Research article

Predefined-time vector-polynomial-based synchronization among a group of chaotic systems and its application in secure information transmission

  • Received: 10 May 2021 Accepted: 18 July 2021 Published: 30 July 2021
  • MSC : 93C10

  • This article aims to improve the security and timeliness of chaotic synchronization scheme in chaotic secure information transmission. Firstly, a novel nonlinear synchronization scheme among multiple chaotic systems is defined based on vector polynomial to improve the complexity of the carrier signal, and then to enhance the attack resistance of the communication scheme. Secondly, a more flexible and accurate synchronization control technology is proposed so that the above vector-polynomial-based chaotic synchronization can be realized within a time that is predefined as a tunable control parameter. Subsequently, the theoretical derivation is carried out to prove the synchronization time in the above-mentioned synchronization control scheme can be set independently without being affected by the initial conditions or other control parameters. Finally, several simulation experiments on secure information transmission are presented to verify the efficiency and superiority of the designed chaotic synchronization scheme and synchronization control technology.

    Citation: Qiaoping Li, Sanyang Liu. Predefined-time vector-polynomial-based synchronization among a group of chaotic systems and its application in secure information transmission[J]. AIMS Mathematics, 2021, 6(10): 11005-11028. doi: 10.3934/math.2021639

    Related Papers:

    [1] Qike Zhang, Tao Xie, Wenxiang Fang . Fixed/predefined-time generalized synchronization for stochastic complex dynamical networks with delays. AIMS Mathematics, 2024, 9(3): 5482-5500. doi: 10.3934/math.2024266
    [2] Meng Li, Gulijiamali Maimaitiaili . New results on finite-time projective synchronization for memristor-based hybrid delayed BAM neural networks with applications to DNA image encryption. AIMS Mathematics, 2024, 9(4): 9822-9846. doi: 10.3934/math.2024481
    [3] Qiaoping Li, Yu Chen, Lingyuan Ma . Predefined-time control of chaotic finance/economic system based on event-triggered mechanism. AIMS Mathematics, 2023, 8(4): 8000-8017. doi: 10.3934/math.2023404
    [4] Shamsa Kanwal, Saba Inam, Fahima Hajjej, Ala Saleh Alluhaidan . Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryption. AIMS Mathematics, 2024, 9(11): 31217-31238. doi: 10.3934/math.20241505
    [5] Yuzhen Zhou, Erxi Zhu . A new image encryption based on hybrid heterogeneous time-delay chaotic systems. AIMS Mathematics, 2024, 9(3): 5582-5608. doi: 10.3934/math.2024270
    [6] Marouane Karim, Abdelfatah Kouidere, Mostafa Rachik, Kamal Shah, Thabet Abdeljawad . Inverse problem to elaborate and control the spread of COVID-19: A case study from Morocco. AIMS Mathematics, 2023, 8(10): 23500-23518. doi: 10.3934/math.20231194
    [7] Chao Ma, Tianbo Wang, Wenjie You . Master-slave synchronization of Lurie systems with time-delay based on event-triggered control. AIMS Mathematics, 2023, 8(3): 5998-6008. doi: 10.3934/math.2023302
    [8] Abdul Razaq, Louai A. Maghrabi, Musheer Ahmad, Qamar H. Naith . Novel substitution-box generation using group theory for secure medical image encryption in E-healthcare. AIMS Mathematics, 2024, 9(3): 6207-6237. doi: 10.3934/math.2024303
    [9] Kunting Yu, Yongming Li . Adaptive fuzzy control for nonlinear systems with sampled data and time-varying input delay. AIMS Mathematics, 2020, 5(3): 2307-2325. doi: 10.3934/math.2020153
    [10] Shuang Li, Xiao-mei Wang, Hong-ying Qin, Shou-ming Zhong . Synchronization criteria for neutral-type quaternion-valued neural networks with mixed delays. AIMS Mathematics, 2021, 6(8): 8044-8063. doi: 10.3934/math.2021467
  • This article aims to improve the security and timeliness of chaotic synchronization scheme in chaotic secure information transmission. Firstly, a novel nonlinear synchronization scheme among multiple chaotic systems is defined based on vector polynomial to improve the complexity of the carrier signal, and then to enhance the attack resistance of the communication scheme. Secondly, a more flexible and accurate synchronization control technology is proposed so that the above vector-polynomial-based chaotic synchronization can be realized within a time that is predefined as a tunable control parameter. Subsequently, the theoretical derivation is carried out to prove the synchronization time in the above-mentioned synchronization control scheme can be set independently without being affected by the initial conditions or other control parameters. Finally, several simulation experiments on secure information transmission are presented to verify the efficiency and superiority of the designed chaotic synchronization scheme and synchronization control technology.



    Along with the rapid development of mobile communication and Internet, as well as the rise of 5G network, the importance of information security is becoming more and more prominent. Due to its high nonlinearity, sensitivity to initial value and unpredictability of trajectory, chaotic system is especially suitable for constructing information encryption scheme with high security [1,2,3,4,5]. The realization of chaotic synchronization is the premise of the chaotic secure information transmission, therefore, it is of great significance to explore the chaotic synchronization scheme and synchronization control technique in depth [6,7,8,9,10,11].

    For the chaotic secure communication, the level of security is mainly determined by the complexity level of the carrier signal which is generated by the drive system. However, the drive system in most chaotic secure communication schemes is a single chaotic system. If the drive system is composed of multiple systems, the carrier signal will become more complex and more unpredictable for decryption. Inspired by the above discussion, R. Luo presented a new type of synchronization scheme-combined synchronization, in which the drive system was a linear combination of two different chaotic systems with the same dimension [12]. However, since only linear operations of vector were used, the nonlinear characteristics of the combined drive system did not change essentially. Recently, Q. Li proposed the compound synchronization, in which the multiplication operation of matrix was first applied in the formation of the driving signal, so as to enhance the nonlinearity of the drive system [13]. However, the above-mentioned compound synchronization only considered the multiplication of two matrices. It is noted that the polynomial operation is a generalization of the multiplication operation. Therefore, if the polynomial operation can be used to formulate the drive system, the complexity of the carrier signal will be significantly improved. This inspires this work.

    Notice the encrypted information will not be decoded until the synchronisation between the drive system and the response system is achieved. Fast synchronization is desired to prevent the loss of information during the initial phase of the secure communication. Therefore, finite-time chaotic synchronization emerged and a series of valuable research results have been obtained [14,15,16,17,18,19,20]. However, the synchronization time in finite-time chaotic synchronization has a strong dependence on the initial conditions. Recently, the concept called fixed-time chaotic synchronization has been developed to solve this problem, in which the synchronization time is uniformly bounded with respect to the initial conditions. Nevertheless, since the relationship between the control gains and the synchronization time is unclear, the synchronization time in fixed-time synchronization can not be accurately calculated [21,22,23,24]. With the continuous improvement of communication quality requirements, the designer would prefer to recover the encoded information within a predefined time according to the task requirements. Therefore, it is urgent to develop a novel concept of chaotic synchronization, in which the synchronization time can be predesigned off-line without being affected by the initial conditions or other system control gains [25,26,27,28,29,30,31]. This is anther goal for this work.

    According to the above analysis, this article is dedicated to the design of a novel predefined-time vector-polynomial-based synchronization among multiple chaotic systems and its application in secure information transmission. The rest of this work is arranged as follows. In Section 2, a novel chaotic synchronization scheme is defined in virtue of the vector polynomial. After that, a novel concept named predefined-time vector-polynomial-based synchronization is proposed. In Section 3, a predefined-time synchronization control algorithm is designed to realize the above synchronization. In Section 4, a numerical simulation is presented to illustrate the validity of the above synchronization control algorithm. In Section 5, the proposed chaotic synchronisation scheme is applied in the information secure transmission to demonstrate its feasibility and superiority. Finally, Section 6 concludes this article.

    The proposed approach includes two main contributions:

    Firstly, based on the concept of vector polynomial, the vector-polynomial-based synchronization scheme is presented, in which, the drive system is a compound chaotic system which is composed of several chaotic systems by linear operation and polynomial operation. Compared with other chaotic synchronization schemes, the compound drive system in this scheme has more complex topology and less predictable chaotic path, which means that it has stronger anti-attack capability in secure information transmission. Moreover, the complexity of the compound drive system in this synchronization scheme can be changed by adjusting the coefficient or the degree of the vector polynomial.

    Secondly, the synchronization time can be set off-line by the designer in advance without estimation, which is of more practical value.

    In this section, some important concepts of chaotic synchronization will be described in details, and the relevant preliminaries will be listed.

    Consider the nonlinear chaotic synchronization problem among M drive systems and one response system. The dynamics of the j-th basic drive system is described by

    {˙ξj,1(t)=Qj,1(ξj(t))φj+qj,1(ξj(t)),˙ξj,2(t)=Qj,2(ξj(t))φj+qj,2(ξj(t)),˙ξj,n(t)=Qj,n(ξj(t))φj+qj,1(ξj(t)),j=1,2,,M. (2.1)

    Correspondingly, the response system is of the form

    {˙w1(t)=R1(w(t))ψ+r1(w(t))+u1(t),˙w2(t)=R2(w(t))ψ+r2(w(t))+u2(t),˙wn(t)=Rn(w(t))ψ+rn(w(t))+un(t), (2.2)

    where ξj=(ξj,1,ξj,2,,ξj,n)T and w=(w1,w2,,wn)TRn denote the state vectors for the j-th basic drive system and the response system, respectively, Qj,i(ξj(t)) and Ri(w(t)) denote the i-th rows of the linear functional matrices Qj(ξj(t)) and R(w(t))Rn×n, respectively, qj,i(ξj(t)) and ri(w(t)) are continuous nonlinear functions, φj=(φj,1,φj,2,,φj,n)T and ψ=(ψ1,ψ2,,ψn)TRn refer to system parameter vectors, the vector u=(u1,u2,,un)TRn is the control input.

    Definition 1. For vector υ=(υ1,υ2,,υn)TRn and constant lZ+, a novel lth power of υ is defined as

    υ<l>=(υl1,υl2,,υln)T, (2.3)

    based on which, a novel vector polynomial with degree NZ+ is defined as

    PN(υ)=Nl=1Dlυ<l>, (2.4)

    where Dl=diag{dl,1,,dl,n}Rn×n denotes the coefficient matrix.

    Definition 2. (Vector-polynomial-based synchronization) The set of chaotic systems (2.1)–(2.2) are said to be vector-polynomial-based synchronization, if

    limtNl=1Dl(Mj=1Ajξj(t))<l>Λ(t)w(t)=0, (2.5)

    where Aj and DlRn×n refer to the coefficient matrices, Λ(t)=diag{λ1(t),,λn(t)} denotes the scaling matrix, whose elements are bounded and continuously differentiable non-zero functions.

    Denote

    χ(ξ1,,ξM)=Mj=1Ajξj(t),
    PN(χ)=Nl=1Dlχ<l>(ξ1,,ξM),

    then, (2.5) is reduced to

    limtPN(χ)Λ(t)w(t)=0. (2.6)

    If this is the case, PN(χ) is called a compound drive system.

    In order to facilitate the reader to understand, we take the case of M=3 as an example for detailed analysis. In this case, the three basic drive systems are specifically described as

    {˙x1(t)=F1(x(t))θ+f1(x(t)),˙x2(t)=F2(x(t))θ+f2(x(t)),˙xn(t)=Fn(x(t))θ+fn(x(t)), (2.7)
    {˙y1(t)=G1(y(t))ϕ+g1(y(t))˙y2(t)=G2(y(t))ϕ+g2(y(t))˙yn(t)=Gn(y(t))ϕ+gn(y(t)) (2.8)
    {˙z1(t)=H1(z(t))η+h1(z(t)),˙z2(t)=H2(z(t))η+h2(z(t)),˙zn(t)=Hn(z(t))η+hn(z(t)). (2.9)

    Then, Definition 2 can be rewritten as

    Definition 3. The set of chaotic systems (2.7)–(2.9) and (2.2) are said to be vector-polynomial-based synchronization, if

    limtNl=1Dl(Ax(t)+By(t)+Cz(t))<l>Λ(t)w(t)=0. (2.10)

    Denote

    χ(x,y,z)=Ax(t)+By(t)+Cz(t), (2.11)
    PN(χ)=Nl=1Dlχ<l>(x,y,z), (2.12)

    then, (2.6) is reduced to

    limtPN(χ)Λ(t)w(t)=0. (2.13)

    Remark 4. As shown in Table 1, the vector-polynomial-based synchronization covers most of the existing chaotic synchronization schemes. The proposed synchronization scheme will be transformed into different specific ones as different parameters are selected. In Table 1, Λ=diag{λ1,,λn}n×n refers to a constant diagonal matrix, and In×n denotes a unit matrix.

    Table 1.  Comparison among the vector-polynomial-based synchronization and other existing ones.
    Parameter setting Name of synchronization scheme Definition of synchronization error
    Vector-polynomial-based synchronization e(t)=Nl=1Dl(Mj=1Ajξj(t))<l>Λ(t)w(t)
    Case 1 M=3 Vector-polynomial-based synchronization with M=3 e(t)=Nl=1Dl(Ax(t)+By(t)+Cz(t))<l> Λ(t)w(t)
    Case 2 M=3,N=1,D=I,C=0,Λ(t)=Λ Combined synchronization e(t)=Ax(t)+By(t)Λw(t)
    Case 3 M=3,N=1,A=D=I,B=C=0 Modified function projective synchronization e(t)=x(t)Λ(t)w(t)
    Case 4 M=3,N=1,A=D=I,B=C=0,Λ(t)=Λ Projective synchronization e(t)=x(t)Λw(t)
    Case 5 M=3,N=1,B=C=0,A=D=Λ(t)=I Complete synchronization e(t)=x(t)w(t)
    Case 6 M=3,N=1,B=C=0,A=D=Λ(t)=I Anti-synchronization e(t)=x(t)+w(t)

     | Show Table
    DownLoad: CSV

    Remark 5. In chaotic secure communication, the more complex the carrier signal is, the stronger the attack resistance of the secure communication scheme is. Definition 3 shows that, x(t),y(t) and z(t) generate a new vector χ=Ax(t)+By(t)+Cz(t) by linear operation, and then χ(t) generates another vector PN(χ)=Nl=1Dlχ<l> by polynomial operation. Therefore, the compound vector PN(χ) has more complex nonlinear features. From the theoretical perspective, the geometric path of the vector-polynomial-based compound drive system PN(χ((x,y,z))) is more difficult to predict. Moreover, the complexity of PN(χ((x,y,z))) can be improved by increasing the degree N. Furthermore, different compound drive systems can be obtained by selecting different coefficient matrices Dl for the fixed χ(x,y,z) and N, which indicates the synchronization scheme (2.6) is more flexible.

    For instance, when we select the following three sets of different coefficient matrices for the basic drive systems (2.7)–(2.9), the corresponding 3D projections of the vector-polynomial-based compound drive system PN(χ((x,y,z))) are shown in Figure 2(a), (b) and (c), respectively.

    Figure 1.  3D projections of the four chaotic systems involved in the simulations of this work.
    Figure 2.  3D projections of the vector-polynomial-based compound drive system with different coefficient matrices.

    Case a:

    D1=105diag{20,6,3},D2=105diag{5,9,10},D3=105diag{3,0.5,8},

    Case b:

    D1=105diag{5,12,6},D2=105diag{4,2,2},D3=105diag{10,3,1},

    Case c:

    D1=105diag{5,1,10},D2=105diag{16,6,5},D3=105diag{4,8,2}.

    The comparison of Figures 1 and 2 shows that, the chaotic topology of the compound system is more complex than that of the three basic drive systems.

    Denote the synchronization error among the set of chaotic systems (2.7)–(2.9) and (2.2) as below:

    e(t)=PN(χ)Λ(t)w(t),

    or

    ei(t)=PN,i(χ)λi(t)wi(t)=Nl=1dl,iχliλi(t)wi(t)

    where

    χi=Aix(t)+Biy(t)+Ciz(t),

    Ai, Bi, and Ci denote the ith row of the matrixes A,B and C, respectively. i=1,2,,n.

    Since

    ˙χi=Ai˙x(t)+Bi˙y(t)+Ci˙z(t)=Ai(F(x)θ+f(x))+Bi(G(y)ϕ+g(y))+Ci(H(z)η+h(z)),

    it follows that

    ˙PN,i(χ)=Nl=1ldl,iχl1i˙χi=Nl=1ldl,iχl1i(Ai˙x(t)+Bi˙y(t)+Ci˙z(t)).

    Then, the error dynamic system among the chaotic systems (2.7)-(2.9) and (2.2) is obtained as below

    ˙ei(t)=˙PN,i(χ)˙λiwi(t)λi˙wi(t), (2.14)

    that is

    ˙ei(t)=Nl=1ldl,iχl1i(Ai(F(x)θ+f(x))+Bi(G(y)ϕ+g(y))+Ci(H(z)η+h(z)))˙λiwi(t)λi(Ri(w)ψ+ri(w))λiui(t). (2.15)

    Before defining the concept of predefined-time synchronization, let us review some related concepts and properties.

    Consider the nonlinear dynamical system

    ˙ξ(t)=ϑ(t,ξ;φ),t[0,+) (2.16)

    in which χRn represents the system state, φRm denotes the system parameter. The origin 0Rn is assumed to be an equilibrium point for the system (2.16), i.e., ϑ(0,ξ0;φ)=0. The initial condition is represented as ξ0=ξ(0).

    Definition 6. (Predefined-time stability) [26]. For a predefined constant T>0, the origin of (2.16) is said to be globally predefined-time stable, if it holds for all the initial states ξ0 that

    {limtTξ(t,ξ0)=0,t[0,T)ξ(t,ξ0)0,t[T,+) (2.17)

    If this is the case, T is called a predefined time.

    Remark 7. As shown in Table 2, for the four stabilities involved, the accuracy of the settling-time is gradually enhanced in turn, and the predefined-time stability can be regarded as a upgrade of the other three. Furthermore, the settling-time T for predefined-time stability can be pre-specified without being affected by the initial condition ξ0 or other system parameter φ, thus it can be set freely and has more practical value.

    Table 2.  Comparison among the predefined-time stability and other existing ones.
    Concept Definition Characteristic
    Asymptotically stability The origin of system (2.16) complies with limtξ(t,ξ0)=0. The length of the stabilization time is unknown and may be infinite.
    Finite-time stability [17] The origin of system (2.16) is globally asymptotically stable and there exists a finite time T(ξ0)0 satisfying
    {limtT(ξ0)ξ(t,ξ0)=0,t[0,T(ξ0))ξ(t,ξ0)0,t[T(ξ0),+)
    The stabilization time T(ξ0) is finite, but is dependent on ξ0 and the upper bound cannot be estimated.
    Fixed-time stability [23] The origin of system (2.16) is finite-time stable and the settling-time function T(ξ0) is bounded, i.e., there exists a finite positive constant Tf such that
    T(ξ0)Tf,ξ0Rn.
    Tf is independent of ξ0, however, it still depends on the control gains.
    Predefined-time stability proposed in this work The origin of system (2.16) is fixed-time stable and for an predefined time T0, it holds that
    {limtTξ(t,ξ0)=0,t[0,T)ξ(t,ξ0)0,t[T,+),ξ0Rn.
    T can be predefined and not affected by ξ0 or other control gains.

     | Show Table
    DownLoad: CSV

    Lemma 8. [24] For the dynamic system (2.16), if there exists a radially unbounded Lyapunov function V:RnR that complies to

    ˙V(μ1Vε1+μ2Vε2),ξRn0

    where μ1(0,+), μ2(0,+), ε1(1,+) and ε2[0,1) are given constants.

    Then, the origin of system (2.16) is fixed-time stable and an upper bound of settling-time function T(ξ0) is estimated as

    Tf=1μ1(ε11)+1μ2(1ε2),ξ0Rn0. (2.18)

    Remark 9. From Lemma 8 one can see that, for the fixed-time stability, the the upper bound Tf of the setting-time function T(ξ0) does not depend on the initial condition. Nevertheless, the relationship between Tf and the control gains is unclear. For several engineering application, such as chaos synchronization, it is required that the synchronization time can be set independently as a user-defined parameter.

    Lemma 10. [27] Let T>0 be a predefined constant. If there exists a radially unbounded Lyapunov function V:RnR for the system (2.16), such that

    ˙V1αTexp(Vα)V1α,α(0,1],

    for any ξRn0.

    Then, the origin of system (2.16) is predefined-time stable with T as the predefined time.

    Combining the concepts of predefined-time stability and vector-polynomial-based synchronization, now we propose the following important definition.

    Definition 11. (Predefined-time vector-polynomial-based synchronization) The set of chaotic systems (2.7)–(2.9) and (2.2) are said to be predefined-time vector-polynomial-based synchronization, if the origin of the synchronization error system (2.15) is predefined-time stable with T>0 as the predefined time, i.e.,

    {limtTei(t)=0,t[0,T)ei(t)0,t[T,+) (2.19)

    where i=1,2,,n.

    In this case, T is called the predefined synchronization time.

    To realize the predefined-time vector-polynomial-based synchronization among the set of chaotic systems (2.7)–(2.9) and (2.2), the following synchronization controller is designed,

    ui(t)=1λi(t)(121ααTexp(ei(t)2α2α)sign(ei(t))|ei|12α+Ωi)i=1,2,,n. (3.1)

    in which, T is the tunable predefined synchronization time, α(0,0.5)(0.5,1] is a control parameter,

    Ωi=Nl=1ldl,iχl1i(Ai(F(x)θ+f(t))+Bi(G(y)ϕ+g(y))+Ci(H(z)η+h(z)))λi(t)(Ri(w)ψ+ri(w))˙λi(t)wi(t). (3.2)

    Theorem 12. If the synchronization controller (3.1) is adopted, then the predefined-time vector-polynomial-based synchronization among the set of chaotic systems (2.7)–(2.9) and (2.2) will be achieved with T>0 as the predefined synchronization time.

    Proof. Choose the following Lyapunov function

    Vi(t)=12e2i(t),i=1,2,,n. (3.3)

    According to the definition of Ωi, the synchronization error dynamic system (2.15) can be simplified as

    ˙ei(t)=Ωiλi(t)ui(t). (3.4)

    Taking the derivative of Vi(t) along (2.15), it can be derived that

    ˙Vi(t)=ei(t)˙ei(t)=ei(t)(Ωiλi(t)ui(t))=ei(t)(Ωi121ααTexp(e2αi2α)sign(ei(t))|ei(t)|12αΩi)=121ααTexp(ei(t)2α2α)|ei(t)|22α=1αTexp(Vαi)V1αi. (3.5)

    Hence, it follows from Lemma 10 that each element ei(t) of the synchronization error vector e(t) will converge to zero before the predefined time T, which means the predefined-time vector-polynomial-based synchronization among the chaotic systems (2.7)–(2.9) and (2.2) will be achieved with T as the predefined synchronization time.

    Similarly, if we define the synchronization error among the M+1 chaotic systems (2.1) and (2.2) as

    e(t)=PN(χ)Λ(t)w(t)=Nl=1Dlχ<l>(x1,,xM)Λ(t)w(t), (3.6)

    in which, χ(x1,,xM)=Mj=1Ajxj(t).

    Then the result of Theorem 12 can be generalized as below.

    Theorem 13. For a predefined time T>0, if the following synchronization controller is adopted

    ui(t)=1λi(t)(121ααTexp(ei(t)2α2α)sign(ei(t))|ei(t)|12α+Ωi),α(0,0.5)(0.5,1]i=1,2,,n, (3.7)

    in which

    Ωi=Nl=1ldl,iχl1i(Mj=1(Aj,i(Fj(xj)θj+fj(t)))˙λi(t)wi(t)λi(t)(Ri(w)ψ+ri(w)), (3.8)

    χi and ei(t) refer to the i-th elements of vectors χ(x1,,xM) and e(t), respectively, Aj,i represents the i-th row of the matrix Aj.

    Then, the predefined-predefined vector-polynomial-based synchronization among the M+1 chaotic systems (2.1) and (2.2) will be achieved with T as the predefined synchronization time.

    Proof. The proof process is similar to that of Theorem 12 and is omitted here.

    In this section, an illustrative numerical example is given to highlight the properties of the chaotic synchronization scheme and synchronization control technology. The chaotic systems involved in this example are given as below.

    The first basic drive system (Lorenze system)

    (˙x1˙x2˙x3)=(x2x13x100x2000x3)F(x(t))(1018/3)θ+(0x1x3x1x2)f(x(t)), (4.1)

    The second basic drive system (Rössler system)

    (˙y1˙y2˙y3)=(y2y3y100y2000y3)G(y(t))(10.25.7)ϕ+(00y1y3+0.2)g(y(t)), (4.2)

    The third basic drive system (Liu system)

    (˙z1˙z2˙z3)=(z2z1000z1000z3)H(z(t))(10402.5)η+(0z1z34z21)h(z(t)), (4.3)

    The response system (Lü system)

    (˙w1˙w2˙w3)=(w2w1000w2000w3)R(w(t))(36203)ψ+(0w1w3w1w2)r(w(t)). (4.4)

    When the initial states are set as x(0)=(0.1,0.1,0.1)T, y(0)=(1,1,2)T, z(0)=(2,0.5,1)T and w(0)=(1.2,2,4)T, the project curves of the above four chaotic systems are shown in Figure 1.

    According to Definition 11, the predefined-time synchronization objective in this simulation can be described as

    {limtTe(t)=limtTPN(χ)Λ(t)w(t),ift<Te(t)=PN(χ)Λ(t)w(t)0,iftT (4.5)

    where T>0 denotes the predefined synchronization time, χ=Ax(t)+By(t)+Cz(t) refers to a combined chaotic system generated by the three basic drive systems with the following combined coefficients,

    A=(123212302),B=(20.21031413),C=(2300.20.51.512.52).

    Meanwhile, the coefficient matrices in PN(χ) and the synchronization scaling matrix are taken as

    D1=diag{8,8,8},D2=diag{0.2,0.2,0.2},D3=diag{2×105,2×105,2×105},Λ(t)=diag{20.5cost,10.4sin2t,2+cos3t}.

    When the simulation time is taken as 400 seconds, the phase portraits of the combined chaotic signal Ax+By+Cz and the compound chaotic signal PN(Ax+By+Cz) are displayed in Figure 3. Comparing Figure 3 with Figure 1, it is appreciable that, the trajectory of the compound chaotic signal PN(Ax+By+Cz) is more complex.

    Figure 3.  3D phase portraits of the vector-polynomial-function-based drive system.

    Now we appoint the predefined synchronization time as T=0.1, and carry out the chaotic synchronization simulation under the predefined-time synchronization controller (3.1) with α=0.2. The simulation result displayed by Figure 4 implies that, the synchronization error ei(t) converges to zero before the predefined time T=0.1, which shows the effectiveness of the proposed synchronization control technique.

    Figure 4.  Trajectory of the synchronization error via predefined-time control technique with T=0.1.

    Subsequently, we reset the predefined synchronization time T to 0.01 and carry out the predefined-time synchronization simulation again. As shown in Figure 5, the synchronization among the chaotic systems (4.1)–(4.4) is still achieved successfully before the predefined time T=0.01, which verifies the flexibility of the proposed predefined-time synchronization controller.

    Figure 5.  Trajectory of the synchronization error via predefined-time control technique with T=0.01.

    Next, we replace the predefined-time controller (3.1) in the above chaotic synchronization simulation with the following fixed-time controller presented in [24],

    ˉui(t)=1λi(t)(Ωi+μ1sign(ei(t))|ei(t)|2ε112ε1+μ2sign(ei(t))|ei(t)|2ε212ε2),i=1,2,,n (4.6)

    where ε1=1.1, ε2=0.9, μ1=2, μ2=3, and Ωi is defined by (3.2).

    Constructing the following Lyapunov function

    ˉVi(t)=12ei2(t),

    it can be derived

    ˙ˉVi(μ1(ˉVi)ε1+μ2(ˉVi)ε2).

    By virtue of Lemma 8, the synchronization among chaotic systems (4.1)–(4.4) can be achieved. The corresponding simulation result is shown in Figure 6. Comparing Figure 6 with Figures 4 and 5, one can see that, the synchronization accuracy and synchronization rate under the fixed-time controller (4.6) are obviously inferior to that under the predefined-time controller. This further verifies the superiority of the proposed predefined-time synchronization control technique.

    Figure 6.  Trajectory of the synchronization error via fixed-time control technique.

    In this section, several chaotic secure communication experiments will be carried out to illustrate the feasibility of the proposed synchronization scheme.

    The chaotic systems, synchronization schemes, synchronization control techniques and related parameters involved in the following experiments are the same as those given in Section 4. Meanwhile, the predefined synchronization time is set to T=0.01.

    The framework of chaotic secure transmission of dynamic signal is depicted by Figure 7, while the corresponding communication principle is explained as follows:

    Figure 7.  Framework of the chaotic secure transmission of dynamic signal.

    At the sender end, chaotic signals x(t),y(t) and z(t) generate a new chaotic signal PN(χ(x,y,z)) as the carrier signal by means of algebraic polynomial operation. Subsequently, according to the specified encryption scheme, the carrier signal PN(χ(x,y,z)) and the original signal s(t) are modulated into another nonlinear signal m(t), which will be transmitted through the transmission channel. At the receiver end, the receiver realizes the predefined-time synchronization among the response and the drive systems via the controller u(t) and further reverses the carrier signal as ˆPN(χ(x,y,z)). Finally, the original signal is recovered as ˆs(t) via the decryption scheme.

    The original dynamic signal in this simulation experiment is given as

    s(t)={0,t[2(k1),2k1)5,t[2k1,2k),k=1,2,.

    During the encryption process, the signal modulation scheme is designed as

    m(t)=s(t)+κPN(χ(x,y,z)), (5.1)

    where κ=(0.1,0.2,0.1)T.

    As shown in Figure 8, the encrypted signal m(t) based on the signal modulation scheme (5.1) is more complex and more difficult to predict than the original signal s(t), which indicates that the original signal can be well hidden during the transmission process.

    Figure 8.  Comparison among the original, encrypted and decrypted signal via predefined-time control technique with T=0.01.

    During the decryption process, the following decrypted signal is obtained by using the secret keys including the signal modulation scheme (5.1) and the chaotic synchronization scheme (4.5)

    ˆs(t)=m(t)κˆPN(χ(x,y,z)), (5.2)

    where ˆPN(χ(x,y,z)=Λ(t)w(t).

    As shown in Figure 9, the decrypted dynamic signal ˆs(t) can restore the original dynamic signal s(t) accurately as tT=0.01.

    Figure 9.  State trajectories of the original signal s(t) and the decrypted signal ˆs(t) via predefined-time control technique with T=0.01.

    Meanwhile, comparing Figure 9 with the simulation result (shown in Figure 10) based on the fixed-time synchronization controller (4.6), one can see that, the decoding time under the proposed predefined-time synchronization scheme is much shorter. Moreover, the decoding time via the proposed predefined-time synchronization control scheme can be set in advance according to the user's requirements, so it is more flexible.

    Figure 10.  State trajectories of the original signal s(t) and the decrypted signal ˆs(t) via fixed-time control technique.

    The framework of chaotic secure image transmission based on the proposed chaotic synchronization scheme is shown in Figure 11. The corresponding image encryption algorithms for the black-white image and the color image are described by Algorithm 1 and Algorithm 2, respectively. In the process of the chaotic secure image transmission, the discrete chaotic sequences applied in Algorithm 1 and Algorithm 2 are coded by

    a1(i)=|P1((1000+i)h)|,a2(i)=|P1((1200+i)h)|,b1(i)=|P2((1000+i)h)|,b2(i)=|P2((1200+i)h)|,
    Figure 11.  Framework of the chaotic secure image transmission.

    and

    c1(i)=|P1((500+i)h)|,c2(i)=|P1((1000+i)h)|,d1(i)=|P2((500+i)h)|,d2(i)=|P2((1000+i)h)|,

    in which, h=0.001 is the sampling interval, P1(t)=κPNχ(x(t),y(t),z(t)), P2(t)=κΛ(t)w(t), κ=(0.1,0.2,0.1)T, and i=1,2,,MN.

    During the secure image transmission process, the black-white image (Figure 12(a)) and the color image (Figure 12(a)) of the famous image named Lena are selected as the original images, respectively. The simulation results are shown in Figures 1214, from which one can see that, high precision image security transmission is realized between the generator and the receiver via the proposed predefined-time chaotic synchronization scheme.

    Figure 12.  Original image, encrypted image, decrypted image and their histograms of the black-white image with T=0.01.
    Figure 13.  Original image, encrypted image, and decrypted image of the colour image with T=0.01.
    Figure 14.  Histograms of original image, encrypted image, and decrypted image of the colour image via fixed-time control technology.

    As shown in Figures 15 and 16, when the predefined-time controller (3.1) applied in the above image transmission scheme is replaced by the fixed-time controller (4.6), the encrypted image can not be successfully recovered. This further proves the validity and superiority of the proposed predefined-time chaotic synchronization control technique.

    Figure 15.  Original image, encrypted image, decrypted image and their histograms of the black-white image via fixed-time control technology.
    Figure 16.  Original image, encrypted image, and decrypted image of the colour image via fixed-time control technology.

    In this work, a novel predefined-time vector-polynomial-based synchronization scheme for multiple chaotic systems has been proposed and applied in the secure communication of digital signal and image. Both the theoretical and experimental results indicated that, the proposed synchronization scheme can improve the anti-decoding ability of the chaotic secure communication significantly, meanwhile the designed synchronization control technique can improve the decoding speed of the secure transmission effectively. Reliable control and sample-date control are two novel and effective control techniques [19,20]. Therefore, in our future works, we will consider combining the above control methods with the predefined-time control technique to design two new control techniques "predefined-time reliable control" and "predefined-time sample-date control", which will be meaningful. In addition, it will be also interesting to extend the results in this work to the fractional-order chaotic systems.

    The research is supported by the National Natural Science Foundation of China with Grant No. 61877046, the Key Science and Technology Projects in Henan Province with Grant No. 212102210552, and the Key Scientific Research Projects of Higher Education Institutions in Henan Province with Grant No. 19B110006. Thanks for the editor and reviewers.

    The authors declare that there is no conflict of financial interests regarding the publication of this paper.

    Algorithm 1 Black-white image encryption algorithm based on the proposed chaotic synchronization scheme.
    1: A=imread('lena2.png');
    2: [M, N, L]=size(A);
    3: imshow(A);
    4: A0=A;
    5: % Encryption process:
    6: Rm = randsample(M, M)';
    7: Mchange = [1:1:M; Rm];
    8: Rn = randsample(N, N)';
    9: Nchange = [1:1:N; Rn];
    10: A (Mchange(1, :), :) = A (Mchange(2, :), :);
    11: A (:, Nchange(1, :)) = A (:, Nchange(2, :));
    12: h=0.001;
    13: for i=1:1:MN do
    14:  a1(i)= abs(P1((1000+i)h));
    15:  a2(i)= abs(P1((1200+i)h));
    16:  b1(i)= abs(P2((1000+i)h));
    17:  b2(i)= abs(P2((1200+i)h));
    18: end for
    19: n=1;A1=A;
    20: for i=1:1:M do
    21:  for j=1:1:N do
    22:    if mod(n,2)==0 then
    23:       k(n)= mod (floor(a1(n)104),256);
    24:    else
    25:       k(n)= mod (floor(a2(n)104),256)
    26:    end if
    27:     A1(i,j)= bitxor(A(i,j),k(n));
    28:     n=n+1;
    29:  end for
    30: end for
    31: A2 (:, Nchange(2, :)) = A2 (:, Nchange(1, :));
    32: A2 (Mchange(2, :), :) = A2 (Mchange(1, :), :);
    33: imshow(A1);
    34: % Decryption process:
    35: n=1;A2=A1;
    36: for i=1:1:M do
    37:  for j=1:1:N do
    38:    if mod(n,2)==0 then
    39:       k1(n)= mod (floor(b1(n)104),256);
    40:     else
    41:       k1(n)= mod (floor(b2(n)104),256)
    42:     end if
    43:     A2(i,j)= bitxor(A1(i,j),k1(n));
    44:     n=n+1;
    45:  end for
    46: end for
    47: imshow(A2);

     | Show Table
    DownLoad: CSV

     

    Algorithm 2 Color image encryption algorithm based on the proposed chaotic synchronization scheme.
    1: A=imread('lena1.png');
    2: [M, N]=size(A);
    3: imshow(A);
    4: A0=A;
    5: % Encryption process:
    6: Rm = randsample(M, M)';
    7: Mchange = [1:1:M; Rm];
    8: Rn = randsample(N, N)';
    9: Nchange = [1:1:N; Rn];
    10: A (Mchange(1, :), :, :) = A (Mchange(2, :), :, :);
    11: A (:, Nchange(1, :), :) = A (:, Nchange(2, :), :);
    12: h=0.001;
    13: for i=1:1:MN do
    14:  c1(i)= abs((P1((500+i)h));
    15:  c2(i)= abs(P1((1000+i)h));
    16:  d1(i)= abs(P2((500+i)h));
    17:  d2(i)= abs(P2((1000+i)h));
    18: end for
    19: n=1; A1=A;
    20: for i=1:1:M do
    21:  for j=1:1:N do
    22:    if mod(n,2)==0 then
    23:      k(n)= mod (floor(c1(n)104.5),256); 24:    else
    25:       k(n)= mod (floor(c2(n)104.5),256)
    26:    end if
    27:     A1(i,j,1)= bitxor(A(i,j,1),k(n));
    28:     A1(i,j,2)= bitxor(A(i,j,2),k(n));
    29:     A1(i,j,3)= bitxor(A(i,j,3),k(n));
    30:     n=n+1;
    31:     end for
    32: end for
    33: imshow(A1);
    34: % Decryption process:
    35: n=1;A2=A1; 36: for i=1:1:M do
    37:  for j=1:1:N do
    38:    if mod(n,2)==0 then
    39:       k1(n)= mod (floor(d1(n)104.5),256);
    40:    else
    41:       k1(n)= mod (floor(d2(n)104.5),256)
    42:    end if
    43:     A2(i,j,1)= bitxor(A1(i,j,1),k1(n));
    44:     A2(i,j,2)= bitxor(A1(i,j,2),k1(n));
    45:     A2(i,j,3)= bitxor(A1(i,j,3),k1(n));
    46:     n=n+1; 47:  end for 48: end for
    49: A2 (:, Nchange(2, :), :) = A2 (:, Nchange(1, :), :);
    50: A2 (Mchange(2, :), :, :) = A2 (Mchange(1, :), :, :);
    51: imshow(A2);

     | Show Table
    DownLoad: CSV


    [1] X. Chai, J. Zhang, Z. Gan, Y. Zhang, Medical image encryption algorithm based on latin square and memristive chaotic system, Multimed Tools Appl., 78 (2019), 35419–35453. doi: 10.1007/s11042-019-08168-x
    [2] J. He, B. Lai, A novel 4d chaotic system with multistability: Dynamical analysis, circuit implementation, control design, Mod. Phys. Lett. B, 33 (2019), 1950240.
    [3] S. Zhang, Y. Zeng, Z. Li, M. Wang, L. Xiong, Generating one to four-wing hidden attractors in a novel 4d no-equilibrium chaotic system with extreme multistability, Chaos, 28 (2018), 013113. doi: 10.1063/1.5006214
    [4] Q. Li, S. Liu, Switching event-triggered network synchronization for chaotic systems with different dimensions, Neurocomputing, 311 (2018), 32–40. doi: 10.1016/j.neucom.2018.05.039
    [5] C. Wang, R. Chu, J. Ma, Controlling a chaotic resonator by means of dynamic track control, Complexity, 21 (2015), 370–378. doi: 10.1002/cplx.21572
    [6] A. Mansouri, X. Wang, A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme, Inf. Sci., 520 (2020), 46–62. doi: 10.1016/j.ins.2020.02.008
    [7] U. E. Kocamaz, S. Cicek, Y. Uyaroglu, Secure communication with chaos and electronic circuit design using passivity-based synchronization, J. Circuit. Syst. Comp., 27 (2018), 1850057. doi: 10.1142/S0218126618500573
    [8] Q. Li, S. Liu, Y. Chen, Combination event-triggered adaptive networked synchronization communication for nonlinear uncertain fractional-order chaotic systems, Appl. Math. Comput., 333 (2018), 521–535.
    [9] Y. Yang, L. Wang, S. Duan, L. Luo, Dynamical analysis and image encryption application of a novel memristive hyperchaotic system, Opt. Laser Technol., 133 (2021), 106553. doi: 10.1016/j.optlastec.2020.106553
    [10] Z. Yang, D. Liang, D. Ding, Y. Hu, Dynamic behavior of fractional-order memristive time-delay system and image encryption application, Mod. Phys. Lett. B, 35 (2021), 2150271. doi: 10.1142/S0217984921502717
    [11] X. Wang, Y. Su, Image encryption based on compressed sensing and dna encoding, Signal Process-Image, 95 (2021), 116246. doi: 10.1016/j.image.2021.116246
    [12] R. Luo, Y. Wang, Finite-time stochastic combination synchronization of three different chaotic systems and its application in secure communication, Chaos, 22 (2012), 023109. doi: 10.1063/1.3702864
    [13] Q. Li, S. Liu, Y. Chen, Finite-time adaptive modified function projective multi-lag generalized compound synchronization for multiple uncertain chaotic systems, Int. J. Ap. Math. Com-pol, 28 (2018), 613–624.
    [14] A. J. Munoz-Vazquez, J. D. Sanchez-Torres, C. A. Anguiano-Gijon, Single-channel predefined-time synchronisation of chaotic systems, Asian J. Control, 23 (2021), 190–198. doi: 10.1002/asjc.2234
    [15] Y. Li, X. Yang, L. Shi, Finite-time synchronization for competitive neural networks with mixed delays and nonidentical perturbations, Neurocomputing, 185 (2016), 242–253. doi: 10.1016/j.neucom.2015.11.094
    [16] X. Liu, H. Su, M. Z. Q. Chen, A switching approach to designing finite-time synchronization controllers of coupled neural networks, IEEE T. Neur. Lear., 27 (2016), 471–482. doi: 10.1109/TNNLS.2015.2448549
    [17] S. P. Bhat, D. S. Bernstein, Finite-time stability of continuous autonomous systems, SIAM J. Control Optim., 38 (2000), 751–766. doi: 10.1137/S0363012997321358
    [18] L. Wang, T. Dong, M. Ge, Finite-time synchronization of memristor chaotic systems and its application in image encryption, Appl. Math. Comput., 347 (2019), 293–305.
    [19] X. Cai, J. Wang, S. Zhong, K. Shi, Y. Tang, Fuzzy quantized sampled-data control for extended dissipative analysis of t-s fuzzy system and its application to wpgss-sciencedirect, J. Franklin I., 358 (2021), 1350–1375. doi: 10.1016/j.jfranklin.2020.12.002
    [20] L. Hua, H. Zhu, K. Shi, S. Zhong, Y. Tang, Y. Liu, Novel finite-time reliable control design for memristor-based inertial neural networks with mixed time-varying delays, IEEE T. Circuits-I, 68 (2018), 1599–1609.
    [21] G. Ji, H. Cheng, J. Yu, H. Jiang, Finite-time and fixed-time synchronization of discontinuous complex networks: A unified control framework design, J. Franklin I., 355 (2018), 4665–4685. doi: 10.1016/j.jfranklin.2018.04.026
    [22] X. Yang, J. Lam, D. W. C. Ho, Z. Feng, Fixed-time synchronization of complex networks with impulsive effects via non-chattering control, IEEE T. Automat. Contr., 62 (2017), 5511–5521. doi: 10.1109/TAC.2017.2691303
    [23] A. Polyakov, Nonlinear feedback design for fixed-time stabilization of linear control systems, IEEE T. Automat. Contr., 57 (2012), 2106–2110. doi: 10.1109/TAC.2011.2179869
    [24] X. Liu, D. W. C. Ho, Q. Song, J. Cao, Finite-/fixed-time robust stabilization of switched discontinuous systems with disturbances, Nonlinear Dynam., 90 (2017), 2057–2068. doi: 10.1007/s11071-017-3782-9
    [25] E. Jimenez-Rodriguez, J. D. Sanchez-Torres, A. G. Loukianov, On optimal predefined-time stabilization, Int. J. Robust Nonlin., 27 (2017), 3620–3642.
    [26] J. D. Sanchez-Torres, D. Gomez-Gutierrez, E. Lopez, A. G. Loukianov, A class of predefined-time stable dynamical systems, Int. J. Robust Nonlin., 35 (2018), i1–i29.
    [27] C. A. Anguiano-Gijon, A. J. Munoz-Vazquez, J. D. Sanchez-Torres, G. Romero-Galvan, F. Martinez-Reyes, On predefined-time synchronisation of chaotic systems, Chaos Soliton. Fract., 122 (2019), 172–178. doi: 10.1016/j.chaos.2019.03.015
    [28] J. D. Sanchez-Torres, A. J. Munoz-Vazquez, M. Defoort, R. Aldana-Lopez, D. Gomez-Gutierrez, Predefined-time integral sliding mode control of second-order systems, Int. J. Syst. Sci., (2020), 1–11. doi: 10.1080/00207721.2020.1815893.
    [29] A. J. Munoz-Vazquez, J. D. Sanchez-Torres, D. Michael, predefined-time sliding-mode control of fractionalorder systems, Asian J. Control, (2020). 1–9. doi: 10.1002/asjc.2447.
    [30] A. J. Munoz-Vazquez, G. Fernandez-Anaya, J. D. Sanchez-Torres, F. Melendeza-Vazquez, Predefined-time control of distributed-order systems, Nonlinear Dynam., 103 (2021), 2689–2700. doi: 10.1007/s11071-021-06264-y
    [31] A. J. Munoz-Vazquez, J. D. Sanchez-Torres, M. Defoort, S. Boulaaras, Predefined-time convergence in fractional-order systems, Chaos Soliton. Fract., 143 (2021), 110571–110576. doi: 10.1016/j.chaos.2020.110571
  • This article has been cited by:

    1. Qiaoping Li, Yu Chen, Kun Liang, Predefined-time formation control of the quadrotor-UAV cluster’ position system, 2023, 116, 0307904X, 45, 10.1016/j.apm.2022.11.011
    2. Qiaoping Li, Yu Chen, Lingyuan Ma, Predefined-time control of chaotic finance/economic system based on event-triggered mechanism, 2023, 8, 2473-6988, 8000, 10.3934/math.2023404
    3. Jingjing You, Abdujelil Abdurahman, Hayrengul Sadik, Fixed/Predefined-Time Synchronization of Complex-Valued Stochastic BAM Neural Networks with Stabilizing and Destabilizing Impulse, 2022, 10, 2227-7390, 4384, 10.3390/math10224384
    4. Oscar Martínez-Fuentes, Aldo Jonathan Muñoz-Vázquez, Guillermo Fernández-Anaya, Esteban Tlelo-Cuautle, Synchronization of fractional-order chaotic networks in Presnov form via homogeneous controllers, 2023, 90, 01679260, 71, 10.1016/j.vlsi.2023.01.007
    5. Xiuli Li, Huachang Miao, Application of Artificial Intelligence Technology in Optimizing Control Parameters of Traffic Signal Group Systems, 2024, 20, 1548-3657, 1, 10.4018/IJIIT.355013
    6. Jingjing You, Abdujelil Abdurahman, Lvming Liu, Saturation function-based fixed/predefined-time synchronization of impulsive quaternion-valued neural networks, 2025, 09252312, 129565, 10.1016/j.neucom.2025.129565
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2629) PDF downloads(95) Cited by(6)

Figures and Tables

Figures(16)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog