Secure communication and image encryption scheme based on synchronisation of fractional order chaotic systems using backstepping

2018 ◽  
Vol 13 (5) ◽  
pp. 473
Author(s):  
M.K. Shukla ◽  
B.B. Sharma
2021 ◽  
Author(s):  
Ali Durdu ◽  
Yılmaz Uyaroğlu

Abstract Many studies have been introduced in the literature showing that two identical chaotic systems can be synchronized with different initial conditions. Secure data communication applications have also been made using synchronization methods. In the study, synchronization times of two popular synchronization methods are compared, which is an important issue for communication. Among the synchronization methods, active control, integer, and fractional-order Pecaro Carroll (P-C) method was used to synchronize the Burke-Shaw chaotic attractor. The experimental results showed that the P-C method with optimum fractional-order is synchronized in 2.35 times shorter time than the active control method. This shows that the P-C method using fractional-order creates less delay in synchronization and is more convenient to use in secure communication applications.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 54175-54188 ◽  
Author(s):  
Ying-Qian Zhang ◽  
Jun-Ling Hao ◽  
Xing-Yuan Wang

2013 ◽  
Vol 23 (02) ◽  
pp. 1350030 ◽  
Author(s):  
SHIU-PING WANG ◽  
SENG-KIN LAO ◽  
HSIEN-KENG CHEN ◽  
JUHN-HORNG CHEN ◽  
SHIH-YAO CHEN

In recent years, there has been expanding research on the applications of fractional calculus to the areas of signal processing, modeling and controls. Analog circuit implementation of chaotic systems is used in studying nonlinear dynamical phenomena, which is also applied in realizing the controller development. In this paper, chain fractance and tree fractance circuits are constructed to realize the fractional-order Chen–Lee system. The results are in good agreement with those obtained from numerical simulation. This study shows that not only is this system related to gyro motion but can also be applied to electronic circuits for secure communication.


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3130
Author(s):  
Zain-Aldeen S. A. Rahman ◽  
Basil H. Jasim ◽  
Yasir I. A. Al-Yasir ◽  
Raed A. Abd-Alhameed

Fractional-order chaotic systems have more complex dynamics than integer-order chaotic systems. Thus, investigating fractional chaotic systems for the creation of image cryptosystems has been popular recently. In this article, a fractional-order memristor has been developed, tested, numerically analyzed, electronically realized, and digitally implemented. Consequently, a novel simple three-dimensional (3D) fractional-order memristive chaotic system with a single unstable equilibrium point is proposed based on this memristor. This fractional-order memristor is connected in parallel with a parallel capacitor and inductor for constructing the novel fractional-order memristive chaotic system. The system’s nonlinear dynamic characteristics have been studied both analytically and numerically. To demonstrate the chaos behavior in this new system, various methods such as equilibrium points, phase portraits of chaotic attractor, bifurcation diagrams, and Lyapunov exponent are investigated. Furthermore, the proposed fractional-order memristive chaotic system was implemented using a microcontroller (Arduino Due) to demonstrate its digital applicability in real-world applications. Then, in the application field of these systems, based on the chaotic behavior of the memristive model, an encryption approach is applied for grayscale original image encryption. To increase the encryption algorithm pirate anti-attack robustness, every pixel value is included in the secret key. The state variable’s initial conditions, the parameters, and the fractional-order derivative values of the memristive chaotic system are used for contracting the keyspace of that applied cryptosystem. In order to prove the security strength of the employed encryption approach, the cryptanalysis metric tests are shown in detail through histogram analysis, keyspace analysis, key sensitivity, correlation coefficients, entropy analysis, time efficiency analysis, and comparisons with the same fieldwork. Finally, images with different sizes have been encrypted and decrypted, in order to verify the capability of the employed encryption approach for encrypting different sizes of images. The common cryptanalysis metrics values are obtained as keyspace = 2648, NPCR = 0.99866, UACI = 0.49963, H(s) = 7.9993, and time efficiency = 0.3 s. The obtained numerical simulation results and the security metrics investigations demonstrate the accuracy, high-level security, and time efficiency of the used cryptosystem which exhibits high robustness against different types of pirate attacks.


Sign in / Sign up

Export Citation Format

Share Document