1 Introduction

As a nonlinear circuit element that describes the relationship between charge and magnetic flux, the memristor has promoted the development of various fields since it was proposed and manufactured [1, 2], such as nonlinear systems, neuromorphic computing, secure communication, and prediction classification [3,4,5,6]. In particular, because of the inherent internal state variables and excellent nonlinear characteristics, memristors instead of traditional nonlinear terms to construct nonlinear systems not only conform to the practical physical significance but also can induce more abundant dynamical behaviors [7, 8]. Specifically, utilizing nonlinear memristors to simulate the electromagnetic radiation and the neural synapse, Lin et al. [9, 10] proposed five-dimensional and eight-dimensional memristive Hopfield neural network models, which exhibit complex hyperchaotic behaviors. Then, the performance of hyperchaotic sequences was verified through image encryption experiments. Moreover, Ding et al. [11] investigated the chaotic dynamics and multi-stability phenomena of a six-dimensional memristive coupled tabu learning neuron model with electromagnetic radiation, and the randomness of the model was tested in voice encryption. However, high-dimensional models of memristive systems require expensive and complex computational resources, and the resulting hyperchaotic and chaotic behaviors often exhibit relatively low complexity. Especially when implementing these behaviors on some finite precision devices, the influence of noise and measurement errors can lead to degradation phenomena in low-complexity chaos [12,13,14], directly affecting the performance and application effects of these nonlinear systems. On the other hand, using diverse prediction techniques such as echo state networks [15], long short-term memory neural networks [16], and temporal convolutional networks [17] can accurately reproduce the evolution process of these chaotic or hyperchaotic sequences. However, this does not completely guarantee the security of chaos-based image encryption and secure communication, nor the effectiveness in chaos-based signal detection. Therefore, implementing high-complexity hyperchaotic phenomena with low-dimensional models is crucial for extending the wide application of memristive systems or maps and is also the main motivation behind this paper. Compared with continuous memristors, discrete memristors are promising to solve these significant challenges mentioned above because the discrete memristive map can produce more complex chaotic or hyperchaotic behaviors in the case of lower dimensions and has higher computational efficiency [18, 19]. Therefore, it is valuable and exciting work to construct the novel discrete memristor map and enhance the complexity of dynamical behavior.

For the above purpose, the tremendous ideal discrete memristors are proposed [20, 21], which show complex nonlinear characteristics and are also consistent with the three essential feature fingerprints of the memristor [22]. Significantly, the memristive hyperchaotic map increases the complexity of the dynamical behavior to a certain extent and produces diversified applications. It is worth noting that the memristive mapping model can generate complex hyperchaotic attractors in only two dimensions, while the continuous-time system requires at least four dimensions. Specifically, Bao et al. [23] improved the complexity of the traditional Logistic map by introducing a discrete memristor model, which shows critical stability and hyperchaotic behaviors. Lai et al. [24] constructed a two-dimensional (2-D) memristive Gaussian mapping model based on a sinusoidal memristor and generated hidden hyperchaotic attractors. Of course, the hyperchaotic attractors were also found in 2-D memristive Lozi, Hénon, and Tent maps, which have high randomness [5, 25,26,27,28]. Among them, a general 2-D memristive mapping model based on a cosinusoidal memristor was proposed in [5], which could enhance complexity and also achieve amplitude-controlled characteristics. In particular, there are also relevant reports on enhancing the complexity of maps utilizing nonlinear transformation [29,30,31], in which the map based on sinusoidal and logarithmic transformation can show more complex dynamical behavior. To our knowledge, the above memristive maps are generated by coupling a discrete memristor and a traditional map. In a nutshell, whether the map composed of only discrete memristors has excellent dynamical performance and how to enhance its complexity is a problem worthy of further consideration and a new research hotspot.

Very recently, the universal 2-D single-memristor hyperchaotic map was proposed in [32], and the hyperchaotic behaviors and coexisting multi-stability phenomena were found in four specific maps. Based on [32], by introducing two identical discrete memristors, a 3-D parallel dual-memristor hyperchaotic map was constructed in [33], and the extreme multi-stability related to the initial conditions was studied. Similarly, some high-dimensional memristive mapping models were proposed by cascade, parallel, and composite operations and applied to pseudo-random number generators (PRNGs) in [34]. Although the memristive maps presented in [33, 34] can produce hyperchaotic behaviors, the dimension is higher and does not show the novel amplitude-controlled and offset-boosted dynamical behaviors described in [5, 29, 32, 35], that is, the flexibility is low. It can also be found that these maps rarely consider the coupling between two different types of discrete memristors, and the hyperchaotic dynamical behavior has not been enhanced and applied in image encryption. In general, it is significant to develop hyperchaotic maps with simple algebraic structures by composing different discrete memristors. Similarly, enhancing the complexity and flexibility of these maps will make outstanding contributions to improving the practical value of engineering applications based on hyperchaos.

Driven by the problems mentioned above, a novel 2-D hybrid dual-memristor (HDM) hyperchaotic map with excellent complexity is proposed in this paper, which connects two different discrete memristors in parallel through self-feedback and sinusoidal transformation as in [31]. The innovation and main contributions of this paper are summarized as follows. (1) A novel 2-D HDM hyperchaotic mapping model with line invariant points is proposed, which is very different from the model in [33]. The highlight is that the mapping model takes into account two different discrete memristors and can enrich the dynamical behavior and enhance the complexity. (2) The complicated bifurcation mechanisms and the coexisting multi-stability of the HDM map are analyzed, and the strange attractors with different topological structures induced by parameters are disclosed. The comparison results of dynamical performance show that the hyperchaotic sequences generated by the considered map have excellent complexity enhancement characteristics, and the PRNG test results also confirm that the sequence has high randomness. (3) The switching control strategy of the HDM map is investigated, which realizes the amplitude-controlled and offset-boosted characteristics of the hyperchaotic sequences, and proves the application value of the map in image encryption experiments.

The research is divided into three parts: modeling, dynamical analysis, and two applications, as shown in the schematic diagram in Fig. 1. Specifically, Part 1 presents the modeling process, which explains the structure of the proposed HDM map with complexity enhancement. In Part 2, the dynamical analysis is introduced, including the detailed steps of stability analysis, numerical simulation, evaluation of complexity enhancement, and digital circuit experimental verification. Furthermore, the applications of hyperchaotic sequences in PRNG and image encryption are paid more attention to in Part 3.

Fig. 1
figure 1

Schematic diagram of the research in this paper

The remainder of the paper is arranged as follows. In Sect. 2, a novel 2-D HDM hyperchaotic map is proposed by combining two different memristors and sinusoidal transformation. In Sect. 3, numerical simulations reveal the bifurcation mechanism, strange attractor behavior, and coexisting multi-stability of the HDM map. In Sect. 4, the complexity enhancement characteristic of the HDM map is proved, the PRNGs are designed, and the digital circuit implementation experiments are performed. In Sect. 5, the flexible switching control for hyperchaotic sequences is investigated and applied to image encryption. Finally, Sect. 6 concludes the paper.

2 The 2-D hybrid dual-memristor hyperchaotic mapping model

This section proposes a 2-D HDM hyperchaotic mapping strategy based on sinusoidal transformation and establishes its simplified mathematical model. At the same time, we analyze in detail the stability of the invariant points that depend on parameters and initial conditions.

2.1 Description of discrete memristor

Due to the unique nonlinearity and iterative mechanism, discrete memristors play an essential role in constructing hyperchaotic maps. The continuous memristor can be converted into a discrete memristor by the forward Euler method [20] and the backward differential theory [21]. Therefore, an ideal charge-controlled discrete memristor model can be described by

$$ \left\{ {\begin{array}{*{20}c} {v_{n} = M\left( {q_{n} } \right)i_{n} ,} \\ {q_{{n + 1}} = i_{n} + hq_{n} ,} \\ \end{array} } \right. $$
(1)

where \(v_{n}\), \(i_{n}\), and \(q_{n}\) are the n-th iteration values of voltage \(v\left( t \right)\), current \(i\left( t \right)\), and charge \(q\left( t \right)\) in the continuous memristor; \(q_{n + 1}\) is the (\(n + 1\))-th iteration value and \(h\) represents the iteration step size, usually set to 1. Specifically, since the 2-D HDM hyperchaotic map has different discrete memristor models, according to [32], two types of DM models can be established by

$$ {\left\{ {\begin{array}{*{20}l} {v_{n} = \left( {q_{n}^{2} - a} \right)i_{n} ,} \hfill \\ {q_{{n + 1}} = i_{n} + q_{n} ,} \hfill \\ \end{array} } \right.} $$
(2)

and

$$ \left\{ {\begin{array}{*{20}l} {v_{n} = \left( {\left| {q_{n} } \right| - b} \right)i_{n} ,} \hfill \\ {q_{{n + 1}} = i_{n} + q_{n} ,} \hfill \\ \end{array} } \right. $$
(3)

wherein the model described in Eq. (2) is called a quadratic discrete memristor (QDM), while Eq. (3) represents an absolute discrete memristor (ADM). As can be seen from Eqs. (2) and (3), the quadratic and absolute functions represent the nonlinear characteristics of discrete memristors, and the change of their internal state \(q_{n}\) makes them have a special memory effect. To demonstrate the essential characteristic fingerprints of the two discrete memristors, \(a = b = 1\) is fixed, and the discrete bipolar periodic signal \(I = 0.1\sin \left( {\omega n} \right)\) A is chosen as the current excitation, where \(\omega\) is the angular frequency (rad/s) and \(n\) represents the n-th iteration. When the initial condition of two discrete memristors is \(q_{0} = 0\) C, the output characteristics on the \(i_{n} - v_{n}\) plane present a hysteresis loop across the origin and the lobe area shown in Fig. 2a and c gradually decreases as \(\omega\) increases. Surprisingly, when \(\omega\) is set to 0.03 rad/s, multiple types of pinch hysteresis loops induced by different initial conditions are shown in Fig. 2b and d, which also confirm that the two discrete memristors are multi-stable.

Fig. 2
figure 2

Pinch hysteresis loops of two discrete memristors with \(I = 0.1\sin \left( {\omega n} \right)\) A. a Characteristics of QDM varying with \(\omega\) for \(q_{0} = 0\) C. b Multi-stable characteristics of QDM varying with \(q_{0}\) for \(\omega = 0.03\) rad/s. c Characteristics of ADM varying with \(\omega\) for \(q_{0} = 0\) C. d Multi-stable characteristics of ADM varying with \(q_{0}\) for \(\omega = 0.03\) rad/s

2.2 Complexity enhancement strategy and mathematical model of HDM map

To enhance the complexity of the existing dual-memristor maps, a general complexity enhancement strategy based on sinusoidal transformation is proposed, and a novel HDM hyperchaotic mapping model containing two different discrete memristors is constructed. Inspired by [31], the general novel complexity enhancement structure of the dual-memristor map is shown in Fig. 3.

Fig. 3
figure 3

General novel complexity enhancement structure of the dual-memristor map

In Fig. 3, two different charge-controlled discrete memristors are coupled in parallel and have the same input \(x_{n}\). Significantly, the memristance \(M_{1} \left( {q_{n} } \right)\) and \(M_{2} \left( {q_{n} } \right)\) are enhanced by the sinusoidal transformation, which makes the model and the generated hyperchaotic sequence more complex. Then, the enhanced signal is converted into the output iteration value \(x_{n + 1}\) by the sum function, which is fed back to the input port to perform the next iteration. Therefore, according to Fig. 3, a general novel HDM hyperchaotic mapping model with complexity enhancement can be modeled by

$$ \left\{ \begin{gathered} x_{n + 1} = k_{1} \sin \left( {M_{1} \left( {q_{n} } \right)x_{n} } \right) + k_{2} \sin \left( {M_{2} \left( {q_{n} } \right)x_{n} } \right), \hfill \\ q_{n + 1} = x_{n} + q_{n} , \hfill \\ \end{gathered} \right. $$
(4)

where \(k_{1}\) and \(k_{2}\) are the coupled coefficients. In fact, the HDM mapping model should be three-dimensional, but because the change of charge \(q_{n}\) in the ideal discrete memristors is described by the same algebraic structure as shown in Eqs. (2) and (3), to make the model simpler and improve computational efficiency, Eq. (4) considers that the change of charge \(q_{n}\) is the same, which can also exhibit intricate dynamical behaviors. It is worth explaining that the HDM mapping model is suitable for coupling any two types of discrete memristors.

After substituting QDM and ADM represented by Eqs. (2) and (3) into Eq. (4), respectively, a specific HDM mapping model can be derived as

$$ \left\{ \begin{gathered} x_{n + 1} = k_{1} \sin \left( {\left( {q_{n}^{2} - a} \right)x_{n} } \right) + k_{2} \sin \left( {\left( {\left| {q_{n} } \right| - b} \right)x_{n} } \right), \hfill \\ q_{n + 1} = x_{n} + q_{n} . \hfill \\ \end{gathered} \right. $$
(5)

When Eq. (5) is modulated by coupling strengths (\(k_{1}\) and \(k_{2}\)) and memristor parameters (\(a\) and \(b\)), it can exhibit abundant dynamical behaviors and generate more complex hyperchaos sequences.

2.3 Line invariant point and its stability analysis

For nonlinear discrete maps, the linear analysis method based on small perturbation is often used to explore the stability of invariant points. Assume that the invariant point of the HDM mapping model (5) is \(S = \left( {x_{eq} ,q_{eq} } \right)\) and when small perturbations \(\Delta x_{n} = x_{n} - x_{eq}\) and \(\Delta q_{n} = q_{n} - q_{eq}\) are added to \(S\), respectively, Eq. (5) can be converted into

$$ \left\{ \begin{gathered} x_{eq} + \Delta x_{n + 1} = F_{1} \left( {x_{eq} + \Delta x_{n} ,q_{eq} + \Delta q_{n} } \right), \hfill \\ q_{eq} + \Delta q_{n + 1} = F_{2} \left( {x_{eq} + \Delta x_{n} ,q_{eq} + \Delta q_{n} } \right), \hfill \\ \end{gathered} \right. $$
(6)

where \(F_{1} \left( \cdot \right)\) and \(F_{2} \left( \cdot \right)\) are the right-hand expressions of Eq. (5). When the trajectory is zoomed into an infinitely small area near \(S\), the nonlinear interaction can be ignored, and Eq. (6) can be approximated linearly by

$$ \left[ \begin{gathered} x_{eq} + \Delta x_{n + 1} \hfill \\ q_{eq} + \Delta q_{n + 1} \hfill \\ \end{gathered} \right] \approx \left[ \begin{gathered} F_{1} \left( {x_{eq} } \right) \hfill \\ F_{2} \left( {q_{eq} } \right) \hfill \\ \end{gathered} \right] + \left[ {\begin{array}{*{20}c} \begin{gathered} \frac{{\partial F_{1} }}{{\partial x_{n} }} \hfill \\ \frac{{\partial F_{2} }}{{\partial x_{n} }} \hfill \\ \end{gathered} & \begin{gathered} \frac{{\partial F_{1} }}{{\partial q_{n} }} \hfill \\ \frac{{\partial F_{2} }}{{\partial q_{n} }} \hfill \\ \end{gathered} \\ \end{array} } \right]\left| {_{\begin{subarray}{l} x_{n} = x_{eq} \\ q_{n} = q_{eq} \end{subarray} } } \right.\left[ \begin{gathered} \Delta x_{n} \hfill \\ \Delta q_{n} \hfill \\ \end{gathered} \right]. $$
(7)

Because \(x_{eq} = F_{1} \left( {x_{eq} } \right)\) and \(q_{eq} = F_{2} \left( {q_{eq} } \right)\), Eq. (7) is equivalent to

$$ \left[ \begin{gathered} \Delta x_{n + 1} \hfill \\ \Delta q_{n + 1} \hfill \\ \end{gathered} \right] \approx J_{S} \left[ \begin{gathered} \Delta x_{n} \hfill \\ \Delta q_{n} \hfill \\ \end{gathered} \right] = \left[ {\begin{array}{*{20}c} \begin{gathered} \frac{{\partial F_{1} }}{{\partial x_{n} }} \hfill \\ \frac{{\partial F_{2} }}{{\partial x_{n} }} \hfill \\ \end{gathered} & \begin{gathered} \frac{{\partial F_{1} }}{{\partial q_{n} }} \hfill \\ \frac{{\partial F_{2} }}{{\partial q_{n} }} \hfill \\ \end{gathered} \\ \end{array} } \right]\left| {_{\begin{subarray}{l} x_{n} = x_{eq} \\ q_{n} = q_{eq} \end{subarray} } } \right.\left[ \begin{gathered} \Delta x_{n} \hfill \\ \Delta q_{n} \hfill \\ \end{gathered} \right], $$
(8)

where \(J_{S}\) is the Jacobian matrix of \(S\). Therefore, the stability of the HDM map is related to small perturbations and can be judged by the eigenvalues of the characteristic equation of \(J_{S}\). Specifically, \(S = \left( {0,\eta } \right)\) can be calculated from Eq. (5), which indicates that the HDM map has an infinite number of line invariant points. Meanwhile, the expression of \(J_{S}\) at \(S = \left( {0,\eta } \right)\) can also be obtained by

$$ J_{S} = \left[ {\begin{array}{*{20}c} k_{1} \left( {\eta^{2} - a} \right) + k_{2} \left( {\left| \eta \right| - b} \right) \hfill & 1 \hfill \\ 1 \hfill & 1 \end{array} } \right] . $$
(9)

The corresponding characteristic polynomial can be derived as

$$ {\text{det}}\left( {\lambda I - J_{S} } \right) = \left( {\lambda - 1} \right)\left( {\lambda - \left( {k_{1} \left( {\eta^{2} - a} \right) + k_{2} \left( {\left| \eta \right| - b} \right)} \right)} \right). $$
(10)

Therefore, the eigenvalue of \(J_{S}\) can be solved as

$$ \lambda_{1} = 1, \, \lambda_{2} = k_{1} \left( {\eta^{2} - a} \right) + k_{2} \left( {\left| \eta \right| - b} \right). $$
(11)

According to the stability theory of discrete systems [36], since \(\left| {\lambda_{1} } \right| = 1\) is constant, \(S\) can only be unstable (\(\left| {\lambda_{2} } \right| > 1\)) and Lyapunov stable (\(\left| {\lambda_{2} } \right| \le 1\)), that is, critically stable. For initial condition-dependent stability, because \(\eta\) in Eq. (11) is separable, the stability region of \(S\) can be determined by \(\eta\), and it should be noted that the parameters used for analysis are greater than 0. Let \(\Delta_{1} = k_{2}^{2} + 4k_{1} \left( {ak_{1} + bk_{2} + 1} \right)\) and \(\Delta_{2} = k_{2}^{2} + 4k_{1} \left( {ak_{1} + bk_{2} - 1} \right)\), when \(S\) is Lyapunov stable, \(\eta\) need to meet

$$ \left\{ \begin{gathered} \eta \in \left[ {\begin{array}{*{20}c} {\frac{{k_{2} - \sqrt {\Delta_{1} } }}{{2k_{1} }}} & {\frac{{ - k_{2} + \sqrt {\Delta_{1} } }}{{2k_{1} }}} \\ \end{array} } \right]{\text{, for }}ak_{1} + bk_{2} \le 1 \hfill \\ \eta \in \left[ {\begin{array}{*{20}c} {\frac{{k_{2} - \sqrt {\Delta_{1} } }}{{2k_{1} }}} & {\frac{{k_{2} - \sqrt {\Delta_{2} } }}{{2k_{1} }}} \\ \end{array} } \right] \cup \left[ {\begin{array}{*{20}c} {\frac{{ - k_{2} + \sqrt {\Delta_{2} } }}{{2k_{1} }}} & {\frac{{ - k_{2} + \sqrt {\Delta_{1} } }}{{2k_{1} }}} \\ \end{array} } \right]{\text{. for }}ak_{1} + bk_{2} > 1 \hfill \\ \end{gathered} \right. $$
(12)

Otherwise, \(S\) is unstable.

For parameters-dependent stability, when \(\eta = 0.1\), \(a = 1\), and \(b = 1\) are fixed, \(\left| {\lambda_{2} } \right|\) corresponding to each parameter set (\(k_{1}\), \(k_{2}\)) can be calculated according to Eq. (11) by setting \(k_{1} \in \left[ {{1:0}{\text{.005:2}}{.5}} \right]\) and \(k_{2} \in \left[ {{ - 1:0}{\text{.005:1}}} \right]\). Therefore, the stability distribution of \(S\) related to coupling strengths is shown in Fig. 4a, where the Lyapunov stable region presents a triangular shape filled with dark gray, and the yellow region represents the unstable. Similarly, When \(k_{1} = 1.5\) and \(k_{2} = 0.8\) are fixed, \(\left| {\lambda_{2} } \right|\) corresponding to (\(a\), \(b\)) can also be obtained with \(a \in \left[ { - 5:0.02:5} \right]\) and \(b \in \left[ {{0:0}{\text{.02:10}}} \right]\). Figure 4b shows the stable distribution of \(S\) related to memristor parameters on the 2-D parameter plane and has a tilted Lyapunov stable region. As we can see, the cyan dotted line in Fig. 4 represents the boundary condition calculated by Eq. (11), which can clearly distinguish the Lyapunov stable region from the unstable region.

Fig. 4
figure 4

Stability distribution diagram of \(S\) on 2-D parameter plane for \(\eta = 0.1\). a Stability of \(S\) related to coupling strengths (\(k_{1}\) and \(k_{2}\)) for \(a = 1\) and \(b = 1\); b Stability of \(S\) related to memristor parameters (\(a\) and \(b\)) for \(k_{1} = 1.5\) and \(k_{2} = 0.8\)

In summary, the stability of the HDM mapping model (5) can be controlled by coupling strengths, memristor parameters, and initial conditions, resulting in complex dynamical behaviors in the unstable region.

3 Dynamical analysis by numerical methods

Based on the stability analysis, this section studies the coupling strength-induced and memristor parameter-induced bifurcation mechanisms, as well as the coexisting multi-stability induced by initial conditions. Various strange chaotic/hyperchaotic attractors are excavated through dynamical analysis techniques, which have high complexity. In addition, the numerical simulations are performed in MATLAB, and the total number of iterations is 25,000. To eliminate the transient effect of the state trajectories, the first 10,000 data points are discarded.

3.1 Parameter-induced complex dynamical behaviors

To distinguish various dynamical behaviors in the HDM map, the relevant bifurcation parameters are mapped to the 2-D parameter space, and the 2-D bifurcation diagram filled with different colors can be obtained by calculating the period number of the corresponding state trajectories for each set of parameters. In addition, the 2-D Lyapunov exponent (LE) spectrum can be used to confirm different dynamical behavior distributions depicted by the 2-D bifurcation diagram.

Specifically, when the memristor parameters are set to \(\left( {a,b} \right) = \left( {1,1} \right)\), the coupling strength-induced 2-D bifurcation diagram and LE spectrum on the \(k_{1} - k_{2}\) plane are given, as shown in Fig. 5, where \(k_{1} \in \left[ {1,2.5} \right]\) and \(k_{2} \in \left[ { - 1,1} \right]\). It is worth mentioning that the LE of the HDM map is calculated using the QR decomposition method [37] for each set of bifurcation parameter adjustments. The identification of chaotic and hyperchaotic behaviors is accomplished by accurately counting the number of positive LEs. Specifically, chaos is characterized by one positive LE while hyperchaos requires at least two positive LEs. Moreover, if all LEs are non-positive, the resulting dynamical behaviors are classified as periodic and further distinguished into different periods based on the cycle number of peaks. For Fig. 5a, the hyperchaos (HC) with two positive LEs is filled with red, the chaos (CH) with one positive LE and one negative LE is filled with yellow, and the quasi-period (QP) with a zero LE is filled with magenta. In addition, for periodic oscillations with two negative LEs, the stable point (SP), the period-2 to period-8 (P02, P04, P06, and P08), and the multi-period (MP) attractors are marked by other colors, respectively. Of course, the divergence behaviors (DI) are represented by light gray. For the 2-D LE spectrum shown in Fig. 5b, the greater the LE value of the state \(x_{n}\), the darker the color, and the LE spectrum corresponds precisely to the dynamical behaviors depicted in Fig. 5a.

Fig. 5
figure 5

For \(\left( {x_{0} ,q_{0} } \right) = \left( {0.1,0.1} \right)\) and \(\left( {a,b} \right) = \left( {1,1} \right)\), the coupling strength-induced dynamical behaviors on the \(k_{1} - k_{2}\) plane with \(k_{1} \in \left[ {1,2.5} \right]\) and \(k_{2} \in \left[ { - 1,1} \right]\). a 2-D bifurcation diagram; b 2-D LE spectrum

For \(\left( {k_{1} ,k_{2} } \right) = \left( {1.5,0.8} \right)\), the memristor parameter-induced bifurcation behaviors are visualized in Fig. 6, where \(a \in \left[ { - 5,5} \right]\) and \(b \in \left[ {0,10} \right]\). Similarly, ten dynamical behaviors appear in the 2-D bifurcation diagram shown in Fig. 6a and are labeled with the same colors as Fig. 6a. Of course, Fig. 6b indicates that the 2-D LE spectrum also accurately matches the 2-D bifurcation diagram. Figures 5 and 6 disclose that coupling strengths and memristor parameters can affect the HDM mapping model (5) to generate diverse dynamical behaviors. It should be noted that the stability distribution of Figs. 5 and 6 is slightly different from that of Fig. 4, which is caused by \(\left| {\lambda_{1} } \right| = 1\) and further illustrates the diversified dynamical evolutions of the map.

Fig. 6
figure 6

For \(\left( {x_{0} ,q_{0} } \right) = \left( {0.1,0.1} \right)\) and \(\left( {k_{1} ,k_{2} } \right) = \left( {1.5,0.8} \right)\), the memristor parameter-induced dynamical behaviors on the \(a - b\) plane with \(a \in \left[ { - 5,5} \right]\) and \(b \in \left[ {0,10} \right]\). a 2-D bifurcation diagram; b 2-D LE spectrum

3.2 Bifurcation mechanisms and strange attractor

The evolution process of different dynamical behaviors can be characterized in detail by the 1-D bifurcation diagram and LE spectrum controlled by the coupling strengths and memristor parameters, from which various strange attractors with different topological structures can be captured. For the sake of convenience, the dynamical behaviors driven by \(k_{1}\), \(k_{2}\), \(a\), and \(b\) are defined as Case 1 with \(\left( {k_{1} ,k_{2} ,a,b} \right) = \left( {k_{1} ,0.1,1,1} \right)\), Case 2 with \(\left( {k_{1} ,k_{2} ,a,b} \right) = \left( {1,k_{2} ,1,1} \right)\), Case 3 with \(\left( {k_{1} ,k_{2} ,a,b} \right) = \left( {1.5,0.8,a,4} \right)\), and Case 4 with \(\left( {k_{1} ,k_{2} ,a,b} \right) = \left( {1.5,0.8,0.2,b} \right)\), respectively. Therefore, Fig. 7 reveals different bifurcation mechanisms of four cases, and Fig. 8 visualizes the typical strange attractors.

Fig. 7
figure 7

1-D bifurcation diagram and LE spectrum corresponding to the four cases with \(\left( {x_{0} ,q_{0} } \right) = \left( {0.1,0.1} \right)\). a Case 1 with \(\left( {k_{1} ,k_{2} ,a,b} \right) = \left( {k_{1} ,0.1,1,1} \right)\); b Case 2 with \(\left( {k_{1} ,k_{2} ,a,b} \right) = \left( {1,k_{2} ,1,1} \right)\); c Case 3 with \(\left( {k_{1} ,k_{2} ,a,b} \right) = \left( {1.5,0.8,a,4} \right)\); d Case 4 with \(\left( {k_{1} ,k_{2} ,a,b} \right) = \left( {1.5,0.8,0.2,b} \right)\)

Fig. 8
figure 8

Visualization of strange attractors with different topologies for \(\left( {x_{0} ,q_{0} } \right) = \left( {0.1,0.1} \right)\). a Case 1 with \(k_{1} = 2.05, \, 2, \, 1.85, \, 1.8,{\text{ and }}1.7\); b Case 2 with \(k_{2} = 1.43, \, 1.35, \, 1.23, \, 1.1,{\text{ and }}1\); c Case 3 with \(a = 1.7, \, 1.2, \, 0.7, \, 0.6,{\text{ and }} - 0.2\); d Case 4 with \(b = 5, \, 3.4, \, 3.2, \, 2.7,{\text{ and }}2.6\)

For Case 1, when the bifurcation interval of the control parameter \(k_{1}\) is set to \(k_{1} \in \left[ {1.5,2.1} \right]\), the bifurcation diagram of the HDM map and the corresponding LEs are shown in Fig. 7a. As \(k_{2}\) increases, the state trajectory (\(x\), \(q\)) first switches from period-2 bifurcation for \(k_{1} \in \left[ {1.5,1.65} \right]\) to a quasi-periodic bifurcation with zero LE for \(k_{1} \in \left[ {1.65,1.78} \right]\), then from period-4 bifurcation for \(k_{1} \in \left[ {1.78,1.87} \right]\) to a hyperchaotic domain with two positive LEs for \(k_{1} \in \left[ {1.87,2.05} \right]\) via a narrower period-8 bifurcation, and finally degenerates into a stable point attractor. Meanwhile, the above-mentioned dynamical behaviors can be verified by comparing the bifurcation diagram at the top and LE at the bottom in Fig. 7a. In addition, several typical parameter-driven hyperchaotic (\(k_{1} = 2.05\) and \(k_{1} = 2\)), period-4 (\(k_{1} = 1.85\)), period-8 (\(k_{1} = 1.8\)), and quasi-periodic (\(k_{1} = 1.7\)) attractors with different topological structures are visualized by the phase diagram in Fig. 8a1–a5.

For Case 2, when the bifurcation parameter \(k_{2}\) is set to \(k_{2} \in \left[ {0.6,1.5} \right]\), the bifurcation diagram and LE spectrum varying with \(k_{2}\) are shown at the top and bottom of Fig. 7b. It can be seen from Fig. 7b that the trajectory transits from period-2 to quasi-periodic bifurcation at \(k_{2} = 0.92\) and enters period-4 bifurcation at \(k_{2} = 1.07\). Furthermore, the considered map also contains a small chaotic domain for \(k_{2} \in \left[ {1.21,1.23} \right]\), and the hyperchaotic domain with a narrow periodic window is located in \(k_{2} \in \left[ {1.23,1.31} \right] \cup \left[ {1.33,1.44} \right]\). Meanwhile, typical strange attractors with different shapes representing different bifurcation stages are also measured from Fig. 8b1–b5.

For Case 3, as the memristor parameter \(a\) increases in \(a \in \left[ { - 1.8,1.8} \right]\), it can be seen that when \(a \in \left[ { - 0.44, - 0.2} \right] \cup \left[ {1.51,1.8} \right]\) and \(a \in \left[ { - 0.2,0.6} \right] \cup \left[ {0.66,1.51} \right]\), the HDM map can generate more complex chaotic and hyperchaotic behaviors in an extensive range, respectively, and their first LE value is larger than the first two cases, as shown in Fig. 7c. Of course, various periodic behaviors are distributed in \(a \in \left[ { - 1.8, - 0.44} \right] \cup \left[ {0.6,0.66} \right]\). According to Fig. 7c, several strange attractors induced by \(a\) are shown in Fig. 8c1–c5, such as spiral hyperchaotic (\(a = 1.2\)), period-5 (\(a = 0.7\)), and symmetric chaotic attractors (\(a = - 0.2\)) with two segments.

For Case 4, Fig. 7d shows the bifurcation diagram and LE spectrum related to the memristor parameter \(b\) with \(b \in \left[ {2,5.3} \right]\). When \(b \in \left[ {3.24,3.36} \right] \cup \left[ {3.51,4.38} \right] \cup \left[ {4.44,5.21} \right]\), the HDM map is leading to hyperchaos because both LEs are positive, and chaos appears in \(b \in \left[ {2.96,3.24} \right] \cup \left[ {3.36,3.51} \right]\) with only one positive LE. Unlike Case 3, with the change of \(b\), period-6 behavior occurs for the first time and is located in \(b \in \left[ {2.28,2.62} \right]\). Similarly, symmetric hyperchaotic (\(b = 5\)), chaotic with hollow (\(b = 3.4\) and \(b = 3.2\)), quasi-periodic (\(b = 2.7\)), and period-6 (\(b = 2.6\)) attractors are depicted in Fig. 8d1–d5.

As a result, compared with Fig. 7, the HDM map has larger chaotic and hyperchaotic intervals driven by \(a\) and \(b\), and the maximum LE exceeds 0.5, which is almost not achieved in the related memristive maps. At the same time, slight variations in parameters can induce complex bifurcation behaviors and strange attractors with different topologies, which also indicate that the control parameters affect the HDM map to generate abundant dynamical behaviors, as shown in Fig. 8.

3.3 Local basin of attraction and coexisting multi-stability

Another novel dynamical behavior is coexisting multi-stability that can be reflected by the local basin of attraction induced by the initial conditions. Since the Lyapunov stable and unstable regions of the HDM map.are related to the initial condition \(q_{0}\) according to Eqs. (11) and (12), the 3-D local basins of attraction labeled can be obtained by calculating the periodic number and LEs for four cases, as shown in Fig. 9. Then, the initial conditions (\(x_{0} \in \left[ { - 2,2} \right]\) and \(q_{0} \in \left[ { - 2,2} \right]\)) are taken as the x-axis and y-axis, while the parameters (\(k_{1} \in \left[ {1.7,2} \right]\) for Case 1, \(k_{2} \in \left[ {1.2,1.5} \right]\) for Case 2, \(a \in \left[ { - 0.5,1.5} \right]\) for Case 3, and \(b \in \left[ {3,5} \right]\) for Case 4) represent the z-axis. From the z-axis direction in Fig. 9, the color distribution intervals are approximately consistent with the dynamical behavior distribution intervals of four cases depicted in Fig. 7, so the HDM map has strong robustness to changes in initial conditions. However, the \(x_{0} - q_{0}\) planes of Fig. 9 corresponding to each \(k_{1}\), \(k_{2}\), \(a\), and \(b\) show different dynamical distributions, that is, the significantly different basins of attraction, indicating that the HDM map is multi-stable.

Fig. 9
figure 9

3-D local basins of attractor for four cases with \(x_{0} \in \left[ { - 2,2} \right]\) and \(q_{0} \in \left[ { - 2,2} \right]\). a \(k_{1} \in \left[ {1.7,2} \right]\) for Case 1 on the \(x_{0} - q_{0} - k_{1}\) plane; b \(k_{2} \in \left[ {1.2,1.5} \right]\) for Case 2 on the \(x_{0} - q_{0} - k_{2}\) plane; c \(a \in \left[ { - 0.5,1.5} \right]\) for Case 3 on the \(x_{0} - q_{0} - a\) plane; d \(b \in \left[ {3,5} \right]\) for Case 4 on the \(x_{0} - q_{0} - b\) plane

To reveal the essence of coexisting multi-stability and the robust performance of hyperchaotic/chaotic sequences, considering Case 4 as a representative, two central symmetric local basins of attraction are shown in Fig. 10 by selecting two sections in Fig. 9d. When \(b = 5\) is fixed for Case 4, Fig. 10a shows the coexisting bi-stability of periodic points marked in blue and hyperchaotic behaviors marked in red on the \(x_{0} - q_{0}\) plane. However, for \(b = 3.4\), the bi-stability phenomenon in Fig. 10b is different from that of \(b = 5\), because the HDM map exhibits yellow-labeled chaos and periodic points. Since most regions on the \(x_{0} - q_{0}\) plane are attractive to hyperchaos and chaos and there is no unbounded phenomenon, the HDM map shows strong robustness and ergodicity for initial conditions.

Fig. 10
figure 10

2-D local basins of attractor for Case 4 with \(x_{0} \in \left[ { - 2,2} \right]\) and \(q_{0} \in \left[ { - 2,2} \right]\). a \(b = 5\); b \(b = 3.4\)

Since Sect. 2.3 indicates theoretically that the stability of the HDM map depends on \(q_{0}\), the bifurcation diagram driven by \(q_{0}\) with \(x_{0} = 0.1\) is reflected in Fig. 11. The bifurcation interval of the point attractors in Fig. 11a is \(q_{0} \in \left[ { - 1.75, - 1.35} \right] \cup \left[ {1.24,1.46} \right]\), and the remaining parameter domains represent hyperchaotic behavior with two positive LEs. In addition, when \(b\) changes to 3.4, the point attractors are distributed in \(q_{0} \in \left[ { - 1.55, - 1.03} \right] \cup \left[ {0.93,1.22} \right]\), and the remaining parameter domains represent chaotic attractors with a positive LE, as shown in Fig. 11b. As depicted in Fig. 11, the bifurcation intervals occupied by chaos and hyperchaos are wide, and their LE values are uniformly distributed, proving the strong robustness of chaos and hyperchaos. However, the theoretically calculated Lyapunov stable domains are \(q_{0} \in \left[ { - 1.6319, - 1.2404} \right] \cup \left[ {1.2404,1.6319} \right]\) for \(b = 5\) and \(q_{0} \in \left[ { - 1.3920, - 0.9240} \right] \cup \left[ {0.9240,1.3920} \right]\) for \(b = 3.4\), respectively, which are slightly different from the parameter domain of the stability point. The reason is also that the Lyapunov stability defined by \(\left| {\lambda_{1} } \right| = 1\) is a critical stable state. The above analysis manifests that the HDM map has extremely complicated coexisting multi-stability phenomena, and the generated chaos and hyperchaos are robust to changes in initial conditions.

Fig. 11
figure 11

Bifurcation diagram driven by \(q_{0}\) with \(x_{0} = 0.1\). a \(b = 5\); b \(b = 3.4\)

4 Complexity enhancement analysis and PRNG test

This section analyzes the complexity of strange attractors generated by the HDM map from a quantitative perspective, and the complexity enhancement performance of hyperchaotic sequences is comprehensively compared. In addition, pseudo-random number generators (PRNGs) are designed and tested to verify the high randomness of hyperchaotic sequences.

4.1 Dynamical performance analysis of strange attractors

It can be seen from Sect. 3.2 that the qualitative analysis reveals the complex evolution mechanism of strange attractors, but a variety of dynamical performance indicators can quantitatively measure the performance of attractors, which is the key to complexity analysis. Therefore, for the HDM map, comprehensive dynamical performance indicators of typical strange attractors in four cases, such as LE, spectral entropy (SE), permutation entropy (PE), sample entropy (SampE), information entropy (IE), C0 complexity (C0), and correlation dimension (CorDim), are calculated and summarized in Table 1. Please note that to obtain reliable conclusions, the iteration step size of the numerical simulation in this section is set to 110,000, and the first 10,000 data points are discarded.

Table 1 Dynamical performance indicators of typical strange attractors in four cases

According to the analysis for Table 1, the hyperchaotic attractors induced by four parameters have two positive LEs, which are larger than those of chaotic and periodic attractors, indicating that the hyperchaotic sequences have more complicated characteristics. Meanwhile, the normalized SE shows that hyperchaotic attractors are more similar to random signals than chaotic and periodic attractors, especially 0.9333 and 0.9494 for \(a = 1.2\) and \(b = 5\), respectively. In particular, in the comparisons of PE, SampE, and C0, it can also be found that all the hyperchaotic attractors, especially when \(a = 1.2\) in Case 3, have superior dynamical performance. However, IE values of hyperchaotic and chaotic attractors are closer to 8, representing more information, that is, the higher the uncertainty. Finally, by comparing the CorDim value, it can be concluded that the fractal characteristics of hyperchaotic/chaotic attractors are more complex than the periodic behaviors. Therefore, the greater the dynamical performance indicators of the strange attractors, the higher the randomness of the corresponding time series and the more complicated the oscillation form.

Although the four hyperchaotic attractors in Table 1 have excellent dynamical performance, their structures and iterative sequences are different, as shown in Fig. 12. Importantly, to test and verify that the proposed map has complexity enhancement characteristics, it is necessary to evaluate the hyperchaotic attractors comprehensively. Therefore, the average value of the eight performance indicators is defined as \(Q\) and described by

$$ Q = \frac{{\text{LE1 + LE2 + SE + PE + SampE + IE + C0 + CorDim}}}{8} .$$
(13)
Fig. 12
figure 12

Phase points and iterative sequences of hyperchaotic attractors generated by the HDM map for four cases. (a1, b1) \(k_{1} = 2\) for Case 1; (a2, b2) \(k_{2} = 1.43\) for Case 2; (a3, b3) \(a = 1.2\) for Case 3; (a4, b4) \(b = 5\) for Case 4

According to the comprehensive evaluation of the \(Q\) value in Table 1, the hyperchaotic attractor corresponding to \(a = 1.2\) in Case 3 depicted in Fig. 12a3 and b3 has better dynamical performance than other hyperchaotic attractors and is worth further comparison and application. It is worth mentioning that the distribution of \(Q\) values in the \(k_{1} - k_{2}\) and \(a - b\) parameter plane corresponds exactly to the dynamical distributions depicted in Figs. 5 and 6, which can be explained by the \(Q\)-value spectrum shown in Fig. 13. Specifically, under the inducement of adjustable parameters, as the periodic behavior switches to more complex hyperchaotic behavior, the \(Q\) values increase and approach yellow color, indicating an increase in the complexity of strange attractors. Consequently, the \(Q\)-value spectrum can reflect the dynamical performance of strange attractors, which is beneficial for exploring various high-performance hyperchaotic attractors.

Fig. 13
figure 13

\(Q\)-value spectrum shown on the 2-D parameter plane with \(\left( {x_{0} ,q_{0} } \right) = \left( {0.1,0.1} \right)\). a For \(\left( {a,b} \right) = \left( {1,1} \right)\), \(k_{1} \in \left[ {1,2.5} \right]\) and \(k_{2} \in \left[ { - 1,1} \right]\); b For \(\left( {k_{1} ,k_{2} } \right) = \left( {1.5,0.8} \right)\), \(a \in \left[ { - 5,5} \right]\) and \(b \in \left[ {0,10} \right]\)

4.2 Complexity enhancement of hyperchaotic sequences

To emphasize the complexity enhancement of the proposed HDM map, the comparisons and analyses of the dynamical performance indicators between the excellent hyperchaotic sequence corresponding to \(a = 1.2\) in Case 3 and other chaotic/hyperchaotic sequences generated by multiple maps are performed. The maps used for comparisons are the MTM map [5], STB map [31], QDM map [32], Bao’s map1 [33], Bao’s map2 [33], Lai’s map [38], NDMH map [39], Hénon map [40], and Lozi map [41]. At the same time, each map is set as the optimal parameters to ensure the fairness of the results, and comprehensive dynamical performance indicators are summarized in Table 2.

Table 2 Dynamical performance indicators of different maps

According to the indicators in Table 2, except for LE2, the hyperchaotic attractor generated by the proposed map exhibits the best dynamical performance, especially the values of LE1, PE, and CorDim. Specifically, compared with the QDM and NDMH maps constructed by only a single discrete memristor, the HDM map considering two discrete memristors can significantly promote the dynamical complexity. Particularly important is that the 3-D Bao’s map1 and Bao’s map2 are also constructed by two identical memristors, while the proposed HDM map is 2-D and contains two different memristors. However, the proposed map can generate more fascinating hyperchaotic sequences and enhance the complexity of Bao’s map1 and Bao’s map2 by the sinusoidal transformation in the case of lower dimension, which is of great significance and value. In addition, it can be seen from Table 2 that the complexity enhancement performance of the HDM map is more satisfactory than that of the STB map and Lai’s map, which also use sinusoidal transformation. By coupling the discrete memristor and the traditional map, the MTM map can generate good hyperchaotic sequences, but its complexity is lower than that of the proposed map, which can be evaluated by the values of \(Q\). Finally, two traditional maps can only generate chaotic attractors with one positive LE and one negative LE. In contrast, the proposed map can generate two positive LEs, and the value of LE1 is the largest.

Ultimately, compared with the maps using different construction methods, the hyperchaotic sequence generated by the HDM map has the characteristics of complexity enhancement, which can be widely applied in chaos-based engineering fields, such as secure communication and image encryption.

4.3 Design and test of PRNGs

Hyperchaos is often applied to image encryption and other fields as the pseudo-random number (PRN), so the design of PRNG and the randomness test of PRN are critical. Therefore, this section mainly studies the application performance of the HDM map in PRNG by the NIST SP800-22 suite.

Taking Case 3 and Case 4 as examples, two hyperchaotic sequences with superior dynamical performance are defined as \(X_{Case3} = \left\{ {x\left( 1 \right),x\left( 2 \right), \cdots x\left( n \right), \cdots } \right\}\) with \(a = 1.2\) and \(X_{Case4} = \left\{ {x\left( 1 \right),x\left( 2 \right), \cdots x\left( n \right), \cdots } \right\}\) with \(b = 5\). When each \(x\left( n \right)\) in \(X_{{Case{3}}}\) and \(X_{{Case{4}}}\) is converted to a 52-bit binary stream \(x_{B} \left( n \right)\) according to the IEEE 754 binary floating point number standard, by selecting the 37th to 44th bits in the mantissa of \(x_{B} \left( n \right)\), two PRNGs can be constructed as

$$ \left\{ \begin{gathered} P_{Case3} \left( i \right) = x_{B} \left( i \right)_{37:44} , \hfill \\ P_{Case4} \left( i \right) = x_{B} \left( i \right)_{37:44} . \hfill \\ \end{gathered} \right. $$
(14)

Therefore, each PRNG in Eq. (14) can generate an 8-bit binary PRN related to the original hyperchaotic sequence in an iteration process. At this time, 120 sets of PRN test samples can be obtained through 14,999,999 iterations, and the sample length is 106. Finally, with the help of NIST SP800-22 containing 15 test items, a strict randomness test experiment is performed, and the randomness of the PRNGs is measured according to the \(P\) value (\(P - value_{T}\)) and the pass rate. When \(P - value_{T} \ge 0.0001\), PRN is uniformly distributed [42]. In addition, for PRNs with a sample size of 120, when the significance level is set to \(\alpha = 0.01\), the minimum PRN pass rate can be calculated as 0.9628 by

$$ \hat{p} \pm 3\sqrt {\frac{{\hat{p}\left( {1 - \hat{p}} \right)}}{120}}, $$
(15)

where \(\hat{p} = 1 - \alpha\). Therefore, the test results of PRNs generated by two PRNGs are counted in Table 3, where the subtest with an asterisk represents the average value. Since the corresponding \(P - value_{T}\) and pass rate of PRNGs for Case3 and Case4 are greater than 0.0001 and 0.9628, respectively, it is demonstrated that the PRNs have passed the strict randomness test. In a word, PRNG tests show that hyperchaotic sequences generated by the HDM map have high randomness and application prospects.

Table 3 NIST SP800-22 test results for two PRNGs

4.4 Digital circuit experimental verification

It is well known that digital circuits play an important role in map-based engineering [5, 24]. To verify various strange attractors presented in the numerical methods, especially the hyperchaotic attractors, it is essential to develop a digital circuit experimental platform for the HDM map. The proposed digital circuit experimental platform consists of a high-performance STM32F407ZGT6 development board with a 32-bit ARM Cortex-M4 processor, 168 MHz main frequency, 1024 KB embedded Flash and 192 KB embedded SRAM functions, a dual-channel 16-bit DAC8563 module for digital-to-analog conversion, a high-precision oscilloscope YOKOGAWA DL850E, and some peripheral circuits, as shown in Fig. 14. According to the HDM model (5) and the relevant parameters we are concerned with in Fig. 8, an iterative program based on C language is written and executed in the microcontroller to generate the corresponding digital signals. Subsequently, the digital signals corresponding to the state variables are converted into analog voltages through the DAC8563 module and accurately captured by the scopecorder. It is worth noting that the range of the two channels of the DAC8563 is specified as − 10 V to 10 V, and at the same time, it is decomposed into 2 V/div in the oscilloscope, so that the voltage values corresponding to each channel can be obtained directly.

Fig. 14
figure 14

A microcontroller-based digital circuit experimental platform for the HDM map

Through the digital circuit implementations of the HDM map under different parameters, abundant and accurate experimental results are displayed in Fig. 15. By comparing the strange attractors depicted in Figs. 15 and 8, it clearly turns out that the developed microcontroller-based digital circuit platform for the HDM map can accurately reproduce the results of the numerical methods. That is to say, the effectiveness of the numerical results and the practicability of the HDM map are manifested.

Fig. 15
figure 15

Verification results of the microcontroller-based digital circuit platform for the HDM map with \(\left( {x_{0} ,q_{0} } \right) = \left( {0.1,0.1} \right)\). a Case 1 with \(k_{1} = 2.05, \, 2, \, 1.85, \, 1.8,{\text{ and }}1.7\); b Case 2 with \(k_{2} = 1.43, \, 1.35, \, 1.23, \, 1.1,{\text{ and }}1\); c Case 3 with \(a = 1.7, \, 1.2, \, 0.7, \, 0.6,{\text{ and }} - 0.2\); d Case 4 with \(b = 5, \, 3.4, \, 3.2, \, 2.7,{\text{ and }}2.6\)

5 Flexible switching control and application in image encryption

To promote the flexibility and verify the practical application value of the proposed map, this section mainly studies the flexible switching control of the HDM map and the application of the hyperchaotic sequence after switching control in image encryption.

5.1 Flexible switching control of hyperchaotic sequences

In addition to complexity enhancement and randomness, the flexibility of hyperchaotic sequences cannot be ignored for practical engineering applications. Although some memristive discrete maps with sinusoidal or cosinusoidal memductance can achieve non-destructively offset-boosted switching, the flexibility is not high due to the lack of amplitude-controlled characteristics. Inspired by [35], the variable substitution is used to make the HDM map have both offset-boosted and amplitude-controlled characteristics. Assuming that the amplitude-controlled factors are \(\alpha\) and \(\beta\), and the offset-boosted factors are \(\gamma\) and \(\delta\), the flexible switching control of the HDM map can be realized after setting \(x_{n} = \alpha \tilde{x}_{n} + \gamma\) and \(q_{n} = \beta \tilde{q}_{n} + \delta\), where \(\tilde{x}_{n}\) and \(\tilde{q}_{n}\) are the switched sequences. Therefore, the HDM map can be transformed into

$$ \left\{ \begin{gathered} \alpha \tilde{x}_{n + 1} = k_{1} \sin \left( {\left( {\left( {\beta \tilde{q}_{n} + \delta } \right)^{2} - a} \right)\left( {\alpha \tilde{x}_{n} + \gamma } \right)} \right) \\ + k_{2} \sin \left( {\left( {\left| {\beta \tilde{q}_{n} + \delta } \right| - b} \right)\left( {\alpha \tilde{x}_{n} + \gamma } \right)} \right) - \gamma , \\ \beta \tilde{q}_{n + 1} = \beta \tilde{q}_{n} + \alpha \tilde{x}_{n} + \gamma . \\ \end{gathered} \right. $$
(16)

For \(\left( {\beta ,\gamma ,\delta } \right) = \left( {1,0,0} \right)\) and \(\left( {\alpha ,\beta ,\delta } \right) = \left( {1,1,0} \right)\), taking the hyperchaotic sequence \(x\) corresponding to \(a = 1.2\) in Case 3 as an example, according to Eq. (16), the amplitude-controlled characteristics related to \(\alpha\) and the offset-boosted characteristics related to \(\gamma\) are depicted in Fig. 16. As shown in Fig. 16a1, as \(\alpha\) increases, the amplitude of the iteration sequence \(\tilde{x}\) decreases proportionally, and the corresponding phase point on the \(\tilde{x} - \tilde{q}\) plane in Fig. 16a2 shrinks along the x-axis, which demonstrates that \(\alpha\) can control the amplitude of \(\tilde{x}\) arbitrarily. However, as \(\gamma\) varies, since the hyperchaotic sequence \(\tilde{x}\) and the phase points depicted in Fig. 16b1 and b2 are switched with offset fixed to 5 and the \(\tilde{x}\) keeps the amplitude difference unchanged, the offset-boosted characteristics related to \(\gamma\) are verified. When the control parameters are set to \(\alpha \in \left[ {1,5} \right]\) and \(\gamma \in \left[ { - 10,10} \right]\), respectively, the magenta bifurcation points in Fig. 16a3 and b3 display a shrinking and tilting trend, respectively, while that of the state \(\tilde{q}\) depicted by the brown bifurcation points is not affected. That further indicates that flexible and independent switching control can be achieved by adjusting \(\alpha\) and \(\gamma\). It is emphasized that Fig. 16a4 and b4 reveals the influence mechanism of control factors on dynamical performance. Except for the slight change of the C0 value, other dynamical performance indicators show a stable fluctuating straight line, indicating that the switching control hardly changes the incomparable dynamical performance of the original hyperchaotic sequences.

Fig. 16
figure 16

Performance of flexible switching control for the HDM map. (a1-a4) For \(\left( {\beta ,\gamma ,\delta } \right) = \left( {1,0,0} \right)\), the amplitude-controlled characteristics related to \(\alpha\); (b1-b4) For \(\left( {\alpha ,\beta ,\delta } \right) = \left( {1,1,0} \right)\), the offset-boosted characteristics related to \(\gamma\)

It should be noted that the flexible switching control for \(\tilde{q}\) can be executed via \(\beta\) and \(\delta\), which can yield the same conclusions. Therefore, through switching control, the hyperchaos sequences generated by the HDM map have high flexibility and can be flexibly applied to various engineering fields without changing the dynamical performance.

5.2 Application in image encryption

Since the hyperchaotic sequence generated by the HDM map has high complexity, randomness, and flexibility, it can be used as a pseudo-random sequence to enhance the security of image encryption. This section proposes an image encryption scheme based on the HDM map, and the experimental results are discussed in detail.

5.2.1 Image encryption scheme design

Considering the lack of a diffusion process in [9, 10], a novel encryption strategy is introduced in detail, which mainly includes plain image input, hyperchaotic sequence generator, permutation, hybrid diffusion, substitution, and cipher image output processes, as shown in Fig. 17. Please note that the encryption process will be illustrated using the encryption of a color image as an example.

  1. (1)

    Plain image input: Input a plain color image \(P\) with size \(M \times N \times 3\), and decompose it into three pixel matrices of red \(P_{R}\), green \(P_{G}\), and blue \(P_{B}\) with size \(M \times N\). Next, \(P_{R}\) is taken as a representative to illustrate the rest of the encryption process.

  2. (2)

    Hyperchaotic sequence generator: Generate key sequences to encrypt the plain image \(P\). By switching control based on the HDM map, the security of image encryption is enhanced because the control factors (\(\alpha\), \(\beta\), \(\gamma\) and \(\delta\)) enlarge the secret key space and can generate hyperchaotic key sequences with arbitrary amplitude and offset. Therefore, after \(M \times N\) iterations, the hyperchaotic sequence generator can output three different pseudo-random key sequences (\(K_{1}\), \(K_{2}\) and \(K_{3}\)), which are described as

    $$ \left\{ \begin{gathered} K_{1} = x, \hfill \\ K_{2} = \bmod \left( {floor\left( {\left( {\left( {x + q} \right)/2} \right) \times 10^{15} } \right),256} \right), \hfill \\ K_{3} = \bmod \left( {floor\left( {x \times 10^{15} } \right),256} \right), \hfill \\ \end{gathered} \right. $$
    (17)

    where \(\bmod \left( {x,256} \right)\) represents the remainder of \(x\) dividing by 256, while \(floor\left( x \right)\) is the nearest integer less than or equal to \(x\).

    Fig. 17
    figure 17

    Schematic diagram of the proposed image encryption scheme

  3. (3)

    Permutation: To reduce the correlation of pixels, \(P_{R}\) is converted into a row vector with size \(1 \times L\), and permutated according to the index of \(K_{1}\) in ascending order. The process is described as

    $$ P_{R}^{1} \left( {1,j} \right) = P_{R} \left( {index\left( {K_{1} \left( {1,j} \right)} \right)} \right), $$
    (18)

    where \(j = 1,2, \ldots ,L\) and \(L = M \times N\).

  4. (4)

    Hybrid diffusion: A hybrid diffusion scheme including forward, row-column association, and backward diffusions is designed and only needs to perform one round. If the diffused pixel matrices are defined as \(P_{R}^{2}\), \(P_{R}^{3}\) and \(P_{R}^{4}\), respectively, the forward diffusion process is implemented by

    $$ \left\{ \begin{gathered} P_{R}^{2} \left( {1,1} \right) = \bmod \left( {P_{R}^{1} \left( {1,1} \right) + K_{2} \left( 1 \right),256} \right), \hfill \\ P_{R}^{2} \left( {1,j} \right) = \bmod \left( {P_{R}^{2} \left( {1,j - 1} \right) + P_{R}^{1} \left( {1,j} \right) + K_{2} \left( j \right),256} \right), \hfill \\ \end{gathered} \right. $$
    (19)

    where \(j = 2,3, \ldots ,L\). In the row-column association diffusion process, the diffused pixel is the sum of the pixel values of adjacent rows, columns, and itself. At this time, \(P_{R}^{2}\) is transformed into a matrix with size \(M \times N\), then the process is described as

    $$ \left\{ \begin{gathered} P_{R}^{3} \left( {1,1} \right) = \bmod \left( {P_{R}^{2} \left( {1,1} \right) + P_{R}^{2} \left( {1,N} \right) + P_{R}^{2} \left( {M,1} \right),256} \right), \, i = j = 1; \hfill \\ P_{R}^{3} \left( {i,1} \right) = \bmod \left( {P_{R}^{2} \left( {i,1} \right) + P_{R}^{3} \left( {i - 1,1} \right) + P_{R}^{2} \left( {i,N} \right),256} \right), \, i \ge 2; \hfill \\ P_{R}^{3} \left( {1,j} \right) = \bmod \left( {P_{R}^{2} \left( {1,j} \right) + P_{R}^{3} \left( {1,j - 1} \right) + P_{R}^{2} \left( {M,j} \right),256} \right), \, j \ge 2; \hfill \\ P_{R}^{3} \left( {i,j} \right) = \bmod \left( {P_{R}^{2} \left( {i,j} \right) + P_{R}^{3} \left( {i - 1,1} \right) + P_{R}^{3} \left( {1,j - 1} \right),256} \right), \, i \ge 2{\text{ and }}j \ge 2. \hfill \\ \end{gathered} \right. $$
    (20)

    Similar to forward diffusion, converting \(P_{R}^{3}\) to a row vector with size \(1 \times L\), the backward diffusion process is expressed as

    $$ \left\{ \begin{gathered} P_{R}^{4} \left( {1,L} \right) = \bmod \left( {P_{R}^{3} \left( {1,L} \right) + K_{2} \left( L \right),256} \right), \hfill \\ P_{R}^{4} \left( {1,j} \right) = \bmod \left( {P_{R}^{4} \left( {1,j + 1} \right) + P_{R}^{3} \left( {1,j} \right) + K_{2} \left( j \right),256} \right), \hfill \\ \end{gathered} \right. $$
    (21)

    where \(j = L - 1,L - 2, \ldots ,1\).

  5. (5)

    Substitution: An XOR operation is used in this process, described as

    $$ P_{R}^{5} \left( {1,j} \right) = P_{R}^{4} \left( {1,j} \right) \oplus K_{3} \left( j \right), $$
    (22)

    where \(j = 1,2, \ldots ,L\).

  6. (6)

    Cipher image output: The final cipher image \(C\) can be obtained by reorganizing the encrypted \(P_{R}^{5}\), \(P_{B}^{5}\), and \(P_{C}^{5}\) into an image with size \(M \times N \times 3\), and the corresponding decryption process is the reverse operation of the encryption process.

5.2.2 Experimental result analysis

To evaluate the performance of the encryption strategy, six different typical color plain images with size \(512 \times 512\), named Lena, Peppers, Mandrill, Airplane, House, and Sailboat, are used for encryption experiments, as shown in Fig. 18. It is important to note that the typical test case images possess strong representativeness and ensure that the proposed encryption strategy performs well across a wide range of image categories, thereby increasing its generality and applicability. Additionally, these intentionally selected images have varying levels of complexity and features, which effectively test the robustness and reliability of the strategy. Notably, all these images are sourced from publicly available datasets [43], and the proposed encryption strategy has received widespread recognition in relevant fields for its effectiveness in encrypting these images. To comprehensively verify the effect of the encryption method, it is necessary to conduct encryption experiments in some non-typical test case images. Therefore, six non-typical grayscale images with different sizes are also considered, including Lung, Bird, and Moon Surface with a size of \(256 \times 256\), and Brain, Bridge, and Fingerprint with a size of \(512 \times 512\), as shown in Fig. 19. Firstly, the secret key is set to \(\left( {k_{1} ,k_{2} ,a,b,x_{0} ,q_{0} ,\alpha ,\beta ,\gamma ,\delta } \right) = \left( {1.5,0.8,1.2,4,0.1,0.1,1.5, - 1.5,0.2, - 0.2} \right)\) and the key space can be calculated as \(10^{15 + 16 + 15 + 15 + 17 + 16 + 15 + 15 + 16 + 16} = 10^{146} \approx 2^{485} \gg 2^{100}\) according to the key sensitivity analysis. Then, to display the effectiveness of the encryption strategy, the analyses of the histogram, pixel correlation, information entropy, differential attacks, data loss and noise attack are considered.

Fig. 18
figure 18

Encryption results of six different typical color plain images. a Plain images; b Histogram of plain images; c Cipher images; d Histogram of cipher images

Fig. 19
figure 19

Encryption results of six different non-typical grayscale plain images. a Plain images; b Histogram of plain images; c Cipher images; d Histogram of cipher images

  1. (1)

    Histogram analysis: The frequency of pixel values can be counted by the histogram, representing the distribution of image information. The histogram of the six typical color plain images genuinely reflects the statistical characteristics of the pixel values in the red, green, and blue channels, as shown in Fig. 18b. However, the encrypted cipher images depicted in Fig. 18c present a chaotic and complex phenomenon, which effectively hides all the valuable information of the plain images. At the same time, Fig. 18d shows that the pixel values corresponding to the cipher images are uniformly distributed. In addition, for the non-typical grayscale images with different sizes and categories given in Fig. 19a, the proposed encryption strategy can effectively change the distribution characteristics of the pixel values of the plain images in Fig. 19b and obtain the relatively stable pixel values displayed in Fig. 19d, indicating that the encryption strategy also has high applicability to non-typical images. Therefore, based on the difference between the plain images and the cipher images in Figs. 18 and 19, it is demonstrated that the proposed strategy can effectively encrypt the plain image and resist statistical attacks.

  2. (2)

    Correlation analysis: The correlation between adjacent pixels is often measured by the correlation coefficient \(\rho_{xy}\) in the horizontal, vertical, and diagonal directions. When two adjacent pixel values are \(x\) and \(y\), respectively, according to [44], \(\rho_{xy}\) can be expressed as

    $$ \rho_{xy} = \frac{{\sum\limits_{i = 1}^{N} {\left( {x\left( i \right) - E\left( x \right)} \right)\left( {y\left( i \right) - E\left( y \right)} \right)} }}{{\sqrt {\sum\limits_{i = 1}^{N} {\left( {x\left( i \right) - E\left( x \right)} \right)^{2} } } \sqrt {\sum\limits_{i = 1}^{N} {\left( {y\left( i \right) - E\left( y \right)} \right)^{2} } } }}, $$
    (23)

    where \(E\left( x \right)\) and \(E\left( y \right)\) are the average of the \(N\) pixel values \(x\left( i \right)\) and \(y\left( i \right)\). To evaluate the correlation of images, 20,000 pixel pairs are used, and the calculation results are summarized in Table 4. Please note that in the statistical results of encryption performance for six different non-typical grayscale plain images listed in Table 5, \(\rho_{xy}\) is calculated as the average of the correlation coefficients in the horizontal, vertical, and diagonal directions. It can be concluded that the \(\rho_{xy}\) of plain images is close to 1, while the \(\rho_{xy}\) of encrypted cipher images is close to 0, which shows that the correlation of plain images can be significantly reduced. Therefore, the proposed scheme can resist correlation attacks and strengthen the security of plain images.

Table 4 Statistical results of correlation analysis for six typical images
Table 5 Statistical results of encryption performance for six non-typical grayscale plain images
  1. (3)

    Information entropy analysis: The useful information in the image can be measured by information entropy, and the greater the information entropy, the higher the degree of confusion and randomness of the image. A standard method for calculating information entropy can be expressed as

    $$ H\left( x \right) = - \sum\limits_{i = 0}^{255} {p\left( {x_{i} } \right)\log_{2} p\left( {x_{i} } \right)}, $$
    (24)

    where \(p\left( {x_{i} } \right)\) represents the probability of the pixel value \(x_{i}\). For an encrypted image with high randomness due to \(p\left( {x_{i} } \right) = 1/256\), the ideal information entropy is 8. Therefore, the information entropy of six typical color and six non-typical grayscale cipher images is listed in Tables 5 and 6, respectively. Since the values of the information entropy are all very close to 8, it is proved that the cipher images have high randomness, and the encryption strategy can effectively improve the security of plain images.

  2. (4)

    Differential attack analysis: Since the differential attack on the cipher image may restore the plain image, the number of pixel change rate (NPCR) and the unified average changed intensity (UACI) are commonly used to measure the ability of the encryption strategy to resist differential attacks. According to [45], the ideal NPCR and UACI are 99.6094% and 33.4635%, respectively. In order to obtain statistically significant results and increase credibility, 150 encryption experiments are performed by randomly adding 1 to a pixel of the typical and non-typical cipher images, and the average values of NPCR and UACI are shown in Tables 5 and 6. The statistical results show that the NPCR and UACI of all plain images are very close to the ideal value, which proves that the cipher image is susceptible to the small changes of the plain image, and the encryption strategy can perfectly resist the differential attack.

  3. (5)

    Data loss and noise attack analysis: It is essential to evaluate the decryption performance because the cipher image may be intercepted and interfered by noise. For this purpose, after cutting some data and adding noise to the cipher images, the decryption process is performed, and the robustness is analyzed. Figure 20a and b provides the decryption results of the Peppers cipher image for data loss, from which it can be observed that the decrypted Peppers plain image can clearly reflect the original information. When different intensities of salt and pepper noise are added to the Sailboat cipher image, the simulation results shown in Fig. 20c and d also highlight that the decryption process of the encryption scheme has good robustness. Therefore, the encryption strategy can effectively resist data loss and noise attacks.

    Fig. 20
    figure 20

    Experimental data loss and noise attack analysis results for Peppers and Sailboat. (a1, c1) Cipher images; (b1, d1) Decrypted plain image; (a2-a4) Cipher images with 1/16, 1/4, and 1/2 data loss; (b2-b4) Decrypted plain images corresponding to (a2-a4); (c2-c4) Cipher images with 1%, 5%, and 10% salt and pepper noise; (d2-d4) Decrypted plain images corresponding to (c2-c4)

Table 6 Statistical results of information entropy, NPCR, and UACI for six typical color cipher images

From the above analysis, it can be concluded that the hyperchaotic key sequence generated by the HDM map shows high security performance and significant encryption effects in typical and non-typical image encryption. Therefore, the proposed HDM map can be further applied to secure communication.

6 Conclusions

The existing dual-memristor map has low complexity and flexibility, and the application value has not been verified. This paper has proposed a novel 2-D HDM mapping model with complexity enhancement through two different discrete memristors and sinusoidal transformation. The considered map has line invariant points related to coupling strengths, memristor initial condition, and parameters, while their stability is analyzed in detail. Strange attractors with multiple topological structures have been found in this map, such as periodic, quasi-periodic, chaotic, and hyperchaotic attractors. At the same time, the complex coexisting multi-stability is revealed through 3-D local basins of attraction, and the robust bi-stability dependent on initial conditions is further studied. In addition, the excellent dynamical performance of strange attractors, especially multiple hyperchaotic attractors, is measured by comprehensive performance indicators. Importantly, by comparing with various maps, the complexity enhancement characteristic of the hyperchaotic sequence is strictly proved, and its high randomness is tested by PRNGs. In particular, the flexibility of the hyperchaotic sequence has been promoted by switching control, and the application value of the considered map that integrates all excellent performance is verified in image encryption. Specifically, the cipher images exhibit the uniformly distributed pixel values with extremely low correlation coefficients among them, as well as the information entropy close to 8, proving that the strategy can effectively enhance the security and randomness of the plain images. In terms of resistance to attacks, the NPCR and UACI values close to the ideal values demonstrate that the encryption strategy can effectively resist differential attacks. Under noise and data loss attacks, the original information of the cipher images can still be recovered, indicating that the strategy has strong robustness. Importantly, the encryption tests focus on typical color and non-typical grayscale images, providing strong support for the effectiveness and universality of the strategy. Finally, the developed microcontroller-based digital circuit platform accurately captures various strange attractors. In the future, it is worthwhile to construct dual-memristor mapping models with periodic memristances further to study the flexible switching control and extreme multi-stability.