Abstract

This paper considers a three-dimensional nonlinear dynamical system capable of generating spherical attractors. The main activity is the realization of a spherical chaotic attractor on Intel and Xilinx FPGA boards, with a focus on implementation of a secure communication system. The first major contribution is the successful synchronization of two chaotic spherical systems, in VHDL program, in a master-slave topology using Hamiltonian forms. The synchronization errors show that the two spherical chaotic systems synchronize in a very short time after which the error signals become zero. The second major contribution is the FPGA realization of a spherical chaotic attractor-based secure communication system, which involves encrypting both grayscale and RGB images with chaos and diffusion key at the transmitting system, sending the encrypted image via the state variables, and reconstructing the encrypted image at the receiving system. The Intel Stratix III and Xilinx Artix-7 AC701 results are the same as those of MATLAB. The statistical analyses of the encrypted and received images show that the implemented system is very effective, as it reveals high degree of randomness in the encrypted images with the entropy test, and the obtained correlation coefficient, which is zero, removes relativity between the original and encrypted images. Finally, the transmission system fully recovers the original grayscale and RGB images without loss of information.

1. Introduction

In the past few decades, dynamical systems based on chaos theory have begun to be implemented in various fields, such as computer science, economics, robotics, physics, medicine, biomedical, and so on, due to their potential applications. This has prompted researchers into the study of nonlinear dynamical systems [13]. Typically, a nonlinear system is regarded as a system in which the laws governing the time evolution of its state variables depend on the values of these variables in a manner that deviates from proportionality [4]. Some of the earliest researchers of nonlinear systems are Henri Poincaré, who studied nonlinear dynamics as n-body problem in celestial mechanics, Aleksandr Mikhailovich Lyapunov, who studied the stability of nonlinear dynamical systems, and Balthasar van der Pol, who studied limit cycles in relation with oscillator dynamics. Others are Georg Duffing, who modelled a dynamic chaotic system using second-order nonlinear differential equations, Hendrik Wade Bode, who studied the asymptotic representation of the frequency response, and Edward Norton Lorenz, who gave us the chaos theory and the famous butterfly effect [5].

Nonlinear systems can exhibit limit cycle, fractal, and irregular chaotic behaviors. Others are bifurcation, multistability, and nonlinear divergent behaviors [6, 7]. A limit cycle is when the nonlinear system has a nontrivial periodic output; fractal is when there is a self-similar geometric pattern exhibited on the phase plane, and this self-similar geometric pattern is repeated at ever smaller scales to produce irregular shapes and surfaces that cannot be represented by classical geometry; and irregular chaotic behavior is when the nonlinear system is sensitive to its initial condition; a state orbit is dense and consists of dense periodic orbits, but fractal patterns do not exhibit on the phase plane. The qualitative change in the dynamics of the nonlinear system as parameters vary is called bifurcation; the presence of two or more stable states is called multistability, while the nonlinear divergent behavior occurs when some state variables tend to infinity, but the corresponding linear part is strictly stable.

Most real physical systems and phenomena are inherently nonlinear in nature. For example, gravitational and electrostatic attraction, elasticity, bio-mechanics, fluid and plasma mechanics, gas dynamics, chemical reactions, robot, aircraft and spacecraft control, combustion, and biological systems are all governed by nonlinear models. Hence, the nonlinear system is an important subject of interest to engineers, physicists, mathematicians, and scientists. Some engineering and scientific applications of the nonlinear systems can be found in [817]. The mathematical models of the nonlinear systems are represented by nonlinear differential equations. One of the challenges facing the nonlinear systems is the generation of the solutions and their characterization. The evaluation of the behavior of nonlinear systems is important, and it shows the actual nature of the systems. But due to the nonlinearity and complexity of the nonlinear systems, it is very difficult to derive the analytical or closed-loop solutions for the systems. Therefore, in solving or simulating the nonlinear systems, researchers rely on approximate or numerical methods, which provide approximate results for the systems [4, 18].

The irregular chaotic behavior of the nonlinear systems is one property that has been widely exploited, giving rise to modelling of several nonlinear dynamical systems. As the system dimension for chaos ranges from 1, 2 to multidimensions, several simple and complex chaotic systems have been constructed and more are being developed. For example, Lorenz proposed a 3-D system [19] in 1963, which is recognized as the first chaotic model. The Chen oscillator [20] was proposed as a special case of a generalized Lorenz canonical form. The Rössler systems [21] were proposed as prototype equations with the minimum ingredients for continuous-time chaos. The Rössler systems are well-known for their simplicity because they have single quadratic term. In addition, Rössler also proposed four-dimensional systems [22]. It is hereby noted that new chaotic systems can now be constructed by systematic examination of generic 3-D quadratic autonomous ordinary differential equations through exhaustive computer search [23], analytic method involving chaotification of a nonchaotic system via feedback anti-control developed by Chen [24], Shilnikov analytic criterion [25], or any other proven techniques. Constructed chaotic systems are usually analyzed for chaotic dynamics by phase diagrams, Lyapunov exponents, bifurcation diagrams, fractal dimension, time series, information entropy, and so on [26, 27].

Due to the potential in chaos, a notable area that has attracted so many interests from researchers is chaos-based communication systems, which is based on synchronization of chaotic oscillators as a backbone of the communication platform [2831]. The synchronization of chaos occurs when a chaotic system (master system) drives another identical or nonidentical chaotic system (slave system), such that the output of the slave system follows the output of the master system, asymptotically. The synchronization between the chaotic master system and the chaotic slave system can be achieved with different methods, such as Pecora and Carroll, Ott–Grebogi–Yorke (OGY), Hamiltonian forms and observer approach, open-plus-close-loop, and so on. Once synchronization is achieved, transmission of information is possible as seen for the first time in [32].

Theoretical and numerical implementations of new chaotic oscillators continue to be a subject of interest, and the significance of finding new chaotic oscillators cannot be overemphasized. First, it is important to find new chaotic systems that have high positive Lyapunov exponent, which is beneficial to developing secure physical systems such as communication systems. Second, it is also important to have new chaotic oscillators that possess multistable states, which allow easy control of chaos in various application fields such as laser physics and optics, electrical engineering, and telecommunications. Third, it is beneficial to have several options to choose from while developing real physical systems with chaotic oscillators. Furthermore, researchers have also moved on, over the years, to experimental verifications of chaotic oscillators via electronic implementations for the purpose of creating real-world chaos-based applications. The options for circuit implementation vary with different kinds of potential electronic building blocks. For instance, analog implementation with operational amplifiers (OPAMPs) was a popular choice in most of the earlier circuit implementations, as seen in [33, 34] for multiscroll chaotic oscillators and in [35, 36] for hyperchaotic oscillators. However, the OPAMP-based implementation has some drawbacks. For example, it is difficult to realize nonlinear resistors and capacitors appropriate for hardware implementation of chaotic attractors [34]. Also, OPAMPs have low slew rate [37]. These and other obstacles prompted the need for better electronic implementation.

The field-programmable gate arrays (FPGAs) have become the most attractive and popular choice for electronic realization of chaotic systems, owing to some advantages inherent in them. For example, FGPAs offer better performance as they can perform parallel processing at a faster rate. FPGAs are reprogrammable, even after the circuit has been designed and implemented. This important characteristic not only makes FPGAs reusable but also makes them adaptable, extremely cost effective, and perfect choice for prototyping purposes. Furthermore, the design process of the FPGAs, performed by hardware description languages (HDLs), is extremely fast and efficient [38].

There are many investigations that have been carried out on FPGA realization of chaotic systems and its applications. For example, in [39], a high-speed FPGA-based Lü–Chen chaotic oscillator was designed in VHDL using Heun numerical method and realized on Xilinx Virtex-6 chip. The results of the FPGA-based implementation were found to corroborate the computer-based results from MATLAB. The authors in [40] designed a 3-D chaotic system, applying the Euler method for its discrete-time generation, and implemented a secure color image encryption system based on the chaotic signals. These were realized on an Altera FPGA DE2-115 board. A novel artificial neural network-based chaotic true random number generator (TRNG) was realized in a Xilinx Virtex-6 in [41]. The numerical solution of the underlying Pehlivan–Uyaroglu chaotic system was obtained using the fifth-order Runge–Kutta algorithm. Furthermore, the investigation in [42] includes the implementation of a new one-parameter chaotic system on Altera Cyclone IV FPGA board. The applied numerical method for solving the dynamical system in VHDL was the forward Euler method. The work was extended to create a secure communication system with the chaotic system and realize it on the FPGA board. A coupled map lattice (CML), which can exhibit extremely complex spatiotemporal chaos, was applied to create a multimedia cryptosystem in [43]. To improve the encryption speed, the cryptosystem was realized in a Xilinx Spartan-3 device. Other related work on FPGA realization of nonlinear dynamical systems and their application in secure communication systems can be found in [4450].

