Theory and Applications of Fractional Order SystemsView this Special Issue
Research Article | Open Access
Modified Projective Synchronization between Different Fractional-Order Systems Based on Open-Plus-Closed-Loop Control and Its Application in Image Encryption
A new general and systematic coupling scheme is developed to achieve the modified projective synchronization (MPS) of different fractional-order systems under parameter mismatch via the Open-Plus-Closed-Loop (OPCL) control. Based on the stability theorem of linear fractional-order systems, some sufficient conditions for MPS are proposed. Two groups of numerical simulations on the incommensurate fraction-order system and commensurate fraction-order system are presented to justify the theoretical analysis. Due to the unpredictability of the scale factors and the use of fractional-order systems, the chaotic data from the MPS is selected to encrypt a plain image to obtain higher security. Simulation results show that our method is efficient with a large key space, high sensitivity to encryption keys, resistance to attack of differential attacks, and statistical analysis.
Fractional calculus, which is a mathematical topic with more than 300-year history, was not applied to physics and engineering until recent decades. A fractional-order system is characterized as a dynamical system described by fractional derivatives and integrals. It is demonstrated that some fractional-order differential systems behave chaotically or hyperchaotically, such as the fractional-order Lorenz system , fractional-order Lü system , fractional-order Rössler system , and fractional-order Arneodo system . Recently, the control and synchronization of the fractional-order chaotic systems start to attract a great deal of attention due to their potential applications in secure communication and control processing. Some approaches have been proposed to achieve chaos synchronization between fractional-order chaotic systems, such as adaptive control , a scalar transmitted signal method , sliding mode control , and fuzzy logic constant control .
Other than the above studies, the Open-Plus-Closed-Loop (OPCL) control method is a more general and physically realizable coupling scheme that can provide stable synchronization in identical and mismatched oscillators [9, 10]. The advantage of the OPCL coupling includes the following two aspects. First of all, OPCL coupling provides synchronization in all systems without restrictions on the symmetry class of a dynamical system. Secondly, in the synchronization regimes, the OPCL coupling can realize stable amplification or attenuation in identical and mismatched systems. Until now, many researchers have achieved their synchronization scenarios for integer-order or fractional-order systems through OPCL control [11–13]. It should be noted that most of the existing works focus on synchronization between identical chaotic systems. However, in practice applications, most systems are nonidentical and parameter mismatches are inevitable because of noise or other uncertain factors. Our coupling strategies need to be formulated to ensure stable synchronization in the presence of mismatch. As a matter of fact, OPCL control can be utilized to achieve synchronization of fractional-order chaotic systems with different structure.
Specially, we will realize modified projective synchronization (MPS) of two different fractional-order systems with parameter mismatches. In MPS, the states of the drive and response systems synchronize up to a constant scaling matrix with the complete synchronization, antisynchronization, and projective synchronization as the special cases. Based on the OPCL control, a general coupling method is proposed for MPS of two nonidentical fractional-order systems. The proposed coupling scheme is theoretically proved based on stability theory of linear fractional differential equations and its effectiveness is verified by two groups of numerical simulations. Finally, based on the realized MPS, an image encryption scheme with diffusion and confusion is designed. Both the unpredictability of scaling matrix and the use of fractional-order systems will raise the security level of the encryption scheme. According to the analysis of simulations, really satisfactory results are obtained, with large key space, high sensitivity to initial conditions, and high security.
2. The MPS through OPCL Coupling
2.1. Theory Analysis
There are several definitions of fractional derivatives. The Caputo derivative is more popular in the real applications, because the inhomogeneous initial conditions are allowed, if such conditions are necessary. The Caputo definition of the fractional derivative , which sometimes is called smooth fractional derivative, is defined as where is the smallest integer larger than , denotes the Caputo definition of the fractional derivative, is the -order derivative in the usual sense, and stands for gamma function.
As to the fractional-order chaotic systems, we will briefly describe how to synchronize two different systems via the OPCL coupling method. Assume the fractional-order chaotic system in the drive part is as follows: where , is a continuous vector function, and contains mismatch parameters. If the system parameters are not disturbed in the theory, we set zero to the value of . for () is the order of fractional-order system. If , we call the system (2) a commensurate fractional-order system, otherwise an incommensurate fractional-order system .
Then, the controlled response system is constructed as where , is a continuous vector function, and is the controller to be designed.
Remark 3. Complete synchronization, antisynchronization, and projective synchronization are the special cases of MPS, where , , and , respectively.
According to the OPCL control [9, 10], we design the controller as in the form of where is the Jacobian matrix of the dynamic system and is an arbitrary constant matrix. Then, can be written, using the Taylor series expansion, by
In order to research the synchronization stability of the two incommensurate or two commensurate fractional-order systems by OPCL coupling, we provide the following two theorems.
Theorem 4 (see ). Consider incommensurate fractional-order dynamical system with , , (), , and . Set to be the lowest common multiple of the denominators of , where and . The zero solution of the system is asymptotically stable if all roots of the equation satisfy the condition .
Theorem 5 (see ). For commensurate fractional-order dynamical system with , , and , the system is asymptotically stable if and only if is satisfied for all eigenvalues of . Also, this system is stable if and only if is satisfied for all eigenvalues of with those critical eigenvalues satisfying having geometric multiplicity of one.
From the two theorems, we can easily obtain the following two corollaries.
Corollary 6. When system (2) and system (3) are incommensurate fractional-order systems, set as the lowest common multiple of the denominators of , where , . The zero solution of the error system (6) is asymptotically stable if all roots of the equation satisfy the condition ..
satisfies the condition .
Remark 8. According to the original OPCL control method [9, 10], the control matrix can be designed as simple as possible as long as the condition or holds. For example, when is a constant, we then set such that . When is a variable, we choose , where are control parameters.
2.2. Numerical Method for Solving Fractional-Order Systems
An efficient method for solving fractional-order differential equations is the improved predictor-corrector algorithm , which will be used in numerical simulation section. The algorithm can be interpreted as a fractional variant of the classical second-order Adams-Bashforth-Moulton method.
Consider the following differential equation:
The initial values are , , and . It is equivalent to the Volterra integral equation. Consider Set . Then, (8) can be discretized as follows: where,
The preliminary approximation is called predictor and is given by where .
The error estimate is , where .
2.3. Numerical Examples
In this section, to demonstrate the effectiveness of the proposed OPCL based MPS scheme for different fractional-order systems, we provide two groups of numerical examples. Firstly, fractional-order Arneodo system and fractional-order Lü system are used to verify the incommensurate synchronization. Secondly, fractional-order Lorenz system and fractional-order financial system are introduced to validate the commensurate case.
2.3.1. MPS between Fractional-Order Arneodo System and Fractional-Order Lü System
The fractional-order incommensurate Arneodo system with parameter perturbation is defined as where , , and are the mismatches in parameters. When and , the Arneodo system exhibits chaotic behavior.
The fractionalized version of Lü system reads
It has been shown that system (13) will exhibit chaotic behavior when , , , and .
From system (13), we can obtain the Jacobian matrix:
The constant matrix for response Lü system is selected as
On the basis of Definition 1, the error vector of MPS can be expressed by
Consequently, define (12) as the drive system and the response system controlled by OPCL coupling is obtained as
Thus, by choosing appropriate , , , and , we can stabilize the error vector (16). Now we choose , , , and , where decides the rate of achieving synchronization. Let us determine the stability of (16) for these ’s. According to Corollary 6, we constitute for (15) as follows:
Solving this equation for , we can see that which is greater than . Therefore, based on Corollary 6, we conclude the stability of (16), implying that the MPS between fractional-order system (12) and system (17) can be achieved theoretically.
In numerical simulation, for further reduction in coupling complexity, we set the parameter mismatches in drive system (12) as , , and . Then, choose scale constant vector as , the initial conditions as , , , and . The corresponding numerical results are shown in Figures 1 and 2. Figure 1 depicts the time evolutions of state variables in the drive system (12) and the response system (17) with the scaling matrix .
Figure 2 displays the error state trajectories of the two systems. And the error state trajectories asymptotically converge to zero, which implies that the MPS between the incommensurate system (12) and system (17) is realized.
2.3.2. MPS between Fractional-Order Lorenz System and Fractional-Order Financial System
The fractional-order Lorenz system with parameter perturbation is expressed as where , , and are the mismatches in parameters. When and , the Lorenz system exhibits chaotic behavior.
The fractional-order financial system reads
It has been shown that system (20) will exhibit chaotic behavior when , , and .
Therefore, we can obtain the Jacobian matrix of system (20):
The constant matrix for response system is selected as
Thus by choosing appropriate , , and , we can stabilize the error vector (16). Here, we choose , , and , where decides the rate of achieving synchronization. In numerical simulation, for further reduction in coupling complexity, we set the parameter mismatches in drive system (19) as , , and . Then, set the fractional-order of two systems as and choose scale constant vector as and the initial conditions as and . The corresponding simulation results for the time evolutions of state errors are shown in Figure 3, from which we can see that the MPS between two commensurate fractional-order chaotic systems can also be achieved.
The simulation results of the two examples demonstrate that the nonidentical fractional-order chaotic systems with mismatches can achieve the MPS under the OPCL coupling.
3. A Novel Image Encryption Scheme Based on MPS
3.1. Scheme Description
Based on the MPS between fractional-order Arneodo system and fractional-order Lü system, an image encryption scheme is designed for the sake of higher security.
Sender has the drive system (12) and the response system (17). Receiver only holds the drive system (12) and scaling matrix . and share the initial conditions of system (12) and a symmetric key set. Consider
Here, , , and are parameters of drive system (12), , , and are fractional derivatives of drive system (12), are initial conditions of system (12), and are the main diagonal elements of scaling matrix .
The typical image encryption framework is used to encrypt plain image, which is illustrated in Figure 4.
The image cryptosystem in Figure 4 includes two stages, chaotic confusion and pixel diffusion, where the former process permutes a plain image and the latter process changes the value of each pixel one by one. As shown in Figure 4, the confusion and diffusion processes are both repeated several times to enhance the security of this cryptosystem. Suppose that the size of image is and the detailed encryption algorithm is described as follows.
In the confusion process, utilizes the discrete data of system (17) to permute the position of pixel; set and , where is the function to obtain the integer part, , and is the time interval of the two parameters; the position of pixel is permuted as follows: where and are considered as the positions of image pixel before and after permutation.
In the diffusion stage, the pixel value of image is substituted with its position information by ; according to the chaotic stream , we can obtain two substitution parameters: where is rounding function and is a positive integer; the biggest value of the parameter relates to the precision of the computer; therefore, the range of parameter is from 1 to 14 in current experiment, which can be used as secret key; the substitution of pixel value is in the form of where and are the pixel values of image before and after substitution and is the grey level of pixel.
The decryption procedure is similar to that of encryption process with reverse operational sequences to those described above. When receives the cipher image, it uses the chaotic stream , , generated by the system (12) and the initial condition of system (12) and scaling matrix to generate ,, , , by , , and . Firstly, substitute the grey values in cipher image back to original ones, namely, for every position and corresponding grey value of cipher image; compute original grey value as follows: where substitution parameters and can be computed by (26). After all pixels return to original grey values, then, the pixel in position should be moved back to the original position by following inverse operation: where the values of and are the same as they are in (25). After the two steps are followed, the plain image can be resumed and the process of decipher is over.
3.2. Experimental Results and Security Analysis
To demonstrate the validity and efficiency of our scheme, a group of experiments for gray Lena image () is carried out with results shown in Figure 5. Here, the key set is selected the same as Section 2.2. Figure 5(b) is the cipher image for original image in Figure 5(a). The histograms of plain image and cipher image illustrated in Figures 5(c) and 5(d) demonstrate that although the grey distribution of original images is not uniform, the grey values of cipher images become uniformly distributed and their statistical property is absolutely changed. A good encryption should be able to resist all kinds of known attacks and some security analyses have been performed on the proposed image encryption scheme.
3.2.1. Key Space
The key space of a good image encryption algorithm should be sufficiently large to make brute-force attack infeasible. The key space of the proposed method is much larger than those of previous methods because system parameters, fractional derivative, and initial conditions of drive system (12) and diagonal elements of scaling matrix are all cipher key ones; moreover, the mismatch parameters , , and of drive system (12), time point , time interval , and positive integer are all also secret keys. So this is enough to resist all kinds of brute-force attacks.
3.2.2. Key Sensitivity
A good encryption scheme should be sensitive to cipher keys in process of both enciphering and deciphering. Namely, when an image is encrypted, tiny change of keys should receive two completely different cipher images and, when an image is decrypted, tiny change of keys can cause the failure of deciphering.
Key Sensitivity in Encryption. The following key sensitivity tests in encryption have been performed based on the gray Lena image.
Test 2. One of the system parameters of the drive system (12) is changed slightly; here, we alter the second parameter, using .
Test 3. One of the fractional derivatives of the drive system (12) is changed, using .
Test 4. One element of the scaling matrix is altered, using .
The differences of the two cipher images for the four tests are given in Table 1. From the table, it can be concluded that the proposed method is very sensitive to the key; a small change of the key will generate a different decryption result and one cannot get the correct plain image.
Key Sensitivity in Decryption. In the encryption scheme, small changes to key can lead to completely incorrect image. For the image of gray Lena shown in Figure 5(a), the decryption result with right key is shown in Figure 6(a) and the incorrect decrypted image is shown in Figure 6(b) when the value of has tiny change (10−14). That is, tiny deviation of decryption key can lead to completely meaningless image.
3.2.3. Differential Attack
One of the security requirements of an effective image encryption scheme is its ability to resist differential attacks. To measure the influence of one-pixel change on the cipher image, two common quantitative measures are adopted.
NPCR (number of pixels change rate);
UACI (unified average changing intensity): where and are the pixel value matrices of two different cipher images, respectively; is the change of the corresponding pixel value, which is defined as
Next, two plain images are considered: one is the original image shown in Figure 5(a); the other is a changed image that adds 1 to the pixel value in the lower right corner of original image. When we encrypt the two plain images with the same encryption key, we can obtain two different cipher images and . Several comparisons of NPCR and UACI between our method and literature  with different values of and are given in Table 2. Compared with the results of literature , we can achieve a much more better performance NPCR > 0.996 and UACI > 0.334 with , which can be obtained with in literature .
3.2.4. Statistical Analysis
To test the correlation between two adjacent pixels, the following procedures are carried out. The correction coefficients of two horizontally, vertically, and diagonally adjacent pixels in the plain image and the cipher image are calculated according to the following formulas: where and are pixel values of two adjacent pixels in the image, is the mean value of , and is the variance of , .
Meanwhile, we randomly select 2000 pairs of two horizontally adjacent pixels from the Lena image. The correlation distribution of the pixels in the plain image and the cipher image is illustrated in Figure 7. Both the correlation coefficients and the figures justify that neighboring pixels of the plain image can be decorrelated by the proposed cryptosystem effectively. Therefore, the proposed algorithm has high security against statistical attacks.
In this paper, for the first time, an OPCL coupling scheme is utilized to achieve the MPS between two different fractional-order dynamical systems in the presence of mismatch. Based on the stability theory of fractional-order system, the MPS of two incommensurate or commensurate fractional-order systems can be achieved. Both numerical simulations and computer graphics show that the developed coupling scheme works well. Apparently, the proposed method possesses generality and is still appropriate for the case of MPS between two fractional-order systems without parameter mismatch. Meanwhile, because the complete synchronization, antisynchronization, and projective synchronization are all included in modified projective synchronization, our results contain and extend most of the existing works.
In image encryption application, we adopt the data from the MPS to encrypt the image. Experimental results and security analysis show that the algorithm can be easily implemented and its encryption effect is satisfactory. Moreover, the algorithm possesses high security in terms of the resistance to exhaustive attack, statistical attack, and differential attack. This scheme is particularly suitable for Internet image encryption and transmission applications.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
This research was supported by the National Natural Science Foundation of China (Grant nos. 60872040 and 61104074), the Fundamental Research Funds for the Central Universities (Grant nos. N100604007, N110417004, N110417005, and N110617001), and the Ph.D. Start-up Foundation of Liaoning Province, China (Grant nos. 20111001 and 20100471462).
- I. Grigorenko and E. Grigorenko, “Chaotic dynamics of the fractional Lorenz system,” Physical Review Letters, vol. 91, Article ID 034101, 2003.
- W. Deng and C. Li, “Chaos synchronization of the fractional Lü system,” Physica A, vol. 353, pp. 61–72, 2005.
- C. Li and G. Chen, “Chaos and hyperchaos in the fractional-order Rössler equations,” Physica A, vol. 341, pp. 55–61, 2004.
- J. Lu, “Chaotic dynamics and synchronization of fractional-order Arneodo's systems,” Chaos, Solitons & Fractals, vol. 26, no. 4, pp. 1125–1133, 2005.
- R. Zhang and S. Yang, “Adaptive synchronization of fractional-order chaotic systems via a single driving variable,” Nonlinear Dynamics, vol. 66, no. 4, pp. 831–837, 2011.
- J. G. Lu, “Nonlinear observer design to synchronize fractional-order chaotic systems via a scalar transmitted signal,” Physica A, vol. 359, pp. 107–118, 2006.
- D. Chen, Y. Liu, X. Ma, and R. Zhang, “Control of a class of fractional-order chaotic systems via sliding mode,” Nonlinear Dynamics, vol. 67, no. 1, pp. 893–901, 2012.
- S. Li and Z. Ge, “Generalized synchronization of chaotic systems with different orders by fuzzy logic constant controller,” Expert Systems with Applications, vol. 38, no. 3, pp. 2302–2310, 2011.
- E. Jackson and I. Grosu, “An open-plus-closed-loop (OPCL) control of complex dynamic systems,” Physica D, vol. 85, no. 1-2, pp. 1–9, 1995.
- I. Grosu, E. Padmanaban, P. K. Roy, and S. K. Dana, “Designing coupling for synchronization and amplification of chaos,” Physical Review Letters, vol. 100, Article ID 234102, 2008.
- K. S. Sudheer and M. Sabir, “Modified function projective synchronization of hyperchaotic systems through open-plus-closed-loop coupling,” Physics Letters A, vol. 374, no. 19-20, pp. 2017–2023, 2010.
- X. Wang, R. Liu, and N. Zhang, “Function projective synchronization of fractional-order hyperchaotic system based on open-plus-closed-looping,” Communications in Theoretical Physics, vol. 55, no. 4, pp. 617–621, 2011.
- J. Wang, Z. Li, and Q. Ma, “Inverse synchronization of coupled fractional-order systems through open-plus-closed-loop control,” Pramana, vol. 76, no. 3, pp. 385–396, 2011.
- S. G. Lian, J. S. Sun, and Z. Q. Wang, “A block cipher based on a suitable use of the chaotic standard map,” Chaos, Solitons & Fractals, vol. 26, no. 1, pp. 117–129, 2005.
- M. Caputo, “Linear models of dissipation whose Q is almost frequency independent-II,” Geophysical Journal of the Royal Astronomical Society, vol. 13, no. 5, pp. 529–539, 1967.
- M. S. Tavazoei and M. Haeri, “Chaotic attractors in incommensurate fractional order systems,” Physica D, vol. 237, no. 20, pp. 2628–2637, 2008.
- W. Deng, C. Li, and J. Lü, “Stability analysis of linear fractional differential system with multiple time delays,” Nonlinear Dynamics, vol. 48, no. 4, pp. 409–416, 2007.
- D. Matignon, “Stability results for fractional differential equations with applications to control processing,” Computational Engineering in Systems Applications, vol. 2, pp. 963–968, 1996.
- K. Diethelm, N. Ford, and A. Freed, “A predictor-corrector approach for the numerical solution of fractional differential equations,” Nonlinear Dynamics, vol. 29, no. 1–4, pp. 3–22, 2002.
Copyright © 2014 Hongjuan Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.