Skip to main content
Springer Nature - PMC COVID-19 Collection logoLink to Springer Nature - PMC COVID-19 Collection
. 2020 Nov 5;33(12):6733–6752. doi: 10.1007/s00521-020-05451-z

Window of multistability and its control in a simple 3D Hopfield neural network: application to biomedical image encryption

Zeric Tabekoueng Njitacke 1,2,, Sami Doubla Isaac 2,3, Tsafack Nestor 2,3, Jacques Kengne 2
PMCID: PMC7641660  PMID: 33169051

Abstract

In this contribution, the problem of multistability control in a simple model of 3D HNNs as well as its application to biomedical image encryption is addressed. The space magnetization is justified by the coexistence of up to six disconnected attractors including both chaotic and periodic. The linear augmentation method is successfully applied to control the multistable HNNs into a monostable network. The control of the coexisting four attractors including a pair of chaotic attractors and a pair of periodic attractors is made through three crises that enable the chaotic attractors to be metamorphosed in a monostable periodic attractor. Also, the control of six coexisting attractors (with two pairs of chaotic attractors and a pair of periodic one) is made through five crises enabling all the chaotic attractors to be metamorphosed in a monostable periodic attractor. Note that this controlled HNN is obtained for higher values of the coupling strength. These interesting results are obtained using nonlinear analysis tools such as the phase portraits, bifurcations diagrams, graph of maximum Lyapunov exponent, and basins of attraction. The obtained results have been perfectly supported using the PSPICE simulation environment. Finally, a simple encryption scheme is designed jointly using the sequences of the proposed HNNs and the sequences of real/imaginary values of the Julia fractals set. The obtained cryptosystem is validated using some well-known metrics. The proposed method achieved entropy of 7.9992, NPCR of 99.6299, and encryption time of 0.21 for the 256*256 sample 1 image.

Keywords: Hopfield neural networks (HNNs), Space magnetization, Multistability control, PSPICE simulations, Biomedical images encryption

Introduction

Hopfield neural network (HNN) was introduced for the first time by Hopfield in 1984 [1]. From then, a better understanding of the dynamical behavior of the Hopfield neural network (HNN) is of major importance in the study of information processing and engineering applications [2, 3], such as pattern recognition [2], associative memory, and signal processing [3]. In addition, many investigations related to the dynamical properties with respect to a variety of complex-valued neural network (CVNN) models have been published in the literature. In the engineering science domain, the applications of CVNN models have been reported by many researchers, e.g., for sonic wave, electromagnetic wave, light wave, quantum devices, image processing as well as signal processing. In regard to both the mathematical analysis and practical application, CVNN models have been widely studied, and many effective methods on various dynamical analyses of CVNN models are available [4, 5]. Mainly, the Hopfield type of neural network (HTNN) models has been considered a key development owing to their adaptive mathematical model capability, along with many powerful methods concerning the stability of HTNN models [47].

We recall that HNN is an artificial model obtained from brain dynamics and it is an essential model that plays a substantial role in neurocomputing [8]. Such neuronal model is capable to accumulate some information or specimens in a way similar to the brain. We can now realize that more and more research has been done to develop robust encryption algorithms based on chaotic sequences. Inverse tent map was used by Habutsu et al. in a chaotic cryptosystem [9], in which the plaintext represents the initial condition of the inverse tent map and the ciphertext is obtained by iterating the map N times. Because of the weakness of the piecewise linearity of the tent map and the use of 75 random bits, Biham presented a known-plaintext attack and a chosen-plaintext attack to break it [10]. Baptista suggested a new encryption method in which a chaotic attractor is divided into S units representing different plaintexts, the ciphertext is the number of iteration from an initial value to the unit representing the plaintext, and the logistic map is used for demonstration [11]. Before applying chaos for encryption it is necessary to analyze the dynamics of the whole system in other to highlight its complex behaviors and properties.

Recently, several works have been focused on the investigation of the multistable property of the HNN [1215]. Recall that multistability in HNNs means the coexistence of several stable states for the same set of synaptic weight matrix by starting the evolution of the model from different initial conditions [13]. It has already been found in several classes of nonlinear dynamical systems [1626]. In this scope, there are special cases of multistability which have attracted much attention in recent years. Among others, we have systems with extreme multistability (characterized by the coexistence of an infinite number of attractors, in this case, the bifurcation control parameter is one of the initial conditions) [2730]. Other types of multistable systems found recently are systems with megastability [3135]. These later cases have an infinite number of coexisting attractors, but there are no such bifurcations in them like systems with extreme multistability [32]. In other words, the term megastable has been used for systems with countable infinite attractors [36], in contrast to extreme multi-stability which is related to non-countable infinite attractors. The coexistence of multiple attractors including up to four disconnected found by Bao et al. [12, 15, 37]. Likewise coexistence of up to six disconnected attractors as well as antimonotonicity phenomenon is found by Njitacke et al. in some classes of 4D HNN in [13, 14] and bursting oscillations [27] discovered by Bao et al. in a model of two-neuron-based non-autonomous memristive Hopfield neural network. Very recently, Bao et al., 2019 have explored the effect of the gradient variation on the dynamics of a 3D HNN. As result, the authors found that when gradients of the activation functions were varied, the proposed model was able to display a bistable property [38]. From the point of view of the application, the coexistence of different stable states offers great flexibility in the system performance without major parameter changes; that can be exploited with the right control strategies to induce a definite switching between different coexisting states [39, 40]. However, multistability may create inconvenience, for instance, in the design of a commercial device with a specific characteristic where coexisting stable states need to be avoided or the desired state has to be controlled/stabilized against a noisy environment [40]. Many strategies/technics are existing in the literature to control multistability (by annihilating some stable trajectories) or target specific attractors such as pseudo-forcing [41], short pulses [42], noise selection [43], harmonic perturbation [44], and linear augmentation [45]. Except for linear augmentation method, in almost all other existing methods, the control is applied to one parameter of the system parameters to delete (cancel, disappear, remove) on the attractors for all initial points. Thus, external control like the linear augmentation method would be preferred. Since its solid successful application prior in 2011 on the stabilization of fixed-point solution in chaotic systems by Sharma et al. [46], the linear augmentation scheme has been extended later on the control of bistability in chaotic attractors comprising of well-separated unstable steady state [47]. In addition, Fozin et al. [48] have exploited this technic on linear augmentation to control the coexistence of three attractors in a hyperchaotic system. However, from these aforementioned works, there is no one focused on the control of multistability in a dynamical system with up to four or more than four attractors. More particularly, there are no works focused on the multistability control in the Hopfield neural network despite their various applications in engineering [13, 8].

New researches are developed to propose modern encryption algorithms. A chaotic system is a major tool in this prominent research domain due to ergodicity, deterministic dynamics, unpredictable behaviors, nonlinear transformation, and sensitivity dependence of the system [4952]. For instance, Gao et al. [49] designed an encryption algorithm based on Chen hyperchaotic system. A simple diffusion–confusion encryption scheme is developed in their work. Zhou et al. [50] used 1-D chaotic map to establish the encryption key for both color and gray images. Analysis of the proposed scheme showed a high security level. As strong cryptographic technics are developed, cryptanalysis is also growing. Another idea of chaos encryption is to use the discrete output of the neural network to increase the security of the process. In this line, Xing et al. [51] designed an encryption scheme using both the sequences of the Lorenz attractor and the discrete output of the perceptron model. Experimental results show a high security algorithm. Lakshmi et al. [52] design an encryption algorithm based on HNN. The technics uses a simple diffusion–confusion algorithm, and security against some existing attacks is achieved.

A variety of encryption methods can be found in the literature and classified either as q spatial domain or frequency domain encryption algorithms [4952]. The first method directly considers the pixel of the original image without any transformation. The second method applies a mathematical transformation on the original image to compute some coefficients based on image pixels. Transform domain-based algorithms seem to be more efficient and robust than the spatial domain. The above-mentioned techniques combining both chaos and neural network in cryptography rely on the spatial domain algorithms. In this paper, we will use the Julia set and the discrete sequences of the proposed HNN to transform the pixels of the plain image. Then, the sequences of a simple 3D Hopfield neural network will be applied for encryption.

Thus, our objectives in this work are as follows:

  • To propose a novel topological configuration (with different activation gradients) of a simple 3D HNN

  • To present the space magnetization which enables the coexistence of multiple stable states through attraction basins

  • To control the multistable behavior using linear augmentation and show that only one stable state survive.

  • Finally, use the sequences of the proposed HNN to design a robust encryption scheme relying on the transform domain algorithms.

It is important to stress that the linear augmentation method has been considered in the literature only to control two different attractors (i.e., bistable or tristable systems) [48]. Also to the best of authors’ knowledge, no other chaotic systems, particularly no HNN with up to six disconnected stable states, have been successfully controlled in the literature until date. Finally, the complex HNN has been equally used for robust image encryption. Thus, the present results contribute to enrich the literature about HNN behavior as well as their engineering applications.

The layout of the paper is as follows: Sect. 2 focuses on the mathematical model and some basic properties of the introduced HNN model. In Sect. 3, investigations are carried out in order to highlight different windows with the proposed HNN displaying the magnetization of the space and thus the phenomenon of coexistence of multiple attractors. In Sect. 4, a recall on the linear augmentation control method is discussed. Section 5 presents the discussion of results when the control method is applied to the HNN. The PSPICE verification of the obtained result is addressed in Sect. 6. The cryptosystem is designed and analyzed in Sect. 7. Finally, we conclude and proposed some future issues in the last section.

Mathematical expression of the investigated model

It is well known that Hopfield neural networks (HNNs) can be used to describe and simulate some brain behaviors in the context of the learning and memory process. In such type of neuron, the circuit equation can be described as

Cidxidt=-xiRi+j=1nwijtanhβjxj+Ii 1

The term xi is a state variable corresponding to the voltage across the capacitor Ci. Ri is a resistor related to the membrane robustness between the inside and outside of the neuron. Ii denotes the input bias current. The matrix W=wij is a n×n synaptic weight matrix. Synaptic weight represents the strength of coupling that one neuron has on another [1, 1214, 38]. tanh(βjxj) is the smooth neuron activation function indicating the voltage input from the jth neuron where the term βj is the gradient. In this contribution, we consider thatCi=1, Ri=1, Ii=0 and n=3. Now considering the following weight matrix:

w=w11w12w13w21w22w23w31w32w33=2-1.20.483.61.71.076-900 2

From all the above considerations, the smooth nonlinear third-order differential equations highlighting the dynamics of the Hopfield neural networks model is taken in a dimensionless form as:

x˙1=-x1+2tanh(β1x1)-1.2tanh(β2x2)+0.48tanh(β3x3)x˙2=-x2+3.6tanh(β1x1)+1.7tanh(β2x2)+1.776tanh(β3x3)x˙3=-x3-9tanh(β1x1) 3

In Eq. 3, βi are the variable gradient of the activation function. When β=1, it corresponds to a standard gradient, β>1 to a high gradient and step-like curve with the faster response speed of the neuronal electrical activities, and β<1 to a low gradient and flat sigmoid curve with the slower response speed of the neuronal electrical activities [1]. For β1=0.9, β3=1.4, β2=tuneable several properties of the model are investigated. It can be seen that the model investigated in this work is symmetric meaning that it is invariant under the transformation x1,x2,x3-x1,-x2,-x3. It is easy to demonstrate that the volume contraction rated of the model is given by

.f=-3+1.81-tanh2(0.9x1)+1.7β21-tanh2(β2x2) 4

Since 01-tanh2(βixi)1 and that -1tanh(βixi)1, the model can be dissipative and thus support attractors for a judicious choice of β2.

Different windows of multistability

In this section, we show how transitions between stable states in the model of HNNs occur using bifurcation diagrams and graphs of Lyapunov exponents. Numerical simulations are made using the fourth-order Runge–Kutta formula. For each iteration, the time grid is always Δt=2×10-4 and the computations are made using parameters and variables in extended precision mode. After several computer simulations, we have obtained bifurcation diagrams of Fig. 1 with their corresponding graph of the largest Lyapunov exponent. In this figure, up to four diagrams are superimposed. So, these diagrams highlight the phenomenon of coexisting bifurcation which justified the coexistence of several stable states for the same set of synaptic weight but different initial conditions. The diagrams of the previous figure are obtained by increasing the gradient of the second neuron starting from different initial conditions as presented in Table 1. For β2=1.15, the model displays the coexistence of four disconnected stable states. The cross sections of the basin of attraction which enable to obtain each of the previous attractors are presented in Fig. 2.

Fig. 1.

Fig. 1

Bifurcation diagram showing local maxima of neuron state variable x1 when the activation gradient β2 of the second neuron is varied in the range 1.15β21.25: a, b exhibit the coexistence of four different bifurcation diagrams while c, d show the corresponding graph of the maximal Lyapunov exponents (with respect colors). The activation gradients of the first and the third neuron are β1=0.9 and β3=1.4

Table 1.

Method used to obtain coexisting bifurcation diagrams of Fig. 1

Figure Gradient range Color diagram Scanning direction Initial condition starting
Figure 1 1.15β21.25 Red Downward 1.44,0,0
1.15β21.25 Green Downward 2,0,0
1.15β21.25 Blue Downward 1.2,0,0
1.15β21.2 Magenta Downward 1.84,0,0

Fig. 2.

Fig. 2

Coexisting multiple attractors’ behavior of chaotic and periodic attractors near β2=1.15 in the plane x1,x2. Phase plane trajectories of a pair of single scroll chaotic attractors are given in (a) while the one given the for period-1 limit cycle is provided in (b) for initial condition, see Table 2; the rest of the parameters are the same used for Fig. 1

The basins of attraction associated with each of the previous coexisting attractors are provided in Fig. 3. These basins show the set of the initial conditions which enable to obtain each of the previous coexisting stable states. From these attraction basins, it can be seen that the one of the chaotic stable states is larger than one of the periodic stable states. In the same line when β2=1.183 the model under consideration displays the coexistence of six disconnected stable states for different initial conditions as depicted in Fig. 4. For each coexisting attractor, the domain of initial conditions which permits to capture it is provided in Fig. 5. As in the case of the coexistence of four attractors, the attraction basins of the chaotic stable state are also larger than one of the periodic stable states. Table 2 provides a summary of the initial condition used to capture each of the coexisting stable states presented in this work. In order to obtain the stability of the region where the model defined in Eq. 3 displays coexisting attractors, let x˙1=x˙2=x˙3=0. Using the MATLAB built-in function” fsolve,” the stability of our model is provided in Table 3. From the results of this table, we conclude that the system experiences self-excited stable states.

Fig. 3.

Fig. 3

Cross sections of the basin of attraction obtained when the initial state of the third and the second neuron are x3(0)=0 and x2(0)=0, respectively. These attraction basins correspond to the asymmetric pair of period-1 cycle (red and blue) and the pair of chaotic attractors (green and magenta). Parameters are those of Fig. 2

Fig. 4.

Fig. 4

Coexisting multiple attractors’ behavior of two pairs chaotic attractors and one pair of periodic attractors near the activation gradient of the second neuron β2=1.183. The initial conditions used to obtain each attractor are provided in Table 2

Fig. 5.

Fig. 5

Cross sections of the basin of attraction obtained when the initial state of the third and the second neuron are x3(0)=0 and x2(0)=0, respectively. These attraction basins are associated with the asymmetric pair of period-1 cycle (red and blue), the first pair of chaotic attractors (green and magenta), and the second pair of chaotic attractors (purple and cyan). Parameters are those of Fig. 4

Table 2.

Initial conditions used to obtain coexisting attractors of Figs. 2 and 4

Figures Coexisting Corresponding colors Corresponding initial condition
Figure 2 Period-1 limit cycles Red 1,0,0
Blue -1,0,0
Chaotic attractor Magenta 2,0,0
Green -2,0,0
Figure 4 Period-1 limit cycles Blue 1.44,0,0
Red -1.44,0,0
Spiral chaotic attractor Magenta 0.5,0,0
Green -0.5,0,0
Spiral chaotic attractor Violet 1,0,0
Cyan -1,0,0

Table 3.

Coexistence types, the equilibrium points states, their eigenvalues, and stabilities for different values of β2

β2 Coexistence Equilibrium points states P0,1,2,3,4 Eigen values λ1,2,3 Stabilities
1.15 Period-1 limit cycles (lower and upper) and Chaotic attractor (lower and upper) P00,0,0

− 0.4351 + 3.1857i

− 0.4351 − 3.1857i

1.6253 + 0.0000i

Unstable saddle focus
P1,2±3.674,0.54491.3659i,8.9759

− 1.0000 − 0.0000i

− 0.9782 − 0.0000i

− 5.3874 + 0.0002i

Stable saddle focus
P3,4±0.3886,0.1434,3.0253

0.7483 + 1.9585i

0.7483 − 1.9585i

− 0.9971 + 0.0000i

Unstable saddle focus
1.183 Period-1 limit cycles (lower and upper), spiral chaotic attractor (lower and upper), and spiral chaotic attractor (lower and upper) P00,0,0

− 0.4269 + 3.2062i

− 0.4269 − 3.2062i

1.6648 + 0.0000i

Unstable saddle focus
P1,2±3.665,0.53251.3278i,8.9755

− 1.0000 + 0.0000i

− 0.9778 + 0.0000i

− 5.4599 − 0.0001i

Stable saddle focus
P3,4±0.3898,0.1389,3.0339

0.7752 + 1.9836i

0.7752 − 1.9836i

− 0.9972 + 0.0000i

Unstable saddle focus

Theory of linear augmentation

The implementation of this control method of linear augmentation consists to couple a linear dynamic system with a nonlinear system and then increasing the coupling strength in order to achieve the control goal, which can be described as [4548]

X˙=GX+εYY˙=-kY-εX-b 5

In Eq. 5, X˙=GX represents any nonlinear system, Y˙=-kY is the linear dynamical system coupled to the nonlinear system, and k is its decay parameter [47]. In Eq. (5), the linear system disappears in the absence of coupling i.e.ε=0. In other words, the dynamic behavior of the nonlinear system will not be influenced by the linear system when this parameter condition is satisfied. Another important parameter is b which is exploited to locate the expected attractor based on the fixed points of the nonlinear system. For higher values of the coupling strength, only one desired attractor is obtained turning the system for chosen parameter sets from multistable to monostable one. In addition, the choice of adaptive feedback control instead of non-adaptive control was guided by some recent results of control and synchronization on some nonlinear dynamical systems [23, 5357]. Indeed, it has been demonstrated in these recent works that control and synchronization of the nonlinear system using adaptive feedback control offer robustness to the system more than non-adaptive control. In addition, the use of the adaptive feedback control can also view as a scalar controller; thus, only one state of the systems is used in the process. Thus, the energy as well the resources consumption is very low. Also, the control method used in this work is external and preferred in case of inaccessibility of the internal system parameter and/or variables.

Control of the multistability

When a linear controller is coupled with a nonlinear 3D HNN, an autonomous 4D dynamical system describing the dynamics of the controlled HNN is given in Eq. 6

x˙1=-x1+2tanhβ1x1-1.2tanhβ2x2+0.48tanhβ3x3x˙2=-x2+3.6tanhβ1x1+1.7tanhβ2x2+1.776tanhβ3x3x˙3=-x3-9tanhβ1x1+εyy˙=-ky-εx3-b 6

To explore the annihilation process from multistable system to monostable one with a unique survive stable state, we exploit the equilibrium points of Eq. 3 in the window of multistable behavior. When we set β2=1.15, k=0.5 and b=8.9759. The value of b represents one among the value of the equilibrium point x30 which enables to obtain the stability of the four coexisting attractors depicted in Fig. 2.

Control of four coexisting attractors

When we set β2=1.15 and increasing the control parameter ε in the range 00.15 as shown in Fig. 6, four sets of data are superimposed. Each set of data corresponds to the route followed by each attractor during the control mechanism. As depicted in Fig. 6, three crises enable all the other routes to follow only the red route. In the region (A1), for very small values of ε four attractors coexist including two chaotic attractors (magenta color and green color) with two periodic attractors (red color and blue color) being depicted. At the upper boundary of (A1), the diagram in green (chaotic one) undergoes a crisis (first crisis) and merges with the diagram in blue. In the region (A2), because of the previous merging crisis, there are only three distinct diagrams that follow their bifurcations. For a discrete value ε=0.016, we have the coexistence of three disconnected attractors, involving a pair of period-1 limit cycle with an asymmetric chaotic attractor as presented in Fig. 7.

Fig. 6.

Fig. 6

Bifurcation diagram showing local maxima of the state variable of the third x3 versus the coupling strength ε in the range 00.15 of the controlled system (see Eq. 6). Four separated diagrams are superimposed when increasing the coupling strength ε for four different initial conditions. The diagram in green is obtained with the initial conditions -2;0;0;0, the one in magenta is obtained for the initial conditions 2;0;0;0, red is for the initial conditions 1;0;0;0, and blue diagram is obtained for the initial conditions -1;0;0;0 The rest of the controller parameters are fixed to k=0.5 and b=8.9759 while those of neural network are the same with Fig. 2

Fig. 7.

Fig. 7

Attractors of the controlled system, showing three coexisting attractors (a pair of symmetric period-1 limit cycle (red and blue colors) and asymmetric chaotic attractor (magenta color) when the coupling strength ε=0.016. The rest of the system parameters are those of Fig. 6 and the other initial conditions fixed to zero

In the region (A3), we observe the superposition of three periodic diagrams. At the upper boundary of (A3), a crisis (second crisis) enables the diagram in magenta displaying a period-3 limit cycle to merge with the diagram in red. In the region (A4), because of the second crisis, there are only two distinct diagrams that follow their bifurcations. At the upper boundary of (A4), a crisis (third crisis) enables the bifurcation diagram in blue (displaying Period-2 limit cycle) to merge also with the red bifurcation diagram. When the critical value ε=0.1, all the diagrams have already merged with the red one and the control goal is achieved as depicted in the region (A5). For a particular value ε=0.12, Fig. 8 displays the unique attractor with their corresponding frequency spectrum which has survived through the control scheme. We can say that the route exhibited by the red diagram is a magnetized route which attracts toward its all the other routes as the control parameter is increased.

Fig. 8.

Fig. 8

Phase portrait of the surviving attractor obtained when the control scheme is achieved for a discrete value the coupling strength ε=0.12 with their corresponding frequency spectrum

Control of six coexisting attractors

When we set β2=1.183, k=0.5, b=8.9755 and varying ε in the range 00.15, six set of data are superimposed (magenta, green, blue, red, black, and yellow color). Each set of data corresponds to the bifurcation route follows by each attractor during the control mechanism. As depicted in Fig. 9, five crises enable all the other routes to follow only the yellow one. For a very small value of ε, six distinct diagrams coexist; when gradually increasing the control parameter, several crises occur.

Fig. 9.

Fig. 9

Bifurcation diagram showing local maxima of the neuron state variable x3 versus the coupling strength ε in the range 00.15 of the controlled system (see Eq. 6). Six separated diagrams are superimposed when increasing the coupling strength ε from three different initial states. The diagram in yellow is obtained with the initial states 1.44;0;0;0; the blue one is obtained for the initial states -1.44;0;0;0. The one in magenta is obtained for the initial states 0.5;0;0;0. The diagram in red is obtained for the initial states -0.5;0;0;0. The black diagram is obtained with the initial states 1;0;0;0 and green one for the initial states -1;0;0;0. The rest of the controller parameters are fixed to k=0.5 and b=8.9755 while those of neural network are the same with Fig. 2

At the critical point (C1), the first crisis arises and the chaotic diagram in magenta merges with the chaotic one in green. Note that after the first crisis, only five bifurcation diagrams coexist before the second crisis. When performing a tiny incrementation of ε, the second crisis happens at the crucial value (C2), and the diagram in green merges with the blue diagram. When further increasing the control parameter, at the critical value (C3), the third crisis occurs and the blue diagram merges with the diagram in yellow. As shown in Fig. 9, for the critical value (C4), the fourth crisis occurs and the diagram in red merges with the diagram in black. A further incrementation of the control parameter enables the fifth crisis to occur at (C5); the route followed by the black diagram merges with the one of the yellow. Past the critical value (C5), all the routes followed by the diagrams have merged in a unique one and the control goal is achieved. Note that after each crisis, the number of routes becomes one less than the initial number. Also, we can say that the route exhibited by the yellow diagram is a magnetized route which attracts toward it all the other routes as the control parameter is increased. Based on these investigations, we can easily conclude that the linear augmentation scheme enables to move from a multistable HNN (with six coexisting attractors) to a monostable HNN (one attractor) using a judicious choice of controller parameters.

Circuit implementation

In order to confirm the results obtained previously, this section focused on the implementation of the controlled HNN using PSPICE simulations software [13, 14, 18, 29, 30, 48]. Remark that the hardware experiments on a breadboard would have been welcome. However, the PSPICE simulation (which confirms our theoretical/numerical results) represents an alternative approach to solving the mathematical model of the controlled HNN considered in this work. A schematic diagram of a chaotic HNN coupled with a linear dynamical system is presented in Fig. 10. The circuit in Fig. 10 has been designed following the method of analog computer-based on Miller integrators, using operational amplifiers, capacitors, resistors [13, 14, 18, 29, 30, 48]. The neuron state variables xjj=1,2,3 and the controller state variable y of Eq. 6 are associated with the voltages across the capacitors C1, C2, C3 and C4, respectively. Differential equations of system (7) are obtained by applying Kirchhoff’s laws

C1dX1dt=-1RX1+1R1tanhβ1X1-1R2tanhβ2X2+1R3tanhβ3X3C2dX2dt=-1RX2+1R4tanhβ1X1+1R5tanhβ2X2+1R6tanhβ3X3C3dX3dt=-1RX3-1R7tanhβ1X1+1RεYC4dYdt=-1RkY-1RεX3-RRbVCC 7

Fig. 10.

Fig. 10

Circuit diagram of the controlled HNN. a Represents the main neural network follows by the linear system; b is the smooth activation function

where X1, X2, X3, and Y are the voltage across capacitors C1, C2, C3 and C4 With C1=C2=C3=C4=C=10nF, R=10KΩ, RC=1KΩ, I0=1.1mA, Vcc=15V, tanhRβj2RVTVin=tanhβjVin so βj=Rβj2RVT with VT=26mV thus, Rβ1=2RVTβ1=520×0.9=468Ω, Rβ3=2RVTβ3=520×1.4=728Ω, t=τRC, Xi=1V×xi(i=1,2,3), R1=Rw11=5kΩ, R2=Rw12=8.333kΩ, R3=Rw13=20.833kΩ, R4=Rw21=2.777kΩ, R5=Rw22=5.882kΩ, R6=Rw23=9.293kΩ et R7=Rw31=1.111kΩ, Rk=20kΩ, Rβ2=tuneable, Rε=tuneable, Rb=tuneable.

As it can be observed in the controlled HNN depicted in Fig. 10, there is a switch which enables the linear controller to be connected to the nonlinear HNN. When the switch is opened, the controller is OFF and the HNN displays the coexistence of up to six disconnected attractors as shown in Fig. 11. Know when the switch is closed the controller is ON. For a suitable choice of the controller parameter (i.e., Rb=16.71kΩ, Rε=83.33kΩ and Rk=20kΩ), the HNN circuit exhibits a monostable dynamics. Figure 12 displays a monostable period-1 limit cycle and their corresponding frequency spectrum which supports the control schema used in this work. Thus, we have provided an alternative method to support our obtained results using the PSPICE simulation environment.

Fig. 11.

Fig. 11

PSPICE simulation showing the coexistence of six different attractors for Rβ2=625Ω. The diagrams in a, b and c show the pair f period-1 limit cycles (lower and upper), the first pair of spiral chaotic attractors (lower and upper), and the second pair spiral chaotic attractors (lower and upper), respectively. The initial conditions used to obtain these attractors are V(X1(0),X2(0),X3(0))=(±5.5,0,0); (±0.5,0,0); and (±1.5,0,0), respectively

Fig. 12.

Fig. 12

PSPICE simulations results showing in a the monostable attractor generated from the controlled HNN with their corresponding frequency spectra. This result is obtained for Rb=16.71kΩ, Rε=83.33kΩ, and Rk=20kΩ. Initial conditions are (±0.3,0,0,0)

Application of the proposed HNN to image encryption

The algorithm

Chaos acts as a vital tool in modern cryptographic procedures [58]. Based on the advantages of the presented HNN chaotic system, we proposed a new image encryption algorithm based on fractal Julia set. In effect, Julia set is a fractal of complex numbers considered as input whose output through a quadratic function f(z)=z2+c is bounded [59]. Here c is a complex constant. The function f(z) is initialized and iterated. Setting the real values of the complex number z as the x pixel index and the imaginary values of the complex number z as the y pixel index, the Julia set can be visualized for different values of the complex constant c. An issue of this visualization for a complex Julia set is illustrated in Fig. 13 for c = − 0.745429. The encryption procedure of our proposed approach is described in Fig. 14, and the detailed steps are stated as follows:

Step 1

Select the initial values (x10, x20, x30, β1,β2,β3) for iterating the presented HNN chaotic system for h × w × c times to outcome three sequences {X1}, {X2}, and {X3}, where h × w is the dimension of the plain image.

Step 2

Compute the sequence of real values Re and the sequence of imaginary values Im from the complex domain of the Julia set of fractals.

Step 3

Convert the real sequence X1 to integer as X=fixX1i×1016mod256; then, perform Bit-XORed process on the sequence X and the sequence of real values Re of the Julia set to construct the first key sequence Key1 as Key1=XRe.

Step 4

Substitute the plain image (P) using Key1: C1=PKey1.

Step 5

Permute the C1 matrix using two sequences X2 and X3 as follows.graphic file with name 521_2020_5451_Figa_HTML.jpg

Step 6

Convert the real sequence X3 to integer as Z=fixX3i×1016mod256; then, perform Bit-XORed process on the sequence Z and the sequence of imaginary values Im of the Julia set to construct the second key sequence Key2 as Key2=ZIm.

Step 7

Substitute the permutated image (PerIm) using Key2 to obtain the final encrypted image (C). C=PerImKey2.

Fig. 13.

Fig. 13

Visualization of the Julia set for c = − 0.745429

Fig. 14.

Fig. 14

Outline of the encryption process for the proposed encryption mechanism

Experimental analysis

With the aim to assess the proposed cryptosystem, experimentations are performed on a laptop equipped with Intel Core™ i7-3630QM, 16 GB RAM, and provided with MATLAB R2016b. Our dataset consists of three medical images each of size 256 × 256 (see Fig. 15) obtained from various medical image sources including the COVID-CT database [60] which is the most important database of COVID-19 computed tomography (CT) images available for the public. The initial values for iterating the presented HNN chaotic system are set as x10 = 2, x20 = 0, x30 = 0, β1=0.9,β2=1.15,β3=1.4.

Fig. 15.

Fig. 15

Encryption issues and experimental dataset of images

Correlation of adjacent pixels

One of the fundamental tools to measure the robustness of an image is the correlation coefficient of adjacent pixels Cmn. For regular images, Cmn values are near to 1 in every direction while for cipher images of a good encryption algorithm Cmn values should close to 0 [59]. To evaluate Cmn, we randomly selected 104 pairs of neighboring pixels in every direction. Cmn are usually stated as follows:

Cmn=x=1Amx-m¯nx-n¯x=1Amx-m¯2x=1Anx-n¯2 8

where mx, nx are used to point out the values of adjacent pixels and A points out the whole amount of nearby pixel pairs. It is evident from the outcomes plots presented in Fig. 16 that no profitable information can be retrieved from the encrypted data.

Fig. 16.

Fig. 16

Distribution of Cmn for original and cipher sample 1 image. This is the representation of pixels gray values on position (x + 1, y + 1) with respect to pixels gray values on position (x, y)

Information entropy

To assess the concentration of the pixel values in the image, information entropy is applied, which can be computed as:

E(Y)=-a=12b-1p(ya)log2p(ya) 9

where p(ya) represents the possibility of ya and b indicates the pixel bit level, which is equivalent to the typical entropy value 8-bits [61]. Table 4 states the outcomes of entropy values for original images and their equivalent cipher ones, whose values for the cipher images are very close to 8.

Table 4.

Outcomes of information entropy

Image Original Cipher
Sample 1 7.486792 7.99929
Sample 2 7.31105479210 7.99924
Sample 3 4.738529048 7.99922

Histogram test and Chi-square test

The reverberation of the organization of pixels in an image is evaluated using the histogram test. A good designed image encryption approach has a similar distribution of distinct cipher images for guaranteeing to resist statistical attacks [62]. Figure 17 presents the histograms of the experimented grayscale images which are distinct from each other, whereas the distributions of their equivalent cipher ones are identical with each other and are almost flat. This uniformity may be verified by using the Chi-square test. Table 5 provides the results of Chi-square values with 0.05 as weight value. Usually, the flatness of the histogram is validated if Chi-square value of the test sample is less than 293.2478 indicating a p value higher than 0.5. Regarding Table 5, the histogram test of various test samples is validated.

Fig. 17.

Fig. 17

Histograms of the experimented grayscale images for original and cipher images. This is the representation of frequency distribution of pixels with respect to their respective gray values

Table 5.

Chi-square values for each encrypted test data

Images χ2 values Decision
R G B Average
Sample 1 35,203.9231 42,540.1518 18,654.2550 32 132,7766 Non-uniform
Enc-Sample 1 255.3854 251.0452 253.7126 253.3810 Uniform
Sample 2 66,821.1256 18,764.5220 61,778.2589 49,121,3021 Non-uniform
Enc-Sample 2 262.0040 258.3696 268.2821 262,8852 Uniform
Sample 3 78,021.5000 50,118.2843 59,897.3678 62 679,0507 Non-uniform
Enc-Sample 3 249.8526 259.3578 265.8527 258,3543 Uniform

NPCR tests

The outcome of varying pixels in the original image on its equivalent cipher one is measured using NPCR (“Number of Pixels Change Rate”), which can be computed as follows.

NPCRP,C=m;nDiff(m,n)D×100%,Diff(m,n)=0ifP(m,n)=C(m,n)1ifP(m,n)C(m,n) 10

here D denotes the complete pixel numbers in the image. The outcomes of NPCR for the experimented dataset are displayed in Table 6, in which the medium value for the experimented dataset is 99.6175%; consequently, the given encryption approach is high sensitive to tiny pixel changes in the original image.

Table 6.

Outcomes of NPCR test for the experimented dataset

Image NPCR%
Sample 1 99.6299
Sample 2 99.6044
Sample 3 99.6185

Time analysis and comparison of the proposed cryptosystem

One of the important measures to assess the performance of an algorithm is its running speed. Definitely, an encryption algorithm should take minimum execution time so that it can be effectively used in enciphering images. Table 7 shows the running speed of Sample 1 images for different sizes. The computational platform is equipped with Intel® core TM i7-3630QM 16 GB RAM and a MATLAB R2016b software. The computational time increases with respect to the size of the plain image. Note this computational time also relies on the capacity of the workstation (the processor and the RAM). Table 7 shows that an acceptable running speed is obtained and the algorithm is competitive with the results of the literature.

Table 7.

Comparison of the running speed of sample 1 images

Algorithm Image size
128*128 256*256 512*512 1024*1024
Proposed 0.12 0.21 0.99 3.56
[63] 0.05 0.22 0.97 3.93
[64] 6.30 8.20 16.43 38.00
[65] 21.03 27.12 36.53 63.82

Comparative analyses and discussions

This analysis is done in two ways: First, we show the superiority of the dynamical behaviors on the proposed HNN. Second, we compare the results of the encryption scheme with the existing literature.

Dynamic analysis

Very recently, several research works have been carried out on the dynamic analysis of some particular classes of HNNs among with those with fixed activation gradients and those with variable activation gradients [1215, 20, 38]. From some of these works summarized in Table 8, it has been found that the investigated models were the phenomenon of the multistability characterized by the coexistence of several firing patterns for the same set of the synaptic weights by starting from different initial conditions. The obtained results were further supported/validated using either hardware experiments of PSPICE simulations. It is well known that in some cases the multistable behavior is an undesirable behavior and needs to beavoid sometimes. This is why in this work, we introduce a simple 3D HNNs with variable activation gradient.

Table 8.

Synthesis of some recent attractive works of the HNNs literature

Works Number of coexisting attractors Consideration of activation gradient Control Implementation Application
[12] 4 NO NO PSPICE circuit simulations and hardware experiments NO
[15] 3 NO NO PSPICE circuit simulations and hardware experiments NO
[37] 2 NO NO Hardware experiments NO
[13] 4 NO NO PSPICE circuit simulations NO
[14] 6 NO NO PSPICE circuit simulations NO
[38] 2 YES NO Hardware experiments NO
[20] 3 NO NO PSPICE circuit simulations NO
This work 6 YES YES PSPICE circuit simulations YES

In addition, we show the introduced model is able to display the coexistence of up to six disconnected firing patterns. We equally used the linear augmentation method to annihilate the coexisting pattern of the neural networks. It is good to mention that this annihilation process of the multistability has not yet been addressed in the previous works related to such neural networks with coexisting behavior as well as the application in engineering.

Encryption technics

A variety of encryption methods can be found in the literature and classified either as a spatial domain or frequency domain encryption algorithms. The first method directly considers the pixel of the original image without any transformation. The second method applies a mathematical transformation on the original image to compute some coefficients based on image pixels. Transform domain-based algorithms seem to be more efficient and robust than the spatial domain. In this paper, we will use the Julia set and the discrete sequences of the proposed HNN to transform the pixels of the plain image. Then, the controlled sequences of a simple 3D Hopfield neural network will be applied for encryption. Some achievements of the proposed encryption technics are resumed in Table 9, and a comparative analysis is carried out. It is obvious that the proposed encryption scheme provides high security over the existing literature.

Table 9.

Comparative analysis for sample 1 data

Encryption technics Correlation coefficients NPCR (%) Entropy Encryption time (s)
H V D
This work 0.0026 0.0026 7.9992 99.6299 7.9992 0.21
[63] 0.0115 0.0018 7.9976 99.5705 7.9976 0.22
[64] 0.0005 0.0059 7.9991 99.6104 7.9991 8.20
[65] − 0.0318 0.0965 7.9891 99.6325 7.9891 27.12

Conclusion

In this paper, a novel simple 3D autonomous HNN has been introduced and investigated. Based on nonlinear analysis technics, we have demonstrated that the investigated system was able to exhibit the phenomenon of multistability with up to six competing attractors. Using the linear augmentation method, we have equally controlled the multistable found in the HNN for some suitable choice of controller parameters as well as the coupling strength. Remark that, in the work of [39], the surviving attractor was different from the initial coexisting ones, whereas in the control scheme adopted in this work, the surviving attractor is one among the initial coexisting attractors. It is found that the control goal is achieved for the highest of the coupling strength and the multistable HNN is metamorphosed in a monostable HNN. PSPICE simulations are also provided to support the obtained results. It is important to stress that the linear augmentation method has been considered in the literature only to control two or three different attractors (i.e., bistable or tri-stable systems) [39]. Also to the best of authors’ knowledge, no other chaotic system, particularly no HNN with up to six disconnected stable states, was successfully controlled in the literature until date. Thus, the present results contribute to enrich the literature about multistability and multistability control. Finally, a simple encryption scheme is designed jointly using the sequences of the proposed HNN and the sequences of real/imaginary values of the Julia fractals set. It is shown that the obtained cryptosystem is competitive with the results of the literature given that the proposed method achieved entropy of 7.9992, NPCR of 99.6299, and encryption time of 0.21 for the 256*256 sample 1 image. These results can be improved in the next future by exploring the effect of the adapting synapse-based neuron model also known as the tabu learning neuron model with their applications to secure medical images in IoHT.

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

Footnotes

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Hopfield JJ. Neurons with graded response have collective computational properties like those of two-state neurons. Proc Natl Acad Sci. 1984;81(10):3088–3092. doi: 10.1073/pnas.81.10.3088. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 2.Qiu H, et al. A fast ℓ1-solver and its applications to robust face recognition. J Ind Manag Optim (JIMO) 2012;8:163–178. [Google Scholar]
  • 3.Wang Y, et al. An alternative Lagrange-dual based algorithm for sparse signal reconstruction. IEEE Trans Signal Process. 2010;59(4):1895–1901. [Google Scholar]
  • 4.Chanthorn P, et al. A Delay-dividing approach to robust stability of uncertain stochastic complex-valued Hopfield delayed neural networks. Symmetry. 2020;12(5):683. [Google Scholar]
  • 5.Chanthorn P, et al. Robust stability of complex-valued stochastic neural networks with time-varying delays and parameter uncertainties. Mathematics. 2020;8(5):742. [Google Scholar]
  • 6.Chanthorn P, et al. Robust dissipativity analysis of hopfield-type complex-valued neural networks with time-varying delays and linear fractional uncertainties. Mathematics. 2020;8(4):595. [Google Scholar]
  • 7.Sriraman R, et al. Discrete-time stochastic quaternion-valued neural networks with time delays: an asymptotic stability analysis. Symmetry. 2020;12(6):936. [Google Scholar]
  • 8.Yang X-S, Yuan Q. Chaos and transient chaos in simple Hopfield neural networks. Neurocomputing. 2005;69(1–3):232–241. [Google Scholar]
  • 9.Habutsu T et al (1991) A secret key cryptosystem by iterating a chaotic map. In Workshop on the theory and application of cryptographic techniques. Springer.
  • 10.Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. J Cryptol. 1991;4(1):3–72. [Google Scholar]
  • 11.Baptista M. Cryptography with chaos. Phys Lett A. 1998;240(1–2):50–54. [Google Scholar]
  • 12.Bao B, et al. Numerical analyses and experimental validations of coexisting multiple attractors in Hopfield neural network. Nonlinear Dyn. 2017;90(4):2359–2369. [Google Scholar]
  • 13.Njitacke Z, Kengne J. Complex dynamics of a 4D Hopfield neural networks (HNNs) with a nonlinear synaptic weight: coexistence of multiple attractors and remerging Feigenbaum trees. AEU-Int J Electron Commun. 2018;93:242–252. [Google Scholar]
  • 14.Njitacke Z, Kengne J, Fotsin H. A plethora of behaviors in a memristor based Hopfield neural networks (HNNs) Int J Dyn Control. 2019;7(1):36–52. [Google Scholar]
  • 15.Xu Q, et al. Two-neuron-based non-autonomous memristive Hopfield neural network: numerical analyses and hardware experiments. AEU-Int J Electron Commun. 2018;96:66–74. [Google Scholar]
  • 16.Cushing JM, Henson SM, Blackburn CC. Multiple mixed-type attractors in a competition model. J Biol Dyn. 2007;1(4):347–362. doi: 10.1080/17513750701610010. [DOI] [PubMed] [Google Scholar]
  • 17.Upadhyay RK. Multiple attractors and crisis route to chaos in a model food-chain. Chaos Solitons Fractals. 2003;16(5):737–747. [Google Scholar]
  • 18.Njitacke Z, et al. Hysteretic dynamics, space magnetization and offset boosting in a third-order memristive system. Iran J Sci Technol Trans Electr Eng. 2020;44(1):413–429. [Google Scholar]
  • 19.Fonzin Fozin T, et al. On the dynamics of a simplified canonical Chua’s oscillator with smooth hyperbolic sine nonlinearity: hyperchaos, multistability and multistability control. Chaos Interdiscip J Nonlinear Sci. 2019;29(11):113105. doi: 10.1063/1.5121028. [DOI] [PubMed] [Google Scholar]
  • 20.Tabekoueng Njitacke Z, Kengne J, Fotsin HB (2020) Coexistence of multiple stable states and bursting oscillations in a 4D Hopfield neural network. Circuits Syst Signal Process 39:3424–3444. 10.1007/s00034-019-01324-6
  • 21.Tabekoueng Njitacke Z, et al. Coexistence of firing patterns and its control in two neurons coupled through an asymmetric electrical synapse. Chaos Interdiscip J Nonlinear Sci. 2020;30(2):023101. doi: 10.1063/1.5132280. [DOI] [PubMed] [Google Scholar]
  • 22.Tchinda T, et al. Dynamics of an optically injected diode laser subject to periodic perturbation: occurrence of a large number of attractors, bistability and metastable chaos. Sci J Circuits Syst Signal Process. 2019;8:66. [Google Scholar]
  • 23.Wouapi KM, et al. Various firing activities and finite-time synchronization of an improved Hindmarsh–Rose neuron model under electric field effect. Cogn Neurodyn. 2020;14:375–397. doi: 10.1007/s11571-020-09570-0. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 24.Wei Z, et al. Study of hidden attractors, multiple limit cycles from Hopf bifurcation and boundedness of motion in the generalized hyperchaotic Rabinovich system. Nonlinear Dyn. 2015;82(1–2):131–141. [Google Scholar]
  • 25.Wei Z, et al. Hidden attractors and dynamical behaviors in an extended Rikitake system. Int J Bifurc Chaos. 2015;25(02):1550028. [Google Scholar]
  • 26.Wei Z, Zhang W, Yao M. On the periodic orbit bifurcating from one single non-hyperbolic equilibrium in a chaotic jerk system. Nonlinear Dyn. 2015;82(3):1251–1258. [Google Scholar]
  • 27.Bao B, et al. Coexisting infinitely many attractors in active band-pass filter-based memristive circuit. Nonlinear Dyn. 2016;86(3):1711–1723. [Google Scholar]
  • 28.Bao B-C, et al. Extreme multistability in a memristive circuit. Electron Lett. 2016;52(12):1008–1010. [Google Scholar]
  • 29.Njitacke Z, Kengne J, Negou AN. Dynamical analysis and electronic circuit realization of an equilibrium free 3D chaotic system with a large number of coexisting attractors. Optik. 2017;130:356–364. [Google Scholar]
  • 30.Njitacke Z, et al. Uncertain destination dynamics of a novel memristive 4D autonomous system. Chaos Solitons Fractals. 2018;107:177–185. [Google Scholar]
  • 31.He S, et al. Multivariate multiscale complexity analysis of self-reproducing chaotic systems. Entropy. 2018;20(8):556. doi: 10.3390/e20080556. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 32.Sprott JC, et al. Megastability: coexistence of a countable infinity of nested attractors in a periodically-forced oscillator with spatially-periodic damping. Eur Phys J Spec Top. 2017;226(9):1979–1985. [Google Scholar]
  • 33.Tang Y, et al. Carpet oscillator: a new megastable nonlinear oscillator with infinite islands of self-excited and hidden attractors. Pramana. 2018;91(1):11. [Google Scholar]
  • 34.Leutcho GD, et al. A new megastable nonlinear oscillator with infinite attractors. Chaos Solitons Fractals. 2020;134:109703. [Google Scholar]
  • 35.Leutcho GD, et al. A new oscillator with mega-stability and its Hamilton energy: infinite coexisting hidden and self-excited attractors. Chaos Interdiscip J Nonlinear Sci. 2020;30(3):033112. doi: 10.1063/1.5142777. [DOI] [PubMed] [Google Scholar]
  • 36.Giakoumis A, et al. Analysis, synchronization and microcontroller implementation of a new quasiperiodically forced chaotic oscillator with megastability. Iran J Sci Technol Trans Electr Eng. 2020;44(1):31–45. [Google Scholar]
  • 37.Bao B, et al. Coexisting behaviors of asymmetric attractors in hyperbolic-type memristor based Hopfield neural network. Front Comput Neurosci. 2017;11:81. doi: 10.3389/fncom.2017.00081. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 38.Bao B, et al. Dynamical effects of neuron activation gradient on Hopfield neural network: numerical analyses and hardware experiments. Int J Bifurc Chaos. 2019;29(04):1930010. [Google Scholar]
  • 39.Canavier CC, et al. Control of multistability in ring circuits of oscillators. Biol Cybern. 1999;80(2):87–102. doi: 10.1007/s004220050507. [DOI] [PubMed] [Google Scholar]
  • 40.Pisarchik AN, Kuntsevich BF. Control of multistability in a directly modulated diode laser. IEEE J Quantum Electron. 2002;38(12):1594–1598. [Google Scholar]
  • 41.Pecora LM, Carroll TL. Pseudoperiodic driving: eliminating multiple domains of attraction using chaos. Phys Rev Lett. 1991;67(8):945. doi: 10.1103/PhysRevLett.67.945. [DOI] [PubMed] [Google Scholar]
  • 42.Chizhevsky V, Turovets S. Small signal amplification and classical squeezing near period-doubling bifurcations in a modulated CO2-laser. Opt Commun. 1993;102(1–2):175–182. [Google Scholar]
  • 43.Pisarchik AN, Feudel U. Control of multistability. Phys Rep. 2014;540(4):167–218. [Google Scholar]
  • 44.Pisarchik AN, Goswami BK. Annihilation of one of the coexisting attractors in a bistable system. Phys Rev Lett. 2000;84(7):1423. doi: 10.1103/PhysRevLett.84.1423. [DOI] [PubMed] [Google Scholar]
  • 45.Sharma PR, et al. Controlling dynamical behavior of drive-response system through linear augmentation. Eur Phys J Spec Top. 2014;223(8):1531–1539. [Google Scholar]
  • 46.Sharma P, et al. Control of multistability in hidden attractors. Eur Phys J Spec Top. 2015;224(8):1485–1491. [Google Scholar]
  • 47.Sharma PR, et al. Targeting fixed-point solutions in nonlinear oscillators through linear augmentation. Phys Rev E. 2011;83(6):067201. doi: 10.1103/PhysRevE.83.067201. [DOI] [PubMed] [Google Scholar]
  • 48.Fonzin Fozin T, et al. Control of multistability in a self-excited memristive hyperchaotic oscillator. Int J Bifurc Chaos. 2019;29(09):1950119. [Google Scholar]
  • 49.Gao T, Chen Z. A new image encryption algorithm based on hyper-chaos. Phys Lett A. 2008;372(4):394–400. [Google Scholar]
  • 50.Zhou Y, Cao W, Chen CP. Image encryption using binary bitplane. Signal Process. 2014;100:197–207. [Google Scholar]
  • 51.Wang X-Y, Li Z-M. A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng. 2019;115:107–118. [Google Scholar]
  • 52.Lakshmi C, et al. Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput Appl. 2020;32(15):11477–11489. [Google Scholar]
  • 53.Kountchou M, et al. Optimisation of the synchronisation of a class of chaotic systems: combination of sliding mode and feedback control. Int J Nonlinear Dyn Control. 2017;1(1):51–77. [Google Scholar]
  • 54.Wouapi MK, Fotsin BH, Ngouonkadi EBM et al (2020) Complex bifurcation analysis and synchronization optimal control for Hindmarsh–Rose neuron model under magnetic flow effect. Cogn Neurodyn. 10.1007/s11571-020-09606-5 [DOI] [PMC free article] [PubMed]
  • 55.Shi K, et al. Reliable asynchronous sampled-data filtering of T–S fuzzy uncertain delayed neural networks with stochastic switched topologies. Fuzzy Sets Syst. 2020;381:1–25. [Google Scholar]
  • 56.Shi K, et al. Non-fragile memory filtering of TS fuzzy delayed neural networks based on switched fuzzy sampled-data control. Fuzzy Sets Syst. 2020;394:40–64. [Google Scholar]
  • 57.Shi K, et al. Hybrid-driven finite-time H∞ sampling synchronization control for coupling memory complex networks with stochastic cyber attacks. Neurocomputing. 2020;387:241–254. [Google Scholar]
  • 58.Tsafack N, et al. Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf Sci. 2020;515:191–217. [Google Scholar]
  • 59.Rani M, Kumar V. Superior Julia set. Res Math Educ. 2004;8(4):261–277. [Google Scholar]
  • 60.Yang X et al (2020) COVID-CT-dataset: a CT scan dataset about COVID-19. arXiv:2003.13865
  • 61.Nestor T, et al. A multidimensional hyperjerk oscillator: dynamics analysis, analogue and embedded systems implementation, and its application as a cryptosystem. Sensors. 2020;20(1):83. doi: 10.3390/s20010083. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 62.Abd-El-Atty B, El-Latif AAA, Venegas-Andraca SE. An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quantum Inf Process. 2019;18(9):272. [Google Scholar]
  • 63.Diaconu A-V. Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci. 2016;355:314–327. [Google Scholar]
  • 64.Jithin K, Sankar S. Colour image encryption algorithm combining, Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Secur Appl. 2020;50:102428. [Google Scholar]
  • 65.Liu L, Zhang Q, Wei X. A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng. 2012;38(5):1240–1248. [Google Scholar]

Articles from Neural Computing & Applications are provided here courtesy of Nature Publishing Group

RESOURCES