryption algorithm and the stated key parameters.
6.2.1. Correlation Analysis
The correlation coefficient, which is employed to determine the relationship between the pixels that exist in the image, is one of the essential tools used to estimate the meaning of the image. Correlation coefficient values of the original images are nearly 1 in each direction, but they should be near 0, with ciphered images using a good encryption mechanism (no relationship between the pixels that exist in the image) [35]. To calculate the correlation coefficients for the suggested encryption mechanism, we randomly selected 10,000 pairs of adjacent pixels in each direction. Table 1 shows the correlation coefficient results, which reveal that correlation values for encrypted images are extremely near to 0. Figure 19 depicts the correlation distribution of neighboring pixels in each direction for FishingBoat images before and after encryption. By analyzing the correlations of neighboring pixels, no significant information about the original image can be gleaned from the results stated in Table 1 and Figure 19.
Table 1.
Outcomes of correlation coefficients.
Figure 19.
Correlation distribution for Fishing Boat images before and after encryption, with the first row displaying the original image’s correlation distribution and the second row displaying the encrypted image’s correlation distribution.
6.2.2. Differential Analysis
To evaluate the suggested encryption approach against differential attacks, we performed NPCR (number of pixels change rate) and UACI (unified average changing intensity) tests [35], which are both defined as given below.
where T points to the number of pixels that exist in the image, and and are two encrypted images for one original image with slight change in one bit. Table 2 displays the outcomes of the NPCR and UACI tests, with the average NPCR value being >99.6%. As a result, the presented encryption method is extremely sensitive to minor pixel changes in the original image.
Table 2.
Results of NPCR and UACI.
6.2.3. Histogram Analysis
The frequency of pixel values in an image is shown by the histogram test, which is a crucial statistic for measuring the effectiveness of any encryption scheme. To resist statistical assaults, any effective encryption method must have identical histograms for various encrypted images. Figure 20 depicts the histograms of the original images that differ from one another, but the histograms of analog-encrypted images are similar. As well, the frequency distribution of pixel values in the encrypted image is measured using the chi-square test [35], which is a quantitative tool that is used to verify the regular distribution. The results of the chi-square test are provided in Table 3, in which all chi-square values for encrypted images are less than the threshold of 293. As a result, our technique of encryption can survive histogram assaults.
Figure 20.
Histograms of plain and cipher images.
Table 3.
Results of chi-square.
6.2.4. Information Entropy
Information entropy is a statistical measure that evaluates the distribution of bits per level in an image. To calculate the information entropy, the following formula can be used.
where points to the probability of . The potential values for pixels existing in a greyscale image are in [0,255], and thus, the perfect entropy value is 8 bit. As a result, to ensure the efficiency of the suggested encryption method, the entropy values should be close to 8. The results of information entropy for the original images and their encrypted counterparts are shown in Table 4, where the entropy values for ciphered images are quite near to 8.
Table 4.
The outcome of information entropy.
6.2.5. Occlusion Attack
It is possible to lose a portion of the transferred data while transmitting data across noisy carriers. As a result, a robust encryption technique must survive data loss assaults. To test our strategy against data loss threats, we remove some portions of the encrypted image and then attempt to decrypt it. Figure 21 depicts the outcome of the occlusion attack in which the original image is successfully recovered with no wasted information in the cutting portion position.
Figure 21.
Consequences of occlusion attacks, where the first row represents the defected images, and their decrypted analog images are provided in the last row.
6.2.6. Key Sensitivity
Key sensitivity is an essential criterion for any robust encryption scheme. Any tiny modifications in key parameters lead to significant variations in the decrypted image. To test the key sensitivity of our proposed technique, we performed decryption on the Enc-FishingBoat image with various keys, as shown in Figure 22. From the results stated in Figure 22, any tiny modification in key parameters results in significant variations in the decrypted image.

Figure 22.
