Research Article  Open Access
Modified Projective Synchronization between Different FractionalOrder Systems Based on OpenPlusClosedLoop Control and Its Application in Image Encryption
Abstract
A new general and systematic coupling scheme is developed to achieve the modified projective synchronization (MPS) of different fractionalorder systems under parameter mismatch via the OpenPlusClosedLoop (OPCL) control. Based on the stability theorem of linear fractionalorder systems, some sufficient conditions for MPS are proposed. Two groups of numerical simulations on the incommensurate fractionorder system and commensurate fractionorder system are presented to justify the theoretical analysis. Due to the unpredictability of the scale factors and the use of fractionalorder systems, the chaotic data from the MPS is selected to encrypt a plain image to obtain higher security. Simulation results show that our method is efficient with a large key space, high sensitivity to encryption keys, resistance to attack of differential attacks, and statistical analysis.
1. Introduction
Fractional calculus, which is a mathematical topic with more than 300year history, was not applied to physics and engineering until recent decades. A fractionalorder system is characterized as a dynamical system described by fractional derivatives and integrals. It is demonstrated that some fractionalorder differential systems behave chaotically or hyperchaotically, such as the fractionalorder Lorenz system [1], fractionalorder Lü system [2], fractionalorder Rössler system [3], and fractionalorder Arneodo system [4]. Recently, the control and synchronization of the fractionalorder chaotic systems start to attract a great deal of attention due to their potential applications in secure communication and control processing. Some approaches have been proposed to achieve chaos synchronization between fractionalorder chaotic systems, such as adaptive control [5], a scalar transmitted signal method [6], sliding mode control [7], and fuzzy logic constant control [8].
Other than the above studies, the OpenPlusClosedLoop (OPCL) control method is a more general and physically realizable coupling scheme that can provide stable synchronization in identical and mismatched oscillators [9, 10]. The advantage of the OPCL coupling includes the following two aspects. First of all, OPCL coupling provides synchronization in all systems without restrictions on the symmetry class of a dynamical system. Secondly, in the synchronization regimes, the OPCL coupling can realize stable amplification or attenuation in identical and mismatched systems. Until now, many researchers have achieved their synchronization scenarios for integerorder or fractionalorder systems through OPCL control [11–13]. It should be noted that most of the existing works focus on synchronization between identical chaotic systems. However, in practice applications, most systems are nonidentical and parameter mismatches are inevitable because of noise or other uncertain factors. Our coupling strategies need to be formulated to ensure stable synchronization in the presence of mismatch. As a matter of fact, OPCL control can be utilized to achieve synchronization of fractionalorder chaotic systems with different structure.
Specially, we will realize modified projective synchronization (MPS) of two different fractionalorder systems with parameter mismatches. In MPS, the states of the drive and response systems synchronize up to a constant scaling matrix with the complete synchronization, antisynchronization, and projective synchronization as the special cases. Based on the OPCL control, a general coupling method is proposed for MPS of two nonidentical fractionalorder systems. The proposed coupling scheme is theoretically proved based on stability theory of linear fractional differential equations and its effectiveness is verified by two groups of numerical simulations. Finally, based on the realized MPS, an image encryption scheme with diffusion and confusion is designed. Both the unpredictability of scaling matrix and the use of fractionalorder systems will raise the security level of the encryption scheme. According to the analysis of simulations, really satisfactory results are obtained, with large key space, high sensitivity to initial conditions, and high security.
2. The MPS through OPCL Coupling
2.1. Theory Analysis
There are several definitions of fractional derivatives. The Caputo derivative is more popular in the real applications, because the inhomogeneous initial conditions are allowed, if such conditions are necessary. The Caputo definition of the fractional derivative [15], which sometimes is called smooth fractional derivative, is defined as where is the smallest integer larger than , denotes the Caputo definition of the fractional derivative, is the order derivative in the usual sense, and stands for gamma function.
As to the fractionalorder chaotic systems, we will briefly describe how to synchronize two different systems via the OPCL coupling method. Assume the fractionalorder chaotic system in the drive part is as follows: where , is a continuous vector function, and contains mismatch parameters. If the system parameters are not disturbed in the theory, we set zero to the value of . for () is the order of fractionalorder system. If , we call the system (2) a commensurate fractionalorder system, otherwise an incommensurate fractionalorder system [16].
Then, the controlled response system is constructed as where , is a continuous vector function, and is the controller to be designed.
Definition 1 (MPS). For the drive system (2) and controlled response system (3), it is said to be modified projective synchronization (MPS), if there exists a constant matrix , such that .
Remark 2. Due to the vector function , the systems (2) and (3) are nonidentical chaotic systems.
Remark 3. Complete synchronization, antisynchronization, and projective synchronization are the special cases of MPS, where , , and , respectively.
According to the OPCL control [9, 10], we design the controller as in the form of where is the Jacobian matrix of the dynamic system and is an arbitrary constant matrix. Then, can be written, using the Taylor series expansion, by
Keeping the first order terms in (5) and putting (5) and (4) into (3), the error dynamics between systems (2) and (3) is then obtained to be
In order to research the synchronization stability of the two incommensurate or two commensurate fractionalorder systems by OPCL coupling, we provide the following two theorems.
Theorem 4 (see [17]). Consider incommensurate fractionalorder dynamical system with , , (), , and . Set to be the lowest common multiple of the denominators of , where and . The zero solution of the system is asymptotically stable if all roots of the equation satisfy the condition .
Theorem 5 (see [18]). For commensurate fractionalorder dynamical system with , , and , the system is asymptotically stable if and only if is satisfied for all eigenvalues of . Also, this system is stable if and only if is satisfied for all eigenvalues of with those critical eigenvalues satisfying having geometric multiplicity of one.
From the two theorems, we can easily obtain the following two corollaries.
Corollary 6. When system (2) and system (3) are incommensurate fractionalorder systems, set as the lowest common multiple of the denominators of , where , . The zero solution of the error system (6) is asymptotically stable if all roots of the equation satisfy the condition ..
satisfies the condition .
Corollary 7. When system (2) and system (3) are commensurate fractionalorder systems, the error system (6) is asymptotically stable if and only if is satisfied for all eigenvalues of .
Remark 8. According to the original OPCL control method [9, 10], the control matrix can be designed as simple as possible as long as the condition or holds. For example, when is a constant, we then set such that . When is a variable, we choose , where are control parameters.
2.2. Numerical Method for Solving FractionalOrder Systems
An efficient method for solving fractionalorder differential equations is the improved predictorcorrector algorithm [19], which will be used in numerical simulation section. The algorithm can be interpreted as a fractional variant of the classical secondorder AdamsBashforthMoulton method.
Consider the following differential equation:
The initial values are , , and . It is equivalent to the Volterra integral equation. Consider Set . Then, (8) can be discretized as follows: where,
The preliminary approximation is called predictor and is given by where .
The error estimate is , where .
2.3. Numerical Examples
In this section, to demonstrate the effectiveness of the proposed OPCL based MPS scheme for different fractionalorder systems, we provide two groups of numerical examples. Firstly, fractionalorder Arneodo system and fractionalorder Lü system are used to verify the incommensurate synchronization. Secondly, fractionalorder Lorenz system and fractionalorder financial system are introduced to validate the commensurate case.
2.3.1. MPS between FractionalOrder Arneodo System and FractionalOrder Lü System
The fractionalorder incommensurate Arneodo system with parameter perturbation is defined as where , , and are the mismatches in parameters. When and , the Arneodo system exhibits chaotic behavior.
The fractionalized version of Lü system reads
It has been shown that system (13) will exhibit chaotic behavior when , , , and .
From system (13), we can obtain the Jacobian matrix:
The constant matrix for response Lü system is selected as
On the basis of Definition 1, the error vector of MPS can be expressed by
Consequently, define (12) as the drive system and the response system controlled by OPCL coupling is obtained as
Thus, by choosing appropriate , , , and , we can stabilize the error vector (16). Now we choose , , , and , where decides the rate of achieving synchronization. Let us determine the stability of (16) for these ’s. According to Corollary 6, we constitute for (15) as follows:
Solving this equation for , we can see that which is greater than . Therefore, based on Corollary 6, we conclude the stability of (16), implying that the MPS between fractionalorder system (12) and system (17) can be achieved theoretically.
In numerical simulation, for further reduction in coupling complexity, we set the parameter mismatches in drive system (12) as , , and . Then, choose scale constant vector as , the initial conditions as , , , and . The corresponding numerical results are shown in Figures 1 and 2. Figure 1 depicts the time evolutions of state variables in the drive system (12) and the response system (17) with the scaling matrix .
Figure 2 displays the error state trajectories of the two systems. And the error state trajectories asymptotically converge to zero, which implies that the MPS between the incommensurate system (12) and system (17) is realized.
2.3.2. MPS between FractionalOrder Lorenz System and FractionalOrder Financial System
The fractionalorder Lorenz system with parameter perturbation is expressed as where , , and are the mismatches in parameters. When and , the Lorenz system exhibits chaotic behavior.
The fractionalorder financial system reads
It has been shown that system (20) will exhibit chaotic behavior when , , and .
Therefore, we can obtain the Jacobian matrix of system (20):
The constant matrix for response system is selected as
According to the error vector defined by (16), if system (19) is considered as drive system, the response system controlled by OPCL coupling is obtained as
Thus by choosing appropriate , , and , we can stabilize the error vector (16). Here, we choose , , and , where decides the rate of achieving synchronization. In numerical simulation, for further reduction in coupling complexity, we set the parameter mismatches in drive system (19) as , , and . Then, set the fractionalorder of two systems as and choose scale constant vector as and the initial conditions as and . The corresponding simulation results for the time evolutions of state errors are shown in Figure 3, from which we can see that the MPS between two commensurate fractionalorder chaotic systems can also be achieved.
The simulation results of the two examples demonstrate that the nonidentical fractionalorder chaotic systems with mismatches can achieve the MPS under the OPCL coupling.
3. A Novel Image Encryption Scheme Based on MPS
3.1. Scheme Description
Based on the MPS between fractionalorder Arneodo system and fractionalorder Lü system, an image encryption scheme is designed for the sake of higher security.
Sender has the drive system (12) and the response system (17). Receiver only holds the drive system (12) and scaling matrix . and share the initial conditions of system (12) and a symmetric key set. Consider
Here, , , and are parameters of drive system (12), , , and are fractional derivatives of drive system (12), are initial conditions of system (12), and are the main diagonal elements of scaling matrix .
The typical image encryption framework is used to encrypt plain image, which is illustrated in Figure 4.
The image cryptosystem in Figure 4 includes two stages, chaotic confusion and pixel diffusion, where the former process permutes a plain image and the latter process changes the value of each pixel one by one. As shown in Figure 4, the confusion and diffusion processes are both repeated several times to enhance the security of this cryptosystem. Suppose that the size of image is and the detailed encryption algorithm is described as follows.
first selects the initial conditions and scaling matrix and then uses them and systems (12) and (17) to generate chaotic data; set the chaotic stream after synchronous time as , .
In the confusion process, utilizes the discrete data of system (17) to permute the position of pixel; set and , where is the function to obtain the integer part, , and is the time interval of the two parameters; the position of pixel is permuted as follows: where and are considered as the positions of image pixel before and after permutation.
In the diffusion stage, the pixel value of image is substituted with its position information by ; according to the chaotic stream , we can obtain two substitution parameters: where is rounding function and is a positive integer; the biggest value of the parameter relates to the precision of the computer; therefore, the range of parameter is from 1 to 14 in current experiment, which can be used as secret key; the substitution of pixel value is in the form of where and are the pixel values of image before and after substitution and is the grey level of pixel.
The decryption procedure is similar to that of encryption process with reverse operational sequences to those described above. When receives the cipher image, it uses the chaotic stream , , generated by the system (12) and the initial condition of system (12) and scaling matrix to generate ,, , , by , , and . Firstly, substitute the grey values in cipher image back to original ones, namely, for every position and corresponding grey value of cipher image; compute original grey value as follows: where substitution parameters and can be computed by (26). After all pixels return to original grey values, then, the pixel in position should be moved back to the original position by following inverse operation: where the values of and are the same as they are in (25). After the two steps are followed, the plain image can be resumed and the process of decipher is over.
3.2. Experimental Results and Security Analysis
To demonstrate the validity and efficiency of our scheme, a group of experiments for gray Lena image () is carried out with results shown in Figure 5. Here, the key set is selected the same as Section 2.2. Figure 5(b) is the cipher image for original image in Figure 5(a). The histograms of plain image and cipher image illustrated in Figures 5(c) and 5(d) demonstrate that although the grey distribution of original images is not uniform, the grey values of cipher images become uniformly distributed and their statistical property is absolutely changed. A good encryption should be able to resist all kinds of known attacks and some security analyses have been performed on the proposed image encryption scheme.
(a)
(b)
(c)
(d)
3.2.1. Key Space
The key space of a good image encryption algorithm should be sufficiently large to make bruteforce attack infeasible. The key space of the proposed method is much larger than those of previous methods because system parameters, fractional derivative, and initial conditions of drive system (12) and diagonal elements of scaling matrix are all cipher key ones; moreover, the mismatch parameters , , and of drive system (12), time point , time interval , and positive integer are all also secret keys. So this is enough to resist all kinds of bruteforce attacks.
3.2.2. Key Sensitivity
A good encryption scheme should be sensitive to cipher keys in process of both enciphering and deciphering. Namely, when an image is encrypted, tiny change of keys should receive two completely different cipher images and, when an image is decrypted, tiny change of keys can cause the failure of deciphering.
Key Sensitivity in Encryption. The following key sensitivity tests in encryption have been performed based on the gray Lena image.
Test 1. One of the initial conditions of the drive system (12) is changed a bit; here, we let the first initial condition of system (12) be changed, using .
Test 2. One of the system parameters of the drive system (12) is changed slightly; here, we alter the second parameter, using .
Test 3. One of the fractional derivatives of the drive system (12) is changed, using .
Test 4. One element of the scaling matrix is altered, using .
The differences of the two cipher images for the four tests are given in Table 1. From the table, it can be concluded that the proposed method is very sensitive to the key; a small change of the key will generate a different decryption result and one cannot get the correct plain image.

Key Sensitivity in Decryption. In the encryption scheme, small changes to key can lead to completely incorrect image. For the image of gray Lena shown in Figure 5(a), the decryption result with right key is shown in Figure 6(a) and the incorrect decrypted image is shown in Figure 6(b) when the value of has tiny change (10^{−14}). That is, tiny deviation of decryption key can lead to completely meaningless image.
(a)
(b)
3.2.3. Differential Attack
One of the security requirements of an effective image encryption scheme is its ability to resist differential attacks. To measure the influence of onepixel change on the cipher image, two common quantitative measures are adopted.
NPCR (number of pixels change rate);
UACI (unified average changing intensity): where and are the pixel value matrices of two different cipher images, respectively; is the change of the corresponding pixel value, which is defined as
Next, two plain images are considered: one is the original image shown in Figure 5(a); the other is a changed image that adds 1 to the pixel value in the lower right corner of original image. When we encrypt the two plain images with the same encryption key, we can obtain two different cipher images and . Several comparisons of NPCR and UACI between our method and literature [14] with different values of and are given in Table 2. Compared with the results of literature [14], we can achieve a much more better performance NPCR > 0.996 and UACI > 0.334 with , which can be obtained with in literature [14].
3.2.4. Statistical Analysis
To test the correlation between two adjacent pixels, the following procedures are carried out. The correction coefficients of two horizontally, vertically, and diagonally adjacent pixels in the plain image and the cipher image are calculated according to the following formulas: where and are pixel values of two adjacent pixels in the image, is the mean value of , and is the variance of , .
Here, we use the gray Lena image, encrypted image with our method, encrypted image in literature [14], and random image for simulation. The results are given in Table 3.

Meanwhile, we randomly select 2000 pairs of two horizontally adjacent pixels from the Lena image. The correlation distribution of the pixels in the plain image and the cipher image is illustrated in Figure 7. Both the correlation coefficients and the figures justify that neighboring pixels of the plain image can be decorrelated by the proposed cryptosystem effectively. Therefore, the proposed algorithm has high security against statistical attacks.
(a)
(b)
4. Conclusions
In this paper, for the first time, an OPCL coupling scheme is utilized to achieve the MPS between two different fractionalorder dynamical systems in the presence of mismatch. Based on the stability theory of fractionalorder system, the MPS of two incommensurate or commensurate fractionalorder systems can be achieved. Both numerical simulations and computer graphics show that the developed coupling scheme works well. Apparently, the proposed method possesses generality and is still appropriate for the case of MPS between two fractionalorder systems without parameter mismatch. Meanwhile, because the complete synchronization, antisynchronization, and projective synchronization are all included in modified projective synchronization, our results contain and extend most of the existing works.
In image encryption application, we adopt the data from the MPS to encrypt the image. Experimental results and security analysis show that the algorithm can be easily implemented and its encryption effect is satisfactory. Moreover, the algorithm possesses high security in terms of the resistance to exhaustive attack, statistical attack, and differential attack. This scheme is particularly suitable for Internet image encryption and transmission applications.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This research was supported by the National Natural Science Foundation of China (Grant nos. 60872040 and 61104074), the Fundamental Research Funds for the Central Universities (Grant nos. N100604007, N110417004, N110417005, and N110617001), and the Ph.D. Startup Foundation of Liaoning Province, China (Grant nos. 20111001 and 20100471462).
References
 I. Grigorenko and E. Grigorenko, “Chaotic dynamics of the fractional Lorenz system,” Physical Review Letters, vol. 91, Article ID 034101, 2003. View at: Publisher Site  Google Scholar
 W. Deng and C. Li, “Chaos synchronization of the fractional Lü system,” Physica A, vol. 353, pp. 61–72, 2005. View at: Publisher Site  Google Scholar
 C. Li and G. Chen, “Chaos and hyperchaos in the fractionalorder Rössler equations,” Physica A, vol. 341, pp. 55–61, 2004. View at: Publisher Site  Google Scholar  MathSciNet
 J. Lu, “Chaotic dynamics and synchronization of fractionalorder Arneodo's systems,” Chaos, Solitons & Fractals, vol. 26, no. 4, pp. 1125–1133, 2005. View at: Publisher Site  Google Scholar
 R. Zhang and S. Yang, “Adaptive synchronization of fractionalorder chaotic systems via a single driving variable,” Nonlinear Dynamics, vol. 66, no. 4, pp. 831–837, 2011. View at: Publisher Site  Google Scholar  Zentralblatt MATH  MathSciNet
 J. G. Lu, “Nonlinear observer design to synchronize fractionalorder chaotic systems via a scalar transmitted signal,” Physica A, vol. 359, pp. 107–118, 2006. View at: Publisher Site  Google Scholar
 D. Chen, Y. Liu, X. Ma, and R. Zhang, “Control of a class of fractionalorder chaotic systems via sliding mode,” Nonlinear Dynamics, vol. 67, no. 1, pp. 893–901, 2012. View at: Publisher Site  Google Scholar  Zentralblatt MATH  MathSciNet
 S. Li and Z. Ge, “Generalized synchronization of chaotic systems with different orders by fuzzy logic constant controller,” Expert Systems with Applications, vol. 38, no. 3, pp. 2302–2310, 2011. View at: Publisher Site  Google Scholar
 E. Jackson and I. Grosu, “An openplusclosedloop (OPCL) control of complex dynamic systems,” Physica D, vol. 85, no. 12, pp. 1–9, 1995. View at: Publisher Site  Google Scholar  Zentralblatt MATH  MathSciNet
 I. Grosu, E. Padmanaban, P. K. Roy, and S. K. Dana, “Designing coupling for synchronization and amplification of chaos,” Physical Review Letters, vol. 100, Article ID 234102, 2008. View at: Publisher Site  Google Scholar
 K. S. Sudheer and M. Sabir, “Modified function projective synchronization of hyperchaotic systems through openplusclosedloop coupling,” Physics Letters A, vol. 374, no. 1920, pp. 2017–2023, 2010. View at: Publisher Site  Google Scholar
 X. Wang, R. Liu, and N. Zhang, “Function projective synchronization of fractionalorder hyperchaotic system based on openplusclosedlooping,” Communications in Theoretical Physics, vol. 55, no. 4, pp. 617–621, 2011. View at: Publisher Site  Google Scholar
 J. Wang, Z. Li, and Q. Ma, “Inverse synchronization of coupled fractionalorder systems through openplusclosedloop control,” Pramana, vol. 76, no. 3, pp. 385–396, 2011. View at: Google Scholar
 S. G. Lian, J. S. Sun, and Z. Q. Wang, “A block cipher based on a suitable use of the chaotic standard map,” Chaos, Solitons & Fractals, vol. 26, no. 1, pp. 117–129, 2005. View at: Publisher Site  Google Scholar
 M. Caputo, “Linear models of dissipation whose Q is almost frequency independentII,” Geophysical Journal of the Royal Astronomical Society, vol. 13, no. 5, pp. 529–539, 1967. View at: Publisher Site  Google Scholar
 M. S. Tavazoei and M. Haeri, “Chaotic attractors in incommensurate fractional order systems,” Physica D, vol. 237, no. 20, pp. 2628–2637, 2008. View at: Publisher Site  Google Scholar  Zentralblatt MATH  MathSciNet
 W. Deng, C. Li, and J. Lü, “Stability analysis of linear fractional differential system with multiple time delays,” Nonlinear Dynamics, vol. 48, no. 4, pp. 409–416, 2007. View at: Publisher Site  Google Scholar  Zentralblatt MATH  MathSciNet
 D. Matignon, “Stability results for fractional differential equations with applications to control processing,” Computational Engineering in Systems Applications, vol. 2, pp. 963–968, 1996. View at: Google Scholar
 K. Diethelm, N. Ford, and A. Freed, “A predictorcorrector approach for the numerical solution of fractional differential equations,” Nonlinear Dynamics, vol. 29, no. 1–4, pp. 3–22, 2002. View at: Publisher Site  Google Scholar  Zentralblatt MATH  MathSciNet
Copyright
Copyright © 2014 Hongjuan Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.