{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T17:57:13Z","timestamp":1776189433449,"version":"3.50.1"},"reference-count":46,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2025JJ70075"],"award-info":[{"award-number":["2025JJ70075"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62273141"],"award-info":[{"award-number":["62273141"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004761","name":"Natural Science Foundation of Hainan Province","doi-asserted-by":"publisher","award":["626MS0245"],"award-info":[{"award-number":["626MS0245"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Integration"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.vlsi.2026.102739","type":"journal-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T06:53:51Z","timestamp":1775544831000},"page":"102739","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Cooperative control of multi-scroll attractors in chaotic neural network with double potential wells and staircase wells and its application in image encryption"],"prefix":"10.1016","volume":"109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7386-8412","authenticated-orcid":false,"given":"Jie","family":"Jin","sequence":"first","affiliation":[]},{"given":"Lin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lv","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Yu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.vlsi.2026.102739_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.vlsi.2025.102378","article-title":"Chaos-based authentication of encrypted images under MQTT for IoT protocol","volume":"102","author":"Rodr\u00edguez-Mu\u00f1oz","year":"2025","journal-title":"Integration"},{"key":"10.1016\/j.vlsi.2026.102739_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.vlsi.2025.102348","article-title":"Third-order resonance networks and their application to chaos generation","volume":"102","author":"Elwakil","year":"2025","journal-title":"Integration"},{"key":"10.1016\/j.vlsi.2026.102739_b3","article-title":"Hardware implementation of a novel chaos-based cryptosystem for secure image transmission","author":"Amdouni","year":"2025","journal-title":"Integration"},{"issue":"1","key":"10.1016\/j.vlsi.2026.102739_b4","doi-asserted-by":"crossref","first-page":"9775","DOI":"10.1038\/s41598-025-92065-x","article-title":"A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5","volume":"15","author":"Alexan","year":"2025","journal-title":"Sci. Rep."},{"issue":"07","key":"10.1016\/j.vlsi.2026.102739_b5","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1142\/S0218127499001024","article-title":"Yet another chaotic attractor","volume":"09","author":"Chen","year":"1999","journal-title":"Int. J. Bifurc. Chaos"},{"key":"10.1016\/j.vlsi.2026.102739_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.vlsi.2026.102731","article-title":"A dual-neuron second-order memristor-based Hopfield neural network with controllable extreme multistability and its application in image encryption","author":"Wang","year":"2026","journal-title":"Integration"},{"issue":"8","key":"10.1016\/j.vlsi.2026.102739_b7","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","article-title":"Synchronization in chaotic systems","volume":"64","author":"Pecora","year":"1990","journal-title":"Phys. Rev. Lett."},{"issue":"17","key":"10.1016\/j.vlsi.2026.102739_b8","doi-asserted-by":"crossref","first-page":"25583","DOI":"10.1007\/s11042-021-10773-8","article-title":"Novel image encryption algorithm based on new 3-d chaos map","volume":"80","author":"Bouteghrine","year":"2021","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"10.1016\/j.vlsi.2026.102739_b9","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","article-title":"A symmetric image encryption scheme based on 3D chaotic cat maps","volume":"21","author":"Chen","year":"2004","journal-title":"Chaos Solitons Fractals"},{"issue":"06","key":"10.1016\/j.vlsi.2026.102739_b10","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","article-title":"Symmetric ciphers based on two-dimensional chaotic maps","volume":"08","author":"Fridrich","year":"1998","journal-title":"Int. J. Bifurc. Chaos"},{"key":"10.1016\/j.vlsi.2026.102739_b11","doi-asserted-by":"crossref","first-page":"145995","DOI":"10.1109\/ACCESS.2020.3005925","article-title":"A 3D image encryption algorithm based on the chaotic system and the image segmentation","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Access"},{"issue":"6","key":"10.1016\/j.vlsi.2026.102739_b12","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1049\/iet-cdt.2018.5005","article-title":"Practical realisation of a return map immune Lorenz-based chaotic stream cipher in circuitry","volume":"12","author":"Brown","year":"2018","journal-title":"IET Comput. Digit. Tech."},{"issue":"11","key":"10.1016\/j.vlsi.2026.102739_b13","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0242110","article-title":"A new secure image encryption algorithm based on a 5D hyperchaotic map","volume":"15","author":"Fang","year":"2020","journal-title":"PLoS One"},{"key":"10.1016\/j.vlsi.2026.102739_b14","doi-asserted-by":"crossref","DOI":"10.3389\/fphy.2022.847385","article-title":"A 6D fractional-order memristive Hopfield neural network and its application in image encryption","volume":"10","author":"Yu","year":"2022","journal-title":"Front. Phys."},{"key":"10.1016\/j.vlsi.2026.102739_b15","article-title":"Dynamics in a memristive neural network with three discrete heterogeneous neurons and its application","author":"Luo","year":"2024","journal-title":"Nonlinear Dynam."},{"key":"10.1016\/j.vlsi.2026.102739_b16","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.122513","article-title":"High-dimensional memristive neural network and its application in commercial data encryption communication","volume":"242","author":"Wang","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.vlsi.2026.102739_b17","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2026.132040","article-title":"A novel PRESAF-Hopfield neural network and its DNA encryption algorithm for voice encryption","volume":"319","author":"Li","year":"2026","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.vlsi.2026.102739_b18","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2025.116234","article-title":"Heterogeneous Hopfield neural network with analog implementation","volume":"194","author":"Bao","year":"2025","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.vlsi.2026.102739_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.115471","article-title":"Dynamics analysis and FPGA implementation of discrete memristive cellular neural network with heterogeneous activation functions","volume":"187","author":"Wang","year":"2024","journal-title":"Chaos Solitons Fractals"},{"issue":"12","key":"10.1016\/j.vlsi.2026.102739_b20","first-page":"3472","article-title":"A multi-stable memristor and its application in a neural network","volume":"67","author":"Lin","year":"2020","journal-title":"IEEE Trans. Circuits Syst. II: Express Briefs"},{"key":"10.1016\/j.vlsi.2026.102739_b21","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.115473","article-title":"Design and encryption application of multi-scroll chain-loop memristive neural networks with initial-boosting coexisting attractors","volume":"187","author":"Lai","year":"2024","journal-title":"Chaos Solitons Fractals"},{"issue":"1","key":"10.1016\/j.vlsi.2026.102739_b22","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1109\/TCAD.2024.3429410","article-title":"Diversified butterfly attractors of memristive HNN with two memristive systems and application in IoMT for privacy protection","volume":"44","author":"Lin","year":"2025","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"key":"10.1016\/j.vlsi.2026.102739_b23","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2025.116662","article-title":"Design and application of spatial multi-structure hidden attractors in memristor-coupled heterogeneous neural networks","volume":"199","author":"Zhang","year":"2025","journal-title":"Chaos Solitons Fractals"},{"issue":"6","key":"10.1016\/j.vlsi.2026.102739_b24","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/s00530-025-02012-z","article-title":"Design and realization of pulse-controlled multi-memristor Hopfield neural networks and their applications in information encryption","volume":"31","author":"Li","year":"2025","journal-title":"Multimedia Syst."},{"key":"10.1016\/j.vlsi.2026.102739_b25","doi-asserted-by":"crossref","DOI":"10.1016\/j.vlsi.2025.102500","article-title":"An attractor-controllable memristive Hopfield neural network and its application on voice encryption","volume":"105","author":"Li","year":"2025","journal-title":"Integration"},{"key":"10.1016\/j.vlsi.2026.102739_b26","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2025.131132","article-title":"Privacy-preserving online medical image exchange via hyperchaotic memristive neural networks and DNA encoding","volume":"653","author":"Deng","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.vlsi.2026.102739_b27","doi-asserted-by":"crossref","DOI":"10.1016\/j.vlsi.2025.102475","article-title":"Dynamical analysis, hardware implementation, and image encryption application of new 4D discrete hyperchaotic maps based on parallel and cascade memristors","volume":"104","author":"Yu","year":"2025","journal-title":"Integration"},{"issue":"5","key":"10.1016\/j.vlsi.2026.102739_b28","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TCT.1971.1083337","article-title":"Memristor-The missing circuit element","volume":"18","author":"Chua","year":"1971","journal-title":"IEEE Trans. Circuit Theory"},{"key":"10.1016\/j.vlsi.2026.102739_b29","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.114923","article-title":"Real time hybrid medical image encryption algorithm combining memristor-based chaos with DNA coding","volume":"183","author":"Demirkol","year":"2024","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.vlsi.2026.102739_b30","article-title":"A dual-neuron memristive Hopfield neural network and its application in image encryption","author":"Liu","year":"2025","journal-title":"Nonlinear Dynam."},{"key":"10.1016\/j.vlsi.2026.102739_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2025.116053","article-title":"Discrete-time fractional-order local active memristor-based Hopfield neural network and its FPGA implementation","volume":"193","author":"Wang","year":"2025","journal-title":"Chaos Solitons Fractals"},{"key":"10.1016\/j.vlsi.2026.102739_b32","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.neucom.2016.07.065","article-title":"A novel memristive Hopfield neural network with application in associative memory","volume":"227","author":"Yang","year":"2017","journal-title":"Neurocomputing"},{"issue":"12","key":"10.1016\/j.vlsi.2026.102739_b33","doi-asserted-by":"crossref","first-page":"16398","DOI":"10.1109\/TIE.2024.3387058","article-title":"Planar homogeneous coexisting hyperchaos in bi-memristor cyclic Hopfield neural network","volume":"71","author":"Bao","year":"2024","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"7","key":"10.1016\/j.vlsi.2026.102739_b34","doi-asserted-by":"crossref","DOI":"10.1063\/5.0153885","article-title":"Simple cyclic memristive neural networks with coexisting attractors and large-scale amplitude control","volume":"33","author":"Lai","year":"2023","journal-title":"Chaos: Interdiscip. J. Nonlinear Sci."},{"key":"10.1016\/j.vlsi.2026.102739_b35","doi-asserted-by":"crossref","DOI":"10.1016\/j.vlsi.2026.102688","article-title":"Extreme multistability in discrete memristive neuron maps and implications for dual-field applications","volume":"109","author":"Yu","year":"2026","journal-title":"Integration"},{"key":"10.1016\/j.vlsi.2026.102739_b36","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.115584","article-title":"Single direction, grid and spatial multi-scroll attractors in Hopfield neural network with the variable number memristive self-connected synapses","volume":"189","author":"Wan","year":"2024","journal-title":"Chaos Solitons Fractals"},{"issue":"10","key":"10.1016\/j.vlsi.2026.102739_b37","doi-asserted-by":"crossref","first-page":"7824","DOI":"10.1109\/TNNLS.2022.3146570","article-title":"Design and analysis of multiscroll memristive Hopfield neural network with adjustable memductance and application to image encryption","volume":"34","author":"Lai","year":"2023","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"2","key":"10.1016\/j.vlsi.2026.102739_b38","doi-asserted-by":"crossref","first-page":"319","DOI":"10.13164\/re.2015.0319","article-title":"Everything you wish to know about memristors but are afraid to ask","volume":"24","author":"Chua","year":"2015","journal-title":"Radioengineering"},{"issue":"10","key":"10.1016\/j.vlsi.2026.102739_b39","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1002\/cnm.664","article-title":"A modified Newton\u2013Raphson method","volume":"20","author":"He","year":"2004","journal-title":"Commun. Numer. Methods Eng."},{"issue":"12","key":"10.1016\/j.vlsi.2026.102739_b40","doi-asserted-by":"crossref","first-page":"8839","DOI":"10.1109\/TII.2022.3155599","article-title":"Brain-like initial-boosted hyperchaos and application in biomedical image encryption","volume":"18","author":"Lin","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.vlsi.2026.102739_b41","first-page":"1","article-title":"Discrete memristive Hopfield neural network with multi-stripe\/wave hyperchaos","author":"Bao","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.vlsi.2026.102739_b42","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.neunet.2023.12.008","article-title":"Memristor-induced hyperchaos, multiscroll and extreme multistability in fractional-order HNN: Image encryption and FPGA implementation","volume":"171","author":"Kong","year":"2024","journal-title":"Neural Netw."},{"issue":"28","key":"10.1016\/j.vlsi.2026.102739_b43","doi-asserted-by":"crossref","first-page":"33331","DOI":"10.1007\/s11042-024-20537-9","article-title":"FPGA implementation of low cost and low power chaotic encryption scheme based on a discrete-space chaotic map","volume":"84","author":"Moreira Bezerra","year":"2025","journal-title":"Multimedia Tools Appl."},{"issue":"11","key":"10.1016\/j.vlsi.2026.102739_b44","doi-asserted-by":"crossref","first-page":"17977","DOI":"10.1109\/JIOT.2025.3539020","article-title":"A lightweight image encryption scheme using hyperchaotic map and collision-parity principle","volume":"12","author":"La","year":"2025","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"10.1016\/j.vlsi.2026.102739_b45","doi-asserted-by":"crossref","first-page":"4039","DOI":"10.1109\/TCYB.2024.3377011","article-title":"Constructing multiscroll memristive neural network with local activity memristor and application in image encryption","volume":"54","author":"Lai","year":"2024","journal-title":"IEEE Trans. Cybern."},{"issue":"2","key":"10.1016\/j.vlsi.2026.102739_b46","doi-asserted-by":"crossref","first-page":"2089","DOI":"10.1109\/TII.2022.3194590","article-title":"Medical image encryption by content-aware DNA computing for secure healthcare","volume":"19","author":"Wu","year":"2023","journal-title":"IEEE Trans. Ind. Inform."}],"container-title":["Integration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167926026000945?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167926026000945?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:59:40Z","timestamp":1776185980000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167926026000945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":46,"alternative-id":["S0167926026000945"],"URL":"https:\/\/doi.org\/10.1016\/j.vlsi.2026.102739","relation":{},"ISSN":["0167-9260"],"issn-type":[{"value":"0167-9260","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Cooperative control of multi-scroll attractors in chaotic neural network with double potential wells and staircase wells and its application in image encryption","name":"articletitle","label":"Article Title"},{"value":"Integration","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.vlsi.2026.102739","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"102739"}}