Key sensitivity for our cryptosystem. The cipher Aeroplane image is deciphered with small variations in the initial keys: (a) true key; (b) true key except ; (c) true key except ; (d) true key except ; (e) true key except ; (f) true key except .
7. Conclusions
In this paper, we presented a new chaotic jerk system with three cubic nonlinear terms. We conducted a qualitative study of the proposed jerk system and analyzed the stability properties of the three equilibrium points of the jerk system. We showed that the equilibrium points are unstable. Thus, the new chaotic jerk system has a self-excited chaotic attractor. The bifurcation structures of the proposed jerk system were investigated numerically, showing period-doubling, periodic windows and coexisting bifurcations. We used PSpice to carry out an electronic circuit simulation of the proposed jerk system. Circuit simulations of mathematical models using PSpice have their own limitations, as these simulations are based on simplified mathematical models. Finally, a new image-encryption approach was proposed based on the chaotic behavior of the presented jerk system. Experimental outcomes demonstrated that the suggested encryption approach is effective with high plain-image sensitivity and the reliability of the proposed chaotic jerk system for various cryptographic purposes. In the future, we plan to design an experimental realization of the proposed chaotic jerk system using a field-programmable gate array (FPGA).
Author Contributions
Conceptualization, S.V., E.T.-C. and P.D.; methodology, S.V., E.T.-C., A.S., P.D. and B.O.-M.; software, A.S.T.K., C.N.T., E.M.K. and V.F.M.; validation, A.S.T.K., B.O.-M. and P.D.; formal analysis, A.S.T.K., C.N.T., E.M.K. and V.F.M.; investigation, B.A.-E.-A., A.A.A.E.-L. and A.S.; writing—original draft preparation, S.V., E.T.-C. and B.O.-M.; writing—review and editing, S.V., E.T.-C. and P.D.; supervision, S.V. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Data Availability Statement
Not applicable.
Acknowledgments
Sundarapandian Vaidyanathan would like to thank Vel Tech University for their support. Ahmed A. Abd El-Latif would like to thank Prince Sultan University for their support.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Njimah, O.M.; Ramadoss, J.; Telem, A.N.K.; Kengne, J.; Rajagopal, K. Coexisting oscillations and four-scroll chaotic attractors in a pair of coupled memristor-based Duffing oscillators: Theoretical analysis and circuit simulation. Chaos Solitons Fractals 2023, 166, 112983. [Google Scholar] [CrossRef]
- Aggarwal, B.; Rai, S.K.; Sinha, A. New memristor-less, resistor-less, two-OTA based grounded and floating meminductor emulators and their applications in chaotic oscillators. Integration 2023, 88, 173–184. [Google Scholar] [CrossRef]
- Fan, W.; Chen, X.; Wu, H.; Li, Z.; Xu, Q. Firing patterns and synchronization of Morris-Lecar neuron model with memristive autapse. AEU—Int. J. Electron. Commun. 2023, 158, 154454. [Google Scholar] [CrossRef]
- Messadi, M.; Kemih, K.; Moysis, L.; Volos, C. A new 4D Memristor chaotic system: Analysis and implementation. Integration 2023, 88, 91–100. [Google Scholar] [CrossRef]