In this work, the authors investigate a 3-D nonlinear system proposed in [51], which generates spherical chaotic attractor. The goals of this investigation are to emulate for the first time, to the best of the authors' knowledge [52], on FPGA, the spherical chaotic system and also implement a chaos-based information transmission system. By doing these, the following contributions to the state of the art are hereby emphasized:(1)FPGA realization of the 3-D spherical chaotic system in a design process performed on Intel’s Stratix III and Xilinx Artix-7 AC701, using VHDL with a word length of 32-bit. The VHDL implementations on the FPGA boards completely agree with the simulation done in MATLAB.(2)Successful synchronization and FPGA realization of two spherical chaotic systems in a master-slave configuration, using VHDL with a word length of 32-bit for the hardware design on Intel’s Stratix III and Xilinx Artix-7 AC701. The slave system serves as the observer of states whose state variables approximate the master system. Both the VHDL and MATLAB synchronization results are in complete agreement.(3)The FPGA realization of a spherical chaotic attractor-based secure communication system to successfully encrypt and transmit grayscale and RGB images, using VHDL with a word length of 32-bit for the hardware design on Intel’s Stratix III and Xilinx Artix-7 AC701. The encrypted images have no relativity with the original images, and the original images were fully recovered without loss of information. The VHDL implementations on the FPGA boards are in consonance with the MATLAB simulation.

The paper is organized as follows. Section 2 contains the theoretical framework, showcasing the 3-D nonlinear chaotic system that generates spherical attractors. Section 3 shows the Hamiltonian form method for synchronizing the spherical systems in a master-slave topology. In Section 4, the results of the FPGA realization of the spherical chaotic attractor, master-slave synchronization, and image encryption and transmission are presented. The discussion of the results obtained is found in Section 5. Lastly, Section 6 contains the conclusions.

2. Spherical Chaotic System

The authors in [51] proposed a smooth quadratic autonomous chaotic system from an earlier system constructed in [53] based on the Shilnikov criterion [54, 55], which is an analytic method for proving chaos in nonlinear dynamical systems [25]. The Shilnikov criterion was proposed in 1965 by a Russian Mathematician, Leonid Pavlovich Shilnikov. L.P. Shilnikov was an originator of the theory of global bifurcations of multidimensional dynamical systems and also one of the founders of the mathematical theory of dynamical chaos and strange attractors. The two theorems in the Shilnikov criterion provide a theoretical foundation for classification of chaos. One theorem is based on the presence of heteroclinic orbit while the other is based on the existence of homoclinic orbit. Let us consider a third-order autonomous system given in the following equation:where the vector field f(x): R3R3 is r-times differentiable (k ≥ 1) with a continuous derivative Ck. Let xe ∈ R3 be an equilibrium point of equation (1); then, xe is called a saddle focus if the eigenvalues of the Jacobian J of f(x) evaluated at xe are of the formwhere α, β, and γ are real.

Theorem 1 (Shilnikov homoclinic theorem). For a 3-D autonomous system in equation (1), let xe be a saddle focus equilibrium point whose eigenvalues satisfy α>|β|> 0, and there exists a homoclinic orbit connected at xe. Then, the 3-D autonomous system has horseshoe chaos [54, 55].

Theorem 2 (Shilnikov heteroclinic theorem). Suppose that two distinct equilibrium points and of a 3-D autonomous system in equation (1) are saddle foci, whose eigenvalues at these points are αn and βn±i γn (n= 1, 2), which satisfy the Shilnikov inequality αn>βn> 0, n= 1, 2, under the constraint β1β2> 0 or α1α2> 0. Suppose also that there exists a heteroclinic orbit connecting points and . Then, the 3-D autonomous system has horseshoe chaos [54, 55].

The spherical chaotic system, proposed in [51] and used in this work, is perturbed by a hyperbolic tangent function as given in the following equation:where ai, ci (1 ≤ i ≤ 3), d, b, c, and e are all real parameters, while x, y, and z are the state variables.

In this work, unless otherwise stated, the values of the system parameters are a1 = −4.1, a2 = 1.2, a3 = 13.45, b = 0.161, c = 3.5031, c1 = 2.76, c2 = 0.6, c3 = 13.13, d = 1.6, and e = 0, while the initial condition, randomly chosen in the basin of attraction of the system, is x0 = (−0.04, −15.8, −1.4). With the parameter values and the initial condition, the chaotic system in equation (3) has the following Lyapunov exponents: L1 = 0.0207, L2 = 0, and L3 = −0.0693. The phase space portraits of the chaotic system are presented in Figure 1 in both 2-D and 3-D, respectively. The fourth-order Runge–Kutta method was applied in this work to perform the numerical integration of the system.

3. Hamiltonian Forms

The Hamiltonian forms are applied to achieve the synchronization of two spherical attractors of the chaotic oscillator given in equation (3) in a master-slave topology [56]. This synchronization method is chosen because it allows systematic synchronization and simplifies the problem of deciding the nature of the output signal to transmit. Also, it does not require the use of the Lyapunov exponents. Moreover, it does not require that the initial conditions belong to the same basin of attraction. These are some of the advantages that give Hamiltonian forms an edge over other synchronization methods. Therefore, the method can be easily applied to synchronize several chaotic oscillators. The slave system serves as the observer of states whose state variables will approximate the master system.

Mathematically, the master and slave of a dynamical system are expressed in Hamiltonian form as follows:where is the state variable and is the nonlinear function. The dynamical system in equation (4) can be written also aswhere . Therefore,

Let and ; then, equation (6) can be written in the generalized Hamiltonian canonical form aswhere denotes a positive smooth energy function definite in , is a constant, symmetric positive definite matrix, and hence, . is the column gradient vector of H(x), while matrix satisfies and satisfies for all . The vector field exhibits the conservative part and represents the nonconservative part of the system.

The master system in the case of the observer design approach, which is a special class of the generalized Hamiltonian forms with destabilizing vector field and output y(t), is given by the following equation:where is a constant symmetric matrix and is a constant matrix.

On the other hand, the slave system, which is the dynamical nonlinear state observer, is defined as follows. The estimate of the state vector x is denoted by , and the estimated output is denoted by . Therefore, the slave system iswhere is the gain of the observer and is the output estimation error. The state estimation error is defined by . Based on the foregoing mathematical analysis, the master and slave systems of spherical chaotic system (3) are constructed as follows:

From equation (8),where and the gradient vector is .

Therefore, the master system is

Also, according to equation (9), the slave system is represented bywhich, by simplification, becomes

The synchronization is considered successful according to the following definition and theorems, created in [57] from the perspective of passivity-based state observer design in the context of generalized Hamiltonian systems including dissipative and destabilizing vector fields.

Definition 1. The basic condition for the slave to synchronize with the master in Hamiltonian form is whenregardless of what the initial conditions and are [57].

Theorem 3. The state x of the nonlinear system in equation (8) can be globally, exponentially, and asymptotically estimated by the state of the nonlinear observer in equation (9) if the pair of matrices () is observable [57].

Theorem 4. The state x of the nonlinear system in equation (8) can be globally, exponentially, and asymptotically estimated by the state of the nonlinear observer in equation (9) if and only if there exists a constant matrix such that the symmetric matrixis negative definite [57].

4. Results

This section contains the results obtained in this investigation in the master-slave synchronization and image encryption and transmission, including the FPGA device resources consumed.

In this investigation, all the activities were first modelled in VHDL using the Quartus II/ModelSim design software version 13.1 and then emulated on FPGA device. A 32-bit word was used in the VHDL programming in order to maintain fidelity to the original implementation of this work in MATLAB version 2016b. That is, 1 bit for the sign, 6 for the integer, and 25 for the fractional part. Moreover, to avoid reducing the diameter of the oscillator, the implementation of the hyperbolic tangent function in the system in equation (3) in VHDL was done using a lookup table (LUT), instead of calculating it by means of LUTs for the functions sin(y) and ey. This option results in a single LUT of 512 samples of 8 bits each. The results of the VHDL implementation, simulated in ModelSim and compared with MATLAB, are presented in this section.

4.1. Master-Slave Synchronization

The master-slave synchronization is illustrated in Figure 2, which shows the coupling between the master system in equation (12) and slave system in equation (13).

The multiplexer MUX handles the setting of the initial conditions for both the master and slave systems and allows performing the needed iterations of the equations representing the master and slave systems using the fourth-order Runge–Kutta method. The pin Sel controls the number of iterations to perform, while the registers store the outputs of the master and slave systems, and the subtractors compute the synchronization errors e1, e2, and e3. Following Theorem 4, the gains of the observer used in the synchronization were k1= 2, k2= 7, and k3= 5. The synchronization is simulated in MATLAB and compared with the VHDL-generated results in ModelSim. Both simulations have the same initial conditions x0 = (−0.04, −15.8, −1.4) for the master system and y0 = (−0.12, −12.41, −2.1) for the slave system and a total of 35 × 104 samples each. The initial conditions were randomly chosen in the basin of attraction of the chaotic system, out of the many possible values. The master and slave chaotic systems are sensitive to the chosen initial conditions. This was confirmed by computing the Lyapunov exponents, which in each case has one positive value.

In Figure 3 are found the waveforms of the master system (blue) and slave system (magenta) in both MATLAB and ModelSim. The VHDL-generated synchronization errors are presented in Figure 4(b) while the MATLAB implementation is shown in Figure 4(a). The errors e1 = x1ξ1 (red), e2 = x2ξ2 (blue), and e3 = x3ξ3 (magenta), in which xi represents the master while ξi denotes the slave.

The results of the Hamiltonian forms synchronization in Figures 3 and 4 show that the master system, slave system, and the synchronization errors obtained from MATLAB are the same as the output from VHDL/ModelSim. Specifically, as it is seen in Figure 4, the master and slave signals were synchronized in a very short time after which the error signals e1, e2, and e3 became zero. In other words, the master and slave systems became synchronized as soon as the simulation started, around 1,100th iteration, just 0.3% of the total iterations. Therefore, it could be concluded that the ratio of the master and the slave states xi and ξ1 is 1 after a very short time.

4.2. Image Encryption and Transmission

Once the master and slave systems are synchronized, the implementation of a secure communication system for image transmission is achievable. In the present investigation, the images transmitted were grayscale of size 640 × 480 pixels and RGB of size 320 × 240 pixels. The MATLAB-Simulink block diagram of the secure communication system is described in Figure 5.

The methodology involved in the image encryption and transmission begins in the master system, which is the transmitter, whereby the original image undergoes a robust encryption with the chaotic master signal Xm and diffusion key using the X-OR operator. The transmitter generates a secure, encrypted image IMt and transmits same to the slave system, which is the receiver, to begin the image reconstruction process. The decryption methodology at the receiver is the inverse of the encryption procedure. Because the slave system approximates the master system, the original image is fully reconstructed and recovered in IMr.

For the best results according to the correlation between the original and encrypted images (see Table 1), the obtained waveforms in MATLAB and ModelSim from the original (red), encrypted (blue), and recovered (magenta) images are shown in Figure 6 for grayscale via transmission variable y and Figure 7 for RGB via transmission variable x.

Also, it could be seen that the obtained results of the image encryption and transmission from both MATLAB and VHDL in Figures 6 and 7 are the same (see the encrypted and recovered image data). The time scale in the VHDL ModelSim results in Figures 6(b) and 7(b) is expressed in nanosecond (ns). The total simulation time was 700 ns. A sample is generated every 0.002 ns, making a total of 35 × 104 samples, which is equivalent to the MATLAB results expressed in number of samples in Figures 6(a) and 7(a).

In Figures 8 and 9 are found the actual original, encrypted, and recovered grayscale and RGB images obtained from the best results, respectively. The results of the chaotic image transmission system were examined with statistical analysis. The applied statistical tests are information entropy and correlation. The results are presented in Table 1.

As it is expected, a reliable encryption system should be robust enough to generate encrypted image with very high entropy and have correlation between original and encrypted image of zero. Therefore, in the statistical analysis results presented in Table 1, it is seen that the entropy is very high (very close to 8) in both grayscale image transmission and RGB image transmission. The higher the information entropy is, the more random the encrypted image is. This shows that the chaos-based encryption system is very effective. Also, the correlation between the original image and encrypted image in both cases is 0. This shows that the encryption performed effectively removes relativity between the original and encrypted images. Moreover, the correlation between the original image and recovered image is 1, meaning there is no loss of information.

4.3. FPGA Device Resources

In this investigation, the 3-D spherical attractor and the grayscale and RGB image transmissions are emulated on two FPGA boards, namely, Intel’s Stratix III and Xilinx’s Artix-7 AC701, using the same VHDL design codes. In the implementation of the image transmission, lookup tables (LUTs) are created for the input grayscale and RGB image vectors. The resources consumed on both boards in the full hardware synthesis are presented in this section.

In the case of Stratix III, the logic device design software used for the emulation of the activities on Intel's Stratix III board is the Quartus II 13.1 (64-bit) version, while the selected FPGA device in the Stratix III family is EP3SL340H1152C2. The device resources consumed by the FPGA emulation of the 3-D spherical attractor are given in Table 2, while for grayscale and RGB image transmissions, they are presented in Table 3.

On the other hand, for the Artix-7 AC701 board, Xilinx’s Vivado version 2019.2 64-bit is used for the HDL design. Vivado device support is limited to 7th generation Xilinx FPGAs onwards, including Artix-7. The specific AC701 device used is XC7A200TFBG676-2. The resources consumed by the implementations of the 3-D spherical attractor as well as the grayscale and RGB image transmissions are presented in Tables 2 and 3, respectively.

Furthermore, in the FPGA emulation on Intel's Stratix III of the 3-D spherical oscillator and the grayscale and RGB image transmissions, the amount of dedicated logic registers utilized is less than one percent of the total available (see Tables 2 and 3). Also, the implementations do not use any memory LUTs and block RAMs. Also, it could be seen in Table 3 that the grayscale image transmission utilizes more logic resources than in RGB, as evidenced in the number of utilized LUTs. The overall logic utilization, which is an estimation of how full the device is, for grayscale image transmission is 85% while for the RGB, it is 79%. Bearing in mind that both transmissions used the same design, the difference in logic utilization is attributed to the size of the images, which in the case of grayscale is made up of 640 × 480 = 307,200 words, compared to the RGB of 320 × 2403 = 230,400 words.

Likewise, in the Xilinx’s Artix-7 AC701 board, the logic registers used in the three implementations are less than one percent of the total available, no memory LUTs are used, and none of the 365 block RAMs (36 kb each) are utilized (see Tables 2 and 3). The utilization of the LUTs in Artix-7 AC701 for the image transmissions confirms also the result obtained in Stratix III (see Table 3) that the grayscale image transmission consumes more logic resources than in the transmission of RGB image because of the larger size of the grayscale image.

5. Discussion

In comparing utilization of resources in the Xilinx Artix-7 AC701 with Intel’s Stratix III, it is noted that the number of I/O pins utilized for the implementations are the same: 97 for spherical attractor (see Table 2) and 99 each for the grayscale and RGB image transmissions (see Table 3). However, the Stratix III device consumes lesser LUTs and registers than Artix-7 AC701. The key to this better performance in Stratix III is its fracturable adaptive logic module (ALM), consisting of 8-input combinational logic, two registers, and two adders, which is more flexible and area-efficient than the logic unit of Artix-7 AC701, which consists of a basic 6-input LUT, carry chain, and two registers. On the other hand, the Artix-7 AC701 device has better performance in terms of the digital signal processing (DSP) block utilization. This is because Artix-7 AC701 DSP offers more efficient resource utilization and better speed and circuitry than the Stratix III device. The Artix-7 AC701 device supports clock rates of up to 628 MHz, up to 930 giga multiply-accumulate operations per second (GMACs), and up to 48-bit word lengths of data, compared to Stratix III's 550 MHz, 537 GMACs, and 36-bit word lengths, respectively. Overall, the results demonstrate that the 3-D spherical oscillator can be easily and efficiently implemented on FPGA technologies by providing real-time chaotic signals and attractors.

The FPGA implementation of the spherical chaotic oscillator on Stratix III (FPGA 1) and Artix-7 AC701 (FPGA 2) in this work is compared with some of the investigations that have been done relating to FPGA realization of chaotic oscillators [39, 5860], using some of the resource parameters and other parameters, such as the FPGA board, applied numerical algorithm, implementation language, and the fixed-point number format. This is presented in Table 4. The referenced works use the same 32-bit word length as in our implementations. It is noted that the model of the 3-D spherical chaotic oscillator used in this investigation is relatively more complex, with its hyperbolic tangent function and several nonlinear terms, than the referenced works. However, references [39, 58, 60], which implement less complex Lü–Chen, hyperchaotic Lorenz, and rotated Lorenz chaotic models, utilize more registers (2%, 5%, and 49%, respectively) and more I/O pins (41%, 32%, and 36%, respectively) than both realizations in this work. Also, references [57, 59] consumed more LUTs (24% and 101%, respectively) than our realizations on both Stratix III and Artix-7 AC701, while the utilization of the DSPs in reference [57] is higher than that of our implementation on Artix-7 AC701 and almost the same as Stratix III. Reference [58] uses the same LUTs and registers [3% and <1%, respectively] as in our Stratix III realization. Overall, the FPGA resource consumption on Stratix III and Artix-7 AC701 in this work compares favorably with most of the listed references despite having a more complex structure.

The chaos-based secure communication system implemented in this work has some basic advantages over conventional techniques, such as spread spectrum, least significant bit (LSB), and echo methods. For example, one of the advantages is its simplicity in that the system is implemented by using only one subsystem at each end of the communication link, which are the master and slave subsystems. Despite this simplicity, the chaos-based secure communication system provides all the basic processes required for digital message transmission. On the other hand, the conventional systems require enormous use of various subsystems. Also, the technique involved in the chaos-based communication system does not require different tools for synchronization and the image encryption, as the chaotic states of the oscillator are used for both the synchronization and the encryption. Moreover, the chaotic signals have impulsive-like autocorrelations and low cross-correlation values. Another edge that the chaos-based secure communication system has is that it is more robust against noises and distortions [61].

Furthermore, the chaos-based image encryption and decryption scheme in this work is faster because it requires only one round to perform each of the operations, unlike the well-known encryption algorithms such as the AES, DES, and IDEA, which have low-level efficiency in encryption and decryption process [62]. The AES, for example, requires 10 rounds of encryption. Also, the chaos-based encryption algorithm has a large key space because of the sensitivity of the chaotic system to the initial values and the parameters, which makes the algorithm more robust against security attacks. In addition, the chaotic states are pseudorandom, and hence the encryption algorithm provides a more randomized image by removing relativity with the original image.

6. Conclusions

This work was done to further demonstrate the suitability of FPGA for the electronic implementation of a chaotic oscillator. In a first major contribution, it was shown the FPGA realization of a 3-D system generating spherical chaotic attractors. Furthermore, two spherical chaotic systems were synchronized in a master-slave topology and emulated on a FPGA device. The synchronization was successfully achieved by Hamiltonian forms and observer approach. The master and the slave systems synchronized very fast during which the synchronization error becomes zero. Lastly, it was demonstrated also by FPGA emulation the transmission of grayscale and RGB images using the synchronized master and slave systems. The design process of the FPGA was performed using VHDL on Intel's Stratix III and Xilinx's Artix-7 AC701 boards. The VHDL-based results obtained via ModelSim are the same as the MATLAB results. The statistical analyses of the image transmission results show that there is no relativity between the original and encrypted grayscale and RGB images, as the correlation coefficient is 0 in all the transmission variables. Moreover, the correlation between the adjacent pixels examined in horizontal, vertical, and diagonal directions in the encrypted grayscale and RGB images is 0. The original images were completely recovered without loss of information, since the correlation coefficient between the original and recovered grayscale and RGB images is 1. Hence, the implemented transmission system is a secure communication system.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

The authors wish to thank Instituto Politécnico Nacional for its support provided through the project “SIP-20210345.”