Research article

A two-dimensional hyperchaotic discrete dynamical system and its application

  • Published: 27 March 2026
  • MSC : 37D45, 37M10, 68P25, 94A60

  • This paper develops a two-dimensional hyperchaotic discrete dynamical system (2D-HDDS) by extending the exponential-Chebyshev mechanism to a two-dimensional setting through a structured nonlinear feedback coupling. The resulting system combines the stretching effect of exponential dynamics with the folding behavior of Chebyshev mappings. Bifurcation diagrams and Lyapunov-exponent spectra indicate that 2D-HDDS exhibits a comparatively wide hyperchaotic parameter region and high dynamical complexity. Based on the generated keystream, we further construct an image-encryption scheme that integrates dual permutations, a key-dependent dynamic S-box, index-coupled forward and backward nonlinear diffusion, and a lightweight avalanche booster to enhance the propagation of plaintext perturbations. Experimental results show high key sensitivity and strong plaintext sensitivity, with the number of pixels change rate (NPCR) and the unified average changing intensity (UACI) values close to the ideal levels predicted by the standard random-like cipher-image model, while also demonstrating good resistance to statistical and differential attacks.

    Citation: Min Zhao. A two-dimensional hyperchaotic discrete dynamical system and its application[J]. AIMS Mathematics, 2026, 11(3): 8242-8270. doi: 10.3934/math.2026339

    Related Papers:

  • This paper develops a two-dimensional hyperchaotic discrete dynamical system (2D-HDDS) by extending the exponential-Chebyshev mechanism to a two-dimensional setting through a structured nonlinear feedback coupling. The resulting system combines the stretching effect of exponential dynamics with the folding behavior of Chebyshev mappings. Bifurcation diagrams and Lyapunov-exponent spectra indicate that 2D-HDDS exhibits a comparatively wide hyperchaotic parameter region and high dynamical complexity. Based on the generated keystream, we further construct an image-encryption scheme that integrates dual permutations, a key-dependent dynamic S-box, index-coupled forward and backward nonlinear diffusion, and a lightweight avalanche booster to enhance the propagation of plaintext perturbations. Experimental results show high key sensitivity and strong plaintext sensitivity, with the number of pixels change rate (NPCR) and the unified average changing intensity (UACI) values close to the ideal levels predicted by the standard random-like cipher-image model, while also demonstrating good resistance to statistical and differential attacks.



    加载中


    [1] G. Álvarez, S. J. Li, Some basic cryptographic requirements for chaos-based cryptosystems, Int. J. Bifurcat. Chaos, 16 (2006), 2129–2151. http://dx.doi.org/10.1142/S0218127406015970 doi: 10.1142/S0218127406015970
    [2] E. Barker, Recommendation for key management: Part 1–general, In: NIST special publication 800-57 part 1 revision 5, National Institute of Standards and Technology (NIST), 2020. http://dx.doi.org/10.6028/NIST.SP.800-57pt1r5
    [3] E. Barker, A. Roginsky, Transitioning the use of cryptographic algorithms and key lengths, In: NIST Special Publication 800-131A Revision 2, National Institute of Standards and Technology (NIST), 2019. http://dx.doi.org/10.6028/NIST.SP.800-131Ar2
    [4] G. Benettin, L. Galgani, A. Giorgilli, J.-M. Strelcyn, Lyapunov characteristic exponents for smooth dynamical systems and for Hamiltonian systems; a method for computing all of them. Part 1: theory, Meccanica, 15 (1980), 9–20. http://dx.doi.org/10.1007/BF02128236 doi: 10.1007/BF02128236
    [5] G. Benettin, L. Galgani, A. Giorgilli, J.-M. Strelcyn, Lyapunov characteristic exponents for smooth dynamical systems and for Hamiltonian systems; a method for computing all of them. Part 2: numerical application, Meccanica, 15 (1980), 21–30. http://dx.doi.org/10.1007/BF02128237 doi: 10.1007/BF02128237
    [6] A. Belazi, A. A. A. El-Latif, S. Belghith, A novel image encryption scheme based on substitution-permutation network and chaos, Signal Process., 128 (2016), 155–170. http://dx.doi.org/10.1016/j.sigpro.2016.03.021 doi: 10.1016/j.sigpro.2016.03.021
    [7] C. Chen, K. H. Sun, S. B. He, An improved image encryption algorithm with finite computing precision, Signal Process., 168 (2020), 107340. http://dx.doi.org/10.1016/j.sigpro.2019.107340 doi: 10.1016/j.sigpro.2019.107340
    [8] P. Cheng, H. X. Zhao, A novel image encryption algorithm based on cellular automata and chaotic system, Advanced Materials Research, 998–999 (2014), 797–801. http://dx.doi.org/10.4028/www.scientific.net/AMR.998-999.797 doi: 10.4028/www.scientific.net/AMR.998-999.797
    [9] C. L. Fan, Q. Ding, Analysis and resistance of dynamic degradation of digital chaos via functional graphs, Nonlinear Dyn., 103 (2021), 1081–1097. http://dx.doi.org/10.1007/s11071-020-06160-x doi: 10.1007/s11071-020-06160-x
    [10] Y. C. Fu, Z. H. Li, F. Huang, W. Ning, H. R. Lyu, Design of a fast image encryption algorithm based on a novel 2D chaotic map and DNA encoding, Secur. Privacy, 8 (2025), e70036. http://dx.doi.org/10.1002/spy2.70036 doi: 10.1002/spy2.70036
    [11] J. Fridrich, Symmetric ciphers based on two-dimensional chaotic maps, Int. J. Bifurcat. Chaos, 8 (1998), 1259–1284. http://dx.doi.org/10.1142/S021812749800098X doi: 10.1142/S021812749800098X
    [12] Q. S. Gao, X. Q. Zhang, Multiple-image encryption algorithm based on a new composite chaotic system and 3D coordinate matrix, Chaos Soliton. Fract., 189 (2024), 115587. http://dx.doi.org/10.1016/j.chaos.2024.115587 doi: 10.1016/j.chaos.2024.115587
    [13] L. H. Gong, K. D. Qiu, C. Z. Deng, N. R. Zhou, An image compression and encryption algorithm based on chaotic system and compressive sensing, Opt. Laser Technol., 115 (2019), 257–267. http://dx.doi.org/10.1016/j.optlastec.2019.01.039 doi: 10.1016/j.optlastec.2019.01.039
    [14] Z. Y. Hua, F. Jin, B. X. Xu, H. J. Huang, 2D Logistic-Sine-coupling map for image encryption, Signal Process., 149 (2018), 148–161. http://dx.doi.org/10.1016/j.sigpro.2018.03.010 doi: 10.1016/j.sigpro.2018.03.010
    [15] L. Kocarev, S. Lian, Chaos-based cryptography: Theory, algorithms and applications, Berlin-Heidelberg: Springer, 2011. http://dx.doi.org/10.1007/978-3-642-20542-2
    [16] A. Kumar, M. Dua, A novel exponent-sine-cosine chaos map-based multiple-image encryption technique, Multimedia Syst., 30 (2024), 141. http://dx.doi.org/10.1007/s00530-024-01334-8 doi: 10.1007/s00530-024-01334-8
    [17] C. Q. Li, L. Y. Zhang, R. Ou, K.-W. Wong, S. Shu, Breaking a novel colour image encryption algorithm based on chaos, Nonlinear Dyn., 70 (2012), 2383–2388. http://dx.doi.org/10.1007/s11071-012-0626-5 doi: 10.1007/s11071-012-0626-5
    [18] L. D. Liu, J. F. Hu, H. Y. Li, J. Li, Z. S. He, C. L. Han, Parameter estimation of a class of one-dimensional discrete chaotic systems, Discrete Dyn. Nat. Soc., 2011 (2011), 696017. http://dx.doi.org/10.1155/2011/696017 doi: 10.1155/2011/696017
    [19] Y. S. Liu, L. Y. Zhang, J. Wang, Y. S. Zhang, K.-W. Wong, Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure, Nonlinear Dyn., 84 (2016), 2241–2250. http://dx.doi.org/10.1007/s11071-016-2642-3 doi: 10.1007/s11071-016-2642-3
    [20] G. Q. Long, X. L. Chai, Z. H. Gan, D. H. Jiang, X. He, M. G. Sun, Exploiting one-dimensional exponential Chebyshev chaotic map and matching embedding for visually meaningful image encryption, Chaos Soliton. Fract., 176 (2023), 114111. http://dx.doi.org/10.1016/j.chaos.2023.114111 doi: 10.1016/j.chaos.2023.114111
    [21] R. Matthews, On the derivation of a "chaotic" encryption algorithm, Cryptologia, 13 (1989), 29–42. http://dx.doi.org/10.1080/0161-118991863745 doi: 10.1080/0161-118991863745
    [22] M. Maazouz, A. Toubal, B. Bengherbia, O. Houhou, N. Batel, FPGA implementation of a chaos-based image encryption algorithm, J. King Saud Univ.–Com., 34 (2022), 9926–9941. http://dx.doi.org/10.1016/j.jksuci.2021.12.022 doi: 10.1016/j.jksuci.2021.12.022
    [23] H. Mouhsine, K. Mokni, M. Ch-Chaoui, Exploring multi-parameter bifurcations and immigration-driven dynamics in a discrete-time Bazykin–Berezovskaya prey-predator model, Nonlinear Dyn., 113 (2025), 34101–34131. http://dx.doi.org/10.1007/s11071-025-11818-5 doi: 10.1007/s11071-025-11818-5
    [24] H. Mouhsine, H. B. Ali, K. Mokni, M. Ch-Chaoui, Dynamics unveiled: investigating bifurcations and the strong Allee effect in a discrete-time prey-predator system, Int. J. Dynam. Control, 13 (2025), 324. http://dx.doi.org/10.1007/s40435-025-01834-z doi: 10.1007/s40435-025-01834-z
    [25] K. Mokni, H. Mouhsine, M. Ch-Chaoui, Multi-parameter bifurcations in a discrete Ricker-type predator-prey model with prey immigration, Math. Comput. Simulat., 233 (2025), 39–59. http://dx.doi.org/10.1016/j.matcom.2025.01.020 doi: 10.1016/j.matcom.2025.01.020
    [26] P. K. Naskar, S. Bhattacharyya, D. Nandy, A. Chaudhuri, A robust image encryption scheme using chaotic Tent map and cellular automata, Nonlinear Dyn., 100 (2020), 2877–2898. http://dx.doi.org/10.1007/s11071-020-05625-3 doi: 10.1007/s11071-020-05625-3
    [27] O. E. Rössler, An equation for hyperchaos, Phys. Lett. A, 71 (1979), 155–157. http://dx.doi.org/10.1016/0375-9601(79)90150-6 doi: 10.1016/0375-9601(79)90150-6
    [28] C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, 28 (1949), 656–715. http://dx.doi.org/10.1002/j.1538-7305.1949.tb00928.x doi: 10.1002/j.1538-7305.1949.tb00928.x
    [29] C. Skokos, The Lyapunov characteristic exponents and their computation, In: Dynamics of small solar system bodies and exoplanets, Berlin-Heidelberg: Springer, 2009, 63–135. http://dx.doi.org/10.1007/978-3-642-04458-8_2
    [30] L. Teng, X. Y. Wang, Y. J. Xian, Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion, Inform. Sciences, 605 (2022), 71–85. http://dx.doi.org/10.1016/j.ins.2022.05.032 doi: 10.1016/j.ins.2022.05.032
    [31] A. H. Tian, Z. Z. Yue, C. B. Fu, Image cryptography algorithm based on a new composite chaotic system and Latin square collaborative mechanism, Opt. Laser. Eng., 193 (2025), 109084. http://dx.doi.org/10.1016/j.optlaseng.2025.109084 doi: 10.1016/j.optlaseng.2025.109084
    [32] Q. Z. Wan, C. Y. Chen, T. Q. Liu, H. H. Rao, J. Dong, High-dimensional memristor-coupled multiple neural networks with spatial multi-structure attractors and application in image encryption, Chaos. Soliton. Fract., 199 (2025), 116716. http://dx.doi.org/10.1016/j.chaos.2025.116716 doi: 10.1016/j.chaos.2025.116716
    [33] B. Wang, X. P. Wei, Q. Zhang, Cryptanalysis of an image cryptosystem based on Logistic map, Optik, 124 (2013), 1773–1776. http://dx.doi.org/10.1016/j.ijleo.2012.06.020 doi: 10.1016/j.ijleo.2012.06.020
    [34] M. X. Wang, X. P. Fu, L. Teng, X. P. Yan, Z. Q. Xia, P. B. Liu, A new 2D-HELS hyperchaotic map and its application on image encryption using RNA operation and dynamic confusion, Chaos Soliton. Fract., 183 (2024), 114959. http://dx.doi.org/10.1016/j.chaos.2024.114959 doi: 10.1016/j.chaos.2024.114959
    [35] M. X. Wang, L. Teng, W. J. Zhou, X. P. Yan, Z. Q. Xia, S. Zhou, A new 2D cross hyperchaotic Sine-modulation-Logistic map and its application in bit-level image encryption, Expert Syst. Appl., 261 (2025), 125328. http://dx.doi.org/10.1016/j.eswa.2024.125328 doi: 10.1016/j.eswa.2024.125328
    [36] M.-M. Wang, X.-G. Song, S.-H. Liu, X.-Q. Zhao, N.-R. Zhou, A novel 2D Log-Logistic-Sine chaotic map for image encryption, Nonlinear Dyn., 113 (2025), 2867–2896. http://dx.doi.org/10.1007/s11071-024-10331-5 doi: 10.1007/s11071-024-10331-5
    [37] P. Y. Wang, Y. Xiang, L. L. Huang, A novel image encryption scheme based on a quantum Logistic map, hyper-chaotic Lorenz map, and DNA dynamic encoding, Electronics, 14 (2025), 2092. http://dx.doi.org/10.3390/electronics14102092 doi: 10.3390/electronics14102092
    [38] A. Wolf, J. B. Swift, H. L. Swinney, J. A. Vastano, Determining Lyapunov exponents from a time series, Physica D, 16 (1985), 285–317. http://dx.doi.org/10.1016/0167-2789(85)90011-9 doi: 10.1016/0167-2789(85)90011-9
    [39] S. Xiao, S. Xu, Z. Chen, Hyperchaotic encryption scheme for hyperspectral images using 3D Zigzag-like transformation and brushing diffusion, Multimedia Tools Appl., 83 (2024), 67371–67405. http://dx.doi.org/10.1007/s11042-023-17970-7 doi: 10.1007/s11042-023-17970-7
    [40] Y. X. Zheng, Q. Y. Huang, S. T. Cai, X. M. Xiong, L. Q. Huang, Image encryption based on novel Hill cipher variant and 2D-IGSCM hyper-chaotic map, Nonlinear Dyn., 113 (2025), 2811–2829. http://dx.doi.org/10.1007/s11071-024-10324-4 doi: 10.1007/s11071-024-10324-4
    [41] U. Zia, M. McCartney, B. Scotney, J. Martinez, M. AbuTair, J. Memon, et al., Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains, Int. J. Inf. Secur., 21 (2022), 917–935. http://dx.doi.org/10.1007/s10207-022-00588-5 doi: 10.1007/s10207-022-00588-5
    [42] S. L. Zhu, X. H. Deng, W. D. Zhang, C. X. Zhu, Image encryption scheme based on newly designed chaotic map and parallel DNA coding, Mathematics, 11 (2023), 231. http://dx.doi.org/10.3390/math11010231 doi: 10.3390/math11010231
    [43] N. R. Zhou, S. M. Pan, S. Cheng, Z. H. Zhou, Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing, Opt. Laser Technol., 82 (2016), 121–133. http://dx.doi.org/10.1016/j.optlastec.2016.02.018 doi: 10.1016/j.optlastec.2016.02.018
    [44] R. Zhou, S. M. Yu, Break an enhanced plaintext-related chaotic image encryption algorithm, Chaos Soliton. Fract., 181 (2024), 114623. http://dx.doi.org/10.1016/j.chaos.2024.114623 doi: 10.1016/j.chaos.2024.114623
    [45] N. R. Zhou, J. P. Yang, C. F. Tan, S. M. Pan, Z. H. Zhou, Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform, Opt. Commun., 354 (2015), 112–121. http://dx.doi.org/10.1016/j.optcom.2015.05.043 doi: 10.1016/j.optcom.2015.05.043
  • Reader Comments
  • © 2026 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(229) PDF downloads(34) Cited by(0)

Article outline

Figures and Tables

Figures(11)  /  Tables(5)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog