Abstract

Fourth-order autonomous nonlinear differential equations can exhibit chaotic properties. In this study, we propose a family of fourth-order chaotic systems with infinite equilibrium points whose equilibria form closed curves of different shapes. First, the phase diagrams and Lyapunov exponents (LEs) of the system family are simulated. The results show that the system family has complex phase diagrams and dynamic behaviors. Simulation analysis of the Poincarè mapping and bifurcation diagrams shows that the system has chaotic characteristics. The circuit simulation model is constructed and simulated in Multisim. The circuit simulation results coincide with the numerical simulation results, which verifies the circuit feasibility of the system. Then, based on Lyapunov stability theory and the adaptive control method, the synchronous control of the system with infinite equilibria is designed. Numerical simulation results verify that the system synchronization with the adaptive control method is well. Finally, the synchronous drive system is used for image encryption, the response system is used for decryption, and color image encryption is realized by combining deoxyribonucleic acid (DNA) coding and operating rules. Therefore, this study not only enriched the research on infinite equilibria chaotic systems but also further expanded secure communication technology by combining chaotic synchronization control and DNA coding in image encryption.

1. Introduction

The study of chaotic systems has gradually become an important part of nonlinear dynamics since 1963 when Professor Lorenz proposed the classic Lorenz system [1]. Different characteristics have been identified in different chaotic systems, such as multi-scroll chaotic oscillators [2], fractional-order chaotic systems [3], three-dimensional chaotic systems [4], and chaotic systems with infinite equilibria [5]. Moreover, the complex dynamic characteristics of chaotic systems can be applied to audio encryption technology [6], image watermarking technology [7], chaotic mask communication [8], and other fields. As the research on chaotic systems has deepened, chaotic systems with infinite equilibrium points have gained attention and the analysis of their complex dynamic behavior has become a representative research direction.

Recently, investigating infinite equilibrium points in chaotic systems has attracted the attention of many researchers. In 2015, Gotthans et al. [9] proposed a new class of three-dimensional chaotic system, by analyzing two cases in which the system has infinite equilibrium points and constitutes a circle and a square, respectively. Later, the heart-shaped equilibria chaotic system proposed by Pham et al. [5], the pear-shaped equilibria chaotic system proposed by Aceng et al. [10], and the cloud-shaped curve of the equilibrium points chaotic system proposed by Vaidyanathan et al. [11], all promoted the rapid development of three-dimensional infinite equilibria chaotic system. In 2019, Huynh et al. [12] proposed a new four-dimensional memristor chaotic system with a series of equilibrium points and analyzed the stability interval of a series of equilibrium points. Subsequently, Yang et al. [13] proposed a four-dimensional chaotic system with a boomerang-like equilibrium based on Mobayen’s [14] three-dimensional infinite equilibria chaotic system. Infinite equilibria chaotic systems can show complex dynamic characteristics. However, there are few discussions on the application of chaotic systems with infinite equilibria.

The applications of chaotic system mainly includes the following topics: weak signal detection [15], image encryption [13, 16], data encryption [17], voice encryption [14], and chaotic system control [15, 18, 19]. Among these topics, image encryption and the synchronous control of the chaotic systems are still hot topics. There are many research studies on the image encryption of chaotic systems. For example, a double-channel image encryption/decryption algorithm based on neural networks and chaos [20] was designed; Huang et al. [21] proposed a parallel image encryption algorithm based on compressed sensing, which combines chaotic systems. Previous researchers have also studied image encryption algorithms based on DNA coding. Zhang and Liu [22] proposed different DNA coding and decoding rules based on generated chaotic sequences. Wang et al. [16] combined a chaotic system with DNA sequence operations to realize image encryption/decryption.

