Scientific Reports (Jun 2024)

A comprehensive study of the novel 4D hyperchaotic system with self-exited multistability and application in the voice encryption

  • Khaled Benkouider,
  • Aceng Sambas,
  • Talal Bonny,
  • Wafaa Al Nassan,
  • Issam A. R. Moghrabi,
  • Ibrahim Mohammed Sulaiman,
  • Basim A. Hassan,
  • Mustafa Mamat

DOI
https://doi.org/10.1038/s41598-024-63779-1
Journal volume & issue
Vol. 14, no. 1
pp. 1 – 14

Abstract

Read online

Abstract This paper describes a novel 4-D hyperchaotic system with a high level of complexity. It can produce chaotic, hyperchaotic, periodic, and quasi-periodic behaviors by adjusting its parameters. The study showed that the new system experienced the famous dynamical property of multistability. It can exhibit different coexisting attractors for the same parameter values. Furthermore, by using Lyapunov exponents, bifurcation diagram, equilibrium points’ stability, dissipativity, and phase plots, the study was able to investigate the dynamical features of the proposed system. The mathematical model’s feasibility is proved by applying the corresponding electronic circuit using Multisim software. The study also reveals an interesting and special feature of the system’s offset boosting control. Therefore, the new 4D system is very desirable to use in Chaos-based applications due to its hyperchaotic behavior, multistability, offset boosting property, and easily implementable electronic circuit. Then, the study presents a voice encryption scheme that employs the characteristics of the proposed hyperchaotic system to encrypt a voice signal. The new encryption system is implemented on MATLAB (R2023) to simulate the research findings. Numerous tests are used to measure the efficiency of the developed encryption system against attacks, such as histogram analysis, percent residual deviation (PRD), signal-to-noise ratio (SNR), correlation coefficient (cc), key sensitivity, and NIST randomness test. The simulation findings show how effective our proposed encryption system is and how resilient it is to different cryptographic assaults.

Keywords