key: cord-1041577-v97iejse authors: Yu, Fei; Chen, Huifeng; Kong, Xinxin; Yu, Qiulin; Cai, Shuo; Huang, Yuanyuan; Du, Sichun title: Dynamic analysis and application in medical digital image watermarking of a new multi-scroll neural network with quartic nonlinear memristor date: 2022-04-07 journal: Eur Phys J Plus DOI: 10.1140/epjp/s13360-022-02652-4 sha: b3ea79c296d911b130cc1d7903e8d182c3722f9b doc_id: 1041577 cord_uid: v97iejse Memristor is widely used in various neural bionic models because of its excellent characteristics in biological neural activity simulation. In this paper, a piecewise nonlinear function is used to transform the quartic memristor, which is introduced into the ternary Hopfield neural network (HNN) with self-feedback, and a piecewise quartic memristive chaotic neural network model with multi-scroll is constructed. Through simulation analysis, the number of scroll layers changes with memristor parameters and has significant coexistence of multi-scroll attractors and high initial value sensitivity has been found. Using its excellent unpredictability, a digital watermarking algorithm based on wavelet transform is improved and used in the protection of personal medical data. The results show that it not only improves the confidentiality and convenience, but also ensures its robustness and has good encryption effect. At present, with the development of the Internet, the popularity of content creation and the emergence of personal information disclosure, copyright protection has become a highly valued aspect. Gaps and deficiencies in the security of medical data and patient privacy, particularly during the COVID-19 pandemic, have left them vulnerable. Therefore, in the research field of secure communication, digital watermarking research hotspot arises at the historic moment. Digital watermarking can embed specific information into the original carrier and has good concealment. Changes in the carrier cannot be recognized by the human visual system, and effectively protect individual rights and interests. In 1993, Van Schyndel et al. [53] first proposed the concept of digital watermarking. With the advancement of research, the traditional digital watermarking has changed from basic time-domain processing to frequency-domain transformation processing with better performance. Kundur et al. [54] used transform domain algorithm to embed watermark information for the first time. Cox et al. [55] proposed embedding watermark information in the low-frequency region of the original image to achieve better robustness. Swanson et al. [56] realized embedding watermark in video and had good effect. Ng et al. [57] used Laplace operator to replace the traditional Gaussian model to realize adaptive strength selection. However, the above research still cannot meet the security requirements in many use scenarios, such as personal medical data. Because of the particularity of these information, its security is the primary premise of use. Therefore, the use of chaotic encryption to further strengthen the confidentiality of digital watermarking has become a research hotspot. In this paper, a magnetron piecewise nonlinear quartic memristor model is proposed based on the step piecewise function, and its hysteresis characteristics are verified. Then, the memristor model is introduced into an improved three neuron HNN with selffeedback, resulting in a MNN model with multi-scroll attractors. Through the simulation analysis of the attractor phase diagram, Lyapunov exponential spectrum and bifurcation diagram of the proposed MNN system, it is found that the system has controllable multi-scroll attractors, and the number of scrolls can change with the odd-even property of the memristor. It is further found that the system has complex coexisting chaotic attractors. Then, the time series file generated by the system has a high initial value sensitivity, and it is applied to the traditional wavelet transform digital watermarking algorithm, which effectively improves the security of the algorithm, while taking into account the invisibility and robustness, and realizes the protection of personal medical image data. The appearance of memristors makes the research of traditional chaotic neural networks burst out new vigor. Its memory, low power consumption and large capacity are very consistent in simulating synapses and building neurons. It can effectively improve the performance of neural network and simulate the dynamic characteristics of neural network. According to the memristor theory, a generalized voltage controlled or magnetic controlled memristor can be expressed as: where W (u) is a continuous function as a variable, i, v, u represents the current, voltage and internal state variables through the memristor, respectively. In 2018, Xia et al. [58] improved the two magnetron smooth multi-segmented quadratic nonlinear memristor and introduced them into the three-dimensional jerk system to establish a memristive multi-scroll jerk circuit. On this basis, a new nonlinear magnetron piecewise quartic memristor model is proposed and introduced into HNN to obtain a multi-scroll MNN chaotic system. The memristor can be expressed as follows: where m, n, h, l is the positive parameter and f (u) is the internal state function of memristor, as shown below: where When the selected memristor internal functions are different, there will be different numbers of attractors with odd and even numbers, and the number of chaotic scroll layers can be controlled by changing the parameters. The number increases with the increase of I and J . The step function sgn (u) is a special continuous time function, a process from 0 to 1, which belongs to a singular function. In order to verify our proposed memristor, we set parameters m = 0.11, n = 0.03, I = 1. The sinusoidal voltage source is v = A m sin (Ft). When fixed A m = 1, the variation of hysteresis curve with frequency F is shown in Fig. 1a . When fixed F = 0.6, the change with amplitude A m is shown in Fig. 1b . It can be clearly seen that the hysteresis loop of the simulator shrinks at the origin and presents a lobe shape, and the curve lobe area changes with the change of amplitude and frequency. It is verified that the simulator has memristor characteristics and excellent properties. A theoretically ideal neural network, HNN was proposed by Hopfield in 1984. Because of its excellent nonlinear characteristics and efficient mathematical model, it is widely used in the dynamic analysis of various biological nervous system activities. In recent years, HNN is also widely used in the field of nonlinear chaos. HNN is represented by a set of nonlinear ordinary differential equations corresponding to neurons. Its mathematical model can be expressed as follows: among them, C i R i and x i are the membrane capacitance, membrane resistance and membrane potential of neurons i, respectively. w i j represents the connection weight between neurons i and j , v j = tanh x j represents the activation function of neurons I iext represents external stimulation. According to Ref. [59] , C i = 1, R i = 1, I iext = 0. In this paper, a new topological connection of ternary MNN is obtained by replacing a synaptic weight in Eq. (7) with a piecewise nonlinear memristor. The three neurons are connected to each other, as shown in Fig. 2 . The synaptic weight matrix can be described as follows: By replacing the synaptic weight W (u) with the memristor model W 13 and adding a new control parameter, namely neuron coupling strength K , a new HNN model can be obtained as follows: where x, y, z, u is the system variable, m, n, h, l and k are positive parameters, k is the connection strength of memristor resistance coupling. In this system, the second neuron is selected as the input of memristor resistance simulator and affects the connection between the first neuron and the third neuron. The hyperbolic tangent function tanh is a neuron activation function, and its coefficient represents the connection strength between adjacent neurons. In order to study its Equilibrium point, we select f 2 (u) , J = 1, m = 0.53, n = 0.03, h = 3, l = 1.3 and set P = (ζ 1 , ζ 2 , ζ 3 , ζ 4 ) as an equilibrium point of the equation, then the equilibrium point can be obtained from Eq. (9): The above equations can be obtained by simplifying the second and fourth equations: Substituting (10) into (9) can obtain the trajectories of Eqs. (1) and (3) in (9), which are marked with red and blue curves, respectively, as shown in Fig. 3 . The equilibrium point is the green intersection of the red and blue curves in Fig. 3 . It can be seen from Fig. 3 that in this case, the above equation has 17 focal points, that is, 17 equilibrium points, which are symmetrically distributed at the center. The symmetrical equilibrium points corresponding to Fig. 3 are calculated as shown in Table 1 . The value of the symbolic function will affect the number of scrolls and equilibrium points, indicating that the memristor can control the number of vortices and produce controllable multistable chaos. The Jacobian matrix near the equilibrium point can be expressed as: where , and the corresponding I , J take 1, 2 and 3, and the initial value set as 0.1, 0, 0, 0 . The system phase portrait can be obtained, as shown in Figs. 4 and 5. It can be seen that the number of scrolls has different parity with the selected symbolic function. As the value of I and J increases gradually, the number of scrolls also increases, and eventually there will be hyperchaos of infinite scrolls, which means that the symbolic function in the memristor model has a strong scroll control effect. Eur. Phys. J. Plus (2022) 137:434 In order to further study and analyze the system model, this section uses the R2018a MATLAB software platform and uses the fourth-fifth order Runge-Kutta algorithm, that is, the ode45 algorithm of MATLAB platform to solve the equations. The phase diagram, bifurcation diagram, Lyapunov exponent and other data are used for dynamic research and analysis. The coupling strength k is used as the control parameter, f 2 (u) and J = 1 are selected, the initial values are 0.1, 0, , 0, 0 and −0.1, 0, 0, 0 . The corresponding bifurcation diagram is calculated, as shown in Fig. 6 . The red and blue curves are the results when the initial value is x (0) = ±1. it can be seen that when k is in the range of [0,2], the dynamic behavior of system formula (8) changes from periodic limit cycle to chaotic state, and finally evolves from inverse period doubling bifurcation path to periodic limit cycle near k = 1.55. It has extremely complex bifurcation behavior, such as stable point, period, chaos, reverse period doubling bifurcation scenario. When the initial value is slightly adjusted, it can be seen that the bifurcation diagram becomes axisymmetric with x = 0, and coexistence hyperchaos will occur in the range of [1.1, 1.55], which means that the MNN is sensitive to the initial value. In order to reflect the sensitivity of the system to initial values, Lyapunov exponential spectrum is used to describe the dynamic characteristics of the system. Lyapunov exponent reflects the overall behavior of the trajectory in the phase space of the dynamic system, that is, as long as there is a positive Lyapunov exponent in the system, any two adjacent orbits in the system will inevitably separate at an exponential rate and enter a chaotic state. Therefore, whether the system is a chaotic system can be judged by calculating the exponent, the Lyapunov exponential spectrum with the initial value of 0.1, 0, 0, 0 is calculated as Fig. 7 . Within the range of [1, 2] , the system has a positive exponent, which is consistent with the phenomenon of bifurcation diagram, and the system has hyperchaotic characteristics. According to the specific combination of parameters, different initial values will lead to different trajectories of the system. Some trajectories may eventually converge to one attractor and others to another, and these attractors are called coexistence attractors. If the convergent attractor has the same morphology and dynamic behavior, it is called a homogenous coexistence attractor. If they have different dynamic behavior characteristics and different attractor forms, they are called heterogeneous coexistence attractors. According to the analysis of the above bifurcation diagram and Lyapunov exponent diagram, the coexistence of chaotic attractors is obvious when the coupling strength K is in the range [1.3,1.55], so we choose the second memristor f 2 (u) J = 1 k = 1.55 to obtain the coexistence attractor, as shown in Fig. 8 , in which the initial value of the orange track is 0.1 0 0 0 , the initial value of the blue track is −0.1, 0, 0, 0 , and Fig. 8a shows the coexistence chaos. It can be seen that although the initial trends are different, their trajectories are intertwined, and finally tend to the same chaotic attractor form, belonging to homogeneous coexistence attractors. Figure 8b shows the coexistence periodic attractor. Finally, its trajectory tends to be the same in shape, but in the opposite direction. The attraction basin is an important dynamic index in the coexistence research and analysis, which can clearly describe the relevant properties of the system when the initial values of different states change on the two-dimensional plane. Under the conditions of the above graphical coexistence attractor, the simulated attraction basin is shown in Fig. 9 . The red region represents the divergent state, the red region represents the periodic state, and the Yellow region represents the chaotic state. The distribution and boundary of each region in the diagram can be clearly seen, which is highly consistent with the phase diagram, which verifies the initial value sensitivity of the system. Digital watermarking technology directly embeds and stores some content with specific identification or representing some information into the carrier content through a specific algorithm without changing the actual use and original value of the carrier content. It can not only resist the loss in actual use through the algorithm, but also well hide the identification information from human perception system. So it has a high degree of robustness on the basis of ensuring information security. With the advancement of research, the traditional digital watermarking has changed from the basic DCT time domain processing to the frequency domain transformation processing with better performance. However, it still cannot meet the needs of use, so there is a research hotspot of using chaotic encryption to further strengthen the confidentiality of digital watermarking. In image processing, the frequency domain has more operation space than the time domain. For human visual system, the frequency domain processing also has better performance than the time-domain processing. The chaotic digital watermarking method based on wavelet transform is a research hotspot. However, due to the influence of capacity, the chaotic sequence used in most algorithms is not completely aperiodic. The corresponding algorithm can successfully remove or destroy most of the hidden watermark information. In this paper, a chaotic digital watermarking method based on the above chaotic system is proposed. Based on the existing chaotic digital watermarking, this method uses a more complex chaotic system to generate a specific sequence file, convert it into a twodimensional code and embed it into the carrier image, which can improve the confidentiality and anti-interference of the digital watermarking algorithm. Discrete wavelet transform is developed on the basis of Fourier transform. It expands the image according to different levels and can get images with different frequencies, including low-frequency areas where the main information of the image is stored, and medium and high-frequency areas where the details of the image are stored. The human eye does not perceive the change of smooth low-frequency region obviously, so this part is generally selected as the embedded region. Wavelet transform can be described as: Wavelet coefficients: PSNR value and NC value are two commonly used analysis indexes to evaluate the hiding and robustness of digital watermarking. PSNR is the full name of peak signal-to-noise ratio, which can evaluate the similarity between the reconstructed image and the original image. The greater its value, the more similar it is. It can be described as: The full name of NC value is normalized correlation coefficient. The closer its value is to 1, the better the watermark effect. It can be described as: The digital watermarking algorithm used in this paper has four processes in total, as shown in Fig. 10 . The first is the embedded watermark generation process in the green area. Using the system proposed above, under the condition of selecting the second memristor f 2 (u) , J = 2 , the chaotic time series is generated by using the initial value 0.1, 0, 0, 0 , and the QR code watermark is generated by using this sequence. On this basis, it is scrambled, encrypted and wavelet transform to generate subband data as the preparation for the next step. The watermark effect generated in the experiment is shown as Fig. 11 . The second step is shown in the blue area. Firstly, the carrier image is preprocessed, and at the same time, the wavelet transform is used to convert the carrier image into frequency domain information and block it. Select the appropriate area, embed the frequency The third step, as shown in the red area, simulates the possible impact and malicious attacks that the carrier image may encounter during use, such as changing the image size, adding Gaussian noise, being cut, filtering attack, rotation attack, random noise attack, etc. The fourth step, as shown in the yellow area, extracts the watermark from the carrier image after the above attack, restores and decrypts it, and evaluates its performance. The first is the numerical evaluation. NC and PSNR are used to evaluate the watermark effect, and the visual observation is used to judge the actual effect. The combination of the two methods can obtain more accurate and comprehensive test results. Through experiments, the quality of watermarks under various attacks is evaluated. The values of NC and PSNR that are not attacked are used as the control group. The closer the values of the experimental group after being attacked, the better the effect is. The experimental results show that the effect is better when the NC value is greater than 0.92 and the PSNR value is more than 15, which will not affect the use. The specific data are shown in the Figs. 12, 13, 14, 15, 16, 17 and 18 . It can be seen that the carrier image after adding the watermark has no change that can be recognized by the naked eye, and the watermark directly extracted from the image that has not been attacked has not been affected. However, the watermark extracted after different attacks can still directly extract the information stored in the watermark and has good restoration. Among them, scaling attack and filtering attack have little impact on the watermark, and there is basically no damage; Gaussian noise and random noise have a slight impact on the watermark quality, but do not affect the watermark effect; Shear attack and rotation attack have a slightly larger impression on the watermark, but still do not affect the watermark reading; The experimental results show that the watermark algorithm has improved the confidentiality and capacity of the watermark, does not reduce the hiding and robustness of the watermark, and better balances the performance of all aspects. In this paper, the nonlinear magnetron piecewise quartic memristor simulator is used to replace a connecting synapse in the three neuron self feedback HNN, and a multi-scroll MNN model with controllable parity is constructed. Through theoretical analysis and experimental simulation, there is obvious that the model has the characteristics of controllable multi-scroll number varying with memristor parameters. Complex symmetric coexisting attractors can be generated with the change of coupling parameters. At the same time, the system has high initial value sensitivity can be found from the attraction basin image. Based on the excellent unpredictability of this system, the wavelet transform digital image watermarking algorithm is improved and applied to the protection of medical information data. It not only improves the protection, but also balances the robustness and invisibility of the watermark, which has considerable practical application value. Joint learning of visual and spatial features for edit propagation from a single image A robust and fixed-time zeroing neural dynamics for computing time-variant nonlinear equation using a novel nonlinear activation function Detecting iris liveness with batch normalized convolutional neural network Electrocardiogram soft computing using hybrid deep learning CNN-ELM Research on recurrent neural network based crack opening prediction of concrete dam An object tracking framework with recapture based on correlation filters and Siamese networks A new multi-scroll Chua's circuit with composite hyperbolic tangent-cubic nonlinearity: complex dynamics, Hardware implementation and Image encryption application Modeling and circuit realisation of a new no-equilibrium chaotic system with hidden attractor and coexisting attractors Pseudorandom number generator based on three kinds of four-wing memristive hyperchaotic system and its application in image encryption Dynamic analysis, circuit realization, control design and image encryption application of an extended Lü system with coexisting attractors Chaos-based engineering applications with a 6D memristive multistable hyperchaotic system and a 2D SF-SIMM hyperchaotic map An extremely simple multiwing chaotic system: dynamics analysis, encryption application, and hardware implementation A unified chaotic system with various coexisting attractors Simple and accurate analysis of BER performance for DCSK chaotic communication A color image encryption scheme based on hybrid cascaded chaotic system A locally active discrete memristor model and its application in a hyperchaotic map Design and FPGA implementation of a pseudo-random number generator based on a Hopfield neural network under electromagnetic radiation A novel high speed artificial neural network-Cbased chaotic true random number generator on field programmable gate array FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient Emotion model of associative memory possessing variable learning rates with time delay dynamic analysis and FPGA implementation of new chaotic neural network and optimization of traveling salesman problem Memristor-based neural network circuit with weighted sum simultaneous perturbation training and its applications Robust multimode function synchronization of memristive neural networks with parameter perturbations and time-varying delays Coexisting firing patterns and phase synchronization in locally active memristor coupled neurons with HR and FN models Synchronization of inertial memristive neural networks with time-varying delays via static or dynamic event-triggered control Adaptive synchronization of a class of fractional-order complex-valued chaotic neural network with time-delay Hybrid multisynchronization of coupled multistable memristive neural networks with time delays Bifurcations to bursting and spiking in the Chay neuron and their validation in a digital circuit Heterogeneous dual memristive circuit: Multistability, symmetry, and FPGA implementation Piecewise-linear simplification for adaptive synaptic neuron model Continuous non-autonomous memristive Rulkov model with extreme multistability The missing memristor found Chaotic oscillator based on memcapacitor and meminductor A fractional-order multistable locally active memristor and its chaotic system with transient transition, state jump Two-memristor-based chaotic system with infinite coexisting attractors General modeling method of multi-value memristor and its application in digital logic circuit Pseudorandom number generator based on a 5D hyperchaotic four-wing memristive system and its FPGA implementation Asymmetric coexisting bifurcations and multi-stability in an asymmetric memristive diode-bridge-based jerk circuit. Chin Analysis and FPGA realization of a novel 5D hyperchaotic four-wing memristive system, active control synchronization, and secure communication application CCII and FPGA realization: a multistable modified fourth-order autonomous Chua's chaotic system with coexisting multiple attractors Dynamics analysis, hardware implementation and engineering applications of novel multi-style attractors in a neural network under electromagnetic radiation Electromagnetic induction effects on electrical activity within a memristive Wilson neuron model Review on chaotic dynamics of memristive neuron and neural network A 6D fractional-order memristive hopfield neural network and its application in image encryption A multi-stable memristor and its application in a neural network Neural bursting and synchronization emulated by neural networks and circuits Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption Analysis and implementation of new fractional-order multi-scroll hidden attractors Multistability analysis, coexisting multiple attractors and FPGA implementation of Yu-Wang four-wing chaotic system Generation of grid multi-wing chaotic attractors and its application in video secure communication system Initial offset boosting coexisting attractors in memristive multi-double-scroll Hopfield neural network Multi-scroll hidden attractor in memristive HR neuron model under electromagnetic radiation and its applications A digital watermark A robust digital image watermarking method using wavelet-based fusion Secure spread spectrum watermarking for multimedia Multiresolution and object-based video watermarking using perceptual models Maximum-likelihood detection in DWT domain image watermarking using Laplacian modeling Coexisting multiscroll hyperchaotic attractors generated from a novel memristive jerk system Chimera in a network of memristor-based Hopfield neural network Acknowledgements This paper was supported by the Scientific Research Fund of Hunan Provincial Education Department under Grant 21B0345, and by the National Natural Science Foundation of China under Grant 62172058, and by the Natural Science Foundation of Hunan Province under Grants 2020JJ4622 and 2020JJ4221, and by the special funds for the construction of innovative provinces in Hunan Province under Grants 2020JK4046 and 2022SK2007. This manuscript has associated data in a data repository. [Authors' comment: All data used to support the findings of this study are available from the corresponding author upon request.] Conflict of interest The authors declare that they have no conflict of interest. Data sets generated and/or analyzed during the current study may be obtained from the corresponding authors upon reasonable request.