There are many methods for the synchronization and control of chaotic systems, such as active control, adaptive control, and sliding mode control. Based on the proposed Chua’s circuit study, Li and Bo [15] realized a weak signal detection method via chaotic synchronization. Changbiao et al. [23] not only completed the signal tracking of the proposed unified chaotic system by designing an adaptive synovial controller but also realized the synchronous control of different structures. Fu et al. [24] have implemented an encryption algorithm and the double-chaotic system (the chaos synchronization between two chaotic systems). González-Zapata et al. [25] proposed the synchronization of chaotic artificial neurons and its application to secure image transmission. Ahmad et al. [26] proposed the application of multi-switch synchronization control system in secure communication, and Luo et al. [27] applied the multi-switch synchronization control of a memristor chaotic system in image encryption. However, this literature does not involve the keys and the coding is simple; therefore, we can improve the security of the encryption algorithm based on these two points.

The main works of this study are as follows:(1)A family of chaotic systems with unique characteristics, which have closed equilibria with different curves, is proposed.(2)An adaptive controller is designed. According to Lyapunov stability theory, master and slave systems can be synchronized and the synchronization effect works well.(3)An image encryption/decryption algorithm is designed. An adaptive controller and DNA coding/encoding are selected to achieve the security requirements of encryption.

The remainder of this study is organized as follows: Section 2 proposes a class of chaotic systems with unique characteristics. Section 3 describes the phase portraits and dynamical analysis of the selected chaotic system, in which parameter k is 2. In Section 4, a circuital implementation of the new chaotic system is reported. In Section 5, the results for the synchronization of the chaotic system are derived via parameter adaptive control. Section 6 describes image encryption via the synchronization of the chaotic system as an engineering application of our work. Section 7 provides a brief discussion. Section 8 draws the main conclusions.

2. A Family of Chaotic Systems with Infinite Equilibria

The chaotic system proposed in reference [9] is shown in equation (1), where and . The simulated phase diagram is shown in Figure 1, when , , and the initial conditions :

The system proposed and studied in this study adds the fourth equation of state and replaces with and with . The system equation obtained is shown in thefollowing equation:

Here, , , , and are state variables and , , , , , , and are system parameters. Note that is an integer. It is clear that the equilibrium points of the system are . As shown in Figure 2, as increases, the equation forms a closed curve region with increasing k value.

System (2) can behave as chaos for , , , , , and ; the initial conditions are assigned as . The Runge–Kutta method was used for numerical simulation, and simulation phase diagrams under different integers were obtained, as shown in Figure 3. In Figures 3a–f of the simulation phase diagrams, the black closed curve is the equilibrium points under different integers , and it can be seen that the attractor surrounds and connects the equilibria. It shows that the new system has a more complex phase diagram and satisfies at least one of the criteria [28].

According to System (2), the Jacobian matrix (3) of the system family can be obtained. The Lyapunov exponents were obtained by numerical simulation based on the famous Wolf’s algorithm [29], as listed in Table 1.

3. Analysis of System Dynamics

We analyze the dynamics of the system at integer . For , , , , , and and initial conditions , this system has chaotic solutions with the phase diagrams, as shown in Figure 4.

3.1. Equilibria Analysis and Lyapunov Exponents

When , the Jacobian matrix of the system at the equilibrium points [30] is illustrated in the following equation, where and are satisfied when :

Then, the characteristic polynomial of the Jacobian matrix is as follows:

The characteristic values at the equilibrium points obtained by numerical calculation are as follows:

In Table 2, I, II, III, IV represent the four quadrants, respectively.

A pair of purely imaginary eigenvalues represents an unstable central equilibrium. And this implies an unstable saddle for pure real eigenvalues. In addition, the four-dimensional Bogdanov–Tarkens equilibrium () for is given.

This system has a chaotic solution with Lyapunov exponents , , , and , and the Lyapunov exponential is shown in Figure 5.

The fractal dimension [17] can be calculated using the following equation:

The Lyapunov exponents are , , , and , and the dimension is fractal (). The system shows chaotic behavior.

3.2. Bifurcation Diagram and the Poincarè Section Diagram

Poincarè is a measure of the chaotic state that can effectively and directly describe the phase space [31]. The system is chaotic when the Poincarè map is a continuous curve or some dense points. The section diagram in Figure 6 shows an irregular distribution of points. Therefore, we can verify that the system is chaotic.

The bifurcation diagram can reflect the periodic or chaotic motion of a system [30]. If the parameters change, the stability of the system will vary. This is illustrated by observing the state changes of the chaotic system through the bifurcation diagram and Lyapunov exponential when the system parameter changes.

For , , , , , and this system has chaotic solutions with the bifurcation diagram and Lyapunov exponential, as shown in Figure 7. Obviously, from the bifurcation diagram and Lyapunov exponent spectrum, we conclude that System (2) exhibits robust chaos [32] in the whole region, except for the periodic motion shown when the maximum Lyapunov exponential zero at f = 50. Therefore, this type of system signal has high scientific research value and can be used in image encryption.

3.3. Multistability Analysis

Multiple stability is an interesting phenomenon, which usually exists in chaotic systems with infinite equilibrium points. It can be seen from the bifurcation diagram in Figure 8. When the parameters , , , , , and varying f are in the region of [0, 30], there exist coexisting attractors. A set of initial conditions (0.02 0.02 0.02 0.02) with blue color and another set of initial conditions (0.5 0 0 0) with red color are fixed. Some sample coexisting attractors are presented. For example, when f = 2.5 or f = 12.12, the system produces the coexisting periodic attractors as shown in Figures 9(a) and 9(b). Moreover, the coexisting chaotic attractor and periodic attractor are found in the new System (2) with f = 12.72, as shown in Figure 9(c). In addition, the coexisting chaotic attractors are shown in Figure 9(d) with f = 25.

4. Implementation of System Circuit

Electronic circuit synthesis is not only a method to model nonlinear dynamic systems accurately but also a method to test the stability of system structures [11]. Multisim is used to design the circuit diagram of the chaotic system to illustrate the feasibility of the system, as shown in Figure 10. We use the popular design approach based on multipliers and operational amplifiers, which is TL082CD, the supply voltage is , and the saturation voltage is . The multiplier is AD633 (the output gain is set to 0.1).

Under the classical system parameters, the dynamic range of the state variable of System (2) is too small. In order to avoid excessive input errors of the multiplier, the linear transformation of the state variable of the system of equation (8) is performed and then the time scale transformation [33] of is performed. Finally, the system of equation (9) is obtained.

A schematic diagram of the designed circuit is shown in Figure 9. When the capacitance values are and the resistor values are , the other resistor values are shown in equation (10):

The phase diagram obtained by circuit simulation is shown in Figure 11. Comparing the circuit simulation phase diagrams in Figure 11 and the numerical simulation phase diagrams in Figure 4 shows that they coincide, which verifies the circuit feasibility of the chaotic system.

5. Parameter Adaptive Synchronous Control

In this study, the synchronous control of two systems with infinite equilibrium points is studied.

The drive system with an infinite equilibrium point is designed as follows:

The designed response system is as follows:

Here, the adaptive controller is and the state error of the drive system and the response system is defined as . The synchronization state error is calculated by the following equation [34]:

Similarly, the estimated error of the calculated parameters is as follows:

where , , , , , and are the estimated of parameters. The estimation error of the dynamic parameters can be obtained by equation (15).

To achieve adaptive synchronous control, namely, to achieve , the adaptive controller is designed as follows:

Here, , , , and are normal numbers, and the parameter updating law is defined as follows:

The designed controller and parameter updating rules are inserted into the error equation to obtain the following equation:

Lyapunov stability theory [16, 35] was used to verify the synchronization of the drive system and response system. The Lyapunov function is constructed as follows:

In equations (17) and (19), factor and the derivative of V yields equation (20), which is obvious for and . Therefore, according to Lyapunov stability theory, the driving system and the response system can realize synchronization.

