Next Article in Journal
Modeling Exact Frequency-Energy Distribution for Quakes by a Probabilistic Cellular Automaton
Previous Article in Journal
Swarming Transition in Super-Diffusive Self-Propelled Particles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Study of Generalized Chaotic Synchronization Method Incorporating Error-Feedback Coefficients

1
Electronic Engineering College, Heilongjiang University, Harbin 150080, China
2
Information Engineering College, Heilongjiang Polytechnic, Harbin 150080, China
3
Beijing Aerospace Institute of Automatic Control, Beijing 100854, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(5), 818; https://doi.org/10.3390/e25050818
Submission received: 29 March 2023 / Revised: 14 May 2023 / Accepted: 17 May 2023 / Published: 18 May 2023
(This article belongs to the Topic Advances in Nonlinear Dynamics: Methods and Applications)

Abstract

:
In this paper, taking the generalized synchronization problem of discrete chaotic systems as a starting point, a generalized synchronization method incorporating error-feedback coefficients into the controller based on the generalized chaos synchronization theory and stability theorem for nonlinear systems is proposed. Two discrete chaotic systems with different dimensions are constructed in this paper, the dynamics of the proposed systems are analyzed, and finally, the phase diagrams, Lyapunov exponent diagrams, and bifurcation diagrams of these are shown and described. The experimental results show that the design of the adaptive generalized synchronization system is achievable in cases in which the error-feedback coefficient satisfies certain conditions. Finally, a chaotic hiding image encryption transmission system based on a generalized synchronization approach is proposed, in which an error-feedback coefficient is introduced into the controller.

1. Introduction

Chaos is a unique nonlinear dynamical phenomenon with the properties of ergodicity, initial sensitivity, and the long-term unpredictability of motion trajectories [1,2,3,4]. In recent years, the study of chaos has become very popular, and it is widely used in the field of secure communication [5,6,7]. Chaos control and synchronization theory, which has great potential for application in the field of chaos research, has also become a hot spot in the high-tech competition between countries [8,9]. From the point of view of chaotic system interactions, studies related to chaotic synchronization can be divided into the following categories: generalized synchronization, phase synchronization, hysteresis synchronization, and so on [10,11,12,13]. In addition, during the process of research, researchers have proposed complete synchronization, projective synchronization, and adaptive synchronization [14,15,16,17]. In practical studies, the problem of parameter selection is inevitable regarding the structural differences between the drive and response systems. The generalized synchronization problem for chaotic or hyperchaotic systems would be a more relevant and worthwhile approach, given that the problems mentioned above can be easily solved for generalized chaotic synchronization systems. Meanwhile, the development of generalized synchronization theory has provided new tools for constructing more secure communication systems.
Generalized synchronization is the gradual convergence of the trajectory curves of two chaotic systems to a time-independent transformation relationship over time; that is, a functional relationship is determined between the state of the driven system and the state of the responding system, and the synchronization of the driven and responding systems is achieved by this functional relationship, which can be deterministic or nondeterministic [18,19,20,21,22]. This paper proposes a generalized chaotic synchronization method incorporating error-feedback coefficients into the process of determining the function relationships, which is based on the principle of using the relationships between the functions in the designed controller to synchronize the drive and response systems. Most of the systems used in practical engineering are high-dimensional nonlinear systems. With the continuous research in applied mathematical theory and the rapid development of computer technology, lower-dimensional chaotic systems in practical applications are facing more challenges; hence, high-dimensional hyperchaos with more than two Lyapunov exponents is of significant interest. Based on the above, new 3D and 6D discrete chaotic systems are constructed and proposed in this paper. The constructed new high-dimensional chaotic systems are used as the driving systems, and the response system is constructed by the proposed generalized chaotic synchronization method that incorporates error-feedback coefficients. The effectiveness of the synchronization method was confirmed by experiment.
The paper is organized as follows: The generalized synchronization theoretic of discrete chaotic systems and the stability principle of error systems are analyzed in Section 2. A new 3D discrete chaotic system is proposed in Section 3, in which the dynamic behavior of phase diagrams, Lyapunov exponent diagrams, and bifurcation diagrams are depicted and analyzed. Subsequently, a generalized chaotic synchronization method incorporating error-feedback coefficients is proposed, with a new 3D discrete chaotic system as the driving system. The effectiveness of the method was verified by experimental simulations. In Section 4, a new 6D discrete chaotic system is proposed, and the dynamic behavioral properties of its phase diagram, Lyapunov exponent diagram, and bifurcation diagram are analyzed. Then, the new 6D discrete chaotic system is applied as the driving system through the proposed generalized chaotic synchronization method incorporating error-feedback coefficients; the effectiveness of the method was further demonstrated by performing simulations. In Section 5, a digital image transmission system based on 6D chaotic synchronization and encryption is proposed, the encryption and decryption processes are analyzed in detail, and encryption and decryption simulations are given. Then, in Section 6, security analyses are carried out based on the previously proposed encrypted image transmission system. Finally, the conclusion is given in the last section.

