Professional Documents
Culture Documents
Adaptive Sliding-Mode
Synchronization of the
Memristor-Based Sixth-Order
Uncertain Chaotic System and Its
Application in Image Encryption
Xiurong Yao 1,2, Xiangyong Chen 1,2*, Huawei Liu 1,2, Li Sun 3* and Liping He 1
1
School of Automation and Electrical Engineering, Linyi University, Linyi, China, 2Key Laboratory of Complex Systems and
Intelligent Computing in Universities of Shandong, Linyi, China, 3School of Statistics and Mathematics, Zhongnan University of
Economics and Law, Wuhan, China
described previously, we realize the fixed-time where q and φ are the charges and magnetic fluxs, respectively,
synchronization scheme between sixth-order chaotic systems. k and l are constants, and W(φ) is conductance. Also, the
3) The synchronization method designed is applied to the image charge-controlled memristor [46] used in this article is as
encryption algorithm based on obfuscation diffusion, and the follows:
image encryption process is realized. The results show that the
better the encryption result, the higher the degree of anti- Mq m + nq
decryption. dq (2)
αiM − βq − iM q,
dt
2 MEMRISTOR-BASED SIXTH-ORDER
CHAOTIC CIRCUITS AND THEIR where M(q) represents the resistance value. dq dt represents the
DYNAMICS ANALYSIS internal state. iM is the current flowing through the resistor, and
m, n, α, and β are constants.
A memristor-based chaotic circuit based on Chua’s circuit is Remark 1. Compared with the aforementioned third-
designed using two flux-controlled memristors and one charge- order and fourth-order memristor chaotic systems,
controlled memristor. The circuit diagram is described as follows: our system is extended to the sixth-order, which has a
The flux-controlled memristor model used in this study is as follows: more complex structure, and the three memristors
qφ kφ + lφ3 make the model obtain rich chaotic dynamic
characteristics.
dqφ (1) In light of Kirchhoff’s voltage and current law analysis in
Wφ k + 3lφ2 ,
dφ Figure 1, the following equations can be obtained:
FIGURE 2 | Trajectories of the state variables x1, x2, x3, x4, x5, x6 of the system.
FIGURE 4 | x1 − x2 − x3.
FIGURE 3 | x1 − x2 − x4.
⎪
⎧
⎪ dV1 (t) 1
⎪
⎪ − V1 (t)Wφ1 (t) − (V2 (t) − V1 (t))Wφ2 (t) The dissipation value of the system is less than zero, so the system is
⎪
⎪ dt C
⎪
⎪
1 dissipative. Then, we calculate the following Lyapunov exponents of
⎪
⎪ ( )
⎪
⎪ dV 2 t 1 the memristor-based sixth-order chaotic L1 = 0.2733, L2 = 3.5526, L3
⎪
⎪ − iL (t) − (V1 (t) − V2 (t))Wφ2 (t)
⎪
⎪ dt C2 = -9.4124, L4 = -0.0071, L5 = -0.0454, L6 = -6.0755. Then, it can be
⎪
⎪
⎪
⎪ diL (t) 1 found that two Lyapunov indices are greater than 0. Referring to the
⎪
⎪
⎨ dt L V2 (t) + iL (t)Mq(t)
⎪ theory of [47], the system is a chaotic system.
⎪
⎪ The next step is to analyze the stability of the system. The
⎪
⎪ dφ1 (t) equilibrium point of Eq. 4 can be determined by the solution of
⎪
⎪ V1 (t)
⎪
⎪ dt
⎪
⎪ Eq. 6,
⎪
⎪ dφ2 (t)
⎪
⎪
⎪ dt V2 (t) − V1 (t)
⎪
⎪ ⎪
⎧ 0 a(x2 − x1 )n2 + m2 x5 2 − x1 n1 + m1 x4 2
⎪
⎪ ⎪
⎪
⎪ ⎪
⎪ 0 b(x1 − x2 )n2 + m2 x5 − x3
⎪ 2
⎪
⎪ dq1 (t)
⎪
⎩ −αiL (t) − βq1 (t) − iL (t)q1 (t), ⎪
⎨ 0 c(x2 + x3 (n3 + m3 x6 ))
dt ⎪ (6)
⎪
⎪ 0 x1
(3) ⎪
⎪
⎪
⎪ 0 x2 − x1
⎩
where iL(t) is the current of L, V1(t) and V2(t) are the voltages of 0 −αx3 − βx6 − x3 x6 .
C1 and C2, respectively, φ1(t), φ1(t), and q1(t) are the magnetic
The equilibrium solution is x1 = x2 = x3 = x6 = 0, x4 = γ, x5 = ε,
fluxes and charges of the three memristors, V1(t) = x1, V2(t) = x2,
where γ and ε are constants. It shows that the chaotic system has a
iL(t) = x3, φ1(t) = x4, φ2(t) = x5, q1(t) = x6, C11 = a, C12 = b, L1=c, and iM=
plane equilibrium point corresponding to x4 and x5. The Jacobian
− iL(t). After normalization, the system equation is as follows:
matrix of the balanced set is shown as follows:
⎪
⎧
⎪ x_ 1 a(x2 − x1 )n2 + m2 x5 2 − x1 n1 + m1 x4 2
⎪ a−n2 + m2 ε2 − n1 + m1 γ2 an2 + m2 ε2 0 0 0 0
⎪
⎪ x_ 2 b(x1 − x2 )n2 + m2 x5 2 − x3 ⎡⎢⎢⎢ ⎥
⎪
⎪ ⎢⎢⎢ bn2 + m2 ε2 −bn2 + m2 ε2 −b 0 0 0 ⎤⎥⎥⎥⎥
⎨ x_ 3 ⎢⎢⎢ ⎥
c(x2 + x3 (n3 + m3 x6 )) 0 ⎥⎥⎥⎥⎥
J ⎢⎢⎢⎢⎢
0 c cn3 0 0
⎪ (4) ⎥.
0 ⎥⎥⎥⎥⎥
(7)
⎪
⎪ x_ 4 x1 ⎢⎢⎢ 1 0 0 0 0
⎪
⎪ ⎢⎢⎣ −1 0 ⎥⎥⎦
⎥
⎪
⎪ x_ 5 x2 − x1 1 0 0 0
⎩ 0 0 −α 0 0 −β
x_ 6 −αx3 − βx6 − x3 x6 .
The next step is to analyze the dynamic characteristics. First, we The characteristic equation is obtained by the Jacobian matrix
investigate the chaotic characteristics. We choose a = 7, b = 1, c = 12, α Eq. 7 as follows:
= 0.3, β = 0.3, n1 = −1.2, n2 = 0.9, n3 = 0.03, m1 = 3.1, m2 = 3.0, m3 = b
0.12, and then Figure 2 shows the state variables of Eq. 2. Figures 3–6 λ1 + an1 + m1 γ2 λ2 + bn2 + m2 ε2 −
n3
are the chaotic phase diagrams of x1 − x2 − x4, x1 − x2 − x3, x1 − x3 − x5,
x4 − x5 − x6, which show the double vortex chaotic attractor.Second, × (λ3 − cn3 )λ4 λ5 λ6 + β
the dissipation value of the calculated system is as follows: 0. (8)
zx_ 1 zx_ 2 zx_ 3 zx_ 4 zx_ 5 zx_ 6 There are always two zero eigenvalues, and the other eigenvalues
∇V + + + + + −an2 + m2 x5 2
zx1 zx2 zx3 zx4 zx5 zx6 are determined by the system parameters. Because c, a, n1, n3 are
− n1 + m1 x4 2 − bn2 + m2 x5 2 + c(n3 + m3 x6 ) − β − x3 positive, and λ3 is greater than zero. According to the stability
−4.1116 < 0. theory of chaotic systems, the aforementioned memristor-based
(5) chaotic system is unstable at such an equilibrium point.
FIGURE 6 | x4 − x5 − x6.
FIGURE 5 | x1 − x3 − x6.
n n (g1+1 )/2
3 DESIGN OF THE ADAPTIVE |]i | g1 +1 ⎝
≥ ⎛ |]i | ⎞
2 ⎠
i1 i1
SLIDING-MODE SYNCHRONIZATION (g2+1 )/2
. (12)
n n
SCHEME |]i | g2 +1
≥n (1−g2 )/2 ⎛
⎝ |]i | ⎠
2⎞
First, the drive system is Eq. 4, and the response system Eq. 9 is as i1 i1
F_ i (t) e_i (t) + j|ei (t)|b + k|ei (t)|m + l|ei (t)|sgn(ei (t)). (14)
(9) v n
where ϕi(t) is the uncertain unknown model in Eq. 9, and fi(t) is The adaptive sliding-mode controller is designated as:
the external disturbance, and |ϕi (t)| ≤ ψ i , |fi (t)| ≤ ωi , ψi and ωi
are constants, and ui(t) is the control input. Therefore, the error ⎪
⎧
⎪
v n
u1 (t) −j|e1 (t)|b + k|e1 (t)|m + l|e1 (t)|sgn(e1 (t)) − ay2 − y1 n2 + m2 y5 2 − (x2 − x1 )
⎪
⎪
dynamic system can be expressed as: ⎪
⎪
⎪
⎪ n2 + m2 x5 2 + x1 n1 + m1 x4 2 − y1 n1 + m1 y4 2 − ρ + |F1 (t)|k sgn(F1 (t))
⎪
⎪
⎪
⎪
e_1 ay2 − y1 n2 + m2 y5 2 − (x2 − x1 )n2 + m2 x5 2 ⎪
⎪ −ψ^1 + ω ^1 sgn(F1 (t))
⎪
⎧
⎪ ⎪
⎪
⎪
⎪
⎪ +x1 n1 + m1 x4 2 − y1 n1 + m1 y4 2 + ϕ1 (t) + f1 (t) + u1 ⎪
⎪
⎪
⎪ ⎪
⎪ ( ) −−j | (
v n
)|b + k|e2 (t)|m + l|e2 (t)|sgn(e2 (t)) − b(x1 − x2 )n2 + m2 y5 2
⎪_
⎪ ⎪
⎪
u 2 t e2 t
⎨ e2 b(x1 − x2 )n2 + m2 y5 − (x1 − x2 )n2 + m2 x5 − e3 + ϕ2 (t) + f2 (t) + u2
⎪ 2 2
⎪
⎪
⎪
⎪
e_3 ce2 + y3 n3 + m3 y6 − x3 (n3 + m3 x6 ) + ϕ3 (t) + f3 (t) + u3 ⎪
⎪ −(x1 − x2 )n2 + m2 x5 2 − e3 − ρ + |F1 (t)|k sgn(F2 (t)) − ψ^2 + ω^2 sgn(F2 (t))
⎪
⎪ ⎪
⎪
⎪
⎪ e_4 e1 + ϕ4 (t) + f4 (t) + u4 ⎪
⎪
⎪
⎪
⎪ ⎪
v n
⎪ u3 (t) −−j|e3 (t)|b − k|e3 (t)|m − l|e3 (t)|sgn(e3 (t)) − ce2 + y3 n3 + m3 y6
⎪
⎪ e_ e2 − e1 + ϕ5 (t) + f5 (t) + u5 ⎪
⎪
⎪
⎩ 5 ⎨
e_6 −αe3 − βe6 − y3 y6 + x3 x6 + ϕ6 (t) + f6 (t) + u6 . ⎪
⎪ −x3 (n3 + m3 x6 )) − ρ + |F1 (t)|k sgn(F3 (t)) − ψ^3 + ω ^3 sgn(F3 (t))
⎪
⎪
⎪
⎪
⎪ u4 (t) −j|e4 (t)|b + k|e4 (t)|m + l|e4 (t)|sgn(e4 (t)) − e1 − ρ + |F1 (t)|k sgn(F4 (t))
v n
(10) ⎪
⎪
⎪
⎪
⎪
⎪
⎪ −ψ^4 + ω ^4 sgn(F4 (t))
The next step is to design the synchronization controller ui to ⎪
⎪
⎪
⎪
⎪
⎪ ( ) − | ( )
v n
|b + k|e5 (t)|m + l|e5 (t)|sgn(e5 (t)) − e2 − ρ + |F1 (t)|k sgn(F5 (t))
⎪
⎪ u t j e t
realize the stability of the aforementioned error dynamic system. ⎪
⎪
⎪
5 5
⎪
⎪ −ψ^5 + ω ^5 sgn(F5 (t))
The sliding-mode control method is used to achieve the adaptive ⎪
⎪
⎪
⎪
⎪
⎪ u6 (t) −−j|e6 (t)|b − k|e6 (t)|m − l|e6 (t)|sgn(e6 (t)) + αe3 + βe6 + y3 y6
v n
Lemma 1. [36] Consider the system x_ f(x, t), when the (15)
continuous bounded functions V(x, t) satisfy the following where ρ, k are positive constants, and ψ^i , ω
^i are estimates of ψi, ωi.
conditions: Also, the adaptive laws ψ^i , ω
^i are selected as:
(i):V(0) = 0
(ii):V(t) ≤ −aVχ(t) − bVδ(t) − cV(t)where a > 0, b > 0, c > 0, 0 <
ψ^_ i |Fi (t)|
χ < 1, δ > 1, and the system will achieve fixed-time stability and (16)
ω^_ i |Fi (t)|
1 c 1 c
Tmax ln1 + + ln1 + . (11) Theorem 1. Under the influence of the controllers Eq. 13 and
c 1 − χ a c(δ − 1) b
the adaptive laws Eq. 15, the error system Eq. 10 will reach sliding
Lemma 2. [48] For any real numbers ]1, ]2, . . ., ]n and 0 < g1 < surfaces.
1, 1 < g2, it satisfies that Proof. The following Lyapunov function is constructed:
6 6
+ ψ^i − ψ i ψ^_ i + (ω ^_ i .
^i − ωi )ω (25)
i1 i1 Because the error systems satisfy
(19) v n
e_i (t) −j|ei (t)|b − k|ei (t)|m − l|ei (t)|sgn(ei (t)). (26)
Furthermore, we take the control scheme Eq. 13 into Eq. 10 and
Therefore,
Eq. 18, we get
6
6
V_ i (t) ei (t)e_i (t)
V_ i (t) Fi (t)ϕi (t) + fi (t) − ρ + |Fi (t)|k sgn(Fi (t)) i1
i1
6
v n
6 6 ei (t)−j|ei (t)|b − k|ei (t)|m − l|ei (t)|sgn(ei (t))
^i sgn(Fi (t))] + ψ^i − ψ i ψ^_ i +
−ψ^i + ω ^_ i
^i − ωi )ω
(ω i1
i1 i1 6
−j|ei (t)|b+1 − k|ei (t)|m+1 − l|ei (t)|2 .
v n
6 6 6
ϕi (t) + fi (t)Fi (t) − ψ^i + ω
^i |Fi (t)| − ρ|Fi (t)| i1
i1 i1 i1
(27)
6 6
+ |Fi (t)|k+1 + ψ^i −ψ i ψ^_ i + (ω ^_ i .
^i − ωi )ω According to Lemma 2, we continue to calculate Eq. 26 as
i1 i1
(20)
6 v+b n+m
V_ i (t) ≤ !−j|ei (t)|2 2b − 6 2m k|ei (t)|2 2m − l|ei (t)|2 " (28)
m−n
According to the adaptive laws of Eq. 15, one has
i1
6 6
V_ i (t) ϕi (t) + fi (t)Fi (t) − ψ^i + ω
^i |Fi (t)| v+b v+b n+m m−n n+m
i1 i1
−2 2b j(Vi (t)) 2b − 2 2m 6 2m k(Vi (t)) 2m − 2lVi (t).
6 6 6 According to Lemma 1, we get that the error state variables of Eq.
− ρ|Fi (t)| + |Fi (t)|k+1 + ψ^i − ψ i |Fi (t)| + ^i − ω i )
(ω
i1 i1 i1
10 will tend to zero in a fixed-time. Also, using Eq. 27, the setting
6 time is
× |Fi (t)| ≤ ϕi (t) + fi (t)|Fi (t)| − ψ i + ωi |Fi (t)| − ρ|Fi (t)| − |Fi (t)|k+1 .
i1 v−b m−n n−m
v 2 2v l m 2 2m 6 2m l
(21) T1 ln1 + + ln1 + . (29)
l(v − b) j l(n − m) k
Due to |ϕi (t)| ≤ ψ i , |fi (t)| ≤ ωi , we obtain
6
Then, the proof of Theorem 2 is completed, which means that
V_ i (t) ≤ ψ i + ωi |Fi (t)| − ψ i + ωi |Fi (t)| fixed-time synchronization is reached between the two chaotic
i1 systems Eqs 4,9.
Remark 2. Different from finite-time synchronization control,
6
the bounds of fixed-time synchronization discussed in this article
−ρ|Fi (t)| + |F1 (t)|k+1 ] ≤ −ρ|Fi (t)| − |Fi (t)|k+1 ≤ 0.
i1
are only affected by system parameters, which are independent of
the values of the initial time of the system.
(22)
In order to effectively verify the above theoretical results, a
For the inequality (22), V_ i (t) 0 if and only if F_ i (t) 0; simulation example shows the significance of the adaptive
otherwise, V_ i (t) < 0. According to the Lyapunov stability sliding-mode synchronization scheme. We choose a = 7, b =
principle, the error system can move to the sliding 1, c = 12, α = 0.3, β = 0.3, n1 = −1.2, n2 = 0.9, n3 = 0.03, m1 = 3.1, m2
surface.Theorem 2. After the error system Eq. 10 reaches the = 3.0, m3 = 0.12. Thus, the equation of the error system, Eq. 10
sliding surface, then the state variables of Eq. 10 will tend to zero can be expressed as:
⎪
⎧
⎪ e_1 21y2 − y1 y5 2 − (x2 − x1 )x5 2 + 6.3e2 − 5.1e1 + 3.1x1 x4 2 − y1 y4 2 + ϕ1 (t) + f1 (t) + u1
⎪
⎪ a shorter stable time and whose setting time only depends on our
⎪ e_2
⎪
⎪
y1 − y2 0.9 + 3y5 2 − (x1 − x2 )0.9 + 3x5 2 − e3 + ϕ2 (t) + f2 (t) + u2
⎨ e_3 12(e2 + 0.03e3 + 0.12y3 y6 − 0.12x3 x6 + ϕ3 (t) + f3 (t) + u3
⎪
system’s parameters.
⎪ e_4
⎪ e1 + ϕ4 (t) + f4 (t) + u4
⎪
⎪
⎪
⎪ e_ e2 − e1 + ϕ5 (t) + f5 (t) + u5
⎩ 5
e_6 −0.3e3 − 0.3e6 − y3 y6 + x3 x6 + ϕ6 (t) + f6 (t) + u6 .
(30)
4 APPLICATIONS IN IMAGE ENCRYPTION
Selecting j = 10, k = 10, l = 2, v = 1, b = 2.5, n = 4, m = 1, k = 4, ρ = 2,
then the control scheme is Because the memristor chaotic circuit has stronger noise like
initial value sensitivity and long-term unpredictability, the
⎪
⎧
⎪ u1 (t) −10|e1 (τ )| + 10|e1 (τ )| + 2.5|e1 (τ )|sgn(e1 (t)) − 21y2 − y1 y5 − (x2 − x1 )x5
0.4 4 2 2
⎪
⎪ application of the memristor-based chaotic circuit to image
⎪
⎪ −6.3e2 + 5.1e1 − 3.1x1 x4 2 − y1 y4 2 − 2 + |F1 (t)|4 sgn(F1 (t)) − ψ^1 + ω ^1 sgn(F1 (t))
⎪
⎪
⎪
⎪ 2 (t) −10|e2 (τ )|2 + 10|e2 (τ )| + 2.5|e42 (τ )|sgn(e2 (t)) − y1 − y2 0.9 + 3y5 − (x1 − x2 )
0.4 4 2
⎪ u
encryption will make the experimental images have a stronger
⎪
⎪ + − − + | ( )| sgn( ( )) − ^
ψ + ^
ω sgn( ( ))
⎪
⎪ 0.9 3x 5 e 3 2 F 2 t F 2 t 2 F2 t
⎪
⎪
2
⎪
⎪
⎪
u3 (t) −10|ei (τ )|0.4 + 10|ei (τ )|4 + 2.5|ei (τ )|sgn(e3 (t)) − 12e2 + 0.03e3 + 0.12y3 y6 − anti-decoding function. We verify the effectiveness of the
⎨ 0.12x3 x6 ) − 2 + |F3 (t)|4 sgn(F3 (t)) − ψ^3 + ω ^3 sgn(F3 (t))
⎪
⎪ u4 (t) −10|ei (τ )|0.4 + 10|ei (τ )|4 + 2.5|ei (τ )|sgn(e4 (t)) − e1 − 2 + |F4 (t)|4 sgn(F4 (t))−
⎪
adaptive sliding-mode synchronization scheme in image
⎪
⎪
⎪
⎪ ψ^4 + ω^4 sgn(F4 (t)) encryption by using a chaotic obfuscation-diffusion
⎪
⎪
⎪
⎪ u (t) −10|ei (τ )|0.4 + 10|ei (τ )|4 + 2.5|ei (τ )|sgn(e5 (t)) − e2 + e1 − 2 + |F5 (t)|4 sgn(F5 (t))−
⎪ 5
⎪ mechanism [49], and the specific implementation process is
⎪
⎪ ψ^5 + ω^5 sgn(F5 (t))
⎪
⎪
⎪ u6 (t) −10|ei (τ )|0.4 + 10|ei (τ )|4 + 2.5|ei (τ )|sgn(e6 (t)) + 0.3e3 + 0.3e6 + y3 y6 − x3 x6 − (2+
⎪
⎪
⎩ | ( )|4 sgn(F (t)) − ψ^ + ω
F t ^ sgn(F (t)).
shown in Figure 11.According to Figure 11, we first read
6 6 6 6 6
FIGURE 12 | Experimental dataset and their encrypted and decrypted versions (A-F).
FIGURE 13 | Histograms of the original, encrypted and decrypted greyscale images (A-F) in Figure 12.
DATA AVAILABILITY STATEMENT coordination. XY, LH, and LS helped to draft the manuscript. All
authors read and approved the final manuscript.
The original contributions presented in the study are included in
the article/Supplementary Material, further inquiries can be
directed to the corresponding author. FUNDING
This work was supported by the National Natural Science
AUTHOR CONTRIBUTIONS Foundation of China under Grant Nos. 62173175, 12026235,
12026234, 61903170, 61903171, 11805091, and 61877033, by the
XY, HL, and XC participated in the sequence alignment and Natural Science Foundation of Shandong Province under Grant
drafted the manuscript. XY, HL, XC, and LH participated in the Nos. ZR2019BF045, ZR2019MF021, and ZR2019QF004, and by
study and performed the statistical analysis. XY, XC, HL, and LS the Key Research and Development Project of Shandong
conceived the idea of the study and participated in its design and Province of China under Grant No.2019GGX101003
18. Lai Q, Wan Z, Akgul A, Boyraz OF, Yildiz MZ. Design and
REFERENCES Implementation of a New Memristive Chaotic System with Application
in Touchless Fingerprint Encryption. Chin J Phys (2020) 67:615–30.
1. Rössler OE. An Equation for Continuous Chaos. Phys Lett A (1976) 57:397–8. doi:10.1016/j.cjph.2020.08.018
doi:10.1016/0375-9601(76)90101-8 19. Min F, Wang Z, Cao Y. Multistability Analysis of a Dual-Memristor Circuit
2. Chen G, Ueta T. Yet Another Chaotic Attractor. Int J Bifurcation Chaos (1999) Based on Hyperbolic Function. Acta Electonica Sinica (2018) 46:486.
09:1465–6. doi:10.1142/s0218127499001024 20. Wang L, Dong T, Wang X. Projective Synchronization of Three Memristor
3. Liu C, Liu T, Liu L, Liu K. A New Chaotic Attractor. Chaos, Solitons & Fractals Chaotic Systems with Unknown Parameters via Adaptive Control. In: 2018
(2004) 22:1031–8. doi:10.1016/j.chaos.2004.02.060 Ninth International Conference on Intelligent Control and Information
4. Lü J, Chen G. A New Chaotic Attractor Coined. Int J Bifurcation Chaos (2002) Processing (ICICIP). IEEE (2018). p. 117–21. doi:10.1109/icicip.2018.8606662
12:659–61. doi:10.1142/s0218127402004620 21. Xinsong Yang X, Ho DWC. Synchronization of Delayed Memristive Neural
5. Lü J, Chen G, Cheng D, Celikovsky S. Bridge the gap between the Lorenz Networks: Robust Analysis Approach. IEEE Trans Cybern (2016) 46(12):
System and the Chen System. Int J Bifurcation Chaos (2002) 12:2917–26. 3377–87. doi:10.1109/TCYB.2015.2505903
doi:10.1142/s021812740200631x 22. Yang X, Cao J, Liang J. Exponential Synchronization of Memristive Neural
6. Wu X, Wang H, He S. Localization of Hidden Attractors in Chua¡S System Networks with Delays: Interval Matrix Method. IEEE Trans Neural Netw
with Absolute Nonlinearity and its FPGA Implementation. Front Phys (2021) Learn Syst (2016) 28(8):1878–88. doi:10.1109/TNNLS.2016.2561298
9:674. doi:10.3389/fphy.2021.788329 23. Feng Y, Yu X, Man Z. Non-singular Terminal Sliding Mode Control of Rigid
7. Lai Q, Bao B, Chen C. Circuit Application of Chaotic Systems: Modeling, Manipulators. Automatica (2002) 38:2159–67. doi:10.1016/s0005-1098(02)
Dynamical Analysis and Control. Eur Phys J Spec Top (2021) 230(7):1691–4. 00147-4
doi:10.1140/epjs/s11734-021-00202-0 24. Yu S, Yu X, Shirinzadeh B, Man Z. Continuous Finite-Time Control for
8. Chua L. Memristor-the Missing Circuit Element. IEEE Trans Circuit Theor Robotic Manipulators with Terminal Sliding Mode. Automatica (2005) 41:
(1971) 18:507–19. doi:10.1109/tct.1971.1083337 1957–64. doi:10.1016/j.automatica.2005.07.001
9. Sun J, Zhao X, Fang J, Wang Y. Autonomous Memristor Chaotic Systems of 25. Chen X, Park JH, Cao J, Qiu J. Adaptive Synchronization of Multiple
Infinite Chaotic Attractors and Circuitry Realization. Nonlinear Dyn (2018) Uncertain Coupled Chaotic Systems via Sliding Mode Control.
94(4):2879–87. doi:10.1007/s11071-018-4531-4 Neurocomputing (2018) 273:9–21. doi:10.1016/j.neucom.2017.07.063
10. Sun J, Han G, Zeng Z, Wang Y. Memristor-based Neural Network Circuit of 26. Chen X, Park JH, Cao J, Qiu J. Sliding Mode Synchronization of Multiple
Full-Function Pavlov Associative Memory with Time Delay and Variable Chaotic Systems with Uncertainties and Disturbances. Appl Math Comput
Learning Rate. IEEE Trans Cybern (2020) 50(7):2935–45. doi:10.1109/TCYB. (2017) 308:161–73. doi:10.1016/j.amc.2017.03.032
2019.2951520 27. Xu G, Zhao S, Cheng Y. Chaotic Synchronization Based on Improved Global
11. Sun J, Han J, Wang Y, Liu P. Memristor-based Neural Network Circuit of Nonlinear Integral Sliding Mode Controlq. Comput Electr Eng (2021) 96:
Emotion Congruent Memory with Mental Fatigue and Emotion Inhibition. 107497. doi:10.1016/j.compeleceng.2021.107497
IEEE Trans Biomed Circuits Syst (2021) 15(3):606–16. doi:10.1109/tbcas.2021. 28. Guo J, Zheng X, Zhou J. Adaptive Sliding Mode Control for High-Order
3090786 System with Mismatched Disturbances. Sci China Inf Sci (2020) 63:179205.
12. Sun J, Han J, Liu P, Wang Y. Memristor-based Neural Network Circuit of doi:10.1007/s11432-018-9566-1
Pavlov Associative Memory with Dual Mode Switching. AEU - Int J Elect 29. Liu H, Chen X, Qiu J. Finite-time Synchronization of Complex Networks with
Commun (2021) 129:153552. doi:10.1016/j.aeue.2020.153552 Hybrid-Coupled Time-Varying Delay via Event-Triggered Aperiodically
13. Li C, Joo-Chen Thio W, Ho-Ching Iu H, Lu T. A Memristive Chaotic Intermittent Pinning Control. Math Methods Appl Sci (2021).
Oscillator with Increasing Amplitude and Frequency. IEEE Access (2018) 6: 30. Wang L, Dong T, Ge M-F. Finite-time Synchronization of Memristor Chaotic
12945–50. doi:10.1109/access.2017.2788408 Systems and its Application in Image Encryption. Appl Math Comput (2019)
14. Jiang Y, Li C, Zhang C, Zhao Y, Zang H. A Double-Memristor Hyperchaotic 347:293–305. doi:10.1016/j.amc.2018.11.017
Oscillator with Complete Amplitude Control. IEEE Trans Circuits Syst(2021) 31. Chen X, Huang T, Cao J, Park JH, Qiu J. Finite-time Multi-switching Sliding
68(12):4935–44. doi:10.1109/tcsi.2021.3121499 Mode Synchronisation for Multiple Uncertain Complex Chaotic Systems with
15. Muthuswamy B, Kokate P. Memristor-based Chaotic Circuits. IETE Tech Rev Network Transmission Mode. IET Control Theor Appl (2019) 13:1246–57.
(2009) 26:417–29. doi:10.4103/0256-4602.57827 doi:10.1049/iet-cta.2018.5661
16. Akgül A, Rajagopal K, Durdu A, Pala MA, Boyraz ÖF, Yildiz MZ. A Simple 32. Xiong X, Yang X, Cao J. Finite-time Control for a Class of Hybrid Systems via
Fractional-Order Chaotic System Based on Memristor and Memcapacitor and Quantized Intermittent Control. Sci China Inf Sci (2020) 63(9):1–16. doi:10.
its Synchronization Application. Chaos, Solitons & Fractals (2021) 152:111306. 1007/s11432-018-2727-5
doi:10.1016/j.chaos.2021.111306 33. Guo Y, Luo Y, Wang W, Luo X, Ge C, Kurths J, et al. Fixed-time
17. Minati L, Gambuzza LV, Thio WJ, Sprott JC, Frasca M. A Chaotic Circuit Synchronization of Complex-Valued Memristive BAM Neural Network and
Based on a Physical Memristor. Chaos, Solitons & Fractals (2020) 138:109990. Applications in Image Encryption and Decryption. Int J Control Autom Syst
doi:10.1016/j.chaos.2020.109990 (2020) 18:462–76. doi:10.1007/s12555-018-0676-7
34. Xu D, Yang X, Tang R. Finite-time and Fixed-Time Non-chattering Control 44. Liu Y, Tang R, Zhou C, Xiang Z, Yang X. Event-triggered Leader-Following
for Inertial Neural Networks with Discontinuous Activations and Proportional Consensus of Multiple Mechanical Systems with Switched Dynamics. Int J Syst
Delay. Neural Process Lett (2020) 51(3):2337–53. doi:10.1007/s11063-020- Sci (2020) 51(16):3563–72. doi:10.1080/00207721.2020.1818146
10199-7 45. Hu S, Qiu J, Chen X. Dynamic Event-Triggered Control for Leader-Following
35. Wang L, Jiang S, Ge M-F, Hu C, Hu J. Finite-/Fixed-Time Consensus of Multiagent Systems with the Estimator. IET Control Theory &
Synchronization of Memristor Chaotic Systems and Image Encryption Applications (2022) 16:475–484. doi:10.1049/cth2.12245
Application. IEEE Trans Circuits Syst(2021) 68(12):4957–69. doi:10. 46. Tan Z, Yang H, Liu Q. Analysis and Implementation of a Simplest Charge-
1109/tcsi.2021.3121555 Controlled Memristor Chaotic Circuit. Chin J Comput Phys (2015) 32:496–504.
36. Xiu C, Zhou R, Zhao S, Xu G. Memristive Hyperchaos Secure Communication 47. Letellier C, Rossler O. Hyperchaos. Scholarpedia (2007) 2(8):1936. doi:10.
Based on Sliding Mode Control. Nonlinear Dyn (2021) 104:789–805. doi:10. 4249/scholarpedia.1936
1007/s11071-021-06302-9 48. Beckenbach EF, Bellman R. Inequalities. Springer Science & Business Media
37. He W, Luo T, Tang Y, Du W, Tian YC, Qian F. Secure Communication Based (2012).
on Quantized Synchronization of Chaotic Neural Networks under an Event- 49. Yoon JW, Kim H. An Image Encryption Scheme with a Pseudorandom
Triggered Strategy. IEEE Trans Neural Netw Learn Syst (2019) 31:3334–45. Permutation Based on Chaotic Maps. Commun Nonlinear Sci Numer
doi:10.1109/TNNLS.2019.2943548 Simulation (2010) 15:3998–4006. doi:10.1016/j.cnsns.2010.01.041
38. Lai Q, Zhang H, Kuate PDK. Analysis and Implementation of No-Equilibrium
Chaotic System with Application in Image Encryption. Appl Intelligence (2022) Conflict of Interest: The authors declare that the research was conducted in the
1–24. doi:10.1007/s10489-021-03071-1 absence of any commercial or financial relationships that could be construed as a
39. Li H, Wang L, Lai Q. Synchronization of a Memristor Chaotic System and potential conflict of interest.
Image Encryption. Int J Bifurcation Chaos (2021) 31(16):2150251. doi:10.1142/
s0218127421502515 Publisher’s Note: All claims expressed in this article are solely those of the authors
40. Moon S, Baik J-J, Seo JM. Chaos Synchronization in Generalized Lorenz and do not necessarily represent those of their affiliated organizations, or those of
Systems and an Application to Image Encryption. Commun Nonlinear Sci the publisher, the editors, and the reviewers. Any product that may be evaluated in
Numer Simulation (2021) 96:105708. doi:10.1016/j.cnsns.2021.105708 this article, or any claim that may be made by its manufacturer, is not guaranteed or
41. Ye X, Wang X, Gao S, Mou J, Wang Z, Yang F. A New Chaotic Circuit with endorsed by the publisher.
Multiple Memristors and its Application in Image Encryption. Nonlinear Dyn
(2020) 99:1489–506. doi:10.1007/s11071-019-05370-2 Copyright © 2022 Yao, Chen, Liu, Sun and He. This is an open-access article
42. Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS. A New Hybrid Digital distributed under the terms of the Creative Commons Attribution License (CC BY).
Chaotic System with Applications in Image Encryption. Signal Process. (2019) The use, distribution or reproduction in other forums is permitted, provided the
160:45–58. doi:10.1016/j.sigpro.2019.02.016 original author(s) and the copyright owner(s) are credited and that the original
43. Yang X, Feng G, He C. Event-Triggered Dynamic Output Quantization publication in this journal is cited, in accordance with accepted academic practice.
Control of Switched TS Fuzzy Systems with Unstable Modes. IEEE Trans No use, distribution or reproduction is permitted which does not comply with
Fuzzy Syst (2022). doi:10.1109/tfuzz.2022.3145808 these terms.