- Zhong, D.Z.; Zhao, K.K.; Hu, Y.L.; Zhang, J.B.; Deng, W.A.; Hou, P. Four-channels optical chaos secure communications with the rate of 400 Gb/s using optical reservoir computing based on two quantum dot spin-VCSELs. Opt. Commun. 2023, 529, 129109. [Google Scholar] [CrossRef]
- Xu, X.; Krisnanda, T.; Liew, T.C.H. Limit cycles and chaos in the hybrid atom-optomechanics system. Sci. Rep. 2022, 12, 15288. [Google Scholar] [CrossRef] [PubMed]
- Ramamoorthy, R.; Tsafack, N.; Saeed, N.; Kingni, S.T.; Rajagopal, K. Current modulation based vertical cavity surface emitting laser: System-on-chip realization and compressive sensing based image encryption. Opt. Quantum Electron. 2023, 55, 91. [Google Scholar] [CrossRef]
- Gomes, I.; Korneta, W.; Stavrinides, S.G.; Picos, R.; Chua, L.O. Experimental observation of chaotic hysteresis in Chua’s circuit driven by slow voltage forcing. Chaos Solitons Fractals 2023, 166, 112927. [Google Scholar] [CrossRef]
- Wang, Z.; Parastesh, F.; Tian, H.; Jafari, S. Symmetric synchronization behavior of multistable chaotic systems and circuits in attractive and repulsive couplings. Integration 2023, 89, 37–46. [Google Scholar] [CrossRef]
- Shah, N.A.; Ahmed, I.; Asogwa, K.K.; Zafar, A.A.; Weera, W.; Akgül, A. Numerical study of a nonlinear fractional chaotic Chua’s circuit. AIMS Math. 2023, 8, 1636–1655. [Google Scholar] [CrossRef]
- Ni, Y.; Wang, Z. Intermittent sampled-data control for exponential synchronization of chaotic delayed neural networks via an interval-dependent functional. Expert Syst. Appl. 2023, 223, 119918. [Google Scholar] [CrossRef]
- Sun, J.; Mao, T.; Wang, Y. Solution of simultaneous higher order equations based on DNA strand displacement circuit. IEEE Trans. NanoBiosci. 2022, 21, 511–519. [Google Scholar] [CrossRef] [PubMed]
- Gao, S.; Wu, R.; Wang, X.; Liu, J.; Li, Q.; Tang, X. EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory. Inf. Sci. 2023, 621, 766–781. [Google Scholar] [CrossRef]
- Rashid, A.A.; Hussein, K.A. Image encryption algorithm based on the density and 6D logistic map. Int. J. Electr. Comput. Eng. 2023, 13, 1903–1913. [Google Scholar] [CrossRef]
- Alemami, Y.; Mohamed, M.A.; Atiewi, S. Advanced approach for encryption using advanced encryption standard with chaotic map. Int. J. Electr. Comput. Eng. 2023, 13, 1708–1723. [Google Scholar] [CrossRef]
- Ding, S.; Wang, N.; Bao, H.; Chen, B.; Wu, H.; Xu, Q. Memristor synapse-coupled piecewise-linear simplified Hopfield neural network: Dynamics analysis and circuit implementation. Chaos Solitons Fractals 2023, 166, 112899. [Google Scholar] [CrossRef]
- Xu, Q.; Chen, X.; Chen, B.; Wu, H.; Li, Z.; Bao, H. Dynamical analysis of an improved FitzHugh-Nagumo neuron model with multiplier-free implementation. Nonlinear Dyn. 2023, 111, 8737–8749. [Google Scholar] [CrossRef]
- Vaidyanathan, S.; Benkouider, K.; Sambas, A. A new multistable jerk chaotic system, its bifurcation analysis, backstepping control-based synchronization design and circuit simulation. Arch. Control Sci. 2022, 32, 123–152. [Google Scholar]
- Wang, Q.; Tian, Z.; Wu, X.; Tan, W. Coexistence of Multiple Attractors in a Novel Simple Jerk Chaotic Circuit with CFOAs Implementation. Front. Phys. 2022, 10, 835188. [Google Scholar] [CrossRef]
- Chase Harrison, R.; Rhea, B.K.; Oldag, A.R.; Dean, R.N.; Perkins, E. Experimental Validation of a Chaotic Jerk Circuit Based True Random Number Generator. Chaos Theory Appl. 2022, 4, 64–70. [Google Scholar] [CrossRef]
- Kamdem Tchiedjo, S.; Kamdjeu Kengne, L.; Kengne, J.; Djuidje Kenmoe, G. Dynamical behaviors of a chaotic jerk circuit based on a novel memristive diode emulator with a smooth symmetry control. Eur. Phys. J. Plus 2022, 137, 90. [Google Scholar] [CrossRef]
- Gakam Tegue, G.; Nkapkop, J.; Tsafack, N.; Abdel, M.; Kengne, J.; Ahmad, M.; Jiang, D.; Effa, J.; Tamba, J. A novel image encryption scheme based on compressive sensing, elliptic curves and a new jerk oscillator with multistability. Phys. Scr. 2022, 97, 125215. [Google Scholar] [CrossRef]
- Ramakrishnan, B.; Welba, C.; Chamgoué, A.C.; Karthikeyan, A.; Kingni, S.T. Autonomous jerk oscillator with sine nonlinearity and logistic map for sEMG encryption. Phys. Scr. 2022, 97, 095211. [Google Scholar] [CrossRef]
- Sprott, J.C. Some simple chaotic jerk functions. Am. J. Phys. 1997, 65, 537–543. [Google Scholar] [CrossRef]
- Sun, K.H.; Sprott, J.C. A simple jerk system with piecewise exponential nonlinearity. Int. J. Nonlinear Sci. Numer. Simul. 2000, 10, 1443–1450. [Google Scholar] [CrossRef]
- Liu, M.; Sang, B.; Wang, N.; Ahmad, I. Chaotic dynamics by some quadratic jerk systems. Axioms 2021, 10, 227. [Google Scholar] [CrossRef]
- Vaidyanathan, S.; Volos, C.K.; Kyprianidis, I.M.; Stouboulos, I.N.; Pham, V.T. Analysis, adaptive control and anti-synchronization of a six-term novel jerk chaotic system with two exponential nonlinearities and its circuit simulation. J. Eng. Sci. Technol. Rev. 2021, 8, 24–36. [Google Scholar] [CrossRef]
- Rajagopal, K.; Pham, V.T.; Tahir, F.R.; Akgul, A.; Abdolmohammadi, H.R.; Jafari, S. A chaotic jerk system with non-hyperbolic equilibrium: Dynamics, effect of time delay and circuit realisation. Pramana—J. Phys. 2018, 90, 52. [Google Scholar] [CrossRef]
- Abd-El-Atty, B. A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput. Appl. 2023, 35, 773–785. [Google Scholar] [CrossRef]
- Kaur, M.; Singh, S.; Kaur, M. Computational Image Encryption Techniques: A Comprehensive Review. Math. Probl. Eng. 2021, 2021, 5012496. [Google Scholar] [CrossRef]
- Kumari, M.; Gupta, S. Performance comparison between Chaos and quantum-chaos based image encryption techniques. Multimed. Tools Appl. 2021, 80, 33213–33255. [Google Scholar] [CrossRef] [PubMed]
- Pham, V.T.; Vaidyanathan, S.; Volos, C.; Kapitaniak, T. Nonlinear Dynamical Systems with Self-Excited and Hidden Attractors; Springer: New York, NY, USA, 2018. [Google Scholar]
- Xu, Q.; Cheng, S.; Ju, Z.; Chen, M.; Wu, H. Asymmetric coexisting bifurcations and multi-stability in an asymmetric memristive diode-bridge-based jerk circuit. Chin. J. Phys. 2021, 70, 69–81. [Google Scholar] [CrossRef]
- Kumlu, D. USC-SIPI REPORT# 422 2012. Available online: https://sipi.usc.edu/database/database.php?volume=misc (accessed on 5 February 2023).
- Benkouider, K.; Vaidyanathan, S.; Sambas, A.; Tlelo-Cuautle, E.; El-Latif, A.A.A.; Abd-El-Atty, B.; Bermudez-Marquez, C.F.; Sulaiman, I.M.; Awwal, A.M.; Kumam, P. A New 5-D Multistable Hyperchaotic System With Three Positive Lyapunov Exponents: Bifurcation Analysis, Circuit Design, FPGA Realization and Image Encryption. IEEE Access 2022, 10, 90111–90132. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).