2. Theory of Generalized Synchronization for Discrete Chaotic Systems

In our study of chaotic control problems, it is more important to convert the problem of chaotic synchronization into the analysis of system errors. The main idea is to consider the difference in the state between the drive and response systems, that is, the synchronization error of the system. Once a reasonable controller has been designed by parameter changes to make the system error asymptotically stable at the origin point, then the two systems can be considered synchronized with each other. Firstly, the mathematical model of generalized chaotic synchronization is proposed in this paper and described, as follows.
Definition 1.
Consider two n-dimensional nonlinear dynamical systems, and describe them using the following equations:
X ( k + 1 ) = F ( X ( k ) )
Y ( k + 1 ) = Q ( Y ( k ) ) + G ( X ( k ) , Y ( k ) )
where  X ,  Y , and  F ( )  as well as  Q ( )  are n-dimensional nonlinear functions, and  G ( )  is an n-dimensional input control function. If the selectable function  G ( X ( k ) ,   Y ( k ) )  is applied such that  k , and thus  lim k G ( X ( k ) ,   Y ( k ) ) = 0 , then it can be translated into the study of the error system ( e ( k ) ) , for which  e ( k ) = G ( X ( k ) ,   Y ( k ) ) , and therefore  lim k e ( k ) = 0 . In this case, the drive system and response system can reach a generalized synchronization.
Theorem 1.
Define an invertible transform ( H : m m );consequently, there is an incorporated error-feedback coefficient ( η ) .Where the feedback coefficient satisfies the condition  η ( 1 , 1 ) , it can enable the progressive stability of the zero solution of Error Equation (3) of the system, which is represented as follows:
e ( k + 1 ) = H ( X m ( k + 1 ) ) Y ( k + 1 )
Because the zero solution of Equation (3) is gradually stable, by introducing a reasonable feedback coefficient ( η ), the drive and response systems can be synchronized in a universal way.
Hence, according to Theorem 1, it can be concluded that to synchronize the drive system (1) and response system (2), a nonlinear error system ( e ( k ) ) needs to be constructed, and the progressive stability of the error equation of the system ( e ( k + 1 ) = H ( X m ( k + 1 ) ) Y ( k + 1 ) ) needs to be guaranteed. Based on the above, the next major concern is to determine that the system error equation is asymptotically stable at the original point; therefore, the following lemmas are given:
Lemma 1
([23]). Given a linear discrete system, which can be defined as follows:
x ( k + 1 ) = A x ( k )
where A is a  n × n  coefficient matrix, and  A R n × n , we can draw the following conclusions:
(1) 
Chaotic system (4) is progressively stable if the modulus of all eigenvalues of matrix A is not more than 1;
(2) 
In case there is a matrix (Q > 0), so that the Lyapunov equation (ATPA − P = −Q) has a unique positive solution (P), system (4) is asymptotically stable.
Proof of Lemma 1(1). 
Set V ( x ( k ) ) = x T ( k ) x ( k ) , and then the tiny variables of V ( x ( k ) ) can be calculated as follows:
Δ V ( x ( k ) ) = V ( x ( k + 1 ) ) V ( x ( k ) ) = x T ( k + 1 ) x ( k + 1 ) x T ( k ) x ( k ) = x T ( k ) A T A x ( k ) x T ( k ) x ( k ) ( λ max ( A T A ) 1 ) x T ( k ) x ( k )
Because all the eigenvalues of matrix A have a value of modulo less than 1, all the eigenvalues of matrix A T A are integers, which are less than 1; therefore, Δ V ( x ( k ) ) < 0 , and system (4) is asymptotically stable. □
Proof of Lemma 1(2). 
Set V ( x ( k ) ) = x T ( k ) P x ( k ) , where P is a positive definite matrix, given that A T P A P = Q , and then the tiny variables of V ( x ( k ) ) can be calculated as follows:
Δ V ( x ( k ) ) = V ( x ( k + 1 ) ) V ( x ( k ) ) = x T ( k + 1 ) P x ( k + 1 ) x T ( k ) P x ( k ) = x T ( k ) A T P A x ( k ) x T ( k ) P x ( k ) = x T ( k ) ( A T P A P ) x ( k ) = x T ( k ) Q x ( k ) < 0
Furthermore, lim x x ( k ) = 0 ; hence, system (4) is asymptotically stable. □
Based on the proof processes for the stability of linear discrete systems as related in Lemma 1, the determination processes for the stability of nonlinear discrete systems can be given through Lemma 2, which is described as follows:
Lemma 2.
For a nonlinear discrete system ( x ( k + 1 ) = f ( x ( k ) ) , k = 0 , 1 , 2 ), let  x e = 0  (i.e., f ( 0 ) = 0 ) be the equilibrium point of the proposed system. Provided that the scalar function  x ( k ) = 0  concerning  V ( x ( k ) )  satisfies the following:
(1) 
V ( x ( k ) ) > 0 ,
(2) 
Δ V ( x ( k ) ) = V ( x ( k + 1 ) ) V ( x ( k ) ) < 0 .
then  x e = 0  is progressively stable.
Proof of Lemma 2.
For condition (1), let V ( x ( k ) ) = x T ( k ) x ( k ) , and in the case of x 0 , V ( x ( k ) ) > 0 , the first condition is proven. For condition (2), let V ( x ( k ) ) = x T ( k ) P x ( k ) . We can prove that P is a positive definite matrix from Lemma 1. Moreover, A T P A P = Q , and Q > 0 ; subsequently, the small changes ( V ( x ( k ) ) ) can be described ( Δ V ( x ( k ) ) ), which are calculated as follows:
Δ V ( x ( k ) ) = V ( x ( k + 1 ) ) V ( x ( k ) ) = x T ( k + 1 ) P x ( k + 1 ) x T ( k ) P x ( k ) = x T ( k ) A T P A x ( k ) x T ( k ) P x ( k ) = x T ( k ) ( A T P A P ) x ( k ) = x T ( k ) Q x ( k ) < 0
Thus, the proof of condition (2) is complete. Based on the above, it is concluded that nonlinear system (4) is asymptotically stable at the origin point.
Thus, having proved Lemma 1 and Lemma 2, the proof of Theorem 1 can be obtained, which is as follows:
Proof of Theorem 1.
According to Equations (1) and (2), Equation (3) can be calculated as follows:
e ( k + 1 ) = H ( X m ( k + 1 ) ) Y ( k + 1 ) = H ( F ( X ( k ) ) ) Q ( Y ( k ) ) G ( X ( k ) , Y ( k ) )
where Q ( Y ( k ) ) = F ( Y ( k ) ) + U ( k ) , and U ( k ) is a control function, which be represented as follows:
U ( k ) = H ( F ( X ( k ) ) ) F ( Y ( k ) ) + ( 1 η ) G ( X ( k ) , Y ( k ) )
Then, Equation (9) can be simplified as the following equation:
e ( k + 1 ) = η G ( X ( k ) , Y ( k ) ) = η e ( k )
Denote the scaled function of the nonlinear error system ( e ( k ) = 0 ) represented as V ( e ( k ) ) = e ( k ) T e ( k ) , and then the Δ V ( e ( k ) ) is calculated as follows:
Δ V ( e ( k ) ) = V ( e ( k + 1 ) ) V ( e ( k ) ) = e ( k + 1 ) T e ( k + 1 ) e ( k ) T e ( k ) = η e ( k ) T η e ( k ) e ( k ) T e ( k ) = η 2 e ( k ) T e ( k ) e ( k ) T e ( k ) = ( η 2 1 ) e ( k ) T e ( k )
Therefore, when the parameter η satisfies the condition η 2 < 1 , Δ V ( e ( k ) ) < 0 ; hence, V ( e ( k + 1 ) ) / V ( e ( k ) ) < 1 and lim k V ( e ( k ) ) = lim k e T ( k ) e ( k ) = 0 . □
Furthermore, lim k e ( k ) = 0 . Thus, according to Lemma 2, the nonlinear error system ( e ( k ) ) is asymptotically stable when e = 0 , and, in turn, the drive and response systems are asymptotically synchronized.

3. Analysis of the Dynamical Behavior of 3D Discrete Chaotic Systems and Implementation of The Proposed Generalized Synchronization Method by Incorporating Parameter Control

3.1. The Proposed New 3D Discrete Chaotic System

A new 3D discrete chaotic system (12) is proposed in this paper, which is described as follows:
{ x 1 ( k + 1 ) = 0.665 x 1 2 ( k ) + 3.5 x 1 ( k ) 0.5 x 2 ( k + 1 ) = 0.82 x 2 2 ( k ) 2.34 x 3 ( k + 1 ) = a x 3 ( k ) ( 1 x 3 ( k ) ) 2
where the x 1 , x 2 , and x 3 are iterative variables, and a is a parameter variable. The bifurcation diagram with the a of system (12) is represented by Figure 1. It is clear from the bifurcation diagram that the system is chaotic when a = 6.53, and after 1000 iterations, the Lyapunov exponents of system (12) are 0.7296, 0.1650, and 0.6226, which are all positive; thus, system (12) is a hyperchaotic system.
Based on 64-bit Matlab software and double-floating-point representation, the initial values of the state variables of the chaotic system are set differently. The output chaotic sequences and their autocorrelation are shown in Figure 2, from which we can clearly see in Figure 2a,b,d,e that the chaotic sequences x 1 ( k ) and x 3 ( k ) have no periodicity, and Figure 2a,d demonstrate the proposed chaotic sequences with an initial value sensitivity. The initial values of the sequences are set as x 1 ( 0 ) = 0.2 and x 3 ( 0 ) = 0.1 , respectively, and the corresponding chaotic iteration diagrams are shown in Figure 2c,f, respectively, which show that system (12) is not in a chaotic state in this case. Therefore, the initial values of the chaotic system are what affect the output states of system (12). In addition, the chaotic attractor phase diagrams of the proposed 3D hyperchaotic mapping are shown in Figure 3 as x 1 ( 0 ) = 0.3 , x 2 ( 0 ) = 0.1 , and x 3 ( 0 ) = 0.1 .

3.2. Implementation of Proposed Generalized Synchronization Method Incorporating Parameter Control

Let us assume that the system of responding systems of the drive system (12) is as follows:
{ y 1 ( k + 1 ) = 0.665 y 1 2 ( k ) + 3.5 y 1 ( k ) 0.5 + u 1 ( k ) y 2 ( k + 1 ) = 0.82 y 2 2 ( k ) 2.34 + u 2 ( k ) y 3 ( k + 1 ) = 6.53 y 3 ( k ) ( 1 y 3 ( k ) ) 2 + u 3 ( k )
where y 1 , y 2 , and y 3 are iteration variables, and based on Theorem 1, the system errors are calculated as follows:
{ e 1 ( k ) = h 1 x 1 y 1 e 2 ( k ) = h 2 x 2 y 2 e 3 ( k ) = h 3 x 3 y 3
Then, the error system equation can be expressed as follows:
{ e 1 ( k + 1 ) = h 1 ( 0.665 x 1 2 ( k ) + 3.5 x 1 ( k ) 0.5 ) ( 0.665 y 1 2 ( k ) + 3.5 y 1 ( k ) 0.5 + u 1 ( k ) ) e 2 ( k + 1 ) = h 2 ( 0.82 x 2 2 ( k ) 2.34 ) ( 0.82 y 2 2 ( k ) 2.34 + u 2 ( k ) ) e 3 ( k + 1 ) = h 3 ( 6.53 x 3 ( k ) ( 1 x 3 ( k ) ) 2 ) ( 6.53 y 3 ( k ) ( 1 y 3 ( k ) ) 2 + u 3 ( k ) )
Let the control function be represented by Equation (16):
{ u 1 ( k ) = h 1 ( 0.665 x 1 2 ( k ) + 3.5 x 1 ( k ) 0.5 ) ( 0.665 y 1 2 ( k ) + 3.5 y 1 ( k ) 0.5 ) η ( h 1 x 1 ( k ) y 1 ( k ) ) u 2 ( k ) = h 2 ( 0.82 x 2 2 ( k ) 2.34 ) ( 0.82 y 2 2 ( k ) 2.34 ) η ( h 2 x 2 ( k ) y 2 ( k ) ) u 3 ( k ) = h 3 ( 6.53 x 3 ( k ) ( 1 x 3 ( k ) ) 2 ) ( 6.53 y 3 ( k ) ( 1 y 3 ( k ) ) 2 ) η ( h 3 x 3 ( k ) y 3 ( k ) )
Thus, system (14) can be simplified to expression (17):
{ e 1 ( k + 1 ) = η e 1 ( k ) e 2 ( k + 1 ) = η e 2 ( k ) e 3 ( k + 1 ) = η e 3 ( k )
Let the Lyapunov exponent function of system (17) be represented by the following expressions:
V ( e ( k ) ) = 1 2 ( e 1 2 ( k ) + e 2 2 ( k ) + e 3 2 ( k ) ) 0
Δ V ( e ( k ) ) = V ( e ( k + 1 ) ) V ( e ( k ) ) = 1 2 ( e 1 2 ( k + 1 ) + e 2 2 ( k + 1 ) + e 3 2 ( k + 1 ) ) 1 2 ( e 1 2 ( k ) + e 2 2 ( k ) + e 3 2 ( k ) ) = η 2 1 2 ( e 1 2 ( k ) + e 2 2 ( k ) + e 3 2 ( k ) )
It is obvious that when the parameter is | η | < 1 , then Δ V ( e ( k ) ) < 0 , and the error system is progressively stable at e = 0 , according to Lemma 1. The zero solution of error system (13) is asymptotically stable so that generalized chaotic synchronization can be achieved. In summary, the incorporation of the error-system-feedback coefficient ( η ) into the design of the controller for generalized synchronization in this paper makes the design of the controller more flexible.
Let the invertible transformation equation be H ( x ( k ) ) = A x ( k ) , and matrix A is as follows:
A = [ 2 1 1 1 2 1 1 1 2 ]
In the initial condition for the iterative variables x 1 ( 0 ) = 0.3 , x 2 ( 0 ) = 0.1 , and x 3 ( 0 ) = 0.1 , with 1000 iterations, the dynamical curves of the status variables x 1 ( k ) , y 1 ( k ) , x 2 ( k ) , y 2 ( k ) , x 3 ( k ) , and y 3 ( k ) are displayed in Figure 4a,c,e, respectively, whereas the dynamical curves of e 1 ( k ) , e 2 ( k ) , and e 3 ( k ) are represented in Figure 4b,d,f, respectively, from which it can be seen that the difference in the initial values does not affect the synchronization time.

4. Implementation of a Universal Synchronization Method with Parameter Control and Analysis of The Dynamic Behavior of the Proposed 6D Discrete Chaotic System

4.1. The Proposed 6D Discrete Chaotic System

High-dimensional chaotic systems have more complex dynamics than low-dimensional chaotic systems; thus, they are better able to resist the degradation of dynamics caused by the limited accuracy of computers. In this paper, a new 6D discrete chaotic system (21) is constructed by expanding on system (12), which can be presented as follows:
{ x 1 ( k + 1 ) = 0.665 x 1 ( k ) 2 + a x 1 ( k ) 0.5 ; x 2 ( k + 1 ) = 0.82 x 2 ( k ) 2 b ; x 3 ( k + 1 ) = c x 3 ( k ) ( 1 x 3 ( k ) ) 2 ; x 4 ( k + 1 ) = 3 x 4 2 ( k ) + d x 4 ( k ) + 0.18 ; x 5 ( k + 1 ) = 4 x 5 ( k ) ( 1 x 5 ( k ) ) ; x 6 ( k + 1 ) = 4 x 6 ( k ) ( 1 0.5 x 6 ( k ) ) ;
where a = 3.5, b = −2.34, c = 6.53, and d = 3.46, after 1000 iterations, and the Lyapunov exponents of the proposed system are 1.0227, 0.3837, −0.2378, −0.2999, 0.4955, and 1.7245, respectively; thus, system (21) is a hyperchaotic system because the four Lyapunov exponents are positive.
Based on 64-bit Matlab software and double-floating-point representation, for different initial values of the state variables, the output of chaotic sequences and their autocorrelations are shown in Figure 5, in which Figure 5a,b,d,e prove that the chaotic sequences x 4 ( k ) and x 6 ( k ) have no periodicity, and Figure 5a,d demonstrate the proposed chaotic sequences with an initial value sensitivity. The initial values of the sequences were set at x 4 ( 0 ) = - 0.1 , and x 6 ( 0 ) = 0.3 , respectively, and the corresponding chaotic iteration diagrams are shown in Figure 5c,f, respectively, which show that system (21) is not in a chaotic state in this case. Therefore, the initial values of the chaotic system are what affect the output states of system (21). In addition, the chaotic attractor phase diagrams of the proposed 6D hyperchaotic mapping are shown in Figure 6 as x 1 ( 0 ) = 0.3 , x 2 ( 0 ) = 0.1 , x 3 ( 0 ) = 0.1 , x 4 ( 0 ) = 0.1 , x 5 ( 0 ) = 0.1 , and x 6 ( 0 ) = 0.1 .

4.2. Implementation of Generalised Synchronisation Incorporating Parameter Control

Let the corresponding system of driving system (21) be considered as follows:
{ y 1 ( k + 1 ) = 0.665 y 1 2 ( k ) + 3.5 y 1 ( k ) 0.5 + u 1 ( k ) ; y 2 ( k + 1 ) = 0.82 y 2 2 ( k ) 2.34 + u 2 ( k ) y 3 ( k + 1 ) = 6.53 y 3 ( k ) ( 1 y 3 ( k ) ) 2 + u 3 ( k ) y 4 ( k + 1 ) = 3 y 4 2 ( k ) + 3.46 y 4 ( k ) + 0.18 + u 4 ( k ) y 5 ( k + 1 ) = 4 y 5 ( k ) ( 1 y 5 ( k ) ) + u 5 ( k ) y 6 ( k + 1 ) = 4 y 6 ( k ) ( 1 0.5 y 6 ( k ) ) + u 6 ( k )
Equation (23) is obtained from Lemma 2:
{ e 1 ( k ) = h 1 x 1 y 1 e 2 ( k ) = h 2 x 2 y 2 e 3 ( k ) = h 3 x 3 y 3 e 4 ( k ) = h 4 x 4 y 4 e 5 ( k ) = h 5 x 5 y 5 e 6 ( k ) = h 6 x 6 y 6
The equation of the error system can then be expressed as follows:
{ e 1 ( k + 1 ) = h 1 ( 0.665 x 1 2 ( k ) + 3.5 x 1 ( k ) 0.5 ) ( 0.665 y 1 2 ( k ) + 3.5 y 1 ( k ) 0.5 + u 1 ( k ) ) ; e 2 ( k + 1 ) = h 2 ( 0.82 x 2 2 ( k ) 2.34 ) ( 0.82 y 2 2 ( k ) 2.34 + u 2 ( k ) ) e 3 ( k + 1 ) = h 3 ( 6.53 x 3 ( k ) ( 1 x 3 ( k ) ) 2 ) ( 6.53 y 3 ( k ) ( 1 y 3 ( k ) ) 2 + u 3 ( k ) ) e 4 ( k + 1 ) = h 4 ( 3 x 4 2 ( k ) + 3.46 x 4 ( k ) + 0.18 ) ( 3 y 4 2 ( k ) + 3.46 y 4 ( k ) + 0.18 + u 4 ( k ) ) e 5 ( k + 1 ) = h 5 ( 4 x 5 ( k ) ( 1 x 5 ( k ) ) ) ( 4 y 5 ( k ) ( 1 y 5 ( k ) ) + u 5 ( k ) ) e 6 ( k + 1 ) = h 6 ( 4 x 6 ( k ) ( 1 0.5 x 6 ( k ) ) ) ( 4 y 6 ( k ) ( 1 0.5 y 6 ( k ) ) + u 6 ( k ) )
Let the control functions be calculated as follows:
{ u 1 ( k ) = h 1 ( 0.665 x 1 2 ( k ) + 3.5 x 1 ( k ) 0.5 ) ( 0.665 y 1 2 ( k ) + 3.5 y 1 ( k ) 0.5 ) + η ( h 1 x 1 ( k ) y 1 ( k ) ) u 2 ( k ) = h 2 ( 0.82 x 2 2 ( k ) 2.34 ) ( 0.82 y 2 2 ( k ) 2.34 ) + η ( h 2 x 2 ( k ) y 2 ( k ) ) u 3 ( k ) = h 3 ( 6.53 x 3 ( k ) ( 1 x 3 ( k ) ) 2 ) ( 6.53 y 3 ( k ) ( 1 y 3 ( k ) ) 2 ) + η ( h 3 x 3 ( k ) y 3 ( k ) ) u 4 ( k ) = h 4 ( 3 x 4 2 ( k ) + 3.46 x 4 ( k ) + 0.18 ) ( 3 y 4 2 ( k ) + 3.46 y 4 ( k ) + 0.18 + u 4 ( k ) ) + η ( h 4 x 4 ( k ) y 4 ( k ) ) u 5 ( k ) = h 5 ( 4 x 5 ( k ) ( 1 x 5 ( k ) ) ) ( 4 y 5 ( k ) ( 1 y 5 ( k ) ) + u 5 ( k ) ) + η ( h 5 x 5 ( k ) y 5 ( k ) ) u 6 ( k ) = h 6 ( 4 x 6 ( k ) ( 1 0.5 x 6 ( k ) ) ) ( 4 y 6 ( k ) ( 1 0.5 y 6 ( k ) ) + u 6 ( k ) ) + η ( h 6 x 6 ( k ) y 6 ( k ) )
Then, system (24) can be expressed as follows:
{ e 1 ( k + 1 ) = η e 1 ( k ) e 2 ( k + 1 ) = η e 2 ( k ) e 3 ( k + 1 ) = η e 3 ( k ) e 4 ( k + 1 ) = η e 4 ( k ) e 5 ( k + 1 ) = η e 5 ( k ) e 6 ( k + 1 ) = η e 6 ( k )
Consider the Lyapunov exponent functions of system (25) as follows:
V ( e ( k ) ) = 1 2 ( e 1 2 ( k ) + e 2 2 ( k ) + e 3 2 ( k ) + e 4 2 ( k ) + e 5 2 ( k ) + e 6 2 ( k ) ) 0
Δ V ( e ( k ) ) = η 2 1 2 ( e 1 2 ( k ) + e 2 2 ( k ) + e 3 2 ( k ) + e 4 2 ( k ) + e 5 2 ( k ) + e 6 2 ( k ) ) 0
Obviously, according to Lemma 2, when the parameter | η | < 1 and, hence, the error system is progressively stable at e = 0 , the zero solution of the error system (25) is progressively stable, and as a result, the generalized chaotic synchronization can be implemented.
Let the invertible transformation function be H ( x ( k ) ) = A x ( k ) , and let the coefficient matrix A be expressed as follows:
A = [ 2 1 1 1 1 1 1 2 1 1 1 1 1 1 2 1 1 1 1 1 1 2 1 1 1 1 1 1 2 1 1 1 1 1 1 2 ]
Moreover, set the initial conditions of the proposed driving system (21) as x 1 ( 0 ) = 0.3 , x 2 ( 0 ) = 0.1 , x 3 ( 0 ) = 0.2 , x 4 ( 0 ) = 0.01 , x 5 ( 0 ) = 0.1 , and x 6 ( 0 ) = 0.1 . After 1000 iterations, the dynamical diagrams of the change in the status of the iterations as k changes for systems (21), (22), and (24) are shown in Figure 7. The Figure 7a–d describe the dynamical diagrams of system (21), and the dynamical diagrams of system (22) are shown in Figure 7e–h, and Figure 7i–l display the dynamical diagrams of system (23).

5. Cryptographic Transmission System for Digital Images Based on Proposed Generalized Chaos Synchronization Approach

5.1. Cryptographic Transmission System for Digital Images

The framework diagram of the proposed encryption and decryption transmission system constructed in this paper is shown in Figure 8.
The proposed system is designed for the encrypted transmission of digital images with pixel matrix values of R m × n ( x , y ) , G m × n ( x , y ) , and B m × n ( x , y ) for each component of the color digital image, where the number of pixels in the image is n × m . Then, matrix components are converted into a sequence of integer values in row order, and the pixel values are selected in the range ( 0 , 255 ) , converting each pixel value into an 8-bit binary number. Based on the above operations, the binary sequences R ( j ) , G ( j ) , and B ( j ) , which are based on the color image, can be obtained, where j ( 0 , m × n × 8 ) .
The output sequences ( x ( k ) ) of the proposed 6D generalized discrete chaotic system are quantized by the region to generate binary sequences for encryption. Therefore, the quantification process can be represented by the following equation:
P ( j ) = P 0 1 [ x ( i ) ] = { 1 , x ( i ) n = 0 2 m 1 I 2 n m 0 , x ( i ) n = 0 2 m 1 I 2 n + 1 m ; n = 0 , 1 , 2
where m is an arbitrary integer greater than 0, and I 0 m , I 1 m , I 2 m are denoted as 2 m consecutive equal intervals on the interval of a range of real-valued sequences. If the output value of a chaotic sequence is in the odd interval, then it outputs 0, and if it is in the even interval, then it outputs 1.
The workflow of the whole system is as follows, and the process of encryption on the transmitter side of the proposed system consists of the following parts:
Step 1: The chaotic sequences generated by the proposed 6D discrete chaotic system are quantized and denoted as P 1 ( j ) , P 2 ( j ) , P 3 ( j ) , and P 4 ( j ) . Furthermore, the three color components of the original image are encrypted with chaotic sequences, and the calculation formula is Equation (31):
{ E R ( j ) = R ( j ) P 1 ( j ) E G ( j ) = G ( j ) P 2 ( j ) E B ( j ) = B ( j ) P 3 ( j )
Step 2: The encrypted sequences of the three color components are combined into E ( k ) using Equation (32):
E R ( j ) E G ( j ) E B ( j ) } E ( k ) ,   k ( 0 , 3 × j )
Step 3: Chaotic hiding of E ( k ) with the chaotic sequence P 4 ( j ) . The resulting mixed signal ( S ( k ) ) is transmitted in the common channel and is calculated as the following equation:
S ( k ) = E ( k ) + P ( k )
On the receiving side of the proposed system, the response system will be in general synchronization with the driver system. Furthermore, the receiver will be able to decode all the state variables of the sender. Similarly, there are several parts to the decryption processes for the receiver of the proposed system.
Step 1: Reconstructing the chaotic signal ( y ( k ) ), the sequences generated after quantization are denoted as P 1 ( j ) , P 2 ( j ) , P 3 ( j ) , and P 4 ( 3 × j ) , as we can see from Figure 8. The decryption process is the inverse of the encryption process; thus, it is important to perform the anti-hiding operation on the signal S ( k ) to obtain E ( k ) , which is calculated as follows:
S ( k ) P ( k ) 4 = E ( k )
Step 2: Decompose E ( k ) into three color components. The formulation is calculated as Equation (35), and therefore the encrypted image is decoded using Equation (36):
E ( k ) { E R ( j ) E G ( j ) E B ( j )
{ E R ( j ) P 1 ( j ) = R ( j ) E G ( j ) P 2 ( j ) = G ( j ) E B ( j ) P 3 ( j ) = B ( j )
The standard Lena (256 × 256) image was used as an example for the encryption and decryption processes, and the results of the operation are shown in Figure 9.

5.2. Time Complexity

As can be seen from the encryption process in Section 5.1, the entire encryption algorithm consists of simple operations, such as addition, subtraction, and iso-or. However, in the process of encrypting a three-dimensional matrix of the size 8 × m × n, it takes about n 2 operations to complete the bit-level operation of the encryption of the xor operation. Hence, the time complexity of the proposed algorithm in this paper is T ( n ) = O ( n 2 ) .

6. Security Analyses of Proposed Scheme

Security analyses of the transmission system for the proposed digital image encryption and decryption based on generalized chaotic synchronization are performed in this paper, which consist of image encryption histogram analysis, key space analysis, key sensitivity analysis, and correlation analysis.

6.1. Histogram Analysis of Encrypted Image

A color histogram is a presentation of the statistical characteristics and distribution of the image pixels and is analyzed in terms of three colors: R, G, and B. As can be seen from the simulation results in Figure 10a–c, the histogram of the original image is unevenly distributed, whereas the histogram in Figure 10d–f, of the encrypted digital Lena image in the encryption transmission system with generalized chaotic synchronization, is uniformly distributed.

6.2. Keyspace Analysis

Cryptographic system security and resistance to exhaustive attacks are affected by the size of the key space. The sequences of the 6D discrete hyperchaotic system (21) are applied at the encryption stage, as the production of keys depends mainly on the parameters and initial conditions of the system. Hence, all the iterative variables of the proposed chaotic system ( x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , a , b , c , d ) can be used as keys. Calculation is performed by means of the double-floating-point number with 64-bit precision; therefore, the key space is 2 53 × 10 = 2 530 > 2 100 , which is much large than 2100. Consequently, the security of the image encryption system is improved and the resistance to exhaustive attacks is increased [24,25].

6.3. Key Sensitivity Analysis

Key sensitivity is an important measure to evaluate the security of an encrypted image. Security is highly reliable if any minimal change to the key results in a large modification; thus, the more sensitive the key, the more secure the encryption system. To evaluate the sensitivity of the key of the proposed scheme, the image was decrypted with a keystream with slight differences, the initial values were set to ( x 1 , x 2 , x 3 ) = ( 0.02 , 0.03 , 0.01 ) , and the result of making minor changes to the initial values was ( x 1 , x 2 , x 3 ) = ( 0.02 + 10 15 , 0.03 , 0.01 ) . The results of the experiment are illustrated in Figure 11, in which it can be seen that the image could not be decrypted, even with minor changes to the key.

6.4. Cutting Attack Analysis

To prevent data from being attacked or lost, it is necessary to perform cutting attack analysis. The same encrypted Lena as in Section 5.1 was cropped with black pixels, which is shown in Figure 12a. Then, we decrypted the image with keys, and the decrypted image can be well identified, as shown in Figure 12b. Thus the encryption system proposed in this paper is resistant to attacks and data loss as well.

6.5. Correlation Analyses

The analysis of image pixel correlation is one of the important indicators of the encryption effect of encrypted images. The color images were analyzed for correlations from R, G, and B, which are represented as red, green, and blue colors, respectively. In addition, the original image has a strong correlation between adjacent pixels, and an effective encryption system can reduce the image pixel correlation considerably. The correlation coefficient results for the Lena test images and their corresponding encrypted images are shown in Table 1. As can be seen from Table 1, the correlation coefficient between adjacent pixels in the original image is close to 1, with a strong correlation, whereas in the encrypted image, neighboring pixels are not correlated, as the correlation coefficient is close to 0.
To demonstrate the correlation visually, we plotted scatter plots of all sampled pixel pairs. The correlations between the test image Lena and its corresponding R, G, and B color pixels are shown separately. Figure 13a–c,h–j,n–p show that the numerical points of the original images are clustered around the diagonal of the images; hence, there is a strong correlation between neighboring pixels about the original image, whereas the values of the points in Figure 13d–f,k–m and Figure 13q–s are evenly spread throughout the entire plane of the images, which indicates that there is virtually no correlation between neighboring pixels in the encrypted image.

7. Conclusions

In this paper, two discrete chaotic systems of different dimensions are constructed. Additionally, the dynamics of the new systems are analyzed, and the phase diagram, Lyapunov exponent diagram, and bifurcation diagram of the systems are presented and analyzed simultaneously. The proposed 3D and 6D discrete chaotic systems were constructed as drive systems, and the response systems were constructed by employing the new generalized synchronization method incorporating error-feedback coefficients. The experimental results show that the design of adaptive generalized synchronous systems can be realized provided that the feedback coefficient ( η ) of the error system satisfies certain conditions for the design of adaptive generalized synchronous systems. Further, the generalized synchronization method incorporating the error-feedback coefficient, and the incorporation of it into the controller, enables simpler and more flexible control of the generalized synchronization. Finally, a chaotic synchronization and encryption–decryption system for secure digital image transmission was constructed by applying the method of generalized synchronous chaotic systems incorporating the error-feedback coefficients devised in this paper. Due to the limited accuracy of the computer, the system proposed in this paper is more resistant to dynamic degradation and, hence, these features of high-dimensional chaotic systems play an active role and have very good theoretical value in image encryption as well as chaotic synchronization.

Author Contributions

Y.X.: methodology, software, and writing—original draft preparation. W.D. and J.Z. (Jian Zeng): software, validation, and revision of the manuscript. P.G. and J.Z. (Jing Zhang): performed the evaluation methods of the security analyses. Q.D.: project administration and supervision. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported financially by the National Natural Science Foundation of China (no. 61471158) and the Innovative Team of Heilongjiang Province (no. 2013TD007).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lorenz, E.N. Deterministic Nonperiodic Flow. J. Atmos. Sci. 2004, 20, 130–141. [Google Scholar] [CrossRef]
  2. Chen, Y.J.; Tanaka, M.; Tanaka, K.; Ohtake, H.; Wang, H.O. Brief paper-discrete polynomial fuzzy systems control. IET Control Theory Appl. 2014, 8, 288–296. [Google Scholar] [CrossRef]
  3. Chen, Y.J.; Tanaka, M.; Tanaka, K.; Wang, H.O. Stability analysis and region-ofattraction estimation using piecewise polynomial lyapunov functions: Polynomial Fuzzy Model Approach. IEEE Trans. Fuzzy Syst. 2015, 23, 1314–1322. [Google Scholar] [CrossRef]
  4. Chen, Y.J.; Wang, W.J.; Chang, C.L. Guaranteed cost control for an overhead crane with practical constraints: Fuzzy descriptor system approach. Eng. Appl. Artif. Intell. 2009, 22, 639–645. [Google Scholar] [CrossRef]
  5. Chua, L.O.; Lin, T. Chaos in Digital Filters. IEEE Trans. Circuits Syst. 1988, 35, 648–658. [Google Scholar] [CrossRef]
  6. Chua, L.O.; Komuro, M.; Matsumoto, T. The Double Scroll Family. IEEE Trans. Circuits Syst. 1986, 33, 1072–1118. [Google Scholar] [CrossRef]
  7. Yang, T.; Wu, C.W.; Chua, L.O. Cryptography Based on Chaotic Systems. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 1997, 44, 469–472. [Google Scholar] [CrossRef]
  8. Fridrich, J. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. Int. J. Bifurc. Chaos 1998, 8, 1359–1384. [Google Scholar] [CrossRef]
  9. Frey, D.R. Chaotic Digital Encoding: An Approach to Secure Communication. IEEE Trans. Circuits Syst. II 1993, 40, 660–666. [Google Scholar] [CrossRef]
  10. Abarbanel, H.D.I.; Rulkov, N.F.; Sushchik, M.M. Generalized synchronization of chaos: The auxiliarysystem approach. Phys. Rev. E 1996, 53, 4528–4535. [Google Scholar] [CrossRef]
  11. Kocarev, L.; Parlitz, U. Generalized synchronization, predictability, and equivalence of unidirectionallycoupled dynamical systems. Phys. Rev. Lett. 1996, 76, 1816–1819. [Google Scholar] [CrossRef] [PubMed]
  12. Rosenblum, M.G.; Pikovsky, A.S.; Kurths, J. Phase synchronization of chaotic oscillators. Phys. Rev. Lett. 1996, 76, 1804–1807. [Google Scholar] [CrossRef] [PubMed]
  13. Xu, Y.; Zhou, W.; Fang, J.; Sun, W. Adaptive Lag Synchronization and Parameters Adaptive Lag Identifification of Chaotic Systems. Phys. Lett. A 2010, 374, 3441–3446. [Google Scholar] [CrossRef]
  14. Yao, C.; Zhao, Q.; Yu, J. Complete Synchronization Induced by Disorder in Coupled Chaotic Lattices. Phys. Lett. A 2013, 377, 370–377. [Google Scholar] [CrossRef]
  15. Wang, C.; Yan, H.; Fei, Y.; Hao, X. Time-Controllable Projective Synchronization of a Class of Chaotic Systems Based on Adaptive Method. Acta Phys. Sin. 2013, 62, 139–145. [Google Scholar]
  16. Li, N.; Li, J.-F. Unifified Projective Synchronization of Chaotic System. Acta Phys. Sin. 2011, 60, 110513. [Google Scholar]
  17. Quan, M.; Chen, G.-R. Generalized syschronization in an array of nonlinear dynamic systems with applications to chaotic cnn. Intern. J. Bifurcaton Chaos 2013, 23, 1350013-1–1350016-53. [Google Scholar]
  18. Chen, G. Controlling Chaos and Bifurcations in Engineering System; CRC Press: Boca Raton, FL, USA, 2000. [Google Scholar]
  19. Zeng, Y.; Singh, S.N. Adaptive control ofchaos in Lorenz System. Dyn. Control 1996, 7, 32–43. [Google Scholar]
  20. Terry, J.R.; VanWiggeren, G.D. Chaotic communication using generalized synchronization. Chaos Solitons Fract. 2001, 13, 145–152. [Google Scholar] [CrossRef]
  21. Lu, J.G.; Xi, Y.G. Linear generalized synchronization of continuous-time chaotic systems. Chaos Solitons Fract. 2003, 17, 825–831. [Google Scholar] [CrossRef]
  22. Li, W.; Yan, W.; Ding, Q. Discrete Synchronization Method for Continuous Chaotic Systems and Its Application in Secure Communication. J. Netw. Intell. 2020, 14, V14-94–V14-97, ISSN 2414-8105. [Google Scholar]
  23. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
  24. Song, W.; Fu, C. Protection of image ROI using chaos-based encryption and DCNN based object detection. Neural Comput. Appl. 2022, 34, 5743–5756. [Google Scholar] [CrossRef]
  25. Song, W.; Fu, C. A parallel image encryption algorithm using intra bitplane scrambling. Math. Comput. Simul. 2023, 204, 71–88. [Google Scholar] [CrossRef]
Figure 1. Bifurcation diagram with the a of the proposed system (12).
Figure 1. Bifurcation diagram with the a of the proposed system (12).
Entropy 25 00818 g001
Figure 2. Output of chaotic sequences with different initial values of state variables and their autocorrelations: (a) output of x 1 ( k ) when the initial values of the system are different; (b) autocorrelations of x 1 ( k ) when x 1 ( 0 ) = 0.3 , x 2 ( 0 ) = 0.1 , and x 3 ( 0 ) = 0.1 ; (c) output chaotic sequences of x 1 ( k ) when x 1 ( 0 ) = 0.2 ; (d) output of x 3 ( k ) when the initial values of the system are different; (e) autocorrelations of the output chaotic sequences ( x 3 ( k ) ) when x 1 ( 0 ) = 0.1 , x 2 ( 0 ) = 0.2 , and x 3 ( 0 ) = 0.5 ; (f) output chaotic sequences of x 3 ( k ) when x 3 ( 0 ) = 0.1 .
Figure 2. Output of chaotic sequences with different initial values of state variables and their autocorrelations: (a) output of x 1 ( k ) when the initial values of the system are different; (b) autocorrelations of x 1 ( k ) when x 1 ( 0 ) = 0.3 , x 2 ( 0 ) = 0.1 , and x 3 ( 0 ) = 0.1 ; (c) output chaotic sequences of x 1 ( k ) when x 1 ( 0 ) = 0.2 ; (d) output of x 3 ( k ) when the initial values of the system are different; (e) autocorrelations of the output chaotic sequences ( x 3 ( k ) ) when x 1 ( 0 ) = 0.1 , x 2 ( 0 ) = 0.2 , and x 3 ( 0 ) = 0.5 ; (f) output chaotic sequences of x 3 ( k ) when x 3 ( 0 ) = 0.1 .
Entropy 25 00818 g002
Figure 3. Phase diagrams of proposed 3D hyperchaotic mapping (5): (a) x 1 x 3 ; (b) x 2 x 3 ; (c) x 1 x 2 ; (d) x 1 x 2 x 3 .
Figure 3. Phase diagrams of proposed 3D hyperchaotic mapping (5): (a) x 1 x 3 ; (b) x 2 x 3 ; (c) x 1 x 2 ; (d) x 1 x 2 x 3 .
Entropy 25 00818 g003aEntropy 25 00818 g003b
Figure 4. (a) Dynamical curves of status variables x 1 ( k ) and y 1 ( k ) ; (b) dynamical curves of e 1 ( k ) ; (c) dynamical curves of status variables x 2 ( k ) and y 2 ( k ) ; (d) dynamical curves of e 2 ( k ) ; (e) dynamical curves of status variables x 3 ( k ) and y 3 ( k ) ; (f) dynamical curves of e 3 ( k ) .
Figure 4. (a) Dynamical curves of status variables x 1 ( k ) and y 1 ( k ) ; (b) dynamical curves of e 1 ( k ) ; (c) dynamical curves of status variables x 2 ( k ) and y 2 ( k ) ; (d) dynamical curves of e 2 ( k ) ; (e) dynamical curves of status variables x 3 ( k ) and y 3 ( k ) ; (f) dynamical curves of e 3 ( k ) .
Entropy 25 00818 g004
Figure 5. Output of chaotic sequences with different initial values of state variables and their autocorrelations: (a) output of x 4 ( k ) when the initial values of the system are different; (b) autocorrelations of x 4 ( k ) when x 1 ( 0 ) = 0.3 , x 2 ( 0 ) = 0.1 , x 3 ( 0 ) = 0.1 , x 4 ( 0 ) = 0.1 , x 5 ( 0 ) = 0.1 , and x 6 ( 0 ) = 0.1 ; (c) output chaotic sequences of x 4 ( k ) when x 4 ( 0 ) = - 0.1 ; (d) output of x 6 ( k ) when the initial values of the system are different; (e) autocorrelations of the output chaotic sequences of x 6 ( k ) when x 1 ( 0 ) = 0.1 , x 2 ( 0 ) = 0.2 , x 3 ( 0 ) = 0.5 , x 4 ( 0 ) = 0.5 , x 5 ( 0 ) = 0.3 , and x 6 ( 0 ) = 0.3 ; (f) output chaotic sequences of x 6 ( k ) when x 6 ( 0 ) = 0.3 .
Figure 5. Output of chaotic sequences with different initial values of state variables and their autocorrelations: (a) output of x 4 ( k ) when the initial values of the system are different; (b) autocorrelations of x 4 ( k ) when x 1 ( 0 ) = 0.3 , x 2 ( 0 ) = 0.1 , x 3 ( 0 ) = 0.1 , x 4 ( 0 ) = 0.1 , x 5 ( 0 ) = 0.1 , and x 6 ( 0 ) = 0.1 ; (c) output chaotic sequences of x 4 ( k ) when x 4 ( 0 ) = - 0.1 ; (d) output of x 6 ( k ) when the initial values of the system are different; (e) autocorrelations of the output chaotic sequences of x 6 ( k ) when x 1 ( 0 ) = 0.1 , x 2 ( 0 ) = 0.2 , x 3 ( 0 ) = 0.5 , x 4 ( 0 ) = 0.5 , x 5 ( 0 ) = 0.3 , and x 6 ( 0 ) = 0.3 ; (f) output chaotic sequences of x 6 ( k ) when x 6 ( 0 ) = 0.3 .
Entropy 25 00818 g005
Figure 6. Phase diagrams of proposed 6D hyperchaotic system (14): (a) x 1 ( k ) x 2 ( k ) ; (b) x 3 ( k ) x 4 ( k ) ; (c) x 4 ( k ) x 5 ( k ) ; (d) x 5 ( k ) x 6 ( k ) ; (e) x 1 ( k ) x 2 ( k ) x 3 ( k ) ; (f) x 3 ( k ) x 4 ( k ) x 5 ( k ) ; (g) x 2 ( k ) x 3 ( k ) x 4 ( k ) ; (h) x 4 ( k ) x 5 ( k ) x 6 ( k ) .
Figure 6. Phase diagrams of proposed 6D hyperchaotic system (14): (a) x 1 ( k ) x 2 ( k ) ; (b) x 3 ( k ) x 4 ( k ) ; (c) x 4 ( k ) x 5 ( k ) ; (d) x 5 ( k ) x 6 ( k ) ; (e) x 1 ( k ) x 2 ( k ) x 3 ( k ) ; (f) x 3 ( k ) x 4 ( k ) x 5 ( k ) ; (g) x 2 ( k ) x 3 ( k ) x 4 ( k ) ; (h) x 4 ( k ) x 5 ( k ) x 6 ( k ) .
Entropy 25 00818 g006
Figure 7. Dynamical diagrams of status variables with k: System (21): (a) ( x 1 ( k ) , y 1 ( k ) ) ; (b) e 1 ( k ) ; (c) ( x 2 ( k ) , y 2 ( k ) ) ; (d) e 2 ( k ) ; System (22): (e) ( x 3 ( k ) , y 3 ( k ) ) ; (f) e 3 ( k ) ; (g) ( x 4 ( k ) , y 4 ( k ) ) ; (h) e 4 ( k ) ; System (23): (i) ( x 5 ( k ) , y 5 ( k ) ) ; (j) e 5 ( k ) ; (k) ( x 6 ( k ) , y 6 ( k ) ) ; (l) e 6 ( k ) .
Figure 7. Dynamical diagrams of status variables with k: System (21): (a) ( x 1 ( k ) , y 1 ( k ) ) ; (b) e 1 ( k ) ; (c) ( x 2 ( k ) , y 2 ( k ) ) ; (d) e 2 ( k ) ; System (22): (e) ( x 3 ( k ) , y 3 ( k ) ) ; (f) e 3 ( k ) ; (g) ( x 4 ( k ) , y 4 ( k ) ) ; (h) e 4 ( k ) ; System (23): (i) ( x 5 ( k ) , y 5 ( k ) ) ; (j) e 5 ( k ) ; (k) ( x 6 ( k ) , y 6 ( k ) ) ; (l) e 6 ( k ) .
Entropy 25 00818 g007
Figure 8. Framework diagram of proposed encrypted transmission system.
Figure 8. Framework diagram of proposed encrypted transmission system.
Entropy 25 00818 g008
Figure 9. Results of proposed encryption and decryption transmission system: (a) original Lena; (b) encrypted Lena; (c) decrypted Lena.
Figure 9. Results of proposed encryption and decryption transmission system: (a) original Lena; (b) encrypted Lena; (c) decrypted Lena.
Entropy 25 00818 g009
Figure 10. Histograms of different components: Original Lena: (a) R component of original Lena; (b) G component of original Lena; (c) B component of original Lena; Encrypted Lena: (d) R component of encrypted Lena; (e) G component of encrypted Lena; (f) B component of encrypted Lena.
Figure 10. Histograms of different components: Original Lena: (a) R component of original Lena; (b) G component of original Lena; (c) B component of original Lena; Encrypted Lena: (d) R component of encrypted Lena; (e) G component of encrypted Lena; (f) B component of encrypted Lena.
Entropy 25 00818 g010
Figure 11. Results of decrypting image using slightly different keystreams: (a) decryption result for correct key; (b) decryption result for wrong key.
Figure 11. Results of decrypting image using slightly different keystreams: (a) decryption result for correct key; (b) decryption result for wrong key.
Entropy 25 00818 g011
Figure 12. Test result graphs for resistance to data attacks: (a) cropped with black pixels in encrypted Lena; (b) decrypted Lena.
Figure 12. Test result graphs for resistance to data attacks: (a) cropped with black pixels in encrypted Lena; (b) decrypted Lena.
Entropy 25 00818 g012
Figure 13. Correlations between pixel points in different orientations of original image: (a) correlation between horizontal pixel points of R component; (b) correlation between vertical pixel points of R component; (c) correlation between diagonal pixel points of R component; (h) correlation between horizontal pixel points of G component; (i) correlation between vertical pixel points of G component; (j) correlation between diagonal pixel points of G component; (n) correlation between horizontal pixel points of B component; (o) correlation between vertical pixel points of B component; (p) correlation between diagonal pixel points of B component. (d) correlation between horizontal pixel points of R component; (e) correlation between vertical pixel points of R component; (f) correlation between diagonal pixel points of R component; (k) correlation between horizontal pixel points of G component; (l) correlation between vertical pixel points of G component; (m) correlation between diagonal pixel points of G component; (q) correlation between horizontal pixel points of B component; (r) correlation between vertical pixel points of B component; (s) correlation between diagonal pixel points of B component.
Figure 13. Correlations between pixel points in different orientations of original image: (a) correlation between horizontal pixel points of R component; (b) correlation between vertical pixel points of R component; (c) correlation between diagonal pixel points of R component; (h) correlation between horizontal pixel points of G component; (i) correlation between vertical pixel points of G component; (j) correlation between diagonal pixel points of G component; (n) correlation between horizontal pixel points of B component; (o) correlation between vertical pixel points of B component; (p) correlation between diagonal pixel points of B component. (d) correlation between horizontal pixel points of R component; (e) correlation between vertical pixel points of R component; (f) correlation between diagonal pixel points of R component; (k) correlation between horizontal pixel points of G component; (l) correlation between vertical pixel points of G component; (m) correlation between diagonal pixel points of G component; (q) correlation between horizontal pixel points of B component; (r) correlation between vertical pixel points of B component; (s) correlation between diagonal pixel points of B component.
Entropy 25 00818 g013
Table 1. Correlation coefficient results for original Lena and encrypted Lena.
Table 1. Correlation coefficient results for original Lena and encrypted Lena.
ImageDirectionPlain ImageCipher Image
RGBRGB
LenaHorizontal0.93370.91700.90880.00110.0013−0.0065
Vertical0.96690.96040.95380.00680.00480.0015
Diagonal0.90630.88860.8789−0.0048−0.0025−0.0041
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xing, Y.; Dong, W.; Zeng, J.; Guo, P.; Zhang, J.; Ding, Q. Study of Generalized Chaotic Synchronization Method Incorporating Error-Feedback Coefficients. Entropy 2023, 25, 818. https://doi.org/10.3390/e25050818

AMA Style

Xing Y, Dong W, Zeng J, Guo P, Zhang J, Ding Q. Study of Generalized Chaotic Synchronization Method Incorporating Error-Feedback Coefficients. Entropy. 2023; 25(5):818. https://doi.org/10.3390/e25050818

Chicago/Turabian Style

Xing, Yanan, Wenjie Dong, Jian Zeng, Pengteng Guo, Jing Zhang, and Qun Ding. 2023. "Study of Generalized Chaotic Synchronization Method Incorporating Error-Feedback Coefficients" Entropy 25, no. 5: 818. https://doi.org/10.3390/e25050818

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop