<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Energy Res.</journal-id>
<journal-title>Frontiers in Energy Research</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Energy Res.</abbrev-journal-title>
<issn pub-type="epub">2296-598X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">980863</article-id>
<article-id pub-id-type="doi">10.3389/fenrg.2022.980863</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Energy Research</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Data encryption based on 7D complex chaotic system with cubic memristor for smart grid</article-title>
<alt-title alt-title-type="left-running-head">Kou et&#xa0;al.</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fenrg.2022.980863">10.3389/fenrg.2022.980863</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Kou</surname>
<given-names>Lei</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1334469/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Huang</surname>
<given-names>Zhe</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Jiang</surname>
<given-names>Cuimei</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Zhang</surname>
<given-names>Fangfang</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Ke</surname>
<given-names>Wende</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1181497/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Wan</surname>
<given-names>Junhe</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Liu</surname>
<given-names>Hailin</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Li</surname>
<given-names>Hui</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Lu</surname>
<given-names>Jinyan</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>Qilu University of Technology (Shandong Academy of Sciences)</institution>, <addr-line>Qingdao</addr-line>, <country>China</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>Department of Mechanical and Energy Engineering</institution>, <institution>Southern University of Science and Technology</institution>, <addr-line>Shenzhen</addr-line>, <country>China</country>
</aff>
<aff id="aff3">
<sup>3</sup>
<institution>State Grid Anhui Electric Power Company Hefei Power Supply Company</institution>, <addr-line>Hefei</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1713488/overview">Dan Lu</ext-link>, Alfred University, United States</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/59362/overview">Guoliang Ye</ext-link>, Dongguan University of Technology, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1891591/overview">Jiyu Cheng</ext-link>, Shandong University, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1740813/overview">Xinmiao Ding</ext-link>, Shandong Institute of Business and Technology, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Cuimei Jiang, <email>Jiangcuimei2004@163.com</email>; Fangfang Zhang, <email>zhff4u@163.com</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Smart Grids, a section of the journal Frontiers in Energy Research</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>12</day>
<month>09</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="collection">
<year>2022</year>
</pub-date>
<volume>10</volume>
<elocation-id>980863</elocation-id>
<history>
<date date-type="received">
<day>29</day>
<month>06</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>22</day>
<month>07</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2022 Kou, Huang, Jiang, Zhang, Ke, Wan, Liu, Li and Lu.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Kou, Huang, Jiang, Zhang, Ke, Wan, Liu, Li and Lu</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>The information security has an irreplaceable position in the smart grid (SG). In order to avoid the malicious attack and ensure the information security, the cryptographic techniques are essential. This paper focuses on the encryption techniques to ensure the information security of SG. Firstly, an unusual 7-dimensional complex chaotic system (7D-CCS) combined with the cubic memristor is introduced. Besides its phase portraits, Lyapunov exponent, 0&#x2013;1 test, complexity, and bifurcation diagram are investigated. Then, with the proposed 7D-CCS, we design a data encryption algorithm to ensure the encryption security. Finally, the data and monitoring images in SG are encrypted by the designed encryption scheme. Besides, the encryption performance is given in detailed. The experimental results show that the proposed encryption scheme has quite good encryption performance. Therefore, it can ensure the information security of SG.</p>
</abstract>
<kwd-group>
<kwd>smart grid</kwd>
<kwd>chaotic system</kwd>
<kwd>data encryption</kwd>
<kwd>memristor</kwd>
<kwd>information security</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>The SG is a system based on communication and information technology in the generation, delivery, and consumption of energy power. It (<xref ref-type="bibr" rid="B2">Ferrag&#xa0;et&#xa0;al.,&#xa0;2018</xref>; <xref ref-type="bibr" rid="B8">Kimani&#xa0;et&#xa0;al.,&#xa0;2019</xref>) begins to involve application areas such as smart factory, traffic network and gas system (as shown in <xref ref-type="fig" rid="F1">Figure&#xa0;1</xref>).</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>The Block diagram of distributed power energy system.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g001.tif"/>
</fig>
<p>The SG has great openness and interconnection, and there may be some potential problems in information collection and communication. The control of all infrastructure in SG relies on the internet. Therefore, the information security and privacy preservation in the SG is extraordinarily important (<xref ref-type="bibr" rid="B11">Li&#xa0;et&#xa0;al.,&#xa0;2022a</xref>). If the SG is maliciously attacked, the fact that data loss and tampering may happen (<xref ref-type="bibr" rid="B15">Li&#xa0;et&#xa0;al.,&#xa0;2019</xref>). It will seriously affect the normal operation of the SG, which will even lead to the consequences of system instability (<xref ref-type="bibr" rid="B10">Li&#xa0;et&#xa0;al.,&#xa0;2015</xref>; <xref ref-type="bibr" rid="B14">Li&#xa0;et&#xa0;al.,&#xa0;2022d</xref>). Then the safe and smooth operation of the SG is challenging to realize. As an example, remote data acquisition systems are usually installed in SG, which can be accessed without authorization and passwords. These devices are easily attacked or controlled by illegal users. Once the infrastructure has been maliciously controlled in unsupervised situation and it may bring huge economic losses. In addition, due to the inherent uncertainty of renewable energy (<xref ref-type="bibr" rid="B12">Li&#xa0;et&#xa0;al.,&#xa0;2022b</xref>; <xref ref-type="bibr" rid="B13">Li&#xa0;et&#xa0;al.,&#xa0;2022c</xref>), the safe operation of power systems with high-penetration renewables is facing greater challenges.</p>
<p>In sharp contrast to the important position of SG, the attention to its network and information security are still insufficient, which is also the reason for the frequent occurrence of power system accidents. Therefore, in the SG, designing an encryption algorithm to achieve information security is essential.</p>
<p>Many scholars have developed numerous researchs for the information security of SG. In May 2021, on the basis of the homomorphic encryption, <xref ref-type="bibr" rid="B28">Zhao&#xa0;et&#xa0;al.&#xa0;(2021)</xref> proposed a data aggregation and realtime electricity price billing scheme to reduce the computing cost. In July 2021, <xref ref-type="bibr" rid="B20">Singh&#xa0;et&#xa0;al.&#xa0;(2021)</xref> proposed a data aggregation model on the basis of the deep learning and homomorphic encryption. In May 2021, based on the partially homomorphic encryption (PHE), <xref ref-type="bibr" rid="B23">Wu&#xa0;et&#xa0;al.&#xa0;(2021)</xref> introduced a privacy-preserving distributed optimal power flow (OPF) algorithm. In January 2022, <xref ref-type="bibr" rid="B6">Hussain&#xa0;et&#xa0;al.&#xa0;(2021)</xref> preserved the privacy of customers by the homomorphic encryption in the SG.</p>
<p>Even though academics have studied excellent approaches for the information security of SG, there yet be two issues to be handled:<list list-type="simple">
<list-item>
<p>1) The homomorphic encryption contains a certain amount of operations, which is difficulity to be implemented.</p>
</list-item>
<list-item>
<p>2) For the sake of guaranteeing the information security, there exist a heavy computation burden caused by the homomorphic encryption.</p>
</list-item>
</list>
</p>
<p>Since the mid-1990s, many scholars have found that there is a close relationship between chaotic system and cryptography. A chaotic system has a series of features, such as sensitivity to the initial value, system parameters, ergodicity, unpredictability of orbit, and good pseudo-randomness. These characteristics can just meet the requirements of encryption. Therefore, chaos has been extensively applied in numerous realms, such as chaos control (<xref ref-type="bibr" rid="B22">Tian&#xa0;et&#xa0;al.,&#xa0;2021</xref>; <xref ref-type="bibr" rid="B16">Li&#xa0;et&#xa0;al.,&#xa0;2020</xref>), chaotic spread spectrum communication (<xref ref-type="bibr" rid="B27">Yuan&#xa0;et&#xa0;al.,&#xa0;2021</xref>; <xref ref-type="bibr" rid="B24">Xiao&#xa0;et&#xa0;al.,&#xa0;2018</xref>), secure communication (<xref ref-type="bibr" rid="B29">Zhao&#xa0;et&#xa0;al.,&#xa0;2020</xref>; <xref ref-type="bibr" rid="B3">He&#xa0;et&#xa0;al.,&#xa0;2020</xref>), chaos optimization (<xref ref-type="bibr" rid="B19">Shi&#xa0;et&#xa0;al.,&#xa0;2008</xref>) and so on. Besides, the application of chaos in cryptography is not difficulity to be realized. The algorithm exhibits great performances with fast encryption speed and large key space. These advantages make the algorithm suited for encrypting a lot of data. Then it extremely simplifies the design of traditional sequence cipher. Therefore, chaos has unique superiority in the realm of encryption and broad development prospects.</p>
<p>To address the issues as mentioned above, a data encryption algorithm combined with the chaotic sequence is introduced. Then an unusual 7D-CCS with cubic memristor is put forward to create pseudo-random sequences. The 7D-CCS has complex dynamic characteristics and can generate pseudorandom sequences with high pseudorandomness. The originality and contributions of this paper are summed up as follows.<list list-type="simple">
<list-item>
<p>1) The designed algorithm only includes scrambling and diffusion operation. It is easy to be implemented.</p>
</list-item>
<list-item>
<p>2) Based on the cubic memristor, the 7D-CCS is proposed to create pseudo-random sequences with good pseudorandomness to ensure the information security. Besides, the 7D-CCS is easy to generate key sequence.</p>
</list-item>
</list>
</p>
<p>The rest of this paper is organized as follows: In <xref ref-type="sec" rid="s2">Section&#xa0;2</xref>, the features of the 7D-CCS are introduced. In <xref ref-type="sec" rid="s3">Section&#xa0;3</xref>, design an encryption scheme. Besides, it is compared with that of others by some preformance indexes. In <xref ref-type="sec" rid="s4">Section&#xa0;4</xref>, the data and monitoring images in SG are processed by the proposed encryption scheme, and the security analysis are provided. Conclusions are given in <xref ref-type="sec" rid="s5">Section&#xa0;5</xref>.</p>
</sec>
<sec id="s2">
<title>2 The 7D-CCS with cubic memristor</title>
<p>The mathematical expression (<xref ref-type="bibr" rid="B25">Yang&#xa0;et&#xa0;al.,&#xa0;2019</xref>) of cubic nonlinear memristor is<disp-formula id="e1">
<mml:math id="m1">
<mml:mi>q</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c6;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mi>&#x3c6;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>b</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mi>&#x3c6;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>b</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(1)</label>
</disp-formula>where <italic>a</italic>, <italic>b</italic> are the positive constants. <italic>&#x3c6;</italic> is an independent variable.</p>
<p>Then the derivative of memristor <italic>W</italic>(<italic>&#x3c6;</italic>) is defined by<disp-formula id="e2">
<mml:math id="m2">
<mml:mi>W</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c6;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>d</mml:mi>
<mml:mi>q</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c6;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>/</mml:mo>
<mml:mi>d</mml:mi>
<mml:mi>&#x3c6;</mml:mi>
<mml:mspace width="0.28em"/>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>3</mml:mn>
<mml:mi>b</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mi>&#x3c6;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
</mml:math>
<label>(2)</label>
</disp-formula>
</p>
<p>The real chaotic system with the cubic nonlinear memristor is given by<disp-formula id="e3">
<mml:math id="m3">
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="cases">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>x</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>d</mml:mi>
<mml:mi>x</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>W</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x3c6;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>x</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>y</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>z</mml:mi>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>r</mml:mi>
<mml:mi>z</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>y</mml:mi>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>&#x3c6;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>x</mml:mi>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(3)</label>
</disp-formula>where <italic>&#x3b1;</italic>, <italic>&#x3b2;</italic>, <italic>r</italic>, <italic>d</italic> are positive constants. <italic>x</italic>, <italic>y</italic>, <italic>z</italic> are independent variables.</p>
<p>System 3) is extended to the complex field, where <italic>x</italic> &#x3d;&#xa0;<italic>x</italic>
<sub>1</sub> &#x2b;&#xa0;<italic>jx</italic>
<sub>2</sub>, <italic>y</italic> &#x3d;&#xa0;<italic>x</italic>
<sub>3</sub> &#x2b;&#xa0;<italic>jx</italic>
<sub>4</sub>, <italic>z</italic> &#x3d;&#xa0;<italic>x</italic>
<sub>5</sub> &#x2b;&#xa0;<italic>jx</italic>
<sub>6</sub> and <italic>&#x3c6;</italic> &#x3d;&#xa0;<italic>x</italic>
<sub>7</sub>. <italic>x</italic>
<sub>
<italic>i</italic>
</sub>(<italic>i</italic> &#x3d;&#xa0;1, &#x2026;, 7) are independent variables. <italic>j</italic> is the imaginary number.</p>
<p>In system (3), the real and imaginary parts are divided. We can get:<disp-formula id="e4">
<mml:math id="m4">
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="cases">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>d</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>W</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>d</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>W</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>6</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>r</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>6</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>r</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>6</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
<p>Finally, through the chao attractor, Lyapunov exponents, bifurcation diagram, 0&#x2013;1 test, and complexity analysis, we discuss the dynamic features of the system (4).</p>
<sec id="s2-1">
<title>2.1 Chaos attractor</title>
<p>Set <italic>&#x3b1;</italic> &#x3d;&#xa0;10, <inline-formula id="inf1">
<mml:math id="m5">
<mml:mi>x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>b</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mo>&#xb1;</mml:mo>
<mml:msqrt>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>b</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>4</mml:mn>
<mml:mi>a</mml:mi>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:msqrt>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, <inline-formula id="inf2">
<mml:math id="m6">
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>100</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, <italic>r</italic> &#x3d;&#xa0;0.1, <inline-formula id="inf3">
<mml:math id="m7">
<mml:mi>d</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>9</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, <inline-formula id="inf4">
<mml:math id="m8">
<mml:mi>a</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, <inline-formula id="inf5">
<mml:math id="m9">
<mml:mi>b</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>. For initial conditions (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1), the attractor of 7D-CCS are showed in <xref ref-type="fig" rid="F2">Figure&#xa0;2</xref>.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Phase portraits of system (4), <bold>(A)</bold> <italic>x</italic>
<sub>2</sub> &#x2212;&#xa0;<italic>x</italic>
<sub>3</sub> <bold>(B)</bold> <italic>x</italic>
<sub>6</sub> &#x2212;&#xa0;<italic>x</italic>
<sub>2</sub> &#x2212;&#xa0;<italic>x</italic>
<sub>7</sub> <bold>(C)</bold> <italic>x</italic>
<sub>3</sub> &#x2212;&#xa0;<italic>x</italic>
<sub>6</sub> <bold>(D)</bold> <italic>x</italic>
<sub>4</sub> &#x2212;&#xa0;<italic>x</italic>
<sub>7</sub>.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g002.tif"/>
</fig>
<p>The Lyapunov exponent (<xref ref-type="bibr" rid="B21">Sutter&#xa0;et&#xa0;al.,&#xa0;2021</xref>), one of the numerical features, is used to recognize chaotic motion quantitatively. If the motion in this direction is stable, the value is negative. If the motion in this direction is unstable, the value is positive. If Lyapunov exponents include positive, negative values and zero, the system is chaotic. In the system (4), the Lyapunov exponents are LE1 &#x3d; 2.041, LE2 &#x3d; 0.425, LE3 &#x3d; 0.189, LE4 &#x3d; 0, LE5 &#x3d; -0.041, LE6 &#x3d; -3.355, LE7 &#x3d; -4.205. The Lyapunov exponents are showed in <xref ref-type="fig" rid="F3">Figure&#xa0;3</xref>. The Lyapunov exponent of the 7D-CCS is (&#x2b;, &#x2b;, &#x2b;, 0, -, -, -). Hence, the 7D-CCS is chaotic.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>The Lyapunov exponent curves of 7D-CCS.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g003.tif"/>
</fig>
</sec>
<sec id="s2-2">
<title>2.2 Bifurcation diagram of the 7D-CCS</title>
<p>The bifurcation diagram (<xref ref-type="bibr" rid="B17">Marszalek and Sadecki,&#xa0;2019</xref>) could distinctly show the complete process of the nonlinear system into chaos. In the bifurcation diagram, if there exist a large number of point of density caused by the infinite bifurcation, it indicates that the system is chaotic. In <xref ref-type="fig" rid="F4">Figure&#xa0;4</xref>, the bifurcation diagram of the 7D-CCS is shown. As shown in the <xref ref-type="fig" rid="F4">Figure&#xa0;4</xref>, with the change of <italic>&#x3b1;</italic>, the system continually forks among different states. Finally, the system 4) comes to a chaotic state.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>The bifurcation diagram of 7D-CCS.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g004.tif"/>
</fig>
</sec>
<sec id="s2-3">
<title>2.3 0-1 test</title>
<p>The 0&#x2013;1 test <xref ref-type="bibr" rid="B7">Karimov&#xa0;et&#xa0;al.&#xa0;(2021)</xref> is a method which directly calculate <italic>p</italic>(<italic>n</italic>) and <italic>q</italic>(<italic>n</italic>) to judge the state of nonlinear system. The 0&#x2013;1 test method is as follows:</p>
<p>Step 1: Let <italic>X</italic>(<italic>k</italic>)(<italic>k</italic> &#x3d;&#xa0;1, 2, &#x2026;, <italic>N</italic>) be a test sequence.</p>
<p>Step 2: Calculate the sequence <italic>p</italic>(<italic>n</italic>) and <italic>q</italic>(<italic>n</italic>):<disp-formula id="e5">
<mml:math id="m10">
<mml:mi>p</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:mi>X</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi mathvariant="normal">cos</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>N</mml:mi>
</mml:math>
<label>(5)</label>
</disp-formula>
<disp-formula id="e6">
<mml:math id="m11">
<mml:mi>q</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:mi>X</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi mathvariant="normal">sin</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mi>c</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:mspace width="1em"/>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>N</mml:mi>
</mml:math>
<label>(6)</label>
</disp-formula>where <italic>c</italic> &#x2208;&#xa0;(0, <italic>&#x3c0;</italic>).</p>
<p>If the trajectory diagram of <italic>p</italic>(<italic>n</italic>)-<italic>q</italic>(<italic>n</italic>) is represented by the Brownian motion, system is in a chaotic state The &#x201c;0&#x2013;1 test&#x201d; diagram of 7D-CCS is exhibited in <xref ref-type="fig" rid="F5">Figure&#xa0;5</xref>. Then the Brownian motion can be seen. Hence, the system 4) is chaotic.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>The 0&#x2013;1 test diagram of 7D-CCS.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g005.tif"/>
</fig>
</sec>
<sec id="s2-4">
<title>2.4 Complexity analysis of 7D-CCS</title>
<p>The SE (<xref ref-type="bibr" rid="B26">Yu&#xa0;et&#xa0;al.,&#xa0;2020</xref>) and <italic>C</italic>
<sub>0</sub> (<xref ref-type="bibr" rid="B1">Chen&#xa0;et&#xa0;al.,&#xa0;2020</xref>) algorithm, based on Fourier transform and wavelet transform, are spectral entropy algorithm until now. When the two parameters vary, the chromatogram is introduced to verify and analyze the complexity. The chromatogram of 7D-CCS is exhibited in <xref ref-type="fig" rid="F6">Figure&#xa0;6</xref>. The lighter the hue is, the lower the complexity is.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>The chromatogram, <bold>(A)</bold> <italic>x</italic>
<sub>1</sub> sequence chromatogram by SE algorithm <bold>(B)</bold> <italic>x</italic>
<sub>1</sub> sequence chromatogram by <italic>C</italic>
<sub>0</sub> algorithm.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g006.tif"/>
</fig>
<p>Based on these performance metrics, the nonlinear dynamic features of 7D-CCS are discussed. Set <italic>&#x3b1;</italic> &#x3d;&#xa0;10, <italic>d</italic> &#x3d;&#xa0;9/7, <italic>&#x3b2;</italic> &#x3d;&#xa0;100/7, <italic>r</italic> &#x3d;&#xa0;0.1, <italic>a</italic> &#x3d;&#xa0;1/7, and <italic>b</italic> &#x3d;&#xa0;2/7. Then the pseudo random sequences are created by the 7D-CCS. They can meet the requirements of the designed algorithm.</p>
</sec>
</sec>
<sec id="s3">
<title>3 The designed algorithm and its discussion</title>
<p>Based on the system (4), a novel data encryption algorithm is introduced. The designed algorithm is exhibited in <xref ref-type="fig" rid="F7">Figure&#xa0;7</xref>. The procedures of algorithm are as follows:</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>The image algorithm flow chart.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g007.tif"/>
</fig>
<p>Step1: The experiment environment is Intel (R) Core (TM) i5-9300H CPU at 2.40GHz, and the random-access memory (RAM) adopted is 8&#xa0;GB. The R, G and B channel are get by separating the image channel.</p>
<p>Step2: Use random function to randomly transform the position of the three primary color pixel value. Call them R1, G1 and B1.</p>
<p>Step3: Transform the position of the three primary color pixel value according to Arnold transform. Name them R2, G2 and B2. Arnold transform is as follows:<disp-formula id="e7">
<mml:math id="m12">
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mtable class="matrix">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msub>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mtable class="array">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mn>1</mml:mn>
</mml:mtd>
<mml:mtd columnalign="center">
<mml:mi>A</mml:mi>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mi>B</mml:mi>
</mml:mtd>
<mml:mtd columnalign="center">
<mml:mi>A</mml:mi>
<mml:mi>B</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mtable class="matrix">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msub>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
<mml:mspace width="0.2em"/>
<mml:mi mathvariant="normal">mod</mml:mi>
<mml:mspace width="0.2em"/>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mtable class="matrix">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mi>M</mml:mi>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mi>N</mml:mi>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mtable class="matrix">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mn>1</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mn>1</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(7)</label>
</disp-formula>where <italic>M</italic> and <italic>N</italic> are the row and column of the image matrix. The pseudo-random matrices <italic>A</italic> and <italic>B</italic> with the sizes of <italic>M</italic> &#xd7;&#xa0;<italic>N</italic> are generated from the proposed chaotic sequence. Let the coordinates of pixels in digital image be <inline-formula id="inf6">
<mml:math id="m13">
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>0,255</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:math>
</inline-formula>.</p>
<p>Step4: XOR the generated seven dimensional pseudo-random sequence with R2, G2 and B2 image seven times, and the order of XOR is random.</p>
<p>Set <italic>&#x3b1;</italic> &#x3d;&#xa0;10, <inline-formula id="inf7">
<mml:math id="m14">
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>100</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, <italic>r</italic> &#x3d;&#xa0;0.1, <inline-formula id="inf8">
<mml:math id="m15">
<mml:mi>d</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>9</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, <inline-formula id="inf9">
<mml:math id="m16">
<mml:mi>a</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, <inline-formula id="inf10">
<mml:math id="m17">
<mml:mi>b</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> in system 4, and initial condition is (0.1, 0.1, 0.1, 0.1, 0.1, 0.1, 0.1). Standardized test &#x201c;Lena&#x201d; in the size of 256 &#xd7; 256 is selected in the above algorithm. The encryption process is shown in <xref ref-type="fig" rid="F8">Figure&#xa0;8</xref>. <xref ref-type="fig" rid="F8">Figure&#xa0;8A</xref> is the standard test picture Lena, <xref ref-type="fig" rid="F8">Figure&#xa0;8B</xref> is the scrambled picture, <xref ref-type="fig" rid="F8">Figure&#xa0;8C</xref> is the encrypted picture and <xref ref-type="fig" rid="F8">Figure&#xa0;8D</xref> is the decrypted picture. <xref ref-type="fig" rid="F8">Figure&#xa0;8C</xref> conceals the characters of the original image and a malicious third party cannot be directly identified.</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption>
<p>The diagram of experimental results, <bold>(A)</bold> Standard test picture Lena <bold>(B)</bold> Scrambled picture <bold>(C)</bold> Encrypted picture <bold>(D)</bold> Decrypted picture.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g008.tif"/>
</fig>
<sec id="s3-1">
<title>3.1 Reconstruction quality analysis</title>
<p>The peak signal-to-noise ratio (<italic>PSNR</italic>) is introduced to investigate the visual quality of the reconstructed image. When the <italic>PSNR</italic> is greater than 30&#xa0;dB but less than 40&#xa0;dB, the distortion of image is small. The <italic>PSNR</italic> method is as follows:</p>
<p>Step 1: Calculate the mean square deviation (<italic>MSE</italic>):<disp-formula id="e8">
<mml:math id="m18">
<mml:mi>M</mml:mi>
<mml:mi>S</mml:mi>
<mml:mi>E</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>f</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>g</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>M</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>f</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>g</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
</mml:math>
<label>(8)</label>
</disp-formula>
</p>
<p>Step 2: Calculate <italic>PSNR</italic>:<disp-formula id="e9">
<mml:math id="m19">
<mml:mi>P</mml:mi>
<mml:mi>S</mml:mi>
<mml:mi>N</mml:mi>
<mml:mi>R</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>f</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>g</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>20</mml:mn>
<mml:mo>&#x2061;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="normal">log</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>255</mml:mn>
<mml:mo>/</mml:mo>
<mml:mi>M</mml:mi>
<mml:mi>S</mml:mi>
<mml:mi>E</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>f</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>g</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(9)</label>
</disp-formula>
</p>
<p>where <italic>f</italic>, <italic>g</italic> are the pixel values of original image and decrypted image. <italic>M</italic> and <italic>N</italic> represent the row and column of the image matrix, respectively. Calculate the <italic>PSNR</italic> between <xref ref-type="fig" rid="F8">Figure&#xa0;8A</xref> and <xref ref-type="fig" rid="F8">Figure&#xa0;8D</xref> and it is approximately 30&#xa0;dB. The distortion of <xref ref-type="fig" rid="F8">Figure&#xa0;8A</xref> and <xref ref-type="fig" rid="F8">Figure&#xa0;8A</xref> is small.</p>
<p>The structural similarity (<italic>SSIM</italic>) is another quota to estimate the similarity of two images. The formula is as follows:<disp-formula id="e10">
<mml:math id="m20">
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="cases">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mi>L</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:msub>
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mi>C</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2b;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>Y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mi>S</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mi>S</mml:mi>
<mml:mi>S</mml:mi>
<mml:mi>I</mml:mi>
<mml:mi>M</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>L</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>C</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>S</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mspace width="1em"/>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(10)</label>
</disp-formula>
</p>
<p>where <italic>u</italic>
<sub>
<italic>x</italic>
</sub> is the mean of image <italic>X</italic>. <italic>u</italic>
<sub>
<italic>y</italic>
</sub> is the mean of image <italic>Y</italic>. <italic>&#x3c3;</italic>
<sub>
<italic>X</italic>
</sub> is the variance of image <italic>X</italic>. <italic>&#x3c3;</italic>
<sub>
<italic>Y</italic>
</sub> is the variance of image <italic>Y</italic>. <italic>&#x3c3;</italic>
<sub>
<italic>XY</italic>
</sub> is the covariance of images <italic>X</italic> and <italic>Y</italic>. In order to avoid instability, when denominator is up to zero, <italic>C</italic>
<sub>1</sub> and <italic>C</italic>
<sub>2</sub> are two constants with small value. <inline-formula id="inf11">
<mml:math id="m21">
<mml:msub>
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:msub>
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:math>
</inline-formula>. <italic>L</italic>(<italic>X</italic>, <italic>Y</italic>) is the luminance, <italic>C</italic>(<italic>X</italic>, <italic>Y</italic>) denotes the contrast, <italic>S</italic>(<italic>X</italic>, <italic>Y</italic>) represents the structure.</p>
<p>The scope of <italic>SSIM</italic> is [0, 1]. When the value approaches to 1, it represents the good resemblance between the two images When the value approaches to 0, it indicates less resemblance. Calculate the <italic>SSIM</italic> between <xref ref-type="fig" rid="F8">Figure&#xa0;8A</xref> and <xref ref-type="fig" rid="F8">Figure&#xa0;8D</xref> and it is 1. The calculation results show that the structure of the <xref ref-type="fig" rid="F8">Figure&#xa0;8D</xref> is the same as that of the <xref ref-type="fig" rid="F8">Figure&#xa0;8A</xref>.</p>
</sec>
<sec id="s3-2">
<title>3.2 Correlation coefficient</title>
<p>In order to prevent the original information from being cracked through the similarity between pixels, it is very necessary to remove the correlation between adjacent pixels. Firstly, choose <italic>N</italic> pairs of pixels in the original image randomly. Then noted them as(<italic>u</italic>
<sub>
<italic>i</italic>
</sub>, <italic>v</italic>
<sub>
<italic>i</italic>
</sub>), <italic>i</italic> &#x2208;&#xa0;[1, <italic>N</italic>]. The formula of the correlation coefficient is shown as follows:<disp-formula id="e11">
<mml:math id="m22">
<mml:mi>E</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:msub>
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:math>
<label>(11)</label>
</disp-formula>
<disp-formula id="e12">
<mml:math id="m23">
<mml:mi>D</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>E</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
</mml:math>
<label>(12)</label>
</disp-formula>
<disp-formula id="e13">
<mml:math id="m24">
<mml:mi>Cov</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>u</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>E</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>E</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(13)</label>
</disp-formula>
<disp-formula id="e14">
<mml:math id="m25">
<mml:msub>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>u</mml:mi>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>Cov</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>u</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:msqrt>
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:msqrt>
<mml:mo>&#xa0;</mml:mo>
<mml:mo>&#x2217;</mml:mo>
<mml:msqrt>
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:msqrt>
</mml:mrow>
</mml:mfrac>
</mml:math>
<label>(14)</label>
</disp-formula>where <italic>E</italic> is the mean value of pixel. <italic>D</italic> is the variance of pixels. Cov is the covariance of pixels <italic>r</italic>
<sub>
<italic>uv</italic>
</sub> is the correlation coefficient.</p>
<p>In plaintext and ciphertext images, 8,000 pairs of adjacent pixel values are haphazardly choose from the horizontal, vertical and diagonal directions. The correlation coefficient between two adjacent pixels is calculated. The value of the correlation coefficient of adjacent pixels is from -1 to 1. If the value is approach to 1, the correlation is high. Correspondingly, the adjacent pixels are basically uncorrelated if the value is close to -1. From the <xref ref-type="table" rid="T1">Table&#xa0;1</xref>, we can know that the correlation coefficient of the designed algorithm is lower than that of other algorithms.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Adjacent pixels correlation comparison.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">[2&#xa0;pt] Picture</th>
<th align="center">Horizontal</th>
<th align="center">Vertical</th>
<th align="center">Diagonal</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Lena</td>
<td align="char" char=".">&#x2b;0.9817</td>
<td align="char" char=".">&#x2b;0.9603</td>
<td align="char" char=".">&#x2b;0.9483</td>
</tr>
<tr>
<td align="left">Cipher Lena (proposed method)</td>
<td align="char" char=".">&#x2212;0.0177</td>
<td align="char" char=".">&#x2212;0.0321</td>
<td align="char" char=".">&#x2212;0.0026</td>
</tr>
<tr>
<td align="left">Lena <xref ref-type="bibr" rid="B30">Zhou&#xa0;et&#xa0;al.&#xa0;(2020)</xref>
</td>
<td align="char" char=".">&#x2b;0.0083</td>
<td align="char" char=".">&#x2212;0.0054</td>
<td align="char" char=".">&#x2212;0.0010</td>
</tr>
<tr>
<td align="left">Lena <xref ref-type="bibr" rid="B4">Hosseinzadeh&#xa0;et&#xa0;al.&#xa0;(2019)</xref>
</td>
<td align="char" char=".">&#x2212;0.0003</td>
<td align="char" char=".">&#x2b;0.0012</td>
<td align="char" char=".">&#x2212;0.0017</td>
</tr>
<tr>
<td align="left">Lena <xref ref-type="bibr" rid="B18">Pak&#xa0;et&#xa0;al.&#xa0;(2019)</xref>
</td>
<td align="char" char=".">&#x2212;0.0024</td>
<td align="char" char=".">&#x2b;0.0035</td>
<td align="char" char=".">&#x2b;0.0014</td>
</tr>
<tr>
<td align="left">Lena <xref ref-type="bibr" rid="B5">Huang&#xa0;et&#xa0;al.&#xa0;(2018)</xref>
</td>
<td align="char" char=".">&#x2b;0.0010</td>
<td align="char" char=".">&#x2212;0.0031</td>
<td align="char" char=".">&#x2212;0.0008</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>It shows that the designed algorithm can almost break the correlation between pixels.</p>
</sec>
<sec id="s3-3">
<title>3.3 Histogram</title>
<p>In digital image, the distribution of each gray level can be counted by the histogram. The <xref ref-type="fig" rid="F9">Figure&#xa0;9</xref> shows that the pixel distribution of each pixel level of the three primary color matrixes. <xref ref-type="fig" rid="F9">Figure&#xa0;9A</xref>, <xref ref-type="fig" rid="F9">Figure&#xa0;9B</xref> and <xref ref-type="fig" rid="F9">Figure&#xa0;9C</xref> show fluctuates greatly, and the peak and trough values differ extremely. The frequency of some pixel values is large, while that of others is very small. After encryption, as shown in <xref ref-type="fig" rid="F9">Figures&#xa0;9D&#x2013;F</xref>, the pixel distribution of each pixel level of the three primary color matrices is relatively uniform, and the value frequency of each pixel value is basically the same, which well conceals the distribution law of the original image.</p>
<fig id="F9" position="float">
<label>FIGURE 9</label>
<caption>
<p>The histogram of &#x201c;Lena&#x201d;, <bold>(A)</bold> R channel in plain image <bold>(B)</bold> G channel in plain image <bold>(C)</bold> B channel in plain image <bold>(D)</bold> R channel in cipher image <bold>(E)</bold> G channel in cipher image <bold>(F)</bold> B channel in cipher image.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g009.tif"/>
</fig>
</sec>
<sec id="s3-4">
<title>3.4 Information entropy</title>
<p>To the pixel values, the mean uncertainty can be reflected by the information entropy. The formula is exhibited as follows:<disp-formula id="e15">
<mml:math id="m26">
<mml:mi>H</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mo>&#x2212;</mml:mo>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>255</mml:mn>
</mml:mrow>
</mml:munderover>
<mml:mi>p</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="normal">log</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mi>p</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(15)</label>
</disp-formula>where <italic>p</italic>(<italic>x</italic>
<sub>
<italic>i</italic>
</sub>) is the probability of gray value. The larger the image information entropy is (the maximum value is 8), the more equivalent the distribution of pixels is. The nonrandom distribution of image pixels indicates that the encryption effect is quite good. As shown in <xref ref-type="table" rid="T2">Table&#xa0;2</xref>, in this algorithm, compared with other algorithms, the information entropy of encrypted image is more approach to 8. We could know that the proposed method has enough ability to withstand differential attacks.</p>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>The information entropy of picture.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">[2&#xa0;pt] Picture</th>
<th align="center">Original Picture</th>
<th align="center">Encrypted Picture</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Lena</td>
<td align="char" char=".">7.4375</td>
<td align="char" char=".">7.9991</td>
</tr>
<tr>
<td align="left">Lena <xref ref-type="bibr" rid="B30">Zhou&#xa0;et&#xa0;al.&#xa0;(2020)</xref>
</td>
<td align="char" char=".">7.4375</td>
<td align="char" char=".">7.9972</td>
</tr>
<tr>
<td align="left">Lena <xref ref-type="bibr" rid="B4">Hosseinzadeh&#xa0;et&#xa0;al.&#xa0;(2019)</xref>
</td>
<td align="char" char=".">7.4375</td>
<td align="char" char=".">7.9971</td>
</tr>
<tr>
<td align="left">Lena <xref ref-type="bibr" rid="B18">Pak&#xa0;et&#xa0;al.&#xa0;(2019)</xref>
</td>
<td align="char" char=".">7.4375</td>
<td align="char" char=".">7.9972</td>
</tr>
<tr>
<td align="left">Lena <xref ref-type="bibr" rid="B9">Kumar&#xa0;Patro and Acharya,&#xa0;(2019)</xref>
</td>
<td align="char" char=".">7.4375</td>
<td align="char" char=".">7.9971</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3-5">
<title>3.5 Security key space</title>
<p>Assume the accuracy of the computer memory is 10<sup>15</sup>, then the size of the key space of each key is 10<sup>15</sup>. There are 7 variable values and 6 system parameter values in system 4) and the key space can reach <inline-formula id="inf12">
<mml:math id="m27">
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>15</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>13</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mn>1</mml:mn>
<mml:msup>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>195</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>&#x2248;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>650</mml:mn>
</mml:mrow>
</mml:msup>
</mml:math>
</inline-formula>. Hence, the key space of the designed algorithm is greatly ample. With a sufficient security level, the algorithm is able to resist differential cryptanalysis.</p>
</sec>
</sec>
<sec id="s4">
<title>4 The encryption scheme of smart grid</title>
<sec id="s4-1">
<title>4.1 The simulation of image encryption</title>
<p>In the SG, in order to confirm the operation status of the equipment, the remote data acquisition system should transmit the monitoring image to the control center. When the control center finds the equipment failure, it will shut down the equipment for maintenance.</p>
<p>However, in the remote data acquisition system, the monitoring images are easy to be obtained by illegal users because it do not need authorization and password. When the equipment is in normal operation, the illegal user transmits the monitoring image of equipment failure to the control center, resulting in the shutdown of the equipment. Then it will bring huge economic losses.</p>
<p>Therefore, in the remote data acquisition system, it is of practical significance to encrypt the monitoring image in real time, and they can be encrypted and transmitted immediately. Then the illegal user can not obtain the monitoring image.</p>
<p>The &#x201c;Picture 1&#x201d; and &#x201c;Picture 2&#x201d; transmitted in SG will be encrypted by using the above algorithm. The size of &#x201c;Picture 1&#x201d; is 660 &#xd7; 783. The size of &#x201c;Picture 2&#x2033; is 456 &#xd7; 639. The encryption process of &#x201c;Picture 1&#x201d; is exhibited in <xref ref-type="fig" rid="F10">Figure&#xa0;10</xref>. <xref ref-type="fig" rid="F10">Figure&#xa0;10A</xref> is the original &#x201c;Picture 1&#x201d;. <xref ref-type="fig" rid="F10">Figure&#xa0;10B</xref> is the scrambled &#x201c;Picture 1&#x201d;. <xref ref-type="fig" rid="F10">Figure&#xa0;10C</xref> is the encrypted &#x201c;Picture 1&#x201d;. The characters in the original image cannot be identified directly from this image and <xref ref-type="fig" rid="F10">Figure&#xa0;10D</xref> is the decrypted &#x201c;Picture 1&#x201d;.</p>
<fig id="F10" position="float">
<label>FIGURE 10</label>
<caption>
<p>The diagram of experimental results, <bold>(A)</bold> Electronic equipment Picture 1 <bold>(B)</bold> Scrambled Picture 1 <bold>(C)</bold> Encrypted Picture 1 <bold>(D)</bold> Decrypted Picture 1.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g010.tif"/>
</fig>
<p>The encryption of &#x201c;picture 2&#x201d; is similar to that of &#x201c;picture 1&#x201d;, which is shown in the <xref ref-type="fig" rid="F11">Figure&#xa0;11</xref>. <xref ref-type="fig" rid="F11">Figure&#xa0;11A</xref> is the original &#x201c;Picture 2&#x201d;. <xref ref-type="fig" rid="F11">Figure&#xa0;11B</xref> is the scrambled &#x201c;Picture 2&#x201d;. <xref ref-type="fig" rid="F11">Figure&#xa0;11C</xref> is the encrypted &#x201c;Picture 2&#x201d;. The characters in the original image cannot be identified directly from this image and <xref ref-type="fig" rid="F11">Figure&#xa0;11D</xref> is the derypted &#x201c;Picture 2&#x201d;.</p>
<fig id="F11" position="float">
<label>FIGURE 11</label>
<caption>
<p>The diagram of experimental results, <bold>(A)</bold> Electronic equipment Picture 2 <bold>(B)</bold> Scrambled Picture 2 <bold>(C)</bold> Encrypted Picture 2 <bold>(D)</bold> Decrypted Picture 2.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g011.tif"/>
</fig>
<p>Then the metrics mentioned in <xref ref-type="sec" rid="s3">Section&#xa0;3</xref> are used to analyze them.</p>
<sec id="s4-1-1">
<title>4.1.1 Histogram</title>
<p>According to the <xref ref-type="fig" rid="F12">Figure&#xa0;12</xref> and <xref ref-type="fig" rid="F13">Figure&#xa0;13</xref>, after encryption, the pixel distribution of each pixel level of the three primary color matrices is relatively uniform.</p>
<fig id="F12" position="float">
<label>FIGURE 12</label>
<caption>
<p>The histogram of the &#x201c;picture 1&#x201d;, <bold>(A)</bold> R channel in plain picture 1 <bold>(B)</bold> G channel in plain picture 1 <bold>(C)</bold> B channel in plain picture 1 <bold>(D)</bold> R channel in cipher picture 1 <bold>(E)</bold> G channel in cipher picture 1 <bold>(F)</bold> B channel in cipher picture 1.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g012.tif"/>
</fig>
<fig id="F13" position="float">
<label>FIGURE 13</label>
<caption>
<p>The histogram of the &#x201c;picture 2&#x201d;, <bold>(A)</bold> R channel in plain picture 2 <bold>(B)</bold> G channel in plain picture 2 <bold>(C)</bold> B channel in plain picture 2 <bold>(D)</bold> R channel in cipher picture 2 <bold>(E)</bold> G channel in cipher picture 2 <bold>(F)</bold> B channel in cipher picture 2</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g013.tif"/>
</fig>
</sec>
<sec id="s4-1-2">
<title>4.1.2 Correlation coefficient</title>
<p>Compare the cipher image with the original image, the adjacent pixels have almost no correlation, even negative correlation. That can be known in the <xref ref-type="table" rid="T3">Table&#xa0;3</xref>.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Adjacent pixels correlation of pictures.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">[2&#xa0;pt] Picture</th>
<th align="center">Horizontal</th>
<th align="center">Vertical</th>
<th align="center">Diagonal</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Picture 1</td>
<td align="char" char=".">&#x2b;0.9108</td>
<td align="char" char=".">&#x2b;0.9122</td>
<td align="char" char=".">&#x2b;0.8530</td>
</tr>
<tr>
<td align="left">Picture 2</td>
<td align="char" char=".">&#x2b;0.9722</td>
<td align="char" char=".">&#x2b;0.9580</td>
<td align="char" char=".">&#x2b;0.9374</td>
</tr>
<tr>
<td align="left">Cipher Picture 1</td>
<td align="char" char=".">&#x2212;0.0223</td>
<td align="char" char=".">&#x2212;0.0026</td>
<td align="char" char=".">&#x2b;0.0040</td>
</tr>
<tr>
<td align="left">Cipher Picture 2</td>
<td align="char" char=".">&#x2b;0.0084</td>
<td align="char" char=".">&#x2212;0.0205</td>
<td align="char" char=".">&#x2212;0.0014</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4-1-3">
<title>4.1.3 Information entropy</title>
<p>In the <xref ref-type="table" rid="T4">Table&#xa0;4</xref>, the information entropy is close to 8 (max is 8). The results show that encrypted images are resistant to differential cryptanalysis.</p>
<table-wrap id="T4" position="float">
<label>TABLE 4</label>
<caption>
<p>The information entropy of picture.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">[2&#xa0;pt] Picture</th>
<th align="center">Original Picture</th>
<th align="center">Encryption Picture</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Picture 1</td>
<td align="char" char=".">7.6158</td>
<td align="char" char=".">7.9999</td>
</tr>
<tr>
<td align="left">Picture 2</td>
<td align="char" char=".">7.1023</td>
<td align="char" char=".">7.9998</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4-1-4">
<title>4.1.4 Sensitivity of key</title>
<p>The initial conditions is (0.10001, 0.10001, 0.10001, 0.10001, 0.10001, 0.10001, 0.10001). In system (3), the value of system parameters remain unchanged. The cipher picture 1 and 2 are decrypted by the generated key which is in the above initial conditions. The <xref ref-type="fig" rid="F14">Figure&#xa0;14</xref> is the decryption result of the wrong key. According to the <xref ref-type="fig" rid="F14">Figure&#xa0;14</xref>, with small change of key, it cannot successfully decrypt the picture 1 and 2. We could know that the proposed algorithm has great sensitivity to the key.</p>
<fig id="F14" position="float">
<label>FIGURE 14</label>
<caption>
<p>The results of wrong key, <bold>(A)</bold> Wrong key with picture 1 <bold>(B)</bold> Wrong key with picture 2.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g014.tif"/>
</fig>
</sec>
<sec id="s4-1-5">
<title>4.1.5 Reconstructed image quality</title>
<p>According to the <xref ref-type="table" rid="T5">Table&#xa0;5</xref>, the quality loss of reconstructed images is relatively small. They are the same as the original images.</p>
<table-wrap id="T5" position="float">
<label>TABLE 5</label>
<caption>
<p>Reconstruction quality analysis.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">[2&#xa0;pt] Picture</th>
<th align="center">PSNR(dB)</th>
<th align="center">SSIM</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">
<xref ref-type="fig" rid="F11">Figures&#xa0;11A,D</xref>
</td>
<td align="char" char=".">27.49</td>
<td align="center">1</td>
</tr>
<tr>
<td align="left">
<xref ref-type="fig" rid="F12">Figures&#xa0;12A,D</xref>
</td>
<td align="char" char=".">26.89</td>
<td align="center">1</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s4-2">
<title>4.2 Data encryption</title>
<p>The dataset used to check the security of above algorithm is the temperature data in the SG. The Modbus Protocol is used to transmit temperature data. In the Modbus protocol, the data is as follows:0<italic>x</italic>13 0<italic>x</italic>04 0<italic>x</italic>00 0<italic>x</italic>00 0<italic>x</italic>00 0<italic>x</italic>01 0<italic>x</italic>32 0<italic>xB</italic>8</p>
<p>Where is 8 bytes and hexadecimal.</p>
<p>The flow chart of data encryption algorithm is shown in <xref ref-type="fig" rid="F15">Figure&#xa0;15</xref>. The steps are as follows.</p>
<fig id="F15" position="float">
<label>FIGURE 15</label>
<caption>
<p>The data algorithm flow chart.</p>
</caption>
<graphic xlink:href="fenrg-10-980863-g015.tif"/>
</fig>
<p>Step1: Use random function to randomly change the position of the temperature data. Name it Data 1.</p>
<p>Step2: Change the position of Data 1 according to Arnold transform. Name it Data 2.</p>
<p>Step3: XOR the generated seven dimensional pseudo-random sequence with Data 2 seven times, and the order of XOR is random.</p>
<p>The ciphertext data composition is as follows: 0<italic>xFC</italic> 0<italic>xCF</italic> 0<italic>xFC</italic> 0<italic>xFC</italic> 0<italic>xFC</italic> 0<italic>xFC</italic> 0<italic>xF</italic>8 0<italic>xF</italic>8 where is 8 bytes and hexadecimal.</p>
<p>After decryption, the data composition is the same as the initial data. The security of cipher text mainly depends on whether the key is random. If the key is random and variable, the security of ciphertext can be guaranteed. Next, from the NIST test to analyze the randomness of the key.</p>
<p>The NIST statistical test suit is composed of 15 statistical tests, which can detect the randomness of the sequences created by the 7D-CCS. Generally speaking, the statistical test is successful when the test result is between 0.01 and 1. Bsides, the test sequence has excellent randomness if the value is large. For simplicity, 20, 000, 000 real numbers, created by the 7D-CCS, are adopted as the test data in the NIST test. The NIST test results are shown in <xref ref-type="table" rid="T6">Table&#xa0;6</xref>, which are between 0.01 and 1. It means that the statistical tests are successful. Then it also verified that the key has quite good randomness.</p>
<table-wrap id="T6" position="float">
<label>TABLE 6</label>
<caption>
<p>NIST test.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">[2&#xa0;pt] Test category</th>
<th align="left">Value</th>
<th align="left">the test</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Approximate Entropy</td>
<td align="char" char=".">0.437274</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Block Frequency</td>
<td align="char" char=".">0.122325</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Cumulative Sums</td>
<td align="char" char=".">0.834308</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">FFT</td>
<td align="char" char=".">0.437274</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Frequency</td>
<td align="char" char=".">0.739918</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Linear Complexity</td>
<td align="char" char=".">0.213309</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Longest Run</td>
<td align="char" char=".">0.122325</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">NonOverlapping Template</td>
<td align="char" char=".">0.991468</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Overlapping Template</td>
<td align="char" char=".">0.213309</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Random Excursions</td>
<td align="char" char=".">0.964295</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Random Excurions Variant</td>
<td align="char" char=".">0.710216</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Rank</td>
<td align="char" char=".">0.122325</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Runs</td>
<td align="char" char=".">0.911413</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Serial</td>
<td align="char" char=".">0.834308</td>
<td align="left">pass</td>
</tr>
<tr>
<td align="left">Uiversal</td>
<td align="char" char=".">0.350485</td>
<td align="left">pass</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s5">
<title>5 Conclusions</title>
<p>Based on the 7D-CCS, a data process scheme is introduced. First of all, the 7D-CCS with memristor is proposed, which is derived from the real 4D chaotic system with the cubic nonlinear memristor. Secondly, the dynamic characteristics are analyzed by some performance indexs. Thirdly, the standard test image Lena is selected as encrypted object. Then compare it with others. Finally, the temperature data and monitoring images are encrypted in the verification experiments.</p>
<p>Simulations include <italic>PSNR</italic>, <italic>SSIM</italic>, histogram analysis, information entropy analysis, correlation analysis, sensitivity of key analysis, key space analysis and NIST test.</p>
<p>The experimental results indicate that the designed algorithm has excellent security performance. Therefore, the designed algorithm is suitable for SG in which the high security is required.</p>
<p>Besides, there are many tasks needed to be further studied.<list list-type="simple">
<list-item>
<p>1) At present, only the security of the designed algorithm is analyzed. The field experiments need to be carried out.</p>
</list-item>
<list-item>
<p>2) In the research of SG, the efficiency of data encryption is also critical. The encryption time should be considered in the future research work.</p>
</list-item>
</list>
</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s6">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding authors.</p>
</sec>
<sec id="s7">
<title>Author contributions</title>
<p>Conceptualization, LK and ZH; methodology, LK, ZH, and CJ; software, ZH; validation, ZH and CJ; formal analysis, FZ and ZH; investigation, HuL and HaL; resources, WK and JL; data curation, WK and JW.</p>
</sec>
<sec id="s8">
<title>Funding</title>
<p>This work is funded by Major scientific and technological innovation projects of Shandong Province (Nos. 2019JZZY010731 and 2020CXGC010901), the project of &#x201c;Youth Innovation and technology support plan&#x201d; for colleges and universities in Shandong Province (2021KJ025), International Collaborative Research Project of Qilu University of Technology (No. QLUTGJHZ2018020).</p>
</sec>
<sec sec-type="COI-statement" id="s9">
<title>Conflict of interest</title>
<p>JL is employed by the Company State Grid Anhui Electric Power Company Hefei Power Supply Company.</p>
<p>The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s10">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>He</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Pano Azucena</surname>
<given-names>A. D.</given-names>
</name>
<name>
<surname>Yousefpour</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Jahanshahi</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>L&#xf3;pez</surname>
<given-names>M. A.</given-names>
</name>
<etal/>
</person-group> (<year>2020</year>). <article-title>A multistable chaotic jerk system with coexisting and hidden attractors: Dynamical and complexity analysis, fpga-based realization, and chaos stabilization using a robust controller</article-title>. <source>Symmetry</source> <volume>12</volume>, <fpage>569</fpage>. <pub-id pub-id-type="doi">10.3390/sym12040569</pub-id> </citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ferrag</surname>
<given-names>M. A.</given-names>
</name>
<name>
<surname>Maglaras</surname>
<given-names>L. A.</given-names>
</name>
<name>
<surname>Janicke</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Shu</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>A systematic review of data protection and privacy preservation schemes for smart grid communications</article-title>. <source>Sustain. Cities Soc.</source> <volume>38</volume>, <fpage>806</fpage>&#x2013;<lpage>835</lpage>. <pub-id pub-id-type="doi">10.1016/j.scs.2017.12.041</pub-id> </citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>He</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Tang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Du</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Tian</surname>
<given-names>Y.-C.</given-names>
</name>
<name>
<surname>Qian</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Secure communication based on quantized synchronization of chaotic neural networks under an event-triggered strategy</article-title>. <source>IEEE Trans. Neural Netw. Learn. Syst.</source> <volume>31</volume>, <fpage>3334</fpage>&#x2013;<lpage>3345</lpage>. <pub-id pub-id-type="doi">10.1109/TNNLS.2019.2943548</pub-id> </citation>
</ref>
<ref id="B4">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hosseinzadeh</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Zarebnia</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Parvaz</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Hybrid image encryption algorithm based on 3d chaotic system and choquet fuzzy integral</article-title>. <source>Opt. Laser Technol.</source> <volume>120</volume>, <fpage>105698</fpage>. <pub-id pub-id-type="doi">10.1016/j.optlastec.2019.105698</pub-id> </citation>
</ref>
<ref id="B5">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Huang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Xiao</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>On symmetric color image encryption system with permutation-diffusion simultaneous operation</article-title>. <source>Opt. Lasers Eng.</source> <volume>115</volume>, <fpage>7</fpage>&#x2013;<lpage>20</lpage>. <pub-id pub-id-type="doi">10.1016/j.optlaseng.2018.11.015</pub-id> </citation>
</ref>
<ref id="B6">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Hussain</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Samara</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Ullah</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Khan</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2021</year>). &#x201c;<article-title>Encryption for end-user privacy: A cyber-secure smart energy management system</article-title>,&#x201d; in <conf-name>2021 22nd International Arab Conference on Information Technology (ACIT)</conf-name>, <fpage>1</fpage>. <pub-id pub-id-type="doi">10.1109/ACIT53391.2021.9677341</pub-id> </citation>
</ref>
<ref id="B7">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Karimov</surname>
<given-names>T. I.</given-names>
</name>
<name>
<surname>Druzhina</surname>
<given-names>O. S.</given-names>
</name>
<name>
<surname>Karimov</surname>
<given-names>A. I.</given-names>
</name>
<name>
<surname>Kolev</surname>
<given-names>G. Y.</given-names>
</name>
<name>
<surname>Butusov</surname>
<given-names>D. N.</given-names>
</name>
</person-group> (<year>2021</year>). &#x201c;<article-title>Comparison of bifurcation diagrams for numerical and analog chaotic systems</article-title>,&#x201d; in <conf-name>2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus)</conf-name>, <fpage>124</fpage>. <pub-id pub-id-type="doi">10.1109/ElConRus51938.2021.9396558</pub-id> </citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kimani</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Oduol</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Langat</surname>
<given-names>K.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Cyber security challenges for iot-based smart grid networks</article-title>. <source>Int. J. Crit. Infrastructure Prot.</source> <volume>25</volume>, <fpage>36</fpage>&#x2013;<lpage>49</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijcip.2019.01.001</pub-id> </citation>
</ref>
<ref id="B9">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kumar Patro</surname>
<given-names>K. A.</given-names>
</name>
<name>
<surname>Acharya</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>An efficient colour image encryption scheme based on 1-d chaotic maps</article-title>. <source>J. Inf. Secur. Appl.</source> <volume>46</volume>, <fpage>23</fpage>&#x2013;<lpage>41</lpage>. <pub-id pub-id-type="doi">10.1016/j.jisa.2019.02.006</pub-id> </citation>
</ref>
<ref id="B10">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Bai</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>A multifeature fusion approach for power system transient stability assessment using pmu data</article-title>. <source>Math. Problems Eng.</source>, <fpage>1</fpage>&#x2013;<lpage>10</lpage>. <pub-id pub-id-type="doi">10.1155/2015/786396</pub-id> </citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2022a</year>). <article-title>Privacy-preserving spatiotemporal scenario generation of renewable energies: A federated deep generative learning approach</article-title>. <source>IEEE Trans. Ind. Inf.</source> <volume>18</volume>, <fpage>2310</fpage>&#x2013;<lpage>2320</lpage>. <pub-id pub-id-type="doi">10.1109/TII.2021.3098259</pub-id> </citation>
</ref>
<ref id="B12">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2022b</year>). <article-title>Stochastic optimal scheduling of demand response-enabled microgrids with renewable generations: An analytical-heuristic approach</article-title>. <source>J. Clean. Prod.</source> <volume>330</volume>, <fpage>129840</fpage>. <pub-id pub-id-type="doi">10.1016/j.jclepro.2021.129840</pub-id> </citation>
</ref>
<ref id="B13">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2022c</year>). <article-title>Optimal scheduling of integrated demand response-enabled community-integrated energy systems in uncertain environments</article-title>. <source>IEEE Trans. Ind. Appl.</source> <volume>58</volume>, <fpage>2640</fpage>&#x2013;<lpage>2651</lpage>. <pub-id pub-id-type="doi">10.1109/TIA.2021.3106573</pub-id> </citation>
</ref>
<ref id="B14">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2022d</year>). <article-title>A deep-learning intelligent system incorporating data augmentation for short-term voltage stability assessment of power systems</article-title>. <source>Appl. Energy</source> <volume>308</volume>, <fpage>118347</fpage>. <pub-id pub-id-type="doi">10.1016/j.apenergy.2021.118347</pub-id> </citation>
</ref>
<ref id="B15">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Dynamic state estimation of generators under cyber attacks</article-title>. <source>IEEE Access</source> <volume>7</volume>, <fpage>125253</fpage>&#x2013;<lpage>125267</lpage>. <pub-id pub-id-type="doi">10.1109/ACCESS.2019.2939055</pub-id> </citation>
</ref>
<ref id="B16">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Yuan</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>H.-N.</given-names>
</name>
</person-group> (<year>2020</year>). &#x201c;<article-title>Fuzzy adaptive time-delay feedback controlling chaos in buck converter</article-title>,&#x201d; in <conf-name>2020 Chinese Control And Decision Conference (CCDC)</conf-name>, <fpage>4732</fpage>&#x2013;<lpage>4737</lpage>. <pub-id pub-id-type="doi">10.1109/CCDC49329.2020.9164013</pub-id> </citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Marszalek</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Sadecki</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Complex two-parameter bifurcation diagrams of a simple oscillating circuit</article-title>. <source>IEEE Trans. Circuits Syst. Ii.</source> <volume>66</volume>, <fpage>687</fpage>&#x2013;<lpage>691</lpage>. <pub-id pub-id-type="doi">10.1109/TCSII.2018.2871063</pub-id> </citation>
</ref>
<ref id="B18">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pak</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>An</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Jang</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>A novel bit-level color image encryption using improved 1d chaotic map</article-title>. <source>Multimed. Tools Appl.</source> <volume>78</volume>, <fpage>12027</fpage>&#x2013;<lpage>12042</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-018-6739-1</pub-id> </citation>
</ref>
<ref id="B19">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shi</surname>
<given-names>Z.-B.</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>bin Lan</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2008</year>). <article-title>Comparison of algorithms for an electronic nose in identifying liquors</article-title>. <source>J. Bionic Eng.</source> <volume>5</volume>, <fpage>253</fpage>&#x2013;<lpage>257</lpage>. <pub-id pub-id-type="doi">10.1016/S1672-6529(08)60032-3</pub-id> </citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Singh</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Masud</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Hossain</surname>
<given-names>M. S.</given-names>
</name>
<name>
<surname>Kaur</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid</article-title>. <source>Comput. Electr. Eng.</source> <volume>93</volume>, <fpage>107209</fpage>. <pub-id pub-id-type="doi">10.1016/j.compeleceng.2021.107209</pub-id> </citation>
</ref>
<ref id="B21">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sutter</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Fawzi</surname>
<given-names>O.</given-names>
</name>
<name>
<surname>Renner</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Bounds on lyapunov exponents via entropy accumulation</article-title>. <source>IEEE Trans. Inf. Theory</source> <volume>67</volume>, <fpage>10</fpage>&#x2013;<lpage>24</lpage>. <pub-id pub-id-type="doi">10.1109/TIT.2020.3026959</pub-id> </citation>
</ref>
<ref id="B22">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tian</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Grebogi</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Ren</surname>
<given-names>H.-P.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Chaos generation with impulse control: Application to non-chaotic systems and circuit design</article-title>. <source>IEEE Trans. Circuits Syst. I.</source> <volume>68</volume>, <fpage>3012</fpage>&#x2013;<lpage>3022</lpage>. <pub-id pub-id-type="doi">10.1109/TCSI.2021.3075550</pub-id> </citation>
</ref>
<ref id="B23">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wu</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.-J. A.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Privacy-preserving distributed optimal power flow with partially homomorphic encryption</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>12</volume>, <fpage>4506</fpage>&#x2013;<lpage>4521</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2021.3084934</pub-id> </citation>
</ref>
<ref id="B24">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Xiao</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Xuan</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2018</year>). &#x201c;<article-title>Research on an improved chaotic spread spectrum sequence</article-title>,&#x201d; in <conf-name>2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA)</conf-name>, <fpage>420</fpage>&#x2013;<lpage>423</lpage>. <pub-id pub-id-type="doi">10.1109/ICCCBDA.2018.8386553</pub-id> </citation>
</ref>
<ref id="B25">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Jia</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Fractional-order cubic nonlinear flux-controlled memristor: Theoretical analysis, numerical calculation and circuit simulation</article-title>. <source>Nonlinear Dyn.</source> <volume>97</volume>, <fpage>33</fpage>&#x2013;<lpage>44</lpage>. <pub-id pub-id-type="doi">10.1007/s11071-019-04920-y</pub-id> </citation>
</ref>
<ref id="B26">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yu</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Shi</surname>
<given-names>C.</given-names>
</name>
<etal/>
</person-group> (<year>2020</year>). <article-title>Dynamic analysis, circuit design, and synchronization of a novel 6d memristive four-wing hyperchaotic system with multiple coexisting attractors</article-title>. <source>Complexity</source>, <fpage>1</fpage>&#x2013;<lpage>17</lpage>. <pub-id pub-id-type="doi">10.1155/2020/5904607</pub-id> </citation>
</ref>
<ref id="B27">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yuan</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Enhancing the security of chaotic direct sequence spread spectrum communication through wfrft</article-title>. <source>IEEE Commun. Lett.</source> <volume>25</volume>, <fpage>2834</fpage>&#x2013;<lpage>2838</lpage>. <pub-id pub-id-type="doi">10.1109/LCOMM.2021.3096388</pub-id> </citation>
</ref>
<ref id="B28">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>An</surname>
<given-names>D.</given-names>
</name>
</person-group> (<year>2021</year>). &#x201c;<article-title>A data aggregation and real-time electricity billing scheme based on homomorphic encryption in smart grid</article-title>,&#x201d; in <conf-name>2021 33rd Chinese Control and Decision Conference (CCDC)</conf-name>, <fpage>2545</fpage>&#x2013;<lpage>2550</lpage>. <pub-id pub-id-type="doi">10.1109/CCDC52312.2021.9601443</pub-id> </citation>
</ref>
<ref id="B29">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Su</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Observer-based synchronization of chaotic systems satisfying incremental quadratic constraints and its application in secure communication</article-title>. <source>IEEE Trans. Syst. Man. Cybern. Syst.</source> <volume>50</volume>, <fpage>5221</fpage>&#x2013;<lpage>5232</lpage>. <pub-id pub-id-type="doi">10.1109/TSMC.2018.2868482</pub-id> </citation>
</ref>
<ref id="B30">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>N.-R.</given-names>
</name>
<name>
<surname>Gong</surname>
<given-names>L.-H.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Fast color image encryption scheme based on 3d orthogonal Latin squares and matching matrix</article-title>. <source>Opt. Laser Technol.</source> <volume>131</volume>, <fpage>106437</fpage>. <pub-id pub-id-type="doi">10.1016/j.optlastec.2020.106437</pub-id> </citation>
</ref>
</ref-list>
</back>
</article>