Next Article in Journal
Analysis of Grout Diffusion Law in 3D Rough Fractures Based on Fractal Characteristics of JRC Curves
Previous Article in Journal
Dissipativity and Stability for Stochastic Non-Integer-Order Memristive BAM System with Leakage Terms and Mixed Delays
Previous Article in Special Issue
Chaos and Complexity in a Fractional Discrete Memristor Based on a Computer Virus Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Design of Multi-Cavity Chaotic Maps in the Polar Coordinate Using Nonlinear Curves and Modulo Operation with Application to Cavity-Based Data Hiding

1
School of Informmation Science and Engineering, Shaoyang University, Shaoyang 422000, China
2
Provincial Key Laboratory of Informational Service for Rural Area of Southwestern Hunan, College of Information Science and Engineering, Shaoyang University, Shaoyang 422000, China
3
Department of Mathematical Sciences, Giuseppe Luigi Lagrange, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Turin, Italy
4
School of Automation and Electronic Information, Xiangtan University, Xiangtan 411105, China
*
Author to whom correspondence should be addressed.
Fractal Fract. 2026, 10(6), 351; https://doi.org/10.3390/fractalfract10060351
Submission received: 20 April 2026 / Revised: 19 May 2026 / Accepted: 20 May 2026 / Published: 22 May 2026

Abstract

At present, constructing discrete chaotic systems with unique characteristics and chaos has become a focal topic in the field of nonlinear research. This paper presents a new framework for designing multi-cavity chaotic maps in polar coordinates. It constructs the basic chaotic map through nonlinear curves (such as Lotus curve, rose curves, and star curves) and generates multi-cavity attractors based on modular arithmetic. The nonlinear curves introduce complex deformations in the angular and radial components, while modular arithmetic serves as a folding mechanism to confine the dynamics to a specific range. The combined effect of these two elements forms multiple clearly separated chaotic cavities in the phase space. The number, size, shape, and chaotic characteristics of the cavities can be flexibly controlled by parameters. However, the introduction of fractional-order difference operators will disrupt the multi-chamber structure and make the system more complex. Furthermore, a data-hiding scheme based on the cavities is developed: the cavities act as natural isolation containers to embed information bits, and the chaotic dynamics provide encryption and confusion mechanisms. Experiments show that the designed chaotic map has high complexity and rich bifurcation behaviors; the data-hiding scheme performs well in terms of embedding capacity and security.

1. Introduction

Chaotic systems are renowned for their extreme sensitivity to initial conditions, long-term unpredictability, and ergodicity, holding profound application value in the field of information security, particularly in cryptography and information security applications [1,2]. Their inherent properties make them an ideal choice for generating pseudo-random sequences and concealing the relationship between plaintext information and its covert form [3]. Among various chaotic systems, chaotic maps are widely favored due to their high computational efficiency and ease of implementation [4,5].
During the development of chaotic system design, multi-scroll [6], multi-wing [7], and multi-cavity chaotic systems [8] with higher complexity have attracted much attention due to the complexity of their attractor phase space and topological structure. Among them, multi-scroll and multi-wing chaotic systems are continuous systems, and the position of the system’s equilibrium point is controlled by adjusting the saddle-jump equilibrium point of index 2; while the multi-cavity chaotic system, as a typical discrete system, achieves this by adjusting the position of the iteration point. In the design of multi-scroll and multi-wing chaotic systems, the Chua system [9,10] and Jerk system [11,12] are mainly used as the basis, and nonlinear functions such as sawtooth waves [13] and step waves [14] are employed to regulate the attractor topological structure. As for the multi-cavity chaotic mapping, it is mainly based on the step function to regulate the position of the current or next iteration value, and the step function usually provides a translation function, thereby obtaining a system with a strong discrete attractor. Currently, various types of discrete multi-cavity chaotic maps have been designed, such as the rhombic cavity hyperchaotic map [15], the closed-loop multiple modulation multi-cavity chaotic map [16], and the locally active memristor-based multi-cavity map [17]. Therefore, the construction of new multi-cavity chaotic mapping is still an urgent research topic.
Polar coordinate systems offer a natural framework for describing rotational symmetry and radial variations, which can be leveraged to design chaotic maps with unique topological structures [18,19]. However, many existing chaotic maps defined in polar coordinates often exhibit relatively simple dynamics or limited parameter spaces, potentially restricting their security performance in complex applications like image encryption [20], voice encryption [21], chaotic digital watermarking [22], and data hiding [23]. As a result, designing chaotic maps with controllable, complex structures, such as multiple distinct regions or “cavities”, in the Polar coordinate, remains a significant challenge. These multi-cavity structures could provide inherent compartments ideal for embedding secret data. To address these challenges, this paper proposes a novel framework for constructing multi-cavity chaotic maps directly within the polar coordinate system. The core innovation lies in the synergistic integration of nonlinear curves and the modulo operation.
Moreover, nonlinear curves (e.g., Lotus curve, rose curves, and star curves, etc.) can be strategically employed to introduce intricate distortions and deformations to the angular and/or radial components for designing chaotic maps [24]. This manipulation fundamentally alters the trajectory flow, creating complex basins of attraction or repulsion. Secondly, the modulo operation, acting as a folding mechanism, is then crucially applied to confine the dynamics within specific angular or radial intervals. In fact, at present, numerous research efforts are dedicated to designing chaotic maps based on modular operations [25,26], and it has been proven that modular operations can significantly enhance the nonlinearity and complexity of the system. However, in this study, the positive integers obtained through the modulo operation were applied to the system state variables to generate multi-cavity attractors. Information hiding technology refers to embedding specific information into digital host information (such as text, sound, images, video signals, etc.), with the aim of making the hidden information undetectable to the monitor and reducing the possibility of being attacked. It also uses cryptography to enhance security [27,28,29]. Therefore, information hiding is more secure than information encryption. At present, research on chaotic information hiding technology has made certain progress [30,31]. Although there are currently many multi-scroll, multi-wing, and multi-chamber chaotic system designs, and the complexity of these systems is utilized for data encryption applications [32,33], there is no literature reporting how to use these complex structures for information hiding. It is necessary to conduct further research to fully utilize the characteristics of this complex structure. The main contributions of this work are summarized as follows:
  • Six types of polar coordinate chaotic maps are designed based on nonlinear curve functions;
  • A novel and generic methodology utilizing the modulo operation for designing multi-cavity chaotic maps in the polar coordinate system is proposed.
  • We demonstrate how the parameters of the nonlinear components and modulo operation can be tuned to control the formation, number, and characteristics of the chaotic cavities.
  • The preliminary analysis showing that the proposed maps exhibit complex chaotic behavior suitable for cryptographic applications, and evaluate the effectiveness of the cavity-based data-hiding scheme in terms of embedding capacity and security, is carried out.
The remainder of this paper is organized as follows: Section 2: six different kinds of chaotic maps are designed based on the corresponding nonlinear curves; Section 3: details of the proposed methodology for constructing multi-cavity chaotic maps are presented, and systems are simulated; Section 4: complex dynamics of the proposed systems are analyzed; Section 5: a data transmission information hiding scheme based on multi-cavity modulation technology was proposed, and corresponding simulation verification was carried out; Finally, Section 6 concludes the paper and discusses future work.

2. Search for Chaos in Nonlinear Curves

2.1. Nonlinear Curves with Elegant Shapes

The Lotus curve is given by
r = R + 1 + 2 cos 3 θ 4 sin 3 θ 4 + 16 sin 6 θ ,
where R controls the size of the radius, and we also call it the curve one. When R = 5 , 10 , 15 , the curves are shown in Figure 1a.
The second curve is defined by
r = a r c cos 0.7 tan 3 θ cot 3.6 θ ,
and there are no parameters, and we call this curve Curve 2. The curve is shown in Figure 1b.
The subsequent four curves, designated as curves three through six, are represented by the following equations:
r = b 3 2.5 sin 2.66 θ cos 6 a 3 ,
r = 9 sin 1.5 θ cos a 4 θ b 4 ,
r = 1 + b 5 cos κ θ ,
and
r , θ = 1 + d 6 sin a 6 t , t + c 6 sin b 6 t .
It is noted that curve six pertains to a two-dimensional system, where the angle and amplitude are clearly distinguished. When a 3 equals 1.5 and b 3 equals either 15 or 10, the plots of curve three are shown in Figure 1c. When a 4 equals either 8 or 4, b 4 equals 5, the plots of curve four are shown in Figure 1d. When κ equals 11/4 and b 5 equals either 5 or 2.5, the plots of curve five are shown in Figure 1e. When a 6 equals −8, b 6 equals 24, c 6 equals 1.989, and d 6 equals 0.4, the plots of curve six are shown in Figure 1f. Firstly, these equations reveal that the system exhibits significant nonlinear characteristics, primarily induced by various trigonometric functions. Secondly, in polar coordinates, different functions can generate elegant curves with diverse morphologies. Next, we will explore the specific effects of constructing chaotic mappings based on these functions.

2.2. Design of Chaotic Maps

Based on the aforementioned functions, the following are the designs of six different discrete chaotic systems, and they are listed below.
Chaotic map 1 (CM1):
y n + 1 = R · a 1 + 1 + 2 cos 6 y n 4 sin 3 y n 4 + 16 sin 6 y n ,
where R is the control parameter that affects the oscillation range and the input magnitude of the trigonometric function.
Chaotic map 2 (CM2):
y n + 1 = R arccos sin 0.7 tan 3 y n cot 3.6 y n ,
where the parameter R controls the oscillation amplitude and the input domain of the trigonometric functions.
Chaotic map 3 (CM3):
y n + 1 = R 2.5 sin 2.66 y n cos 6 a 3 ,
where R plays the same role as above, and there is a parameter a 3 in this system.
Chaotic map 4 (CM4):
y n + 1 = 9 sin 1.5 y n cos a 4 y n b 4 ,
where a 4 and b 4 are the two system parameters, and since the amplitude is controlled by the coefficient 9.
Chaotic map 5 (CM5):
y n + 1 = R 1 + b 5 cos κ y n ,
where R plays the same role as above, and there are two parameters κ = 11 / 4 and b 5 in this system.
Chaotic map 6 (CM6):
r n + 1 , θ n + 1 = 1 + d 6 sin a 6 θ n , r n + c 6 sin b 6 θ n .
As a result, CM6 is a two-dimensional system containing four parameters: a 6 , b 6 , c 6 , d 6 . Among them, the first dimension primarily controls the angular oscillation of the system in polar coordinates, while the second dimension governs the complexity oscillation of the system in polar coordinates.
In all the above systems, R serves as the control parameter to adjust the oscillation range and the input magnitude of the trigonometric functions, thereby generating chaotic behavior under different parameter values. The system parameters are detailed in Table 1, with all systems exhibiting chaotic characteristics, as demonstrated by their positive Lyapunov exponents. Furthermore, the phase diagrams of each system are presented in Figure 2. In Figure 2a the green, red and blue phase diagrams are plotted using R = 5 , 10 , 15 , respectively. Overall, the designed chaotic mapping phase diagrams not only successfully preserve the typical features of the curves but also generate intricate patterns under polar coordinate transformation. This result robustly demonstrates the feasibility and effectiveness of the design schemes.

3. Design Multi-Cavity Chaotic Maps in the Polar Coordinate

The core of this study lies in performing translation operations on points in the initial phase space to form a new distribution of phase space with a multi-cavity structure. Unlike the existing literature’s design methods for chaotic maps based on sign functions in Cartesian coordinates, this study proposes a multi-cavity chaotic map design strategy in polar coordinates based on modulo operations. The design methodology of the multi-cavity chaotic map is systematically elaborated, and the corresponding phase diagrams of multi-cavity attractors are presented.

3.1. Design Multi-Cavity Chaotic Maps with Modulo Operation

3.1.1. The Proposed Method

The relationship between the rectangular coordinate system and the polar coordinate system is denoted as
x = r cos θ y = r sin θ r = x 2 + y 2 θ = arctan y r   ,
and the the relationship between the Cartesian coordinate system and the polar coordinate system is also shown in Figure 3. However, special attention must be paid, the value of θ in the above equation is only valid for the scenario illustrated in the figure (located in the first quadrant) (where θ 0 , π 2 , and the point cannot be the origin). For other quadrants, it needs to be handled according to specific circumstances.
When designing polar multi-cavity chaotic mapping, controlling the angle and magnitude is crucial. Compared to the angle, manipulating the magnitude appears more intuitive and straightforward. For one-dimensional chaotic mapping, we can achieve control by embedding a displacement within the system. Although this operation affects both magnitude and angle, the angle—constrained by periodic laws—often exhibits minimal noticeable variation. In contrast, the magnitude value undergoes significant changes with the increase or decrease of the displacement.
To design and obtain multi-cavity chaotic attractors in polar coordinates, it is necessary to establish a displacement mechanism in the r-coordinate direction to control the outward movement of the attractors and achieve hierarchical explicit representation. In this paper,
x n + 1 = f x n + κ · h x n , m
where f ( · ) is the nonlinear function of the chaotic map and h ( · ) is the control function.
h x n , m =   mod   10 σ x n , m
where σ and m are positive integer numbers, and · is the round down function. It can be seen that the value of h x n is a positive integer ranging from 0 to m 1 , and m circles of attractors can be generated.
Remark 1.
For the system to operate properly, the functions that incorporate the variable must be periodic and bounded periodic functions, namely f x + k T = f x , where T is the periodic of the function. In practical applications, many trigonometric functions satisfy this condition.
Remark 2.
The multi-loop chaotic attractor in polar coordinates is equivalent to the multi-cavity chaotic attractor in the rectangular coordinate system. According to Equation (13), when r changes, x and y will change collaboratively.
In a polar coordinate system, if it is necessary to construct multi-cavity mapping simultaneously in the radial (r) and angular ( θ ) directions, precise control of both amplitude and phase must be achieved. This study proposes a multi-cavity mapping construction strategy based on two-dimensional sequences, with the specific process illustrated in Figure 4. Firstly, based on the acquired amplitude and phase sequences ( r n , θ n ), the following transformation is performed, which is
r ˜ n = r n + κ · h r n , m 1 θ ˜ n = ρ θ ˙ n N o r + 2 π m h θ n N o r , m 2   ,
where κ represents the step size in the amplitude direction, the value of which is determined by the span of the attractor. m 1 and m 2 denote the number of cavities in the amplitude and angular dimensions, respectively. θ n N o r is the value obtained by normalizing θ n to the interval [ 0 , 2 π / m ] , and it is defined by
θ n N o r = 2 π m · θ n min θ n max θ n min θ n .
It shows that the step size in the angular dimension is 2 π / m , and the quantity is further regulated by introducing random numbers. In CM6, the variables in polar coordinate form ( r n , θ n ) are directly exported, whereas in a one-dimensional system, the variables ( r n , θ n ) are equivalent to the sequence ( y n 1 , y n ) .

3.1.2. Theoretical Analysis About the Method

Modular arithmetic is a fundamental tool in digital communication and cryptography, transforming values from a continuous or large integer domain into a finite set of integers. Let m be a positive integer (the modulus). Two integers a and b are congruent modulo m, written as
a   mod   b , m ,
if m divides ( a b ) . For any integers a , b and modulus m, the following properties hold:
  • Closure: The set Z m = { 0 , 1 , , m 1 } is closed under addition and multiplication modulo m.
  • Nonlinearity: The modulo operation is highly nonlinear and sensitive to small input perturbations; x + δ may produce a completely different residue if δ crosses a multiple of m. This property is crucial for the sensitivity of chaotic key streams.
Overall, the modular and clipping operations are integral to the multi-cavity behaviors.
Take system (11) as an example, in polar coordinates, the state of the system is described by an angular variable θ n (mod 2 π ), which transforms the original one-dimensional map into a circle map. Through the substitution θ n = κ y n   ( mod   2 π ) , the original equation becomes
θ n + 1 = κ R 1 + b 5 cos ( θ n ) A + B cos ( θ n )   ( mod   2 π ) ,
where A = κ R and B = κ R b 5 . This map is the classic cosine circle map, describing the discrete evolution of the angle θ on the unit circle In the aforementioned discussion on modular arithmetic as given in Equation (18), the assumed moduli were all integers, which are the basic characteristics of modular arithmetic. However, the circle map in Equation (19) employs a real modulus 2 π to represent angular periodicity. This is a common way to extend the concept of congruence to the real number range, and the two are not in conflict.
  • Nonlinear driving: The cosine term cos ( θ n ) introduces nonlinearity, making the update of the angle depend on the cosine of the current phase. When B = 0 , the system reduces to a uniform rotation θ n + 1 = A , which corresponds to quasiperiodic motion when the rotation number is irrational.
  • Frequency locking and resonance: For non-zero B, the system may enter frequency locking (Arnold tongues), i.e., the rotation number Ω = lim n ( θ n θ 0 ) / ( 2 π n ) becomes rational. Fixed points satisfy θ = A + B cos θ , corresponding to phase synchronization; their stability is determined by the derivative | d θ n + 1 / d θ n | = | B sin θ | .
  • Route to chaos: As B increases, the system can enter chaos via period-doubling bifurcations, at which point the angular evolution becomes unpredictable, representing the typical chaotic behavior of circle maps.
As a result, in polar coordinates, the system state is intuitively represented as a point on the circle, and the angular evolution directly reflects the periodic, locked, and chaotic behaviors. The parameter κ acts as a spatial scaling factor, while R and b 5 control the base rotation frequency and the nonlinear strength, respectively. This formulation simplifies the global analysis of the system and is a common tool for studying nonlinear oscillations, phase-locked loops, and biological rhythms.
Finally, the quantitative relationship between the cavity number control parameter m and the modulo operation step size κ : m = Δ r κ + 1 , where Δ r is the variation range of the radial component r of the nonlinear curve, which is determined by the nonlinear curve parameters. For example, in the lotus curve, Δ r is positively correlated with R, i.e., the larger R is, the larger Δ r is.

3.2. Multi-Cavity Chaotic Maps and Simulations

For the five one-dimensional chaotic maps proposed in this study, a random control factor h ( x n ) is introduced at the system end to achieve precise control over the displacement of the attractor in the polar coordinate r direction. The corresponding system equations are expressed as follows.
(1)
The grid chaotic map 1 (GCM1):
y n + 1 = R a 1 + 1 + 2 cos 6 y n 4 sin 3 y n 4 + 16 sin 6 y n + κ 1 h y n , m 1 .
(2)
The grid chaotic map 2 (GCM2):
y n + 1 = R arccos sin 0.7 tan 3 y n cot 3.6 y n + κ 2 h y n , m 2 .
(3)
The grid chaotic map 3 (GCM3):
y n + 1 = 9 sin 1.5 y n + 1 cos a 3 y n + 1 b 3 + κ 3 h y n , m 3 .
(4)
The grid chaotic map 4 (GCM4):
y n + 1 = R 2.5 sin 2.66 y n cos 6 a 4 + κ 4 h y n , m 4 .
(5)
The grid chaotic map 5 (GCM5):
y n + 1 = R 1 + b 5 cos κ y n + κ 5 h y n , m 5 .
In the aforementioned system, the system parameters remain consistent with those of the original system, and thus will not be reiterated here. For each system, a controller and its corresponding control parameters κ 1 5 have been subsequently added.
Upon setting the parameter a 1 = 3 , R = 5 , κ 1 = 2 m 1 , the phase diagram of the GCM1 system, as depicted in Figure 5a, reveals that the system’s attractor phase diagrams assume a ring-like configuration contingent upon the m 1 parameter. Specifically, when m 1 is assigned the values of 2, 3, or 4, the system’s behavior is characterized by ring-shaped attractor phase diagrams. For the GCM2 system, with parameters R = 5 , κ 2 = 30 , and m 2 assigned values of 2, 3, or 4, the phase diagram presented in Figure 5b demonstrates that, aside from the attractor positioned at the origin of the coordinate axes, the remaining m 2 1 attractors are arranged in a ring-like pattern. This outcome suggests that the system is capable of producing ring-shaped attractor phase diagrams that correspond to the m 2 parameter. In the case of the GCM3 system, with parameters a 3 = 8 , b 3 = 5 , R = 5 , κ 4 = 20 , and m 3 taking on values of 2, 3, or 4, the phase diagram illustrated in Figure 5c shows that as m 3 increases, the attractor phase diagrams evolve to display increasingly intricate multi-layered structures, with the number of layers incrementally augmenting. For the GCM4 system, under the parameters a 4 = 1.5 , R = 10 , κ 4 = 40 , and with m 4 values of 2, 3, or 4, the phase diagram in Figure 5d indicates that the layers of the attractor phase diagrams proliferate and the structure becomes more complex as m 4 increases. Lastly, for the GCM5 system, with parameters b 5 = 3 , R = 8 , κ 5 = 68 , and m 5 values of 2, 3, or 4, the phase diagram in Figure 5e similarly demonstrates that m 5 governs the number of layers in the attractors. As the value of m 5 increases, the attractors exhibit more layers and a more complex structure.
Regarding the CM6 model, as delineated in Equation (12), the parameters are specified as a 6 = 8 , b 6 = 24 , c 6 = 1.989 , and d 6 = 0.4 . Utilizing the generated sequence ( r n , θ n ), a plurality of cavity attractors are established, with the outcomes of this formation depicted in Figure 6, wherein m 1 = m 2 = 4 , 5 , 6 , 7 . The figure illustrates that the attractor possesses a multi-chamber configuration within the polar coordinate system. Within this system, the distributions of amplitude and angular directions manifest a reticulated structure, with their hierarchical configurations delineated by parameters m 1 and m 2 , respectively. Through appropriate transformations, it is possible to construct chaotic attractors characterized by multi-directional discretization within the polar coordinate system.
For the sequences generated by the one-dimensional chaotic system, this study constructs a multi-cavity attractor in the polar coordinate system of the phase space using the combination ( y n 1 , y n ), with the algorithmic parameter ρ set to 0.8. Through 3 × 4 and 4 × 4 grid configurations, grid attractors in polar coordinates were successfully constructed, with the results shown in Figure 7. It is observed that after the mapping transformation, the phase diagram is divided into an orderly and symmetrically distributed mesh structure in the polar coordinate space, which verifies the effectiveness of the method proposed in this study.

3.3. Comparison with the Existing Method

Compared with those methods for the design of multi-cavity chaotic maps, the method proposed in this paper indicates a more direct way. In current academic research, the design of discrete multi-cavity chaotic mapping typically employs staircase wave functions to achieve position migration, which is defined as [34]
g x n = κ k = 1 N sgn N κ x n + 2 k 1 + sgn N κ x n 2 k + 1 ,     O d d     n u m b e r κ · sgn N κ x n + A k = 1 N sgn N κ x n + 2 k 1 + sgn N κ x n 2 k + 1 ,     E v e n     n u m b e r ,
where κ is the amplitude and N control the number of cavities. In many cases, this function incorporates the 2D Sine iterative chaotic map (2DSICM) with infinite collapse for model design, with the chaotic mapping defined as
x n + 1 = a sin ω y n sin b x n y n + 1 = a sin ω x n + 1 sin b y n + κ g x n ,
where a = 1 and b = 10 . In this model, a also controls the number of cavities.
Here, a multi-cavity chaotic mapping model in Cartesian coordinates was constructed by integrating the designed controller into the system. The mathematical expression of the model is
x n + 1 = a sin ω y n sin b x n y n + 1 = a sin ω x n + 1 sin b y n + κ h x n , m
where κ = 2 a , m is related to the number of cavities. Under the condition of parameter a = 1 , the phase diagram of the chaotic attractor for the two-dimensional self-excited chaotic map (2DSICM) is shown on the left side of Figure 8, exhibiting a cavity structure with two sinusoidal waveforms. After introducing the control parameter, the blue phase diagram illustrates the cases where a = 1 and the control parameter m takes values of 3 and 4, while the magenta phase diagram corresponds to the scenario where m = a , with m taking values of 2 and 3. From this, it can be observed that the system is capable of generating multi-cavity chaotic attractors with a 2 a × m grid structure.

3.4. Grid Cavity in the Cartesian Coordinate System

The multi-cavity structure in polar coordinates also exhibits multi-cavity characteristics in the Cartesian coordinate system, and there is a clear correspondence between the two. By combining the conversion formulas between polar and Cartesian coordinate systems Equation (13), when r in polar coordinates is dynamically folded through modulus operation to form multiple cavities, x and y will change in coordination with the variation of r, resulting in the formation of corresponding multi-cavity structures in the Cartesian coordinate system. As shown in Figure 9, in the polar coordinate system, the 5-ring multi-cavity attractor appears as a 5 × 5 grid multi-cavity attractor in the Cavendish coordinate axis.

3.5. On the Effect of the Fractional-Order Difference on the Multi-Cavity

3.5.1. Multi-Cavity with G-L Fractional-Order Difference

For a given G-L fractional-order discrete system, which is defined by [35]
Δ t 0 α G y ( t n ) = g ( y ( t n 1 ) , t n 1 ) ,
thus, when its initial condition is x ( t 0 ) , the solution of this system is denoted as
y ( t n ) = g y ( t n 1 ) , t n 1 j = 1 n 1 G j α y t n j 1 .
where G j α = 1 j α j . It reflects the memory effect and historical dependence characteristics of fractional-order discrete systems in the time-recursive process.
Take the GCMi as an example, the G-L fractional-order GCMi is denoted as [35]
y n = R · g y n 1 + κ i · h y n 1 , m i j = 1 n 1 G j α y n j 1
where R is the system parameter, g ( · ) is the system function, and κ i · h y n 1 , m i controls the offset. For GCM1, a 1 = 3 , R = 5 , κ 1 = 2 m 1 and N u m = 2 , phase diagrams of the system with α = 0.3 , 0.4, 0.5 and 0.6 are shown in Figure 10. It can be seen that as the fractional-order α gradually increases, the multi-cavity structural features in the model will gradually weaken and eventually disappear; at the same time, the fluctuation amplitude and variation range of the sequence also show a significant expansion trend. This indicates that the G-L fractional difference operator will cause damage to the multi-cavity attractor structure; although the system becomes more complex, this regular structure will be lost.

3.5.2. Multi-Cavity with Caputo-like Fractional-Order Difference

Based on the introduction of the Caputo-like fractional difference operator [36], the definition of a discrete Caputo-like fractional-order system can be expressed as
Δ t 0 y C φ t n = f y ( t n ) , t n + α 1
where t n N t 0 + m α . Its solution is given by
y ( t n ) = k = 0 n 1 ( t k t 0 ) ( k ) k ! Δ k y ( t 0 )   + 1 Γ ( α ) s = t 0 + n α t s v f s + α 1 , y ( s + α 1 ) t s σ ( s ) 1 α ,
where Δ k y ( t 0 ) =   k , k = 0, 1, ⋯, n 1 .
To introduce the Caputo-like fractional-order difference to the GCMi, it should be defined by [36]
Δ t 0 α C y n = g ( y n 1 ) + κ i · h y n 1 , m i y n 1 ,
thus, when its initial condition is y ( t 0 ) , the solution of this system is denoted as
y n = y 0 + 1 Γ α j = 1 n C j α R · g y n 1 + κ i · h y n 1 , m i y n 1
where
C j α = Γ α , j = 0 C j 1 α α + j 1 j , j = 1 , 2 , ,
and it is a simplified calculation method for the memory modulation factor of the Caputo-like fractional difference operator.
Taking GCM1 as an illustration, let a 1 = 3 , R = 5 , κ 1 = 2 m 1 , and N u m = 2 . The phase diagrams of the system corresponding to α = 0.3 , 0.4 , 0.5 , and 0.6 are presented in Figure 11. Therefore, it can be seen that after introducing the Caputo-like fractional difference operator into the system model, the number of cavities in the system will significantly increase, thus breaking the simple structure of only two rings in the integer-order case.

4. Performance of the Chaotic Maps

4.1. Fix Points and Stability

For the one-dimensional chaotic map with the form of y n + 1 = f y n , where f ( x ) is a smooth differentiable function, suppose that there exits fix point y , the results of the system stability determination are as follows.
Firstly, the fix points, decided by y = f y , are those cross points of curves with the line r = θ , and it is given by
r = θ r i = f i θ , i = 1 , , 5 ,
where f i is the system equation of CM i . Figure 12a illustrates the distribution of intersection points between various one-dimensional system curves and oblique straight lines. Observations reveal that different systems possess specific fixed points, with notable variations in both the quantity and positioning of these fixed points. Taking the CM5 system as an example, this system possesses 9 fixed points. By applying numerical solution algorithms, we accurately calculated the values of these fixed points, which are 3.5777 , 3.2215 , 0.6971 , 1.5214 , 0.6003, 1.7698, 2.7277, 4.2563, 4.8241.
Secondly, in the stability analysis of one-dimensional chaotic mappings, the distribution of the derivative values of the system function at the fixed points is a decisive factor. Specifically, stability depends on whether the absolute value of the derivative is greater than or equal to 1. According to this criterion, the stability analysis can be divided into two major categories.
(1)
When f y < 1 , the fixed point y is deemed stable.
(2)
When f y > 1 , the fixed point y is considered unstable.
For the CM5 model, the system definition after derivative calculation is denoted as
f 5 y = 6.65 b cos 2.66 y .
Based on the outcomes of the computational analysis, when the system chooses the fifth and sixth fixed points, the absolute value of the derivative of the function f ( y ) is less than 1; while for other fixed points, the absolute value of the function f ( y ) is greater than 1. Based on this, the system as a whole exhibits instability, meeting the conditions for the occurrence of chaotic phenomena.
Thirdly, in the context of a high-dimensional system, it is imperative to scrutinize the eigenvalues of the Jacobian matrix at fixed points. When the characteristic roots of the system contain solutions with absolute values greater than one, it indicates that the system is in an unstable state and can generate chaotic phenomena. According to CM6, we have
θ 1 = c 6 sin b 6 θ + d 6 sin a 6 θ r = θ c 6 sin b 6 θ
Based on the first equation of Equation (38), the analytical solution of θ can be obtained, and then the second equation is used to solve for r . Observing Figure 12b, there are approximately 30 fixed points in the system. For instance, when θ = 2.9724 , the characteristic root is λ 1 , λ 2 = 0.0238 , 28.9324 . It means that the system is unstable.

4.2. Bifurcations and LEs

The Lyapunov exponent is an important quantitative indicator for measuring the dynamic characteristics of a system, which characterizes the average exponential convergence or divergence rate between adjacent trajectories in the phase space. It is defined by [37]
L y = lim n 1 n i = 0 n 1 log d f x d x x n ,
where n is the iteration number. Generally, it is equal to the length of the sequence. When the system dimension is greater than two, the QR decomposition method is employed to solve for multiple Lyapunov exponents (LEs).
Firstly, this study analyzed the bifurcation diagrams and Lyapunov exponents (LEs) of the CM1-CM5 systems under parameter variations, with the relevant results presented in Figure 13. Within the span of each parameter, 250 data points were uniformly distributed, meaning the step size for parameter variation was the parameter span divided by 250. Except for the varying parameter, the settings of other parameters are detailed in Table 1. The bifurcation diagrams and exponent spectra are displayed in the same figure but represented separately by the left and right vertical axes to indicate their respective value ranges.
  • When parameter R exists in the system, the fluctuation range of the sequence increases as R grows. Except for the initial stage where the system is in a non-chaotic state when R is small, the subsequent parts are primarily in a chaotic state, and the maximum Lyapunov exponent spectrum increases with the rise of R.
  • When other parameters of the system change, the scenarios vary: the fluctuation range remains unchanged but the values increase (Figure 13a), decrease (Figure 13d), or stay the same (Figure 13d), periodic fluctuation bifurcation diagram (Figure 13c), and the fluctuation range increases (Figure 13e).
  • The correspondence between the exponent spectrum and the bifurcation diagram is consistent, indicating that the designed system exhibits rich dynamic behaviors.
Secondly, given that CM6 is a two-dimensional system containing four parameters, the analysis results exhibit uniqueness, as shown in Figure 14. Specifically, when parameters a 6 and b 6 vary, the fluctuation range and value domain of the sequence do not show significant changes, with only a few periodic windows observed and the system overall exhibiting chaotic behavior. Moreover, adjustments to parameters c 6 and d 6 lead to an expansion of the sequence’s fluctuation range, i.e., an increase in the size of the attractor. Finally, the study did not identify hyperchaotic phenomena in the system.

4.3. Entropy and Complexity

This study employs three algorithms to quantitatively analyze the sequence complexity generated by different systems, specifically including Sample Entropy (SampEn) [38], Spectral Entropy (SE) [39], and the C 0 complexity measure algorithm [40]. Among these, SampEn belongs to the time-domain complexity analysis method, while SE and C 0 fall under the frequency-domain complexity analysis methods.
Consider a time series {x(n), n = 0, 1, 2, ⋯, N 1 } of length N. Define x ( n ) as x ( n ) = x ( n ) x ¯ , where x ¯ represents the mean value of the time series. For a given integer number φ ( φ > 0 ) , to calculate the SampEn, the vector is denoted as
X i = x i , x i + 1 , , x i + φ 1 ,
where i = 1 , 2 , , N φ + 1 . Thus, Sample Entropy (SampEn) [38] is defined as:
SamEn ( φ , δ , N ) = ln Φ φ ( δ ) ln Φ φ + 1 ( δ ) ,
where φ represents the dimension of the phase space, a non-negative integer not exceeding N 2 . Parameter δ signifies the similarity tolerance.
Φ d ( δ ) = 1 N d i = 1 N d C i d ( δ ) ,
where d = φ ,   φ + 1 , and
C i d ( δ ) = 1 N d 1 j = 1 j i N d # d i , j d δ ,
where # { · } is the indicator function (1 if the condition holds, 0 otherwise). Meanwhile, the distance between two vectors of length d is the Chebyshev distance, which is denoted as
d i , j d = max p = 0 , 1 , , d 1 u ( i + p ) u ( j + p ) .
where u ( 1 ) , , u ( N ) come from phase space reconstruction with embedded dimension d.
The corresponding DFT (Discrete Fourier Transform) of the time series {x(n), n = 0, 1, 2, ⋯, N − 1} is defined by
X ( k ) = n = 0 N 1 x ( n ) e j 2 π n k / N ,
where k = 0 , 1 , , N 1 and j is the imaginary unit. If the power of a discrete power spectrum with the k t h frequency is | X ( k ) | 2 , then the “probability” of this frequency is defined as
P k = | X ( k ) | 2 k = 0 N / 2 1 | X ( k ) | 2 .
Upon the application of the DFT, the summation is executed from k = 0 to k = N / 2 1 .
Firstly, the normalization entropy is designated as [39]
S E x N = 1 ln N / 2 k = 0 N / 2 1 P k ln P k ,
where l n ( N / 2 ) is the entropy of a completely random signal. Clearly, the more balanced the probability distribution, the greater the complexity (larger entropy) of the time series. A higher measuring value indicates greater complexity, and conversely.
Secondly, the C 0 algorithm is denoted as [40]
C 0 ( ρ , N ) = n = 0 N 1 | x ( n ) x ˜ ( n ) | 2 / n = 0 N 1 | x ( n ) | 2 x ˜ ( n ) = 1 N k = 0 N 1 X ˜ ( k ) e j 2 π N n k = 1 N k = 0 N 1 X ˜ ( k ) W N n k X ˜ ( k ) = X k , i f X k 2 > ρ G N 0 , i f X k 2 < ρ G N G N = 1 N k = 0 N 1 X ( k ) 2 .
where ρ is the tolerance and N is the length of the time series. And ρ = 15 is chosen in this study. When exploring C 0 complexity algorithms, a positive correlation can be observed between the measure values and sequence complexity, meaning that an increase in measure values indicates an enhancement in sequence complexity, and vice versa.
In the process of calculating LEs, due to the involvement of modulo and rounding operations, it is unsuitable for derivative computations, thus preventing the calculation of the exponent spectrum for multi-cavity chaotic maps. However, this study further explores the evolution patterns of sequence complexity and analyzes the trend of sequence complexity with varying numbers of cavities. For the unidirectional one-dimensional multi-cavity chaotic maps (GCM1 to GCM5), this study conducts an in-depth analysis of the relationship between the multi-cavity control parameter m and complexity, with the results presented in Figure 15a–c. The analysis based on SampEn indicates that as (m) increases, the system complexity exhibits an upward trend; however, when m exceeds 10, and the measure value surpasses 2.5, the system complexity gradually stabilizes. Furthermore, the Shannon Entropy (SE) analysis results also demonstrate that increasing the number of cavities does not significantly enhance the system’s complexity. Integrating the C0 complexity analysis results, a clear conclusion can be drawn as (m) increases, the system complexity generally tends to stabilize.
For GM6, the analysis results are shown in Figure 15d. m 1 represents the multi-cavity control parameter in the r coordinate direction, and m 2 represents the control parameter in the θ direction. Observing the figure, it can be seen that m 1 has a significant impact on the complexity of the system, while the complexity changes almost insignificantly with the variation of m 2 . The trend of this change is consistent with the aforementioned complexity variation rule, further indicating that as the number of cavities in the r direction increases, the complexity will increase accordingly, but will eventually tend to a stable state.
Furthermore, this study analyzed the complexity of the grid multi-cavity chaotic attractor after the transformation of the one-dimensional chaotic mapping generated sequence through the scheme shown in Figure 4. The analysis results are presented in Figure 15e–g. The figure illustrates the regularity with the variation of parameter m1, while an averaging process was applied for different values when parameter m2 changes. The research found that increasing the number of multi-cavities along the r-axis can effectively enhance the system’s complexity.

5. Information Hiding and Applications

5.1. Information Hiding Algorithm

According to the multi-cavity mapping generation equation as given in Equation (14), where h x n , m is a positive integer between 0 and m. If the positive integer sequence generated by the h ( · ) function is replaced with an external input signal, such as an image signal, the multi-cavity chaotic mapping can be modulated by the external image signal. The resulting sequence will exhibit chaotic characteristics, thereby achieving the concealment of signals within the multi-cavity attractor mapping.
Figure 16 reveals a potential covert transmission strategy for image information. In the initial stage, the image is converted into a bitmap format, totaling eight images. By pairwise combination, data ranging from 0 to 3 is generated, which is then transformed into a one-dimensional sequence. Consequently, the final sequence has a length of 4 M N , where M and N represent the length and width of the image, respectively. Subsequently, based on an encryption sequence generated by a third-party chaotic mapping, a chaotic pseudo-random sequence of length 4 M N is obtained. This sequence is utilized for encrypting and scrambling the image sequence.
Thirdly, the chaotic map defined by Equation (11) is used to embed information symbols F n { 0 , 1 , 2 , 3 } into a transmitted signal y n . At the receiver, the original symbols are recovered without requiring channel coding, provided perfect synchronization of the initial condition y 0 . The scheme is vulnerable to noise and initial condition mismatch due to the chaotic sensitivity.
For each symbol F n , the next state y n + 1 is generated by
y n + 1 = R 1 + b cos 11 4 y n + 18 F n .
Then the sequence { y 0 , y 1 , y 2 , , y N } is transmitted over the channel.
At the receiver, the incoming samples y n are processed sequentially. Using the known current sample y n , the “clean” chaotic term (without information) is computed as
x n = R 1 + b cos 11 4 y n .
And the information symbol is then recovered from y n + 1 :
F ˜ n = round y n + 1 x n 18 R ,
and finally clipped to the valid range:
F ^ n = max ( 0 ,   min ( 3 ,   F ˜ n ) ) .
It should be noted that the initial value y 0 cannot be identical at both ends. In practice, a preamble with F n 0 can be sent to let the receiver synchronize its chaotic oscillator to the transmitted sequence. Meanwhile, the channel adds white Gaussian noise with standard deviation σ , and the received signal is
r n = y n + ε η n ,
where η n N ( 0 , σ 2 ) is the noise signal defined in (0, 1) and ε is the strength level. In this case, all occurrences of y n in (50) and (51) are replaced by r n . The sensitivity to noise is high; channel coding is recommended for reliable transmission. The pseudocode given in Algorithm 1 summarizes the complete transmission and recovery process.
Algorithm 1 Chaotic Communication with Quaternary Symbols
  1:
Parameters:  R 8.0 , b 5.0 , σ noise   std
  2:
Input: information vector F = [ F 1 , , F N ] , initial y 0
  3:
Output: recovered symbols F ^ , symbol error rate SER
  4:
function Transmitter( F , y 0 )
  5:
       y 1 y 0
  6:
      for  n = 1 to N do
  7:
             y n + 1 R 1 + b cos ( 11 4 y n ) + 18 F n
  8:
      end for
  9:
      return  y = [ y 1 , y 2 , , y N + 1 ]
10:
end function
11:
function Channel( y , σ )
12:
      for  k = 1 to N + 1  do
13:
             r k y k + σ · N ( 0 , 1 )
14:
      end for
15:
      return  r
16:
end function
17:
function Receiver( r )
18:
      for  n = 1 to N do
19:
             x n R 1 + b cos ( 11 4 r n )
20:
             F ˜ n round r n + 1 x n 18 R
21:
             F ^ n max ( 0 ,   min ( 3 ,   F ˜ n ) )
22:
      end for
23:
      return  F ^
24:
end function
25:
Main:
26:
y tx Transmitter ( F , y 0 )
27:
r Channel ( y tx , σ )
28:
F ^ Receiver ( r )
Moreover, it should be pointed out that, in order to further ensure the security of the transmitted data, the data to be transmitted needs to be encrypted. Although this paper has performed simple XOR encryption on the data stream, in practical applications, more secure bit-level information encryption algorithms need to be designed.
Finally, this study conducted a further exploration of this algorithm and extended it to a general one-dimensional multi-cavity chaotic mapping. Based on a general one-dimensional multi-cavity chaotic mapping, its information loading equation is
y n + 1 = R f ( y n ) + κ F n .
where A is the step size, and f ( · ) is the system equation. At the receiving end, the following equation is executed
x n = R · f ( y n ) .
As a result, the information symbol is then recovered from y n + 1 :
F ˜ n = round y n + 1 x n κ · R ,
and finally clipped to the valid range. That is to say, as long as appropriate parameters are selected, other chaotic maps can also be used for information hiding.

5.2. Simulations and Analysis

5.2.1. Simulations

Figure 17 presents the detailed procedural results of numerical simulation for Phoxinus phoxinus subsp. phoxinus, including the original image, bit-level map, data flow, signal transmission, recovered data flow, restored bit-level map, and reconstructed image. Overall, signal recovery is achievable through channel transmission with certain robustness against noise and parameter variations. This stems from the signal recovery process relying on how to extract quantized data, determined by the relative size of the attractor dimensions. However, as shown in the Phoxinus phoxinus subsp. phoxinus simulation results in Figure 17. Nevertheless, it demonstrates the effectiveness and application potential of the proposed multi-cavity attractor-based information hiding and recovery algorithm.
Regarding another issue, given that the jump positions of the original chaotic sequence are determined by image information, and image information typically belongs to deterministic information, it is necessary to further verify whether the sequence y n transmitted in the channel still maintains chaotic characteristics. For this purpose, this study adopts the pseudo-spectrum graph (ps graph) of the 0-1 test to verify the existence of chaotic phenomena.
Figure 18 illustrates the impact of channel noise on the recovered image quality. As the noise intensity ε increases, both PSNR and SSIM exhibit a monotonic decline. For ε 0.3 , the PSNR remains above 40 dB, rendering the reconstructed image visually indistinguishable from the original. When ε approaches 0.44 , the PSNR lies between 30 and 40 dB, still corresponding to good perceptual quality. Beyond this point, further increase in ε leads to severe degradation, with noticeable distortion becoming evident.
Table 2 reports the PSNR and SSIM values for five test images under two noise levels. When the noise intensity is ε = 0.2 , the PSNR is infinite for the first two images and exceeds 67 dB for the others, while the SSIM remains exactly 1.000 in all cases. This indicates that the reconstruction is essentially identical to the original. At ε = 0.3 , the PSNR drops to the range of 38–42 dB, yet all values stay above 38 dB; the SSIM also decreases slightly but remains above 0.96 for every image. These results demonstrate that the scheme preserves excellent image quality for moderate noise, with only minor perceptual degradation. Overall, the algorithm is robust to light channel noise and provides near-lossless recovery at very low noise levels.

5.2.2. Security Analysis

Firstly, we analyze the impact of channel bit width on communication quality, and from the perspective of data bit width, we examine the robustness of the system. Given that the data transmitted by the communication system is either y n or r n = y n + ε η n , we conducted a simplified experiment by imposing a limit on the computational precision of the channel to evaluate the system’s precision requirements. The algorithm for limiting the data’s significant digits is shown in Algorithm 2, which serves to restrict the number of significant figures. The analysis results are presented in Figure 19, from which it can be seen that after imposing a limit on the channel’s significant digits, when n u m is greater than 3, the system can recover the original information with a PSNR greater than 40 and an SSIM greater than 0.7.
Secondly, analyze the key space of the system. This part mainly affects the waveform of the signal transmitted through the channel. The shared key consists of the real numbers y 0 I (the basin of f), R, and A. In a digital implementation with L-bit precision, the key space size is at least 2 2 L (combining y 0 and R). Even for moderate precision ( L = 32 ), the space is sufficiently large to resist brute-force attacks. More importantly, the chaotic sensitivity to initial conditions provides a fundamental security property.
Thirdly, based on the initial value sensitivity characteristic possessed by chaotic mappings, the following theory can be derived.
Algorithm 2 Round a number to n u m significant figures
1:
function RoundToSignificant( value , n u m )
2:
      if  value = 0  then
3:
            return 0
4:
      else
5:
             scale 10   log 10 ( | value | ) + 1 n u m
6:
             roundedValue round value / scale × scale
7:
            return roundedValue
8:
      end if
9:
end function
Theorem 1.
Let { y n } and { y n } be two trajectories generated by the same map f and identical R , A , but with initial conditions satisfying | y 0 y 0 | = δ > 0 . If f has a positive Lyapunov exponent λ > 0 , then for large n the divergence | y n y n | grows as δ e λ n on average.
Proof. 
The chaotic map f possesses a Lyapunov exponent λ = lim n 1 n i = 0 n 1 ln | f ( y i ) | > 0 . For two trajectories starting from y 0 and y 0 + δ , the linearized error dynamics gives | y n y n | δ e λ n after n iterations. Since the recovery of F n involves the subtraction y n + 1 R f ( y n ) , an error in y n is amplified to R | f ( y n ) f ( y n ) | R | f ( y n ) | | y n y n | , which grows exponentially. Once this error becomes comparable to A R / 2 , the rounding operation in Equation (56) yields an incorrect symbol with high probability. □
Given that this information hiding scheme is constructed based on chaotic mapping, the signal transmitted in the channel is generated by the system, and only the value of the target signal is subjected to “translation” processing. Therefore, the initial value sensitivity and other characteristics of the nonlinear chaotic system can be continuously maintained, thereby providing a guarantee for information security.
Finally, the signal transmitted through the channel is a chaotic signal. The 0-1 test is a testing algorithm used to measure whether a time series exhibits chaos. Unlike the Lyapunov exponent, this algorithm does not require phase space reconstruction. For a given constant ϕ ( 0 , π ) , one has [41]
p n = j = 1 n y j cos ( j ϕ ) s n = j = 1 n y j sin ( j ϕ ) ,
where n takes values of 1 , 2 , . We can draw a graph with p and s as the horizontal and vertical axes, respectively. The trajectory shown in this graph can reflect the characteristics of the chaotic phenomenon. As can be seen from Figure 17, the information transmitted in the channel is a chaotic signal.

5.2.3. Influence of Fractional Difference on Data Hiding

The fractional-order difference operator has a memory effect, and its solution process is not a simple iterative equation. This implies that the solution methods at the sending end and the receiving end need to be carried out according to the relevant definitions of the fractional-order difference operator. Therefore, if the fractional-order system is introduced into the existing information hiding algorithm, it can be predicted that it will not be helpful for the data recovery of the information hiding algorithm, or a special hidden algorithm needs to be designed for the fractional-order system.
The G-L fractional-order difference operator may lead to damage to the multi-chamber structure. As depicted in Figure 10, with the increase of the fractional-order α , the multi-chamber structure gradually weakens until it vanishes, resulting in the malfunction of the “separation container” for information embedding. Consequently, the embedded information bits become confused, ultimately reducing the accuracy of information recovery.
The Caputo-like fractional-order difference operator will increase the number of multi-chambers, as shown in Figure 11. Although it does not cause damage to the multi-chamber structure, but an excessive number of multi-chambers will increase the difficulty of chamber distinction during information embedding, leading to information mis-embedding and reducing the recovery accuracy.

6. Conclusions

This paper proposes a design framework for polar coordinate multi-cavity chaotic mapping based on nonlinear curves and modular operations, successfully addressing the issues of simple structure and limited parameter space in existing polar coordinate chaotic mappings. By introducing complex deformations through nonlinear curves and achieving dynamic folding with modular operations, the generated chaotic mapping can form controllable numbers, sizes, and shapes of cavity structures in the phase space. Meanwhile, the designed algorithm is also applicable to the generation of multi-cavity chaotic attractors in the Cartesian coordinate system. Simulation analysis of dynamic characteristics shows that each mapping has high Lyapunov exponents, complex bifurcation behaviors, and the grid-like attractors have relatively higher complexity, meeting the requirements of cryptographic applications. At the application level, the multi-cavity structure is used for data hiding: cavities serve as isolated regions to embed information, and chaotic dynamics ensure data confusion and security. The proposed transmission scheme modulates image signals into chaotic sequences, and the receiving end recovers the information through inverse operations. Experiments verify the feasibility of the scheme.

Author Contributions

Conceptualization, B.Y. and S.B.; methodology, S.H.; software, S.H.; validation, B.Y. and S.B.; formal analysis, S.H.; investigation, S.H.; resources, S.H.; data curation, S.H.; writing—original draft preparation, B.Y.; writing—review and editing, S.H.; visualization, S.H. and S.B.; supervision, S.H.; project administration, S.H.; funding acquisition, B.Y. and S.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of Hunan Province (No. 2025JJ70215, 2022JJ50191).

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

We thank the associate editor and the reviewers for their useful feedback that improved this paper.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Li, M.; Wang, M.; Fan, H.; An, K.; Liu, G. A novel plaintext-related chaotic image encryption scheme with no additional plaintext information. Chaos Solitons Fractals 2022, 158, 111989. [Google Scholar]
  2. Borges, V.S.; Silva, M.T.; Eisencraft, M. Chaotic properties of an FIR filtered Hénon map. Commun. Nonlinear Sci. Numer. Simul. 2024, 131, 107845. [Google Scholar] [CrossRef]
  3. Li, S.; Wu, Y.; Gao, L.; Li, T.; Zhang, Q.; Shen, Y.; Yang, Z. A high throughput pseudo-random number generator driven by four-dimensional discrete hyper-chaotic system. Electron. Lett. 2023, 59, el2950. [Google Scholar] [CrossRef]
  4. Naik, R.B.; Singh, U. A review on applications of chaotic maps in pseudo-random number generators and encryption. Ann. Data Sci. 2024, 11, 25–50. [Google Scholar]
  5. Sriram, G.; Ali, A.M.A.; Natiq, H.; Ahmadi, A.; Rajagopal, K.; Jafari, S. Dynamics of a novel chaotic map. J. Comput. Appl. Math. 2024, 436, 115453. [Google Scholar]
  6. Zhang, L.; Li, Z.; Peng, Y. A hidden grid multi-scroll chaotic system coined with two multi-stable memristors. Chaos Solitons Fractals 2024, 185, 115109. [Google Scholar]
  7. Ding, P.; Geng, P.; Hu, W. A new controllable multi-wing chaotic system: Applications in high-security color image encryption. J. Supercomput. 2025, 81, 108. [Google Scholar] [CrossRef]
  8. Bao, H.; Xi, M.; Wang, N.; Xu, Q.; Bao, B. Designing multi-cavity chaotic maps via multistage step state extension. Nonlinear Dyn. 2024, 112, 12521–12535. [Google Scholar] [CrossRef]
  9. Ye, X.; Wang, X.; Gao, S.; Mou, J.; Wang, Z. A new random diffusion algorithm based on the multi-scroll Chua’s chaotic circuit system. Opt. Lasers Eng. 2020, 127, 105905. [Google Scholar]
  10. Wang, N.; Li, C.; Bao, H.; Chen, M.; Bao, B. Generating multi-scroll Chua’s attractors via simplified piecewise-linear Chua’s diode. IEEE Trans. Circuits Syst. I Regul. Pap. 2019, 66, 4767–4779. [Google Scholar]
  11. Li, F.; Zeng, J. Multi-scroll attractor and multi-stable dynamics of a three-dimensional jerk system. Energies 2023, 16, 2494. [Google Scholar] [CrossRef]
  12. Lu, R.; Chen, Z.; Lu, L.; Bao, B. Designing multi-double-scroll jerk chaotic oscillators based on attractor modulators. Chaos Solitons Fractals 2024, 187, 115362. [Google Scholar] [CrossRef]
  13. Yu, S.; Lu, J.; Leung, H.; Chen, G. Design and implementation of n-scroll chaotic attractors from a general jerk circuit. IEEE Trans. Circuits Syst. I Regul. Pap. 2005, 52, 1459–1476. [Google Scholar]
  14. Tang, Z.L.; Yu, S.M. Multi-scroll chaotic system based on even-symmetric step-wave sequence control. Appl. Mech. Mater. 2013, 340, 760–766. [Google Scholar]
  15. Xiao, Y.; Sun, K.; He, S. Constructing chaotic map with multi-cavity. Eur. Phys. J. Plus 2020, 135, 21. [Google Scholar] [CrossRef]
  16. Zhu, W.; Sun, K.; He, S.; Wang, H.; Liu, W. A class of m-dimension grid multi-cavity hyperchaotic maps and its application. Chaos Solitons Fractals 2023, 170, 113370. [Google Scholar] [CrossRef]
  17. Zhao, Q.; Bao, H.; Zhang, X.; Wu, H.; Bao, B. Complexity enhancement and grid basin of attraction in a locally active memristor-based multi-cavity map. Chaos Solitons Fractals 2024, 182, 114769. [Google Scholar]
  18. Sun, H.; Liu, L.; Guo, A. Iteration Logistic Map Dynamics in the Polar Coordinates. Fractals 1998, 6, 11–22. [Google Scholar] [CrossRef]
  19. Li, Y.X.; Wang, J.S.; Zhang, S.W.; Zhang, S.H.; Guan, X.Y.; Ma, X.R. Arithmetic optimization algorithm with cosine composite chaotic mapping in polar coordinate system for economic load dispatching problems in power systems. Appl. Soft Comput. 2025, 175, 113039. [Google Scholar] [CrossRef]
  20. Jain, K.; Aji, A.; Krishnan, P. Medical image encryption scheme using multiple chaotic maps. Pattern Recognit. Lett. 2021, 152, 356–364. [Google Scholar] [CrossRef]
  21. Benkouider, K.; Sambas, A.; Bonny, T.; Al Nassan, W.; Moghrabi, I.A.; Sulaiman, I.M.; Hassan, B.A.; Mamat, M. A comprehensive study of the novel 4D hyperchaotic system with self-exited multistability and application in the voice encryption. Sci. Rep. 2024, 14, 12993. [Google Scholar] [CrossRef]
  22. Dong, Y.; Yan, R.; Yin, C. An adaptive robust watermarking scheme based on chaotic mapping. Sci. Rep. 2024, 14, 24735. [Google Scholar] [CrossRef] [PubMed]
  23. Yang, Y.; Chang, R.; Feng, X.; Li, P.; Chen, Y.; Zhang, H. An n-dimensional chaotic map with application in reversible data hiding for medical images. Entropy 2024, 26, 254. [Google Scholar] [CrossRef] [PubMed]
  24. Zang, H.; Fu, H.; Huang, L.; Lei, T.; He, S. Design chaotic maps with elegance of mathematical equations and strengthened by the discrete memristor. Chaos 2025, 35, 063114. [Google Scholar] [CrossRef]
  25. Liu, W.; Sun, K.; Wang, H.; Li, B. The modular modulation chaotification map and its hardware implementation. IEEE Trans. Instrum. Meas. 2024, 73, 2002109. [Google Scholar] [CrossRef]
  26. Hua, Z.; Zhu, Z.; Yi, S.; Zhang, Z.; Huang, H. Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf. Sci. 2021, 546, 1063–1083. [Google Scholar] [CrossRef]
  27. Moulin, P.; O’Sullivan, J.A. Information-theoretic analysis of information hiding. IEEE Trans. Inf. Theory 2003, 49, 563–593. [Google Scholar] [CrossRef]
  28. Amin, M.M.; Salleh, M.; Ibrahim, S.; Katmin, M.R.; Shamsuddin, M. Information hiding using steganography. In Proceedings of the 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings; IEEE: Piscataway, NJ, USA, 2003; pp. 21–25. [Google Scholar]
  29. Öztürk, İ.; Kılıç, R. Digitally generating true orbits of binary shift chaotic maps and their conjugates. Commun. Nonlinear Sci. Numer. Simul. 2018, 62, 395–408. [Google Scholar] [CrossRef]
  30. Farschi, S.M.R.; Farschi, H. A novel chaotic approach for information hiding in image. Nonlinear Dyn. 2012, 69, 1525–1539. [Google Scholar] [CrossRef]
  31. Nasr, M.A.; El-Shafai, W.; Abdel-Salam, N.; El-Rabaie, E.S.M.; El-Fishawy, A.S.; El-Samie, F.E.A. Efficient information hiding in medical optical images based on piecewise linear chaotic maps. J. Opt. 2023, 52, 1852–1866. [Google Scholar] [CrossRef]
  32. Guang, Y.; Ding, Q. Dynamics analysis of a novel parametrically controllable symmetric multi-scroll chaotic system and FPGA design of an image encryption system. Chaos Solitons Fractals 2024, 188, 115572. [Google Scholar] [CrossRef]
  33. Anitha, R.; Vijayalakshmi, B. Image Encryption Using Multi-Scroll Attractor and Chaotic Logistic Map. Comput. Mater. Contin. 2022, 72, 3447. [Google Scholar] [CrossRef]
  34. He, S.; Banerjee, S. Multicavity formations and complexity modulation in a hyperchaotic discrete system. Phys. A 2018, 490, 366–377. [Google Scholar] [CrossRef]
  35. Huang, L.; Wang, L.; Shi, D. Discrete fractional order chaotic systems synchronization based on the variable structure control with a new discrete reaching-law. IEEE/CAA J. Autom. Sin. 2016, 1–7. [Google Scholar] [CrossRef]
  36. Abdeljawad, T.; Baleanu, D. Fractional Differences and Integration by Parts. J. Comput. Anal. Appl. 2011, 13, 574–582. [Google Scholar]
  37. Sandri, M. Numerical calculation of Lyapunov exponents. Math. J. 1996, 6, 78–84. [Google Scholar]
  38. Chen, W.; Zhuang, J.; Yu, W.; Wang, Z. Measuring complexity using fuzzyen, apen, and sampen. Med. Eng. Phys. 2009, 31, 61–68. [Google Scholar] [CrossRef]
  39. Zaccarelli, N.; Li, B.L.; Petrosillo, I.; Zurlini, G. Order and disorder in ecological time-series: Introducing normalized spectral entropy. Ecol. Indic. 2013, 28, 22–30. [Google Scholar] [CrossRef]
  40. Cai, Z.; Sun, J. Convergence of C0 complexity. Int. J. Bifurc. Chaos 2009, 19, 977–992. [Google Scholar] [CrossRef]
  41. Gottwald, G.A.; Melbourne, I. The 0-1 test for chaos: A review. In Chaos Detection and Predictability; Springer: Berlin/Heidelberg, Germany, 2016; pp. 221–247. [Google Scholar]
Figure 1. In the polar coordinate system, the graphs of six different curves are presented, where (af) correspond to the curve equations defined by Equations (1)–(6).
Figure 1. In the polar coordinate system, the graphs of six different curves are presented, where (af) correspond to the curve equations defined by Equations (1)–(6).
Fractalfract 10 00351 g001
Figure 2. In polar coordinate system, six different phase diagrams of chaotic maps. (a) CM1, (b) CM2, (c) CM3, (d) CM4, (e) CM5, (f) CM6.
Figure 2. In polar coordinate system, six different phase diagrams of chaotic maps. (a) CM1, (b) CM2, (c) CM3, (d) CM4, (e) CM5, (f) CM6.
Fractalfract 10 00351 g002
Figure 3. A diagram of the relationship between the Cartesian coordinate system and the polar coordinate system.
Figure 3. A diagram of the relationship between the Cartesian coordinate system and the polar coordinate system.
Fractalfract 10 00351 g003
Figure 4. The flow chart of the algorithm for generating grid multi-cavity attractors.
Figure 4. The flow chart of the algorithm for generating grid multi-cavity attractors.
Fractalfract 10 00351 g004
Figure 5. The varying quantities of multi-cavity chaotic attractors within distinct systems are distributed along the radial axis of polar coordinates. (a) GCM1, (b) GCM2, (c) GCM3, (d) GCM4, (e) GCM5.
Figure 5. The varying quantities of multi-cavity chaotic attractors within distinct systems are distributed along the radial axis of polar coordinates. (a) GCM1, (b) GCM2, (c) GCM3, (d) GCM4, (e) GCM5.
Fractalfract 10 00351 g005
Figure 6. The multi-cavity chaotic attractors in the GCM6 system. (a) 4 × 4 , (b) 5 × 5 , (c) 6 × 6 , (d) 7 × 7 .
Figure 6. The multi-cavity chaotic attractors in the GCM6 system. (a) 4 × 4 , (b) 5 × 5 , (c) 6 × 6 , (d) 7 × 7 .
Fractalfract 10 00351 g006
Figure 7. The grid multi-cavity attractors constructed based on different chaotic systems. (a) GCM1, (b) GCM2, (c) GCM3, (d) GCM4, (e) GCM5.
Figure 7. The grid multi-cavity attractors constructed based on different chaotic systems. (a) GCM1, (b) GCM2, (c) GCM3, (d) GCM4, (e) GCM5.
Fractalfract 10 00351 g007
Figure 8. The application effect of the multi-cavity attractor generation algorithm proposed in this study in the Cartesian coordinate system.
Figure 8. The application effect of the multi-cavity attractor generation algorithm proposed in this study in the Cartesian coordinate system.
Fractalfract 10 00351 g008
Figure 9. The grid multi-cavity attractor within the rectangular coordinate system corresponds to the ring-shaped multi-cavity attractor in the polar coordinate system.
Figure 9. The grid multi-cavity attractor within the rectangular coordinate system corresponds to the ring-shaped multi-cavity attractor in the polar coordinate system.
Fractalfract 10 00351 g009
Figure 10. Phase diagrams of G-L fractional-order GCM1 under different differential orders. (a) α = 0.3 , (b) α = 0.4 , (c) α = 0.5 , (d) α = 0.6 .
Figure 10. Phase diagrams of G-L fractional-order GCM1 under different differential orders. (a) α = 0.3 , (b) α = 0.4 , (c) α = 0.5 , (d) α = 0.6 .
Fractalfract 10 00351 g010
Figure 11. Phase diagrams of Caputo-like fractional-order GCM1 under different differential orders. (a) α = 0.3 , (b) α = 0.4 , (c) α = 0.5 , (d) α = 0.6 .
Figure 11. Phase diagrams of Caputo-like fractional-order GCM1 under different differential orders. (a) α = 0.3 , (b) α = 0.4 , (c) α = 0.5 , (d) α = 0.6 .
Fractalfract 10 00351 g011
Figure 12. Illustration of the fixed points of different chaotic systems. (a) Distribution of fix points for systems CM1 to CM5; (b) Layout of stable points for the system CM6.
Figure 12. Illustration of the fixed points of different chaotic systems. (a) Distribution of fix points for systems CM1 to CM5; (b) Layout of stable points for the system CM6.
Fractalfract 10 00351 g012
Figure 13. Analysis of bifurcation diagrams and Lyapunov exponent spectra under variations of different system parameters. (a) CM1, (b) CM2, (c) CM3, (d) CM4, (e) CM5.
Figure 13. Analysis of bifurcation diagrams and Lyapunov exponent spectra under variations of different system parameters. (a) CM1, (b) CM2, (c) CM3, (d) CM4, (e) CM5.
Fractalfract 10 00351 g013
Figure 14. The complex dynamic behavior of the CM6 varies with different parameters. (a) a 6 varying, (b) b 6 varying, (c) c 6 varying, (d) d 6 varying.
Figure 14. The complex dynamic behavior of the CM6 varies with different parameters. (a) a 6 varying, (b) b 6 varying, (c) c 6 varying, (d) d 6 varying.
Fractalfract 10 00351 g014
Figure 15. The complexity analysis results of the multi-cavity chaotic maps. (a) The variation law of SampEn complexity of different multi-cavity chaotic maps with the number of cavities (m), (b) The variation law of SE complexity of different multi-cavity chaotic maps with the number of cavities (m), (c) The variation law of C 0 complexity of different multi-cavity chaotic maps with the number of cavities (m), (d) The variation law of GCM6 complexity with m, (e) The variation law of SampEn complexity of grid multi-cavity chaotic attractors with m 1 = m 2 , (f) The variation law of SE complexity of grid multi-cavity chaotic attractors with m 1 = m 2 , (g) The variation law of C 0 complexity of grid multi-cavity chaotic attractors with m 1 = m 2 .
Figure 15. The complexity analysis results of the multi-cavity chaotic maps. (a) The variation law of SampEn complexity of different multi-cavity chaotic maps with the number of cavities (m), (b) The variation law of SE complexity of different multi-cavity chaotic maps with the number of cavities (m), (c) The variation law of C 0 complexity of different multi-cavity chaotic maps with the number of cavities (m), (d) The variation law of GCM6 complexity with m, (e) The variation law of SampEn complexity of grid multi-cavity chaotic attractors with m 1 = m 2 , (f) The variation law of SE complexity of grid multi-cavity chaotic attractors with m 1 = m 2 , (g) The variation law of C 0 complexity of grid multi-cavity chaotic attractors with m 1 = m 2 .
Fractalfract 10 00351 g015
Figure 16. The schematic diagram of information hiding demonstrates the method of regulating the position of the system’s iterative points through the pixel values of the image to conceal the image information within the multi-cavity attractor. Additionally, it also includes the information encryption algorithm based on chaos.
Figure 16. The schematic diagram of information hiding demonstrates the method of regulating the position of the system’s iterative points through the pixel values of the image to conceal the image information within the multi-cavity attractor. Additionally, it also includes the information encryption algorithm based on chaos.
Fractalfract 10 00351 g016
Figure 17. Present the results generated by each step in the implementation of the algorithm.
Figure 17. Present the results generated by each step in the implementation of the algorithm.
Fractalfract 10 00351 g017
Figure 18. The quality of image restoration as the intensity of channel noise increases.
Figure 18. The quality of image restoration as the intensity of channel noise increases.
Fractalfract 10 00351 g018
Figure 19. Present the results generated by each step in the implementation of the algorithm.
Figure 19. Present the results generated by each step in the implementation of the algorithm.
Fractalfract 10 00351 g019
Table 1. Parameters, and LEs of six chaotic maps.
Table 1. Parameters, and LEs of six chaotic maps.
SystemsParametersLEs
CM1, Equation (7) R = 5 , a 1 = 3 2.1353
CM2, Equation (8) R = 8 4.0154
CM3, Equation (9) R = 10 , a 3 = 1.5 3.0317
CM4, Equation (10) a 4 = 8 , b 4 = 5 3.5034
CM5, Equation (11) R = 8 , b 5 = 5 3.6847
CM6, Equation (12) a 6 = 8 , b 6 = 24 , c 6 = 1.989 , d 6 = 0.4 3.1762, 2.7413
Table 2. Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) under different image conditions and different noise intensities of channels.
Table 2. Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) under different image conditions and different noise intensities of channels.
ValueFigureFractalfract 10 00351 i001Fractalfract 10 00351 i002Fractalfract 10 00351 i003Fractalfract 10 00351 i004Fractalfract 10 00351 i005
Index
PSNR ε = 0.2 InfInf77.487567.789175.0899
                  ε = 0.3 41.952141.023340.393841.309938.4911
SSIM ε = 0.2 1.0001.000 1 1 1
                  ε = 0.3 0.98700.99510.98550.98460.9676
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yan, B.; Banerjee, S.; He, S. Design of Multi-Cavity Chaotic Maps in the Polar Coordinate Using Nonlinear Curves and Modulo Operation with Application to Cavity-Based Data Hiding. Fractal Fract. 2026, 10, 351. https://doi.org/10.3390/fractalfract10060351

AMA Style

Yan B, Banerjee S, He S. Design of Multi-Cavity Chaotic Maps in the Polar Coordinate Using Nonlinear Curves and Modulo Operation with Application to Cavity-Based Data Hiding. Fractal and Fractional. 2026; 10(6):351. https://doi.org/10.3390/fractalfract10060351

Chicago/Turabian Style

Yan, Bo, Santo Banerjee, and Shaobo He. 2026. "Design of Multi-Cavity Chaotic Maps in the Polar Coordinate Using Nonlinear Curves and Modulo Operation with Application to Cavity-Based Data Hiding" Fractal and Fractional 10, no. 6: 351. https://doi.org/10.3390/fractalfract10060351

APA Style

Yan, B., Banerjee, S., & He, S. (2026). Design of Multi-Cavity Chaotic Maps in the Polar Coordinate Using Nonlinear Curves and Modulo Operation with Application to Cavity-Based Data Hiding. Fractal and Fractional, 10(6), 351. https://doi.org/10.3390/fractalfract10060351

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop