Next Article in Journal
New Versions of Midpoint Inequalities Based on Extended Riemann–Liouville Fractional Integrals
Next Article in Special Issue
Fractional PID Controller for Voltage-Lift Converters
Previous Article in Journal
The Properties of Meromorphic Multivalent q-Starlike Functions in the Janowski Domain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

FPGA Implementation of Parameter-Switching Scheme to Stabilize Chaos in Fractional Spherical Systems and Usage in Secure Image Transmission

by
Vincent-Ademola Adeyemi
1,
Esteban Tlelo-Cuautle
2,
Yuma Sandoval-Ibarra
3 and
Jose-Cruz Nuñez-Perez
1,*
1
Instituto Politécnico Nacional, IPN-CITEDI, Tijuana 22435, Mexico
2
Instituto Nacional de Astrofísica, Óptica y Electrónica, INAOE, San Andres Cholula 72840, Mexico
3
Departamento de Posgrado, Universidad Politécnica de Lázaro Cárdenas, UPLC, Lázaro Cárdenas 60950, Mexico
*
Author to whom correspondence should be addressed.
Fractal Fract. 2023, 7(6), 440; https://doi.org/10.3390/fractalfract7060440
Submission received: 10 March 2023 / Revised: 1 May 2023 / Accepted: 22 May 2023 / Published: 30 May 2023
(This article belongs to the Special Issue Design, Optimization and Applications for Fractional Chaotic System)

Abstract

:
The main objective of this work was to implement the parameter-switching chaos control scheme for fractional-order spherical systems and develop a chaos-based image encryption and transmission system. The novelty in the developed secure communication system is the application of the parameter-switching scheme in the decryption of RGB and grayscale images, which undergo one round of encryption using the chaotic states of the fractional system and a diffusion process. The secure communication system has a synchronized master and slave topology, resulting in transmitter and receiver systems for encrypting and decrypting images, respectively. This work was demonstrated numerically and also implemented on two FPGAs, namely Artix-7 AC701 and Cyclone V. The results show that the parameter-switching scheme controls chaos in the fractional-order spherical systems effectively. Furthermore, the performance analysis of the image encryption and transmission system shows that there is no similarity between the original and encrypted images, while the decryption of the encrypted images is without a loss of quality. The best result in terms of the encryption was obtained from the chaotic state x of the fractional-order system, with correlation coefficients of 0.0511 and 0.0392 for the RGB and grayscale images, respectively. Finally, the utilization of the FPGA logical resources shows that the implementation on Artix-7 AC701 is more logic-efficient than on Cyclone V.

1. Introduction

The fundamental theory of fractional calculus dates back to over 300 years ago [1,2]. Gottfried Wilhelm Leibniz, a German mathematician, invented the notation ( d n y ) / ( d x n ) for the derivatives of integer order, where order n is a non-negative integer. Generally, fractional calculus allows for the integration and differentiation of any positive real order—fractional, complex, or irrational. Since the birth of fractional calculus, it has continued to have major impacts in science and engineering, where it is applied to the modeling of complex and dynamic systems, which are called fractional-order systems (FOSs). These systems are usually described by a coupled system of difference equations, called fractional differential equations (FDEs).
One of the advantages of the fractional derivatives over the integer order is that they describe the holistic evolution of the system that they are modeling; hence, they give a more precise model of the system. For example, fractional calculus intervention can be seen in recent works in the following fields, to name a few: in physics, modelling astrophysics [3], energy systems [4], and quantum systems [5]; in biology, modeling in cell biology [6], cancer biology [7], and computational biology [8,9]; in engineering, dynamics and control [10,11], fluid mechanics and aerodynamics [12,13], and telecommunication [14,15]. These are some areas where fractional calculus is applied. There are many definitions for fractional derivatives and there exist several numerical and approximate analytical methods for obtaining the approximate solution to the FDEs because most of them do not have an exact solution.
Chaos is a notable phenomenon arising from nonlinear dynamical systems. Basically, chaos is the irregular and unpredictable time evolution of nonlinear dynamical systems whereby trajectories emerging from very close initial points diverge exponentially. The concept of chaos was first discovered, albeit accidentally, by Henri Poincaré, a French mathematician, in the late 1880s while working on the famous n-body problem [16]. Several decades later, the chaos concept was officially made popular by Edward Norton Lorenz, a United States mathematician and meteorologist, by his again accidental finding while working on a weather forecast research between 1961 and 1963 [17]. Lorenz’s discoveries are twofold. First, the rounding off of the initial condition values to a digit different from the computer’s precision generated a considerable difference in the long-term outputs. His atmospheric flow nonlinear model was sensitive to its initial conditions. Second, the three-dimensional (3-D) graphical display of the orbits generated from the model. The plot showed an orderly set of points that are non-repeating, which are now called strange attractors. Consequently, the term “chaos theory”, otherwise called the “butterfly effect”, was coined in 1975 by James A. Yorke, a mathematician, to describe the chaos phenomenon [18,19].
The study of chaos has revealed the unique properties inherent in the phenomenon [20,21,22,23]. Some of these properties include: (1) the sensitivity of the system to, for example, its initial conditions and parameters, and being (2) aperiodic, (3) deterministic, (4) ergodic, and (5) topologically transitive. A chaotic system’s qualitative behavior after a large amount of iterations could be an attractor that is either chaotic, periodic, or quasi-periodic depending on the initial conditions’ basin of attraction. For the chaotic attractor, its phase space consists of a dense set of unstable periodic orbits (UPOs). Methods such as Pyragas and OGY have been applied to stabilize chaotic nonlinear dynamical systems [24,25,26,27]. In addition, the investigations in [28,29,30] applied feedback control methods to stabilize chaos. Though these methods have been proven to be successful, they have a shortcoming in that they force the UPOs into stable periodic orbits, thereby distorting the original chaotic attractor.
The properties of chaos—for example, the ergodicity and sensitivity of the system to its initial conditions and parameters—are being applied to create different types of systems, most importantly cryptosystems and communication systems. The intervention of chaos in a cryptosystem is significant in this digital world because of the growing need in various sectors to protect confidential and personal information from unauthorized access while they are in storage or in transit over a network. In particular, the proliferation in the usage of images in many sectors, such as military, healthcare, and security, calls for the adequate protection of these sensitive and private images. Consequently, the problem of protecting image information has become an attractive topic for researchers in recent times, giving rise to the proposal of different image encryption methods. In the last few years, many investigations have been performed on chaos-based image encryption and secure communication systems. Examples can be found in [31,32,33,34,35,36,37,38,39], which are all implemented on the field programmable gate array (FPGA) cards. For electronic implementations, the FPGA has become a better choice over operational amplifiers (OPAMPs) because it is reusable, very cost-effective, faster in performing parallel processing, and faster and efficient with regard to system design. Some other chaos-based image encryption systems implemented numerically and on other devices can be found in [40,41,42,43,44,45,46,47].
In this paper, we present a technique called parameter switching to stabilize fractional-order chaotic spherical systems (FOCSSs). The parameter-switching scheme preserves the underlying chaotic attractor while controlling chaos in the system. Furthermore, we present an image encryption system, whereby the parameter-switching scheme is applied in the decryption of encrypted RGB and grayscale images. The motivation behind this work is the need for effective methods to stabilize fractional-order systems and to increase the number of works in the literature that apply fractional-order systems in secure communication systems, which, to the best of the authors’ knowledge, are few at the moment. This present investigation makes the contributions stated below to improve the state of the art:
(i)
A digital realization of a parameter-switching scheme to stabilize chaos in fractional-order and spherical chaotic nonlinear systems using Grünwald–Letnikov for the numerical approximation and VHDL as the hardware description language.
(ii)
A master–slave-based synchronization of fractional-order and spherical nonlinear systems using the Hamiltonian system with an observer-based approach for the purpose of communication.
(iii)
A methodology developed to implement a secure image transmission system on Xilinx and Intel FPGA cards using the parameter-switching technique as a decryption mechanism. The implementation was achieved on two FPGA cards, namely Xilinx’s Artix-7 AC701 and Intel’s Cyclone V.
The presentation of this work is structured into six sections. Following the introduction is Section 2, which contains the theoretical framework describing the numerical method, models, and techniques relevant to this investigation. Section 3 shows the numerical implementation of the chaos control using the parameter-switching technique for fractional-order chaotic systems and their synchronization using the Hamiltonian system. In Section 4, the digital implementation of chaos control and synchronization using VHDL is also presented. Section 5 contains the implementation on the FPGA of the secure system of image transmission, while we present the conclusion of this investigation in Section 6.

2. Theoretical Framework

This section begins by describing the Grünwald–Letnikov numerical method for evaluating fractional-order systems. In addition, the fractional-order chaotic model used in this work is introduced. Furthermore, this section introduces the parameter-switching technique for controlling chaos and also presents the synchronization strategy for the fractional-order chaotic systems.

2.1. Grünwald–Letnikov Numerical Method

In fractional-order differential equations, unknown functions are embedded under the operation of fractional-order derivatives. The FDEs generalize differential equations by the application of fractional calculus. Fractional calculus is the generalization of the integer-order differentiation and integration to arbitrary real or complex orders, which are called fractional derivatives and fractional integrals. Given
D f ( x ) = d d x f ( x ) ,
where D is the differentiation operator, and
I f ( x ) = 0 x f ( y ) d y ,
where I is the integration operator, in the context of real or complex number powers for Equations (1) and (2), the fractional derivative and fractional integral of the function f are combined into a general, non-integer, and continuous differintegral operator D q , which is defined as:
a D t q = d q d t q , : q > 0 , 1 , : q = 0 , a t ( d τ ) q , : q < 0 ,
where q R , a and t are the bounds of the operator, and t > a . It is seen that D q is a fractional derivative when q > 0 , fractional integral when q < 0 , and equal to 1 when q = 0 .
There are many definitions for the fractional differintegral operator (3). Some of the popular ones are Grünwald–Letnikov [48], Riemann–Liouville [49], and Caputo [50]. In this work, the Grünwald–Letnikov definition and numerical approximation method was adopted to define and provide a solution to the fractional-order chaotic systems. The choice of the Grünwald–Letnikov definition for solving the system of FDEs in this work stems from its convenience with regard to its application. Though the basis is the standard differential operator, it is applicable to the arbitrary order q and uses a discrete addition and binomial coefficient term. Given the forward difference derivative
f ( x ) = lim x 0 f ( x + h ) f ( x ) h ,
where h is the step size, higher-order derivatives can be determined recursively. For the second-order derivative, we have:
f ( x ) = lim x 0 f ( x + 2 h ) 2 f ( x + h ) + f ( x ) h 2 .
Using the binomial coefficient n k , where k N refers to a term in the polynomial expansion, the formula can be generalized for the n-th derivative as follows:
f n ( x ) = lim h 0 1 n h n k = 0 n ( 1 ) k n k f ( x + k h ) .
Therefore, if p R replaces the integer n in (6) and the substitution h by h is made, then the Grünwald–Letnikov direct definition for fractional derivatives is given in the following definition [51].
Definition 1.
Let q R , where | q | n , and let n = ( x a ) / h ; then, the Grünwald–Letnikov fractional derivative is defined as
a D t q f ( x ) = lim h 0 1 h q k = 0 n ( 1 ) k q k f ( x k h ) .
In the Grünwald–Letnikov definition in (7), the binomial coefficients are ( 1 ) k q k for k = 0 , 1 , 2 , , which are calculated as follows:
c 0 ( q ) = 1 , c k ( q ) = 1 1 + q k c k 1 ( q ) .
When the binomial coefficient is expanded, and using the Gamma function to represent the factorial elements, we have
q k = q ! k ! ( n k ) ! = Γ ( q + 1 ) k ! Γ ( q + 1 k ) .
Hence, by replacing the binomial coefficient in the definition in (7), the Grünwald–Letnikov derivative becomes:
a D t q f ( x ) = lim h 0 1 h q k = 0 x a h ( 1 ) k Γ ( q + 1 ) k ! Γ ( q + 1 k ) f ( x k h ) , q R , q N 1 .
For the numerical evaluation of the q-th derivative of a fractional-order system at the points t j = j h , for j = 1 , 2 , , using the Grünwald–Letnikov definition, the following relation is applied:
a D t j q f ( x ) h q k = 0 j q k f ( t j k ) .
Therefore, the general numerical approximation using the Grünwald–Letnikov derivative for fractional-order differential equation
a D * q x ( t ) = f ( x ( t ) , t )
is written as:
x ( t j ) = f ( x ( t j ) , t j ) h q k = 1 j c k ( q ) x ( t j k ) .
Because of the summation operator in the Grünwald–Letnikov derivative, the numerical approximation considers the entire past solutions of the system, from the present point down to the starting point.

2.2. Fractional-Order Chaotic Spherical System

The primary tool in this investigation was the fractional-order model of a 3-D chaotic system proposed in [52], which belongs to a group of dynamical systems that generate spherical attractors. The coupled fractional differential equations of the system are:
D * q 1 x = a 1 x a 2 y + a 3 z + 2 1 e 200   sin   y 1 + e 200   sin   y D * q 2 y = d x z + b + e x D * q 3 z = c 1 x y + c 2 y z + c 3 z + c }
where q 1 , q 2 , and q 3 are the fractional derivative orders, a i 0 , c i 0   ( 1 i 3 ) , b 0 , c 0 , d 0 , and e are all real parameters, and the system-dependent variables are x, y, and z. To numerically evaluate the FOCSS, the Grünwald–Letnikov derivative is applied following the general form given in (13). Therefore, the model in (14) using Grünwald–Letnikov discretization according to Equation (13) becomes:
x ( t j ) = a 1 x ( t i 1 ) a 2 y ( t i 1 ) + a 3 z ( t i 1 ) + 2 1 e 200   sin   y ( t i 1 ) 1 + e 200   sin   y ( t i 1 ) h q 1 k = 1 j c k ( q 1 ) x ( t j k ) , y ( t j ) = ( d x ( t j ) z ( t j 1 ) + b + e x ( t j ) ) h q 2 k = 1 j c k ( q 2 ) y ( t j k ) , z ( t j ) = ( c 1 x ( t j ) y ( t j ) + c 2 y ( t j ) z ( t j 1 ) + c 3 z ( t j 1 ) + c ) h q 3 k = 1 j c k ( q 3 ) z ( t j k ) , }
The system parameter values for the above model are a 1 = 4.1 , a 2 = 1.2 , a 3 = 13.45 , b = 0.161 , and c = 3.5031 . Others are c 1 = 2.76 , c 2 = 0.6 , c 3 = 13.13 , d = 1.6 , and e = 0 . The initial condition is ( x 0 , y 0 , z 0 ) = ( 0.04 , 15.8 , 1.4 ) . This work considered the incommensurate fractional order; therefore, it is important to find appropriate fractional orders that can make the FOCSS (14) exhibit chaotic behavior. To achieve this goal, a script was created to perform simulation tests on the system with q 1 , q 2 , and q 3 values between 0 and 1 for step-size h = 0.01 and h = 0.001 . At the end of the tests, q 1 = 0.9993 , q 2 = 0.9996 , and q 3 = 0.9999 at h = 0.01 were selected for this work.
The dynamical behavior of the FOCSS was numerically analyzed using a phase diagram, bifurcation diagram, and Lyapunov exponent (LE) spectra. The LEs L 1 , L 2 , , L n , where n is the dimension of the phase space, were numerically computed using the following formula:
L m 1 T i = 1 K l n | | ω m i | | ,
where m = 1 , 2 , , n and n is the dimension of the phase space, K is the orthonormalization time, and ω is a set of orthonormal vectors obtained by the Gram–Schmidt orthonormalization procedure. For the FOCSS, the LEs are L 1 = 0.0973 , L 2 = 0 , and L 3 = 0.1144 . The bifurcation plot and the Lyapunov exponent spectra are presented in Figure 1.
It is noted that the chaotic attractor was characterized by local instability (chaotic dynamics) and, as the orbits evolved, they formed a closed spherical shape over a long-time simulation. The bifurcation plot and Lyapunov exponent spectra in Figure 1 show the dynamism of the FOCSS (14) and they are in complete agreement. Moreover, it is observed that there is a bifurcation point very close to a 2 = 0.75 .

2.3. Parameter-Switching Technique

Generally, parameter switching is a technique applied to numerically approximate any attractor of an autonomous and continuous nonlinear dynamical system, whether stable or chaotic [31,53]. The technique is based on the theory of Parrondo’s paradox applied in game theory, which states that a combination of losing strategies becomes a winning strategy, and vice versa [54]. In the context of the parameter-switching technique and application in chaos theory, chaos represents losing whereas order (stability) represents winning. Hence, we can write:
c h a o s 1 + c h a o s 2 + + c h a o s N = o r d e r ,
o r d e r 1 + o r d e r 2 + + o r d e r N = c h a o s .
To describe the parameter-switching technique, we start with the following general initial value problem (IVP), describing a large class of fractional-order dynamical systems:
D * q x ( t ) = f ( x ( t ) ) + p A x ( t ) , x ( 0 ) = x 0 ,   t I = [ 0 , T ] ,
in which D * q represents Caputo’s deferential operator of order q, where 0 < q < 1 , and the continuous nonlinear function is f : R n R n . In addition, the control parameter is p R , whose values will be switched, the initial condition is x 0 R n , A is a constant matrix, where A L ( R n ) , and T > 0 . When q = 1 in the IVP (19), the system becomes a classical integer-order IVP, which can be easily evaluated by standard numerical methods with a fixed step size, such as fourth-order Runge–Kutta. With respect to the FOCSS (14), if parameter c 3 is replaced with p, we have the following:
f ( x ) = a 1 x a 2 y + a 3 z + 2 1 e 200   sin   y 1 + e 200   sin   y d x z + b + e x c 1 x y + c 2 y z + c 3 z + c
A = 0 0 0 0 0 0 0 0 1
The control parameters p = p 1 , p 2 , , p N , with N > 1 , are deterministically switched over a short time period (integration steps) during which the IVP is integrated numerically, i.e., when p = p 1 , the IVP is integrated for w 1 steps, at p = p 2 , the IVP is integrated for w 2 steps, and so on, up to p = p N for w N steps. The switching will keep repeating throughout the entire integration time I. Finally, the solution obtained from the IVP by the parameter-switching algorithm, called the “switched” solution and denoted by A S , converges to the “averaged” solution A * obtained at p = p * in (19), where p * represents the average of parameters that are deterministically switched. Parameters p i and the associated weights w i must be selected such that the following equation is satisfied:
p * = i = 1 N w i p i i = 1 N w i
In the case of obtaining stable cycles (chaos control), the switched parameters p i and “averaged” parameter p * are selected from the chaotic regions and the periodic region of the dynamical system, respectively, and there exists at least one periodic region between the chaotic regions. On the other hand, the reverse is the case for obtaining chaotic attractors (chaos anti-control), i.e., the switched parameters are chosen from the periodic regions whereas p * belongs to a chaotic region, and there is at least one chaotic region between the periodic regions. To computationally verify the results of the parameter-switching scheme, phase diagrams and time series were applied to compare the attractor A S of the parameter switching with the attractor A * of the “averaged” solution. For the purpose of this work, the parameter-switching scheme was used to stabilize the chaotic attractors of the FOCSS (14). The approximation of attractors of dynamical systems using the parameter-switching algorithm and its convergence are encapsulated in the following methodology: (1) Replace a system parameter in the IVP with control parameter p, which represents the switched parameters; (2) Select the appropriate switched parameters p 1 , p 2 , , p N , and their associated weights w 1 , w 2 , , w N ; (3) Execute the parameter-switching algorithm to numerically evaluate the IVP and generate the “switched” solution A S ; (4) Replace the switched parameters p in the IVP with their average value p * , and numerically evaluate the IVP to generate attractor A * of the “averaged” solution; (5) Verify that A S matches A * .
Remark 1.
The possibility of having different switched parameters p means that different numerical solutions can be obtained.
Remark 2.
With different values for the switched parameters and associated weights, it is possible to obtain the same attractor A S .
Remark 3.
In order to reduce the transient steps, the initial conditions for the “switched” solution and “averaged” solution are the same, without a loss of generality.

2.4. Hamiltonian System

In this section, a synchronization method known as the observer-based Hamiltonian system for synchronizing two fractional-order chaotic systems is presented. In this context, the synchronized systems are in a master–slave relationship, with the master system’s states being observed by the slave system. A detailed mathematical description of the method used to model the master and slave FOCSS (14) is as follows: Let
D * q = f ( x )
be a fractional-order dynamical system, where the state variable is D * q x R n and the nonlinear function is f : R n R n . System (23) can also be written as:
D * q = A H x + F ( x ) ,
in which A = A A T 2 + A + A T 2 and F ( x ) is a destabilizing vector field, whereby A and F ( x ) represent the fractional-order system equations. Hence,
D * q = A A T 2 H x + A + A T 2 H x + F ( x ) .
If J ( x ) = A A T 2 and S ( x ) = A + A T 2 , Equation (24) can then be transformed into a generalized Hamiltonian canonical system as follows:
D * q = J H x + S H x + F ( x ) , x R n ,
where H ( x ) = 1 2 x T M x is a positive smooth energy function definite in R n and M is a constant, symmetric, positive definite matrix. Therefore, H x = M x , which is the column gradient vector of H ( x ) . Matrix J ( x ) satisfies J ( x ) + J T ( x ) = 0 and S ( x ) satisfies S ( x ) = S T ( x ) for all x R n . The vector field, denoted by J ( x ) H x , exhibits the conservative aspect of the system, whereas S ( x ) shows the non-conservative part.
Now, the master system, or simply the master, is created with a destabilizing vector field and an output y ( t ) as shown in Equation (27):
D * q x = J ( y ) H x + S ( y ) H x + F ( y ) , x R n , y = C H x , y R m , }
where S is a constant symmetric matrix and C is a constant matrix.
For the slave system, or simply the slave, the estimate of state vector x is represented by ξ , whereas the estimated output is represented by η . Hence, the slave system is denoted by:
D * q ξ = J ( y ) H ξ + S ( y ) H ξ + F ( y ) + g i ϕ i , ξ R n , η = C H ξ , η R m , }
where g i is the observer gain and ϕ i = y η is the output estimation error, with i = 1 , 2 , 3 . Hence, ϕ = x ξ is the state estimation error.
Generally, the status of the synchronization of the two systems, successful or otherwise, is determined by the conditions given in Definition 1 and Theorems 3 and 4 in [32]. Based on the Hamiltonian synchronization system analysis, the master and slave systems of the FOCSS (14) is constructed as follows:
J ( x ) = 0 a 2 e 2 a 3 2 a 2 + e 2 0 c 1 x d x 2 a 3 2 c 1 x d x 2 0
S ( x ) = a 1 a 2 + e 2 a 3 2 a 2 + e 2 0 c 1 x d x 2 a 3 2 c 1 x d x 2 c 2 y + c 3
and
F ( x ) = 2 1 e 200   sin   y 1 + e 200   sin   y b c
From Equation (27),
D * q 1 x D * q 2 y D * q 3 z = 0 a 2 e 2 a 3 2 a 2 + e 2 0 c 1 x d x 2 a 3 2 c 1 x d x 2 0 H x + a 1 a 2 + e 2 a 3 2 a 2 + e 2 0 c 1 x d x 2 a 3 2 c 1 x d x 2 c 2 y + c 3 H x + 2 1 e 200   sin   y 1 + e 200   sin   y b c
where H ( x ) = 1 2 [ x 2 + y 2 + z 2 ] , with the gradient vector H x = x y z .
Hence, the master system is written as follows:
D * q 1 x D * q 2 y D * q 3 z = a 1 x a 2 y + a 3 z d x z + e x c 1 x y + c 2 y z + c 3 z + 2 1 e 200   sin   y 1 + e 200   sin   y b c
Furthermore, from Equation (28),
D * q 1 u D * q 2 v D * q 3 r = 0 a 2 e 2 a 3 2 a 2 + e 2 0 c 1 u d u 2 a 3 2 c 1 u d u 2 0 H ξ + a 1 a 2 + e 2 a 3 2 a 2 + e 2 0 c 1 u d u 2 a 3 2 c 1 u d u 2 c 2 v + c 3 H ξ + 2 1 e 200   sin   v 1 + e 200   sin   v b c + g 1 g 2 g 3 ϕ i
and the slave system is simplified to become
D * q 1 u D * q 2 v D * q 3 r = a 1 u a 2 v + a 3 r d u r + e u c 1 u v + c 2 v r + c 3 r + 2 1 e 200   sin   v 1 + e 200   sin   v b c + g 1 g 2 g 3 ϕ i
where g 1 , g 2 , and g 3 are the observer gains, and ϕ i is the error arising from the synchronization.
It is seen that the master is the original FOCSS (14), but the slave system is modeled to receive feedbacks in each iteration with the error already being compensated. Both systems are expressed below in Grünwald–Letnikov derivative form:
x ( t j ) = a 1 x ( t i 1 ) a 2 y ( t i 1 ) + a 3 z ( t i 1 ) + 2 1 e 200   sin   y ( t i 1 ) 1 + e 200   sin   y ( t i 1 ) h q 1 k = 1 j c k ( q 1 ) x ( t j k ) , y ( t j ) = ( d x ( t j ) z ( t j 1 ) + b + e x ( t j ) ) h q 2 k = 1 j c k ( q 2 ) y ( t j k ) , z ( t j ) = ( c 1 x ( t j ) y ( t j ) + c 2 y ( t j ) z ( t j 1 ) + c 3 z ( t j 1 ) + c ) h q 3 k = 1 j c k ( q 3 ) z ( t j k ) , }
u ( t j ) = a 1 u ( t i 1 ) a 2 v ( t i 1 ) + a 3 r ( t i 1 ) + 2 1 e 200   sin   v ( t i 1 ) 1 + e 200   sin   v ( t i 1 ) + g 1 ϕ 1 h q 1 k = 1 j c k ( q 1 ) u ( t j k ) , v ( t j ) = ( d u ( t j ) r ( t j 1 ) + b + e u ( t j ) + g 2 ϕ 2 ) h q 2 k = 1 j c k ( q 2 ) v ( t j k ) , r ( t j ) = ( c 1 u ( t j ) v ( t j ) + c 2 v ( t j ) r ( t j 1 ) + c 3 r ( t j 1 ) + c + g 3 ϕ 3 ) h q 3 k = 1 j c k ( q 3 ) r ( t j k ) , }

3. Numerical Implementations

This section presents the results of the numerical implementations of chaos control in the fractional-order chaotic system (14) using the parameter-switching technique and the synchronization of the chaotic system using the Hamiltonian system. The numerical implementations were performed in Matlab version R2020b.

3.1. Chaos Control in FOCSS

By following the five-step methodology stated in Section 2.3 for synthesizing desired attractors of dynamical systems with the parameter-switching technique, a stable solution of the FOCSS (14) can be obtained. When a considerably long transient period is neglected, the solution obtained by the parameter switching will approximate a unique stabilized solution in the same basin of attraction.

3.1.1. Case 1: Four Control Parameters

The process begins by replacing parameter c 3 in FOCSS (14) with a control parameter p and, in this implementation, the number of control parameters is N = 4 . Therefore, let
  • P N = { p 1 , p 2 , p 3 , p 4 } = { 10.05 , 10.18 , 13.00 , 13.05 } , which are selected from the chaotic regions of the FOCSS (14) (see the bifurcation diagram in Figure 2);
  • W N = { w 1 , w 2 , w 3 , w 4 } = { 2 , 1 , 2 , 1 } , which are the corresponding weights of P N ; and
  • A N = { A p 1 , A p 2 , A p 3 , A p 4 } , which are the chaotic attractors corresponding to P N .
Figure 2. (a) Bifurcation diagram of FOCSS (14) with local maxima of state x, showing the location p * and (b) the corresponding Lyapunov exponent spectra. The LE axis is adjusted to make the three spectral lines more visible.
Figure 2. (a) Bifurcation diagram of FOCSS (14) with local maxima of state x, showing the location p * and (b) the corresponding Lyapunov exponent spectra. The LE axis is adjusted to make the three spectral lines more visible.
Fractalfract 07 00440 g002
It is noted that both P N and W N were carefully chosen such that Equation (22) is satisfied, whereby p * = 11.555 , which corresponds to a stable window of the FOCSS (14) (see Figure 2) located in the real open interval ( p 1 , p 4 ) . Three-dimensional phase plots (removing the transient time) and time series were applied to numerically verify that the “averaged” solution A * , obtained when parameter c 3 was replaced with p * in the FOCSS (14), was approximated by the “switched” solution A S . Figure 3 contains the chaotic attractors A N of P N and their state x time series. Figure 4 shows the attractors A S (red) and A * (blue) and the time series of both A S and A * .
The FOCSS (14) is a nonlinear system; and the effect of the nonlinearity and other factors, such as the sensitivity to its initial conditions, parameters, and fractional orders, is seen in Figure 3, whereby the attractors A p 1 , A p 2 , A p 3 , and A p 4 are chaotic. In a way, it can be said that these attractors were produced by four subsystems of (14), i.e., when c 3 = [ p 1 , p 2 , p 3 , p 4 ] . However, chaos in the underlying system was controlled, producing a stable cycle shown in Figure 4a, after the four subsystems were repeatedly evaluated by the parameter-switching algorithm. The verification of the effectiveness of the parameter-switching technique shows that the “switched” solution matches the “averaged” solution (Figure 4b). It is seen in the superimposed plot in Figure 4c that the synthesized stable attractor A S perfectly matches attractor A * , and in Figure 4d, where the time series of both solutions match each other.

3.1.2. Case 2: Six Control Parameters

In this case, the control parameter p in the FOCSS (14) includes six parameters for the chaos control, whereby N = 6 . Therefore, let
  • P N = { p 1 , p 2 , p 3 , p 4 , p 5 , p 6 } = { 10.18 , 10.34 , 10.56 , 13.00 , 13.05 , 13.125 } , which are selected from the chaotic regions of the FOCSS (14);
  • W N = { w 1 , w 2 , w 3 , w 4 , w 5 , w 6 } = { 2 , 1 , 2 , 2 , 1 , 1 } , which are the corresponding weights of P N ; and
  • A N = { A p 1 , A p 2 , A p 3 , A p 4 , A p 5 , A p 6 } , which are the chaotic attractors corresponding to P N .
As usual, both P N and W N were carefully chosen such that Equation (22) is satisfied, whereby p * = 11.555 , which corresponds to a stable window of the FOCSS (14) located in the real open interval ( p 1 , p 6 ) . Phase plots, together with time series, were applied to numerically verify that A * , obtained when parameter c 3 was replaced with p * in the FOCSS (14), was approximated by A S of the parameter-switching algorithm. Figure 5 presents the chaotic attractors A N of P N and their time series. Figure 6 shows the attractors A S (red) and A * (blue) and the time series of both A S and A * .
Similar to Case 1, chaos in the system was stabilized with the parameter-switching technique, producing the stable cycle in Figure 6a. The parameter-switching solution was verified against the “averaged” solution (Figure 6b) as shown in the matching superimposed attractors in Figure 6c. Further verification is given in the superimposed time series in Figure 6d.

3.2. Synchronization of FOCSSs

Based on the Hamiltonian synchronization system analysis in Section 2.4, any of the switched parameters could replace parameter c 3 in both the master (33) and slave (35). The gains of the slave system were g 1 = 2 , g 2 = 7 , and g 3 = 5 . The initial condition of the master system was ( x 0 , y 0 , z 0 ) = ( 0.04 , 15.8 , 1.4 ) , whereas, for the slave system, the initial condition was ( u 0 , v 0 , r 0 ) = ( 0.12 , 12.41 , 2.1 ) . Regardless of what values are assigned to the initial conditions, the synchronization is considered successful when lim t | | x ( t ) ξ ( t ) | | = 0 . To examine the status of the synchronization, the estimation errors between the master and slave states were computed as thus: ϕ 1 = x u , ϕ 2 = y v , and ϕ 3 = z r . The numerical simulation of both systems are presented in Figure 7a,b. The state estimation errors ϕ 1 , ϕ 2 , and ϕ 3 are shown in Figure 7c–e and the phase errors are plotted in Figure 7f–h.
It is seen in Figure 7 that the strange attractors of both systems are identical. The synchronization of the two system was successful as seen in the state estimation and phase errors in Figure 7c–e and Figure 7f–h, respectively. In fact, the two systems converged within a very short time after the simulation began, making ( x i , y i , z i ) = ( u i , v i , r i ) , and the state estimation errors ϕ 1 , ϕ 2 , and ϕ 3 became zero (see Figure 7c–e). The convergence of the slave to the master can also be verified in the phase error (see Figure 7f–h), where the corresponding states were plotted against each other. What this means is that the two systems behaved alike after they were completely synchronized. These results were obtained for c 3 = 13.05 in both systems, which is similar to when parameter c 3 takes other values of P N .

4. VHDL Implementations

The digital realizations of the chaos control and synchronization in VHDL based on the FOCSS (14) are presented in this section. The hardware design was based on a 32-bit number format, which is composed of 1 bit for the sign, 6 bits for the integer component, and 25 bits for the fractional part. The fixed-point computations were made possible by two IEEE libraries, namely f i x e d _ p k g and f i x e d _ f l o a t _ t y p e s , whereas communication of data among entities was performed with the s f i x e d type. To simplify the hardware implementation of the FOCSS (14) and reduce the computational intensity, we considered avoiding the computation of the hyperbolic tangent function in the model on the FPGA, which consists of the sine and exponential functions s i n ( y ) and e y , respectively. Instead, we chose to create a look-up table (LUT) for the function. This option results in a single LUT of 512 samples of 8 bits each. The VHDL implementations used the same parameter values and initial conditions as the Matlab simulations in the previous section.

4.1. Chaos Control in FOCSS

The VHDL design for chaos control in the fractional-order chaotic spherical system using the parameter-switching technique consists of one entity, one architecture, and two processes. Figure 8 depicts the general block representation of the design, showing the entity and the two processes. One of the two processes, called SWITCHER, serves as a multiplexer used to control the switching of parameter p between p 1 , p 2 , p 3 , and p 4 in Case 1 and p 1 , p 2 , p 3 , p 4 , p 5 , and p 6 in Case 2 for the FOCSS in accordance with their respective associated weights. On the other hand, the SOLVER process performs the approximation of the FOCSS using the Grünwald–Letnikov method to generate the output signals x i , y i , and z i , whereas x 0 , y 0 , and z 0 are the initial conditions for the FOCSS. The entity SWITCHING_P has one input signal clk and three output signals x _ 0 , y _ 0 , and z _ 0 representing the stabilized states of the FOCSS.
The VHDL implementations showed that the “switched” solution produced attractors with periodic orbits after the transient time, meaning that chaos in the system has been stabilized. The Case 1 output of the parameter-switching technique was visualized on the TiePie Handyscope HS3 oscilloscope as shown in Figure 9. The plots obtained for Case 2 on the oscilloscope are similar to Case 1.

4.2. Synchronization of FOCSSs

To implement the digital counterpart of the master and slave synchronization simulated in Matlab in VHDL, four entities were created. The first and second entities describe the master (33) and slave (35) systems, respectively. The third entity describes the computation of error compensation for the slave system using the Hamiltonian synchronization strategy. The fourth, which is the main (top) synchronization entity, connects with the previous three entities. All four entities operate in parallel. The implementation block diagram of the synchronization system is shown in Figure 10. For the co-simulation performed in Active-HDL, the clock period was 0.5 s, while the total synchronization time was 40,000 s.
In the block diagram above, the entities describing the master system, slave system, and error compensation are represented by master, slave, and sync units, respectively. The slave unit receives feedbacks and compensates for the error in each state in every iteration. The output signals of the implementation were obtained from the top entity. The output signals consist of x m , y m , and z m as chaotic states of the master and x s , y s , and z s as chaotic states of the slave, and the estimation errors are e 1 , e 2 , and e 3 , calculated in the sync unit from the three states of the master and slave. Chaotic states of both the master and slave are displayed in Figure 11a, whereas the state estimation errors are presented in Figure 11b.
It is observed in Figure 11a that both the master and slave systems have identical dynamical behavior. More importantly, by comparing the state estimation errors of the VHDL implementation in Figure 11b with the Matlab simulations in Figure 7c–e, it is noted that both implementations agree as ( x m , y m , z m ) = ( x s , y s , z s ) . Hence, the errors converge to zero, meaning that the digital implementation was successful. Moreover, the state estimation errors were visualized on the TiePie Handyscope HS3 oscilloscope as shown in Figure 12.

5. Secure Image Transmission System

Much evidence exists in literature that the secure communication system remains the area where chaos theory has been most applied [31,32,35,55], exploiting the properties of chaos; for example, its ergodicity and sensitivity to the initial conditions and parameters of the system. The pseudo-random sequence of numbers generated by chaotic systems is suitable for hiding and carrying data across a communication channel. In this section, we present a secure system for image transmission, implemented to encrypt and send grayscale and RGB images. The system is a unification of the synchronized master–slave systems, encryption/decryption system, and parameter-switching algorithm.
Once the chaotic systems synchronization is achieved, it is possible to encrypt and transmit confidential data from the master to the slave. The ability of unauthorized persons to decipher the encrypted data would be very limited because chaotic oscillators are very sensitive to the keys, which, in this work, include the parameters, initial conditions, and fractional orders. In the encryption algorithm, the plain image, e.g., RGB or grayscale image, undergoes one round of encryption using any of the three chaotic states of the master system, which is followed by a diffusion process, resulting in ciphered data. However, it is important for the vector size X of the chaotic state to not be less than the vector size I of the image pixels, i.e., size (X) ≥ size (I). In this work, a 24-bit depth RGB image of size 320 × 240 pixels (230,400 words) and an 8-bit depth grayscale image of size 640 × 480 pixels (307,200 words) were used as case studies. The encryption algorithm is described in the flowchart in Figure 13.
In the algorithm, the size of the plain image I is compared with the size of the generated chaotic sequence X to ensure that the latter is not smaller than the former. The image pixels and elements of the chaotic sequence are each converted to n-bit logic data type, which was 9-bit in this work. Thereafter, a bitwise XOR operation is performed between the image pixels and the chaotic sequence, which is followed by the diffusion of the intermediate encrypted data. To be able to compare the plain and the encrypted images, the latter is converted back to the data type of the former.
The digital implementation of the secure system for image transmission is on Artix-7 AC701 using Xilinx with device number XC7A200T-2FBG676C and Intel’s Cyclone V with device number 5CGXFC9E7F35C8. It has been established that once the master and slave systems synchronize, the transmission of information is possible. For the encryption and decryption system, the initial conditions, system parameters, and fractional orders are private keys; hence, the system is symmetric.
The implemented image transmission system is simpler in architecture due to its few subsystems. In the block diagram presented in Figure 14, the synchronized system, consisting of the master, slave, and sync units, is the backbone of the system. Technically, the slave unit consists of the slave system (35) with chaotic output signals x _ s y n c , y _ s y n c , and z _ s y n c , and an embedded parameter-switching algorithm with stabilized output signals x o , y o , and z o . The t x n _ r x n unit coordinates the transmission system, which includes the encryption and decryption operations. The outputs are received via the signals i m a g e _ o r i g i n a l for the original images, e n c r y p t e d for the encrypted images, and i m a g e _ o u t for the decrypted images. The transmission system was used to encrypt, send, and decrypt RGB and grayscale images. The master system (33) is the transmitter, where the images are encrypted by any of the chaotic states x _ o , y _ o , or z _ o and sent to the receiver, the slave system, where decryption is performed by the parameter-switching technique.
In this work, the secure transmission of images are summarized in the following methodology: (1) Create and store the original image pixel in VHDL format; (2) Start the synchronization of the transmitter, which is the master, and the receiver, which is the slave; (3) Set flag r e a d y to 1 when the transmitter and receiver synchronize; (4) Enter the encryption, sending, and decryption phase when flag r e a d y is 1; (5) Encrypt the original image pixel with the chaotic master state using the XOR operation followed by a diffusion process; (6) Pass the encrypted image data into the receiver for decryption; (7) Decrypt the encrypted image data using the master state stabilized by the parameter-switching technique; (8) Set flag d o n e to 1 if all the image pixels have been encrypted and decrypted; (9) Reshape the decrypted image vector into the size of the original image.
The experiment used a universal asynchronous receiver–transmitter (UART) communication module, which was implemented in the t x n _ r x n unit and consists of three states, namely w a i t , e n c r y p t , and d o w n l o a d . The w a i t state is when the system loops continuously until an image input packet is received via the UART module, and, thereafter, the process jumps into the e n c r y p t state. At the e n c r y p t state, the encryption of the image, which has been resized and converted into 9 bits, is performed with a 9-bit chaotic state using an XOR operation. In addition, the decryption of the image occurs at this state. The d o w n l o a d state, which starts after the e n c r y p t state, is when the recovered images will be downloaded. Thereafter, the process enters the w a i t state again, restarting the state machine. The VHDL source code of the system was synthesized on two FPGA boards, using Vivado version 2019.2 for Artix-7 AC701 and Quartus Prime Lite Edition version 20.1 for Cyclone V, to create a register–transfer level (RTL) architecture. This was followed by the placing and routing implementation process.
In the encryption of the images with each of the three chaotic states of the master, the data of the original RGB and grayscale images were altered with chaos, thereby rendering the original images unintelligible for creating encrypted images. Figure 15b presents the graphical data of the RGB original, encrypted, and decrypted images from chaotic state x in the Active-HDL co-simulation. The visualization of the RGB image graphical data on the Handyscope HS3 oscilloscope is shown in Figure 15c. For the grayscale image, the graphical data also from chaotic state x are shown in Figure 16b in the Active-HDL co-simulation, whereas the visualization of the graph on the Handyscope HS3 oscilloscope is shown in Figure 16c. Comparing the image graphical data with the Matlab simulations in Figure 15a and Figure 16a, it is seen that the VHDL implementations on the FPGAs were successful as they agree with the Matlab simulations. The images are shown in Figure 17.

6. Discussion

In this section, we discuss the results of this investigation vis-à-vis the utilization of the logical resources of the FPGA cards, security and statistical analyses, and a comparison with similar works in the literature.

6.1. Consumption of Logical Resources

The resources of the Artix-7 AC701 and Cyclone V FPGA boards utilized by the secure image transmission system are presented in Table 1. As seen in the table, the implementations on both boards show that the transmission of the grayscale image utilized more of the logic resources than RGB, as shown by the amount of LUTs consumed. The disparity in the usage of the LUT is attributed to the images having different sizes, which, in the case of grayscale, consists of 307,200 words, whereas RGB has 230,400 words. The consumed registers, I/O pins, and DSPs are equal because the same codes were used for both images. Overall, a better logic-efficient implementation was achieved in Artix-7 for both RGB and grayscale because the board used fewer LUTs than its Cyclone V counterpart, though the implementation on the latter utilized fewer registers and DSPs than the former. The logic efficiency of the Artix-7 can be attributed to the structure of its LUTs, which are made of configurable logic blocks (CLBs). The Artix-7 CLB consists of two flexible slices with each one having four 6-input LUTs, which can also function as dual 5-input LUTs, eight registers, and two carry chains. This configuration provided a reduction in logic resources and a better performance in Artix 7 than in the Cyclone V Adaptive logic module (ALM), which has an 8-input fracturable LUT, four registers, and two adders.

6.2. Performance Analysis

The following security and statistical analyses were conducted to examine the performance of the secure image transmission system:
(a) Secret Key Space Analysis: The transmission system presented in this work is sensitive to the parameters, fractional orders, and initial conditions of the underlying chaotic systems, which are the private keys. In this work, the digital block size was 32, out of which 25 bits were dedicated to the fractional part. This means that the precision of each of the parameters a 1 , a 2 , a 3 , b , c , c 1 , c 2 , c 3 , d , e , fractional orders q 1 , q 2 , q 3 , and initial conditions x 0 , y 0 , z 0 was 10 25 bits. Therefore, the total number of possibilities in the secret key space was 10 25 × 16 = 10 400 . This is an enormous size for withstanding a brute force attack by hackers. Table 2 shows a comparison of the secret key space in this work with some others in the literature.
(b) Correlation and Jaccard Coefficients Analysis: The closeness of the original image to the encrypted image, as well as the original image to the recovered image, was determined by computing the correlation and Jaccard coefficients in order to compare the results from the three chaotic transmission states, which are presented in Table 3. It should be noted that the correlation coefficient for the RGB image is the average of the R, G, and B channels. Based on the correlation value between the original and encrypted images, the best performance was observed in chaotic transmission state x for the RGB image, with a value of 0.0511 compared to 0.2178 and 0.0762 for y and z, respectively. For the grayscale image, the best result also came from the chaotic transmission state x, with a correlation value of 0.0392 compared to 0.0694 and 0.0422 for y and z, respectively. As the coefficients are approximately 0, this is an indication that the original image totally differs from the encrypted image; hence, the transmitted images are fully protected. In addition, the coefficient of 1 between the original and recovered images shows that the recovered images are without a loss of quality. The results obtained for the Jaccard metric further confirm the correlation analysis results, whereby the Jaccard similarity coefficient between the original and encrypted images is approximately 0 whereas the dissimilarity (Jaccard distance) is approximately 1. For the original and recovered images, their similarity and dissimilarity are 1 and 0, respectively. The correlation and Jaccard coefficients confirm the graphical data presented in Figure 15 and Figure 16, whereby the graphs of the original and encrypted images show no relativity whereas the graphs of the original and recovered images are the same.
(c) Information Entropy: Information entropy is a test index that can be used to analyze the average information content of a random outcome, describing the degree of uncertainty in it. Specifically, the test is used in image processing to measure the distribution of the gray data values in images [59]. Information entropy E is computed according to the next equation:
E ( G ) = P ( g i ) l o g 2 P ( g i )
where G is the image matrix, g i represents the gray values of the image, and P ( g i ) = P r ( G = g i ) is the probability of the i t h value of G. We present the information entropy analysis of the encrypted RGB and grayscale images in Table 4. An entropy value of 8 means that the image is totally random. In our work, the entropy values of the encrypted images obtained from the three chaotic transmission states are very close to 8; hence, the encryption system is very effective. This also confirms the results of the correlation coefficient and Jaccard similarity index.
(d) Sensitivity to Noise: Here, the effect of noise on the secure image transmission system is investigated. In the context of communication, the term “noise” refers to the contamination that an information in transit may be exposed to over a communication channel [60,61]. In the event that the channel is “noisy”, the quality of the recovered information may be affected. Therefore, to investigate the impact of noise, we contaminated the system with noise as follows:
I ^ E = I E + g N
where I ^ E is the “noisy” encrypted RGB or grayscale image, I E is the initial encrypted image, g is the noise intensity coefficient, and N is the introduced noise. In this case, N is an additive white noise of the Gaussian type with zero mean and a variance of 0.01 , 0.001 , and 0.0001 . The results of this investigation are presented in Figure 18 for both RGB and grayscale images, whereas the analysis of the noise impact using the correlation coefficient and signal-to-noise ratio (SNR) is presented in Table 5. The results are for the encrypted images of the transmission state x.
The impact of the introduced noise is seen as the recovered images suffered from degradation in response to the different variance of the Guassian noise. The computed SNR, which increases as the noise variance decreases, confirms the negative impact of the introduced noise. The recovery percentage was computed from the correlation coefficient, and it increases as the variance decreases, with the recovery better in RGB than grayscale. With the recovery percentage shown in the table, the images can be recognized visually. The mitigation of the effect of noise is an investigation for the future.

6.3. Comparison with Other Works

Furthermore, the realization of the secure system of image transmission on digital boards was compared with some other related works in the literature as presented in Table 6 based on some parameters such as the chaotic system used, FPGA model and resources, multimedia involved, implementation language, and the numerical approximation method. However, only the data for Artix-7 are shown since it has less logic utilization than Cyclone V.
From the table, it is seen that the implementations in the compared references contain two integer-order systems and one fractional-order system. The reason for this is that, to the best knowledge of the authors, there are very few papers in the literature that apply fractional-order chaotic systems for an image encryption and transmission system. The implementations in our work were found to utilize more FPGA resources than the compared references— 64 % and 69 % for RGB and grayscale, respectively—and this can be attributed to certain factors. First is the complexity of the fractional-order chaotic spherical system, which is the building block of the transmitter and receiver for the image transmission system. The chaotic system contains several nonlinear terms that require enormous computational resources from the FPGAs. In addition, the implementations of the parameter-switching technique and the Grünwald–Letnikov numerical approximation contributed to the complexity of the overall implementation.
The major advantage of our implementation over others is that it is not just an encryption system but also a non-cumbersome communication system, whereby information can be sent from a transmitter to a receiver in a secure manner. Moreover, our implementation is flexible; hence, it can be adapted to encrypt other information, such as texts, videos, and sound.

7. Conclusions

The work presented in this paper is about implementing the technique of parameter switching to control chaos in fractional-order spherical systems and a chaos-based encryption and transmission system for RGB and grayscale images. Consequently, this investigation led to two major contributions to the current state of the art in fractional-order systems. Firstly, the electronic implementation of the parameter-switching technique to stabilize fractional-order chaotic spherical systems was achieved using the VHDL. The chaos control was demonstrated with two cases of the parameter-switching scheme. Secondly, a methodology was designed and applied to implement an FOCSS-based secure image transmission system on two FPGA boards using the parameter-switching technique as a mechanism for decrypting encrypted information. The secure communication system was based on a synchronized master and slave configuration. The secure image transmission system was used for encrypting, transmitting, and decrypting grayscale and RGB images, where the best result was obtained from the chaotic state x of the fractional-order spherical system as shown by the correlation coefficient of 0.0511 and 0.0392 for the RGB and grayscale images, respectively. The correlation, Jaccard index, and information entropy results show that no similarity exists between the original and encrypted RGB and grayscale images and that both the original and recovered images were the same, meaning that there was no loss of information after the decryption. This work was implemented using VHDL and realized on Xilinx and Intel FPGA boards. The usage of key logical resources of the FPGAs showed that the implementation on the Artix-7 was more logic-efficient.

Author Contributions

Conceptualization, J.-C.N.-P., V.-A.A. and E.T.-C.; methodology, J.-C.N.-P., V.-A.A. and E.T.-C.; software, V.-A.A. and Y.S.-I.; validation, J.-C.N.-P., Y.S.-I. and E.T.-C.; formal analysis, J.-C.N.-P., V.-A.A., Y.S.-I. and E.T.-C.; investigation, J.-C.N.-P. and V.-A.A.; resources, J.-C.N.-P. and E.T.-C.; writing—original draft preparation, J.-C.N.-P., V.-A.A. and E.T.-C.; writing—review and editing, J.-C.N.-P., V.-A.A., Y.S.-I. and E.T.-C.; visualization, V.-A.A. and Y.S.-I.; supervision, J.-C.N.-P. and E.T.-C.; project administration, J.-C.N.-P.; funding acquisition, J.-C.N.-P. All authors have read and agreed to the published version of the manuscript.

Funding

The authors wish to thank the Instituto Politecnico Nacional for its support provided through the project SIP-20230135. In addition, the authors would like to express their gratitude to the COFAA-IPN for its financial support.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ALMAdaptive Logic Module
CLBConfigurable Logic Block
DSPDigital Signal Processor
FDEFractional Differential Equation
FMCSFractional Memristive Chaotic System
FOCSSFractional-Order Chaotic Spherical System
FONLSFractional-Order Nonlinear System
FOSFractional-Order System
FPGAField Programmable Gate Array
I/OInput/Output
IVPInitial Value Problem
LELyapunov Exponent
LUTLook-up Table
MLEMaximum Lyapunov Exponent
N/ANot Available
NECSNo-equilibrium Chaotic System
NMCSNew Multi-scroll Chua’s System
RGBRed, Green, Blue
UPOUnstable Periodic Orbit
VHDLVHSIC Hardware Description Language

References

  1. Machado, J.A.T. The Evolution of Fractional Calculus. Chaos Theory Appl. 2022, 4, 59–63. [Google Scholar]
  2. Stanisławski, R. Fractional Systems: State-of-the-Art. In Fractional Dynamical Systems: Methods, Algorithms and Applications; Studies in Systems, Decision and Control; Kulczycki, P., Korbicz, J., Kacprzyk, J., Eds.; Springer: Cham, Switzerland, 2022; Volume 402. [Google Scholar] [CrossRef]
  3. Saadatmandi, A.; Ghasemi-Nasrabady, A.; Eftekhari, A. Numerical Study of Singular Fractional Lane–Emden Type Equations Arising in Astrophysics. J. Astrophys. Astron. 2019, 40, 1–12. [Google Scholar]
  4. Cruz-Duarte, J.M.; Guia-Calderon, M.; Rosales-Garcia, J.J.; Correa, R. Determination of a Physically Correct Fractional-order Model for Electrolytic Computer-grade Capacitors. Math. Method Appl. Sci. 2020, 44, 4366–4380. [Google Scholar]
  5. Nigmatullin, R.R.; Lino, P.; Maione, G. “Fuzzy” Calculus: The Link Between Quantum Mechanics and Discrete Fractional Operators. Fract. Calc. Appl. Anal. 2020, 23, 764–786. [Google Scholar]
  6. Fadaei, Y.; Ahmadi, A.; Fekri, K.; Masoumi, R.; Radunskaya, A. A Fractional-order Model for Chronic Lymphocytic Leukemia and Immune System Interactions. Math. Method Appl. Sci. 2020, 44, 391–406. [Google Scholar]
  7. Sweilam, N.H.; Al-Mekhlafi, S.M.; Assiri, T.; Atangana, A. Optimal control for cancer treatment mathematical model using Atangana–Baleanu–Caputo Fractional Derivative. Adv. Differ. Equ. 2020, 2020, 1–21. [Google Scholar]
  8. Frunzo, L.; Garra, R.; Giusti, A.; Luongo, V. Modeling Biological Systems with an Improved Fractional Gompertz Law. Commun. Nonlinear Sciience Numer. Simul. 2019, 74, 260–267. [Google Scholar]
  9. Tarasova, V.V.; Tarasov, V.E. Productivity with Fatigue and Long Memory: Fractional Calculus Approach. Int. J. Appl. Comput. Math. 2019, 5, 16. [Google Scholar]
  10. Chen, S.Y.; Yang, M.C. Nonlinear Contour Tracking of a Voice Coil Motors-Driven Dual-Axis Positioning Stage Using Fuzzy Fractional PID Control with Variable Orders. Math. Probl. Eng. 2021, 2021, 6697942. [Google Scholar]
  11. Sibtain, D.; Murtaza, A.F.; Ahmed, N.; Sher, H.A.; Gulzar, M.M. Multi Control Adaptive Fractional Order PID Control Approach for PV/Wind Connected Grid System. Int. Trans. Electr. Energy Syst. 2021, 31, e12809. [Google Scholar]
  12. Wang, G.; Liu, Y.; Wu, Y.; Su, X. Symmetry Analysis for a Seventh-order Generalized Kdv Equation and its Fractional Version in Fluid Mechanics. Fractals 2020, 28, 2050044. [Google Scholar]
  13. Javadi, M.; Noorian, M.A.; Irani, S. Stability Analysis of Pipes Conveying Fluid with Fractional Viscoelastic Model. Meccanica 2019, 54, 399–410. [Google Scholar]
  14. Gulgowski, J.; Kwiatkowski, D.; Stefanski, T.P. Signal Propagation in Electromagnetic Media Modelled by the Two-Sided Fractional Derivative. Fractal Fract. 2021, 5, 10. [Google Scholar]
  15. Shi, L.; Qiu, L.; Huang, X.; Zhang, F.; Wang, D.; Zhou, L.; Gao, J. Characterization of Si-BCB Transmission Line at Millimeter-Wave Frequency by Compact Fractional-order Equivalent Circuit Model. Int. J. Microw. Comput.-Aided Eng. 2019, 29, e21685. [Google Scholar]
  16. Poincaré, H. Méthode Nouvelles de la Mécanique Céleste. In New Methods of Celestial Mechanics in History of Modem Physics; Goroff, D.L., Translator; Springer: New York, NY, USA, 1992. [Google Scholar]
  17. Lorenz, E.N. Deterministic Nonperiodic Flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar]
  18. Khalil, N.; Sarhan, A.; Alshewimy, M.A.M. An efficient color/grayscale image encryption scheme based on hybrid chaotic maps. Opt. Laser Technol. 2021, 143, 107326. [Google Scholar]
  19. Mukherjee, S. New Insights Into Chaos Based Image Encryption & Its Application. J. Math. Sci. Comput. Math. 2023, 4, 241–264. [Google Scholar]
  20. Montero-Canela, R.; Zambrano-Serrano, E.; Tamariz-Flores, E.I.; Muñoz-Pacheco, J.M.; Torrealba-Meléndez, R. Fractional Chaos-Based Cryptosystem for Generating Encryption Keys in Ad Hoc Networks. Ad Hoc Netw. 2020, 97, 102005. [Google Scholar]
  21. Mozaffari, A.; Emami, M.; Fathi, A. Comprehensive Investigation into the Performance, Robustness, Scalability and Convergence of Chaos-Enhanced Evolutionary Algorithms with Boundary Constraint. Artif. Intell. Rev. 2019, 52, 2319–2380. [Google Scholar]
  22. Saifullah, S.; Ali, A.; Goufo, E.F.D. Investigation of complex behaviour of fractal fractional chaotic attractor with mittag-leffler Kernel. Chaos Solitons Fractals 2021, 152, 111332. [Google Scholar]
  23. Lin, H.; Wang, C.; Sun, Y.; Wang, T. Generating n-Scroll Chaotic Attractors From a Memristor-Based Magnetized Hopfield Neural Network. IEEE Trans. Circuits Syst. Ii: Express Briefs 2023, 70, 311–315. [Google Scholar] [CrossRef]
  24. Amster, P.; Alliera, C. Control of Pyragas Applied to a Coupled System with Unstable Periodic Orbits. Bull. Math. Biol. 2018, 80, 2897–2916. [Google Scholar]
  25. Din, Q.; Elsadany, A.A.; Ibrahim, S. Bifurcation Analysis and Chaos Control in a Second Order Rational Difference Equation. Int. J. Nonlinear Sci. Numer. Simul. 2018, 19, 53–68. [Google Scholar]
  26. Anikushin, M.; Romanov, A. Hidden and unstable periodic orbits as a result of homoclinic bifurcations in the Suarez–Schopf delayed oscillator and the irregularity of ENSO. Phys. Nonlinear Phenom. 2023, 445, 133653. [Google Scholar]
  27. Wu, Y.; Qiao, S.; Yao, D. A hybrid chaotic controller integrating hip stiffness modulation and reinforcement learning-based torque control to stabilize passive dynamic walking. Proc. Inst. Mech. Eng. Part J. Mech. Eng. Sci. 2023, 237, 673–691. [Google Scholar]
  28. Gholami, M.; Ghaziani, R.K.; Eskandari, Z. Three-dimensional fractional system with the stability condition and chaos control. Math. Model. Numer. Simul. Appl. 2022, 2, 41–47. [Google Scholar] [CrossRef]
  29. Cetinkaya, A.; Hayakawa, T.; bin Mohd Taib, M.A.F. Stabilizing unstable periodic orbits with delayed feedback control in act-and-wait fashion. Syst. Control. Lett. 2018, 113, 71–77. [Google Scholar] [CrossRef]
  30. Zheng, Y.G.; Yu, J.L. Stabilization of multi-rotation unstable periodic orbits through dynamic extended delayed feedback control. Chaos Solitons Fractals 2022, 161, 112362. [Google Scholar] [CrossRef]
  31. Adeyemi, V.A.; Núñez-Pérez, J.C.; Sandoval-Ibarra, Y.; Pérez-Pinal, F.J.; Tlelo-Cuautle, E. FPGA Realization of the Parameter-Switching Method in the Chen Oscillator and Application in Image Transmission. Symmetry 2021, 13, 923. [Google Scholar]
  32. Nuñez-Perez, J.C.; Adeyemi, V.A.; Sandoval-Ibarra, Y.; Pérez-Pinal, F.J.; Tlelo-Cuautle, E. FPGA Realization of Spherical Chaotic System with Application in Image Transmission. Math. Probl. Eng. 2021, 2021, 5532106. [Google Scholar]
  33. Dridi, F.; Assad, S.E.; Youssef, W.E.H.; Machhout, M.; Lozi, R. The Design and FPGA-Based Implementation of a Stream Cipher Based on a Secure Chaotic Generator. Appl. Sci. 2021, 11, 625. [Google Scholar]
  34. Hagras, E.A.A.; Saber, M. Low power and high-speed FPGA Implementation for 4D Memristor Chaotic System for Image Encryption. Multimed. Tools Appl. 2020, 79, 23203–23222. [Google Scholar]
  35. Guillén-Fernández, O.; Meléndez-Cano, A.; Tlelo-Cuautle, E.; Núñez-Pérez, J.C.; Rangel-Magdaleno, J.J. On the Synchronization Techniques of Chaotic Oscillators and Their FPGA-Based Implementation for Secure Image Transmission. PLoS ONE 2019, 14, e0209618. [Google Scholar]
  36. Dridi, F.; Assad, S.E.; Hadj, Y.W.E.; Machhout, M. Design, Hardware Implementation on FPGA and Performance Analysis of Three Chaos-Based Stream Ciphers. Fractal Fract. 2023, 7, 197. [Google Scholar]
  37. Lahcene, M.; Noureddine, C.; Lorenz, P.; Ali-Pacha, A. Securing information using a proposed reliable chaos-based stream cipher: With real-time FPGA-based wireless connection implementation. Nonlinear Dyn. 2023, 111, 801–830. [Google Scholar]
  38. Al-Musawi, W.A.; Al-Ibadi, M.A.A.; Wali, W.A. Artificial intelligence techniques for encrypt images based onthe chaotic system implemented on field-programmable gate. Iaes Int. J. Artif. Intell. 2023, 12, 347–356. [Google Scholar]
  39. Lin, H.; Wang, C.; Yu, F.; Xu, C.; Hong, Q.; Yao, W.; Sun, Y. An Extremely Simple Multiwing Chaotic System: Dynamics Analysis, Encryption Application, and Hardware Implementation. IEEE Trans. Ind. Electron. 2021, 68, 12708–12719. [Google Scholar] [CrossRef]
  40. Wu, G.C.; Deng, Z.G.; Baleanu, D.; Zeng, D.Q. New variable-order fractional chaotic systems for fast image encryption. Chaos 2019, 29, 083103. [Google Scholar]
  41. Chen, L.; Yin, H.; Huang, T.; Yuan, L.; Zheng, S.; Yin, L. Chaos in fractional-order discrete neural networks with application to image encryption. Neural Netw. 2020, 125, 174–184. [Google Scholar] [CrossRef]
  42. Zhu, Y.; Wang, C.; Sun, J.; Yu, F. A Chaotic Image Encryption Method Based on the Artificial Fish Swarms Algorithm and the DNA Coding. Mathematics 2020, 11, 767. [Google Scholar] [CrossRef]
  43. Gokyildirim, A.; Kocamaz, U.E.; Uyaroglu, Y.; Calgan, H. A novel five-term 3D chaotic system with cubic nonlinearity and its microcontroller-based secure communication implementation. Aeu-Int. J. Electron. Commun. 2023, 160, 154497. [Google Scholar] [CrossRef]
  44. Lai, Q.; Chen, Z. Grid-scroll memristive chaotic system with application to image encryption. Chaos, Solitons Fractals 2023, 170, 113341. [Google Scholar] [CrossRef]
  45. Platas-Garza, M.A.; Zambrano-Serrano, E.; Rodríguez-Cruz, J.R.; Posadas-Castillo, C. Implementation of an encrypted-compressed image wireless transmission scheme based on chaotic fractional-order systems. Chin. J. Phys. 2021, 71, 22–37. [Google Scholar] [CrossRef]
  46. Hu, C.; Tian, Z.; Wang, Q.; Zhang, X.; Liang, B.; Jian, C.; Wu, X. A memristor-based VB2 chaotic system: Dynamical analysis, circuit implementation, and image encryption. Optik 2022, 269, 169878. [Google Scholar] [CrossRef]
  47. Guillén-Fernández, O.; Tlelo-Cuautle, E.; Fraga, L.G.d.; Sandoval-Ibarra, Y.; Nuñez-Perez, J.C. An Image Encryption Scheme Synchronizing Optimized Chaotic Systems Implemented on Raspberry Pis. Mathematics 2022, 10, 1907. [Google Scholar] [CrossRef]
  48. MacDonald, C.L.; Bhattacharya, N.; Sprouse, B.P.; Silva, G.A. Efficient Computation of the Grünwald–Letnikov Fractional Diffusion Derivative Using Adaptive Time Step Memory. J. Of. Comput. Phys. 2015, 297, 221–236. [Google Scholar]
  49. Zhou, Y.; Wang, J.N. The Nonlinear Rayleigh-Stokes Problem with Riemann-Liouville Fractional Derivative. Math. Methods Appl. Sci. 2021, 44, 2431–2438. [Google Scholar]
  50. Almeida, R. A Caputo Fractional Derivative of a Function with Respect to Another Function. Commun. Nonlinear Sci. Numer. Simul. 2017, 44, 460–481. [Google Scholar]
  51. Petráš, I. Modeling and Numerical Analysis of Fractional-Order Bloch Equations. Comput. Math. Appl. 2011, 61, 341–356. [Google Scholar]
  52. Wang, Z.; Sun, Y.; Cang, S. A 3-D Spherical Chaotic Attractor. Acta Phys. Pol. Ser. B 2011, 42, 235–247. [Google Scholar]
  53. Danca, M.-F.; Chattopadhyay, J. Chaos Control of Hastings-Powell Model by Combining Chaotic Motions. Chaos 2016, 26, 043106. [Google Scholar]
  54. Lai, J.W.; Cheong, K.H. Parrondo’s Paradox from Classical to Quantum: A Review. Nonlinear Dyn. 2020, 100, 849–861. [Google Scholar]
  55. Li, Y.; Li, Z.; Ma, M.; Wang, M. Generation of Grid Multi-Wing Chaotic Attractors and its Application in Video Secure Communication System. Multimed. Tools Appl. 2020, 79, 29161–29177. [Google Scholar]
  56. Askar, S.; Karawia, A.; Al-Khedhairi, A.; Alammar, F. An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps. Entropy 2019, 21, 44. [Google Scholar]
  57. Shakiba, A. A Novel Randomized Bit-Level Two-Dimensional Hyperchaotic Image Encryption Algorithm. Multimed. Tools Appl. 2020, 79, 32575–32605. [Google Scholar]
  58. Cao, C.; Sun, K.; Liu, W. A Novel Bit-Level Image Encryption Algorithm Based on 2d-LICM Hyperchaotic Map. Signal Process. 2018, 143, 122–133. [Google Scholar]
  59. Zhang, G.; Liu, Q. A novel image encryption method based on total shuffling scheme. Opt. Commun. 2015, 284, 2775–2780. [Google Scholar]
  60. Gong, L.; Qiu, K.; Deng, C.; Zhou, N. An Image compression and encryption algorithm based on chaotic system and compressive sensing. Opt. Laser Technol. 2019, 115, 257–267. [Google Scholar]
  61. Kulsoon, A.; Xiao, D.; Abbas, S.A. An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed. Tools Appl. 2016, 75, 1–23. [Google Scholar]
  62. Yu, F.; Shen, H.; Zhang, Z.; Huang, Y.; Cai, S.; Du, S. A new multi-scroll Chua’s circuit with composite hyperbolic tangent-cubic nonlinearity: Complex dynamics, Hardware implementation and Image encryption application. Integration 2021, 81, 71–83. [Google Scholar]
  63. Mohamed, S.M.; Sayed, W.S.; Madian, A.H.; Radwan, A.G.; Said, L.A. An Encryption Application and FPGA Realization of a Fractional Memristive Chaotic System. Electronics 1219, 12, 1219. [Google Scholar] [CrossRef]
  64. Lai, Q.; Zhang, H.; Kuate, P.D.K.; Xu, G.; Zhao, X.W. Analysis and implementation of no-equilibrium chaotic system with application in image encryption. Appl. Intell. 2022, 52, 11448–11471. [Google Scholar]
Figure 1. Bifurcation diagram and Lyapunov exponent spectra of FOCSS (14), showing the local maxima of state x while varying parameter a 2 . The LE axis is adjusted to make the three spectral lines more visible.
Figure 1. Bifurcation diagram and Lyapunov exponent spectra of FOCSS (14), showing the local maxima of state x while varying parameter a 2 . The LE axis is adjusted to make the three spectral lines more visible.
Fractalfract 07 00440 g001
Figure 3. (ad) Chaotic attractors A p 1 , A p 2 , A p 3 , and A p 4 of the FOCSS (14) from parameters p 1 = 10.05 , p 2 = 10.18 , p 3 = 13.00 , and p 4 = 13.05 , respectively, and (e) state x time series of the attractors.
Figure 3. (ad) Chaotic attractors A p 1 , A p 2 , A p 3 , and A p 4 of the FOCSS (14) from parameters p 1 = 10.05 , p 2 = 10.18 , p 3 = 13.00 , and p 4 = 13.05 , respectively, and (e) state x time series of the attractors.
Fractalfract 07 00440 g003
Figure 4. Matlab verification of parameter-switching scheme for four control parameters: (a) “Switched” solution A S ; (b) “averaged” solution A * ; (c) superimposition of A S on A * ; (d) superimposition of time series of state variables x, y, and z of A S (red) and A * (blue).
Figure 4. Matlab verification of parameter-switching scheme for four control parameters: (a) “Switched” solution A S ; (b) “averaged” solution A * ; (c) superimposition of A S on A * ; (d) superimposition of time series of state variables x, y, and z of A S (red) and A * (blue).
Fractalfract 07 00440 g004
Figure 5. (af) Chaotic attractors A p 1 , A p 2 , A p 3 , A p 4 , A p 5 , and A p 6 of the FOCSS (14) from parameters p 1 = 10.18 , p 2 = 10.34 , p 3 = 10.56 , p 4 = 13.00 , p 5 = 13.05 , and p 6 = 13.125 , respectively, and (g) state x time series of the attractors.
Figure 5. (af) Chaotic attractors A p 1 , A p 2 , A p 3 , A p 4 , A p 5 , and A p 6 of the FOCSS (14) from parameters p 1 = 10.18 , p 2 = 10.34 , p 3 = 10.56 , p 4 = 13.00 , p 5 = 13.05 , and p 6 = 13.125 , respectively, and (g) state x time series of the attractors.
Fractalfract 07 00440 g005
Figure 6. Matlab verification of parameter-switching scheme for six control parameters: (a) “switched” solution A S ; (b) “averaged” solution A * ; (c) superimposition of A S on A * ; (d) superimposition of time series of state variables x, y, and z of A S (red) and A * (blue).
Figure 6. Matlab verification of parameter-switching scheme for six control parameters: (a) “switched” solution A S ; (b) “averaged” solution A * ; (c) superimposition of A S on A * ; (d) superimposition of time series of state variables x, y, and z of A S (red) and A * (blue).
Fractalfract 07 00440 g006
Figure 7. Synchronization when c 3 = 13.05 in Matlab: (a) master system (33); (b) slave system (35); (ce) state estimation errors ϕ 1 = x u , ϕ 2 = y v , and ϕ 3 = z r between the master system (33) and slave system (35); (fh) phase errors between x, y, and z of master system (33) and corresponding states u, v, and r of slave system (35).
Figure 7. Synchronization when c 3 = 13.05 in Matlab: (a) master system (33); (b) slave system (35); (ce) state estimation errors ϕ 1 = x u , ϕ 2 = y v , and ϕ 3 = z r between the master system (33) and slave system (35); (fh) phase errors between x, y, and z of master system (33) and corresponding states u, v, and r of slave system (35).
Fractalfract 07 00440 g007
Figure 8. Block description of the parameter-switching entity SWITCHING_P, process SWITCHER, and process SOLVER.
Figure 8. Block description of the parameter-switching entity SWITCHING_P, process SWITCHER, and process SOLVER.
Fractalfract 07 00440 g008
Figure 9. Output of the parameter-switching technique Case 1 as visualized on TiePie Handyscope HS3 oscilloscope.
Figure 9. Output of the parameter-switching technique Case 1 as visualized on TiePie Handyscope HS3 oscilloscope.
Fractalfract 07 00440 g009
Figure 10. Block diagram showing the VHDL implementation of synchronized master system (33) and slave system (35).
Figure 10. Block diagram showing the VHDL implementation of synchronized master system (33) and slave system (35).
Fractalfract 07 00440 g010
Figure 11. VHDL implementation when c 3 = 13.05; (a) chaotic states of the master (33) in blue color and slave (35) in red color; (b) state estimation errors e 1 , e 2 , and e 3 between the master and slave systems.
Figure 11. VHDL implementation when c 3 = 13.05; (a) chaotic states of the master (33) in blue color and slave (35) in red color; (b) state estimation errors e 1 , e 2 , and e 3 between the master and slave systems.
Fractalfract 07 00440 g011
Figure 12. State estimation errors e 1 , e 2 , and e 3 as visualized on TiePie Handyscope HS3 oscilloscope.
Figure 12. State estimation errors e 1 , e 2 , and e 3 as visualized on TiePie Handyscope HS3 oscilloscope.
Fractalfract 07 00440 g012
Figure 13. Chaos-based encryption algorithm.
Figure 13. Chaos-based encryption algorithm.
Fractalfract 07 00440 g013
Figure 14. Block diagram showing the VHDL implementation of a secure image transmission system.
Figure 14. Block diagram showing the VHDL implementation of a secure image transmission system.
Fractalfract 07 00440 g014
Figure 15. The 320 × 240 RGB image transmission based on master system (33) and slave system (35) via chaotic state x: (a) Matlab simulation showing the graphical data of original (red), encrypted (blue), and decrypted (magenta); (b) VHDL simulation in Active-HDL showing the graphical data of original (red), encrypted (blue), and decrypted (magenta); (c) original, encrypted, and recovered image signals visualized on TiePie Handyscope HS3 oscilloscope.
Figure 15. The 320 × 240 RGB image transmission based on master system (33) and slave system (35) via chaotic state x: (a) Matlab simulation showing the graphical data of original (red), encrypted (blue), and decrypted (magenta); (b) VHDL simulation in Active-HDL showing the graphical data of original (red), encrypted (blue), and decrypted (magenta); (c) original, encrypted, and recovered image signals visualized on TiePie Handyscope HS3 oscilloscope.
Fractalfract 07 00440 g015aFractalfract 07 00440 g015b
Figure 16. The 640 × 480 grayscale image transmission based on master system (33) and slave system (35) via state x: (a) Matlab simulation showing the graphical data of original (red), encrypted (blue), and decrypted (magenta); (b) VHDL simulation in Active-HDL showing the graphical data of original (red), encrypted (blue), and decrypted (magenta); (c) original, encrypted, and recovered image signals visualized on TiePie Handyscope HS3 oscilloscope.
Figure 16. The 640 × 480 grayscale image transmission based on master system (33) and slave system (35) via state x: (a) Matlab simulation showing the graphical data of original (red), encrypted (blue), and decrypted (magenta); (b) VHDL simulation in Active-HDL showing the graphical data of original (red), encrypted (blue), and decrypted (magenta); (c) original, encrypted, and recovered image signals visualized on TiePie Handyscope HS3 oscilloscope.
Fractalfract 07 00440 g016aFractalfract 07 00440 g016b
Figure 17. Secure image transmission via chaotic state x for 320 × 240 RGB and 640 × 480 grayscale images. Left: original; middle: encrypted; right: decrypted.
Figure 17. Secure image transmission via chaotic state x for 320 × 240 RGB and 640 × 480 grayscale images. Left: original; middle: encrypted; right: decrypted.
Fractalfract 07 00440 g017
Figure 18. RGB and grayscale images recovered after introduction of Gaussian white noise with zero mean: (a,b) at 0.01 variance, (c,d) at 0.001 variance, (e,f) at 0.0001 variance.
Figure 18. RGB and grayscale images recovered after introduction of Gaussian white noise with zero mean: (a,b) at 0.01 variance, (c,d) at 0.001 variance, (e,f) at 0.0001 variance.
Fractalfract 07 00440 g018
Table 1. Consumption of logic resources by implementation of secure image transmission system on Artix-7 AC701 and Cyclone V.
Table 1. Consumption of logic resources by implementation of secure image transmission system on Artix-7 AC701 and Cyclone V.
FPGAResourcesAvailableRGB ImageGrayscale Image
UsedConsumed (%)UsedConsumed (%)
Artix-7 AC701LUTs (CLB)133,80086,2306492,62769
Memory LUTs (Kb)28880000
Registers267,60021270.7921270.79
I/O Pins5001953919539
Block RAMs (Kb)13,1400000
DSPs7401201612016
Cyclone VLUTs (ALM)113,56094,01983101,41689
Memory LUTs (Kb)1,7170000
Registers454,2404200.094220.09
I/O Pins6161953219532
Block RAMs (Kb)12,2000000
DSPs34296289628
Table 2. Secret key space in this work compared to some others in literature.
Table 2. Secret key space in this work compared to some others in literature.
This WorkRef. [56]Ref. [57]Ref. [58]
10 400 10 140 2 466 2 256 10 4 × 2 208
Table 3. Correlation coefficients and Jaccard similarity/distance of RGB and grayscale images encryption and decryption in Matlab based on the FOCSS (14).
Table 3. Correlation coefficients and Jaccard similarity/distance of RGB and grayscale images encryption and decryption in Matlab based on the FOCSS (14).
Chaotic StateImagesCorrelationJaccard SimilarityJaccard Distance
RGBGrayscaleRGBGrayscaleRGBGrayscale
xOriginal and
encrypted
0.05110.03920.00620.00590.99380.9941
Original and
recovered
111100
yOriginal and
encrypted
0.21780.06940.00690.00600.99310.9940
Original and
recovered
111100
zOriginal and
encrypted
0.07620.04220.00630.00590.99370.9941
Original and
recovered
111100
Table 4. Information entropy E of the encrypted RGB and grayscale images.
Table 4. Information entropy E of the encrypted RGB and grayscale images.
Chaotic StateRGBGrayscale
x7.99817.9965
y7.99087.9961
z7.99187.9916
Table 5. Effect of Gaussian white noise with zero mean at different variance values on the recovered images.
Table 5. Effect of Gaussian white noise with zero mean at different variance values on the recovered images.
MetricVariance of 0.01Variance of 0.001Variance of 0.0001
RGBGrayscaleRGBGrayscaleRGBGrayscale
Correlation coefficient0.74510.69610.90710.87430.96820.9556
SNR15 dB15 dB25 dB25 dB35 dB35 dB
Percentage recovery75%70%90%87%96%95%
Table 6. Implementation of chaos-based system for image transmission on digital cards in this work versus some related works in literature.
Table 6. Implementation of chaos-based system for image transmission on digital cards in this work versus some related works in literature.
ParametersThis WorkRef. [62]Ref. [63]Ref. [64]
Chaotic systemFOCSSFOCSSNMCSFMCSNECS
FPGAArtix-7Artix-7Virtex-6Artix-7Cyclone IV
ImageRGBGrayscaleRGBRGBRGB/Grayscale
Image size320 × 240640 × 480256 × 256256 × 256256 × 256
LUTs86,23092,62715,97823,92932,983
Registers2127212721,0574599450
I/O pins19519516N/A66
DSPs1201202014484
LanguageVHDLVHDLVHDLVerilogVHDL
Numerical approximationGrünwald– LetnikovGrünwald– LetnikovRK4Grünwald– LetnikovRK4
OrderFractionalFractionalIntegerFractionalInteger
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Adeyemi, V.-A.; Tlelo-Cuautle, E.; Sandoval-Ibarra, Y.; Nuñez-Perez, J.-C. FPGA Implementation of Parameter-Switching Scheme to Stabilize Chaos in Fractional Spherical Systems and Usage in Secure Image Transmission. Fractal Fract. 2023, 7, 440. https://doi.org/10.3390/fractalfract7060440

AMA Style

Adeyemi V-A, Tlelo-Cuautle E, Sandoval-Ibarra Y, Nuñez-Perez J-C. FPGA Implementation of Parameter-Switching Scheme to Stabilize Chaos in Fractional Spherical Systems and Usage in Secure Image Transmission. Fractal and Fractional. 2023; 7(6):440. https://doi.org/10.3390/fractalfract7060440

Chicago/Turabian Style

Adeyemi, Vincent-Ademola, Esteban Tlelo-Cuautle, Yuma Sandoval-Ibarra, and Jose-Cruz Nuñez-Perez. 2023. "FPGA Implementation of Parameter-Switching Scheme to Stabilize Chaos in Fractional Spherical Systems and Usage in Secure Image Transmission" Fractal and Fractional 7, no. 6: 440. https://doi.org/10.3390/fractalfract7060440

Article Metrics

Back to TopTop