This article aims to improve the security and timeliness of chaotic synchronization scheme in chaotic secure information transmission. Firstly, a novel nonlinear synchronization scheme among multiple chaotic systems is defined based on vector polynomial to improve the complexity of the carrier signal, and then to enhance the attack resistance of the communication scheme. Secondly, a more flexible and accurate synchronization control technology is proposed so that the above vector-polynomial-based chaotic synchronization can be realized within a time that is predefined as a tunable control parameter. Subsequently, the theoretical derivation is carried out to prove the synchronization time in the above-mentioned synchronization control scheme can be set independently without being affected by the initial conditions or other control parameters. Finally, several simulation experiments on secure information transmission are presented to verify the efficiency and superiority of the designed chaotic synchronization scheme and synchronization control technology.
Citation: Qiaoping Li, Sanyang Liu. Predefined-time vector-polynomial-based synchronization among a group of chaotic systems and its application in secure information transmission[J]. AIMS Mathematics, 2021, 6(10): 11005-11028. doi: 10.3934/math.2021639
Related Papers:
[1]
Qike Zhang, Tao Xie, Wenxiang Fang .
Fixed/predefined-time generalized synchronization for stochastic complex dynamical networks with delays. AIMS Mathematics, 2024, 9(3): 5482-5500.
doi: 10.3934/math.2024266
[2]
Meng Li, Gulijiamali Maimaitiaili .
New results on finite-time projective synchronization for memristor-based hybrid delayed BAM neural networks with applications to DNA image encryption. AIMS Mathematics, 2024, 9(4): 9822-9846.
doi: 10.3934/math.2024481
[3]
Qiaoping Li, Yu Chen, Lingyuan Ma .
Predefined-time control of chaotic finance/economic system based on event-triggered mechanism. AIMS Mathematics, 2023, 8(4): 8000-8017.
doi: 10.3934/math.2023404
[4]
Shamsa Kanwal, Saba Inam, Fahima Hajjej, Ala Saleh Alluhaidan .
Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryption. AIMS Mathematics, 2024, 9(11): 31217-31238.
doi: 10.3934/math.20241505
[5]
Yuzhen Zhou, Erxi Zhu .
A new image encryption based on hybrid heterogeneous time-delay chaotic systems. AIMS Mathematics, 2024, 9(3): 5582-5608.
doi: 10.3934/math.2024270
[6]
Marouane Karim, Abdelfatah Kouidere, Mostafa Rachik, Kamal Shah, Thabet Abdeljawad .
Inverse problem to elaborate and control the spread of COVID-19: A case study from Morocco. AIMS Mathematics, 2023, 8(10): 23500-23518.
doi: 10.3934/math.20231194
[7]
Chao Ma, Tianbo Wang, Wenjie You .
Master-slave synchronization of Lurie systems with time-delay based on event-triggered control. AIMS Mathematics, 2023, 8(3): 5998-6008.
doi: 10.3934/math.2023302
[8]
Abdul Razaq, Louai A. Maghrabi, Musheer Ahmad, Qamar H. Naith .
Novel substitution-box generation using group theory for secure medical image encryption in E-healthcare. AIMS Mathematics, 2024, 9(3): 6207-6237.
doi: 10.3934/math.2024303
[9]
Kunting Yu, Yongming Li .
Adaptive fuzzy control for nonlinear systems with sampled data and time-varying input delay. AIMS Mathematics, 2020, 5(3): 2307-2325.
doi: 10.3934/math.2020153
This article aims to improve the security and timeliness of chaotic synchronization scheme in chaotic secure information transmission. Firstly, a novel nonlinear synchronization scheme among multiple chaotic systems is defined based on vector polynomial to improve the complexity of the carrier signal, and then to enhance the attack resistance of the communication scheme. Secondly, a more flexible and accurate synchronization control technology is proposed so that the above vector-polynomial-based chaotic synchronization can be realized within a time that is predefined as a tunable control parameter. Subsequently, the theoretical derivation is carried out to prove the synchronization time in the above-mentioned synchronization control scheme can be set independently without being affected by the initial conditions or other control parameters. Finally, several simulation experiments on secure information transmission are presented to verify the efficiency and superiority of the designed chaotic synchronization scheme and synchronization control technology.
1.
Introduction
Along with the rapid development of mobile communication and Internet, as well as the rise of 5G network, the importance of information security is becoming more and more prominent. Due to its high nonlinearity, sensitivity to initial value and unpredictability of trajectory, chaotic system is especially suitable for constructing information encryption scheme with high security [1,2,3,4,5]. The realization of chaotic synchronization is the premise of the chaotic secure information transmission, therefore, it is of great significance to explore the chaotic synchronization scheme and synchronization control technique in depth [6,7,8,9,10,11].
For the chaotic secure communication, the level of security is mainly determined by the complexity level of the carrier signal which is generated by the drive system. However, the drive system in most chaotic secure communication schemes is a single chaotic system. If the drive system is composed of multiple systems, the carrier signal will become more complex and more unpredictable for decryption. Inspired by the above discussion, R. Luo presented a new type of synchronization scheme-combined synchronization, in which the drive system was a linear combination of two different chaotic systems with the same dimension [12]. However, since only linear operations of vector were used, the nonlinear characteristics of the combined drive system did not change essentially. Recently, Q. Li proposed the compound synchronization, in which the multiplication operation of matrix was first applied in the formation of the driving signal, so as to enhance the nonlinearity of the drive system [13]. However, the above-mentioned compound synchronization only considered the multiplication of two matrices. It is noted that the polynomial operation is a generalization of the multiplication operation. Therefore, if the polynomial operation can be used to formulate the drive system, the complexity of the carrier signal will be significantly improved. This inspires this work.
Notice the encrypted information will not be decoded until the synchronisation between the drive system and the response system is achieved. Fast synchronization is desired to prevent the loss of information during the initial phase of the secure communication. Therefore, finite-time chaotic synchronization emerged and a series of valuable research results have been obtained [14,15,16,17,18,19,20]. However, the synchronization time in finite-time chaotic synchronization has a strong dependence on the initial conditions. Recently, the concept called fixed-time chaotic synchronization has been developed to solve this problem, in which the synchronization time is uniformly bounded with respect to the initial conditions. Nevertheless, since the relationship between the control gains and the synchronization time is unclear, the synchronization time in fixed-time synchronization can not be accurately calculated [21,22,23,24]. With the continuous improvement of communication quality requirements, the designer would prefer to recover the encoded information within a predefined time according to the task requirements. Therefore, it is urgent to develop a novel concept of chaotic synchronization, in which the synchronization time can be predesigned off-line without being affected by the initial conditions or other system control gains [25,26,27,28,29,30,31]. This is anther goal for this work.
According to the above analysis, this article is dedicated to the design of a novel predefined-time vector-polynomial-based synchronization among multiple chaotic systems and its application in secure information transmission. The rest of this work is arranged as follows. In Section 2, a novel chaotic synchronization scheme is defined in virtue of the vector polynomial. After that, a novel concept named predefined-time vector-polynomial-based synchronization is proposed. In Section 3, a predefined-time synchronization control algorithm is designed to realize the above synchronization. In Section 4, a numerical simulation is presented to illustrate the validity of the above synchronization control algorithm. In Section 5, the proposed chaotic synchronisation scheme is applied in the information secure transmission to demonstrate its feasibility and superiority. Finally, Section 6 concludes this article.
The proposed approach includes two main contributions:
∙ Firstly, based on the concept of vector polynomial, the vector-polynomial-based synchronization scheme is presented, in which, the drive system is a compound chaotic system which is composed of several chaotic systems by linear operation and polynomial operation. Compared with other chaotic synchronization schemes, the compound drive system in this scheme has more complex topology and less predictable chaotic path, which means that it has stronger anti-attack capability in secure information transmission. Moreover, the complexity of the compound drive system in this synchronization scheme can be changed by adjusting the coefficient or the degree of the vector polynomial.
∙ Secondly, the synchronization time can be set off-line by the designer in advance without estimation, which is of more practical value.
2.
Problem description and preliminaries
In this section, some important concepts of chaotic synchronization will be described in details, and the relevant preliminaries will be listed.
2.1. Vector-polynomial-based synchronization
Consider the nonlinear chaotic synchronization problem among M drive systems and one response system. The dynamics of the j-th basic drive system is described by
where ξj=(ξj,1,ξj,2,⋯,ξj,n)T and w=(w1,w2,⋯,wn)T∈Rn denote the state vectors for the j-th basic drive system and the response system, respectively, Qj,i(ξj(t)) and Ri(w(t)) denote the i-th rows of the linear functional matrices Qj(ξj(t)) and R(w(t))∈Rn×n, respectively, qj,i(ξj(t)) and ri(w(t)) are continuous nonlinear functions, φj=(φj,1,φj,2,⋯,φj,n)T and ψ=(ψ1,ψ2,⋯,ψn)T∈Rn refer to system parameter vectors, the vector u=(u1,u2,⋯,un)T∈Rn is the control input.
Definition 1.For vector υ=(υ1,υ2,⋯,υn)T∈Rn and constant l∈Z+, a novel l−th power of υ is defined as
υ<l>=(υl1,υl2,⋯,υln)T,
(2.3)
based on which, a novel vector polynomial with degree N∈Z+ is defined as
PN(υ)=N∑l=1Dlυ<l>,
(2.4)
where Dl=diag{dl,1,⋯,dl,n}∈Rn×n denotes the coefficient matrix.
Definition 2.(Vector-polynomial-based synchronization) The set of chaotic systems (2.1)–(2.2) are said to be vector-polynomial-based synchronization, if
limt→∞‖N∑l=1Dl(M∑j=1Ajξj(t))<l>−Λ(t)w(t)‖=0,
(2.5)
where Aj and Dl∈Rn×n refer to the coefficient matrices, Λ(t)=diag{λ1(t),⋯,λn(t)} denotes the scaling matrix, whose elements are bounded and continuously differentiable non-zero functions.
Denote
χ(ξ1,⋯,ξM)=M∑j=1Ajξj(t),
PN(χ)=N∑l=1Dlχ<l>(ξ1,⋯,ξM),
then, (2.5) is reduced to
limt→∞‖PN(χ)−Λ(t)w(t)‖=0.
(2.6)
If this is the case, PN(χ) is called a compound drive system.
In order to facilitate the reader to understand, we take the case of M=3 as an example for detailed analysis. In this case, the three basic drive systems are specifically described as
Definition 3.The set of chaotic systems (2.7)–(2.9) and (2.2) are said to be vector-polynomial-based synchronization, if
limt→∞‖N∑l=1Dl(Ax(t)+By(t)+Cz(t))<l>−Λ(t)w(t)‖=0.
(2.10)
Denote
χ(x,y,z)=Ax(t)+By(t)+Cz(t),
(2.11)
PN(χ)=N∑l=1Dlχ<l>(x,y,z),
(2.12)
then, (2.6) is reduced to
limt→∞‖PN(χ)−Λ(t)w(t)‖=0.
(2.13)
Remark 4.As shown in Table 1, the vector-polynomial-based synchronization covers most of the existing chaotic synchronization schemes. The proposed synchronization scheme will be transformed into different specific ones as different parameters are selected. In Table 1, Λ=diag{λ1,⋯,λn}∈n×n refers to a constant diagonal matrix, and I∈n×n denotes a unit matrix.
Table 1.
Comparison among the vector-polynomial-based synchronization and other existing ones.
Remark 5.In chaotic secure communication, the more complex the carrier signal is, the stronger the attack resistance of the secure communication scheme is. Definition 3 shows that, x(t),y(t) and z(t) generate a new vector χ=Ax(t)+By(t)+Cz(t) by linear operation, and then χ(t) generates another vector PN(χ)=N∑l=1Dlχ<l> by polynomial operation. Therefore, the compound vector PN(χ) has more complex nonlinear features. From the theoretical perspective, the geometric path of the vector-polynomial-based compound drive system PN(χ((x,y,z))) is more difficult to predict. Moreover, the complexity of PN(χ((x,y,z))) can be improved by increasing the degree N. Furthermore, different compound drive systems can be obtained by selecting different coefficient matrices Dl for the fixed χ(x,y,z) and N, which indicates the synchronization scheme (2.6) is more flexible.
For instance, when we select the following three sets of different coefficient matrices for the basic drive systems (2.7)–(2.9), the corresponding 3D projections of the vector-polynomial-based compound drive system PN(χ((x,y,z))) are shown in Figure 2(a), (b) and (c), respectively.
Figure 1.
3D projections of the four chaotic systems involved in the simulations of this work.
Before defining the concept of predefined-time synchronization, let us review some related concepts and properties.
Consider the nonlinear dynamical system
˙ξ(t)=ϑ(t,ξ;φ),t∈[0,+∞)
(2.16)
in which χ∈Rn represents the system state, φ∈Rm denotes the system parameter. The origin 0∈Rn is assumed to be an equilibrium point for the system (2.16), i.e., ϑ(0,ξ0;φ)=0. The initial condition is represented as ξ0=ξ(0).
Definition 6.(Predefined-time stability) [26]. For a predefined constant T∗>0, the origin of (2.16) is said to be globally predefined-time stable, if it holds for all the initial states ξ0 that
{limt→T∗−ξ(t,ξ0)=0,t∈[0,T∗)ξ(t,ξ0)≡0,t∈[T∗,+∞)
(2.17)
If this is the case, T∗ is called a predefined time.
Remark 7.As shown in Table 2, for the four stabilities involved, the accuracy of the settling-time is gradually enhanced in turn, and the predefined-time stability can be regarded as a upgrade of the other three. Furthermore, the settling-time T∗ for predefined-time stability can be pre-specified without being affected by the initial condition ξ0 or other system parameter φ, thus it can be set freely and has more practical value.
Table 2.
Comparison among the predefined-time stability and other existing ones.
Concept
Definition
Characteristic
Asymptotically stability
The origin of system (2.16) complies with limt→∞ξ(t,ξ0)=0.
The length of the stabilization time is unknown and may be infinite.
The origin of system (2.16) is globally asymptotically stable and there exists a finite time T(ξ0)≥0 satisfying {limt→T(ξ0)−ξ(t,ξ0)=0,t∈[0,T(ξ0))ξ(t,ξ0)≡0,t∈[T(ξ0),+∞)
The stabilization time T(ξ0) is finite, but is dependent on ξ0 and the upper bound cannot be estimated.
The origin of system (2.16) is finite-time stable and the settling-time function T(ξ0) is bounded, i.e., there exists a finite positive constant Tf such that T(ξ0)≤Tf,∀ξ0∈Rn.
Tf is independent of ξ0, however, it still depends on the control gains.
Predefined-time stability proposed in this work
The origin of system (2.16) is fixed-time stable and for an predefined time T∗≥0, it holds that {limt→T∗−ξ(t,ξ0)=0,t∈[0,T∗)ξ(t,ξ0)≡0,t∈[T∗,+∞),∀ξ0∈Rn.
T∗ can be predefined and not affected by ξ0 or other control gains.
Lemma 8.[24]For the dynamic system (2.16), if there exists a radially unbounded Lyapunov function V:Rn→R that complies to
˙V≤−(μ1Vε1+μ2Vε2),ξ∈Rn∖0
where μ1∈(0,+∞), μ2∈(0,+∞), ε1∈(1,+∞) and ε2∈[0,1) are given constants.
Then, the origin of system (2.16) isfixed-time stable and an upper bound of settling-time function T(ξ0) is estimated as
Tf=1μ1(ε1−1)+1μ2(1−ε2),∀ξ0∈Rn∖0.
(2.18)
Remark 9.From Lemma 8 one can see that, for the fixed-time stability, the the upper bound Tf of the setting-time function T(ξ0) does not depend on the initial condition. Nevertheless, the relationship between Tf and the control gains is unclear. For several engineering application, such as chaos synchronization, it is required that the synchronization time can be set independently as a user-defined parameter.
Lemma 10.[27]Let T∗>0 be a predefined constant. If there exists a radially unbounded Lyapunov function V:Rn→R for the system (2.16), such that
˙V≤−1αT∗exp(Vα)V1−α,α∈(0,1],
for any ξ∈Rn∖0.
Then, the origin of system (2.16) is predefined-time stable with T∗ as the predefined time.
Combining the concepts of predefined-time stability and vector-polynomial-based synchronization, now we propose the following important definition.
Definition 11.(Predefined-time vector-polynomial-based synchronization) The set of chaotic systems (2.7)–(2.9) and (2.2) are said to be predefined-time vector-polynomial-based synchronization, if the origin of the synchronization error system (2.15) is predefined-time stable with T∗>0 as the predefined time, i.e.,
{limt→T∗−ei(t)=0,t∈[0,T∗)ei(t)≡0,t∈[T∗,+∞)
(2.19)
wherei=1,2,⋯,n.
In this case, T∗ is called the predefined synchronization time.
3.
Design of the predefined-time synchronization controller
To realize the predefined-time vector-polynomial-based synchronization among the set of chaotic systems (2.7)–(2.9) and (2.2), the following synchronization controller is designed,
Theorem 12.If the synchronization controller (3.1) is adopted, then the predefined-time vector-polynomial-based synchronization among the set of chaotic systems (2.7)–(2.9) and (2.2) will be achieved with T∗>0 as the predefined synchronization time.
Proof. Choose the following Lyapunov function
Vi(t)=12e2i(t),i=1,2,⋯,n.
(3.3)
According to the definition of Ωi, the synchronization error dynamic system (2.15) can be simplified as
˙ei(t)=Ωi−λi(t)ui(t).
(3.4)
Taking the derivative of Vi(t) along (2.15), it can be derived that
Hence, it follows from Lemma 10 that each element ei(t) of the synchronization error vector e(t) will converge to zero before the predefined time T∗, which means the predefined-time vector-polynomial-based synchronization among the chaotic systems (2.7)–(2.9) and (2.2) will be achieved with T∗ as the predefined synchronization time.
Similarly, if we define the synchronization error among the M+1 chaotic systems (2.1) and (2.2) as
χi and ei(t) refer to the i-th elements of vectors χ(x1,⋯,xM) and e(t), respectively, Aj,i represents the i-th row of the matrix Aj.
Then, the predefined-predefined vector-polynomial-based synchronization among the M+1 chaotic systems (2.1) and (2.2) will be achieved with T∗ as the predefined synchronization time.
Proof. The proof process is similar to that of Theorem 12 and is omitted here.
4.
Numerical simulation
In this section, an illustrative numerical example is given to highlight the properties of the chaotic synchronization scheme and synchronization control technology. The chaotic systems involved in this example are given as below.
When the initial states are set as x(0)=(0.1,0.1,0.1)T, y(0)=(−1,1,−2)T, z(0)=(2,0.5,−1)T and w(0)=(−1.2,2,4)T, the project curves of the above four chaotic systems are shown in Figure 1.
According to Definition 11, the predefined-time synchronization objective in this simulation can be described as
where T∗>0 denotes the predefined synchronization time, χ=Ax(t)+By(t)+Cz(t) refers to a combined chaotic system generated by the three basic drive systems with the following combined coefficients,
When the simulation time is taken as 400 seconds, the phase portraits of the combined chaotic signal Ax+By+Cz and the compound chaotic signal PN(Ax+By+Cz) are displayed in Figure 3. Comparing Figure 3 with Figure 1, it is appreciable that, the trajectory of the compound chaotic signal PN(Ax+By+Cz) is more complex.
Figure 3.
3D phase portraits of the vector-polynomial-function-based drive system.
Now we appoint the predefined synchronization time as T∗=0.1, and carry out the chaotic synchronization simulation under the predefined-time synchronization controller (3.1) with α=0.2. The simulation result displayed by Figure 4 implies that, the synchronization error ei(t) converges to zero before the predefined time T∗=0.1, which shows the effectiveness of the proposed synchronization control technique.
Figure 4.
Trajectory of the synchronization error via predefined-time control technique with T∗=0.1.
Subsequently, we reset the predefined synchronization time T∗ to 0.01 and carry out the predefined-time synchronization simulation again. As shown in Figure 5, the synchronization among the chaotic systems (4.1)–(4.4) is still achieved successfully before the predefined time T∗=0.01, which verifies the flexibility of the proposed predefined-time synchronization controller.
Figure 5.
Trajectory of the synchronization error via predefined-time control technique with T∗=0.01.
Next, we replace the predefined-time controller (3.1) in the above chaotic synchronization simulation with the following fixed-time controller presented in [24],
where ε1=1.1, ε2=0.9, μ1=2, μ2=3, and Ωi is defined by (3.2).
Constructing the following Lyapunov function
ˉVi(t)=12ei2(t),
it can be derived
˙ˉVi≤−(μ1(ˉVi)ε1+μ2(ˉVi)ε2).
By virtue of Lemma 8, the synchronization among chaotic systems (4.1)–(4.4) can be achieved. The corresponding simulation result is shown in Figure 6. Comparing Figure 6 with Figures 4 and 5, one can see that, the synchronization accuracy and synchronization rate under the fixed-time controller (4.6) are obviously inferior to that under the predefined-time controller. This further verifies the superiority of the proposed predefined-time synchronization control technique.
Figure 6.
Trajectory of the synchronization error via fixed-time control technique.
5.
Applied experiments in chaotic secure communication based on the proposed synchronization scheme
In this section, several chaotic secure communication experiments will be carried out to illustrate the feasibility of the proposed synchronization scheme.
The chaotic systems, synchronization schemes, synchronization control techniques and related parameters involved in the following experiments are the same as those given in Section 4. Meanwhile, the predefined synchronization time is set to T∗=0.01.
5.1. Application in chaotic secure transmission of dynamic signal
The framework of chaotic secure transmission of dynamic signal is depicted by Figure 7, while the corresponding communication principle is explained as follows:
Figure 7.
Framework of the chaotic secure transmission of dynamic signal.
At the sender end, chaotic signals x(t),y(t) and z(t) generate a new chaotic signal PN(χ(x,y,z)) as the carrier signal by means of algebraic polynomial operation. Subsequently, according to the specified encryption scheme, the carrier signal PN(χ(x,y,z)) and the original signal s(t) are modulated into another nonlinear signal m(t), which will be transmitted through the transmission channel. At the receiver end, the receiver realizes the predefined-time synchronization among the response and the drive systems via the controller u(t) and further reverses the carrier signal as ˆPN(χ(x,y,z)). Finally, the original signal is recovered as ˆs(t) via the decryption scheme.
The original dynamic signal in this simulation experiment is given as
s(t)={0,t∈[2(k−1),2k−1)5,t∈[2k−1,2k),k=1,2,⋯.
During the encryption process, the signal modulation scheme is designed as
m(t)=s(t)+κPN(χ(x,y,z)),
(5.1)
where κ=(0.1,0.2,−0.1)T.
As shown in Figure 8, the encrypted signal m(t) based on the signal modulation scheme (5.1) is more complex and more difficult to predict than the original signal s(t), which indicates that the original signal can be well hidden during the transmission process.
Figure 8.
Comparison among the original, encrypted and decrypted signal via predefined-time control technique with T∗=0.01.
During the decryption process, the following decrypted signal is obtained by using the secret keys including the signal modulation scheme (5.1) and the chaotic synchronization scheme (4.5)
ˆs(t)=m(t)−κˆPN(χ(x,y,z)),
(5.2)
where ˆPN(χ(x,y,z)=Λ(t)w(t).
As shown in Figure 9, the decrypted dynamic signal ˆs(t) can restore the original dynamic signal s(t) accurately as t≥T∗=0.01.
Figure 9.
State trajectories of the original signal s(t) and the decrypted signal ˆs(t) via predefined-time control technique with T∗=0.01.
Meanwhile, comparing Figure 9 with the simulation result (shown in Figure 10) based on the fixed-time synchronization controller (4.6), one can see that, the decoding time under the proposed predefined-time synchronization scheme is much shorter. Moreover, the decoding time via the proposed predefined-time synchronization control scheme can be set in advance according to the user's requirements, so it is more flexible.
Figure 10.
State trajectories of the original signal s(t) and the decrypted signal ˆs(t) via fixed-time control technique.
5.2. Application in chaotic secure image transmission
The framework of chaotic secure image transmission based on the proposed chaotic synchronization scheme is shown in Figure 11. The corresponding image encryption algorithms for the black-white image and the color image are described by Algorithm 1 and Algorithm 2, respectively. In the process of the chaotic secure image transmission, the discrete chaotic sequences applied in Algorithm 1 and Algorithm 2 are coded by
in which, h=0.001 is the sampling interval, P1(t)=κPNχ(x(t),y(t),z(t)), P2(t)=κΛ(t)w(t), κ=(0.1,0.2,−0.1)T, and i=1,2,⋯,M⋅N.
During the secure image transmission process, the black-white image (Figure 12(a)) and the color image (Figure 12(a)) of the famous image named Lena are selected as the original images, respectively. The simulation results are shown in Figures 12–14, from which one can see that, high precision image security transmission is realized between the generator and the receiver via the proposed predefined-time chaotic synchronization scheme.
Figure 12.
Original image, encrypted image, decrypted image and their histograms of the black-white image with T∗=0.01.
As shown in Figures 15 and 16, when the predefined-time controller (3.1) applied in the above image transmission scheme is replaced by the fixed-time controller (4.6), the encrypted image can not be successfully recovered. This further proves the validity and superiority of the proposed predefined-time chaotic synchronization control technique.
Figure 15.
Original image, encrypted image, decrypted image and their histograms of the black-white image via fixed-time control technology.
In this work, a novel predefined-time vector-polynomial-based synchronization scheme for multiple chaotic systems has been proposed and applied in the secure communication of digital signal and image. Both the theoretical and experimental results indicated that, the proposed synchronization scheme can improve the anti-decoding ability of the chaotic secure communication significantly, meanwhile the designed synchronization control technique can improve the decoding speed of the secure transmission effectively. Reliable control and sample-date control are two novel and effective control techniques [19,20]. Therefore, in our future works, we will consider combining the above control methods with the predefined-time control technique to design two new control techniques "predefined-time reliable control" and "predefined-time sample-date control", which will be meaningful. In addition, it will be also interesting to extend the results in this work to the fractional-order chaotic systems.
Acknowledgments
The research is supported by the National Natural Science Foundation of China with Grant No. 61877046, the Key Science and Technology Projects in Henan Province with Grant No. 212102210552, and the Key Scientific Research Projects of Higher Education Institutions in Henan Province with Grant No. 19B110006. Thanks for the editor and reviewers.
Conflict of interest
The authors declare that there is no conflict of financial interests regarding the publication of this paper.
Algorithm 1 Black-white image encryption algorithm based on the proposed chaotic synchronization scheme.
1: A=imread('lena2.png');
2: [M, N, L]=size(A);
3: imshow(A);
4: A0=A;
5: % Encryption process:
6: Rm = randsample(M, M)';
7: Mchange = [1:1:M; Rm];
8: Rn = randsample(N, N)';
9: Nchange = [1:1:N; Rn];
10: A (Mchange(1, :), :) = A (Mchange(2, :), :);
11: A (:, Nchange(1, :)) = A (:, Nchange(2, :));
12: h=0.001; 13: fori=1:1:M∗Ndo 14: a1(i)= abs(P1((1000+i)∗h));
15: a2(i)= abs(P1((1200+i)∗h));
16: b1(i)= abs(P2((1000+i)∗h));
17: b2(i)= abs(P2((1200+i)∗h));
18: end for 19: n=1;A1=A; 20: fori=1:1:Mdo 21: forj=1:1:Ndo 22: if mod(n,2)==0then 23: k(n)= mod (floor(a1(n)∗104),256); 24: else 25: k(n)= mod (floor(a2(n)∗104),256) 26: end if 27: A1(i,j)= bitxor(A(i,j),k(n));
28: n=n+1; 29: end for 30: end for 31: A2 (:, Nchange(2, :)) = A2 (:, Nchange(1, :));
32: A2 (Mchange(2, :), :) = A2 (Mchange(1, :), :);
33: imshow(A1);
34: % Decryption process:
35: n=1;A2=A1; 36: fori=1:1:Mdo 37: forj=1:1:Ndo 38: if mod(n,2)==0then 39: k1(n)= mod (floor(b1(n)∗104),256);
40: else 41: k1(n)= mod (floor(b2(n)∗104),256) 42: end if 43: A2(i,j)= bitxor(A1(i,j),k1(n));
44: n=n+1; 45: end for 46: end for 47: imshow(A2);
X. Chai, J. Zhang, Z. Gan, Y. Zhang, Medical image encryption algorithm based on latin square and memristive chaotic system, Multimed Tools Appl., 78 (2019), 35419–35453. doi: 10.1007/s11042-019-08168-x
[2]
J. He, B. Lai, A novel 4d chaotic system with multistability: Dynamical analysis, circuit implementation, control design, Mod. Phys. Lett. B, 33 (2019), 1950240.
[3]
S. Zhang, Y. Zeng, Z. Li, M. Wang, L. Xiong, Generating one to four-wing hidden attractors in a novel 4d no-equilibrium chaotic system with extreme multistability, Chaos, 28 (2018), 013113. doi: 10.1063/1.5006214
[4]
Q. Li, S. Liu, Switching event-triggered network synchronization for chaotic systems with different dimensions, Neurocomputing, 311 (2018), 32–40. doi: 10.1016/j.neucom.2018.05.039
[5]
C. Wang, R. Chu, J. Ma, Controlling a chaotic resonator by means of dynamic track control, Complexity, 21 (2015), 370–378. doi: 10.1002/cplx.21572
[6]
A. Mansouri, X. Wang, A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme, Inf. Sci., 520 (2020), 46–62. doi: 10.1016/j.ins.2020.02.008
[7]
U. E. Kocamaz, S. Cicek, Y. Uyaroglu, Secure communication with chaos and electronic circuit design using passivity-based synchronization, J. Circuit. Syst. Comp., 27 (2018), 1850057. doi: 10.1142/S0218126618500573
[8]
Q. Li, S. Liu, Y. Chen, Combination event-triggered adaptive networked synchronization communication for nonlinear uncertain fractional-order chaotic systems, Appl. Math. Comput., 333 (2018), 521–535.
[9]
Y. Yang, L. Wang, S. Duan, L. Luo, Dynamical analysis and image encryption application of a novel memristive hyperchaotic system, Opt. Laser Technol., 133 (2021), 106553. doi: 10.1016/j.optlastec.2020.106553
[10]
Z. Yang, D. Liang, D. Ding, Y. Hu, Dynamic behavior of fractional-order memristive time-delay system and image encryption application, Mod. Phys. Lett. B, 35 (2021), 2150271. doi: 10.1142/S0217984921502717
[11]
X. Wang, Y. Su, Image encryption based on compressed sensing and dna encoding, Signal Process-Image, 95 (2021), 116246. doi: 10.1016/j.image.2021.116246
[12]
R. Luo, Y. Wang, Finite-time stochastic combination synchronization of three different chaotic systems and its application in secure communication, Chaos, 22 (2012), 023109. doi: 10.1063/1.3702864
[13]
Q. Li, S. Liu, Y. Chen, Finite-time adaptive modified function projective multi-lag generalized compound synchronization for multiple uncertain chaotic systems, Int. J. Ap. Math. Com-pol, 28 (2018), 613–624.
[14]
A. J. Munoz-Vazquez, J. D. Sanchez-Torres, C. A. Anguiano-Gijon, Single-channel predefined-time synchronisation of chaotic systems, Asian J. Control, 23 (2021), 190–198. doi: 10.1002/asjc.2234
[15]
Y. Li, X. Yang, L. Shi, Finite-time synchronization for competitive neural networks with mixed delays and nonidentical perturbations, Neurocomputing, 185 (2016), 242–253. doi: 10.1016/j.neucom.2015.11.094
[16]
X. Liu, H. Su, M. Z. Q. Chen, A switching approach to designing finite-time synchronization controllers of coupled neural networks, IEEE T. Neur. Lear., 27 (2016), 471–482. doi: 10.1109/TNNLS.2015.2448549
[17]
S. P. Bhat, D. S. Bernstein, Finite-time stability of continuous autonomous systems, SIAM J. Control Optim., 38 (2000), 751–766. doi: 10.1137/S0363012997321358
[18]
L. Wang, T. Dong, M. Ge, Finite-time synchronization of memristor chaotic systems and its application in image encryption, Appl. Math. Comput., 347 (2019), 293–305.
[19]
X. Cai, J. Wang, S. Zhong, K. Shi, Y. Tang, Fuzzy quantized sampled-data control for extended dissipative analysis of t-s fuzzy system and its application to wpgss-sciencedirect, J. Franklin I., 358 (2021), 1350–1375. doi: 10.1016/j.jfranklin.2020.12.002
[20]
L. Hua, H. Zhu, K. Shi, S. Zhong, Y. Tang, Y. Liu, Novel finite-time reliable control design for memristor-based inertial neural networks with mixed time-varying delays, IEEE T. Circuits-I, 68 (2018), 1599–1609.
[21]
G. Ji, H. Cheng, J. Yu, H. Jiang, Finite-time and fixed-time synchronization of discontinuous complex networks: A unified control framework design, J. Franklin I., 355 (2018), 4665–4685. doi: 10.1016/j.jfranklin.2018.04.026
[22]
X. Yang, J. Lam, D. W. C. Ho, Z. Feng, Fixed-time synchronization of complex networks with impulsive effects via non-chattering control, IEEE T. Automat. Contr., 62 (2017), 5511–5521. doi: 10.1109/TAC.2017.2691303
[23]
A. Polyakov, Nonlinear feedback design for fixed-time stabilization of linear control systems, IEEE T. Automat. Contr., 57 (2012), 2106–2110. doi: 10.1109/TAC.2011.2179869
[24]
X. Liu, D. W. C. Ho, Q. Song, J. Cao, Finite-/fixed-time robust stabilization of switched discontinuous systems with disturbances, Nonlinear Dynam., 90 (2017), 2057–2068. doi: 10.1007/s11071-017-3782-9
[25]
E. Jimenez-Rodriguez, J. D. Sanchez-Torres, A. G. Loukianov, On optimal predefined-time stabilization, Int. J. Robust Nonlin., 27 (2017), 3620–3642.
[26]
J. D. Sanchez-Torres, D. Gomez-Gutierrez, E. Lopez, A. G. Loukianov, A class of predefined-time stable dynamical systems, Int. J. Robust Nonlin., 35 (2018), i1–i29.
[27]
C. A. Anguiano-Gijon, A. J. Munoz-Vazquez, J. D. Sanchez-Torres, G. Romero-Galvan, F. Martinez-Reyes, On predefined-time synchronisation of chaotic systems, Chaos Soliton. Fract., 122 (2019), 172–178. doi: 10.1016/j.chaos.2019.03.015
[28]
J. D. Sanchez-Torres, A. J. Munoz-Vazquez, M. Defoort, R. Aldana-Lopez, D. Gomez-Gutierrez, Predefined-time integral sliding mode control of second-order systems, Int. J. Syst. Sci., (2020), 1–11. doi: 10.1080/00207721.2020.1815893.
[29]
A. J. Munoz-Vazquez, J. D. Sanchez-Torres, D. Michael, predefined-time sliding-mode control of fractionalorder systems, Asian J. Control, (2020). 1–9. doi: 10.1002/asjc.2447.
[30]
A. J. Munoz-Vazquez, G. Fernandez-Anaya, J. D. Sanchez-Torres, F. Melendeza-Vazquez, Predefined-time control of distributed-order systems, Nonlinear Dynam., 103 (2021), 2689–2700. doi: 10.1007/s11071-021-06264-y
[31]
A. J. Munoz-Vazquez, J. D. Sanchez-Torres, M. Defoort, S. Boulaaras, Predefined-time convergence in fractional-order systems, Chaos Soliton. Fract., 143 (2021), 110571–110576. doi: 10.1016/j.chaos.2020.110571
This article has been cited by:
1.
Qiaoping Li, Yu Chen, Kun Liang,
Predefined-time formation control of the quadrotor-UAV cluster’ position system,
2023,
116,
0307904X,
45,
10.1016/j.apm.2022.11.011
2.
Qiaoping Li, Yu Chen, Lingyuan Ma,
Predefined-time control of chaotic finance/economic system based on event-triggered mechanism,
2023,
8,
2473-6988,
8000,
10.3934/math.2023404
3.
Jingjing You, Abdujelil Abdurahman, Hayrengul Sadik,
Fixed/Predefined-Time Synchronization of Complex-Valued Stochastic BAM Neural Networks with Stabilizing and Destabilizing Impulse,
2022,
10,
2227-7390,
4384,
10.3390/math10224384
4.
Oscar Martínez-Fuentes, Aldo Jonathan Muñoz-Vázquez, Guillermo Fernández-Anaya, Esteban Tlelo-Cuautle,
Synchronization of fractional-order chaotic networks in Presnov form via homogeneous controllers,
2023,
90,
01679260,
71,
10.1016/j.vlsi.2023.01.007
5.
Xiuli Li, Huachang Miao,
Application of Artificial Intelligence Technology in Optimizing Control Parameters of Traffic Signal Group Systems,
2024,
20,
1548-3657,
1,
10.4018/IJIIT.355013
Qiaoping Li, Sanyang Liu. Predefined-time vector-polynomial-based synchronization among a group of chaotic systems and its application in secure information transmission[J]. AIMS Mathematics, 2021, 6(10): 11005-11028. doi: 10.3934/math.2021639
Qiaoping Li, Sanyang Liu. Predefined-time vector-polynomial-based synchronization among a group of chaotic systems and its application in secure information transmission[J]. AIMS Mathematics, 2021, 6(10): 11005-11028. doi: 10.3934/math.2021639
The origin of system (2.16) is globally asymptotically stable and there exists a finite time T(ξ0)≥0 satisfying {limt→T(ξ0)−ξ(t,ξ0)=0,t∈[0,T(ξ0))ξ(t,ξ0)≡0,t∈[T(ξ0),+∞)
The stabilization time T(ξ0) is finite, but is dependent on ξ0 and the upper bound cannot be estimated.
The origin of system (2.16) is finite-time stable and the settling-time function T(ξ0) is bounded, i.e., there exists a finite positive constant Tf such that T(ξ0)≤Tf,∀ξ0∈Rn.
Tf is independent of ξ0, however, it still depends on the control gains.
Predefined-time stability proposed in this work
The origin of system (2.16) is fixed-time stable and for an predefined time T∗≥0, it holds that {limt→T∗−ξ(t,ξ0)=0,t∈[0,T∗)ξ(t,ξ0)≡0,t∈[T∗,+∞),∀ξ0∈Rn.
T∗ can be predefined and not affected by ξ0 or other control gains.
The origin of system (2.16) is globally asymptotically stable and there exists a finite time T(ξ0)≥0 satisfying {limt→T(ξ0)−ξ(t,ξ0)=0,t∈[0,T(ξ0))ξ(t,ξ0)≡0,t∈[T(ξ0),+∞)
The stabilization time T(ξ0) is finite, but is dependent on ξ0 and the upper bound cannot be estimated.
The origin of system (2.16) is finite-time stable and the settling-time function T(ξ0) is bounded, i.e., there exists a finite positive constant Tf such that T(ξ0)≤Tf,∀ξ0∈Rn.
Tf is independent of ξ0, however, it still depends on the control gains.
Predefined-time stability proposed in this work
The origin of system (2.16) is fixed-time stable and for an predefined time T∗≥0, it holds that {limt→T∗−ξ(t,ξ0)=0,t∈[0,T∗)ξ(t,ξ0)≡0,t∈[T∗,+∞),∀ξ0∈Rn.
T∗ can be predefined and not affected by ξ0 or other control gains.
Algorithm 1 Black-white image encryption algorithm based on the proposed chaotic synchronization scheme.
1: A=imread('lena2.png');
2: [M, N, L]=size(A);
3: imshow(A);
4: A0=A;
5: % Encryption process:
6: Rm = randsample(M, M)';
7: Mchange = [1:1:M; Rm];
8: Rn = randsample(N, N)';
9: Nchange = [1:1:N; Rn];
10: A (Mchange(1, :), :) = A (Mchange(2, :), :);
11: A (:, Nchange(1, :)) = A (:, Nchange(2, :));
12: h=0.001; 13: fori=1:1:M∗Ndo 14: a1(i)= abs(P1((1000+i)∗h));
15: a2(i)= abs(P1((1200+i)∗h));
16: b1(i)= abs(P2((1000+i)∗h));
17: b2(i)= abs(P2((1200+i)∗h));
18: end for 19: n=1;A1=A; 20: fori=1:1:Mdo 21: forj=1:1:Ndo 22: if mod(n,2)==0then 23: k(n)= mod (floor(a1(n)∗104),256); 24: else 25: k(n)= mod (floor(a2(n)∗104),256) 26: end if 27: A1(i,j)= bitxor(A(i,j),k(n));
28: n=n+1; 29: end for 30: end for 31: A2 (:, Nchange(2, :)) = A2 (:, Nchange(1, :));
32: A2 (Mchange(2, :), :) = A2 (Mchange(1, :), :);
33: imshow(A1);
34: % Decryption process:
35: n=1;A2=A1; 36: fori=1:1:Mdo 37: forj=1:1:Ndo 38: if mod(n,2)==0then 39: k1(n)= mod (floor(b1(n)∗104),256);
40: else 41: k1(n)= mod (floor(b2(n)∗104),256) 42: end if 43: A2(i,j)= bitxor(A1(i,j),k1(n));
44: n=n+1; 45: end for 46: end for 47: imshow(A2);
Algorithm 2 Color image encryption algorithm based on the proposed chaotic synchronization scheme.
1: A=imread('lena1.png');
2: [M, N]=size(A);
3: imshow(A);
4: A0=A;
5: % Encryption process:
6: Rm = randsample(M, M)';
7: Mchange = [1:1:M; Rm];
8: Rn = randsample(N, N)';
9: Nchange = [1:1:N; Rn];
10: A (Mchange(1, :), :, :) = A (Mchange(2, :), :, :);
11: A (:, Nchange(1, :), :) = A (:, Nchange(2, :), :);
12: h=0.001; 13: fori=1:1:M∗Ndo 14: c1(i)= abs((P1((500+i)∗h));
15: c2(i)= abs(P1((1000+i)∗h));
16: d1(i)= abs(P2((500+i)∗h));
17: d2(i)= abs(P2((1000+i)∗h)); 18: end for 19: n=1; A1=A; 20: fori=1:1:Mdo 21: forj=1:1:Ndo 22: if mod(n,2)==0then 23: k(n)= mod (floor(c1(n)∗104.5),256); 24: else 25: k(n)= mod (floor(c2(n)∗104.5),256) 26: end if 27: A1(i,j,1)= bitxor(A(i,j,1),k(n));
28: A1(i,j,2)= bitxor(A(i,j,2),k(n));
29: A1(i,j,3)= bitxor(A(i,j,3),k(n));
30: n=n+1; 31: end for 32: end for 33: imshow(A1);
34: % Decryption process:
35: n=1;A2=A1; 36: fori=1:1:Mdo 37: forj=1:1:Ndo 38: if mod(n,2)==0then 39: k1(n)= mod (floor(d1(n)∗104.5),256); 40: else 41: k1(n)= mod (floor(d2(n)∗104.5),256) 42: end if 43: A2(i,j,1)= bitxor(A1(i,j,1),k1(n));
44: A2(i,j,2)= bitxor(A1(i,j,2),k1(n));
45: A2(i,j,3)= bitxor(A1(i,j,3),k1(n));
46: n=n+1; 47: end for 48: end for 49: A2 (:, Nchange(2, :), :) = A2 (:, Nchange(1, :), :);
50: A2 (Mchange(2, :), :, :) = A2 (Mchange(1, :), :, :);
51: imshow(A2);
Figure 1. 3D projections of the four chaotic systems involved in the simulations of this work
Figure 2. 3D projections of the vector-polynomial-based compound drive system with different coefficient matrices
Figure 3. 3D phase portraits of the vector-polynomial-function-based drive system
Figure 4. Trajectory of the synchronization error via predefined-time control technique with T∗=0.1
Figure 5. Trajectory of the synchronization error via predefined-time control technique with T∗=0.01
Figure 6. Trajectory of the synchronization error via fixed-time control technique
Figure 7. Framework of the chaotic secure transmission of dynamic signal
Figure 8. Comparison among the original, encrypted and decrypted signal via predefined-time control technique with T∗=0.01
Figure 9. State trajectories of the original signal s(t) and the decrypted signal ˆs(t) via predefined-time control technique with T∗=0.01
Figure 10. State trajectories of the original signal s(t) and the decrypted signal ˆs(t) via fixed-time control technique
Figure 11. Framework of the chaotic secure image transmission
Figure 12. Original image, encrypted image, decrypted image and their histograms of the black-white image with T∗=0.01
Figure 13. Original image, encrypted image, and decrypted image of the colour image with T∗=0.01
Figure 14. Histograms of original image, encrypted image, and decrypted image of the colour image via fixed-time control technology
Figure 15. Original image, encrypted image, decrypted image and their histograms of the black-white image via fixed-time control technology
Figure 16. Original image, encrypted image, and decrypted image of the colour image via fixed-time control technology