The synchronization is verified by an example. That is, the fourth-order Runge–Kutta algorithm is used for numerical simulation. The system parameters are , , , , , and . The initial values of the drive system are , , , and . The initial values of the response system are , , , and . The initial conditions of the parameter estimation are , , , , , and . The control parameters are set as and . The simulation results are shown in Figure 12.

The synchronization error curves between the driving system and the response system are achieved in approximately 0.08 seconds. The system completes the identification of unknown parameters in approximately 0.1 seconds. This shows that the synchronization control of the two systems is realized and that the synchronization effect is good. But in different synchronization systems, the control parameters are selected differently, reflecting different synchronization effects. Therefore, the choice of control parameters should depend on the specific situation.

6. Application in Image Encryption

In cryptography, there are some basic concepts [36], such as plaintext representing information to be encrypted, ciphertext representing information processed by an encryption algorithm, an encryption algorithm representing the way plaintext converted to ciphertext, and a decryption algorithm representing the way ciphertext converted to plaintext. There are two principles for encryption in cryptography: diffusion and confusion. Diffusion is the purpose of encrypting plaintext by loading plaintext into ciphertext [16]. However, confusion uses obfuscation to conceal the relationship between plaintext and ciphertext without changing the plaintext, making the plaintext undecipherable. The analysis of the image encryption effect mainly includes histograms, information entropy, sensitivities to keys, correlations, and other measures. The overall structure of the image encryption and decryption process of this study is shown in Figure 13.

6.1. Method of Image Encryption and Decryption Method

In this study, a chaotic adaptive parameter synchronization control system with infinite equilibria is used for image encryption to verify that the system is more secure for cryptography.

There are 3-color data matrices , , and of original image I with pixels. The original image I is denoted as .

The detailed steps of image encryption are as follows:Step 1: Preprocess the chaotic sequences.When the initial values of the adaptive parameter system are , , , and , the four-dimensional chaotic sequences of the driving system, which are denoted as , can be obtained. To eliminate the transient effects for more random effects, the top 1000 items generated iteratively were removed. Each element (c(i)) in the chaotic sequences was processed by the following equation, and the chaotic sequences were converted into an integer between 0 and 255:Step 2: Generate scrambled sequences. Three chaotic sequences of , , and were arranged in ascending order with the sort function to obtain the scrambled matrices , , and .Step 3: The chaotic sequence x4 obtained by iteration is transformed into a two-dimensional matrix C, whose size is . The XOR operation [16] (Table 3) was performed on matrices , , and , and matrix C is obtained according to number 1 in Table 4 (binary code for DNA coding rules [16]) at corresponding positions to conceal plaintext information. The diffusion matrices , , and are obtained.Step 4: Reconstruct the matrices , , and to obtain the encrypted image.

The detailed steps of the image decryption are as follows:Step 1. Preprocessed sequences. Input the initial values of the adaptive parameters system as the keys to obtain the 4-dimensional mixture of the response system. It is denoted as . Similarly, the first 1000 items are eliminated, and then each element in the chaotic sequences is processed by equation (21) to convert the chaotic sequences into an integer between 0 and 255.Step 2. Read the 3-color ciphertext matrices , , and of the encrypted image.Step 3. The resulting chaotic sequence is converted to a two-dimensional matrix with a size of . The XOR operation (Table 3) is performed on the ciphertext matrices , , and , and matrix at the corresponding positions according to number 1 in Table 4 (binary rules for DNA encoding [14]). The , , and matrices of the ciphertext image are obtained.Step 4. The , , and matrices of the ciphertext image are restored by using , , and chaotic sequences as ascending obfuscations. The , , and matrices are obtained.Step 5. Reconstruct two-dimensional matrices , , and . The decrypted image is obtained.

6.2. Experimental Simulation

In this study, the classic image Lena is used as the representative for encryption. The adaptive parameter system selects the above parameters and conducts encryption according to the above steps.

Figure 14 shows the experimental results. It can be seen that the encrypted image has no similar information to the original image, and it can be visually determined that the encryption and decryption are successful.

6.3. Histogram Analysis

The histogram intuitively sees the encryption effect. Figure 15 is a histogram comparison of original and encrypted images in the RGB channels.

Figure 15 shows that the histograms of the encrypted image are completely different from those of the original image. The pixel values of ciphertext images are evenly distributed by diffusion, and it is difficult to analyze the relationship with the original image. The hiding effect of the pixel values of the original image is better.

6.4. Correlation Analysis

The adjacent pixels of the original image have large correlations in the horizontal, vertical, and diagonal directions because of the coherence of the picture. Image encryption destroys the correlation between the pixel values of the original image. Therefore, correlation analysis can be used as an index of image encryption effect analysis. N pairs of adjacent pixels, which are , from the image are chosen. The correlation coefficient [37] is calculated by equation (22). The correlation curves are shown in Figure 16, and the correlation coefficients are listed in Table 5.

The correlations of the original image and the ciphered image show that the pixel correlation can be reduced to zero or close to zero after encryption. After encrypting adjacent pixels, it is concluded that the algorithm has a secure encryption effect. This means that the attacker cannot use correlation to crack the encrypted image.

6.5. Information Entropy Analysis

Information entropy reflects the uncertainty of image information [26] and can be calculated by the following equation [37]:where L is the number of gray levels of the image and is the probability of the pixel value in the entire picture. The theoretical value of the information entropy is 8. It is generally believed that the information entropy of all the encrypted images is quite close to the ideal value of 8, which implies that the encrypted images have good randomness.

As Table 6 shows, the encryption algorithm performs better than the results in the listed literature, which indicates that this encryption algorithm is competitive in this sense.

6.6. Key Sensitivity Analysis

Key sensitivity [38] means that a small change in a designed key will lead to decryption failure, and the original image cannot be extracted when the same image is decrypted.

The keys used in this study that decrypt the image are the , , , and , as shown in Figure 17(a). is slightly changed and the other keys remained unchanged. The decrypted image is shown in Figure 17.

Figure 17(a) shows that the decryption image is completely identical to the original image. However, in Figure 17(b), the decryption image is completely different, which means that the proposed encryption method provides a high decrypt sensitivity.

7. Discussions

The proposed family of chaotic systems enriches the study of chaotic systems with infinite equilibrium points, and on this basis, we can independently study chaotic systems with more unique closed curve equilibrium points. The integer-order chaotic system can also be extended to the fractional-order chaotic system, so that the study of chaotic system has more practical significance. The circuit of the new system is designed and simulated with Multisim. The phase diagram of the circuit simulation is in good agreement with the result of numerical simulation. This proves the feasibility of circuit realization, and chaotic systems can be realized by analog and digital circuit construction in the future work, which endods the value of the industrial practical application of the chaotic system. The designed adaptive synchronization control can achieve synchronization quickly. However, other synchronization control technologies can be expanded to achieve faster synchronization for a better synchronization effect. The combination of synchronous control and DNA encoding in image encryption can effectively improve the security performance of encryption/decryption, which has further research value. Furthermore, extending the synchronization control of chaotic system to the application field can also be reflected in other fields such as fault detection and secure communication. This will give chaos control practical application value and has the necessity of further development research.

8. Conclusions

A family of fourth-order chaotic systems with an infinite equilibrium point is proposed in this study. A chaotic system is selected for theoretical analysis and numerical simulation of the Lyapunov exponents spectrum, Poincarè cross section, and bifurcation diagram; the results support that the chaotic system has more complex dynamic characteristics. A circuit schematic diagram is built to verify the circuit stability and realizability of the proposed system. The parameter self-adaptive synchronization of the chaotic system is designed. The simulation results show that the synchronization control of the two systems is realized and the synchronization effects work well. The color image encryption algorithm is designed by using chaotic system synchronization control combined with DNA coding and operating rules. The histogram, information entropy, correlation coefficient of each channel, and key sensitivity are analyzed. Comparing the reference for image encryption algorithms, it is found that the algorithm has a more secure performance.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest.