Chaotic Systems with Hyperbolic Sine Nonlinearity

In recent years, exploring and investigating chaotic systems with hyperbolic sine nonlinearity has gained the interest of many researchers. With two back-to-back diodes to approximate the hyperbolic sine nonlinearity, these chaotic systems can achieve simplicity of the electrical circuit without any multiplier or sub-circuits. In this chapter, the genesis of chaotic systems with hyperbolic sine nonlinearity is introduced, followed by the general method of generating nth-order (n > 3) chaotic systems. Then some derived chaotic systems/torus-chaotic system with hyperbolic sine nonlinearity is discussed. Finally, the applications such as random number generator algorithm, spread spectrum communication and image encryption schemes are introduced. The contribution of this chapter is that it systematically summarizes the design methods, the dynamic behavior and typical engineering applications of chaotic systems with hyperbolic sine nonlinearity, which may widen the current knowledge of chaos theory and engineering applications based on chaotic systems.


Introduction
Since Lorenz discovered chaos in a third-order ordinary differential equations, a new field of science has been launched [1].The fact that simple equations can exhibit incredible complex behavior continues enthrall engineers to apply chaotic systems to cryptosystem, secure communication, spread spectrum communication, etc. [2].
There is no doubt that nonlinear term is very important to design chaotic systems, which has peculiar complex properties such as ergodicity, highly initial value sensitivity, non-periodicity and long-term unpredictability.According to the literature, the nonlinearities can be piecewise nonlinear function [3], trigonometric function [4], absolute value function [5], or power function [6].With different nonlinearities, the chaotic system can have various strange attractors as single-scroll [7], double-scroll [8], multi-scroll [9], etc.The majority of such chaotic systems are known for many years, and some chaotic systems with hidden attractors are derived from them [10][11][12].
In recent years, chaotic systems with hyperbolic sine nonlinearities have gained the interest of many researchers.With two back-to-back diodes to approximate the hyperbolic sine nonlinearity, these chaotic systems can achieve simplicity of the electrical circuit without any multiplier or sub-circuits.Compared to single-scroll chaotic systems, the chaotic system with hyperbolic sine nonlinearity has richer dynamic behavior because it is symmetrical and can exhibit symmetry breaking, and offers the possibility that attractors will split or merge as some bifurcation parameter is changed [13].
In this chapter, we will systematically summarize the design method, the dynamic behavior and typical engineering applications of chaotic systems with hyperbolic sine nonlinearity.The genesis and general method of generating nthorder (n > 3) chaotic systems with hyperbolic sine nonlinearity are introduced in Section II.Some derived chaotic systems/torus-chaotic system with hyperbolic sine nonlinearity is discussed in Section III.The application such as random number generator algorithm, spread spectrum communication and image encryption schemes are introduced in Section IV. Conclusions are finally drawn in Section V.

The genesis of chaotic systems with hyperbolic sine nonlinearity
In 2011, Sprott and Munmuangsaen proposed an exponential chaotic system [14], which happens to be an example of the simplest chaotic system [15].In the same year, Sprott used common resistors, capacitors, operational amplifiers, and a diode to successfully implement this system in a circuit [16].Few years later, the simplest hyperbolic sine chaotic system is proposed [17].Compared to the exponential chaotic system, the hyperbolic sine chaotic system changed the nonlinearity from exponential function (asymmetric function) to hyperbolic sine function (symmetric function), which can exhibit symmetry breaking, and offers the possibility that attractors will split or merge as some bifurcation parameter is changed [18].
The simplest chaotic system with a hyperbolic sine is described as follows: Figure 1.
The corresponding circuit schematic diagram of Eq. ( 1).

A Collection of Papers on Chaos Theory and Its Applications
Where c is considered as the bifurcation parameter, sinh φ _ x ðÞ ¼ e φ _ x Àe Àφ _ x 2 , ρ ¼ 1:2 * 10 À6 and φ ¼ 1 0:026 , which have been chosen to facilitate circuit implementation using diodes.The corresponding circuit schematic diagram of Eq. ( 1) is shown as Figure 1.

The general equations of generating chaotic systems with hyperbolic sine nonlinearity
It is obvious that Eq. ( 1) can be written in the form with jerk equations: where fx 2 ðÞ ¼ ρ * sinh φx 2 ðÞ .Therefore, the higher order chaotic systems with hyperbolic sine nonlinearity can be generated by adding jerk cabins, which is described by: where _ x kÀ1 ¼ x k À x kÀ1 is the jerk cabin.With Eq. ( 3), we can construct nth-order (n > 3) chaotic systems with hyperbolic sine nonlinearity.
When n = 4, the equations of fourth-order chaotic systems will be: _  The corresponding circuit schematic diagram of Eq. ( 4) is shown as Figure 3.
Its numerical and actual circuit state space plot is shown as Figure 4.
When n = 5, the equations of fifth-order chaotic systems will be: The corresponding circuit schematic diagram of Eq. ( 5).

Figure 6.
Numerical and actual circuit state space plot in x 1 À x 5 plane and x 2 À x 3 plane.
Its numerical and actual circuit state space plot is shown as Figure 6.

Derived chaotic systems/torus-chaotic system with hyperbolic sine nonlinearity 3.1 Multi-nonlinearities hyperbolic sine chaotic system
One way to construct the derived chaotic systems is to add more nonlinear terms of the equations.For example, the new chaotic system can be constructed by Eq. ( 4), which is described as follows: Where ρ ¼ 1:2 * 10 À6 , φ ¼ 1 0:026 .These equations can exhibit chaotic behavior as shown in Figure 7. Numerical phase space plot of Eq. ( 6).

6
A Collection of Papers on Chaos Theory and Its Applications
Figure 10 shows the Lyapunov exponent spectrum, Kaplan-Yorke dimension spectrum and bifurcations of Eq. ( 8) as the coefficient c is varied over the range c ∈ [0.3, 2].Those figures suggest there is an interesting route leading to chaos [21].
1.When c ∈ [0.3, 0.4639], there exists a period-doubling behavior along with _ x 2 and _ x 3 subspace.However, the system shows torus behavior along with _ x 2 and _ x 3 subspace.It is like saddle point: the system is stable in one direction but unstable in the other direction.
2. When c ∈ [0.4640, 0.5574], the system exhibits two-torus-chaos behavior except for some 2-torus windows.When the parameter passed c = 0.4639 to c = 0.4640, two-torus-chaos is born by replacing the 2-torus behavior.

Engineering applications with chaotic systems with hyperbolic sine nonlinearity 4.1 Random number generator
Sensitivity to initial conditions is one of the most important property of chaotic systems.Therefore, chaotic systems are very suitable for the cryptography purpose.But before that, it should be noticed that the probability density distributions (PDD) of chaotic systems are not uniform distribution.Figure 11(a) and 11(b) are the waveform and PDD of x 4 of Eq. ( 4).It shows that PDD of the output sequences has physical characteristic.The cryptosystem with these sequences cannot resist side channel attack.
To remove physical characteristic, one can use the following de-correlation operation: In fact, Eq. ( 9) can be applied in all chaotic/torus-chaotic/hyperchaotic systems.The output sequences can pass fifteen random tests of NIST 800-22, as shown as in Table 1, which indicated the proposed method can provide high security Level.This proposed method can be used as a part of some cyber security systems such as the verification code, secure QR code and some secure communication protocols.To provide a better understanding of this scheme, the pseudo-code is provided in Table 3 The testing results of encryption and decryption are shown in Figure 14.
In this system, all the initial conditions and control parameters can be considered as secret keys.Because the basin of attraction of each initial condition is greater than 1, it could have more than 10 15 * 4 =10 60 choices via a resolution of 10 À15 , in terms of a numeric calculation.Moreover, if a range of control parameters are considered for the key space, the key space of this system would far exceed 10 90 .Such a large key space provides sufficient security against brute-force attacks.4.
The NPCR and UACI score of CT image are 99.5804% and 33.3227%.
From the above security analysis, the proposed scheme can provide high security for cryptographic applications.

Spread spectrum communication
Chaotic systems can also use for spread spectrum communication propose.Different chaos shift keying (DCSK) technology employs nonperiodic and wideband chaotic signals as carriers so as to achieve the effect of spectrum spreading in the process of digital modulation.Figure 15 shows the scheme of modulation for DCSK.
In this scheme, every bit has two time slots.The first time slot is used for transmission of a chaotic sequence for the reference signal.The second time slot is used for transmission of another chaotic sequence for the reference signal which has the same length as the first time slot.If the information bit is +1, then the information signal is exactly the same as the reference signal.If the information signal bit is À1, then the information signal is the negative of the reference signal.For bits b k , the signal at time k is: Where β is the number of sampling points.The spreading factor (SF) in the DCSK system is SF ¼ 2β .For demodulation as shown in Figure 16, the receiver calculates the correlation between the received signal r i and the signal r iÀβ , which is r i delayed by β .After a time k, the output of the correlator is: βþ1 2 kþ1 ðÞ β r i r iÀβ (11) Thus, the information bit b k can be restored by the sign of the decision variable: The obtained BER performance under additive white Gaussian noise (AWGN) channels for spreading factor 2β ¼ 200 is shown in Figure 17.From the comparison results, DCSK can have a lower BER when using this system as a carrier signal in the presence of noise.

Conclusions
In this chapter, we first described a third order chaotic system with hyperbolic sine nonlinearity, then we introduced the method to expend this chaotic system to high order chaotic systems.After that, we introduced the method to construct the derived chaotic torus-chaotic systems.Finally, we introduced some applications such as random number generator algorithm, spread spectrum communication and image encryption schemes.The contribution of this chapter is that it systematically summarizes the design method, the dynamic behavior and typical engineering application of chaotic systems with hyperbolic sine nonlinearity, which may widen the current knowledge of chaos theory and engineering applications based on chaotic systems.

Figure 2 .
Figure 2. Numerical and actual circuit state space plot in x À € x plane.

Figure 4 . 4 A
Figure 4. Numerical and actual circuit state space plot in x 2 À x 3 plane and x 3 À x 4 plane.

Figure 11 .
Figure 11.Waveform and PDD before and after de-correlation operation of x 4 of Eq. (4): (a) is the waveform of x 4 before de-correlation operation; (b) is the PDD of x 4 before de-correlation operation; (c) is the waveform of x 4 after de-correlation operation; (b) is the PDD of x 4 after de-correlation operation.

Step 3 :
Shift the pixel positions by row Step 4: Shift the pixel positions by column Step 5: Transform the pseudorandom sequence and recover the pixel values of the image via XOR

Figure 14 . 14 A
Figure 14.The testing results of encryption and decryption: (a) is the plain image of cameraman; (b) is the encrypted image of cameraman; (c) is the decrypted image of cameraman; (d) is the plain image of breast CT image; (e) is the encrypted image of breast CT image; (f) is the decrypted image of breast CT image; (g) is the plain image of thorax CT image; (h) is the encrypted image of thorax CT image; (i) is the decrypted image of thorax CT image.

Figure 17 . 16 A
Figure 17.Comparison of the bit error rate for a Chebyshev sequence and the hyperbolic sine system with DCSK.

Table 4 .
Correlation coefficients of adjacent pixels in the plain and encrypted image.