https://doi.org/10.1140/epjs/s11734-025-01951-y
Regular Article
Discrete memristive hopfield neural network with electromagnetic coupling: attractor evolution, FPGA implementation, and application in image encryption
1
School of Physics and Electronic Science, Changsha University of Science and Technology, 410114, Changsha, China
2
School of Computer Science and Technology, Changsha University of Science and Technology, 410076, Changsha, China
3
School of Information Engineering, Changsha Medical University, 410219, Changsha, China
Received:
5
July
2025
Accepted:
7
September
2025
Published online:
21
September
2025
Due to their unique memory characteristics resembling those of the human brain, memristors are often used to simulate the electromagnetic induction effects of neurons and to study excitation propagation between coupled neurons. However, there is limited literature reporting on the chaotic dynamics that emerge when these two mechanisms are integrated. This paper proposes a four-dimensional discrete memristive electromagnetic radiation synaptic-coupled Hopfield neural network (DMES-HNN) model, which incorporates both electromagnetic radiation and synaptic coupling. The system exhibits infinitely many equilibrium points and reveals rich dynamical behaviors through bifurcation and Lyapunov-based analysis, including hyperchaotic attractors, chaotic attractors, and initial-offset enhancement. Notably, as the decay factor and electromagnetic radiation intensity vary, the system undergoes a rare evolutionary process in which a single chaotic attractor gradually splits into multiple homogeneous attractors, demonstrating complex attractor growth dynamics. The feasibility of the DMES-HNN model is validated using a field-programmable gate array (FPGA) implementation. Furthermore, an image encryption algorithm based on the chaotic sequences generated by the DMES-HNN is proposed. Comprehensive evaluations show the algorithm achieves high encryption efficiency, with an information entropy of up to 7.9993. Compared with various existing chaos-based encryption schemes, the proposed method achieves a favorable balance between security and computational efficiency.
Copyright comment Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
© The Author(s), under exclusive licence to EDP Sciences, Springer-Verlag GmbH Germany, part of Springer Nature 2025
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

