Chaotic Communication
Chaotic Communication
Chaotic Communication
Chaotic Secure
Communication
Author
Prof. Kehui Sun
School of Physics and Electronics
Central South University
Hunan, China
ISBN 978-3-11-042688-5
e-ISBN (PDF) 978-3-11-043406-4
e-ISBN (EPUB) 978-3-11-043326-5
Set-ISBN 978-3-11-043407-1
Printed in Germany
www.degruyter.com
Preface
Since meteorologist Lorenz discovered chaotic phenomenon in 1963, it has been
widely and deeply studied. Chaos theory is known as the third scientific theoretical
revolution following the theory of relativity and quantum theory in the 20th century.
Especially, Pecora and Carroll reported chaos synchronization in 1990, which aroused
an upsurge of study on chaotic secure communications. After more than 20 years of
research and development, chaotic secure communication technology is becoming a
new growth point in the field of information technology. On one hand, the application
of chaos will continue to promote people’s profound understanding of the nature of
chaos. On the other hand, the new problems in the application of chaos will further
lead to the further research of chaos. Although chaotic secure communication techno-
logy still has a long way to go, the application of chaos in secure communication field
shows us a promising prospect.
This book includes nine chapters. In the first chapter, the history of chaos research
is reviewed, and the important characters and stories in the development of chaos are
introduced, and the advances in research on chaotic synchronization control techno-
logy and chaotic secure communication method are reviewed. In the second chapter,
the main analysis methods of the chaotic characteristic of the nonlinear system are
presented. The typical chaotic dynamic system models are introduced briefly in the
third chapter. In the fourth chapter, the principle and technology of the synchron-
ization control between chaotic systems are investigated. In the fifth chapter, the
technology and scheme of secure communication based on chaotic synchronization
are discussed. In the sixth chapter, the data encryption technology based on chaotic
sequences is discussed. In the seventh chapter, the audio and video real-time en-
cryption communication technology based on chaos is studied. In the eighth chapter,
the latest research progress, dynamic characteristic analysis, and simulation methods
of fractional-order chaotic system are studied. In the ninth chapter, the design and
implementation technology of chaotic circuit is studied.
In order to facilitate readers to grasp the important knowledge points in the book,
the author lists a few questions at the end of each chapter. In order to facilitate the
search of relevant literature and to publish the research results on time, journals about
chaos research are listed as Appendix A of this book. In addition, in order to facilit-
ate readers to quickly grasp the chaos of research methods, the author collected the
relevant analysis programs as shown in Appendix B.
Based on the research results in the field and a large number of related literatures,
this book is written through repeated modification.
In the field of research of chaos, the author has got the guidance and inspiration
of many professors including Professor Sprott J C from the University of Wisconsin
Madison in the United States, Professor Qiu S S from South China University of Tech-
nology, Professor Yu S M from Guangdong University of Technology, Professor Wang
VI Preface
Kehui Sun
January 2015, Changsha
Contents
1 Introduction 1
1.1 Linear, Nonlinear, and Chaos 1
1.2 Development of Chaos 2
1.3 Famous Scientists and Important Events 4
1.3.1 Lorenz and Butterfly Effect 4
1.3.2 Li Tien-Yien and the Concept of Chaos 5
1.3.3 Feigenbaum and Feigenbaum Constant 6
1.3.4 Leon Ong Chua and Chua’s Circuit 7
1.3.5 Guanrong Chen and Chen’s Attractor 8
1.4 Definition and Characteristics of Chaos 9
1.5 Overview of Chaos Synchronization Method 10
1.5.1 Chaos Synchronization Methods and Characteristics 11
1.5.2 Other Synchronization Methods and Problems 14
1.6 Summary of Chaos Secure Communication 15
1.6.1 Chaotic Analog Communication 16
1.6.2 Chaotic Digital Communication 16
1.6.3 Encryption Communication based on Chaotic
Sequence 17
1.7 Chaos Research Methods and Main Research Contents 18
Questions 20
References 323
Index 331
1 Introduction
After decades of development, people are no longer strange to chaos, but how to
correctly understand and study chaos and its application is still the main task of aca-
demic circles. As we all know, chaos is nonlinear, while what we know well is linear.
What is the relationship between them? The discussion begins here.
know whether a system has turned into the state of chaos? How to judge a system
that presents phenomenon for a long period of time? How to distinguish whether a
system is subject to external random disturbances? All those questions are important
issues in chaos research.
Chaos theory belongs to nonlinear science. Nonlinear scientific research al-
ways seems to make people’s understanding of “normal” things and “normal”
phenomenon to explore the “abnormal” things and “abnormal” phenomenon. For
example, solitary wave is not a regular propagation with periodic oscillation. Un-
conventional edit methods will be taken when a large number of unconventional
phenomena occur when using multimedia technology for information storage, com-
pression, transmission, conversion, and control process encountered. Chaos broke the
convention that the future movement of a deterministic equation is determined strictly
by the initial conditions and led to a so-called strange attractor phenomenon.
In nonlinear science, chaos is not exactly the same as what it means. Chaos
phenomenon refers to a determined but unpredictable motion in nonlinear science.
The external manifestations of chaos are very similar to purely random motion.
That is, they are all unpredictable. Comparing with random motion, chaos motion is
determinate. And its unpredictability is derived from the instability of the system of
internal movement. Chaos system is sensitive to initial conditions and little change,
no matter how small they are. Therefore, after a period of time evolution, the system
will deviate from its original direction of evolution. Chaos is a common phenomenon
in nature, such as the change of weather. An important feature of chaos is butterfly
effect. So chaos means a nonperiodic motion generated by a deterministic system.
Chaos, fractals, and soliton are the three most important nonlinear science concepts.
Chaos theory is a part of nonlinear science, and only nonlinear system can produce
chaotic motion.
In 1977, the first international chaos conference was held in Italy. It marks the of-
ficial birth of the science of chaos. The physicist Ford who was one of the assembly
moderators considered that chaos theory was the third revolution of physics following
relativity theory and quantum mechanics in the twentieth century. He said, relativity
theory eliminated illusions about absolute space and time, and quantum mechanics
broke Newton’s dream about controllable measurement process; and chaos burst the
bubble of determinism of predictability by Laplace [1].
the objective world. In the field of natural science and social science, chaos is striking
and changing the field of science and technology, and it presents a huge challenge to
people.
In the early 1960s, scientists began to explore some elusive phenomenon in
nature. In 1963, Lorenz proposed deterministic nonperiodic flow model [2], and later
he proposed the butterfly effect. In 1975, Li and Yorke published “Period three implies
chaos” [3] in American Mathematical Monthly, which revealed the evolution process
from order to chaos. This famous article also defined “chaos” as a new scientific term
that officially appeared in the literature. In 1976, American biologist May published
“Simple mathematical models with very complicated dynamics” [4] in Nature. This
article pointed out that a very simple one-dimensional iterative map can produce
complex period-doubling and chaotic motion. He revealed to the people that some
simple deterministic mathematical model in ecology can generate chaotic behavior.
In 1978 and 1979, Feigenbaum independently discovered scaling property and univer-
sal constant [5, 6] in the phenomenon of period-doubling bifurcation, which lays a
solid theoretical foundation for chaos in modern science. Lorenz defined that chaos
is a science that uses fractal geometry to analyze and study the nonlinear dynamics
problem from butterfly effect, aperiodicity, and so on.
In the 1980s, chaos science has been further developed. Many researchers have fo-
cused on how an order system turns into the chaotic state and on the characteristics of
chaos. In 1981, Takens proposed experimental method of determining strange attract-
ors [7]. In 1983, Glass published an article to set off a wave of computing time series
dimension [8]. In 1986, Grassber proposed dynamical systems theory and methods
of reconstruction [9]. By calculating chaotic characteristics, such as fractal dimen-
sion, Lyapunov exponent from the time series, chaos theory entered into the stage of
practical application.
In the 1990s, chaos science got mutual infiltration, promotion, and wide applic-
ation with other subjects, such as synchronization, secure communication, chaos
cryptography, chaotic neural networks, and chaotic economics research areas. Ex-
ploring the unique nature, role, and function of chaotic systems to benefit humanity
becomes a very great task.
Research on deterministic chaotic system has undergone three stages. The first
stage is to study how an order system turns into chaos, which focuses on the condi-
tions, mechanisms, and generated pathways. The second stage is to study what is the
order of chaotic system, which focuses on universality, statistical characteristics, and
the fractal structure in chaos. The third stage is to study how a chaotic system turns
into an order system, which focuses on controlling chaos to achieve order. The current
study of chaos focuses on how to control and utilize chaos.
Due to being sensitive on initial conditions, even two identical chaotic systems
evolve from almost the same initial conditions, and their orbits also quickly be-
come uncorrelated over time, which makes the chaotic signal become unpredictable
and with long-term anti-interception capability. At the same time, chaotic system is
4 1 Introduction
Edward Norton Lorenz (1917–2008) was born in Hartford, Connecticut, USA. He loved
science from a young age and graduated from Harvard University in 1940. During
World War II, Lorenz served as a forecaster in the United States Army Air Corps. After
the war, he received his master’s and doctorate in meteorology. Then he taught at the
Massachusetts Institute of Technology. In 1972, he put forward the famous “butterfly
effect” theory. In 1975, he became an academician in the US National Academy of Sci-
ences. He won the “Crafoord Prize,” which is called Ecology “Nobel Prize” in 1983 and
won the “Kyoto Prize” in 1991. The judges thought his chaos theory “brought the most
dramatic change to the human nature view after Newton’s theory.”
The butterfly effect is one of his important scientific contributions, and its dis-
covery is interesting and enlightening. In 1961 winter, Lorenz used computer for
numerical prediction calculation. In order to save time, he selected a row data (equi-
valent to one day’s weather conditions) from the original calculation results as an
initial value to calculate again, and then left his office to drink a cup of coffee. After
an hour, when he returned to the laboratory, the computer had already calculated the
predicted results of the next two months. He was shocked by the new results, which
were quite different from the original results. Minor deviation doubled every four days
until the similarity between the old and the new data was completely lost. The differ-
ence of initial value was less than 1/1,000, but it causes the second calculation result
1.3 Famous Scientists and Important Events 5
to be completely different from that of the first one. This is the “butterfly effect,” which
shows the initial value sensitivity.
In 1979, Lorenz delivered a speech entitled “Butterfly Effect” on the 139th meet-
ing of the American Academy of Science Development and proposed a seemingly
preposterous assertion: a butterfly flapping its wings in Brazil, there may be a tornado
in Texas, United States, a month later. Thus, he pointed out that it is very difficult to
forecast weather accurately. Today, people still talk about this assertion. More import-
antly, it stimulated people’s interest in chaos. With the rapid development of computer
technology, chaos has become a frontier field with far-reaching influence and rapid
development. “Butterfly Effect” is fascinating, exciting, and thought provoking, so
it not only is a bold imagination and charming color aesthetics, but also lies in the
profound scientific connotation and inherent philosophical charm. Lorenz’s discovery
laid the foundation for chaos theory. The chaos theory not only affects meteorology,
but also profoundly affects every branch of science.
Li Tien-Yien (1945–) was born in Shaxian, Fujian Province, China. He and his fam-
ily moved to Taiwan when he was three years old. He received education there until
he graduated from university. He is the 68th graduate of mathematics from Tsinghua
University, Hsinchu, Taiwan province, China. In 1969, he went to the Department of
Mathematics, University of Maryland, United States, for doctoral degree, under Pro-
fessor York. He was a lecturer in the University of Utah in the United States from 1974
to 1976. Since 1976, he taught at Michigan State University in the United States. Li Tien-
Yien has made several important pioneering works and extraordinary achievements in
the field of applied mathematics and computational mathematics. The paper “Period
Three Implies Chaos” was written by him and York, which first proposed the concept
of chaos in science and opened a new era in the scientific community for research in
chaotic dynamical systems.
In the past few decades, Professor Li Tien-Yien is suffering from a long-term ill-
ness. So far, he has undergone major surgeries under general anesthesia more than
ten times and countless surgeries under local anesthesia. Innumerable wounds are
on his body. However, he struggled in the face of adversity and overcame the disease
with an indomitable spirit of optimism again and again. He sought breakthrough in
adversity and fought the disease optimistically. He overcame all the difficulties with a
surge of strong determination and ultimately made a first-class research work under
difficult environments.
Li Tien-Yien has had rigorous scholarship for decades [13]. He believes that the
only way to success is insistence. He said to his students that he was not smart and
that it is not really important to be smart. The most important issue is to get to the
6 1 Introduction
bottom. He often emphasized to think on the problem just a minute more than others.
He believed the precious one minute paves the road for success. He often exhorts his
students that with tremendous effort, one must persist till the end of everything and
should never give up. He also said that being engaged in researches they must have a
thorough understanding, especially on mathematical logic.
Li Tien-Yien witnessed interesting research experience in the birth of chaos.
The famous paper, “Period Three Implies Chaos,” also underwent topic selection,
research, submission, rejection, and modification, and finally was published in Amer-
ican Mathematical Monthly. It focused on the meaning of section iterative, definitions,
and main results of some basic concepts. And some courses are provided as an ap-
pendix. A mathematician, who most values clarity and precision, had even talked
about mess, which has attracted many readers. Physicists and biologists have also
quickly accepted the mathematical articles. Since then, “chaos” which was put for-
ward first by Li and York, has become a technical term in chaos theory and has even
become synonymous with chaos theory [14].
kn – kn–1
$ = lim = 4.6692016091 . . . . (1.1)
n→∞ kn+1 – kn
Table 1.1: Spacing ratio changes of period-doubling bifurcation ( f (x) = +x(1 – x)).
1 1 to 2 = 21 3
2 2 to 4 = 22 3.449489743 4.751466
3 4 to 8 = 23 3.544090359 4.656251
4 8 to 16 = 24 3.564407266 4.668242
5 16 to 32 = 25 3.468759420 4.66874
6 32 to 64 = 26 3.569691610 4.6691
.. .. .. ..
. . . .
∞ Periodic solution → chaos 3.569945972 4.669201609
w1
x = 0.5 w3
w2
k2 – k1 k3 – k2
k
revealed the secret of nonlinear systems from order to chaos. The discovery of Feigen-
baum constant greatly changed humans’ understanding of the universe and promoted
chaos research from qualitative analysis to quantitative calculation. It became an im-
portant milestone in the study of chaos. As we all know, the birth of a new theory
is often accompanied with the emergence of new constant in the development of
physical theory, such as gravitational constant G in Newton mechanics, Planck’s con-
stant h in quantum mechanics, and the speed of light c in relativity. So we can easily
understand the importance of Feigenbaum constant in chaos theory research and
development.
L NR
C2 C1
He received his master’s degree from MIT in 1961 and his doctoral degree from the Uni-
versity of Illinois, Urbana – Champaign in 1964. He taught at the Purdue University in
1964–1970 and became a professor and an IEEE fellow at the University of California,
Berkeley, in 1971. He proposed the memristor, Chua’s circuit, and cell-type neural net-
work theory. He is considered the father of the theory of nonlinear circuit analysis. He
predicted the existence of the memristor. Thirty-seven years later, the research team
of Williams R. S. in Hewlett-Packard developed a solid memristor.
Chua’s circuit provides a hardware foundation for chaos theory and applications
research. When Professor Chua was a visiting scholar at Waseda University in 1983, he
designed a simple nonlinear electronic circuit, which is shown in Figure 1.2 [15]. The
circuit consists of an energy-storage component (capacitors C1 and C2 ), an inductor L1 ,
an active resistance R, and a nonlinear resistor NR . Nonlinear resistor consists of three
linear resistors and an operational amplifier. The circuit can exhibit standard chaotic
behavior. Its simple manufacturability makes it an example of chaotic system in real
world and becomes a typical model of chaotic systems.
40
z
20
0
–20 0 20
x
because of his contributions in chaos control and bifurcation theory and application.
Since 2000, he has been serving as a professor of electronic engineering in the City
University of Hong Kong and the director of the chaotic and complex network of aca-
demic research center. His research focused on related applications areas of control
theory of nonlinear systems and dynamics analysis and complex network. In 1999, he
proposed a new chaotic attractor [16], known as Chen’s attractor, which is shown in
Figure 1.3. It has become an important model in chaos theory and applied research.
Li–Yorke theorem: Let f (x) be a continuous map on [a, b]. If there are three cycle
points, then for any positive integer n, there are n periodic points for f (x).
Li–Yorke chaos definition: For continuous map f (x) on closed interval I, if the follow-
ing conditions are met, it is confirmed that there is chaos phenomenon: (1) period of
periodic points of f (x) is unbounded and (2) the uncountable set S, on closed interval
I, meets the following conditions:
1. ∀x, y ∈ S, lim supf n (x) – f n (y) > 0 when x ≠ y,
n→∞
2. ∀x, y ∈ S, lim inf f n (x) – f n (y) = 0,
n→∞
3. ∀x ∈ S and any periodic point y of f , lim supf n (x) – f n ( y) > 0.
n→∞
10 1 Introduction
Based on chaos synchronization theory and chaos control methods, researchers have
put forward many chaos synchronization schemes [18] as shown in Table 1.2.
Drive-Response Synchronization: In 1990, Pacora-Carroll first realized synchroniz-
ation between two chaotic systems by using drive-response synchronization method.
Later, Cuomo and Oppenheim also successfully simulated the synchronization of
Lorenz system by using electronic circuit [19]. Soon, Carroll and Pecora promoted
drive-response chaos synchronization method to higher-order cascaded chaotic sys-
tem [20]. The biggest feature of drive-response synchronization is that there is a
relationship of drive and response between two nonlinear dynamic systems. Beha-
vior of the response system depends on the drive system, while the behavior of the
drive systems has nothing to do with the response system. However, for some actual
the difference between the controlled parameter value and the corresponding variable
value of desired system.
Pulse Synchronization: In 1997, Yang and Chua put forward pulse synchronization
control method [26, 27]. For pulse synchronization, the response system is driven by
single pulse transferred from drive signal. The transmitted signal is incomplete chaotic
signal, so it is more secure. Pulse synchronization has strong noise immunity and ro-
bustness, so it is a promising method of chaos synchronization. According to the basic
theory of impulsive differential equations, the stability of synchronization error sys-
tem depends on its comparative systems. When the comparative system approaches
stable state asymptotically, pulses synchronization becomes stable, and the pulse
intervals can be obtained.
In the twenty-first century, chaos synchronization study shows a new trend. First, new
synchronization methods have been put forward. In addition to improving the existing
synchronization methods, the main work is to introduce advanced control theory and
technology into chaos synchronization research, such as fuzzy control [32], genetic
algorithm [33], and state observer method [34]. All this methods have achieved good
results. Second, the object of study has turned to discrete chaotic systems from con-
tinuous chaotic system, from low-dimensional chaotic system to high-dimensional
hyperchaotic system. Third, how to improve the performance of chaotic synchroniza-
tion began to draw more attention [35], such as to improve the synchronization system
performance with system identification and neural network technology.
Synchronization is the key to achieve chaotic security communication. The most
recent and the most competitive studies are to achieve chaotic secure communication
based on chaos synchronization. As the foundation of chaos theory and technology,
chaos synchronization also is an important aspect of a chaotic mechanism. Many
chaos synchronization methods perhaps will not soon get practical value, but each
new proposed method will give a new inspiration to open up a new avenue of research.
Although many chaos synchronization methods have been proposed, they have not
reached the mature stage. There are still many theoretical and technical issues to be
resolved in practical applications.
1. Establishing chaos synchronization theory. At present, some new chaotic syn-
chronization methods, such as genetic algorithm, neural network, and fuzzy
control, still lack universal theory. The synchronization theory needs further
establishment and improvement.
2. Improving synchronization performance. Research on the performance of syn-
chronization system is directly related to the engineering application of chaos.
Carrying out this research is of great significance. In the case of mismatch between
noise and parameter, chaos synchronization may be lost. It is the key technology
1.6 Summary of Chaos Secure Communication 15
Chaos digital communications include chaos shift keying, chaotic parameter modu-
lation, and chaotic spread-spectrum communication. Chaos shift keying is a chaos
communication method that is suitable for digital communications. It can code a
binary signal using different attractors produced by different parameters. For ex-
ample, code 1 indicates parameter ,1 , and its corresponding chaotic attractor is A1 .
Code 0 indicates parameter ,2 , and its corresponding chaotic attractor is A2 . The
behaviors of chaos switch between A1 and A2 . Response time of the system is con-
trolled by changing the parameter. A parameter at the transmitter is modulated by
using a binary signal, and then the chaotic signal is sent to the receiver. The mod-
ulated signal can be detected at the receiver by using the synchronization error.
Thereby the real signal is recovered. Chaos shift keying has better robustness than
that of chaotic masking method, and the anti-interference performance is better, but
it has lower information transmission rate. The original signal may be recovered by
using the short-time zero crossing rate method, but the security will be reduced.
So researchers have proposed an improved chaos shift keying digital communica-
tion schemes, including chaotic on-off keying (COOK), differential chaos shift keying
(DCSK), frequency modulation differential chaos shift keying (FM-DCSK) modulation,
etc. [46–48].
1.6 Summary of Chaos Secure Communication 17
In the past decades, along with the deepening theoretical study of chaos, the ap-
plication scope of chaos theory is also expanding. Chaos cryptography application
has become a hot topic, and a number of chaotic encryption algorithms have been
proposed [50, 51]. Chaotic systems can provide pseudorandom sequence with good
randomness, correlation, and complexity. The key sequences generated by a chaotic
system not only exhibit excellent cryptographic performances, but also have a rich
source. In addition, the chaotic encryption method greatly simplifies the design pro-
cess of traditional sequence cipher. Those attractive features make it possible to be a
stream cryptosystem. The unique advantages of chaos in cryptography attracted many
scholars and academic communities around the world to do research.
Unlike chaos analog communication, the anti-crack ability of chaotic encrypted
communication is strong. Chaos analog communication using small signal modula-
tion cannot resist the attacks of neural network and regression map. While for chaos
encrypted communications, the attacker cannot get the complete original data, and
the chaotic signals generated by original equation or regression map reconstruction
cannot be obtained according to neural network or regression method. It is diffi-
cult to decipher the encrypted signals and it can be applied to highly confidential
communication systems.
With the development of computer technology, digital technology, and network
technology, chaos encryption software has been emerging persistently [52]. Chaos-
based engineering applications have also appeared [53], and the hardware achieve-
ments based on Digital Signal Processing (DSP) and Field Programmable Gate Array
(FPGA) technologies have also been reported [54]. Chaotic encryption with digital
technology has many advantages, such as low requirements for accuracy of circuit
elements, easy hardware implementation, easy computer processing, less loss of in-
formation transmission, versatility, and so on. Especially when it is used in real-time
signal processing, the encrypted information is difficult to be deciphered. Therefore,
chaotic encryption shows strong vitality in secure communications.
Compared with conventional packet encryption system, chaos encryption system
has the following characteristics:
1. Complex key signal generated by simple circuit or iterative equation.
2. Key signal is unpredictable. There is no exclusive corresponding plaintext–
ciphertext pair, and the same plaintext corresponds to different and irrelevant
ciphertext. So it is similar to one-time pad.
3. Design method and implementation technology of key space need to be further
studied.
4. Security of systems can only be tested by limited numerical algorithm.
study, and so on. At present, the methods on the chaos theory mainly include nu-
merical calculation, symbolic dynamics, Melnikov and Shilikov method, phase space
reconstruction method, and so on. The numerical methods for judging the chaotic
state are the Lyapunov exponents, fractal dimension, power spectrum, Poincaré
section, direct observation, and so on. Among them, the Lyapunov exponents and
fractal dimension are quantitative methods, and the others are qualitative descrip-
tions. Power spectral density shows the signal changes with the frequency by Fourier
transform. The power spectrum of a chaotic signal is changed continuously. Poincaré
section is a section in the phase space. The phase trajectory leaves a point at the cross
section when it passes the cross section so that the flow in n-dimension can be re-
duced to a map with n – 1 dimension, and many properties of the original system are
preserved. For a chaotic system, these points have a fractal structure and cannot fill
up the entire section. To observe whether there exists butterfly effect is a typical dir-
ect observation method. Comparing the time series of chaotic system, two very similar
initial values after a short-time evolution will be very different. It reflects the sensit-
ivity of chaotic system to initial value. For the chaotic systems with known dynamics
equations, the symbolic dynamics method is used to study the dynamics equation.
In the second chapter of this book, we will focus on the analysis methods of chaotic
characteristics.
Numerical simulation is an important method for the study of chaos theory and
application. First of all, numerical simulation method provides the application issues
associated with the real system for chaos theory analysis, and it broadens the field
of theory research. Simulation system provides ideal plasticity experimental model
for theoretical research, and it opens up the new field of chaotic application study.
Second, the simulation method can provide the basis for the feasibility of construct-
ing the real and practical system. The third and fourth chapters of this book are based
on the Matlab/Simulink numerical simulation method. The third, fourth, and fifth
chapters mainly use the numerical simulation method based on Matlab/Simulink to
study.
Real experimental study is an important method for the practical application
of chaos. Since the 1990s, the results of a large number of theoretical studies are
based on real system experiments and applications. Real experiments include circuit
experiments and computer experiments. With the development of microelectronics
technology, it is possible to design various kinds of high precision chaotic compon-
ents and systems. The development of network technology and computer technology
provides a platform for constructing and testing various chaotic encryption softwares.
The fifth and sixth chapters of this book will be mainly based on computer system and
network.
Three kinds of chaos analysis methods discussed above are mutual depend-
ence and mutual promotion, and constantly push forward the development of chaos
research. In this book, the theoretical analysis, numerical simulation, and real exper-
iments are combined. This book will mainly use the Lyapunov exponents, conditional
20 1 Introduction
Lyapunov exponents, and fractal dimension for the theoretical study. Based on Mat-
lab/Simulink simulation platform, we analyze chaotic system synchronization control
mechanism and the chaotic synchronization performances. Through computer ad-
vanced language and computer network, we carry out real experimental researches,
designing practical chaotic encryption software, testing it, and analyzing the security.
In the study of chaos synchronization control, both the continuous system
synchronization and discrete system synchronization are studied. The relationship
between the performance and the control parameters is particularly studied. In the
application of chaotic systems, we will focus on the integration of chaotic dynam-
ics, advanced control technology, modern cryptography, and modern communication
technology. Combining the physical synchronization of chaotic system with com-
puter programming technology, static data file encryption softwares are designed. The
network-based self-synchronization method is investigated. Chaotic encryption soft-
ware to achieve real-time voice signal transmission is designed by using the advanced
computer language. Those above are the main achievements of the research group in
the field of chaotic application.
Questions
1. What is chaos? What are the main characteristics of chaos?
2. What is butterfly effect? What is its philosophical significance?
3. What is the definition and significance of the Feigenbaum constant?
4. What are the main techniques of chaotic secure communication? What are the
characteristics?
5. Why chaos synchronization is the key technology of secure communication?
2 Characteristic Analysis Methods for Nonlinear
System
Because of the complexity of the nonlinear system, how to judge the chaotic behavior
of a nonlinear system is an important question in the study of chaos theory and ap-
plication. Generally, methods to determine the chaotic characteristics of a nonlinear
system include phase diagram analysis, power spectral analysis, Lyapunov exponent
spectrum analysis, fractal dimension analysis, dividing frequency sampling method,
pseudo-phase space method, Poincaré section, 0–1 test, and so on.
0
y
–1
–2
–2 –1 0 1 2
x
According to Fourier transformation, for a function x(t), –∞ < t < ∞, if x(t) satisfies
the Dirichlet condition
+∞
|x(t)|dt < ∞, (2.2)
–∞
then we have
+∞
x(t) = F(f )ei20 ft df , (2.3)
–∞
∞
where F(f ) = –∞ x(t)e–i20 ft dt. We call F(f ) the Fourier transformation or the spectrum
of x(t). The following is the relationship between F(f ) and x(t):
+∞ ∞
|x(t)|2 dt = |F(f )|2 df , (2.4)
–∞ –∞
where the left-side term represents the total energy of x(t) over the range (–∞, ∞),
while |F(f )|2 in the right side represents the spectral density of x(t), which means the
energy or power per unit interval is on the frequency scale. Equation (2.4) is the spec-
tral representation of the total energy of time function. The average power per unit
interval on the frequency scale is
1
G(f ) = lim |F(f )|2 . (2.5)
T→∞ 2T
where
T/2
1
cn = x(t)e–jn90 t . (2.7)
T T/2
For periodic motion, the power spectrum appears at the fundamental frequency and
its frequency doubling. For the quasi-periodic motion, the power spectrum is located
in irreducible fundamental frequency and their superimposed frequency spikes. The
power spectral can display bandwidth characteristics of the noise signal. When the
period-doubling bifurcation occurs, frequency division and frequency doubling occur
in power spectrum, and peaks will display at this frequency points of the power spec-
trum. The chaotic motion is characterized by a continuous spectrum with the noise
background in the power spectrum, which contains the peak corresponding to the
periodic motion. According to these characteristics, the motion of a system can be
easily identified as the periodic, quasi-periodic, random, or chaotic.
In order to obtain the reliable power spectrum, the average of several sequential
sampling sequence spectra is required. In addition, the transition process must be
ended before the start of the sampling. If the original data contains a large amount
of noise and external interference, the appropriate filtering or smoothing should be
considered.
Poincaré section with the continuous trajectory in the phase space are called the cutoff
points. By observing the distribution of the cutoff points of the Poincaré section, we
can judge whether the chaotic phenomenon occurs. When there is only one fixed point
or a small number of discrete points on the Poincaré section, the motion is periodic.
When there is a closed curve on the Poincaré section, its movement is quasi-periodic.
When there are pieces of dense points with a fractal structure on the Poincaré section,
the motion is chaotic.
To observe the route to chaos of the system (2.1), the phase diagram and the Poin-
caré section of the system are shown in Figure 2.2 with a = b = 1 and F change. The
Poincaré section is z mod 20 = 1. With the increase of F, the limit cycle phase diagram
is observed as shown in Figure 2.2(a1 ), and its corresponding Poincaré section is a
point as shown in Figure 2.2(a2 ). To increase the parameter F, the limit cycle phase dia-
gram by period doubling is obtained as shown in Figure 2.2(c1 ) and its corresponding
Poincaré section is the two points as shown in Figure 2.2(c2 ). To increase the paramet-
ers F further, the limit cycle phase diagrams by period doubling again is obtained as
shown in Figure 2.2(d1 ) and the corresponding Poincaré section is the four points as
shown in Figure 2.2(d2 ). Finally, the chaotic attractor phase diagram is shown in Fig-
ure 2.2(e1 ) and the infinite points on the corresponding Poincaré section are shown
in Figure 2.2(e2 ). Thus the process of chaos of the system (2.1) by the period-doubling
bifurcation is demonstrated by the phase diagram and the Poincaré section.
At the same time, we can observe fork bifurcation with parameter F increasing
from 0.65 to 1.045 as shown in Figure 2.2(b), and then the two coexisting attractors
expand as shown in Figure 2.2(c) and (d) and finally merge by an attractor-merging
crisis bifurcation at the onset of chaos as shown in Figure 2.2(e).
Lyapunov exponent refers to the average change rate of two trajectory separations or
aggregates to each other with the time going on in the phase space. In the practical
application, the maximum Lyapunov exponent +1 is of great significance, and it can
be calculated by
M
1 D(tk )
+1 = ln , (2.11)
tM – t0 D(tk–1 )
k=1
where D(tk ) is the distance of most adjacent two points at tk ; M is the iterative number;
+1 is not only the quantitative index of the chaotic attractor, but also the quantitative
26 2 Characteristic Analysis Methods for Nonlinear System
2 2
(a1) (a2)
1 1
0 0
–1 –1
–2 –2
–2 –1 –0 –1 –2 –2 –1 –0 –1 –2
2 2
(b1) (b2)
1 1
0 0
–1 –1
–2 –2
–2 –1 –0 –1 –2 –2 –1 –0 –1 –2
2 2
(c1) (c2)
1 1
0 0
–1 –1
–2 –2
–2 –1 –0 –1 –2 –2 –1 –0 –1 –2
2 2
(d1) (d2)
1 1
0 0
–1 –1
–2 –2
–2 –1 –0 –1 –2 –2 –1 –0 –1 –2
2 2
(e1) (e2)
1 1
0 0
–1 –1
–2 –2
–2 –1 –0 –1 –2 –2 –1 –0 –1 –2
Figure 2.2: Phase diagram (left) and its corresponding Poincaré section (right) of system (2.1):
(a) F = 0.65, 1T period; (b) F = 0.95, 1T period; (c) F = 1, 2T periods; (d) F = 1.01, 4T periods; and
(e) F = 1.045, chaotic motion.
2.4 Lyapunov Characteristic Exponent Method 27
For systems with dimensions greater than 1, there is a set of Lyapunov exponents, of-
ten referred to as the Lyapunov exponent spectrum. Each of the Lyapunov exponents
characterizes the convergence of the trajectory in a certain direction.
Now, a definition of Lyapunov exponent spectrum is given. For a continuous dis-
sipative dynamical system with n-dimensional phase space, it is assumed that the
long-term evolution of an infinitesimal n-dimensional sphere among the initial condi-
tions of the system can be controlled. And because of the evolution of the natural de-
formation, the ball will become ellipsoid. If all the spindles in the sphere center on the
ellipsoid attractor are ranked by the order from the fastest to the slowest speed, then
the ith Lyapunov exponent is defined according to the increase rate pi (t) of the ith axis
1 pi (t)
+i = lim ln . (2.12)
t→∞ t p0 (t)
Note that the linear range of the ellipse increases with e+1 t , and the area defined by
the first two principal axes increases with e(+1 ++2 )t , and the volume defined by the
first three principal axes increases with e(+1 ++2 ++3 )t , and so on. In fact, this feature is a
definition of the Lyapunov exponent spectrum, i.e. the sum of the first j exponents is
determined by the long-term average rate of the volume defined by the first j principal
axes. If the evolution of all the points on the sphere is considered, the behavior of the
phase space can be visualized.
For example, the simplified Lorenz system equation is [56]
⎧
⎪
⎨ẋ = 10(y – x)
⎪
ẏ = –xz + (24 – 4c)x + cy , (2.13)
⎪
⎪
⎩ż = xy – 8z/3
where c is the system parameter, and when c ∈ [–1.59, 7.75], the system is chaotic. Its
two Lyapuov exponents are shown in Figure 2.3. When +1 > 0, +2 = 0 and when +3 < 0,
the system is chaotic state. When +1 = 0, +2 < 0, and +3 < 0, the system is periodic
state.
0.5
LE sprectrum
–0.5
–2 0 2 4 6 8
c
Figure 2.3: Lyapunov exponents of the simplified Lorenz system with different parameter c.
it indicates that the phase volume of the system shrinks in this direction, and the
movement of the system is stable. For a nonlinear dissipative system, the sum of the
Lyapunov exponents must be negative, and it indicates that the overall motion of the
system in the phase space is stable and contraction. While a positive Lyapunov ex-
ponent indicates that the system phase volume expands and folds in one direction
so that the originally adjacent trajectories in the attractor become increasingly irrel-
evant, and the long-term behavior of the system becomes unpredictable, namely the
so-called initial value sensitivity. At this time, the motion is chaotic state, and it has
a strange attractor. So, for a chaotic system, one Lyapunov exponent is greater than
zero at least.
Lyapunov exponent can depict the strange attractors. The strange attractor is a
phase diagram with fractal structure in the phase space. Since the chaotic attractor
is often of noninteger dimension, the confirmation of strange attractors is signific-
ant for studying the chaotic motion. If a system’s Lyapunov exponent spectrum is +1 ,
+2 , . . . , +n (from large to small), and the system has a chaotic attractor, it must satisfy
the following conditions:
1. At least one positive Lyapunov exponent.
2. At least one of Lyapunov exponents +i = 0, 1 < i < n.
3. The sum of the Lyapunov exponents is negative, that is, ni=1 +i < 0.
The first condition above indicates that the adjacent track in the phase space is separ-
ated with the exponential rate, and the system is sensitive to the initial value, which
is the prominent feature of the chaos. So the Lyapunov exponent spectrum must have
positive component, which is an important symbol to distinguish the strange attractor.
Sum of all positive Lyapunov exponents is defined as Kolmogorov entropy, which is a
2.4 Lyapunov Characteristic Exponent Method 29
u̇ = f (u) (2.14)
where the first subsystem variable v = (u1 , u2 , . . . , um ), and the second subsys-
tem variables v = (um+1 , um+2 , . . . , un ), g = (f1 (u), f2 (u), . . . , fm (u)), h = (fm+1 (u),
fm+2 (u), . . . , fn (u)). Copy a new system
1
+j = lim ln (Dw ht )x0 v . (2.17)
t→∞ t
where j = m + 1, . . . , n, and v is the unit matrix, and (Dw ht )x0 = (Dw h)xt
(Dw h)xt–1 , . . . , (Dw h)x0 .
Only when all of the CLEs are negative, system w′ can synchronize with w.
30 2 Characteristic Analysis Methods for Nonlinear System
The relationship between the capacity and the Lyapunov exponent spectrum is
j
+i
Dc = j + , (2.19)
–+i+1 + 1
i=1
Consider a set of continuous time series x(t) to characterize the dynamic system, and
6(x) represents the observable data set. This test method is completely independent
2.6 0–1 Test Method 31
2.5
2
Fractal dimension
1.5
0.5
–0.5
–2 0 2 4 6 8
c
Figure 2.4: Fractional dimension of the simplified Lorenz system with different c.
of the specific form 6(x), that is, the condition can be satisfied for any form of 6. For
example, if x = (x1 , x2 , . . . , xn ), then 6(x) = x1 satisfies the condition. Similarly 6(x) =
x2 or 6(x) = x1 + x2 also satisfies the condition. Choose an arbitrary constant c > 0 and
define the following equations:
t
((t) = ct + 6(x(s))ds, (2.20)
0
t
p(t) = 6(x(s)) cos(((s))ds. (2.21)
0
Thus, p(t) in eq. (2.21) is only related to the observation data set 6(x), which demon-
strates the general property of the testing method. This test algorithm has no relation-
ship with the original data of the system and the system dimension. From the above
definition, we can get two conclusions as follows:
1. If the system is not chaotic, then the movement of p(t) is bounded.
2. If the system is chaotic, then the movement of p(t) is similar to that of the Brown
movement.
To characterize the growth of p(t), the root mean square displacement of p(t) is
defined as
T
1
M(t) = lim [p(t + 4) – p(4)]2 d4. (2.22)
T→∞ T 0
If the motion of p(t) is the Brown movement, M(t) linearly increases with time. If the
motion of p(t) is bounded, then M(t) is bounded. Define the asynchronous growth
rate of M(t) as
32 2 Characteristic Analysis Methods for Nonlinear System
When the integral time t is long enough, then K = 0 or K = 1, which characterizes the
nonchaotic motion or chaotic motion, respectively.
Since the integral is only suitable for continuous systems, the solution of vector
integrals is not very convenient. An improved 0–1 test algorithm is introduced, which
is used to replace integrating with summing so that it has wider applications.
where
j
((j) = jc + 6(i), j = 1, 2, 3, ..., n. (2.26)
i=1
Then, on the basis of function p(n), or s(n), define the root mean square displace-
ment as
N
1
2
M(n) = lim p(j + n) – p(j) , n = 1, 2, 3, ... (2.27)
N→∞ N
j=1
Obviously, if the behavior of p(n) (s(n) behaves in the same way) is Brownian, then
M(n) grows linearly in time. If the behavior of p(n) is bounded, then M(n) is bounded.
The asynchronous growth rate is defined by
log M(n)
K = lim . (2.28)
n→∞ log n
Just as the same for continuous time system, K = 0 means that the system is regular
(i.e. periodic or quasi-periodic), and K = 1 means the system is chaotic. For a finite
data set 6(n), 1 ≤ n ≤ N, we define
N–n
1
2
M(n) = p(j + n) – p(j) . (2.29)
N–n
j=1
2.7 Dividing Frequency Sampling Method 33
The simplified Lorenz system is described by eq. (2.13). Now, we carry out the 0–1
test with c = 7.2 and c = –1, respectively, and we obtain K = 0.0736 at c = 7.2, and
K = 0.7630 at c = –1, which corresponds to periodic state and chaotic state. The state
space plots are shown in Figure 2.5 and the corresponding translation components
(p, s) is shown in Figure 2.6, which corresponds to periodic motion and Brown motion.
Obviously, the results of 0–1 test are the same with that of Lypunov exponents and
phase diagram analysis [59].
(a) (b)
5 50
0
y
0
y
–5 –50
5
20 50
5
0 0
x –5 0 z x –20 0 z
Figure 2.5: State space diagrams of the simplified Lorenz system: (a) c = 7.2 and (b) c = –1
34 2 Characteristic Analysis Methods for Nonlinear System
5 6000
(a) (b)
4000
–5
2000
s(n)
s(n)
–15
0
–25
–2000
–35 –4000
–25 –20 –15 –10 –5 0 5 10 15 –10000 –6000 –2000 2000
p(n)
p(n)
Figure 2.6: (p, s) plot of the simplified Lorenz system: (a) c = 7.2 and (b) c = –1.
For the forced vibration, the sampling period is often set to the period of the external
control force. When the sampling result is a point, the system motion is a periodic
motion (special case for the stable state). When the sampling results are n discrete
points, the system movement is also a periodic, and its motion period is n times of
the external control period. When the sampling results are infinite points, the system
movement is random. When the sampling results are concentrated in a certain region
and have a hierarchical structure, the system movement is chaotic. Continuously in-
creasing resolution, we can get the fine structure of the original distribution. It is a
kind of infinite-level self-similarity, and the self-similarity of the infinite level is the
scaling invariance of the nonlinear system.
Dividing frequency sampling method is suitable for all the nonlinear systems
driven by a periodic force for which its resolution is much higher than that of other
methods. The resolution is limited by a computer word “length.” But this method
also has some shortcomings. One is that it is not unique for the result interpretation,
and the other shortcoming is that the higher frequency over the sampling frequency
cannot be distinguished.
dimension of phase space. Assuming the time series is {x(k), k = 1, 2, . . . , N}, appro-
priately select the time delay 4, which is an integer multiple of the sampling period.
Choosing x(k), x(k + 4), x(k + 24), . . . , x(k + (m – 1)4) as the coordinate axis, we can draw
a pseudo-phase space trajectory.
The process of reconstructing the attractor is equivalent to mapping the time
series {x(k)} to the m-dimensional Euclidean space Rm , and the topological properties
of the original unknown attractors may be maintained in the Rm space. Although the
pseudo-phase space method is used to construct the phase space of a variable at dif-
ferent time, the change of one variable of the dynamical system is related to the other
variables of the system. The dynamics of the whole system is implied by the change
of the variable with time. So the trajectory of phase space reconstruction also reflects
the evolution law of the system state. For the steady state, the results obtained by this
method are still a certain point. For periodic motion, the results are limited points,
and for chaotic system, the results are some discrete points with certain distribution
patterns or structures.
is used to measure the complexity of the sequence by the frequency characteristic and
energy spectrum in the transformation domain. The more uniform distribution of the
energy spectrum is, the original sequence is more close to the random signal, and
the original sequence is more complex. The structural complexity focuses on analyz-
ing the energy characteristic in the transform domain, which is based on all but not
the local sequence, and thus compared with the behavior complexity, the result has a
global statistical significance.
At present, structural complexity algorithms include spectral entropy [69] and
wavelet entropy algorithm [70], which are based on the Fourier transform and wavelet
transform and are applied to complexity analysis of discrete chaotic system and Elec-
troencephalogram (EEG) signals. In addition, the computing speed of C0 algorithm [71]
based on fast Fourier transform (FFT) is fast, and it is used in the field of biomedicine,
the brain electrical signal, brain optical images successfully for complexity analysis.
The important properties of C0 algorithm are proved in Ref. [72], which shows that
C0 algorithm can describe the random degree of the time series and can describe the
complexity. The algorithm is improved in Ref. [73], and the improved C0 algorithm is
more excellent.
In fact, the complexity of chaotic systems is one of the methods to characterize
the dynamics of chaotic systems. The effects of the method are similar to that of the
Lyapunov exponent, the bifurcation diagram, and the phase diagram. Here, spectral
entropy (SE) algorithm and C0 algorithm are introduced here.
Step 1: Remove the DC. We can use the next formula to remove the DC part of the
chaotic pseudo-random sequence {xN (n), n = 0, 1, 2, . . . , N – 1}, so that the spectrum
can reflect the signal energy more effectively.
where k = 0, 1, 2, . . . , N – 1.
2.9 Complexity Measure Algorithm 37
Step 3: Calculate the relative power spectrum. The first half of the sequence X(k) is
used to calculate. According to the Parseval theorem, the power spectrum of a certain
frequency point is calculated by
1
p(k) = |X (K )|2 , (2.32)
N
N |X(k)|
1 2
p(k) |X(k)|2
Pk = = = . (2.34)
ptot 1
N/2–1
N/2–1
N |X(k)|2 |X(k)|2
k=0 k=0
N/2–1
We know that Pk = 1.
k=0
Step 4: Calculate spectral entropy. By using the relative power spectral density Pk and
the Shannon entropy, the spectral entropy se is obtained by
N/2–1
se = – Pk ln Pk , (2.35)
k=0
Obviously, when the distribution of the sequence power spectrum is not uniform, the
spectrum structure of the sequence is simpler and the signal has a distinct oscillation
pattern. The SE measure is smaller in this case, and it indicates that the complexity is
smaller. Otherwise, the complexity is larger.
The SE calculation flow chart is shown in Figure 2.7. First, the average value of the
sequence is subtracted; that is, the DC part of the signal is removed. Next do FFT. The
energy distribution in the transformed domain is calculated by the Shannon entropy,
and the SE complexity of the sequence is obtained by the normalization.
When we calculate the SE complexity, we can do the Fourier transformation by
using the MATLAB function Y = fft(X). The calculation speed of this function is very
fast. The obtained spectrum is symmetric, so we only choose the first N/2 points to
calculate.
38 2 Characteristic Analysis Methods for Nonlinear System
Start
Data from x N = x N – x
N / 2–1
se = – Σ Pk In Pk
k=0
k=0
Normalization
N / 2–1
Pk = | X(k) | 2 ∑ | X(k) |2
k=0
End
k=k+1
Y
k ≤ N / 2–1
N
The main idea of C0 complexity is to decompose the sequence into the regular and
the irregular components, and the measure value is the proportion of the irregular
components in the sequence. The algorithm calculation steps are as follows [75]:
N–1
N–1
20
X(k) = x(n)e–j N nk = x(n)WNnk , (2.37)
n=0 n=0
where k = 0, 1, . . . , N – 1.
Step 2: Remove irregular parts. The mean square value of {X(k), k = 0, 1, 2, . . . , N – 1}
is defined by
N–1
1
GN = |X(k)|2 . (2.38)
N
k=0
2.9 Complexity Measure Algorithm 39
To introduce a parameter r, and retain the spectrum that is more than the mean square
value of r times, let the rest of the part be zero; that is
X(k) if |X(k)|2 > rGN
X̃(k) = . (2.39)
0 if |X(k)|2 ≤ rGN
N–1 N–1
1 20 1
x̃(n) = X̃(k)ej N nk = X̃(k)WN–nk , (2.40)
N N
k=0 k=0
where n = 0, 1, . . . , N – 1.
N–1
N–1
C0 (r, N) = |x(n) – x̃(n)|2 / |x(n)|2 . (2.41)
n=0 n=0
C0 algorithm can also be implemented in MATLAB, and the flow chart is shown in Fig-
ure 2.8. FFT and Inverse Fast Fourier Transform (IFFT) are, respectively, implemented
by function Y = fft(X) and Y = ifft(X).
In addition, there are some other chaotic dynamical characteristics analysis
methods, such as measure entropy method. It is often combined with qualitative
analysis methods (phase diagram, dividing frequency sampling, or Poincaré section)
and quantitative analysis method (Lypunov exponents, power spectral density, or
0–1 test).
Start
IFFT for the regular
spectrum
Data preparation x N
X(k) by FFT
Calculation C0 complexity
End
Questions
1. What is the relationship between the Lyapunov exponent spectrum and the
capacity dimension?
2. What is the conditional Lyapunov exponent?
3. What are the characteristics and deficiencies of the 0–1 test method for analyzing
chaotic dynamics?
4. What is the complexity of the chaotic system? How to measure it?
3 Typical Chaotic Systems
Chaos exists widely in nature. During the research and development of chaos theory,
researchers found a lot of chaotic dynamics models, and some of them are typical
for the chaos theory and application research, including discrete-time chaotic maps,
continuous-time chaotic systems, and hyperchaotic systems. In this chapter, we will
discuss the mathematical model and its main characteristics of some typical chaotic
systems.
Logistic map is the most widely used discrete chaotic map model, and its equa-
tion is [4]
where the parameter , ∈ (0, 4] and xn ∈ (0, 1). When 3.5699 . . . < , ≤ 4, it is chaotic.
The dynamical state of the system changes with the system parameter, which includes
the following aspects:
1. When , ∈ [0, 1], the system has a fixed point xn → 0.
2. When , ∈ [1, 3], the system has fixed points xn → 0 and xn → 1 – 1/,. This is called
period 1 solution.
3. When , ∈ [3, ,′ ), ,′ = 3.569945672 . . ., where orbital period changes such as 1 →
2 → 4 → 8 . . . occur. This is called period-doubling bifurcation phenomenon.
4. When , ∈ [,′ , 4), the system shows a chaotic phenomenon.
42 3 Typical Chaotic Systems
0.9
0.8
0.7
0.6
0.5
xn
0.4
0.3
0.2
0.1
0
2 2.2 2.4 2.6 2.8 3 3.2 3.4 3.6 3.8 4
μ
1
Lyapunov exponent
–1
–2
–3
2 2.5 3 3.5 4
μ
The bifurcation diagram of the system is shown in Figure 3.1. The iterative initial value
of x0 is 0.6, and the iteration number N is 2,000. The step size of , is 0.01. As shown
in Figure 3.1, when time series experiences four stages of evolution, from stable fixed
point, unstable fixed points, period to chaos, complexity of the system increases. If , =
4.0, the complexity is largest, which is shown in Figure 3.2 by the Lyapunov exponent.
When , = 4.0, Lyapunov exponent is equal to 0.69, which is the maximum.
Next, we will discuss the statistical properties of Logistic map.
3.1 Discrete-Time Chaotic Map 43
N
1
x̄ = lim xi = . (3.4)
N→∞ 2
i=1
The advanced Logistic map, which is also called improved logistic map, is
N
x̄ = lim xi = 0. (3.9)
N→∞
i=1
Tent map is another commonly used discrete chaotic map. The chaotic sequence gen-
erated by the tent map has been widely applied in the field of chaotic spread spectrum
communication, chaotic encryption system, chaotic optimum algorithm, and so on. Its
equation is
xn /q, 0 < xn ≤ q
xn+1 = , (3.12)
(1 – xn )/(1 – q), q < xn < 1
where the system parameter q ∈ (0, 1) and the variable xn ∈ (0, 1). Tent map and lo-
gistic map are topological conjugates. When q varies as (0, 1), the system is chaotic.
In particular, when q = 0.5, the system is in a short-cycle state, such as (0.2, 0.4, 0.8,
0.4). In this case, the system is simple and its complexity is small. Therefore, for the
application of tent map system, we should choose reasonable system parameter and
initial value. Tent map system has the following statistical properties.
The average value is
N
1
x̄ = lim xi = . (3.13)
N→∞ 2
i=1
When 1.07 ≤ a ≤ 1.4 and b = 0.3, it is chaotic. The variable xn ∈ (–1.5, 1.5).
When a = 1.4, the complexity of the system is largest. Generally, in the study of
the chaotic synchronization and encryption, we choose a = 1.4 and b = 0.3. The
3.1 Discrete-Time Chaotic Map 45
0.4
0.2
0
yn
–0.2
–0.4
–2 –1 0 1 2
xn
0.5
0.4
0.3
0.2
0.1
yn
–0.1
–0.2
–0.3
–0.4
0 0.5 1 1.5
a
strange attractor of Hénon map system is shown in Figure 3.3, which looks like the
galaxy in the sky, where the initial value xn (0) = yn (0) = 0.5, and the iteration
times are 1,000. When b = 0.3, and a ∈ [0, 1.5], the bifurcation diagram of Hénon
map system is shown in Figure 3.4. Obviously, it enters into chaos by period-doubling
bifurcation.
46 3 Typical Chaotic Systems
In 2004, Sheng et al. proposed a discrete chaotic system based on tangent delay (TD),
which is called as TD-ellipse reflecting cavity system (TD-ERCS) map [77]. The map
equation is
⎧
⎪
⎪ 2kn–1 yn–1 + xn–1 (,2 – kn–1
2 )
⎪
⎪ xn = –
⎪
⎪ , – kn–1
2 2
⎪
⎪
⎪
⎪ ′ ′2
⎨k = 2kn – kn–1 + kn–1 kn–1 , n = 1, 2, 3, . . . ,
⎪
n ′ ′2
1 + 2kn–1 kn – kn (3.17)
⎪
⎪
⎪
⎪ ′ x n–m
⎪
⎪ kn–m =– ,2 (m ≤ n)
⎪
⎪ yn–m
⎪
⎪
⎪
⎩y = k (x – x ) + y
n n–1 n n–1 n–1
where the system parameter , ∈ (0, 1], and the variables |xn | ≤ 1 and |yn | ≤ 1. m is
an integer, which represents the number of TD. kn–m′ is the ellipse tangent slope after
delaying m. k0 is determined by incident angle !, and the method is as follows.
First, we calculate y0 and the slope of k0′ through the initial value x0 and system
parameter ,
y0 = , 1 – x02 , (3.18)
x0
k0′ = – ,2 . (3.19)
y0
tan ! + k0′
k0 = . (3.20)
1 – k0′ tan !
So, if we know the system parameters , and m, and the initial values x0 and !, we can
get the chaotic sequence {xn , kn }. When the TD m= 0, the system becomes ERCS map.
When m ≥ 1, the TD-ERCS is chaotic.
With the change in system parameter ,, the largest Lyapunov exponent of the
system is shown in Figure 3.5. Because the curve chart looks like a flying goose, it is
called “Goose.” The iteration number n is 400,000. Obviously, when , = 1, the max-
imum Lyapunov exponent LE = 0.92. When , = 0.5, the maximum Lyapunov exponent
LE = 0.33. Thus, the maximum Lyapunov exponent is greater than zero in the range of
,, which shows that TD-ERCS is chaotic in the whole range.
When m = 1, there exists a square attractor for TD-ERCS as shown in Figure 3.6,
where we choose , = 0.8123, x0 = 0.7654, ! = 0.9876, and the iteration number N is
1,500. At the beginning, the phase points are not on the attractor, but with the increase
of iteration, phase points will fall on the attractor. The experiment also shows that if
0 < , < 1, the position of square attractor is unchangeable and has no relation with
3.2 Continuous-Time Chaotic System 47
0.8
0.6
LE
0.4
0.2
0
0 0.5 1
μ
Figure 3.5: Maximum Lyapunov exponent of TD-ERCS system (x0 = 0.7654, ! = 0.9876).
0.5
Start point
arctan(K)/π
–0.5
0 0.5 1
arccos(X)/π
the initial value. When , = 1, the position of attractor is related to the initial values,
but all phase points are on the attractor.
phenomenon, which is described by the differential equation ẏ = F(x) and usually can
be realized by analog circuit.
There are two types of continuous chaotic systems. One is autonomous sys-
tem, such as the Lorenz system, Rössler system, and Chua system. The other is
nonautonomous system, such as Duffing oscillator and van der Pol oscillator.
where k is damping coefficient, f (x) is a nonlinear function, and e(t) is the drive term
with period T. When f (x) and e(t) take different forms, we will get Duffing equation
with different forms. Here, consider the following Duffing equation:
where k is the dissipative coefficient, and F and 9 are amplitude and frequency of
the periodic force, respectively. It is an important type that can generate chaos in
nonlinear vibration.
Let ẋ = y, then eq. (3.23) is translated into
ẋ = y
. (3.24)
ẏ = –ky + x – x3 + F cos 9t
When k = 0, F = 1.5, and 9 = 1, the attractor of the system is shown in Figure 3.7.
0
y
–2
–4
–2 0 2
x
0
y
–5
–2 0 2
x
Figure 3.8: Chaotic attractor of van der Pol oscillator in x–y plane.
In 1926, van der Pol proposed a nonlinear nonautonomous system that is driven by
external force, and the equation is [79]
ẋ = y
. (3.25)
ẏ = –x + b(1 – x2 )y + A sin Kt
where 3, r, and b are the system parameters. The third-order ordinary differential
equation is based on the simplified model of heat fluid convection movement between
the infinite flats. Its variables do not contain time, so it is called autonomous equation.
x represents convection strength; y represents the temperature difference between
50 3 Typical Chaotic Systems
50
40
30
z
20
10
0
–20 –10 0 10 20
x
upflow and downflow between the units; z represents the nonlinear intensity in the
vertical temperature distribution; r represents the ratio of driving factors and inhibited
factor that causes convection and turbulent, which are the main control parameters of
the system. 3 = v/k is Prandtl value (where v and k are molecular viscosity coeffi-
cient and heat transfer coefficient, respectively); b represents the ratio of shape that is
related to convection in aspect ratio; and 3 and b are dimensionless constant values.
Numerical results show that when 3 = 10, b = 8/3, and 28 ≤ r < ∞, except some
values near b (such as b = 100, 160, 260, and so on), the Lorenz system is in a chaotic
state. Let 3 = 10, r = 28, and b = 8/3 and take numerical simulation for the Lorenz
system, we get the famous attractor – “butterfly,” as shown in Figure 3.9. The butterfly
attractor has two fixed points, and the orbit line transfers randomly around the two
fixed points and forms the spiral shape, just like two wings of a butterfly.
Rössler equation looks like the Lorenz system equation, but only a nonlinear term,
which is also one of the typical systems in chaotic application research.
Rössler system model is described as [80]
⎧
⎪
⎨ẋ = –y – z
⎪
ẏ = x + ay , (3.27)
⎪
⎪
⎩ż = b + z(x – c)
where a, b, and c are system parameters. When a = b = 0.2, c = 5.7, the system is in a
chaotic state. The Lyapunov exponent spectra are (0.0714, 0, –5.3943). The movement
of the attractor describes the complexity of the system. The attractor of Rössler system
is shown in Figure 3.10.
3.2 Continuous-Time Chaotic System 51
10
0
y
–5
–10
–15
–10 0 10
x
In 1983, Professor Chua designed the famous nonlinear chaotic circuit at the first
time, which is called as Chua’s circuit. Not only it can generate the rich and com-
plex dynamic behaviors, but also the structure of the circuit is relatively simple.
It has become a classical chaotic system for application of chaos control and
chaos secure communication. It can produce period-doubling bifurcation, single-
scroll, period 3, double-scroll attractor, and other complex nonlinear dynamic be-
haviors by adjusting the circuit parameters. On the basis of Chua’s circuit, the
study of multi-scroll Chua’s chaotic attractors has become a research hotspot at
present.
The normalized state equation of Chua’s circuit is [15]
⎧
⎪
⎨ẋ = ![y – h(x)]
⎪
ẏ = x – y + z , (3.28)
⎪
⎪
⎩ż = –"y
h(x)
xeq1 xeq3
m0 m1 m2 m3 m4
c2 c3 c4
x
c1
0.5 4
(a) (b)
0 0
z
y
–2
–0.5 –4
–2 0 2 –2 0 2
x x
Figure 3.12: Chaotic attractors of the double scroll: (a) x–y plane and (b) x–z plane.
where h(x) is a piecewise linear function, and its waveform is shown in Figure 3.11.
When h(x) is a different piecewise linear function, the system produces double-scroll
and multi-scroll chaotic attractors. For chaos secure communication, the more the
scroll is, the more secure the chaotic secure communication system is. Here only
the double-scroll, three-scroll, five-scroll, and seven-scroll chaotic systems are sim-
ulated.
1 1
(a) (b)
0.5 0.5
h(x)
h(x)
0 0
–0.5 –0.5
–1 –1
–5 0 5 –5 0 5
x x
1 2
(c) (d)
0.5 1
0 0
y
–0.5 –1
–1 –2
–5 0 5 –10 –5 0 5 10
x x
Figure 3.13: Nonlinear curve and the three-scroll chaotic attractor (a), (b) nonlinear curve; (c),
(d) The three-scroll chaotic attractor in x-y plane.
Through Matlab simulation, the nonlinear function and three-scroll chaotic attractor
are shown in Figure 3.13.
5
(a) (c)
1
0 0
y
y
–1
–5
–10 –5 0 5 10 –20 0 20
x x
Figure 3.14: Five-scroll chaotic attractor: (a) Parameter 1 (x–y plane) and (b) parameter 2 (x–y plane).
0
y
–1
–2
–20 –10 0 10 20
x
⎧
1
2q–1
⎪
⎪
⎪
⎪ h ( x ) = m2q–1 x + (mi–1 – mi ) ⋅ (|x + ci | – |x – ci |)
⎪
⎪
2
i=1
⎪
⎪
⎪
⎨q = 4, ! = 9, " = 100/7
. (3.32)
⎪
⎪m = [m0 , m1 , m2 , m3 , m4 , m5 ]
⎪
⎪
⎪
⎪ = 0.9/7, –3 7, 3.5/7,–2.4/7, 2.52/7, –1.68 7, 2.52/7, –1.68/7
⎪
⎪
⎪
⎩
c = [c1 , c2 , c3 , c4 , c5 ] = [1, 2.15, 3.6, 6.2, 9, 14, 25]
Through Matlab simulation, the seven-scroll chaotic attractor is shown in Figure 3.15.
3.2 Continuous-Time Chaotic System 55
where X = (x, y, z)T ∈ R3 is the state of the system; a > 0, b > 0, and c > 0 are the
system parameters. Although Chen system is similar to the other two famous chaotic
systems – Lorenz system and Rössler system in the form, Professor Chen proved that
it isn’t topological equivalence with the two chaotic systems. The attractor of this sys-
tem is different from any previous chaotic attractors, and qualitatively analysis the
features of the attractor, such as bifurcation, the route to chaos. If a = 35, b = 3, and
c = 28, the strange attractor of Chen chaotic system is shown in Figure 3.16.
Hardware circuit of Chen system is designed and tested in Ref. [81], and the cir-
cuit diagram and experimental results are shown in Figures 3.17 and 3.18, respectively.
Obviously, the experimental results are consistent with the simulation results.
3.2.7 Lü System
In 2002, Lü and Chen discovered a new chaotic attractor, which connects the famous
Lorenz attractor and Chen attractor. The mathematical model of Lü system is [82]
50
40
30
z
20
10
0
–20 0 20
x
R4 C1
R7
R1
y – R5
– R6
x + –
R2 + x –x
+
R3
R12 R14
x C2
Y
R9
z X R13
– R15
–
–x + –
R10 + y
+
y
R8
R11
R19 C3
x Y R16
X R20
y –
–
+ z
R17 +
R18
⎧
⎪
⎨ẋ = a(y – x)
⎪
ẏ = –xz + cy , (3.34)
⎪
⎪
⎩ż = xy – bz
where a, b, and c are system parameters. When a = 36, b = 3, and c = 20, the system
is in a chaotic state. The chaotic attractor of the system is shown in Figure 3.19.
3.2 Continuous-Time Chaotic System 57
40
30
20
z
10
0
–20 –10 0 10 20
x
In 2002, Lü and Chen proposed a new chaotic system, and the system connects
the Lorenz attractor and Chen attractor. Lü system is just a special one of the new
chaotic system, so it is called the unified chaotic system. According to the definition
of Vanĕček and Čelikovský [83], Lorenz system, Chen system, and Lü system belong to
different topology types. Mathematical model of the unified chaotic system is [84]
⎧
⎪
⎨ẋ = (25! + 10)(y – x)
⎪
ẏ = (28 – 35!)x – xz + (29! – 1)y , (3.35)
⎪
⎪
⎩ż = xy – (8 + !)z/3
where the system parameter ! varies in the interval [0, 1]. At this range, the unified
chaotic system has full chaotic characteristics. According to the definition of Vanĕček
and Čelikovský [83], when ! varies in the interval [0, 0.8), the unified chaotic system
belongs to the generalized Lorenz system. When ! varies in the interval (0.8, 1], the
unified chaotic system belongs to the generalized Chen system. When ! = 0.8, the
unified chaotic system belongs to Lü system. So the unified chaotic system plays
an important role in connecting Lorenz system with Chen system, and it is a one-
parameter continuous chaotic system. Namely, using only one parameter !, we can
control the entire system. When ! gradually increases from 0 to 1, the system also
gradually transits from the generalized Lorenz system to the generalized Chen system
[85]. Under the different parameters of unified chaotic system, the chaotic attractors
in the x–z plane are shown in Figure 3.20. The unified chaotic system parameter !
has the largest Lyapunov exponent in the range of [0, 1] as shown in Figure 3.21, ex-
cept the three obvious periodic windows, W1 = [0.369, 0.371], W2 = [0.468, 0.470],
W3 = [0.575, 0.597]. The largest Lyapunov exponent is greater than zero in the range
58 3 Typical Chaotic Systems
50 50
(a) (b)
40 40
30 30
z
z
20 20
10 10
0 0
–20 0 20 –20 0 20
x x
50 50
(c) (d)
40 40
30 30
z
z
20 20
10 10
0 0
–20 0 20 –20 0 20
x x
Figure 3.20: Attractors of unified chaotic system with different parameters in x–z plane. (a) ! = 0;
(b) ! = 0.5; (c) ! = 0.8; and (d) ! = 1.
2.5
2.0
Maximum LE
1.5
1.0
0.5
0
0 0.2 0.4 0.6 0.8 1
α
of [0, 1], so the unified chaotic system has full chaos characteristics. Due to its excel-
lent performances, the control and synchronization of the system become a hot topic
for the chaotic research [86], and it has extensive application prospect in the field of
secure communications [87].
3.2 Continuous-Time Chaotic System 59
0.5
Maximum LE
–0.5
–2 0 2 4 6 8
c
Figure 3.22: Maximum Lyapunov exponent of simplified Lorenz system with different c.
⎧
⎪
⎨ẋ = 10(y – x)
⎪
ẏ = –xz + (24 – 4c)x + cy , (3.36)
⎪
⎪
⎩ż = xy – 8z/3
20
18
16
14
12
χmax
10
8
6
4
2
0
–2 –1 0 1 2 3 4 5 6 7 8
c
20
0
x
–20
20 40
0
20
y
–20 0 z
R3 C1
R1
– R5
–
R2 + + V1
R4
Y R6 R7 R8
X R16 C2
– R9
– R17
+ –
+ V2
R15 +
R13
R14
R11
R10
– R12
–
+ +
R20 C3
Y
R18 V3
X – R22
–
+
R19 +
R21
Figure 3.26: Attractor of simplified Lorenz system in x–z plane from oscilloscope.
62 3 Typical Chaotic Systems
The above standards provide a sufficient condition for the publication of new chaotic
system. The famous Lorenz system meets the three standards when first published
since it deals with atmospheric turbulence, exhibited sensitive dependence on initial
conditions, and is the simplest system in its time known to have these proper-
ties. Lorenz devoted considerable effort to simplifying the system from the original
seven-dimensional system with 13 quadratic nonlinearities that was suggested by
Saltzman [90].
⎧
⎪
⎪ẋ1 = –x2 – x3
⎪
⎪
⎪
⎨ẋ = x + ax + x
2 1 2 4
. (3.37)
⎪ẋ3 = b + x1 x3
⎪
⎪
⎪
⎪
⎩ẋ = –cx + dx
4 3 4
When the system parameters a = 0.25, b = 3.0, c = 0.5, and d = 0.05, the system is in
a chaotic state, and the Lyapunov exponent spectrum is (0.112, 0.019, 0, –25.188). Its
attractor is shown in Figure 3.27.
In 2005, Li et al. designed the hyperchaotic Chen system by employing state feedback
control, and the equation is [92]
⎧
⎪
⎪ ẋ = a(y – x) + w
⎪
⎪
⎪
⎨ẏ = dx – xz + cy
, (3.38)
⎪ż = xy – bz
⎪
⎪
⎪
⎪
⎩ẇ = yz – rw
where x, y, z, and w are state variables of the system, and a, b, c, d, and r are control
parameters of the system. When a = 35, b = 3, c = 12, and d = 7, r changes in the inter-
val [0, 0.1085], (0.1085, 0.1798], (0.1798, 0.1900], respectively, then the system shows
chaotic motion, hyperchaotic motion, and periodic motion, respectively. When a = 35,
b = 3, c = 12, d = 7, and r = 0.16, the hyperchaotic system has two positive Lyapunov
exponents, 0.1567 and 0.1126. The attractor of the system is shown in Figure 3.28.
60
50 (a) (b)
50
0 40
x2
x4
30
–50 20
10
–100 –50 0 –50 0 50
x1
x2
Figure 3.27: Attractors of Rössler hyperchaotic system: (a) x1 –x2 plane and (b) x2 –x4 plane.
64 3 Typical Chaotic Systems
40
(a) (b)
100
30
50
w
20
z
10
–50
0 –20 0 20
–20 0 20
x y
Figure 3.28: Attractors of Chen chaotic system: (a) x–z plane and (b) y–w plane.
where a and b are control parameters, and x, y, z are system variables. If a = 3.8,
b = 0.2, the system is hyperchaotic, and the Lyapunov exponents are (0.418, 0.373,
–2.502) [93]. The phase diagram of the folded towel map function for a = 3.8, b = 0.2,
x0 = 0.1, y0 = 0.2, and z0 = 0.3 is shown in Figure 3.29.
The chaotic system models are much more than those models discussed earlier.
In this chapter, we mainly introduce typical chaotic systems, and they are common
models in chaotic theory and applied research. These models not only have the actual
physical meaning, but also have unique characteristics. Researchers often use them
1
0.8
0.6
z
0.4
0.2
0
0.05
1
0 0.8
y 0.6
0.4
–0.05 0.2 x
0
to research chaotic theory and application. With the study of chaos, researchers will
continuously find and reveal chaotic system model and its dynamics in nature.
Questions
1. Try to build a new chaos model.
2. What kind of characteristics a new chaotic system should have?
3. If xn+1 = xn2 + c and –2 < c < 0.3, calculate its bifurcation diagram, and
approximately prove Feigenbaum constant.
4. What is hyperchaotic system? What are its features?
4 Chaotic Synchronization Principle and Method
Due to the extremely sensitive initial value, researchers once thought it is impossible
to control chaos. Until 1990, American scientists, Ott, Grebogi, and Yorke, proposed
the OGY method to realize chaos control [12]. In the same year, Pecora and Car-
roll proposed a self-synchronizing method for chaos [10], and the synchronization
between two chaotic systems is realized by using the drive–response method for
the first time [94]. The breakthrough research has broken the traditional concept
that chaos movement is not controllable and dangerous. It is proved that chaos
can not only be controlled and synchronized, but also it is the basis of information
transmission and processing. So it can be used in the field of information security
communication, and thus it opened the prelude to the application of chaotic secure
communication.
Chaos synchronization, in general, belongs to chaos control. The problem of
chaos synchronization can be considered as a kind of control problem that the chaotic
orbit of the controlled system evolves as the orbit of the target system. The traditional
chaos control is generally the stable system on the unstable periodic orbits, while the
synchronization of the chaotic system is the complete reconstruction of the chaotic
state of the two systems.
In this chapter, based on the definition of chaos synchronization and the per-
formance index of chaotic synchronization system, the principle and performance of
various chaotic synchronization control methods are studied.
Similarly, based on the stability of error system (4.3) at the origin of the system, the
stability conditions of the system are derived.
In the study of chaos synchronization, the stability of the synchronization system
is determined mainly by the Lyapunov stability principle or by the condition Lyapunov
exponent (CLE) criterion proposed by Pecora and Carroll. The former is the main
criterion, and the latter is a necessary condition for synchronization. But the linear
stability theorem shows that the necessary condition is also a sufficient condition for
most of the dynamic systems, and it is used as a criterion during the synchronization
research [96].
The above synchronization definition is suitable for synchronization of not only
chaotic systems, but also nonchaotic systems. It is suitable for both of the synchron-
ization of autonomous systems and nonautonomous systems, and it can be extended
to the synchronization of hyperchaotic systems and spatiotemporal chaotic systems.
Definition 4.2: Synchronization stability refers to that the chaos synchronization sys-
tem with different initial states satisfies the Lyapunov asymptotic stability conditions,
namely the solution of system equation is convergent. It is the primary character-
istic of the chaotic synchronization system, and it is the necessary condition for the
synchronization system to work. It is the key to realize the application of the secure
68 4 Chaotic Synchronization Principle and Method
Definition 4.5: Synchronization accuracy refers to the consistent degree of the chaotic
signal generated by the controlled system and the target system in the amplitude and
phase, and it is denoted by $. The relationship between the steady-state error and the
synchronization accuracy is $ = 10[lg B>] , where [B>] is the smallest integer that is not
more than B>.
Definition 4.6: Synchronization setup time is an important index for the application
of chaotic secure communication, and it is the transition time experienced by the
response signal for the given synchronization accuracy, and it is denoted by Ts . To
describe the synchronization of chaotic systems, the synchronization accuracy can be
calculated by
n
1
2
2
p= (yi – xi ) (4.4)
i=1
or
p = max{|yi – xi |, i = 1, 2, . . . , n} (4.5)
Definition 4.7: Synchronization region is the initial value range for the synchron-
ization of the chaotic system. He and Vaidya proved the solution of the system is
asymptotically stable when the initial value of chaotic system is in a certain region
(synchronization region) [98]. That is, the response system will eventually be syn-
chronized with the drive system. Obviously, a successful or practical synchronization
method should have sufficiently large synchronous region.
4.3 Principle and Performance of Feedback Control Synchronization 69
Table 4.1: Comparison of the maximum CLE with the synchronization setup time.
Chaotic system Drive variable Maximum CLE Theory value [99] Setup time (s)
Research shows that the control parameters are closely related to the performance in-
dex of the synchronization. Reasonable choice of control parameters can make the
CLE of the response system from positive to negative, so that the response system
can be controlled. That all CLEs of the response system are negative is a sufficient
condition for the realization of chaos synchronization control, and it is a necessary
condition in most cases. The smaller the CLE is, the faster the error convergence is,
and the shorter the synchronization setup time is. The maximum CLE in Table 4.1 is
calculated by employing the algorithm presented in Chapter 2. When the maximum
CLE of the response system is negative, and it is significantly less than zero, then it
can guarantee a large enough synchronization region. So changing the control para-
meters means changing the system’s CLE, and it can improve the performance of the
synchronous system.
Consider two continuous chaotic systems with the same structure and different initial
values as follows:
Ẋ = AX + Bf (X),
Drive system: (4.6)
X(0) ∈ Rn ,
Ẏ = AY + Bf (Y) + U(X, Y),
Response system: (4.7)
Y(0) ∈ Rn ,
70 4 Chaotic Synchronization Principle and Method
−
X + + Y
∫ ∑ K ∑ ∑ ∫
+
+ +
+ +
∑ A ∑ A
+ +
B f( ) B f( )
+ −
∑
Drive system Controller Response system
Figure 4.1: Synchronization principle block diagram for continuous chaotic system.
4.3 Principle and Performance of Feedback Control Synchronization 71
Theorem 4.1: For the n-dimensional continuous chaotic system and its replication
system, the synchronous control method based on multivariable drive error feed-
back control is employed. The drive system is Ẋ = AX + Bf (X), and the response
system is Ẏ = AY + Bf (Y) + U, where X, Y ∈ Rn and K ∈ Rn × m . The control variable
U = K(X–Y) + B(f (X)–f (Y)). If the elements in the parameter control matrix K satisfy:
when i = j, then kij > aij ; or when i ≠ j, then kij = aij , and then the asymptotically stable
synchronization is achieved between the response system and the drive system.
Proof. Let E = X–Y, then the error system equation Ė = AE + B(f (X) – f (Y)) – U(X, Y). If
the control law of the controller is U = KE + B(f (X) – f (Y)), then Ė = (A – K)E.
Define V(E) as the Lyapunov function
V(E) = ET PE ≥ 0, (4.10)
Obviously, as long as the feedback controller parameter kij meet: when i = j, kij > aij ;
when i ≠ j, kij = aij , then Q = (A – K)T P + P(A – K) is positive definite. That is, V̇(E) is
negative definite. If and only if E = 0, the equality is right. That is, the drive–response
system is asymptotically stable. ∎
Inference 4.1 When i = j, then kij > aij ; When i ≠ j, and aij = aji , then kij = kji = 0, the
asymptotic stability synchronization is realized and the structure of the controller is
simplified, which can be proved by Lyapunov stability theorem (omitted).
Because the response system is driven by all drive system variables, and the synchron-
ization of two systems is achieved by linear and nonlinear feedback controls, it is
called multivariable driving feedback synchronization control method. The method
does not need to decompose the system, which is not only suitable for simple chaotic
systems, such as the Lorenz chaotic system, but also be applied to hyperchaotic
system, such as the Rössler hyperchaotic system. In this method, the selection of feed-
back parameters is presented, and the performance of the synchronization system can
be effectively improved by choosing proper feedback control parameters.
When feedback coefficient k11 > 0, k22 > a, k33 > 0, and k44 > c, then the syn-
chronization is achieved for the drive system and the response system. Set the initial
conditions of the drive system and the response system as (–20, –30, 20, 45) and
(–40, 25, 40, 15), respectively. The control parameter kii = 1, and the simulation time
is 20 s. The synchronization phase portrait between x1 and y1 is shown in Figure 4.2.
The error curves are obtained with the same initial values and the different con-
trol parameters as shown in Figure 4.3, where |E| = [(x1 – y1 )2 + (x2 – y2 )2 + (x3 – y3 )2 +
(x4 – y4 )2 ]1/2 . The corresponding feedback control parameters of curves a, b, and
c are (0.6, 0.6, 0.6, 0.6), (1, 1, 1, 1), and (2, 2, 2, 2). Obviously, in a certain range,
the greater the control parameters, i.e., the greater the control energy, the shorter
the synchronization setup time, and the better the dynamic performance in a cer-
tain convergence error range. The simulation results show that the error feedback
control can realize the synchronization of two hyperchaotic systems. To realize the
synchronization control, the feedback control parameters must be selected correctly.
4.3 Principle and Performance of Feedback Control Synchronization 73
50
y1 –50
–100
–150
–150 –100 –50 0 50
x1
80
60
40
|E|
20
a
b
c
0
0 5 10 15
t/s
4.3.2 Linear and Nonlinear Feedback Synchronization for Discrete Chaotic System
where Xn , Yn ∈ Rm . f is the nonlinear function and U is the feedback control law. The
feedback parameters K= diag[k1 , k2 , . . . , km ], P = diag[p1 , p2 , . . . , pm ], where ki ≥ 0
and pi ≥ 0 (i = 1, 2, . . . , m). The synchronization of the response system and the
drive system is actually the problem of the stability of the synchronous manifold
S = (Xn , Yn ) : Yn = Xn .
Here the problem is analyzed by using local linearization. Set
Yn = Xn + $n , (4.19)
where $n is a small synchronization error. From eqs (4.16) to (4.19), we obtain the linear
evolution equation of the synchronization error as
∂f
$n+1 = (A – K) + (B – P) |Y=Xn $n = Dn $n . (4.20)
∂Y
Obviously, if Dn is the constant matrix, and all the characteristic roots are within the
unit circle, then $n → 0 with n → ∞, that is, Yn → Xn . So the synchronization manifold
is stable, and the two systems will be synchronized. But if Dn in eq. (4.20) is a time-
varying matrix, then the above method does not work.
Pecora–Carroll Chaos Synchronization Theorem For all the time t, the zero solu-
tion of the nonlinear unstable system ẋ = A(t)x + O(x, t) with O(x, t) will be asymptotic-
ally stable, as long as the system meets the following conditions.
1. For time t, lim O(x, t) / x = 0.
x→0
2. For all the time t, A(t) are all bounded.
3. The zero solution of the nonlinear system ẋ = A(t)x is asymptotically stable.
1 $n
+ = lim ln . (4.21)
n→∞ n $0
by exponential law. When + < 0, the error $n will decrease by exponential law and
leads to $n = 0 finally. That is,
It means that the synchronization is achieved between the response system and drive
system. So, we can determine whether the synchronization is realized and obtain the
range of the feedback parameters by calculating the maximum CLE of the response
system.
The control law U(Xn , Yn ) consists of a linear feedback and nonlinear feed-
back, so it is called the linear and nonlinear feedback synchronization method. This
method has many advantages, such as simple structure, optional parameters, and fast
synchronous speed.
Proof. For the drive and response systems, the error system equation is
∂f
$n+1 = (A – K) + (B – P) |Y=Xn $n . (4.23)
∂Y
X Y U
Drive system Σ Response system
− +
f( ) e f( ) +
K Σ
− +
+
Σ P
Feedback controller
If P = B, then we have
Obviously, the coefficient of the characteristic polynomial of the error system is a func-
tion of the linear feedback coefficient K, which is independent of the initial value. If
T(z) = |Iz – (A – K)| is a Hurwitz polynomial, then all the eigenvalues of the matrix A–K
are located in the unit circle. $n → 0 with n → ∞, that is, Yn → Xn . Synchronization
between the drive system and the response system is achieved. ∎
Theorem 4.3: For a one-dimensional discrete chaotic system xn+1 = axn + bf (xn ), its
response system is yn+1 = ayn +bf (yn )+u(xn , yn ). By employing the linear and nonlinear
feedback synchronization control method, the control law is u(xn , yn ) = k(xn – yn ) +
p(f (xn ) – f (yn )), where xn , yn ∈ R. When k ≥ 0, and p ≥ b, then the sufficient condition for
the asymptotic stability synchronization between the response system and the drive
system is |a–k| < 1.
Proof. For a one-dimensional discrete chaotic system, the error system equation is
∂f
$n+1 = (a – k) + (b – p) |y=xn $n . (4.25)
∂y
So we have
n ∂f
$n = F (a – k) + (b – p) |y=f (i) $0 , (4.26)
i=1 ∂y (x0 )
where f(x(i) ) represents the ith iteration from x0 . According to the definition in eq. (4.21),
0
the maximum CLE is
1 $n 1 n ∂f
+ = lim ln = lim ln F (a – k) + (b – p) |y=f (i) . (4.27)
n→∞ n $0 n→∞ n i=1 ∂y (x0 )
If p = b, we have
1 $n 1
+ = lim ln = lim ln [(a – k)]n = ln |a – k| . (4.28)
n→∞ n $0 n→∞ n
Theorem 4.4: For an m-dimensional discrete chaotic system Xn+1 = AXn + Bf (Xn ), its
response system is Yn+1 = AYn + Bf (Yn ) + U(Xn , Yn ). By employing the linear and non-
linear feedback control synchronization method, the control law of the controller is
U(Xn , Yn ) = K(Xn – Yn ) + P(f (Xn ) – f (Yn )), where Xn , Yn ∈ Rm . When K = dA, and P = dB,
4.3 Principle and Performance of Feedback Control Synchronization 77
d > 0, then the sufficient condition for the asymptotic stability between the response
′ ′
system and the drive system is 1–e–+ < d < 1+e–+ , where +′ is the maximum Lyapunov
exponent of the drive system. Obviously, +′ > 0. (Proof omitted.)
Theorem 4.5: For a one-dimensional discrete chaotic system xn+1 = axn + bf (xn ), its
response system is yn+1 = ayn + bf (yn ) + u(xn , yn ). By employing the linear and non-
linear feedback control synchronization method, the control law of the controller is
u(xn , yn ) = k(xn – yn ) + p(f (xn ) – f (yn )), where xn , yn ∈ R. When k = ma, p = mb, m > 0.
The sufficient conditions for the asymptotic stability of the response system and
′ ′ ′ ′
the drive system are a – ae–+ < k < a + ae–+ , b – be–+ < p < b + be–+ , that is,
′ ′
1 – e–+ < m < 1 + e–+ , where +′ is the maximum Lyapunov exponent of the drive
′
system, and + > 0.
According to the above theorems, the linear and nonlinear feedback control can be
used to realize the synchronization of two discrete chaotic systems by choosing appro-
priate feedback coefficient. Although Theorems 4.4 and 4.5 are sufficient conditions
to guarantee the synchronization of two chaotic systems, it is also a necessary con-
dition for most of the dynamical systems. It is worth noting that the synchronization
speed is very fast. When d = 1 or m = 1, the synchronization can be achieved as D-B
synchronization.
Logistic map is
where x ∈ (0, 1) and , ∈ (0, 4]. When , = 4, the system is chaotic. The experimental
conditions are as follows. The initial value is 0.2. The step size of parameter p and k is
0.05. The iteration number is 40,000.
The drive system is
2.5
λ 1.5
0.5
0 5 10
k (p = 0)
1. When p = 0, the linear feedback control method is adopted. The maximum Lya-
punov exponent + of the response system varies with the linear feedback coeffi-
cient k as shown in Figure 4.5. Obviously, the value of + is always greater than
zero, so the two discrete systems cannot be synchronized.
2. When k = 0, the nonlinear feedback control strategy is adopted. The maximum
Lyapunov exponent + of the response system is shown in Figure 4.6 with the linear
feedback coefficient p. The value of + cannot meet the requirements of less than
zero, so the synchronization between two discrete systems cannot be achieved.
3. When k ≠ 0, p ≠ 0, it means using linear feedback and nonlinear feedback strategy
at the same time. According to Theorem 4.3, when p = 4, and 3 < k < 5, then the CLE
+ < 0, and the two systems can realize synchronization. The maximum Lyapunov
exponent of the response system varies with the linear feedback coefficient k as
shown in Figure 4.7.
2.5
1.5
λ
1
0.5
0
0 5 10
p (k = 0)
0
λ
−1
−2
−3
0 2 4 6 8
k (p = 4)
′ ′
4. When k = ma, p = mb, according to Theorem 4.5, and 4 – 4e–+ < k = p < 4 + 4e–+ ,
the two systems can realize synchronization. Due to +′ = 0.6931 for logistic map,
2 < k = p < 6. The maximum CLE of the response system varies with the linear
feedback coefficient as shown in Figure 4.8.
5. The synchronization performance of the system is related to the selection of the
control parameters. Experimental results show that the more negative the max-
imum CLE is by choosing the control parameters, the faster the error converges,
and the shorter the synchronization setup time is. The error convergence with dif-
ferent feedback coefficients is shown in Figure 4.9. When the initial conditions of
the drive and response systems are 0.1 and 0.8, respectively, and k = p = 3.2, then
+ = –1. The synchronization time is 4 s as shown in Figure 4.9(a). When k = p = 4,
then + = –3. The synchronization time is 1 s as shown in Figure 4.9(b). So the
synchronous speed is fast, and the D-B synchronization is realized.
λ –1
–2
–3
0 2 4 6 8
k=p
0.8 0.8
(a) (b)
0.6 0.6
0.4
|e|
|e|
0.4
0.2 0.2
0 0
0 2 4 6 8 0 2 4 6 8
n/s n/s
Figure 4.9: Synchronization error curves with different feedback coefficients: (a) k = p = 3.2 and
(b) k = p = 4.
Hénon map is
xn+1 = 1 – axn2 + yn
. (4.33)
yn+1 = bxn
When a = 1.4 and b = 0.3, the system is chaotic. Next, we apply Theorem 4.2 to
Hénon map.
The drive system is
0 1 1
Xn+1 = Xn + (1 – 1.4xn2 ). (4.34)
0.3 0 0
According to Jury stability criteria, the necessary and sufficient condition of all the
characteristic roots of T(z) to locate in the unit circle is
⎧ ⎧
⎪ ⎪
⎨T(1) > 0
⎪ ⎨k1 k2 + k1 + k2 > –0.7
⎪
T(–1) > 0 , that is, k1 k2 – (k1 + k2 ) > –0.7 . (4.39)
⎪
⎪ ⎪
⎪
⎩1 > |k k – 0.3| ⎩–0.7 < k k < 1.3
1 2 1 2
According to eq. (4.39), when k1 = 0 and |k2 | < 0.7, or when k2 = 0 and |k1 | < 0.7, or
when k1 = k2 = k and |k| < 0.4522, the error system is asymptotically stable. That is
to say, the response system can be synchronized with the drive system. When we set
the initial values as [0.1 1.0]T and [0 0.1]T , respectively, then the control parameters are
k1 = 0, k2 = 0.2, and P = B. The error convergence curve of the two systems is shown in
Figure 4.10(a). It shows that there exist nonsynchronization trends in the synchroniza-
tion process. When the steady-state error is B> = 10–4 , the synchronization setup time
is about 22 s. The synchronization performance of the synchronization system can be
improved by choosing the appropriate parameters. For example, when k1 = k2 = 0
and P = B, the error convergence curve is shown in Figure 4.10(b). It can be seen that
the synchronous speed is accelerated, and the synchronization time is shortened. The
simulation synchronization time is about 17 s under the same steady-state error, and
it realizes the monotonous synchronization.
By applying Theorem 4.4 to Hénon map and setting the simulation conditions, the
initial value is [0.1, 0.5]T , the step size of parameter is 0.05, and the iteration number
is 40,000.
1 1
(a) (b)
0.8 0.8
0.6 0.6
|e|
|e|
0.4 0.4
0.2 0.2
0 0
0 5 10 15 20 25 0 5 10 15 20 25
n /s n /s
Figure 4.10: Synchronization error curves with different feedback parameters: (a) k1 = 0, k2 = 0.2
and (b) k1 = k2 = 0.
82 4 Chaotic Synchronization Principle and Method
0.8 0.8
(a) (b)
0.7 0.6
CLE
CLE
0.6 0.4
0.5 0.2
0.4 0
0 0.5 1 1.5 2 0 0.5 1 1.5 2
k p
Figure 4.11: Maximum CLE curves with linear or nonlinear feedback: (a) p = 0 and (b) k = 0.
From drive system (4.34) and response system (4.35), the control law is chosen as
1. When p = 0, only the linear control method is employed. The maximum condi-
tional Lyapunov exponent varies with the linear feedback coefficient k as shown
in Figure 4.11(a). Obviously, regardless of the value of k, + is always greater than
zero, and the synchronization between the two discrete chaotic systems cannot
be realized.
2. When k = 0, only the nonlinear control method is employed. The maximum
conditional Lyapunov exponent varies with the nonlinear feedback coeffi-
cient p as shown in Figure 4.11(b). Regardless of the value of p, + cannot
meet the requirements of less than zero, so the two systems cannot achieve
synchronization.
3. When p ≠ 0 and k ≠ 0, that both the linear feedback and nonlinear feedback
strategies are used at the same time. The conditional Lyapunov exponent + is
greater than zero by rational selection of control parameters. The system can real-
ize synchronization. According to Theorem 4.4, when p = 1, the maximum CLE
varies with the linear feedback coefficient k as shown in Figure 4.12(a). It can be
seen that when 0 < k < 2, then + < 0.
4. When k = dA, p = dB, according to Theorem 4.4, if we want + < 0, then 1 –
′ ′
e–+ < d < 1 + e–+ should be satisfied. As the maximum Lyapunov exponent
of Hénon system is +′ = 0.7258, we have 0.52 < d < 1.48. The maximum CLE of
the response system varies with the feedback control parameters as shown in
Figure 4.12(b).
5. The synchronization performance of the system is related to the control
parameters. Experimental results show that the more negative the maximum
CLE is, the faster the synchronization error converges, and the shorter the
4.3 Principle and Performance of Feedback Control Synchronization 83
synchronization setup time is. When d = 1, then the CLE is the smallest (in-
finitesimal). At this time, only one iteration step is needed to realize the
chaos synchronization, as shown in Figure 4.13. It is equivalent to the D-B
synchronization.
Both the stability criterion of discrete system and the Pecora–Carroll asymptotic syn-
chronization theorem can synchronize two discrete chaotic systems, but they are dif-
ferent. The selection of the control parameters obtained by the stability criterion of the
discrete system is a necessary and sufficient condition for the synchronization of the
systems. While the selection of the control parameters according to the Pecora–Carroll
chaos synchronization theorem is a sufficient condition for the synchronization of the
systems. That is, it is possible to choose the control parameters to synchronize the
drive system and the response system, but the maximum CLE is not negative. For ex-
ample, for Hénon map, when K = diag[k, k] and P = B, the maximum CLE is greater
0 1
0
–1
CLE
CLE
–1
–2
–2
(a) (b)
–3 –3
0 0.5 1 1.5 2 0 0.5 1 1.5 2
k d
Figure 4.12: Maximum CLE curves with linear or nonlinear feedback: (a) p = 1, k ≠ 0 and
(b) k = dA, p = dB.
0.8
0.6
|e|
0.4
0.2
0
0 5 10
n/s
1.5
λ 1
0.5
0
0 1 2 3 4
k
than zero as shown in Figure 4.14. But according to Theorem 4.2, when |k| < 0.4522,
the response system and drive system can be synchronized.
where the state variable x ∈ Rn , the system parameter ! ∈ Rm , and nonlinear function
f : Rn×m → Rn .
The given system that generates the desired orbit is
where y ∈ Rn , ! ∈ Rm . The variable y starts from the initial and evolves with the
known parameter !∗ , and one obit O(y) is obtained, which is called as a desired or-
bit or reference orbit. System (4.42) that produces the orbit is called a target system
or a reference system. The adaptive control synchronization method is to introduce a
control mechanism for the parameter ! in system (4.41), so that the orbit O(x) of system
(4.41) from any initial value follows the orbit O(y) of the target system. System (4.41) is
called a controlled system or response system. If lim y – x = 0, then the controlled
system and the target system are synchronized.
4.4 Parameter Adaptive Synchronization Based on Pecora–Carroll Synchronization Criterion 85
dfi
!˙ j = –% h (xi – yi ), sgn – $g(!j – !∗j ), (4.43)
d!j
If all the CLEs are less than zero, the synchronization between the two autonomous
chaotic systems is realized.
Formula (4.43) only gives a general parameter control law, and it does not make a
specific description for the choice of h and g. On the other hand, that all the Lyapunov
exponents of the combined system are less than zero is only the sufficient conditions
for the synchronization of chaotic systems. Therefore, it is necessary to make a further
discussion about the control law and control parameter for the chaos synchronization.
In the following simulation, the control law is chosen as
dfi dfi
h (xi – yi ), sgn = (xi – yi )sgn , (4.45)
d!i d!j
g(!j – !∗j ) = (!j – !∗j ). (4.46)
So the change of controlled parameters depends on two factors. One is the dif-
ference (xi –yi ) between the state variable x in eq. (4.41) and the corresponding
variable y of the desired orbit. The second is the difference (!j – !∗j ) between the
values of the controlled parameters and the corresponding parameter values of the
desired orbit.
Here, we take the unified chaotic system (3.35) as an example to illustrate the syn-
chronization principle. To realize the synchronization control of two unified chaotic
86 4 Chaotic Synchronization Principle and Method
Y − + X
Target system ∑
Controlled system
e α
Combined system
systems, the adaptive control law for parameter ! is given according to eqs (4.45) and
(4.46), that is,
According to the analysis above, once adaptive control law (4.48) of the parameter
is determined, the size of % and $ becomes the key to achieve synchronization.
The ranges can be determined by two methods, such as numerical calculation and
theoretical analysis.
The numerical calculation method is used mainly to determine the range of % and
$ by calculating the Lyapunov exponent of the composite system which is composed
of the unified chaotic system and formula (4.48). The boundary of the constants % and
$ is determined by the fact that the maximum CLE of the composite system is equal to
zero.
The theoretical analysis method is described as follows. Assuming the reference
system is at equilibrium, set y = y∗ as the equilibrium point of the reference system.
!∗ is the parameter corresponding to y∗ . So !∗ and y∗ satisfy f (y∗ , !∗ ). Obviously, the
most basic requirement for the synchronization control is that the composite system is
stable in the neighborhood of y∗ . That is, all the eigenvalues of the Jacobian matrix of
the composite system have negative real part, or the characteristic polynomial of Jac-
obian matrix is Hurwitz polynomial. So we can obtain the range of control constant %
and $. Here the Jacobian matrix of the composite system is
4.4 Parameter Adaptive Synchronization Based on Pecora–Carroll Synchronization Criterion 87
⎡ ⎤
–a a 0 b
⎢ 28 – 35! – x c ⎥
⎢ 3 29! – 1 –x1 ⎥
J=⎢ ⎥, (4.49)
⎣ x2 x1 d e ⎦
–% sgn(b) –% sgn(c) –% sgn(e) –$
where a = 25! + 10, b = 25(x2 – x1 ), c = –35x1 + 29x2 , d = –(8 + !)/3, and e = –x3 /3. Obvi-
ously, the Jacobian matrix contains not only variables but also the symbol function, so
the characteristic polynomial is very complex, and it is difficult to determine the range
of % and $. So here the numerical calculation method of the maximum CLE presented
in the second chapter is used to determine the range of % and $.
When ! ∈ [0, 1], the reference system is chaotic. The initial values of the controlled
system (response system) are (10, 10, 10) and !(0) = 0.5. The initial values of the refer-
ence system (drive system) are (–5, –5, –5) and !∗ = 0.3. Let |e| = [(x1 – y1 )2 + (x2 – y2 )2 +
(x3 – y3 )2 ]1/2 , and we have the following conclusions.
1. Average evolution time 4̄ from initial deviation to synchronization is related with
the constant %, $ and the expected parameters !∗ , that is, 4̄ = 4̄(%, $, !∗ ).
2. When % is determined, there is a range for constant $ < $min or $ > $max , and
synchronization control of two chaotic systems is not achieved. When $ is determ-
ined, there is a range for constant % < %min or % > %max , and synchronization control
of two chaotic systems is not achieved either, which as shown in Table 4.2.
3. When % is determined, the larger $ is, the better the synchronization performance
is, as shown in Figure 4.16.
4. When % increases, $min and $max become larger, and the range of $ increases.
Similarly, when $ increases, %min and %max become larger, and the range of %
also increases, but the increased magnitude is small as shown in Table 4.3. It
shows that the control effect of the control constant % is better than that of control
constant $.
5. When $ is determined, the larger % is, the better the synchronization performance
is, as shown in Figure 4.17.
Table 4.2: Values of % and $ with different desired parameters for synchronization.
!∗ % $ Maximum CLE
50 161–297 –1.7894
0
39–95 230 –1.5513
50 145–328 –2.0530
0.3
35–126 230 –4.3644
50 170–267 –4.1972
0.6
14–49 230 –2.2715
25 195–340 –1.3862
0.9
18–33 230 –1.5510
88 4 Chaotic Synchronization Principle and Method
30 30
(a) (b)
20 20
|e|
|e|
10 10
0 0
0 1 2 3 4 0 1 2 3 4
t/s t/s
Figure 4.16: Error curves with % = 40 and varying $: (a) $ = 140 and (b) $ = 200.
% $ △$ B % △%
30 30
(a) (b)
20 20
|e|
|e|
10 10
0 0
0 1 2 3 4 0 1 2 3 4
t/s t/s
Figure 4.17: Error curves with $ = 220 and varying %: (a) % = 35 and (b) % = 50.
To study synchronization between two unified chaotic systems with different ini-
tial values and different certain parameters, the parameters of the drive system
4.5 Adaptive Synchronization Control Based on Lyapunov Stable Theory 89
and response system are set to be !1 and !2 , respectively, and the drive system
equation is
⎧
⎪
⎨ẋ1 = (25!1 + 10)(y1 – x1 )
⎪
ẏ1 = (28 – 35!1 )x1 – x1 z1 + (29!1 – 1)y1 . (4.50)
⎪
⎪
⎩ż = x y – (8 + ! )z /3
1 1 1 1 1
To realize the synchronization, the control functions u1 (t), u2 (t), and u3 (t) are added
to the right-hand side of each equation, and the response system becomes
⎧
⎪
⎨ẋ2 = (25!2 + 10)(y2 – x2 ) + u1 (t)
⎪
ẏ2 = (28 – 35!2 )x2 – x2 z2 + (29!2 – 1)y2 + u2 (t) . (4.52)
⎪
⎪
⎩ż = x y – (8 + ! )z /3 + u (t)
2 2 2 2 2 3
The error system is obtained by subtracting eq. (4.52) from eq. (4.50)
⎧
⎪
⎪ė1 = 25!1 (e2 – e1 ) + 25(!2 – !1 )(y2 – x2 ) + 10(e2 – e1 ) + u1 (t)
⎪
⎪
⎪
⎨ė = (28 – 35! )e + 29y + (29! – 1)e – 35(! – ! )x
2 1 1 2 1 2 2 1 2
, (4.53)
⎪
⎪ –x2 z2 + x1 z1 + u2 (t)
⎪
⎪
⎪
⎩ė = x y – x y – (8 + ! )e /3 – (! – ! )z /3 + u (t)
3 2 2 1 1 1 3 2 1 2 3
Theorem 4.6: For drive system (4.50) and response system (4.51), if we choose the
control function
⎧
⎪ ˆ 2 – e1 ) – 10e2 – 25(!2 – !1 )(y2 – x2 )
⎪u1 (t) = –25!(e
⎪
⎪
⎪
⎨u (t) = (35!ˆ – 28)e + x z – x z + 35(! – ! )x
2 1 2 2 1 1 2 1 2
, (4.54)
⎪
⎪ ˆ 2
–29(!2 – !1 )y2 – 29!e
⎪
⎪
⎪
⎩u (t) = –x y + x y + (!ˆ + 5)e /3 + (! – ! )z /3
3 2 2 1 1 3 2 1 2
90 4 Chaotic Synchronization Principle and Method
where the parameter !ˆ is an estimate of the parameter !1 , and the adaptive law of the
estimate parameter is !˙ˆ = –10e1 e2 –25e21 +29e22 –e23 /3++(!1 – !).
ˆ If the control parameter
satisfy + ≥ 0, then the equilibrium point e = 0 and !1 = !ˆ exist in the error system,
and the asymptotic synchronization is realized between the response system and drive
system. That is, lim e(t) = 0 for any initial values.
t→∞
Proof. Substitute control function (4.54) into error system (4.53), then we have
⎧
⎪ ˆ 2 – e1 ) – 10e1
⎨ė1 = 25(!1 – !)(e
⎪
ˆ 1 + 29(!1 – !)e
ė2 = –35(!1 – !)e ˆ 2 – e2 . (4.55)
⎪
⎪
⎩ė = –(! – !)e
ˆ 3 /3 – e3
3 1
So error dynamics system (4.55) has no relationship with the response system para-
meter !2 . As long as the error system is stable, it can realize the synchronization of two
chaotic systems with different parameters. According to the Lyapunov stable theory,
the Lyapunov function is constructed as
1 1
˜ = eT e + !˜ 2 ,
E(e, !) (4.56)
2 2
where e = [e1 , e2 , e3 ]T , !˜ = !1 – !.
ˆ If the adaptive law of the estimate parameter is
Substituting eq. (4.55) and eq. (4.57) into eq. (4.58), we have
ˆ 2 ].
Ė = –[10e21 + e22 + e23 + +(!1 – !) (4.59)
30 30
(a) (b)
20 20
|e|
|e|
10 10
0 0
0 5 10 0 5 10
t /s t /s
30 30
(c) (d)
20 20
|e|
|e|
10 10
0 0
0 5 10 0 5 10
t /s t /s
Figure 4.18: Synchronization error curve with different control parameters: (a) + = –0.1;
(b) + = 1; (c) + = 2; and (d) + = 5.
Taking the unified chaotic system as an example, the synchronization of two chaotic
systems with unknown parameters is discussed.
When the two system parameters are unknown, the drive and response systems
based on unified chaotic system are
92 4 Chaotic Synchronization Principle and Method
⎧
⎪
⎨ẋ1 = (25! + 10)(y1 – x1 )
⎪
ẏ1 = (28 – 35!)x1 – x1 z1 + (29! – 1)y1 , (4.60)
⎪
⎪
⎩ż = x y – (8 + !)z /3
1 1 1 1
⎧
⎪
⎨ẋ2 = (25! + 10)(y2 – x2 ) + v1 (t)
⎪
ẏ2 = (28 – 35!)x2 – x2 z2 + (29! – 1)y2 + v2 (t) , (4.61)
⎪
⎪
⎩ż = x y – (8 + !)z /3 + v (t)
2 2 2 2 3
where v = [v1 , v2 , v3 ]T is the control vector and ! is the unknown parameter. Set the
error variables as e1 = x2 –x1 , e2 = y2 –y1 , and e3 = z2 –z1 , then the error system of
systems (4.60) and (4.61) is
⎧
⎪
⎨ė1 = (25! + 10)(e2 – e1 ) + v1 (t)
⎪
ė2 = (28 – 35!)e1 + x1 z1 – x2 z2 + (29! – 1)e2 + v2 (t) . (4.62)
⎪
⎪
⎩ė = x y – x y – (8 + !)e /3 + v (t)
3 2 2 1 1 3 3
To make the error system stable and realize the synchronization between the two sys-
tems, the following theorem is proposed for the control function and the estimated
parameters.
Theorem 4.7: For drive system (4.60) and response system (4.61), if the control func-
tion is defined as
⎧
⎪
⎨v1 (t) = –(38 – 10!)e2
⎪
ˆ 2 + e1 z2 + e3 x1 ,
v2 (t) = –29!e (4.63)
⎪
⎪
⎩v (t) = e y + e x
3 1 2 2 1
the parameter !ˆ is the estimate of the parameter !. If the adaptive law of the estimate
parameter is !˙ˆ = 29e22 , then there exist the equilibrium points e = 0 and ! = !ˆ in the
error system, and the asymptotic synchronization is realized between the response
system and drive system. That is, lim e(t) = 0 for any initial values.
t→∞
Proof. Substituting control function (4.63) into error system (4.62), we have
⎧
⎪
⎪ė1 = (35! – 28)e2 – (25! + 10)e1
⎨
ˆ 2 .
ė2 = (28 – 35!)e1 + (29! – 1)e2 – 29!e (4.64)
⎪
⎪
⎩ė = –(! – !)eˆ 3 /3
3 1
As long as the error system is stable, the synchronization of two chaotic systems
with uncertain parameters is realized. According to the Lyapunov stable theory, the
Lyapunov function V is constructed as
4.5 Adaptive Synchronization Control Based on Lyapunov Stable Theory 93
1 1
˜ = eT e + !˜ 2 ,
V(e, !) (4.65)
2 2
where !˜ = ! – !,
ˆ and !ˆ is the estimate of uncertain !. If we choose the adaptive law of
the estimate parameter !˙ˆ = 29e22 , then the derivative of eq. (4.65) is
We use Matlab/Simulink for numerical simulation. When ! ∈ [0, 1], both drive sys-
tem (4.60) and response system (4.61) are chaotic. Let the initial values x1 (0) = 10,
ˆ
y1 (0) = 10, z1 (0) = 10, x2 (0) = –5, y2 (0) = –5, z2 (0) = –5, and ! ∈ [0, 1], !(0) = 0.5.
The synchronization error curve of two chaotic systems with unknown parameters
is shown in Figure 4.19. The phase diagram of variables x1 and x2 is displayed in
Figure 4.20.
The following conclusions are obtained by theoretical analysis and simulations.
(1) The performance of the synchronization is stable as shown in Figure 4.19. When
steady-state error is B> = 10–4 , the setup time of synchronization system is short (t <
2 s), and the monotonous synchronization of two systems is achieved. (2) The selection
of the initial value of the adaptive parameters has no effect on the results. For example,
the synchronization error curve with !(0) ˆ ˆ
= 2 is the same with that with !(0) = 0.5.
(3) By the Lyapunov stability theory, the synchronization condition is only a sufficient
condition.
30
20
|e|
10
0
0 1 2 3 4
t /s
30
20
10
x2
0
Start point
–10
–20
–20 –10 0 10 20 30
x1
Correspondingly, when ! = 0.8, systems (4.68) and (4.69) are Lü system and deform-
ation Lü system, respectively. The phase portraits with the initial value [–1, 1, 0] are
shown in Figure 4.21. Obviously, the phase track curves of Lü system and deformation
Lü system are similar, but the evolution of the deformation system in the phase space
is more divergent and the system is more complex.
4.6 Intermittent Feedback Synchronization Control 95
(a) (b)
80 80
60 60
40 40
x3
y3
20 20
0 0
20 20
0 20 0 20
0 0
x2 –20 –20 x1 y2 –20 –20 y1
Figure 4.21: Strange attractors with ! = 0.8: (a) Lü system and (b) deformation Lü system.
To realize the synchronization between chaotic system (4.68) and deformation sys-
tem (4.69), the synchronization control signal ui (t) is added to eq. (4.69), and then eq.
(4.69) becomes
⎧
⎪
⎨ẏ1 = (25! + 10)(y2 – y1 ) + u1 (t)
⎪
ẏ2 = (28 – 35!)y1 – y1 y3 + (29! – 1)y2 + u2 (t) . (4.70)
⎪
⎪
⎩ẏ = y2 – (8 + !)y /3 + u (t)
3 1 3 3
where p(t) is a pulse signal with period T and the ratio D of pulse length and pulse
period, and it is defined by
1 iT ≤ t ≤ iT + TD
p(t) = . (4.73)
0 iT + TD < t < (i + 1)T
It can be seen that eq. (4.72) is a composite controller composed of nonlinear continu-
ous feedback and linear intermittent feedback. So, eq. (4.71) becomes
96 4 Chaotic Synchronization Principle and Method
⎧
⎪
⎨ė1 = (25! + 10)(e2 – e1 )
⎪
ė2 = (28 – 35! – x3 + x3 p(t))e1 + (29! – 1 – kp(t))e2 – y1 (1 – p(t))e3 . (4.74)
⎪
⎪
⎩ė = 2x e (1 – p(t)) – e2 – (8 + !)e /3 – ke p(t)
3 1 1 1 3 3
Theorem 4.8: For systems (4.68) and (4.69), if it is controlled by eq. (4.72), and the
feedback parameter satisfies k > 27–6!, and D ≥ 0.4, then the asymptotically stable
synchronization will be realized between systems (4.70) and (4.68).
Proof. Decompose the error system eq. (4.74), and when iT < t < iT + TD, we have
⎡ ⎤ ⎡ ⎤ ⎡ ⎤
ė1 e1 0
⎢ ⎥ ⎢ ⎥ ⎢ ⎥
⎣ ė2 ⎦ = A1 ⎣ e2 ⎦ + ⎣ 0 ⎦, (4.75)
ė3 e3 –e12
where A1 is the Jacobian matrix of the error system when the system has a control
pulse
⎡ ⎤
–25! – 10 25! + 10 0
⎢ ⎥
A1 = ⎣ 28 – 35! 29! – 1 – k 0 ⎦. (4.76)
0 0 –(8 + !)/3 – k
where A2 is the Jacobian matrix of the error system when the system has no control
pulse
⎡ ⎤
–25! – 10 25! + 10 0
⎢ ⎥
A2 = ⎣ 28 – 35! – x3 29! – 1 –y1 ⎦ (4.78)
2x1 0 (8 + !)/3
and –e2 is the nonlinear term of the error system. For all t, when e → 0,
2 1
–e / e → 0, so the evolution of errors depends on A1 and A2 . During iT < t <
1
iT + TD, the error is controlled by A1 . For ! ∈ [0, 1], according to the stability criterion
of continuous system, if k satisfies k > 27–6!, then the eigenvalues of the matrix A1
have negative real part. The zero point of the error system is asymptotically stable at
4.6 Intermittent Feedback Synchronization Control 97
this time. During iT + TD < t < (i + 1)T, the controlled systems lose some additional
feedback, and the error is controlled by A2 . Because A2 does not satisfy the stability
condition, the trajectory of the two systems will diverge, and the synchronization of
the two systems will be lost. As long as the error is still small enough, and the ex-
ert control pulse is applied again, it can ensure that the error will not deviate too far,
so that the synchronization of the two systems will be achieved gradually. After the
continuous system is discretized, the error equation is written as
⎡ ⎤ ⎡ ⎤
e1 (i) e1 (i – 1)
⎢ ⎥ m m ⎢ ⎥
⎣ e2 (i) ⎦ = (A1 ) 1 (A2 ) 2 ⎣ e2 (i – 1) ⎦ , (4.79)
e3 (i) e3 (i – 1)
where e(i) is the error vector of the ith pulse period. DT = m1 h, (1 – D)T = m2 h, where
h is the integral step size, and m1 , m2 are the integral iteration numbers for a pulse
and no pulse, respectively. Obviously, in the process of synchronization, the system
will generate oscillation due to (A2 )m2 , and the stable synchronization process will
depend on |(A1 )m1 (A2 )m2 |. If |(A1 )m1 (A2 )m2 | = |J| < 1, then the system will become stable
[101]. The exact range of D can be obtained by numerical experiments. Simulations
show that when D ≥ 0.4, the exact synchronization can be achieved within 10 s. ∎
The synchronization control and performance improvement for the unified chaotic
system and its deformation system are studied based on Matlab simulation. Here, we
observe the changes of the time performance of the synchronization from the aspects
of the initial value, the feedback coefficient k, the proportion factor D, the step size h,
and the system parameter !.
120
100
80 (1)
(2)
|e|
60
40 (3)
20
0
0 1 2 3
t/s
15
10 k3
|e|
k2
5
k1
0
0 0.5 1 1.5
t/s
4
tb/s
0
0 0.5 1
α
ż = Fz + Gu + Hy
, (4.81)
x̂ = z – Jy
then the error system becomes ė = Fe. Obviously, if all eigenvalues of the matrix F are
less than zero, then x̂ converges to x exponentially.
Substitute M = In + JCT into the third term of HCT – MA + FM = 0, then we have
F = MA – (H + FJ)CT . (4.84)
Let
N = H + FJ (4.85)
So, the design problem of the state observer with random disturbance is turned into
the problem of how to find the appropriate J, which satisfies (In + JCT )E = 0, and how
to choose the appropriate N, which satisfies the eigenvalues of F are less than zero.
As F = MA–NCT , the condition that the eigenvalues of F are less than zero must be
satisfied by choosing appropriate N. That is to say, in this case, we can always find a
suitable N, so that when t → ∞, x̂ converges to x exponentially.
From eq. (4.83), we obtain JCT E = –E, and according to matrix knowledge, we have
where (CT E)+ is the generalized inverse matrix of (CT E). V is the matrix with appropri-
ate dimensions. For the convenience of application, we often let V = 0. Then we have
J = –E(CT E)+ . At the same time, we can obtain M = Ip + JCT .
By applying the state observer method to the unified chaotic system, the sender matrix
is described as
⎡ ⎤ ⎡ ⎤ ⎡ ⎤ ⎡ ⎤
–25! – 10 25! + 10 0 1 0 0 0 0
⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥
A = ⎣ 28 – 35! 29! – 1 0 ⎦ , B = ⎣ 0 –1 0 ⎦ , u = x x
⎣ 1 3⎦ , E = ⎣ 1 ⎦,
0 0 –(8 + !)/3 0 0 1 x1 x2 0
C = [0 1 0]T .
where
⎡ ⎤
–25! – 10 25! + 10 – n1 0
⎢ ⎥
F=⎣ 0 –n2 0 ⎦. (4.90)
0 –n3 –(8 + !)/3
Here, n1 , n2 , and n3 are the three values of the one-dimensional vector N, which can
ensure that the eigenvalues of matrix F are less than zero, and these lead the syn-
chronization error for ė = Fe to zero finally. For simple calculation, we set n1 = 25!+10,
n2 > 0, n3 = 0. When t → ∞, x̂ converges to x exponentially.
Based on Matlab simulation platform, the synchronization of the unified chaotic sys-
tem is investigated in this section. We set the initial values x1 (0) = 15, x2 (0) = 15,
x3 (0) = 15, x̂1 (0) = 10–10 , x̂2 (0) = –10, x̂3 (0) = 10–10 ; n1 = 25! + 10, n3 = 0, and let the
synchronization error
102 4 Chaotic Synchronization Principle and Method
3 21
2
|e| = (x̂i – xi ) . (4.91)
i=1
25
20
15
|e|
10
0
0 1 2 3
t/s
25
20
15
|e|
10
0
0 1 2 3
t/s
80
60 (3)
40 (1)
|e|
(2)
20
0
0 1 2 3
t/s
From Figure 4.27, the setup time for the system synchronization is the longest for (2),
and the setup time for the system synchronization is the shortest for (3). Because the
synchronization error signal e(t) decays exponentially, the time required to determine
the exact synchronization is related to the initial conditions of the transmission end
and the receiving end. It is obvious that the difference of the two initial values for (2)
between the sender and the receiver is the biggest, so it is the longest time to achieve
the exact synchronization.
25
20
n2 = 50
15 n2 = 5
|e|
10 n2 = 1
0
0 2 4 6
t/s
where x ∈ Rn , F: Rn → Rn ; s is the scalar output of the system. Set k(x) is a scalar dif-
ferentiable function, and V(x) is vector field, where V: Rn → Rn . Lee derivative of the
vector field V(x) along the scalar differentiable function k(x) is defined as Lv k, then
Lv k = <V(x) ● grad k(x)>, where < ● > is the Euclidean inner product. The ith Lee deriv-
ative of the vector field V(x) along the scalar differentiable function k(x) is defined as
Liv k = <V(x) ● grad Li–1
v k(x)>.
state variables of system (4.92) are observable by using scalar output s and it is the ith
(i ≤ n – 1) Lee derivative, and x = 6–1 [s(t), s(1) (t), . . . , s(n–1) (t)]T .
If a state variable xi is selected as the output of system (4.92), then the remaining state
variables of system (4.92) can be expressed as xj = gi (xi , ẋi , . . . , xi(n–1) ), where j ≠ i. So
system (4.92) is written as
where A is a constant matrix, and g(xi , ẋi , . . . , xi(n–1) ) is a matrix with n× 1 order, which
includes all the nonlinear terms of system (4.92).
4.8 Chaos Synchronization Based on Chaos Observer 105
s(x) = g(xi , ẋi , . . . , xi(n–1) ) + B × [g1 (xi , ẋi , . . . , xi(n–1) ), . . . , xi , . . . , gn (xi , ẋi , . . . , xi(n–1) )]T ,
(4.94)
where B = diag[b1 , b2 , . . . , bn ]. If we select an appropriate diagonal matrix B so
that the eigenvalues of the matrix A–B have a negative real part, then system
ẏ = F(y) + s(x) – s(y) is the chaos observer of chaotic system (4.92), where s(y) =
g(yi , ẏi , . . . , yi(n–1) ) + B × [g1 (yi , ẏi , . . . , yi(n–1) ), . . . , yi , . . . , gn (yi , ẏi , . . . , yi(n–1) )]T .
The state observer synchronization scheme is applied to the unified chaotic system,
and we have
⎡ ⎤
–25! – 10 25! + 10 0
⎢ ⎥
A = ⎣ 28 – 35! 29! – 1 0 ⎦,
0 0 –(8 + !)/3
⎧
⎪
⎪ x1 = g1 (x1 , ẋ1 , ẍ1 ) = x1
⎪
⎨ ẋ1
x2 = g2 (x1 , ẋ1 , ẍ1 ) = 25!+10 + x1 .
⎪
⎪
⎪
⎩x = g (x , ẋ , ẍ ) = –ẍ1 + 4!–11 ẋ + (27 – 6!)x
3 3 1 1 1 25!+10 25!+10 1 1 x1
s(x) = g(x1 , ẋ1 , ẍ1 ) + B × [x1 , g2 (x1 , ẋ1 , ẍ), g3 (x1 , ẋ1 , ẍ)]
⎡ ⎤ ⎡ ⎤
0 x1
⎢ ⎥ ⎢ ⎥
⎢ –ẍ1 + 4!–11 ẋ + (27 – 6!)x ⎥ ⎢ xẋ1 ⎥
=⎢ 25!+10 + x1
1 1⎥+B×⎢ ⎥,
⎢ 25!+10 25!+10 ⎥ ⎢ ⎥
⎣ x1 ẋ1 ⎦ ⎣ –ẍ ⎦
25!+10 + x1
2 1 4!–11
25!+10 + 25!+10 ẋ1 +(27–6!)x1
x1
where
⎡ ⎤
b11 b12 b13
⎢ ⎥
B = ⎣ b21 b22 b23 ⎦ .
b31 b32 b33
where f (y) = Ay + g(y1 , ẏ1 , ÿ1 , . . . , y1(n–1) ). s(y) is similar with s(x).
106 4 Chaotic Synchronization Principle and Method
By eq. (4.95), when the appropriate B is taken, the characteristic value of the A–B
is negative, and then the accurate synchronization between the chaotic system in the
sender and the state observer in the receiver can be achieved.
The synchronization simulation of the unified chaotic system is carried out on Matlab,
and we set the system’s initial conditions x1 (0) = 1, x2 (0) = 1, x3 (0) = 1, x̂1 (0) = 15,
x̂2 (0) = 15, x̂3 (0) = 15,
⎡ ⎤
0 25! + 10 0
⎢ ⎥
B = ⎣ 28 – 35! b22 0⎦,
0 0 0
From Figure 4.30, when the initial values between the unified chaotic system and
the state observer are further away from each other, the oscillation is more obvi-
ous, and the time required for synchronization is longer, which is consistent with
4.8 Chaos Synchronization Based on Chaos Observer 107
20 20
(a) (b)
10
10
0
–10
e2
e2
0
–20
–10
–30
–20 –40
0 2 4 6 8 10 0 2 4 6 8 10
t/s t/s
20
(c)
10
–10
e2
–20
–30
–40
0 2 4 6 8 10
t/s
Figure 4.29: Synchronization error curves for different !: (a) ! = 0.5; (b) ! = 0.8; and (c) ! = 0.9.
the conclusion obtained by the previous state observer method. However, even if the
initial value of the two is far, the system can still achieve accurate synchronization.
30
(a) (b)
60
20
40
10
e2
e2
20
0
0
–10
0 2 4 6 8 10 0 2 4 6 8 10
t/s t/s
(c)
10
0
e2
–5
–10
0 2 4 6 8 10
t/s
Figure 4.30: Synchronization error curves for different initial conditions: (a) initial value (1);
(b) initial value (2); and (c) initial value (3).
As far as the synchronization performance, the proposed scheme has the character-
istics of short synchronization time and good synchronization performance. However,
the synchronous curve is not monotonous, and the oscillation is obvious; so, in prac-
tical application, to make the system synchronization performance optimization, the
selection of the system parameters is the key.
10 10
(a) (b)
0
0
–10
–20 –10
e2
e2
–30
–20
–40
–50 –30
0 2 4 6 8 10 0 2 4 6 8 10
t/s t/s
10
(c)
5
0
e2
–5
–10
–15
0 2 4 6 8 10
t/s
Figure 4.31: Synchronization error curves for different b22 : (a) b22 = 24; (b) b22 = 30; and
(c) b22 = 50.
Ẋ = F(X), (4.96)
where the state variable X = (x1 , x2 , . . . , xn )T ∈ Rn , and the continuous vector function
F: Rn → Rn . The function F(X) is decomposed into
110 4 Chaotic Synchronization Principle and Method
where ÃX is the linear part of F(X), and H̃(X) is the nonlinear part of F(X). Then, ÃX is
decomposed into
where A is a full rank constant matrix, and the real part of the eigenvalue is
negative. Let
Ẋ = AX + H(X). (4.100)
Now, we take system (4.100) as the drive system and employ the projective synchron-
ization control method. Then the response system is
Ẏ = AY + H(X)/!, (4.101)
where Y ∈ Rn is the n-dimensional state vector of the response system, and ! is the
proportional coefficient. If the synchronization error between drive system (4.100) and
response system (4.101) is E = X – !Y, then the synchronous error equation is
The real part of all eigenvalues of matrix A is negative, so synchronous error system
(4.102) is asymptotically stable at the origin according to the stability criterion of linear
system. That is, lim |E(t)| = 0. So the synchronization is achieved between response
t→∞
system (4.101) and drive system (4.100).
Applying the projective synchronization method to the simplified Lorenz chaotic
system, the drive system becomes
⎧
⎪
⎨ẋ1 = 10(x2 – x1 )
⎪
ẋ2 = (24 – 4c)x1 + cx2 – x1 x3 , (4.103)
⎪
⎪
⎩ẋ = x x – 8x /3
3 1 2 3
Theorem 4.9: For the projection synchronization system composed by drive system
(4.103) and response system (4.104), if the synchronization control parameter b <
min[10, 4c–24], then the synchronization error system is asymptotically stable at the
origin point. That is, response system (4.104) will be synchronized with drive system
(4.103) according to the proportional !.
Proof. According to the principle of projective synchronization, for the projection syn-
chronization system comprising drive system (4.103) and response system (4.104), the
full rank matrix A and H(X) are, respectively,
⎡ ⎤ ⎡ ⎤
–10 10 0 0
⎢ ⎥ ⎢ ⎥
A = ⎣ 24 – 4c b 0 ⎦ , H(X) = ⎣ (c – b)x2 – x1 x3 ⎦ .
0 0 –8/3 x1 x2
Obviously, one of the eigenvalues +1 = –8/3 and the other two characteristic roots
satisfy the equation
15 20 20
(a) (b) (c)
x3
x3
|E| 10 10 10
5 0 0
y3
y3
0 –10 –10
0 5 10 –10 0 10 0 10 20
t/s x1, y1 t/s
shows that the two chaotic systems with different initial values can achieve the
projective synchronization at about 7.0 s, and the dynamic characteristics of the syn-
chronization is good. Figure 4.32(b) shows that the attractor of the response system
and drive system is inverse, and the size ratio is 2:1. According to Figure 4.32(c), we
can see that the response system variable y3 is synchronized with the drive system
variable x3 according to the projection ratio.
Now, we analyze the effects of different b values on the synchronization perform-
ance of the synchronization system. Set c = 5, ! = –2, and the initial values are same
with that of Figure 4.32. Simulations are carried out for b = –5, b = –6, b = –15, re-
spectively. The synchronization error curves are plotted in Figure 4.33. When b < –4,
the smaller the b, the shorter the time required to achieve synchronization, but when
b exceeds a certain value, then b reduces further, and the time required for synchron-
ization cannot be significantly reduced. By formula (4.106), the b value is smaller, and
the real part of the characteristic value of the synchronization error system is more
negative. The pole is farther from the virtual axis; the faster the convergence of the
synchronization system, the shorter the synchronization setup time.
3
|E|
2
(a)
1 (b)
(c)
0
0 5 10
t/s
Figure 4.33: Synchronization error curves for different control parameter b: (a) b = –5; (b) b = –6;
and (c) b = –15.
4.9 Projective Synchronization 113
Ẋ = AX + F(X), (4.107)
where X = (x1 , x2 , . . . , xn )T ∈ Rn is the state variable. AX is the linear part, and F(X)
is the nonlinear part. Copy eq. (4.107), and add the controller U: R2n → Rn into the
system, then the response system is
where Y = (y1 , y2 , . . . , yn )T ∈ Rn is the state vector. Set as the function matrix, and the
error function of the synchronization system is E = X – I(t)Y. By designing the con-
troller U(X, Y), we can get lim ||E|| = lim ||X – I(t)Y|| = 0, and then the generalized
t→∞ t→∞
function projective synchronization is achieved between systems (4.107) and system
(4.108).
Applying the generalized function projective synchronization method to the
simplified Lorenz system, the drive system and response system are, respectively,
⎡ ⎤⎡ ⎤ ⎡ ⎤
–10 10 0 x1 0
⎢ ⎥⎢ ⎥ ⎢ ⎥
Ẋ = AX + F(X) = ⎣ 24 – 4c c 0 ⎦ ⎣ x2 ⎦ + ⎣ –x1 x3 ⎦ , (4.109)
0 0 –8/3 x3 x1 x2
⎡ ⎤⎡ ⎤ ⎡ ⎤
–10 10 0 y1 0
⎢ ⎥⎢ ⎥ ⎢ ⎥
Ẏ = BY + G(Y) + U(X, Y) = ⎣ 24 – 4c c 0 ⎦ ⎣ y2 ⎦ + ⎣ –y1 y3 ⎦ + U(X, Y),
0 0 –8/3 y3 y1 y2
(4.110)
Theorem 4.10: For systems (4.109) and (4.110), the control law is U(X, Y) =
I–1 (t)[–İ(t)Y + F(X) – I(t)G(Y) + (A – B)X + DE], where I(t) is the projective func-
tion, and D = diag[d1 , d2 , d3 ] is the control parameter matrix. When the controller
parameter satisfies d1 + d2 > c–10, d1 d2 –d1 c + 10d2 > 240–30c, and d3 > –8/3, sys-
tems (4.109) and (4.110) can realize the function projective synchronization, that is,
lim E = 0 for any initial value.
t→∞
114 4 Chaotic Synchronization Principle and Method
Proof. For the projection synchronization system comprising drive system (4.109) and
response system (4.110), the error function of the synchronization system is
E = X – I(t)Y, (4.111)
where I(t) is the diagonal function matrix. Then the error system equation is
Substituting eqs (4.109) and (4.110) into the above formula, then we have
If the controller is U(X, Y) = I–1 (t)[–İ(t)Y + F(X) – I(t)G(Y) + (A – B)X + DE], then we
obtain
Ė = (B – D)E. (4.114)
1
V = ET E. (4.115)
2
Then its differential is
V̇ = ET Ė. (4.116)
Set the control matrix D = diag[d1 , d2 , d3 ], when d1 +d2 > c–10, d1 d2 –d1 c+10d2 > 240–
30c, and d3 > –8/3, D–B is positive, and then V̇ ≤ 0 if and only if E = 0 for equality.
By the Lyapunov stability theorem, the error system of the drive–response system
is asymptotically stable at the origin. That is, lim ||E|| = 0. The function projection
t→∞
synchronization is implemented. ∎
1.5 20 20
(a) (b) (c)
x3
x3
1
|E|
0 0
0.5
y3
y3
0 –20 –20
0 5 10 –20 0 20 0 10 20
t/s x 1, y1 t/s
of the synchronization are good. Figure 4.34(b) shows that the attractor of the re-
sponse system and drive system is inverse, and the size ratio satisfies the projective
function. According to Figure 4.34(c), we can see that the response system variable y3
is synchronized with the drive system variable x3 according to the projection function.
Now, we analyze the effects of different control parameter d1 , d2 , d3 on the syn-
chronization performance of the synchronization system. Set the system parameter
c = 5, the projective function I(t) = –3 + 2 sin t, and the initial values x1 (0) = 4.4356,
x2 (0) = 6.1771, x3 (0) = 7.2330; y1 (0) = –1.8028, y2 (0) = –2.3247, y3 (0) = –2.2974.
1. When d2 = 20, d3 = –2, then d1 > –7.3 according to Theorem 4.10. Synchronization
simulations are carried out for d1 = –7, d1 = –6.7, d1 = –5, respectively. The syn-
chronization error curves are plotted in Figure 4.35(a). Obviously, when d1 > –7.3,
the bigger the d1 , the shorter the time required to achieve synchronization, but
when the d1 exceeds a certain value, and then continue to increase d1 , the time
required for synchronization cannot be significantly reduced.
2. When d1 = 40 and d3 = –2, then d2 > 5.8 according to Theorem 4.10. Synchroniz-
ation simulations are carried out for d2 = 6.15, d2 = 6.5, d2 = 7, respectively. The
synchronization error curves are plotted in Figure 4.35(b). Obviously, when d2 >
5.8, the bigger the d2 , the shorter the time required to achieve synchronization,
1.5 1
(a) (b) (c)
0.4
1
|E|
|E|
|E|
0.5
0.2
0.5 1 1
1
2 2
3 32 3
0 0 0
0 5 10 15 0 5 10 15 0 5 10 15
t/s t/s t/s
Figure 4.35: Synchronization error curves for different control parameter d. (a) Curve 1: d1 = –7;
curve 2: d1 = –6.7; curve 3: d1 = –5. (b) Curve 1: d2 = 6.15; curve 2: d2 = 6.5; curve 3: d2 = 7. (c) Curve
1: d3 = –2.3; curve 2: d3 = –2; curve 3: d3 = 0.
116 4 Chaotic Synchronization Principle and Method
but when the d2 exceeds a certain value, and continue to increase d2 , the time
required for synchronization cannot be significantly reduced.
3. When d1 = 40 and d2 = 20, then d3 > –8/3 according to Theorem 4.10. Synchron-
ization simulations are carried out for d3 = –2.3, d3 = –2, d3 = 0, respectively.
The synchronization error curves are plotted in Figure 4.35(c). Obviously, when
d3 > –8/3, the bigger the d3 , the shorter the time required to achieve synchroniz-
ation, but when the d2 exceeds a certain value, if we continue to increase d3 , the
time required for synchronization cannot be significantly reduced.
where ( and $ are unknown parameter vectors in the drive system and the response
system, respectively. f (X) and g(Y) are vector functions of state variables X and Y.
F(X) and G(Y) are function matrices. U(X, Y) is the control law.
Supposing the projective function is I(t), and the error function of the synchron-
ization system is E = X–I(t)Y, then the synchronization error system equation is
Theorem 4.11: For the chaotic synchronization system with unknown parameter,
which is composed of drive system (4.118) and response system (4.119), if the control
function of the system is U(X, Y) = I–1 (t)[M(X, Y) + F(X)(ˆ – İ(t)Y – I(t)G(Y)$̂ + DE],
where M(X, Y) = f(X) – I(t)g(Y) + (A – B)X, and D = diag[d1 , d2 , d3 ]. If the appropri-
ate control parameters and the adaptive law of the system parameters are selected as
˙ ˙
(ˆ = F T (X)E + B(, $̂ = –I(t)GT (Y)E + B$, where (¯ = ( – (,
ˆ $̄ = $ – $̂. The adaptive func-
tion projective synchronization is realized between systems (4.118) and (4.119), and
4.9 Projective Synchronization 117
the unknown parameters are identified correctly. That is, for any initial values, we
have lim E = 0, (ˆ = (, and $̂ = $.
t→∞
Proof. Choose U(X, Y) = I–1 (t)[M(X, Y) + F(X)(ˆ – İ(t)Y – I(t)G(Y)$̂ + DE] as the con-
troller, then the error system eq. (4.120) becomes
1 T 1 T 1 T
V= E E + (¯ (¯ + $̄ $̄, (4.123)
2 2 2
where (¯ = ( – (,
ˆ $̄ = $ – $̂, then its differential is
T˙ T˙
V̇ = ET Ė + (¯ (˙¯ + $̄ $̄˙ = ET Ė – (¯ (ˆ – $̄ $̂.
T T
(4.124)
˙ ˙
Set the adaptive law as (ˆ = F T (X)E + (¯ and $̂ = – I(t)GT (Y)E + $̄, and substitute eq.
(4.121) into eq. (4.124), then we have
T T
V̇ = – (D – B)ET E – (¯ (¯ – $̄ $̄. (4.125)
Remark 1: If A = B, f (⋅) = g(⋅), and F(⋅) = G(⋅), then the two chaotic systems are ho-
mogeneous systems, and vice versa they are heterogeneous systems. Therefore, the
adaptive function projective synchronization theorem can be applied to both homo-
geneous and heterogeneous systems with unknown parameters.
Remark 2: If the parameters of the drive system or response system are known, us-
ing the above control method, the parameter adaptation law is removed, and the
corresponding generalized function projective synchronization can be realized.
⎡ ⎤⎡ ⎤ ⎡ ⎤ ⎡ ⎤⎡ ⎤
–10 10 0 x1 0 0 0 0 (1
⎢ ⎥⎢ ⎥ ⎢ ⎥ ⎢ ⎥⎢ ⎥
Ẋ = AX + f (X) + F(X)( = ⎣ 0 0 0 ⎦ ⎣ x2 ⎦ + ⎣ –x1 x3 ⎦ + ⎣ x1 x2 0 ⎦ ⎣ (2 ⎦ ,
0 0 –8/3 x3 x1 x2 0 0 0 (3
(4.126)
⎡ ⎤⎡ ⎤ ⎡ ⎤
–10 10 0 y1 0
⎢ ⎥⎢ ⎥ ⎢ ⎥
Ẏ = BY + g(Y) + U(X, Y) = ⎣ 24 – 4c c 0 ⎦ ⎣ y2 ⎦ + ⎣ –y1 y3 ⎦ + U(X, Y),
0 0 –8/3 y3 y1 y2
(4.127)
where c is the system parameter. C = [(1 , (2 , (3 ]T is the unknown parameter of the drive
system. U = [u1 , u2 , u3 ]T is the nonlinear controller. If we set the projective function
as I(t) = –3 + 2 sin(t), according to Theorem 4.11, the control law and the para-
meter adaptive law of the synchronization system consisting of systems (4.126) and
(4.127) are
⎡ ⎤
–İ(t)y1 + d1 e1
1 ⎢ ˆ ⎥
U= ⎣ ((1 – 24 + 4c)x1 + ((ˆ 2 – c)x2 – İ(t)y2 – x1 x3 + I(t)y1 y3 + d2 e2 ⎦ , (4.128)
I(t)
–İ(t)y3 + x1 x2 – I(t)y1 y2 + d3 e3
⎡ ⎤
x1 e2 + (1 – (ˆ 1
˙ ⎢ ⎥
(ˆ = ⎣ x2 e2 + (2 – (ˆ 2 ⎦ . (4.129)
0
Inference 4.2 For the adaptive function projective synchronization system comprising
drive system (4.126) and response system (4.127), when the controller parameters sat-
isfy d1 + d2 > c–10, d1 d2 –d1 c + 10d2 > 240–30c, and d3 > –8/3, the adaptive function
projective synchronization is achieved between systems (4.126) and (4.127). That is,
lim E = 0 for any initial values. (Proof omitted.)
t→∞
8 20 8
(a) (b) (c)
6 6
x3
4
θ1, θ2
|E|
4 0
2
2
y3
0
0 ‒20 ‒2
0 5 10 ‒20 0 20 0 5
t/s x 1, y 1 t/s
the estimated parameters (ˆ 1 and (ˆ 2 converge to the target value and realize the
identification of unknown parameters.
Now, we analyze the effects of different control parameters d1 , d2 , and d3 on
the synchronization performance of the synchronization system. When d2 = 20 and
d3 = – 2, then d1 > –7.3 according to Inference 4.2. Synchronization simulations are
carried out for d1 = – 7, d1 = – 6.7, d1 = – 5, respectively. The synchronization error
curves are plotted in Figure 4.37. Obviously, when d1 > –7.3, the bigger the d1 , the
shorter the time required to achieve synchronization, but when the d1 exceeds a cer-
tain value and continue to increase d1 , the time required for synchronization cannot
be significantly reduced. Similarly, when d1 and d3 are fixed, d2 changes, or when d1
and d2 are fixed, d3 changes, and the law is the same.
1.5
1
|E|
0.5
1
2
3
0
0 5 10 15
t/s
⎡ ⎤⎡ ⎤ ⎡ ⎤ ⎡ ⎤⎡ ⎤
–10 10 0 x1 0 0 0 0 (1
⎢ ⎥⎢ ⎥ ⎢ ⎥ ⎢ ⎥⎢ ⎥
Ẋ = AX + f (X) + F(X)( = ⎣ 0 0 0 ⎦ ⎣ x2 ⎦ + ⎣ –x1 x3 ⎦ + ⎣ x1 x2 0 ⎦ ⎣ (2 ⎦ ,
0 0 –8/3 x3 x1 x2 0 0 0 (3
(4.130)
⎡ ⎤⎡ ⎤ ⎡ ⎤
–10 10 0 y1 0
⎢ ⎥⎢ ⎥ ⎢ ⎥
Ẏ = BY + g(Y) + G(Y)$ + U(X, Y) = ⎣ 0 0 0 ⎦ ⎣ y2 ⎦ + ⎣ –y1 y3 ⎦
0 0 –8/3 y3 y1 y2
⎡ ⎤⎡ ⎤
0 0 0 $1
⎢ ⎥⎢ ⎥
+ ⎣ y1 y2 0 ⎦ ⎣ $2 ⎦ + U(X, Y), (4.131)
0 0 0 $3
where ( = [(1 , (2 , (3 ]T and $ = [$1 , $2 , $3 ]T are unknown parameters of the chaotic sys-
tems. U = [u1 , u2 , u3 ]T is the nonlinear controller. If the projective function is I(t) =
–3 + 2 sin(t), then according to Theorem 4.11, the control law and parameter adaptive
law of the synchronization are, respectively,
⎡ ⎤
–İ(t)y1 + d1 e1
1 ⎢ ⎥
U= ⎣ –x1 x3 + I(t)y1 y3 + x1 (ˆ 1 + x2 (ˆ 2 – İ(t)y2 – I(t)(y1 $̂1 + y2 $̂2 ) + d2 e2 ⎦ ,
I(t)
x1 x2 – I(t)y1 y2 – İ(t)y3 + d3 e3
(4.132)
⎡ ⎤
x1 e2 + (1 – (ˆ 1
˙ˆ ⎢ ⎥
( = ⎣ x2 e2 + (2 – (ˆ 2 ⎦ , (4.133)
0
⎡ ⎤
–I(t)y1 e2 + $1 – $̂1
˙ ⎢ ⎥
$̂ = ⎣ –I(t)y2 e2 + $2 – $̂2 ⎦ , (4.134)
0
On Simulink platform, we set the unknown parameter c = 5. It means the true value of
the estimated parameter is ( = $ = [0, 4, 5]T . If the initial conditions of the synchron-
ization system are X(0) = [4.4356, 6.1771, 7.2330]T , Y(0) = [–0.5431, 0.0995, –2.8096]T ,
ˆ
((0) = [–1, –1, 0]T , $̂(0) = [–2, –2, 0]T , respectively, and d1 = d2 = d3 = 5, we ob-
tain the synchronization error curves, attractors, and error curves of the estimated
parameters as shown in Figure 4.38. Figure 4.38(a) shows that the two chaotic sys-
tems with different initial values and unknown parameters can achieve the function
projective synchronization in about 2.5 s, and it has oscillation attenuation character-
istic. Figure 4.38(b) shows that the attractor of the response system and drive system
is inverse, and the size ratio satisfies the projective function. From Figure 4.38(c) and
(d), it can be seen that in a short time, the error of the estimated parameters (ˆ 1 , (ˆ 2
and $̂1 , $̂2 converges to zero, which indicates that the unknown parameters are iden-
tified. The results also show that the larger the control parameter di is, the better
4.9 Projective Synchronization 121
4 20
(a) (b)
x3
|E|
2 0
y3
0 –20
0 5 10 –20 0 20
t /s x1, y1
8 8
(c) (d)
6 6
Δθ1, Δθ2
Δδ1, Δδ2
4 4
2 2
0 0
0 5 10 0 5 10
t /s t /s
Figure 4.38: Projective synchronization between systems (4.130) and (4.131); (a) synchronization
error curve; (b) attractors; (c) error curves for estimated parameters (ˆ 1 and (ˆ 2 ; and (d) error curves for
estimated parameters $̂1 and $̂2 .
⎡ ⎤⎡ ⎤ ⎡ ⎤ ⎡ ⎤⎡ ⎤
–10 10 0 x1 0 0 0 0 (1
⎢ ⎥⎢ ⎥ ⎢ ⎥ ⎢ ⎥⎢ ⎥
Ẋ = AX + f (X) + F(X)( = ⎣ 0 0 0 ⎦⎣ x2 ⎦ + ⎣ –x1 x3 ⎦ + ⎣ x1 x2 0 ⎦⎣ (2 ⎦,
0 0 –8/3 x3 x1 x2 0 0 0 (3
(4.135)
122 4 Chaotic Synchronization Principle and Method
⎡ ⎤⎡ ⎤ ⎡ ⎤
–10 10 0 y1 0
⎢ ⎥⎢ ⎥ ⎢ ⎥
Ẏ = BY + g(Y) + G(Y)$ + U(X, Y) = ⎣ –10 0 0 ⎦ ⎣ y2 ⎦ + ⎣ –y1 y3 ⎦
0 0 –8/3 y3 y1 y2
⎡ ⎤⎡ ⎤
y2 – y1 0 0 $1
⎢ ⎥⎢ ⎥
+ ⎣ –y1 y1 + y2 0 ⎦ ⎣ $2 ⎦ + U(X, Y),
0 0 –y3 $3
(4.136)
where ( = [(1 , (2 , (3 ]T and $ = [$1 , $2 , $3 ]T are the unknown parameters of the two
systems, and U = [u1 , u2 , u3 ]T is the nonlinear controller. If we set the projective func-
tion as I(t) = –3 + 2 sin(t), according to Theorem 4.11, the control law and parameter
adaptive law of the synchronization system are
⎡ ⎤
–İ(t)y1 – I(t)(y2 – y1 )$̂ + d1 e1
1 ⎢ ⎥
U= ⎣ 10x1 – x1 x3 +I(t)y1 y3 +x1 (ˆ 1 +x2 (ˆ 2 – İ(t)y2 – I(t)[–y1 $̂1 +(y1 +y2 )$̂2 ]+d2 e2 ⎦,
I(t)
x1 x2 – I(t)y1 y2 – İ(t)y3 + I(t)y3 $̂3 + d3 e3
(4.137)
⎡ ⎤
x1 e2 + (1 – (ˆ 1
˙ˆ ⎢ ⎥
( = ⎣ x2 e2 + (2 – (ˆ 2 ⎦, (4.138)
0
⎡ ⎤
–I(t)[(y2 – y1 )e1 – y1 e2 ] + $1 – $̂1
˙ ⎢ ⎥
$̂ = ⎣ –I(t)(y1 + y2 )e2 + $2 – $̂2 ⎦. (4.139)
I(t)y3 e3 + $3 – $̂3
For simulation, we set the unknown parameter of the simplified Lorenz system c = 5,
which means that the true value of the estimated parameter is ( = [0, 4, 5]T . At the
same time, we choose the true value of the unknown parameter of the Chen system
$ = [25, 28, 1/3]T . If the initial conditions of the system and unknown parameter are
X(0) = [4.4356, 6.1771, 7.2330]T , Y(0) = [–0.62, –0.4261, –4.0838]T , ((0) ˆ = [–1, –1, 0]T ,
$̂(0) = [2, 2, 2] , and d1 = d2 = d3 = 5, then we obtain the synchronization error curves,
T
attractors, and error curves of the estimated parameters as shown in Figure 4.39.
Figure 4.39(a) shows that the two chaotic systems with different initial values and
unknown parameters can achieve the function projective synchronization in about 2
s, and it has oscillation attenuation characteristic. Figure 4.39(b) shows that the at-
tractor of the response system and drive system is inverse phase, and the size ratio
satisfies the projective function. From Figure 4.39(c) and (d), we know that in a short
time, the error of the estimated parameters (ˆ 1 , (ˆ 2 and $̂1 , $̂2 , $̂3 converges to zero, which
indicates the unknown parameters are identified. The results also show that the larger
the control parameter di is, the better the synchronization performance is. That is, the
setup time of the synchronization is shorter.
4.10 Problems and Development of Chaos Synchronization 123
15 20
(a) (b)
x3
10
0
|E|
y3
0 –20
0 5 10 –20 0 20
t /s x1, y1
10 30
(c) Δδ1, Δδ2, Δδ3 (d)
20
Δθ1, Δθ2
10
0
0
0 5 0 5
t /s t /s
Figure 4.39: Projective synchronization between systems (4.135) and (4.136): (a) synchronization
error curve; (b) attractors; (c) error curves for estimated parameters (ˆ 1 and (ˆ 2 ; and (d) error curves for
estimated parameters $̂1 , $̂2 , and $̂3 .
present, the research on the hyperchaotic system and its synchronization is still in the
early stage. The difficulties and hot topics in the research of chaos synchronization
theory include the criteria, the physical mechanism, and the applications of the
hyperchaotic synchronization.
It is very important to study the effects of noise interference and channel dis-
tortion on synchronization. In the real transmission process, the chaotic signal is
inevitably subject to noise interference. In addition, any transmission channel is not
ideal. So the transmitted signal will have amplitude attenuation, phase, and nonlinear
distortion. This will inevitably have a direct or indirect effect on the synchroniza-
tion of chaotic systems. It is very important to develop such kind of research for the
application of chaotic synchronization in secure communication.
Although chaos synchronization control method has been studied for more than
30 years, and a lot of physics and information scientists have done a lot of work in both
theory and experiment, it is still in the exploratory stage. We believe many problems
such as synchronization mechanism, anti-interference ability, and so on will be solved
in the future.
Questions
1. What are the performance index of chaotic synchronization system and its signi-
ficance?
2. What are the criteria or guidelines for synchronization of chaotic systems?
3. What are the key issues and challenges facing the chaos synchronization?
4. Try to construct a chaotic synchronization system and analyze its synchronization
performances by simulation.
5 Secure Communication Technology
Based on Chaos Synchronization
chaotic signal generated by the response system, the message signal can be recovered
correctly.
Chaotic masking is realized by utilizing the chaos randomness and broadband
power spectrum characteristics. Taking the low-dimensional chaotic synchronization
signal as a modulation signal, the transmitted message is superposed on the chaotic
signal. From the observation of power spectrum or chaotic time series, the transmitted
message is not easy to be detected directly. To accurately extract the message signal,
5.1 Chaotic Masking Communication 127
Secret signal
k + – 1/k
m(t) s(t) m΄(t)
x1 y1
Driving signal
x2 y2
x3 y3
Sender Receiver
this method requires the sender and receiver chaotic circuit parameters to match ex-
actly. That is, it requires the same initial state and the parameters. Synchronization
will be failed for tiny difference. Therefore, it is very difficult for the attacker to ana-
lyze the key parameters. On the other hand, the parameters that match exactly put
forward very high requirements to the design of the circuit.
At the sender, taking Lorenz chaotic system as an example, the mathematical
model of the modulator is described as
⎧
⎪
⎪ ẋ1 = 3(x2 – x1 )
⎪
⎪
⎪
⎨ẋ = –x x + rx – x
2 1 3 1 2
, (5.1)
⎪
⎪ẋ3 = x1 x2 – bx3
⎪
⎪
⎪
⎩s(t) = km(t) + x
1
where k is a compression ratio constant, which ensures that the useful signal m(t) is
much less than the chaotic signal. x1 is the masking signal, and x2 is the synchronous
driving signal.
At the receiver, the mathematical model of the demodulator is defined as
⎧
⎪
⎪ ẏ1 = 3(x2 – y1 )
⎪
⎪
⎪
⎨ẏ = –y y + ry – y
2 1 3 1 2
. (5.2)
⎪
⎪ ẏ = y x – by
⎪
⎪ 3 1 2 3
⎪
⎩m′ (t) = (s(t) – y )/k
1
Obviously, as long as the synchronization between the response system and drive sys-
tem is achieved completely, the useful information can be demodulated correctly. In
order to save the channel resources, this scheme is improved, and the principle is
shown in Figure 5.2. In this scheme, the driving signal consists of useful signal and
chaotic signal, that is, the drive signal is the sum of the useful signal and chaotic sig-
nal, so only one channel is required to realize the secure communication. Here, taking
128 5 Secure Communication Technology Based on Chaos Synchronization
Secret signal
k + – 1/k
m(t) s(t) m΄(t)
x1 y1
x2 y2
Driving signal
x3 y3
Sender Receiver
Lorenz chaotic system as an example, the chaotic system equations for the sender and
the receiver are given by, respectively,
⎧
⎪
⎪ ẋ1 = 3(x2 – x1 )
⎪
⎪
⎪
⎨ẋ = –x x + rx – x
2 1 3 1 2
, (5.3)
⎪
⎪ ẋ = x x – bx
⎪
⎪ 3 1 2 3
⎪
⎩s(t) = km(t) + x
1
⎧
⎪
⎪ ẏ1 = 3(s(t) – y1 )
⎪
⎪
⎪
⎨ẏ = –y y + ry – y
2 1 3 1 2
. (5.4)
⎪
⎪ ẏ = y s(t) – by
⎪
⎪
3 1 3
⎪ ′
⎩ m (t) = (s(t) – y1 )/k
In this scheme, the channel resource is saved. However, one of the obvious character-
istics is that the drive signal is disturbed by the message signal, and synchronization
cannot be accurately realized, which leads to the fact that the information signal can-
not be fully recovered. Another notable feature is that the information signal doesn’t
have any impact on the dynamic characteristics of the driving system, so the security
of the secure communication system is not high enough, and it cannot effectively resist
the third-party attack. To improve the security further, an improved scheme was pro-
posed in Ref. [114] as shown in Figure 5.3. In this scheme, the sum of the information
signal and the chaotic signal feedbacks to the drive system, so that the drive system
and the response system have the same dynamic characteristics, so it can realize the
complete synchronization, and the receiving signal can be demodulated completely.
As the information signal is integrated into the chaotic system, it is more difficult
for the attacker to obtain useful information from the channel. Here, taking Lorenz
chaotic system as an example, the chaotic system equations for the sender and the
receiver is written as, respectively,
5.1 Chaotic Masking Communication 129
k 1/k
m(t) m΄(t)
s(t)
+ –
x1 y1
x2 y2
x3 y3
Sender Receiver
⎧
⎪
⎪ẋ1 = 3(s(t) – x1 )
⎪
⎪
⎪
⎨ẋ = –x x + rx – x
2 1 3 1 2
, (5.5)
⎪
⎪ ẋ3 = x1 s(t) – bx3
⎪
⎪
⎪
⎩s(t) = m(t) + x
2
⎧
⎪
⎪ ẏ1 = 3(s(t) – y1 )
⎪
⎪
⎪
⎨ẏ = –y y + ry – s(t)
2 1 3 1
. (5.6)
⎪
⎪ẏ3 = y1 s(t) – by3
⎪
⎪
⎪ ′
⎩m (t) = s(t) – y2
k 1/k
m(t) m΄(t)
s(t)
+ –
x1 y1
xʹ1 yʹ1
x2 y2
xʹ2 yʹ2
x3 y3
xʹ3 yʹ3
Sender Receiver
⎧
⎪
⎪ ẏ1 = 3(s(t) – y1 )
⎪
⎪
⎪
⎪
⎪
⎪ ẏ2 = –y1 y3 + ry1 – y2
⎪
⎪
⎪
⎪
⎨ẏ3 = y1 y2 – by3
⎪
ẏ1′ = 3(y2′ – y1′ ) . (5.8)
⎪
⎪
⎪
⎪ ′ ′
ẏ = –y1 y3 + ry1 – y2′
⎪
⎪
⎪ 2
⎪
⎪
⎪ ′ ′ ′
⎪ẏ3 = y1 y2 – by3
⎪
⎪
⎩m′ (t) = (s(t) – y′ )/k
2
digital signal to the piecewise chaotic waveform. The modulated signal is detected in
the receiver based on the correlation reception theory. It needs a chaotic basis func-
tion or multiple chaotic basis functions for CSK modulation. A basis function of CSK
has two types at least, such as COOK and CSK. The antinoise performance of bipolar
coherent demodulation of CSK is better than that of COOK. If the bit energy remains
constant and the chaotic basis function is recovered accurately at the receiver, the
antinoise performance of the CSK is equivalent to that of Binary Phase Shift Keying
(BPSK). The noncoherent detection cannot detect the bipolar CSK, and the antinoise
performance of the noncoherent COOK is worse than that of the coherent COOK, but
the COOK can achieve the best antinoise performance when the bit energy keeps
constant. The decision threshold of the demodulation of reverse-phase CSK and COOK
depends on the signal-to-noise ratio (SNR). When two basis functions are adopted,
this problem can be solved. When symbols “0” and “1” are mapped to two different
chaotic waveforms, the CSK of the two basis functions is formed, and the antinoise
performance of coherent demodulation is better than that of the noncoherent de-
modulation. Especially, through choice of orthonormal basis functions, the decision
threshold level becomes zero, and the performance has nothing to do with the SNR,
and its performance is similar with that of coherent Frequency Shift Keying (FSK).
COOK is the most simple CSK communication, and the structure of basic principle is
shown in Figure 5.5. {bi } is a binary information signal with “1” and “–1.” When bi = 1,
the switch is turned on. When bi = –1, the switch is turned off. At the receiver, the
information signal is recovered by employing the correlation algorithm. If the input
signal is of equal probability distribution, and the average bit energy for a single sym-
bol to Eb , then the code energies of “1” and “–1” are 2Eb and 0, respectively. Obviously,
the larger the bit energy gap, the better the antinoise performance of the signal. The
structure of this scheme is simple. For example, it only needs a chaotic oscillator, but
the security of the system is not high.
Correlator
Decision
Chaotic ri(t) T zi
oscillator Channel ∫ 0 .dt Decoder
T {bˆi}
{bi} cp
n(t)
Next, we introduce the principle of CSK communication based on two chaotic signal
generators. The structure of the transmitter is shown in Figure 5.6. {bi } is a binary
sequence of information signal, which only includes “1” and “–1”. After modulated
by the modulator, the signal transmitted in the channel is a noise-like chaotic signal,
whose mathematical description is
g1 (t), bi = 1
si (t) = . (5.9)
g2 (t), bi = –1
In the receiver, coherent or noncoherent mode is used to recover the information sig-
nal, and the principle of coherent demodulation is shown in Figure 5.7. The output of
the correlator is
T T T T
zi1 = ri (t)ĝ1 (t)dt = [gi (t) + n(t)]ĝ1 (t)dt = gi (t)ĝ1 (t)dt + n(t)ĝ1 (t)dt, (5.10)
Ts Ts Ts Ts
T T T T
zi2 = ri (t)ĝ2 (t)dt = [gi (t) + n(t)]ĝ2 (t)dt = gi (t)ĝ2 (t)dt + n(t)ĝ2 (t)dt. (5.11)
Ts Ts Ts Ts
Obviously, if bi = 1, then si (t) = g1 (t), ri (t) = g1 (t) + n(t). We obtain zi1 > zi2 , and the
recovered signal is b̂i = 1. If bi = –1, then si (t) = g2 (t), ri (t) = g2 (t) + n(t). We have
zi1 < zi2 , and the recovered signal is b̂i = –1.
Chaotic osillator 1
g1 (t)
si (t) = {gi (t)}
g2 (t) {bi}
Chaotic osillator 2
Correlator
T zi1
∫ Ts .dt
gˆ 1 (t) T
si (t) ri (t) Chaotic oscillator 1
+ Decoder
– {bˆi}
Chaotic oscillator 2 gˆ 2 (t)
n(t) T Comparator
∫ Ts .dt
zi2
T
Correlator
Correlator Decision
si (t) zi {bˆi}
T .dt
∫0 Decoder
T
cp
For the CSK noncoherent demodulation, the receiver need not recover the chaotic
carrier, and the detector is based on the bit energy of the transmission signal. If the
decision threshold is set to the median of the two bit energies, then the received sig-
nal can be demodulated correctly. Obviously, the selection of the optimal threshold is
closely related to the SNR of the system. So the threshold shift is the main defect of the
noncoherent demodulation.
Next, we take CSK digital secure communication system based on the unified
chaotic system as an example to illustrate, and the system structure is shown in Fig-
ure 5.9. The chaotic systems of the transmitter and receiver are unified chaotic system.
The chaotic system 11 in the transmitting end and the chaotic system 21 in the receiv-
ing end have the same parameter !1 , and the chaotic signal generated by them are
x11 (t) and x21 (t), respectively. The chaotic system 12 in the transmitting end and the
chaotic system 22 in the receiving end have the same parameter !2 , and the chaotic
signals generated by them are x12 (t) and x22 (t), respectively. By employing the syn-
chronization strategy, the unified chaotic systems 11 and 12 at the sending end are
synchronized with the unified chaotic systems 21 and 22 at the receiving end, respect-
ively, then we have x11 (t) = x21 (t), x12 (t) = x22 (t). The binary digital signal a(t) = {an } is
used to control the chaotic signal. When a(t) is of high voltage, x11 (t) is sent. When a(t)
is of low voltage, x12 (t) is sent. The transmitted signal in the channel is expressed as
x11 (t), a(t) = 1
s(t) = x11 (t) ⋅ a(t) + (1 – a(t)) ⋅ x12 (t) = . (5.13)
x12 (t), a(t) = 0
Obviously, the signal transmitted in the channel is chaotic. If the noise in the channel
is Gaussian white noise n(t), then the signal at the receiving end is expressed as
x11 (t) + n(t), a(t) = 1
r(t) = s(t) + n(t) = x11 (t) ⋅ a(t) + (1 – a(t)) ⋅ x12 (t) + n(t) = (5.14)
x12 (t) + n(t), a(t) = 0
134 5 Secure Communication Technology Based on Chaos Synchronization
Z1
α1 Chaotic
x11(t) ʃT dt Sampling
system 11
a(t) x21 (t)
α1 Chaotic
system 21
s(t) r(t) b(t)
Channel Quenching Sampling
Decision
pulse pulse
α2 Chaotic
system 22
Chaotic n(t) x22 (t)
α2 Z2
system 12
x12(t) ʃT dt Sampling
Figure 5.9: Principle block diagram of CSK digital secure communication system based on unified
chaotic system.
For bipolar CSK, due to the correlation integral, two signal energies cannot be dis-
tinguished, so we can only use coherent demodulation method to demodulate the
signal.
The chaotic signals are broadband nonperiodic signals, so the chaotic signals
obtained by the same chaotic system with different initial conditions or gener-
ated by the same system with different system parameters are almost orthogonal.
The correlation properties of chaotic signals are similar to those of Gauss white
noise. Generally, the cross-correlation of the chaotic signal approximates to zero,
and the autocorrelation approximates to the impulse function. The correlation prop-
erties of chaotic signals generated by the unified chaotic system are shown in
Figure 5.10.
The receiver is composed of a chaotic synchronization system, a correlator (in-
cluding multiplier and integrator), and a sampling decision device. If the outputs of
correlator 1 and correlator 2 are z1 and z2 , respectively, and their outputs are
1 1
Normalization coefficient ρ
Normalization coefficient ρ
0.5 0.5
0 0
–0.5 –0.5
–1 –0.5 0 0.5 1 –1 –0.5 0 0.5 1
Delay time τ/s Delay time τ/s
(a) (b)
Figure 5.10: Correlation characteristic of chaotic signals generated by the unified chaotic system:
(a) autocorrelation and (b) cross-correlation.
5.2 Chaos Shift Keying Communication 135
T (x1 (t) + n(t))x21 (t)dt = Eb + T n(t)x21 (t)dt, a(t) = 1
z1 = r(t)x21 (t)dt = , (5.15)
T T (x2 (t) + n(t))x21 (t)dt = 1Eb + T n(t)x21 (t)dt, a(t) = 0
+ n(t))x22 (t)dt = 1Eb + T n(t)x22 (t)dt,
T (x1 (t) a(t) = 1
z2 = r(t)x22 (t)dt = , (5.16)
T T (x2 (t) + n(t))x22 (t)dt = Eb + T n(t)x22 (t)dt, a(t) = 0
where 1 = T x11 (t)x12 (t)dt /Eb is the correlation coefficient of chaotic signals. When
2 2
the two signals are completely orthogonal, 1 = 0. Eb = T x11 (t)dt = T x12 (t)dt is the bit
energy of the chaotic signal. Obviously, if the correlator output signals, z1 and z2 , are
sampled to be decided, then the original signals can be recovered by the decision rules
z1 > z2 decision for “1”
b(t) = . (5.17)
z1 < z2 decision for “0”
Obviously, ignoring the effect of noise, the noise tolerance of coherent demodulation
in the receiver system is Nc = (1 – 1)Eb . The output signal of the decision device is
b(t). It can be seen that the demodulation performance of the system is related to the
characteristics of the chaotic signal. Because the autocorrelation of the chaotic signal
generated by the unified chaotic system with different parameters is close to $(t), and
its cross-correlation is very weak, the system has a good correlation demodulation
performance and the original signal can be recovered, that is b(t) = a(t).
Next, we discuss the BER performance and security performance of CSK secure
communication based on unified chaotic system. Let the two possible deterministic
signals arriving at the receiver be x1 (t) and x2 (t), respectively, and their durations are
(0, T), and have the same energy Eb . The noise n(t) at the input of the receiver is Gauss
white noise with zero mean, and its unilateral power spectral density is n0 . According
to the principle of the best reception, in the case of equal priori probabilities, the limit
BER performance is
⎡ ⎡
⎤⎤
1⎣ E (1 – 1)
1 – erf ⎣ ⎦⎦ ,
b
Pe = (5.18)
2 2n0
where erf(x) is the error function, and 1 is the cross-correlation coefficient between
signals x1 (t) and x2 (t), and its range is (–1, 1). Because x1 (t) and x2 (t) are orthogonal
signals, the cross-correlation coefficient is zero. The BER performance of the system is
rewritten as
⎡ ⎡
⎤⎤
1⎣ ⎣ E b ⎦⎦ 1 Eb
Pe = 1 – erf = erfc . (5.19)
2 2n0 2 2n0
The BER simulation result of the CSK system is shown in Figure 5.11. When the SNR is
greater than 10 dB, the BER is less than 10–6 .
136 5 Secure Communication Technology Based on Chaos Synchronization
100
BER Pe
10–10
10–20
0 5 10 15
SNR /dB
The security of CSK communication system is good, and it is mainly manifested in the
following aspects. First, the system has strong anticrack ability, because the signal
transmitted in channel is chaotic. With the evolution of the chaotic system, different
chaotic signals represent the same two value signals. It is equal to “one time pad,” so
it is unbreakable. From the view of cryptography, the system has a huge key space. The
chaotic system is sensitively dependent on initial conditions. The unified chaotic sys-
tems with different parameters and different initial conditions can produce different
chaotic signals, so chaotic system parameters and initial value can be used as keys.
Different chaotic dynamical equations can produce different chaotic signals, and dif-
ferent chaotic variables also can be modulated. In addition, different synchronous
mode also affects the demodulated signal. So the key space of the system is composed
of parameters, initial values, chaotic systems, chaotic variables, and synchronization
modes. The larger the key space is, the higher the security performance is.
It is worth noting that the good anti-interference and security of the system is at
the cost of the complexity of the system. In practice, we should consider the trade-off
between these two aspects. Because chaotic signal is nonperiodic, the bit energy of
output information signal is not entirely consistent. Even in the noise-free case, there
is also a deviation for the results related to the estimation, so it will affect the BER per-
formance of the system. To solve this problem, we can use the frequency modulation
(FM) to modulate CSK, namely FM-DCSK modulation.
According to the principle shown in Figure 5.9, the simulation model is obtained
as shown in Figure 5.12. If the parameter ! = 1 for the chaotic system 11 and the chaotic
system 21, then initial values are (–5, –5, –5). At the same time, if the parameter ! = 0.3
for the chaotic system 12 and the chaotic system 22, then initial values are (10, 10, 10).
The chaotic variable x is modulated by the information signal a(t). When a(t) = 1, the
modulated signal s(t) transmitted in the channel is the chaotic signal x11 generated
by the unified system 11. When a(t) = 0, the modulated signal s(t) transmitted in the
channel is the chaotic signal x12 generated by the unified system 12. By using the chaos
synchronization control strategy, the synchronization between the unified chaotic sys-
tems is achieved as shown in Figure 5.13. Bernoulli random binary sequence is used as
5.2 Chaos Shift Keying Communication 137
x 1
S/H
1 Parameter y s
z Product
Integrator Sample
Constant1
Unified chaotic system 1 x and hold
1 Parameter y
z
Bernoulli bin AWGN Constant2
Unified chaotic system 2
Bernoulli Random Switch
AWGN x Pulse Relational Scope1
Binary Generator Channel 0.3 Parameter y generator operator
z
x Constant4
Unified chaotic system 4
0.3 Parameter y
z 1
Constant3 S/H
s
Unified chaotic system 3
Product1 Integrator1 Sample
and hold1
Figure 5.12: Simulation model of CSK digital secure communication based on unified chaotic system.
40 40
20 20
x21 0 x22 0
–20 –20
–40 –40
–40 –20 0 20 40 –40 –20 0 20 40
x11 x11
(a) x11(t)~x21(t) (b) x11(t)~x22(t)
Figure 5.13: Synchronization phase diagram of the variables between the sender and receiver:
(a) x11 (t)–x21 (t) and (b) x11 (t)–x22 (t).
the information source. The integrator is triggered by the rising edge of external clock
pulse. The sampling–holder is triggered by the falling edge of external clock. Decision
is realized by the relevant logic comparator. The simulation results are shown in Fig-
ure 5.14, where T(t) is the system clock signal; a(t) is the modulation signal; s(t) is the
modulated signal transmitted in channel; and b(t) is the recovered information signal
at the receiver. Obviously, b(t) = a(t), that is, chaos signal demodulates correctly. Sim-
ulation results show that the original binary digital signal can be demodulated in this
CSK secure communication scheme correctly.
In 1996, Kolumban et al. [117] proposed the DCSK scheme, and it solved the problem
of CSK decision threshold value depending on the SNR. The basic principle is that
138 5 Secure Communication Technology Based on Chaos Synchronization
2
Clock signal
T(t) 1
0
0 10 20 30 40 50 60
2
Modulating signal
a(t)
0
0 10 20 30 40 50 60
20 Modulated signal
s(t)
–20
0 10 20 30 40 50 60
2
Recovery signal
b(t)
0
0 10 20 30 40 50 60
t/s
each digital symbol is represented by two chaotic segments signal. The first segment
is called “reference signal,” and the second segment is named “useful signal.” When
we send “1,” two same segments are sent (same phase). When we send “0,” the two
inverse phase segments are sent (inverse phase). In the receiver, the correlation of
these two segments is calculated, and the information signal is recovered according
to the correlation value. When the output of the correlator is more than 1, the output
signal is “1.” When the output of the correlator is less than 1, the output signal is “0.”
The principle of DCSK modulator is shown in Figure 5.15.
1
T/2
2 si (t)
Chaos generator
T/2
3
–1 {bi}
Correlator
Decision device
ri(t) = si(t) + n(t) Zi
T {bˆ i}
–dt Decoder
T/2
T
T/2 cp
Because each bit is mapped to two continuous segments with the length T/2, the
information signal at the receiver can be recovered by coherent demodulation. The
demodulation principle of the DCSK scheme is shown in Figure 5.16. In this demodu-
lation scheme, the output signal of the correlator is
T T
zi = ri (t)ri (t – T/2)dt = [si (t) + n(t)][si (t – T/2) + n(t – T/2)]dt
T/2 T/2
T T T
. (5.22)
= s2i (t)dt + si (t)(n(t) + n(t – T/2)dt + n(t)n(t – T/2)dt
T/2 T/2 T/2
Compared with CSK and COOK, the advantage of the DCSK scheme is that the de-
cision threshold is zero whether there is noise or not. The reference signal and carrying
information signal go through the same channel, so it is not sensitive to channel dis-
tortion, and it has a good antinoise performance. The shortage of DCSK is that it can
only be used in the chaotic digital communication with low bit rate. To solve this
problem, in 1998, Kolumban et al. proposed a DCSK scheme based on FM-DCSK [118].
1 T/2
Reference
si(t)
frequency 2
PD F(s) FM T/2
fR K
3
–1 {bi}
VCO
Correlator
Decision device
FM-DCSK T Zi {b̂i}
–dt Decoder
ri(t) T/2
T
T/2 cp
reference signal in [0, T/2] and transmits same phase chaotic FM signal or inverse
phase chaotic FM signal in [T/2, T].
The demodulation principle of the FM-DCSK is shown in Figure 5.18. Similarly
with that of DCSK, it employs the correlation receiving principle to demodulate the
received information {bi }. For noise channel, the output of the FM-DCSK correlator has
zero variance. Its data rate is not limited by the characteristics of the chaotic signal,
and its decision threshold is identically zero. Thus, FM-DCSK can improve the symbol
rate and reduce errors. When APLL is designed correctly, we can obtain the chaotic
band-limited signal with uniform power density, which makes the output (bit energy)
of the receiver is constant, regardless of the data rate. Thus, FM-DCSK has higher data
rates, and its antinoise performance is the same with that of DCSK.
When compared with other chaotic modulation schemes, FM-DCSK and DCSK
have better robustness to multipath interference and nonideal channel. FM-DCSK
modulation is suitable for wireless local area networks, indoor wireless commu-
nications, mobile communications, and others which are sensitive to multipath
interference.
for coding four symbols. QCSK can be regarded as a combination of two DCSK systems.
A double data rate is obtained by increasing complexity of the QCSK.
To explain the principle of QCSK, first, the concept of orthogonal chaotic sig-
nal is presented. If two independent chaotic signals c1 (t) and c2 (t) (or even different
segments of the same chaotic signal) exhibit very low cross-correlation, they are
orthogonal in a time interval [0, 4], namely
4
c1 (t)c2 (t)dt = 0. (5.23)
0
If x(t) is a chaotic reference signal defined in the interval t ∈ [0, 4], and it has a zero
mean. In the interval t ∈ [0, 4], x(t) can be expanded as follows by Fourier series
(A0 = 0):
∞
x(t) = Ak sin(k9t + >k ), (5.24)
k=1
where 9 = 20/4. Correspondingly, the average power of x(t) in the interval t ∈ [0, 4] is
∞
1 4
1 2
px(t) = x2 (t)dt = Ak . (5.25)
4 0 2
k=1
The orthogonal signal y(t), in the interval t ∈[0, 4], can be obtained by each Fourier
frequency component of x(t) with the phase shift 0/2, namely
∞
y(t) = Ak sin(k9t + >k – 0/2), (5.26)
k=1
Then the signals x(t) and y(t) are orthogonal over the interval t ∈ [0, 4] and their power
is equal, i.e.
1 4
x⊥y⇔ x(t)y(t)dt = 0, (5.27)
4 0
4
1 4 2 1
px(t) = py(t) ⇔ x (t)dt = y2 (t)dt. (5.28)
4 0 4
0
According to definition formula (5.26) of the reference quadrature signal y(t), the x(t)
and y(t) are extended into the periodic signal with the periodic 4. It is found that y(t)
142 5 Secure Communication Technology Based on Chaos Synchronization
is the Hilbert transform of x(t), and the Hilbert transform of the given signal can be
calculated by the following methods:
1. Frequency domain method: It is basically the same as the method of generating
Hilbert transform in Amplitude Modulation - Single Side Band modulation. A fast
Fourier transform (FFT) is applied to a chaotic sequence with length k, and then
remove the negative frequency (signal energy) corresponding to FFT coefficients.
It is obtained by inverse FFT transformation. At present, the algorithm can be
realized by a special digital signal processing (DSP) chip.
2. Time domain method: It is achieved by the design of digital Hilbert converter with
finite impulse response (FIR) or infinite impulse response (IIR). A simple method
for calculating the Hilbert transformation of a given discrete signal is to design
an FIR filter which is approximated by Hilbert transform. The FIR filter can be
implemented by the ideal impulse response with appropriate width:
2 sin2 (0k/2)
0 k , k≠0
h(k) = . (5.30)
0, k=0
In the interval I = [0, 4], a chaotic sampling orthogonal base function is defined as
1 1
c = [cx (t), cy (t)] = √ x(t), √ y(t) , (5.31)
E4 E4
The orthogonal condition (5.32) indicates that the energy of cx and cy is constant
at each interval I. The constant is one in special case. The chaotic signal can be
represented by a linear combination of cx and cy , namely ms (t) = as cx (t) + bs cy (t),
where s represents a signal space symbol. Equivalently, the symbol s can be
4
expressed in plural form, namely, ms = as + jbs and 0 m2s (t)dt = 1.
Being similar to DCSK and QCSK, the modulator structure is shown in Figure 5.19. It
includes a chaotic generator, which generates the signal cx at each interval [0, T/2],
and the corresponding quadrature signal cy is generated by the filter. For simplicity,
it is assumed that the system has no time delay. According to the symbol s, the en-
coder generates a linear combination of cx and cy . Information symbol is provided by
a bit/symbol converter, and the converter maps each pair of information bits into a
symbol. Thus, each symbol period transmits 2 bits information. Then, the QCSK sig-
nal is formed by the two-channel analog multiplexer with the switching time T/2. Note
that although there is no filter in the figure, the QCSK scheme must contain a low-
pass band-limiting filter to limit the bandwidth of transmission signal. The chaotic
5.2 Chaos Shift Keying Communication 143
cx
T/2
sQCSK
cx
Chaotic signal generator T/2
Encoder
ms = ascx + bscy
cy
Hilbert wave filter
reference signal segment r(t) = Eb cx (t) is transmitted in the first half symbol period of
the transmission symbol s, and the information segment i(t) = Eb ms (t) is transmitted
in the second half of the symbol period, where s represents the symbol that needs to
be transmitted, while Eb represents the energy per bit. The orthogonal condition (5.32)
shows that the energy per transmitted bit is a constant. If the symbol period is T = 24,
then the QCSK signal is
√
Eb cx (t), 0 ≤ t < T/2
SQCSK (t) = √ , (5.33)
Eb (as cx (t – T/2) + bs cy (t – T/2)), T/2 ≤ t < T
where s = 0, 1, 2, 3.
The simplified block diagram of QCSK demodulator is shown in Figure 5.20. QCSK
signal may be demodulated by the method of differential coherent detection. During
the process of demodulation, the symbol period is assumed to be synchronized. That
is, the beginning of each symbol is taken as the starting of the coherent process at the
receiver.
A
~
ms T za
ʃ T/2
–dt
~
~ d (k)
cx
T/2 Decision Bit/symbol
module converter
~
ms T T
~ ~
ʃ T/2
–dt
zb
sQCSK cy
B
Hilbert wave
filter
In theory, by using the chaos basis signals cx and cy , carrier information segment i(t) =
Eb ms (t) is processed in the interval [T/2, T], and we can recover the plural ms = as +jbs .
In fact, according to formulas (5.27) and (5.28), we can obtain
T/2
as = ms (t)cx (t)dt, (5.34)
0
T/2
bs = ms (t)cy (t)dt. (5.35)
0
At the receiver, we can observe noise, filtered reference signal r(t), and information
segment i(t). If the signal is only affected by the additive Gaussian white noise, then
the input of the correlator A in Figure 5.20 is
r̃(t – T/2) = Eb (cx (t – T/2)) + n(t – T/2), t ∈ [T/2, T], (5.36)
ĩ(t – T/2) = Eb [as cx (t – T/2) + bs cy (t – T/2)] + n(t), t ∈ [T/2, T]. (5.37)
The estimated value of the quadrature signal H[r̃] is generated by the disturbed chaotic
reference signal, where H is the Hilbert transform operator:
H[r̃(t – T/2)] = H[ Eb cx (t – T/2) + n(t – T/2)] = Eb cy (t – T/2) + n′ (t – T/2), (5.38)
where n′ (t) = H[n(t)]. With the ideal Hilbert transform, the statistical properties of n′ (t)
are the same as that of n(t).
Considering the orthogonality of cx and cy , the output of the correlator is
T
T
T T T
za = r̃ t – ĩ(t)dt = as Eb + Eb aS cx t – n t– dt
T
2
2 T
2
2 2
T T T ,
T T T
+ Eb bS cy t – n t– dt + Eb cx (t)n(t)dt + n(t)n t – dt
T
2
2 2 T
2
T
2
2
(5.39)
T T
T T ′ T
zb = H(r̃ t – ĩ(t)dt = bs Eb + )n t – Eb asdt cy (t –
T
2
2 2 2 T
2
T T T .
T ′ T ′ T
+ Eb bs cy t – n t– dt + Eb cy (t)n(t)dt + n(t)n t – dt
T
2
2 2 T
2
T
2
2
(5.40)
CSK belongs to chaotic digital secure communication. When the basis function is
strictly recovered, the noise performance of the coherent reception is better than that
of the noncoherent reception. If the orthogonal basis function is chosen, the chaotic
keying and the traditional digital modulation can achieve similar noise performance.
5.3 Chaos Parameter Modulation 145
Comparator
Integrator S&H F(x)
V(t)
∞
U(t) = W(t – tj ), (5.41)
j=0
j
tj = t0 + Tn , (5.42)
n=0
where Tn is the time interval between the nth pulse and the (n–1)th pulse. The time
interval sequence Ti represents the iteration of the chaotic process. For the design
convenience, we consider the chaos is generated by a one-dimensional map Tn =
F(Tn–1 ), where F(⋅) is a nonlinear function.
The information is encoded in the chaotic pulse signal by adding the delay time
in the pulse interval Tn . Thus, the resulting pulse sequence can be defined as
where Tn is generated by formula (5.43), and we assume that the duration of each
pulse W(t) of the pulse sequence is much less than the minimum value of the pulse
interval Tn . When detecting information at the receiver, the demodulator is triggered
by receiving pulse U(t). After measuring successive time intervals Tn and Tn–1 , the
information signal is recovered as
If the nonlinear function F(⋅), parameters d and m at the receiver are same with
those of the sender, then the encrypted information Sn can be easily recovered. When
the matching accuracy of nonlinear functions is not sufficient, large decoding error
occurs.
The demodulator principle is shown in Figure 5.22. When the demodulator is
synchronized with the pulse modulator, to detect a single bit of the transmission in-
formation, the demodulator must simply determine whether the desired position of
the transmitted pulse is delayed. In the figure, the integrator, sample and hold circuit,
and a nonlinear threshold function module are reset or triggered by the pulse from the
transmitter, not by the feedback loop within the receiver. To be exact, only when the
input signal U(t) from the input channel exceeds the threshold, they are triggered. For
each received pulse, the result of V(tn+1 ) – F(vn ) is calculated and used to determine
whether the pulse is delayed. Assuming that the difference is less than the reference
value "(d + m/2), the data bit Sn+1 is determined to be “1,” otherwise, it is determined
to be “0.”
Another important part of the receiver is the window selection module. Once the
receiver has correctly received two consecutive pulses, the receiver can predict the
fastest time to receive the next pulse. It means that the input of the demodulator can be
Subtractor
Output
Comparator
Window selection
Threshold pulse
modulator
Figure 5.22: Principle block diagram of the chaotic pulse position demodulator.
148 5 Secure Communication Technology Based on Chaos Synchronization
masked at this time, which is done by the window selection module. In the experiment
circuit, the input of the receiver is opened by a window control pulse generated by the
comparator at the moment tn+1 ′ = tn + "F(vn ), and the input end is turned on until the
demodulator is triggered by the first received pulse. So the window selection module
greatly reduces the probability of the receiver triggered by the noise, interference, or
the pulse of other users.
Although the performance of CPPM is slightly worse than that of BPSK, noncoher-
ent FSK, and ideal PPM, it has the following characteristics:
1. Low probability intercept and low probability decoding ability.
2. Although the complexity of the circuit is increased slightly, the security of com-
munication system is improved.
3. Compared with the majority of the communication schemes based on chaotic
transformation, the system presents very good performance.
4. CPPM can be used for multiuser communication.
5. Compared with other pulse system, it eliminates any traces of periodicity of the
transmission signal spectrum due to its independent period clock.
KN+(N–1)
ai (k) = di (n), (5.46)
n=KN
where di (n) is the information bit value of the ith user, di (n) ∈ { – 1, 1}. Let xi (n) be the
chaotic spread spectrum sequence of the sender of the ith user, and its expression is
5.4 Chaotic Spread Spectrum Communication 149
s1(k) y1(n)
a1(k) ʃT Decision b1(k)
N(t)
x1(n) f (ω0, 1) f (ω0, 1) x 1(n) cp
s2(k) s(n) r(n) y1(n)
a2(k) Channel ʃT Decision b2(k)
.
. x2(n) f (ω0, 2) f (ω 0 , 2) x 2(n) cp .
. . . . . . . .
. . . . . . .
. . . . . .
sm(k) y1(n)
am(k) ʃT Decision bm(k)
Figure 5.23: Principle block diagram of multiuser chaotic sequence spread spectrum communication
system.
xi (n) = KN+(N–1)
n=KN gi (n), where gi (n) is the spread spectrum characteristic sequence of
the ith user.
The input signal r(n) of the receiver is expressed as
M
r(n) = Ak (n)dk (n)gk (n) + N(n), (5.47)
k=1
where Ai (n) is the carrier signal amplitude of the ith user. N(n) is the zero mean Gauss
white noise. So, the output of the correlator of the receiver of the ith user is
KN+(N–1)
yj (k) = r(n)xi′ (n), (5.48)
n=KN
where xi′ (n) is the chaotic spread spectrum sequence of the receiver of the ith user, and
the system synchronizes between the sender and the receiver, that is, xi (n) = xi′ (n). Let
Tb be the time width of each original information bit, then
K
1 1
yi (k) = r(t)gi (t)dt = Ai di + 1i,k Ai di + n(t)gi (t)dt
Tb Tb Tb Tb
i=1
i≠k
= Ai di + MAIi + Zi (5.49)
For formula (5.49), the first item is the desired information component. The second
item is the recovery data obtained by the received signal with the kth signal itself, and
multiple access interference (MAI) caused by other users. Obviously, the MAI term
is related to the user number k, the amplitude of the signal of other user, and the
T
cross-correlation coefficient 1i,k , where 1i,k = T1 0 b gi (t)gk (t)dt. The third item is noise
b
interference.
150 5 Secure Communication Technology Based on Chaos Synchronization
After the integral (correlation operation) of the receiver for the ith user, the signal
is decided by the decision threshold, which is zero. The data is demodulated by the
ith user at the receiver according to
–1, yi (k) < 0
bi (k) = . (5.50)
1, yl (k) > 0
To sum up, whether the user information is correctly recovered is greatly related with
the characteristics of the spread spectrum code.
Taking three typical chaotic maps, including logistic, Chebyshev, and Tent map as
examples, the binary chaotic spread spectrum sequence is generated [123]. In the mul-
tiuser chaotic sequence spread spectrum communication system, spread spectrum
sequence is a binary sequence with value ±1, namely, the real values of chaotic map
sequences are quantized into binary to generate spread spectrum sequence.
where r is the system parameter, and r ∈ (0, 4]. When 3.5699 . . . < r ≤ 4, the system is
chaotic. The mean value of the sequence is 0.5.
where 9 is usually taken as an integer power of 2, and the mean value of the
sequence is 0.
where 0 < a < 1, and the mean value of the sequence is 0.5.
Next, we discuss the balance and correlation of the three kinds of chaotic
sequences.
5.4 Chaotic Spread Spectrum Communication 151
E = (P – Q)/N, (5.54)
where N is the total number of symbol sequence. The sequence balance is related with
the carrier suppression degree of the DS/SS system. The imbalance of spread spectrum
sequence will lead the leakage of carrier information, or be prone to error or lost. Thus,
it is important to study the balance of the direct spread spectrum system (DS/SS).
Applying formula (5.54) to analyze the impact of the initial value of three kinds of
chaotic maps, the results are shown in Figure 5.24. When r = 4 for the logistic map,
the initial value x0 is one of the 9,999 different numbers between 0 and 1. From Fig-
ure 5.24(a), we can obtain that the effect of x0 on the balance is small, but there are
three peaks, and the initial value x0 = 0.25, 0.5, and 0.75, respectively. When 9 = 20 for
the Chebyshev map, the initial value x0 belongs to one of the 9,999 different numbers
between 0 and 1. From Figure 5.24(b), we found that the effect of x0 on the balance is
very small, and there are no peaks. When a = 0.49 for the Tent map, the initial value
x0 forms the 9,999 different numbers between 0 and 1. From Figure 5.24(c), we find
that the effect of x0 on the balance is small, and there are three peaks, and the ini-
tial value x0 = 0.2401, 0.49, and 0.7501, respectively. It is worth pointing out that the
peak point of Tent map is related with the initial value selection. If the accuracy of the
initial value is not enough, the peak of this map may be missed.
1 1 1
Balance degree E
Balance degree E
0 0 0
–1 –1 –1
0 0.25 0.5 0.75 1 0 0.5 1 0 0.2401 0.5 0.7501 1
Initial value x0 Initial value x0 Initial value x0
Figure 5.24: Relationship between the balance E and the initial value x0 , for different maps:
(a) Logistic map; (b) Chebyshev map; and (c) Tent map.
152 5 Secure Communication Technology Based on Chaos Synchronization
sequence has a deviation with the theoretical value. Here, we change the length of
the chaotic sequence N and maintain the relevant range M, to study the effect of the
length of the sequence on the deviation. The RMS 3R12 is defined as
M
1
3R12 = [R12 (m)]2 . (5.55)
2M + 1
m=–M
Here, we use formula (5.55) to calculate the RMS values of the cross-correlation of the
sequence with length N = 2,000 generated by the above three kinds of chaotic maps.
The results are shown in Table 5.2.
From Table 5.2, after the frame processing, RMS value of cross-correlation for
each chaotic sequence has been greatly affected, and its change is different. Besides,
different frame lengths correspond to different RMS values, which destroy the ori-
ginal relevant characteristics. From Table 5.2, after the frame processing, the cross-
correlation of three chaotic sequences becomes smaller, and it also shows that the
chaotic sequence with a certain length has a better cross-correlation compared with
the original sequence. But there is no fixed relationship between the frame length and
the RMS value, that is to say, after the frame processing, chaotic sequence destroys
the original conclusion. That is, the longer the sequence, the smaller the deviations of
correlation.
Multiuser chaotic spread spectrum system involves the design of multiple modules,
including the spread spectrum sequence generator module, the correlation receiving
module, the multipath channel module, the polarity transformation module, and the
frame sampling module. The next sections introduce each of these.
1
z̅
Unit delay ++ 1
0.5
Out1
Sign Gain
f(u)
a 0.5
Fcn
Constant Constant 1
Figure 5.25: Simulation model of chaotic sequence generator based on Tent map.
converted by the decision function T(x) = [1 + sgn(x – . )]/2. Here, two design methods
of the chaotic sequence generator module are introduced. One is the design of spread
spectrum sequence generator based on Tent sequence, and the other is the design of
spread spectrum sequence generator module based on series chaotic map.
The simulation model of the spread spectrum sequence generator module based
on Tent chaotic sequence is shown in Figure 5.25. In the figure, the initial value and
the sampling time of the whole sequence generator are controlled by the initial value
and the sampling time of the unit delay module, respectively. The value of the constant
module corresponds to the bifurcation parameter of the Tent chaotic map. The para-
meter of the Fcn module indicates the chaotic map, and finally the chaotic sequence
is converted to binary sequence by the sign quantization module. It is worth noting
that the Tent map from the mathematical model to the computer simulation model
is more difficult to achieve, because the expression of the chaotic map is a piecewise
function, and the bifurcation parameters are divided into two segments. Therefore,
the expression Fcn is
1
z
Unit Delay1
f(u)
2
8 1
Fcn
Constant z
Constant 1
Fcn1 1
Out1
Pulse f(u)
Generator
Figure 5.26: Simulation model of spread spectrum sequence generator based on series chaotic map.
namely, the initial values of two unit delay modules are the same. Multiple n of the
sampling time of the two-stage sequence is controlled by a periodic sequence gener-
ator, and the sampling time of the periodic sequence generator can be the same as
the sampling time of a chaotic sequence generator. In the multiuser chaotic spread
spectrum communication system, when the frames are sampled, it is required that
the values of chaotic sequences are discrete. So when the 192nd value controlled by
clock arrives, we obtain the chaotic sequence yn , rather than yn+1 , and at this moment
yn = y192,000 . Otherwise chaotic sequence generator cannot work due to the value of
the continuous chaotic sequence. Fcn1 in Figure 5.26 is expressed as
where u(1) represents xn of the Chebyshev map, u(2) is the bifurcation parameter q of
the Chebyshev map, u(3) represents xn+1 of improved logistic map which belongs to
the first chaotic sequence, and u(4) is the sampling time of multiple n.
γ1 d1
1
T sign
Tb b t = iTb
g1(t)
γ2 d2
r(t) 1
T sign
Tb b t = iTb
g2(t)
γm dm
1
T sign
Tb b t = iTb
gm(t)
Figure 5.27: Principle block diagram of the detector of the traditional DS-Code Division Multiple
Access system.
Integrate To
1 and Dump 1
Frame
In1 Out1
time of information code, and it is the same with simulation step. The sampling
number of the buffer module is N.
principle of weighted coefficient is to make the output SNR maximum. The theoretical
basis is that when the multipath time delay exceeds a chip period, multipath signal is
taken as uncorrelated.
More specifically, we assume that the L correlators in the CDMA receiver are used
to capture the L strongest multipath components of the desired codes, and then a
weighted network is used to obtain the combination of the outputs of the L correlators,
which is applied as bits detection of the desired codes as shown in Figure 5.29.
From Figure 5.29, the outputs ci (t) of L correlators are multiplied by weighted coef-
ficients di (t) (where i = 1, 2, . . . , L), respectively, and they are summed to obtain the
total output signal, which is denoted as
L
e(t) = di (t)ci (t), (5.58)
i=1
c2 (t)
di (t) = L i , i = 1, . . . , L (5.59)
i=1 ci (t)
2
Obviously, when the correlator (e.g. correlator i) fades, the energy of output ci is small,
and the corresponding weighted coefficients di also decrease automatically, and it
leads the component in formula (5.59) to decrease.
The simulation model of the Rake receiver is shown in Figure 5.30. Assuming that
the data transmitted in channel appears four multipath transmissions, and the time
delay is 0, 2, 6, and 7, respectively. At the receiver, these multipath signals are done in
the time period corresponding 0, 2, 6, and 7 in advance, and then sum them. Finally,
the equal-gain combining will decrease the BER significantly. The equal-gain combin-
ing means that the various branch signals are summed in the same phase, and the
weighted factors of each branch are equal.
c1(t)
Correlator 1
d1(t)
.
.
.
cp
cL(t)
Correlator L
dL(t)
1
Data Integrate
z–0 and Dump
Integrate +
z–2 and Dump
+
-K- 1
2 -K- +
Integrate Out1
Code and Dump + Normalize
Normalize z–6 Path Gain3
Path Gain2
Integrate
z–7 and Dump
DeSpreader
L
h(t) = !l $(t – 4l )ej6l , (5.60)
l=1
1 Matrix To Row
In1 multiply frame z–[0267] sum -K- 1
Out1
Normalize
Ones(1,p) Separate Path delays Combine path gain
paths paths
Paths
code, and we cannot use XOR operator at this time. Employing multiplication of bi-
polar binary symbols can also realize spreading and de-spreading operation, and can
overcome the shortcomings of the above-mentioned method. During simulation, the
polarity conversion is realized by bipolar to unipolar converter module and unipolar
to bipolar converter module.
+
out3 [In3]
User 3 out5 Receive [In5] Receive
User 5 + 3 5
Figure 5.32: Simulation model of multiuser chaotic spread spectrum communication system.
respectively. The output range of the random integer generator is 2, and sampling time
is 1/192 s, and the sampling number for each frame is 1. The sampling time of chaotic
spread spectrum code is 1/192,000 s, and the sampling number for each frame is 1,000.
The multipath number is 3, and the delay time is 0, 3, and 5, respectively, and the sym-
bol period time is 1/192 s. The symbol period of additive white Gaussian noise channel
is 1/192 s, and the delay number in the receiver is 1. The number of users is 5, and the
simulation time is 10 s. By simulation of the chaotic spread spectrum communication
system, the results are shown in Figure 5.33.
In Figure 5.33, the transmitted signal (a) and received signal (b) are almost
identical, except a little bit delay for the received signal. It is shown that the simulation
system can receive signal correctly.
2
(a)
1
–1
2
(b)
1
–1
0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
Figure 5.33: Waveforms of (a) transmitted signal and (b) received signal.
100 100
Chebyshev Logistic 100
Tent
BER
BER
0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1
x0 x0 x0
Figure 5.34: Relationship curves between the BER of spread spectrum system and the initial value x0
of different maps.
of a sequence should avoid this point when constructing the sequence. From eq. (5.53),
it can be seen that the range of sequence element is (0, 1], namely the sequence ele-
ment of the tent chaotic map cannot be zero. Obviously, the obtained binary sequence
is meaningless at x0 = 0.49, so we do not discuss the case of x0 = 0.49. However,
when the initial value x0 = 0.2401 and x0 = 0.7501, there are peaks that show that the
tent map does have a balance degree peak point and it verifies the conclusion in Fig-
ure 5.24(c). So when the initial value of the sequence is selected, the two values 0.2401
and 0.7501 should be avoided.
100
Logistic
Chebyshev
Tent
Gold
m
BER
10–2
10–4
0 2 4 6 8
SNR
Figure 5.35: BER of spread spectrum system with five kinds of spreading codes.
162 5 Secure Communication Technology Based on Chaos Synchronization
100
Logistic
Tent
Chebyshev
BER
10¯1
10¯2
0 2 4 6 8 10
User number i
Figure 5.36: BER of the system with three kinds of chaos spreading code for different users.
three kinds of spreading codes has little change with the increase in the number of
users. Where the BER of spread spectrum system of Chebyshev map is minimum, the
BER of tent map is maximum. It indicates that the system based on Chebyshev map
has good antinoise and anti-MAI.
10–1
Logistic
Chebyshev
Tent
10–2
BER
10–3
10–4
0 1,000 2,000 3,000 4,000
Sequence length after interception
be destroyed after the sequence is truncated, which also confirms the conclusion of
Table 5.2.
The simulation results show that the multiuser chaotic spread spectrum com-
munication system based on rake receiver has the characteristics of strong anti-
interference ability, low BER, high subscriber capacity, good security and easy to
implement, and it is flexible for model transformation.
The BER performance of the chaotic spread spectrum communication system in
series chaotic map is better than that of a single chaotic sequence and m sequence
of IS-95 standard. Further, the generation of series chaotic sequence is simple, and
it has rich source codes, high security, strong antijamming performance, and similar
random states, which are good to increase the system capacity and reduce the system
complexity.
Questions
1. What are the key technologies in chaotic secure communication?
2. What are the factors that affect the performance of chaotic secure
communication?
3. Try to compare the principle and characteristics of different chaotic switched
communication schemes.
4. Describe the construction and simulation of a multiuser chaotic spread spectrum
communication system.
6 Data Encryption Based on Chaotic Sequence
Chaotic signal has great potential in cryptography with special features like unpre-
dictability, high complexity, easy implementation, and so on. Compared to other
encryption methods, chaotic encryption is a kind of dynamic encryption. The pro-
cessing speed is not related with the key length, so it has high efficiency. It can be
applied in real-time signal processing or static encryption.
Chaos theory began to attract the attention of cryptographic community in the late
1980s. The idea of chaotic encryption was proposed by British mathematician Mat-
thews [49]. On one hand, due to the loss of information in the iteration, the amount
of information is gradually lost to zero, so it is impossible to predict the chaotic se-
quences correctly. On the other hand, the chaotic synchronization is the key to achieve
the correct decryption. Because the computer system can accurately reproduce all
the starting states, the synchronization algorithm of chaotic iterative system can be
realized by computer process synchronization. This is a feature that a physical chaos
model does not have. There is no need to use complex physical chaotic synchroniza-
tion and control method. Therefore, since the 1990s, the chaotic sequence encryption
has become an important research frontier of modern cryptography [112, 124–127].
There are two research directions in chaotic cryptography. One is the chaotic se-
cure communication based on chaotic synchronization. The other is to construct a
new stream cipher and block cipher using chaotic system. In this chapter, we first
discuss the theory of chaotic cryptography, and then we study the data encryption al-
gorithm based on chaotic sequences and explore the application of chaotic sequences
in digital watermarking and image encryption.
and decryption. The security of the sequence is mainly dependent on the key se-
quence. If the key sequence is completely random, it is “one time pad,” which
is not to be deciphered. However, in practice, one-time pad is very difficult to be
realized, so the general encryption and decryption key sequence is pseudo-random
sequence. One-time pad requires the key sequence has a sufficiently long period,
good random statistical property, and greater linear unpredictability, and it also
needs to meet the cipher principle about “diffusion” and “confusion” in the algorithm
design.
For block cipher system, the data sequence x1 , x2 , . . ., is divided into x =
(x1 , x2 , . . . , xm ) groups with the length m, and each group (a vector with the length
m) is converted into equal length data sequence y = (y1 , y2 , . . . , yn ) (a vector with
the length n) with the control of key sequence k = (k1 , k2 , . . . , kt ). The principle dia-
gram of block cipher is shown in Figure 6.2. The difference between block cipher
and the sequence cipher is that each bit of the output is not only related to the in-
put bit of the corresponding time, but also related to the plaintext digital with the
length m. The block cipher has the following advantages. First, the block cipher is
easy to be standardized. Second, synchronization is easy to be achieved for block
cipher. A transmission error of a group data will not affect the others. The loss of a
plaintext–ciphertext group will not affect the decryption of its subsequent groups.
However, the block cipher cannot hide data patterns, and it cannot resist the attack
of replay, embedding, and deletion. General block cipher algorithms include IDEA
and DES.
166 6 Data Encryption Based on Chaotic Sequence
Iteration Circulation
Parameter Key
generated by chaotic system can also be used as a discrete signal after it is made
discrete, and the new Field Programmable Gate Array (FPGA) technology is used to
design the hardware encryption system, which has become a new research hotspot
[130]. In this section, we will discuss the information encryption based on discrete
chaotic system.
Chaos sequence encryption belongs to the sequence cipher system, and its encryp-
tion principle is similar to that of the sequence cipher encryption. The difference is
that the general sequence cipher uses the pseudo-random sequence generated by
the circuit based on the shift registers, while the chaos sequence encryption uses the
chaos sequence generated by chaotic system. In the early stage, the pseudo-random
sequence generator is used to generate the key stream. An attacker can use the cor-
relation analysis method to analyze and reconstruct the pseudo-random sequence
effectively. Now, chaotic system is used to replace the pseudo-random sequence gen-
erator, which destroys the adaptive condition of the correlation analysis, and the
security of the encryption algorithm is enhanced. The encryption principle is shown
in Figure 6.4.
Encryption process is
Y = K ⊕ X, (6.1)
X = K ⊕ Y, (6.2)
The security of chaotic sequence encryption is mainly dependent on the key stream.
In the chaotic encryption system, the random sequence {xi } generated by the chaotic
system is taken as the key flow {ki }, and it does XOR operation with the plaintext
data flow {mi }; thereby the encrypted data stream {ci } is generated. The plaintext
data stream is binary, while there are two ways to produce the key stream {ki }. One
is to use the original chaotic sequence {xi } directly, and the other is to use the pro-
cessed data of the sequence {xi }. The former is actually the direct simulation of chaotic
modulation communication technology, and the latter is the improvement of the
former. There are a variety of processing methods for the original chaotic data by
employing computer technology. For example, thousands of bytes at the beginning
are discarded to overcome the transition process, or the sequence is obtained from
the chaotic sequence according to a certain law, or a compound iterative algorithm is
used to generate random sequences. So the randomness of the processed sequence
will be greatly improved, which improves the anticracking ability of the encryption
system.
The security performance of the encryption system is directly related to the size
of the key space. For chaotic encryption system, many values can be used as a key,
including nonlinear equations, initial values, system parameters, data-processing
mode, and data encoding way. Obviously, the key space is huge, and the security is
good.
A good encryption algorithm not only can resist the brute-force attacks, but also has
the ability of anti-plaintext attack, and superior temporal and spatial performance.
Resisting brute-force attack. The encryption system should have enough key space
to resist the brute-force attack. Taking into account the extreme case, the user pass-
word is assumed to be a byte of all values, and then the number of possible values of
the password is only 256. Assuming that a possible password needs only a second,
it needs only 256 seconds to try all possible passwords. Obviously, the greater the
password scope is, the more difficult the brute-force attack is.
In summary, when we design a chaotic encryption system, the discrete chaotic system
with robustness, zero correlation, mixed property, and large parameter set should be
given priority. Although these five conditions cannot contain all security content, it
is very high threshold for chaotic encryption. Strictly speaking, among the existing
chaotic systems, no one is the safe chaotic system. Sheng et al. [88] proposed the
170 6 Data Encryption Based on Chaotic Sequence
elliptic chaotic system based on tangent delay, which has the above five conditions.
However, this chaotic system is too complicated, and its mechanism also needs to be
studied further. At present, Logistic map and its improvement have very good security
features.
where , ∈ (0, 4], xn ∈ (0, 1). The Lyapunov exponent of the system with the parameter
varying is shown in Figure 3.2. When, , ∈ (3.5699 . . . , 4], it is chaotic.
For an encryption communication, both the initial value sensitivity and random-
ness of the signal are important. The stronger sensitivity and better randomness can
lead to higher security. These characteristics can be described by probability statistics,
mean value, autocorrelation, and cross-correlation, as shown in Section 3.1.1.
For Logistic map, when , = 4, the mean value of the chaotic sequence is constant,
and the autocorrelation is delta function and the cross-correlation is zero. Its probab-
ility statistics property is similar to that of the white noise with zero mean (as shown
in Figure 6.5). So the Logistic map is suitable for information encryption. In addition,
Logistic map basically satisfies the definition of the secure chaotic system. Therefore,
Logistic map can be applied in digital communication and multimedia security.
To encrypt digital signal, we need to turn the real number sequence {xk } to pseudo-
random sequence [134], which is taken as a key sequence. The simplest way is to
obtain a new integer by selecting a few digits after the decimal point of the xk . The
encryption/decryption model based on Logistic map is shown in Figure 6.6.
Based on the model above, an encryption algorithm is designed, and the flow
chart is shown in Figure 6.7. Taking into account the randomness and encryption
speed, we chose the interval of pseudo-random sequence number N = 5. yi is 4th,
6.2 Data Encryption Algorithm Based on Chaotic Sequence 171
15
10
ρ(x)
0
0 0.5 1
x
Plaintext Bi
Xi Yi Ki Ci
Iterative Get new integer by Yi mod 256 XOR
M times taking out N bits
Encryption
Channel
Decryption
Secret channel
Setting initial Generate key XOR
value (key) sequences
Plaintext
5th, 6th, bit following the decimal point of xi , which can improve the ability to resist
plaintext attack. In order to decrease the influence of the transition process, it is ap-
propriate to discard the previous 2,000 iterations. In addition, it is difficult for users
to remember the password with two floating-point values, so the first step includes a
process of mapping the strings remembered by the user to x0 and ,. The encryption
algorithm is presented as follows:
1. Initialize the Logistic map, and set the key x0 and ,.
2. Iterate Logistic map for 2,000 times.
3. yi is gotten by taking the 4th–6th bit of xi .
4. Key sequence is obtained by yi mod 256.
5. Do XOR operation with the plaintext or ciphertext.
6. Judge whether encryption/decryption is complete; if it is incomplete, repeat steps
3–5 after 5 iterations of Logistic map. Otherwise, exit encryption system.
172 6 Data Encryption Based on Chaotic Sequence
Start
XOR operation
Y
Completed?
N
Read laintext/ciphertext
Iteration 5 times
mod 256
Exit
End
Based on the proposed encryption model and encryption algorithm, we developed the
data encryption software by using VC.Net in Visual Studio.NET tool. VS.Net is a com-
plete tools for the generation of Web ASP applications, Web services XML, desktop
applications, mobile applications, etc. Programming languages use the functions of
the .NET framework, which provides access to key technologies to simplify the de-
velopment of Web ASP applications and Web services XML. VS.Net employs MFC
(Microsoft Foundation Classes) program method. It makes full use of the advantages
6.2 Data Encryption Algorithm Based on Chaotic Sequence 173
Encryption/decryption
module (EncFile.dll)
of oriented object technology for which there is little need to be concerned about the
implementation details of an object when we are programming. At the same time,
the strong function of the various objects in the class library can complete most
of the program functions, and it effectively ensures that the program is good for
debugging.
We use Microsoft Visual C++ to develop the core algorithm. The software size is
controlled within 1.5M for facilitating users to download. This software is composed
of the main control module, the chaotic key sequence generation module, and the file
encryption/decryption module. The secret relationship among the modules is shown
in Figure 6.8.
Cancel
Decryption Cancel
Cancel
Ensure
Ensure
Cancel
Decrypted
Encrypted
Ensure
Error
Error
It is a quadratic equation with one unknown. If the interval number is N, then the
relationship between xn and xn+1 becomes one-dimensional equation of N degrees.
Theorem 6.1: If the chaotic sequence is completely random, the encrypted data is
subject to the uniform distribution.
176 6 Data Encryption Based on Chaotic Sequence
Proof. The plaintext and chaotic (key) sequence is considered as a byte of data stream,
and we take a byte of plaintext m and key k randomly from them. Supposing that the
value of m is different, that is, the probability is unequal for one bit to be “0” or “1,”
then the appearance of “0” or “1” is independent. If the probability of “1” is p, then the
probability of “0” is 1–p. The chaotic (key) sequence satisfies the performance of white
noise for the ideal state; that is, “0” or “1” appearing at each bit has the same probab-
ility of 0.5, and then the probability of appearing “1” in the ith bit of ciphertext c is
(a) (b)
(c) (d)
Figure 6.10: Image encryption results: (a) original image; (b) encrypted image; (c) correct decryption
image; and (d) decryption image with key change for 10–14 .
Aiming at the defects of various chaotic sequence generators, many researchers have
put forward the improvement schemes, which mainly include the following two
methods.
Binary image processing algorithm is simple and easy to understand and realize, and
has fast calculation speed and other features. A lot of digital watermarking system
uses binary image as the watermark information, so the watermark is more intuitive.
Here, TD-ERCS chaotic map is used to encrypt the watermark image.
If W is a binary watermark image, and the pixel size is M ×N, the encryption algorithm
is as follows:
1. Taking TD-ERCS system parameters (,, x0 , !, m) as the key, chaotic sequence is
generated by eq. (3.17). Sequence {xn } is composed of M × N/52 numbers gen-
erated by the chaotic sequence (Considering security, the initial segment of the
sequence is not used).
2. Binary sequence {bi } is obtained from f , 1 ≤ i ≤ M × N.
3. The binary watermark image is encrypted with the binary sequence {bi }; encryp-
tion operation is
where ⊕ is XOR operation. At the receiving end, input the same key, and by
repeating the encryption algorithm, the image can be decrypted correctly.
The security of encryption algorithm mainly depends on the key, while the key has a
great relationship with the key space, the key sensitivity, and the complexity of the
algorithm. Here we discuss the security of the algorithms.
1 bit
11 bits 52 bits
s e f
0 63
Figure 6.12: Image encryption and decryption: (a) original image; (b) encrypted image; and
(c) decrypted image with correct key.
Figure 6.13: Decrypted image with wrong keys: (a) , deviation with 10–16 ; (b) x0 deviation with 10–16 ;
(c) ! = 1, 001; and (d) m = 10.
image. Figure 6.12(b) is the encrypted image, and Figure 6.12(c) is the decrypted im-
age with correct key. Figure 6.13 shows the sensitivity to the key. For decryption, the
original watermark images are unable to be decrypted with small deviation of the key.
It can be seen from the experiment results that this algorithm is very sensitive to
the key. If a slightly modified key is used to decrypt the cipher image, the decryption
fails completely. The key contains four dependent parameters: ,, x0 , !, m. ,, and x0
are in real numbers. So the algorithm is secure with large key space.
G(x, y) – G(xi′ , yj′ )
i,j
GD(x, y) = , (6.9)
4
where G(x, y) is the gray value of (x, y). G(xi′ , yj′ ) is the gray value of (x, y) at the four
positions: up and down, and left and right.
6.3 Binary Watermark Image Encryption Algorithm Based on Chaos 181
If the size of the image is M × N, the average adjacent pixel difference of the image is
described as
N–1
M–1
GD(x, y)
x=2 y=2
E(GD(x, y)) = , (6.10)
(M – 2) × (N – 2)
where E and E′ are the average adjacent pixel difference before and after scrambling,
respectively. The range of GDD is (–1, 1). The larger the range is, the better the image
scrambling is.
Figure 6.14 presents three binary images, and the sizes of them are 64 × 64. The
evaluation of adjacent pixel scrambling is listed in Table 6.2.
E(GD(x, y)) is the average adjacent pixel difference of original image I. The value
of E(GD(x, y)) is about 0.1, which shows that the original image has large pixel val-
ues in close smooth area, and the average gray difference of adjacent pixels is small.
E′ (GD(x, y)) is the average adjacent pixel difference of encrypted image I ′ . In Table 6.2,
E′ (GD(x, y)) is greatly different from E (GD(x, y)), which indicates each pixel tends to
have random distribution, and the average adjacent pixel difference varies greatly.
GDD (I, I ′ ) is larger than 0.5, which illustrates that the adjacent pixel scrambling
degree is bigger, and the encryption effect is very well.
Figure 6.14: Binary images: (a) image a; (b) image b; and (c) image c.
⎧
⎪
⎨ 2 (km = 0)
m= 4 (km = 1) . (6.12)
⎪
⎩ k + 3 (2 ≤ k ≤ 4095)
m m
If the computer word is 32 bits, and the precision (floating-point number) is 10–9 , then
the key space is about 1027 × 212 ≈ 1030 , which is large enough to resist brute-force
attacks.
The results of experiments and performance analysis show that the binary im-
age watermarking encryption algorithm based on the TD-ERCS map is good with large
key space, high key sensitivity, and high security. Therefore, if the encryption al-
gorithm is applied to the watermarking algorithm, it can ensure the security of the
watermark.
Wavelet transform is an ideal mathematical tool for local analysis, which has been
widely used in signal analysis, speech synthesis, image recognition, computer vision,
data compression, seismic exploration, and atmosphere and ocean analysis.
then 8(x) is called a basic wavelet. 8(x) is similar to impulse response of a band-pass
filter. Assuming that a and b denote expansion and translation operation of 8(x), re-
spectively, then by the translation and expansion of the basic wavelet, the wavelet
basis functions can be generated as
1 x–b
8a,b (x) = √ 8( ), (6.14)
a a
where a ∈ R, b ∈ R, a > 0.
If f (x) is a square integrable function, and f (x) ∈ L2 (R), then the continuous wavelet
transform of f (x) is defined as
∞
Wf (a, b) = f , 8a,b (x) = f (x)8a,b (x)dx. (6.15)
–∞
It indicates the decomposition of f (x) on function Wf (a, b), and it also can be con-
sidered as f (x), which is filtered by using a band-pass filter. The wavelet inverse
transform definition is
∞
∞
1 da
f (x) = wf (a, b)8a,b (x)db 2 . (6.16)
C8 0 –∞ a
It should be noted that 8a,b (x) is not orthogonal, and it has very large redundancy. In
addition, the basic wavelet is not unique.
The scaling function 6(x) can be treated as a low-pass filter, while the wavelet function
8(x) is the high-pass filter of the same layer, and the function set is
8lj,m,n (x, y) = 2j 8l (x – 2j m, y – 2j n) , j ≥ 0, l = 1, 2, 3. (6.19)
It is the standard orthogonal on the basis of L2 (R2 ), and j, l, m, and n are integers.
f0 (x, y) is an image with the size N × N, and N is the power of 2. j is resolution
parameter, and the scale is 2j . When j = 0, the scale of the original image is 1, and it
is a resolution signal for zeroth layer. The resolution reduces by halve with the value j
increasing by 1.
The two-dimensional discrete wavelet transform of an image is carried out as fol-
lows. In each layer of the transformation, the image is decomposed into four small
images with same size. Each of them is obtained by the inner product of original im-
age with a basic wavelet and 2 times interval sampling in x and y directions. The first
layer (j = 1) wavelet transform is
⎧
⎪
⎪ f10 (m, n) =< f0 (x, y), 6(x – 2m, y – 2n) >
⎪
⎪
⎪
⎨f 1 (m, n) =< f (x, y), 81 (x – 2m, y – 2n) >
1 0
. (6.20)
⎪
⎪ f1 (m, n) =< f0 (x, y), 82 (x – 2m, y – 2n) >
2
⎪
⎪
⎪
⎩f 3 (m, n) =< f (x, y), 83 (x – 2m, y – 2n) >
1 0
For the transformation of subsequent levels (j > 1), four same interval samplings and
filter operation are performed at each layer. fj0 (x, y) is decomposed into four smal-
ler images on the scale of 2j+1 in the same way. The inner product in the form of
convolution is
⎧
⎪
⎪ fj+1
0
(m, n) = [fj0 (x, y)6(–x, –y)](2m, 2n)
⎪
⎪
⎪
⎪
⎨f 1 (m, n) = [f 0 (x, y)81 (–x, –y)](2m, 2n)
j+1 j . (6.21)
⎪
⎪ f 2 (m, n) = [f 0 (x, y)82 (–x, –y)](2m, 2n)
⎪
⎪ j+1 j
⎪
⎪
⎩f 3 (m, n) = [f 0 (x, y)83 (–x, –y)](2m, 2n)
j+1 j
Because the scaling function and the wavelet function are separable, each convolu-
tion can be decomposed into one-dimensional convolution on the row and column
6.4 Color Image Watermarking Algorithm Based on Chaotic Map and Wavelet Transform 185
f 0 (x, y)
j+1
h0(–x) 2
h0(–x) 2
f 1j + 1(x, y)
h1(–x) 2
f 0j (x, y)
f 2 (x, y)
j+1
h0(–x) 2
h1(–x) 2
f 3j + 1(x, y)
h1(–x) 2
f 0j (x, y)
+1
2 h0( x )
+ 2 h0( x )
f 1j + 1(x, y)
2 h1( x ) f 0j (x, y)
4
f 2j + 1(x, y)
2 h 0( x )
+ 2 h1( x )
f 3j + 1(x, y)
2 h1( x )
of fj0 (x, y), as shown in Figure 6.15. h0 is the low-pass filter, and h1 is the high-pass
filter. ↓2 is two times sampling, and fj+10
(x, y) is the low-frequency components after
wavelet decomposition.fj+1 (x, y), fj+1 (x, y), and fj+1
1 2 3
(x, y) are the high-frequency detail
components of horizontal, vertical, and diagonal directions, respectively.
Obviously, the wavelet transform of the image is to filter the image in the hori-
zontal and vertical directions by using the filter module. At each level, fj0 (x, y) contains
the low-frequency approximation components of the previous layer. fj1 (m, n), fj2 (m, n),
and fj3 (m, n) contain the high-frequency detail components of horizontal, vertical, and
diagonal directions, respectively.
Similarly, the two-dimensional inverse wavelet transform of the image is shown
in Figure 6.16, where ⊕ represents convolution.
LL3 HL3
HL2
LH3 HH3
HL1
LH2 HH2
LH1 HH1
Figure 6.17: Three-level wavelet decomposition of image; (a) original image; (b) three-level wavelet
decomposition; and (c) three-level wavelet decomposition structure.
decomposition, the low-frequency band LL3 is the best approximation of the original
image under the largest scale and minimum resolution decided by wavelet trans-
form decomposition series. Most energy of the image is centered in the low-frequency
band. High-frequency band series are the details of image at different scales and
different resolution. These bands are not unrelated from the perspective of multiresol-
ution. For each high-frequency band, they are described from being coarse to fine
for the same edge, contour and texture information of an image in different direc-
tions, different scales, and different resolutions, and there are some relations between
them.
Compared with other transforms, the image watermarking algorithm based on
wavelet transform has many good characteristics, such as spatial scale localization,
multiresolution representation, adaptation to human visual system, different spa-
tial support region, large selectivity, meeting the demand of security, and simple
calculation.
TD-ERCS
Color image embedded
with watermarking
According to eq. (6.22), the watermark is embedded into the blue component of the
color image.
After the blue component of the color image is decomposed by three-level wavelet,
a low-frequency band and nine high-frequency bands are obtained. The watermark
can be embedded into the low-frequency part or the high-frequency part of the wavelet
188 6 Data Encryption Based on Chaotic Sequence
domain [139]. Here, the encrypted watermark is randomly embedded into the four sub-
bands of three-level wavelet decomposition in the blue component. The watermark is
spread to the deepest frequency and high-frequency coefficients of the three level-
wavelet decomposition.
Compared to other orthogonal wavelet bases, the Harr wavelet has some advantages
as follows:
1. The support length is the shortest.
2. The computation complexity of decomposition and reconstruction is lower than
that of other wavelets, and it results in the rapid implementation.
3. When the Mallat algorithm is used, the boundary extension is not required. There
is no edge effect due to the limited length of the image signal.
4. When the image is divided into several mutual disjoint image blocks with the same
size, each image block has a corresponding independent wavelet block, and these
wavelet blocks do not intersect each other.
Based on the discussion above, we select Haar wavelet as the wavelet basis function.
where x mod 1 means only the decimal part of x is obtained. The phase space of (xn ,
yn ) is limited in [0, 1] × [0, 1]. The matrix form of eq. (6.24) is
6.4 Color Image Watermarking Algorithm Based on Chaotic Map and Wavelet Transform 189
xn+1 11 xn xn
= mod 1 = C mod 1, (6.25)
yn+1 12 yn yn
where C is a matrix, and |C| = 1. So Arnold map is a guaranteed area map. At the same
time, the Arnold map is the one-to-one map. That is, each point in the unit matrix
uniquely transforms to the other point within the unit matrix.
Now, we generalize the phase space of the Arnold map to be {0, 1, 2, . . . , M – 1} ×
{0, 1, 2, . . . , M – 1} and generalize the equation to be two-dimensional reversible area
preserving equation, which is described as
xn+1 ab xn xn
= =C mod M, (6.26)
yn+1 cd yn yn
where a, b, c, and d are positive integers, and the area preserving requires |C| = ad–
bc = 1. Based on the condition, only three parameters of a, b, c, and d are independent.
The generalized Arnold map is still chaotic. We use the generalized Arnold map
to generate the embedding position of the watermark. Taking the pixel coordinates
(x, y) of the watermark image as initial values, and taking the three independent para-
meters and iteration number k of the coefficient matrix C as the key, the generated
iterative results (x′ , y′ ) are used as the embedding position of the watermark in (x, y).
When iteration number is large enough, the corresponding embedding position will
be greatly separated for any two adjacent watermark pixels.
5. Embed watermark. The watermark pixels are embedded into the selected wavelet
coefficients according to
′ f (p, q) + ! ⋅ w′ (i, j), (=0
f (p, q) = , (6.27)
f (p, q) + " ⋅ w′ (i, j), ( = 1, 2, 3
where f (p, q) is the original wavelet coefficient. f ′ (p, q) is the wavelet coeffi-
cient after embedding watermark. ( = 0, 1, 2, 3 represent wavelet coefficients of
low-frequency, horizontal, vertical, and diagonal directions, respectively. ! and "
indicate the intensity of embedding watermark, which is determined by the spe-
cific watermark and the original image, and it needs trade-off between invisibility
and robustness of the watermark.
6. Repeat steps (4) and (5) until all the watermark pixels are embedded. After the
three-level wavelet inverse transform is carried out by employing all the wavelet
coefficients, the blue component image with embedded watermark is obtained.
Finally the color image embedded with watermark is obtained.
where wm ′ is the mth extraction watermark pixel. f (p, q) is the wavelet coefficients
Based on Matlab platform, the watermark embedding and extraction is carried out on
24 bits true color Lena image with the size 512 × 512. The watermark image is the binary
image “ ” with the size 64 × 64. The embedding strength is ! = 41 and " = 59.
6.4 Color Image Watermarking Algorithm Based on Chaotic Map and Wavelet Transform 191
where X ′ (i, j) is the image with embedded watermark, and X(i, j) is the original image,
0 < i, j ≤ N. The bigger the PSNR is, the better the invisibility is.
The robustness evaluation is between the original watermark W and the extracted
watermark W ′ . Here, the methods of visibility and normalized correlation coefficient
(NC) are employed.
Visibility is evaluated by observing the difference between the original watermark
and the extracted watermark. Normalized correlation coefficient is defined as
′
W (i, j)W(i, j)
i,j
NC = , (6.31)
W 2 (i, j)
i,j
where W ′ (i, j) is the extracted watermark, and W(i, j) is the original image. Obviously,
0 ≤ NC ≤ 1. The greater the NC is, the better the similarity between the original
watermark and the extracted watermark is.
6.4.3.1 Invisibility
First, we test the invisibility of the watermark. Figure 6.19(a) is the original image,
and Figure 6.19(c) is the embedded watermark image. Obviously, human eyes cannot
distinguish the difference between them. The embedded watermark image has good
subjective quality. The PSNR of the embedded watermark image is 38.8074 dB with
good objective quality. Figure 6.19(b) is the original watermark, and Figure 6.19(d)
is the extracted watermark. The normalized correlation coefficient NC = 1, which
illustrates that the two watermarks are identical.
6.4.3.2 Robustness
The robustness of watermarking algorithm is to test the anti-attack ability. The
sharpening, distortion, histogram equalization, contrast enhancement, and mosaic
effect are completed by Photoshop CS3 Adobe.
(a) (b)
(c) (d)
Figure 6.19: Watermark invisibility experiment: (a) original image; (b) original watermark;
(c) embedded watermark image; and (d) extracted watermark.
Q 100 90 80 70 60 50 40 30 20
NC 1 1 0.9489 0.9221 0.8759 0.8005 0.7178 0.6350 0.4915
its range is 0 ∼ 100. The larger the Q is, the less compression distortion the im-
age is. NC is the normalized correlation coefficient. The watermark images with
Q = 70, 50, and 30 are extracted as shown in Figure 6.20. It can be seen that
when Q varies from 100 to 50, NC is bigger than 0.8, which means the watermark
image and the original watermark image are basically the same. The extracted
watermark is still clearly distinguished when Q = 30. So the algorithm has strong
ability of resisting JPEG compression.
Figure 6.21 shows the noise attack test results. Figure 6.21(a) illustrates the wa-
termark image and the extracted watermark from the 2% Gauss noise attack.
6.4 Color Image Watermarking Algorithm Based on Chaotic Map and Wavelet Transform 193
Figure 6.20: Watermark image extracted from JPEG compression: (a) Q = 70; (b) Q = 50; and
(c) Q = 30.
(a)
(b)
Figure 6.21: Experiments of antinoise attack: (a) watermark image and the extracted watermark from
the 2% Gauss noise attack and (b) watermark image and the extracted watermark from the 4%
salt-and-pepper noise attack.
The watermark image and the extracted watermark from the 4% salt-and-pepper
noise attack are shown in Figure 6.21(b). The quality of the image has been
seriously degraded, but we can still extract a clear watermark image. So the
algorithm has a strong ability to resist noise attack.
194 6 Data Encryption Based on Chaotic Sequence
Figure 6.22: Anti-filtering attack experiment: (a) extracted watermark after low-pass filtering
experiment; (b) extracted watermark after median filtering experiment; and (c) extracted watermark
after high-pass filtering experiment.
The result of an anti-filtering attack is shown in Figure 6.22. When low-pass fil-
tering, median filtering, and high-pass filtering are finished, the NC values are 1,
0.9976, and 0.9951, respectively.
(4) Anti-cutting attack
This algorithm is strongly robust to cutting. Figure 6.23 is the watermark image
and the extracted watermark after cutting 1/4 or central 15% cutting. The NCs of
Figure 6.23(a) and Figure 6.23(b) are 0.7956 and 0.8637, respectively.
Besides the JPEG compression, noise attack, filtering attack, shear attack, rotation at-
tack, and other common noise processing and attack, this algorithm can also resist
histogram equalization, contrast enhancement, USM sharpening, distortion, mosaic
effect, and some joint attacks. The experiment results are shown in Table 6.4.
(a)
(b)
Figure 6.23: Anti-cutting attack experiment: (a) watermark image and the extracted watermark with
1/4 cutting of upper left corner and (b) watermark image and the extracted watermark with central
15% cutting.
Figure 6.24: Anti-rotation attack experiments: (a) watermark extracted from rotation with 0.2
degree; (b) watermark extracted from rotation with 0.4 degree; and (c) watermark extracted from
rotation with 0.6 degree.
recent years. For designing a chaotic scrambling scheme, we should choose a suitable
chaotic map. We think the following factors should be considered:
1. Lyapunov exponent should be as large as possible. If the Lyapunov exponent is
larger, the system is more sensitive to the initial value, and it is more suitable for
image encryption.
2. Control parameters should be as much as possible. For the chaotic cipher system,
parameters are often used as key. Large parameter space can ensure a large key
space to resist the brute-force attack.
3. Chaos map should be a reversible one-to-one map to ensure the scrambling
transformation is reversible.
4. High-dimensional map should be given priority. If the system structure of high-
dimensional chaotic system is more complex, then it can change the correlation
between pixels more effectively.
When choosing the encryption parameters, the structure and characteristics of the
chaotic system need to be fully investigated. For example, the weak key should be re-
moved, and the parameters range should be determined, and the key space should
be as large as possible. The chaotic maps usually applied in image encryption in-
clude Kolmogorov flow, two-dimensional Cat map, and two-dimensional Baker map.
Some scholars extend the two-dimensional map to the three-dimensional map. When
the three-dimensional map is used to scramble pixel, the scrambling speed becomes
faster.
In the chaotic scrambling, the sensitivity to initial conditions corresponds to
chaotic plaintext sensitivity. The larger the location of the plaintext varies, the smal-
ler the correlation between the two adjacent pixels is. So it is more difficult to attack
by analyzing the correlation of pixels. Besides chaos-based pixel scrambling or spa-
tial scrambling, we can also use chaotic sequences to scramble rows and columns of
the image. Most image scrambling is carried out in the space domains. Scrambling
damages the relationship between pixels in the image encryption, but it increases
the encoding difficulty and reduces the compression rate. So there is a problem:
How to combine image scrambling encryption with image compression effectively at
present?
diffusion. One is the diffusion of 4 adjacent gray values in the image. The diffusion
range increases by the power exponent of 4 with the increase of scrambling cycles.
The other is the raster scanning. The diffusion speed is fast. It is realized by “mod and
add” operation. The “mod operation” is designed to control the results in the range of
pixel values, while the “add operation” is to achieve the transmission function by tak-
ing the former change to the next operation. The diffusion process can be expressed
as
where Pi is the pixel value before diffusion. Ci is the pixel value after diffusion. L is the
pixel gray value. To enhance the randomness of bit distribution, the XOR operation
and chaotic sequence are generally introduced in diffusion algorithm, and then eq.
(6.32) is rewritten as
where li (i = 1, 2, . . .) is the processed chaotic sequence, which limits the range of pixel
gray values. In recent years, the encryption scheme based on chaotic sequence is also
developed rapidly. One-dimensional chaotic system is used widely, such as logistic
map and PLCM map. But research results show that the security of the encryption
based on low-dimensional chaotic systems is not high enough [140, 141]. Researchers
have begun to focus on the high-dimensional chaotic systems.
Decryption is the symmetric inverse transform of encryption. The random dis-
tribution of the diffused image makes statistics attacks difficult. Plaintext sensitivity
corresponds to the diffusion rate, and key sensitivity corresponds to the initial value
sensitivity of the diffusion function.
After constructing a chaotic cipher system, it is necessary to carry out the cipher ana-
lysis and use cipher attacks to test the security of the system. Even passing all the
known cipher attacks, the cipher system is not completely secure.
In this section, a new image encryption scheme based on one-way coupled map lattice
(OCML) and TD-ERCS chaotic system is studied. It combines pixel position scrambling
with gray value substitution.
where 0 ≤ + ≤ 1, the initial value is a random number at (0, 1). If the entire OCML
system satisfies the periodic boundary conditions xn (0) = xn (L), the space sequences
and time sequences of the whole system are chaotic.
(a) (b)
(c) (d)
Figure 6.25: Image scrambling experiments: (a) original image; (b) scrambled image; (c) original
image; and (d) scrambled image.
The column scrambling of the image matrix is finished by the same way. Because spa-
tiotemporal chaos is chaotic in time and space, each scrambled row and column are
satisfied with a good random. Figure 6.25 shows the scrambling results of two different
images. It can be seen that the scrambled image does not have any outline of the
original image by a round row-and-column scrambling.
the OCML system, respectively. The whole encryption system has five keys +, ,, x0 , !,
and m, so the key space is large.
where I(i) is pixel gray value of the image. C(i – 1) is the former encrypted ciphertext
pixel value, and C(i) the later encrypted ciphertext pixel value.
If L1 (i) ⊕ L2 (i)is an even number, the decryption process is
TD-ERCS
OCML
(M iterations) λ
Seed
parameters
Time
Spatial sequence N L1, L2
sequence M
Plaintext Ciphertext
Row Column
Diffusion
scrambling scrambling
Step 2 Set +, and assign the two normalized sequences generated in Step 1 to ini-
tial values and coupling coefficients of OCML system with M order. The OCML
system iterates N times.
Step 3 Row scrambling by time series with the length M.
Step 4 Column scrambling by space series with the length N.
Step 5 Get L1 and L2 from the OCML system. Do diffusion by employing the algorithm
above.
Steps 3 and 5 can be repeated several times to get higher security. In fact, it can get a
good effect with one-time encryption.
Decryption is the inverse process of the steps above.
cov(p, q)
r= , (6.40)
D(p)D(q)
where p and q are gray values of the two adjacent pixels in the image, and
cov (p, q) = E(p–E(p)(q–E(q)) is the covariance, where D(p) and D(q) are the
variances. The correlations are calculated by randomly selecting 1,000 pair
adjacent pixels from horizontal, vertical, and diagonal directions of the im-
age, respectively. Table 6.5 lists the correlation coefficients of the original
6.5 Chaotic Image Encryption Algorithm 203
800
700
600
500
400
300
200
100
0
0 50 100 150 200 250
(a) (b)
600
500
400
300
200
100
(c) (d)
Figure 6.27: (a) Original image; (b) histogram of the original image; (c) encrypted image; and
(d) Histogram of the encrypted image.
image and its encrypted image. The correlation coefficients of the encrypted
images are very small, which indicates that no detectable correlations ex-
ist between the original image and its corresponding cipher image. The
diffusion of the algorithm is good.
(2) Key sensitivity analysis. A good image encryption algorithm should be suffi-
ciently sensitive to the encryption key and the plaintext. We test several images
204 6 Data Encryption Based on Chaotic Sequence
600
500
400
300
200
100
Figure 6.28: Key sensitivity analysis results: (a) encrypted image with , = 0.73120000001 and
(b) histogram of the decrypted image.
to prove the sensitivity of the algorithm to the key. In this encryption experi-
ment, the Lena image is encrypted with the initial values + = 4, , = 0.7312,
x0 = 0.5654, ! = 0.9876, and m = 9. Figure 6.28(a) is the decrypted image with
, = 0.73120000001, the other keys being unchanged. Figure 6.28(b) is the histo-
gram of the decrypted image. It can be seen that the decrypted image is totally
different from the original image with the key , varying by 10–11 . The histogram
is still uniform. So this algorithm is sensitive enough to the key.
For a given key, the encryption of different images will generate different
ciphertext. The diffusion operation ensures that even the change of a single
pixel will cause a dramatic effect on the whole text, and the encrypted im-
age is completely different. So the algorithm is also sensitive enough to the
plaintext.
(3) Analysis of anti-brute-force attack. The password is binary sequence K, K =
k+ ku kx0 k! km , where the k+ , ku , kx0 , k! , and km are used to generate floating-point
number +, ,, x0, and ! and integer m. If the length of km is 12 bits, then m is
obtained by
⎧
⎪
⎨ 2 (km = 0)
m= 4 (km = 1) . (6.41)
⎪
⎩ k + 3 (2 ≤ k ≤ 4095)
m m
If the word “length” in the computer is 32 bytes, and the precision is 10–14 , then the
key space is 1056 × 212 ≈ 1059 . The key space is large enough to resist the brute-force
attack.
The experiments above show that the new image encryption scheme based on
OCML and TD-ERCS chaotic system has excellent diffusion and disturbance character-
istics. In this scheme, the security of the algorithm can be ensured by the combination
Questions 205
of the random row–column scrambling with changing pixel gray value. The key space
is large enough to resist the brute-force attack, and the encrypted image is greatly
sensitive to the keys and the plaintext. The algorithm is able to encrypt the images of
any size quickly.
Questions
1. What is chaotic cryptography? What are the differences between chaotic crypto-
graphy and traditional cryptography?
2. Analyze the principle of chaotic encryption/decryption.
3. Design a chaotic pseudo-random sequence generator.
4. What are the performance-testing methods of chaotic pseudo-random sequence?
7 Audio and Video Chaotic Encryption
and Communication Technology
Although the sequence cipher system, block cipher system, and public key cryptosys-
tem can be used for encryption of digital signal, researchers have certain requirements
for the real time and quality (measured by bit error rate) of information transmission
in practice. Therefore, an appropriate cryptosystem must be selected according to the
7.1 Principle of Real-Time Voice Encryption Communication 207
Figure 7.1: Principle block diagram of digital encryption and communication system.
208 7 Audio and Video Chaotic Encryption and Communication Technology
where M(n) is the voice sequence, E(n) is the chaotic sequence, S(n) is the ciphertext
sequence, and ⊕ is the XOR operator.
The decryption process at the receiver is the inverse process of encryption, i.e.
E(n) D(n)
Figure 7.2: Principle block diagram of the voice chaotic encryption system.
7.1 Principle of Real-Time Voice Encryption Communication 209
where R(n) is the ciphertext on the receiving side and R(n) = S(n) for an ideal channel.
D(n) is the chaotic sequence on the receiving side. M ′ (n) is the decryption output.
Obviously, when both sides of the system are synchronized, i.e. D(n) = E(n), then
M ′ (n) = M(n). So the voice encryption communication is achieved.
Obviously, the key of realizing the encryption communication is to realize the
synchronization of chaotic sequence generators between the receiver and the sender.
Because the object of computer processing is digital signal, the existing analog
synchronization method cannot meet the requirements of network transmission. Com-
bined physical synchronization with computer programming techniques, the equal
interval drive synchronization method is proposed, which is suitable for computer
network communication. Theory analysis and experimental results show that this
method has strong fault tolerance capability.
Cipher synchronization is the key technology in the digital real-time encryption and
communication system. In practice, to ensure the strict consistency of the start-
ing points of system communication on the encryption and decryption sides, the
cipher synchronization must be established before encryption and communication.
The order of cipher synchronization is shown in Figure 7.3.
First, bit synchronization is set up for the system. It can be realized by the
clock provided by the source terminal or channel transmission device, and also can
be achieved by extracting the clock from the source terminal or the digital stream
provided by the transmission device. Second, cipher synchronization is established.
After the establishment of bit synchronization of communication system, the sender
sends the cipher synchronization signal (including the synchronization head and the
message key) to the other side to make the cipher generator of two sides to work
synchronously. For some real-time encryption communication systems, it needs to es-
tablish frame synchronization (group synchronization) before the establishment of
cipher synchronization. Finally, ciphertext sequence is transmitted. After the code
synchronization signal of the sending side is transmitted, the ciphertext sequence is
transmitted immediately. The encrypted sequence is obtained by the corresponding
encryption algorithm, which is based on the same message key as the receiving side.
Receiver extracts the message key from the cipher synchronization signal and injects
it into the cipher generator. Simultaneously, the cipher generator generates the cipher
sequence, which makes the decryption cipher sequence and the encryption cipher
sequence to work in the synchronized state.
Cipher synchronization methods include continuous synchronization, unique
initial synchronization, self-synchronization, and special synchronization. In this sec-
tion, a continuous synchronization method is adopted to realize the cipher synchron-
ization of encryption communication. The continuous cipher synchronization is to
send a cipher synchronization signal with a fixed interval, and it has advantages, such
as allowing the lag to enter, plaintext beyond function and multiple communication
ways. It is worth noting that the transmission cipher synchronization information may
reduce the transmission rate, but the security and reliability of system are improved.
where M is the plaintext and C is the ciphertext. This encryption mode extends the
key space into 168 bits. In the second mode, k1 is used to encrypt the 64-bit plaintext.
Then the result is decrypted by k2 . Finally, k3 is used to encrypt the decryption result.
This pattern is called DES-EDE, which is expressed as
where M is the plaintext and C is the ciphertext. This encryption mode extends the
key space into 112 bits. In the encryption process, secrete keys k1 , k2 , and k3 have three
options as follows.
7.2 Real-Time Data Stream Encryption Algorithm 211
1. k1 , k2 , and k3 are independent of each other, and they are different from each other.
2. k1 and k2 are different, but k3 is same with k1 .
3. k1 , k2 , and k3 are same, and this way is equivalent to the standard DES.
Here, we adopt the second mode of 3DES, and the second way of secrete key. The
encryption model is shown in Figure 7.4. 64-bit data is encrypted with k1 to obtain the
ciphertext first. Then k2 is used to decrypt the result to obtain “plaintext,” and then
k3 (k1 ) is used to encrypt the decryption results. Obviously, after removing the bits
of eight times from the 128-bit secrete key, there are 112-bit secrete key, and the key
space is 2112 . The only disadvantage of this method is that three times ordinary DES
encryption of the algorithm spends about three times implementation time. But it is
acceptable for very cheap computing resource at present.
Chaotic dynamics system can be used in many application fields, such as digital
communication and multimedia data security [151].
Similarly, logistic map studied in the sixth chapter is defined as
xn+1 = , × xn × (1 – xn ), (7.5)
where , ∈ (0, 4] and xn ∈ (0, 1). When 3.5699 . . . < , ≤ 4, it is chaotic. Accord-
ing to the statistical analysis in Section 3.1.1, the chaotic sequence of logistic map
{xn , n = 0, 1, 2, 3, . . .} is nonperiodic and nonconvergent, and it is very sensitive to
initial conditions.
DES algorithm with key expansion (3DES) is the core of real-time voice encryp-
tion algorithm, and the secrete keys of encryption and decryption are generated by
two synchronized chaotic systems (logistic map). The encryption model is shown in
Figure 7.5. Ki is the secrete key of encryption and decryption of each data packet, which
is generated by the logistic map. x0 and , are the initial condition and parameter of
logistic map, and that is the secrete key transmitted in the secret channel.
When the logistic map is used to generate secrete key, two problems need to be
solved. One is how to transform the generated sequence into a 64-bit secrete key, and
another is how to synchronize two chaotic maps to ensure that each data packet to
k1 k2 k3(k1)
x0 or u0
Secrete channel
0 1 11 12 63
obtain the right secrete key for decryption. Here, the double precision type is used to
store the initial condition x0 and parameter , of logistic map. The double type is 8
bytes (64 bits) in Win32. So it can be used as the secrete key of DES. The secrete key
of 3DES is obtained by iterating the logistic map two times to produce 64-bit double
data. The storage format of double data is shown in Figure 7.6.
In this figure, the 0th bit is sign bit. The first bit to the 11th bit is 11-bit order code,
and the 12th bit to the 63rd bit is 52-bit mantissa. The calculation method of double
type data is
where i is the sign bit, e is the order code, and f is the mantissa.
The range of iteration value is (0, 1), and thus e ∈ [0, 1022]. The number of its valid
bits is still 11, and its sign bit is unchanged. So the total number of valid bits in double
type is 63. The iteration space is 2 × (263 –252 ), in which multiplying by 2 represents two
64-bit iterations, and minus 252 means to subtract it at e = 1, 023. Because the number
of 8 times in DES algorithm is only used as check bit, the key space of an actual data
packet is about 2112 .
To realize synchronization between two chaotic systems, the iteration number of
system is saved in the header of each encrypted data packet as plaintext. According
to the iteration number in the header, the receiver iterates the logistic map to produce
decryption key and uses it to decrypt. In practice, the former packet of secrete key can
be memorized to reduce iterations. Since the number of iterations is transmitted as
plaintext in the header data, it may be intercepted by third party. But the decryption
key cannot be obtained without the initial condition and parameter of this map. As
long as the synchronous data in the header is received correctly, the synchronization
can be achieved.
7.2 Real-Time Data Stream Encryption Algorithm 213
Shannon proves that one-time pad is unable to be deciphered, and 3DES has high
security level. So, the encryption algorithm has a high security. Corresponding to real-
time voice communication, if a single data packet is deciphered, it will not affect the
entire transmission process. Because the pseudorandomness of chaos leads to the
condition that secrete keys are relatively independent, so that each data packet has
the same crack strength to ensure the security of data communication to the maximum
extent.
Send Receive
Network
Encryption Decryption
sequence sequence
Chaotic sequence Chaotic sequence
generator generator
Encryption side D1 E1 D2 E2 D3 E3 D4 E4 D5 E5
Decryption side Dx E1 D2 Ex D3 E3 E4 D5 E5
Ex Ex E3 Ex E5
the particularity of voice information, it does not necessarily have the ability of error
correction as long as the fault is tolerant. In real life, when a sentence does not listen
to the other side, he can ask the other side to say it again. Based on the above analysis,
an equal interval drive synchronization scheme is designed in Figure 7.8.
Compared with Figure 7.7, the synchronous insertion and synchronous detection
module are added to the system in Figure 7.8. In the encryption side, the drive code of
chaotic sequence (number of iterations) is inserted into the header of ciphertext data
packet, and it is sent with the ciphertext data packet. In decryption side, the driver
code is taken out by the synchronous detection module, and it is used to drive the
chaotic sequence generator to generate secrete key to decrypt the cipher sequence,
and the secrete key is consistent with that of the sender.
The fault tolerance capability of the above synchronization scheme is analyzed.
We will consider all errors that may occur in the network transmission. The transmis-
sion process is shown in Figure 7.9.
The upper part of Figure 7.9 is the data sent to the network, where Di is the drive
code and Ei is encrypted voice stream. The middle data is read from the Internet on
the decryption side, where Di is the drive code and Ei is the encrypted voice stream.
7.2 Real-Time Data Stream Encryption Algorithm 215
The bottom data is the decrypted voice data stream. Obviously, transmission errors are
classified into the following categories:
1. Drive code is transmitted in error. For instance, D1 is transmitted to Dx .
2. Encrypted voice data is transmitted in error. For instance, E2 is transmitted to Ex .
3. Drive code is lost. For instance, D4 is lost.
As shown in Figure 7.9, the first and second errors only affect one data packet of voice
stream. When D2 or D3 is received on the decryption side, all contacts between Ex and
Dx will be cut off. D3 is used to iterate two values to generate two double precision de-
cryption sequences to complete decryption, while the encryption side also use D3 to
generate two double-precision encryption sequence to accomplish encryption. So the
encryption and decryption sequences are same, and the synchronization of encryp-
tion and decryption is realized. For the third case, it only affects one voice data packet
too. When the correct driver code is received, it will return to the state of synchroniz-
ation. After a long period of testing, it is proved that this scheme is feasible and can
keep synchronization of encryption and decryption in infinite time. Although trans-
mission errors occur accidentally in the middle, they will not affect the whole process
of call. There is no security risk to expose the drive code to the outside because the fol-
lowing n-bit sequence does not have the possibility to be predicted without knowing
the values of parameter , and initial condition x0 .
In general, the main idea of this synchronization scheme is to make use of the
tiny bit error rate provided by network transmission protocol. Regardless of whether
there is a bit error, the decryption side is forced to make a new synchronization at set
intervals (it is very small). That is to say, the synchronization of the entire call time
is changed to the synchronization of many times. Even if a period of time is not syn-
chronized, it will only affect the data in this segment, and the entire call is not affected.
Dachselt et al. [152] studied the cryptanalysis method of an encryption system based
on discrete chaotic map. Yang et al. [153] thought that analog chaotic encryption sys-
tem is difficult to resist the return mapping attack. Zhou et al. [154] reported that
simple chaotic encryption system did not have a high security level and proposed an
improved algorithm by increasing the number of iterations. Here, we design an en-
cryption system, which combines the block encryption algorithm with chaotic encryp-
tion algorithm, and the security of system is analyzed by the following cryptanalysis
methods:
1. The system has the ability to resist the brute-force attack. Because the encryption
system is not dependent on the encryption scheme or algorithm, but relies on the
secrete key. It is worth noting that secrete key signal generator could not be open,
and some literatures about cryptanalysis often adopted this design principle. This
216 7 Audio and Video Chaotic Encryption and Communication Technology
Based on ACE, RTP, and real-time encryption scheme, a real-time network voice
encryption system is developed. Its structure is shown in Figure 7.10. The whole
system consists of the following modules: voice acquisition/broadcast module, en-
coding/decoding module, encryption/decryption module, and transmission module.
As a real-time system, it is necessary to have a real-time voice acquisition and broad-
cast module. Encryption operation is achieved by using real-time encryption scheme.
The communication protocol is based on RTP, which is transmitted on the Internet
through the network layer and physical layer.
Figure 7.10 is a P2P communication model. Multicast function is realized by using
RTP in voice transmission module. So, it is not only used in P2P communication, but
also can be used in many-to-many communication. The bidirectional arrows in the
figure represent the bidirectional data stream.
The realization of each module is independent of each other. It communic-
ates with other module by interfaces. Each module is realized by the static library
(.lib file), such as VoiceIO.lib of voice capture/broadcast module, Codec.lib of voice
7.3 Realization of Real-Time Voice Encryption System 217
Network transmission
Application layer
RTP/RTCP
UDP
IP
Physical layer
iteration number of logistic map, and the iteration number is directly used to generate
the secrete key for encryption/decryption.
Network transmission module is based on RTP, and the network application
model is shown in Figure 7.11. User Datagram Protocol (UDP) protocol is used in the
RTP transport layer to achieve simple multicast function. The speech transmission
module exposes the RTP_Session class to outside, and inside of this module is the
specific implementation of RTP.
The RTP is a transport protocol for multimedia data stream on Internet. RTP is defined
in the transmission conditions of P2P or one-to-many, and its purpose is to provide
time information and achieve flow synchronization. RTP usually uses UDP protocol to
transmit data, but RTP can also work on other protocols such as TCP or Asynchron-
ous Transfer Mode (ATM). When an application starts an RTP session, two ports are
used, one for RTP and the other for RTCP. RTP itself does not provide flow control or
congestion control, but it provides these services by RTCP. RTP algorithm is usually
not implemented as an independent network layer, but as a part of the application
code. During the RTP session, the participants periodically transmit RTCP packets.
The RTCP packet contains some statistical information such as the number of sending
packets and lost packets, so that the server can use these information to dynamically
change the transmission rate, and even change the effective load type. With the use
of RTP and RTCP, they can optimize the transmission efficiency by effective feedback
and minimum overhead, which is especially suitable for the transmission of real-time
data on Internet.
The software running platform of voice encryption system based on RTP is Win-
dows 2000 professional or Red Hat Linux 9.2. The development tools are Rose Rational
2000, C++ Visual 6, g++, and emacs. The third library is ACE 5.4 and Standard
Template Library. The software framework is shown in Figure 7.12.
The RTP data packet is composed of two parts, the RTP header and the continuous
media data with indefinite length, and its format is shown in Figure 7.13, where V
represents the version number of RTP specified as 2. P is the padding bit. When P = 1,
7.3 Realization of Real-Time Voice Encryption System 219
Voice input/output
Voice encryption/decryption
RTP/RTCP
Socket interface
it indicates that the data packet tail is loaded with a nonload information, which can
be used to encrypt or notify the bottom layer protocol. A data unit has several RTP
packages. X is an extension bit, and when X = 1, it indicates that the RTP header is
attached to an extended header with variable length. M is used to mark the important
event in the data stream, such as the frame boundary. Load type is used to identify
the type of media in the receiver. If it is the encoding data, it determines the decoder
of the receiver. The serial number is used to identify the order of the RTP packets sent
by the sender, and the serial number increases by 1 when an RTP packet is sent. The
receiver detects the loss situation of data packet by serial number, and then the packet
is recovered after reordering. The time stamp reflects the sampling interval of RTP
packet in the first byte. The sampling frequency must be derived from a clock with
linear growth, and the clock frequency usually depends on the data transmission
format. If the RTP packet is periodically generated, then the sampling frequency is
determined by the sampling clock, rather than the system clock. The synchronization
source identifier (SSRC) identifies the synchronization source, which is randomly
generated, and the SSRC identifier of two synchronization sources in the same RTP
session is different. Contributing source identifier (CSRC) can contain 0–15 items.
Contributing source refers to a new combination of RTP packets after the procession
of mixer when one or more of RTP data packets are received from the synchronous
source. The mixer is used as the SSRC of the combination RTP packet, and all the
SSRC are transmitted to the receiver as a special source identifier, so that the receiver
knows all the SSRC of RTP packets.
Another protocol is RTCP, which is usually used with RTP, and it can be used to
carry out the feedback about transmission quality (such as the jitter and average loss
rate) and transfers some identity information of participants. RTCP packet contains
the following formats:
SR: source report package; it is used to send and receive the statistics of active
source.
RR: receiver report package; it is used to receive the statistics of nonactive
station.
220 7 Audio and Video Chaotic Encryption and Communication Technology
Timestamp
SSRC
CSRC
Data payload
SDES: source site description information packet; it is used to report the related
information of site, including the specification name CNAME.
BYE: send this packet when you want to leave.
APP: application package; it contains custom functions.
An RTCP composite package usually contains several RTCP packages. To perform this
protocol, the following two points must be observed. First, in the case of the band-
width allowed, receiving statistics (RR or SR) must be transmitted as soon as possible,
so that the accuracy of statistics is improved. Therefore, each transmitted RTCP com-
posite package must contain a report package. Second, the new source site must
receive CNAME as soon as possible to verify the other source sites. So each RTCP
composite package must contain a CNAME SDES too.
With the aid of the above control packet, RTCP can complete four control func-
tions, including quality of service monitoring control, congestion control, flagging
media synchronization, providing identification information, and estimation and
planning of session size.
ACE is an object-oriented (OO) toolkit, which implements many basic design patterns
of communication software. The target user of ACE is the developer who develops
high-performance communication services and applications on UNIX or Win32 plat-
form. ACE simplifies the development of communication between processes, event
channel separation, display dynamic link, and concurrent OO network applications
and services. By dynamically linking services and applications at run time and ex-
ecuting these services in one or more processes or threads, ACE enables the system’s
configuration and reconfiguration to be automated.
As shown in Figure 7.14, the hierarchical architecture of ACE consists of three
basic layers: uses layer of operating system (OS), C++ packet layer, and frame com-
ponent layer [155]. ACE contains a lot of reusable packaging, framework, and classes,
7.3 Realization of Real-Time Voice Encryption System 221
which can be used to perform common network programming tasks across many
OSs. ACE components can be used to achieve the following objectives: event de-
multiplexing and event processor allocation, connection establishment and service
initialization, inter-process communication and shared memory management, dy-
namic configuration of distributed communication services, concurrency/concurrent,
and synchronization.
The important ACE modules in this system are presented as follows:
1. SOCK_SAP. It is inherited from the IPC SAP, and it is the OO package of the bottom
layer network programming interface.
2. ACE reactor. It is the OO framework for event demultiplexing.
3. ACE_Task class. It is the center of the active object and the passive object, which
is used to create a user definition and process application messages in ACE.
The structure of RTP library is shown in Figure 7.15. Among them, RTP_Session module
is the core module of the whole protocol library and is also the only interface ex-
posed to the upper-level users. Users can control this module to start real-time data
communication, and it is responsible for creating the RTCP_Recv_Handler module
and RTCP_Timer_Handler modules. RTP_Sender is used to send RTP data packets.
RTP_Reactor_Task is a thread object. It is the central hub for the protocol part, and
it is also an I/O event dispatcher. RTP_Reactor_Task is used to create three classes,
including RTCP_Recv_Handler, RTCP_Timer_Handler, and RTP_Recv_Handler. Then
it records the arrival events of RTP and RTCP packets and the timing events of RTCP
transmission. Finally, it calls these modules when these events come.
222 7 Audio and Video Chaotic Encryption and Communication Technology
RTP_Recv_Handler module is used to process the arrival event of RTP data packets.
It will receive the RTP message when the event arrives. RTP_Hdr_Processor module
is used to process the RTP message and extracts the valid data. RTCP_Recv_Handler
module is used to receive RTCP message, which has a similar function with
RTP_Recv_Handler. RTCP_Processor module is used to process the RTCP message
and obtain its statistical information. RTCP_Timer_Handler module is used to send
RTCP message. RTCP_Packet_Creator module is used to generate RTCP message. The
Sender_Report module is used to set up and save some statistical information in
the RTCP message. SDES_Table module is used to save and set SDES information.
DST_IP_Table module is used to save the IP information of source site that is involved
in the communication. RTP_Timestamp module provides some operations related
with time, such as accessing system time or RTP timestamp. RTP_Payload_Queue
module is used to save the received RTP data. RTCP_Queue module is used to save
the received statistical information of RTCP.
Test project RTVC (real time) is applied to debug each module of the system. CContoller
class is used to combine and coordinate each module, which is responsible for re-
ceiving user’s parameter settings (audio parameters, secrete key, and communication
members) and coordinating the transmission of data stream among each module.
7.3 Realization of Real-Time Voice Encryption System 223
The problems encountered during the debugging process as well as their solution
methods are illustrated as follows.
During the test of speech acquisition/playback module, when you stop record-
ing, you are prompted that recording buffer still has data, and the stop recording
operation failed, which results in the failure of recording operation again. The error
reason is that the recording buffer is released in the message processing function
WM_MIM_DONE, and it is not fully released when the recording is stopped. Therefore,
the recording buffer memory is managed automatically. When you stop recording, the
recording thread is hanged up (also the execution of message processing function
WM_MIM_ DONE is suspended), and then the recording buffer is released explicitly.
The recording thread is restored when you restart recording.
In addition, communication often automatically terminates when the system
works for a period of time. Through testing and tracking, it is found that the output rate
of data queue is faster than that of input, which results in that the playback module
occasionally does not get data, and then the playback module will be shut down auto-
matically. So communication is terminated. To solve this problem, the whole process
is controlled manually. When the play module cannot obtain the data, this module is
still working, but it does not fill data to the playing buffer.
The communication system is tested by the release version. The results are shown
in Table 7.1. In the conditions of 22.050 kHz sampling frequency, 16-bit quantization
data, single channel, and 1,024 bytes recording buffer (sampling time is approxim-
ately 22.68 ms), the effect of common mode (no encryption) is best, and the delay
cannot be felt. The effect of encryption mode is second, and there is a little noise, but
still can be understood. For the use of equal interval drive of the continuous chaotic
network synchronization method, the system works in synchronized state. Even if a
data packet header is damaged, it has no effect on communication process.
In the conditions of 22.050 kHz sampling frequency, 8-bit quantization data,
single channel, and 1,024 bytes recording buffer (the sampling time is 45 ms), the
communication effect of common mode is apparently worse than the above mode,
and there are some time delay. The reason is that its sampling time is too long. The en-
cryption mode of communication is not as good as the common mode, but its security
is superior to the common mode.
Table 7.1: Results of system test using the published version (release).
In this section, we study and develop a real-time voice encryption system based
on chaotic map and 3DES encryption algorithm. The system has the characteristics
of fast encryption speed, less encryption time, and strong ability of anti-breaking. In
the implementation of the whole system, the modular design and multi-thread tech-
nology are used to minimize the coupling of each packaging module and improve
their reusability. In the implementation of RTP/RTCP, the use of cross-platform ACE
greatly improves the cross-platform characteristics of RTP/RTCP module (RTPLib.lib),
and it can be ported to Windows 2000 Professional, Linux RedHad 9.2, and other OSs.
Through the network test, the encryption system can realize the real-time encryption
and transmission of voice signals, and it has good communication quality and high
security. However, it is necessary to improve and optimize the encryption speed and
signal delay for commercial use.
the DC and AC coefficients have a very important effect on encryption, researchers ad-
vised to shuffle all DCT coefficients of the same frequency location [157]. To maintain
the size of data, some researchers proposed a scheme to shuffle the variable length
code or run-length encoded (RLE) event [158, 159] before the entropy encoding, and
the same or better results can be obtained from these cryptographic algorithms.
A practical MPEG video encryption algorithm should meet the requirements of the
invariance of compression format and ratio, the less computation quantity, and the
widely adjustable security level. Encryption of fixed length code data can meet these
requirements at utmost extreme, but the encryption degree and security need to be
improved further. The analysis and experiment results show that the effective tex-
ture information is distributed in all the DCT coefficients. Scrambling for internal
macro-block of each video frame is an effective means to hidden information, which
is added to the fixed length data encryption algorithm. In general, the entire MPEG
video encryption scheme consists of two parts as follows [160].
Step 1: The data are encrypted including the intra-DC coefficients, non-intra-DC
coefficients, sign bit of AC coefficients, ESCAPE DCT coefficients, motion
vector symbol, and residual fixed length code.
Step 2: The bit stream of macro-block is scrambled, and each frame is assigned a
different scrambling table.
As all the operations are done on the video stream, the entire encryption algorithm has
no effect on the compression ratio. Stream cipher and scrambling table are generated
by the chaotic map. The principle block diagram of encryption algorithm is shown
in Figure 7.16. It shows the complete process of chaotic MPEG video encryption. To
reduce the chaotic iterations, we uses the same Cat map (with the same initial con-
ditions and parameters) to generate the stream cipher and permutation table. So, the
sequence cipher and block cipher (permutation) will share the same set of secrete key
parameters {x1 (0), y1 (0), u, v}. Of course, to enhance the security, we can use chaotic
map with different initial conditions and parameters to generate chaotic sequences
for different encryption processes. In this case, the stream encryption and scrambling
have independent secrete key, but it requires more chaos iteration and the amount of
computation.
From Figure 7.16, the key space of whole encryption system is composed of {x1 (0),
y1 (0), u, v, p, x2 (0)}. In the experiments, secrete key is reset for each image group. You
can change the secrete key to improve the security of system by setting the step size
vector d = {du , dv , dp , dx1 , dy1 , dx2 }. The decryption process is the symmetric operation
of the encryption process.
The details of encryption process will be presented in the following sections.
226 7 Audio and Video Chaotic Encryption and Communication Technology
x2
x 1 , y1 x1
z,w ã
Extraction of
Extraction of bits
scrambling table
s p
Chaos-based cryptography has been widely used in video encryption. To design a fast
and secure chaotic cipher, we should using fixed point operation instead of floating
point operation, using the simple chaotic system, a large encryption unit, and so on.
So two simple chaotic maps are selected to design the stream cipher: they are cat map
and piecewise linear chaotic map.
Cat map is defined by
x1 (k + 1) 1 u x1 (k)
= mod 1, (7.7)
y1 (k + 1) v uv + 1 y1 (k)
To avoid floating point operations, the above two maps are discretized to operate
in the integer domain. The discretized cat map is described by
x1 (k + 1) 1 u x1 (k)
= mod 232 , (7.9)
y1 (k + 1) v uv + 1 y1 (k)
where u and v are unsigned integers, and initial conditions x1 (0) and y1 (0) are re-
stricted to unsigned integers. Obviously, after the discretization, x1 (k), y1 (k) ∈ [0, 232 ),
and they are integers, which ensure that all operations are fixed point operation. The
discretized piecewise linear chaotic map is described by
⎧
⎪
⎪ 232 ⋅ x2 (k)/p , 0 ≤ x2 (k) < p
⎪
⎨
232 ⋅ (x2 (k) – p)/(231 – p) , p ≤ x2 (k) < 231
x2 (k + 1) = (7.10)
⎪
⎪ 232 ⋅ (232 – p – x2 (k))/(231 – p) , 231 ≤ x2 (k) < 232 – p
⎪
⎩ 32
2 ⋅ (232 – x2 (k))/p , 232 – p ≤ x2 (k) < 232
where x represents an integer that is no more than x, and integer p ∈ (0, 231 ).
Correspondingly, x2 (k) is an integer that belongs to [0, 232 ).
Thus, x1 , x2 , and y1 are three different chaotic integer sequences generated by two
chaotic maps. To avoid the degradation of chaotic characteristics after discretization,
the following improvement measures are taken. First, two chaotic maps are iterated
for 50 times as pretreatment. Then, starting from the 51th iteration, the generated data
is processed to obtain two new integer sequences z and w as follows:
where XOR is the XOR operation between bits, and mod is modulo operation. This
operation not only reduces the degradation of original chaotic systems but also im-
proves the complexity of the generated chaotic sequence. The new sequences, z =
[z(0), z(1), . . . , z(n – 1)] and w = [w(0), w(1), . . . , w(n – 1)], have better random prop-
erties. Then, each of them is transformed into the corresponding binary form, i.e.
z(i) = b0 b1 . . . b31 and w(i) = b′0 b′1 . . . b′31 (b′j and bj are binary numbers, j = 0, 1, . . . , 31).
A binary random sequence s is obtained by extracting the bits of integer random
sequence z and w, and alternately permuting them. Therefore, when the Cat and Piece-
wise Linear Chaotic Map (PLCM) maps iterate one time, a 64-bit secrete key stream
b0 b′0 b1 b′1 . . . b31 b′31 is produced.
Through a series of random tests, it is proved that the sequence s has good ran-
domness. First, set the initial conditions of u = 20, v = 2, p = 220 , x1 (0) = 600,
y1 (0) = 100, and x2 (0) = 1, 000. Then, for each of iteration, bits of z(i) and w(i) are al-
ternates extracted to obtain three binary random sequences s1 , s2 , and s3 with length
of 200, 2,000, and 20,000, respectively. These binary random sequences are tested
228 7 Audio and Video Chaotic Encryption and Communication Technology
1 1
(a) (b)
R (k)
R (k)
0.5 0.5
0 0
–1 0 1 2 –1 0 1 2
k X 104 k X 104
1 1
(c) (d)
R (k)
R (k)
0.5 0.5
0 0
–1 0 1 2 –1 0 1 2
k X 104 k X 104
Figure 7.17: Autocorrelation and cross-correlation tests of chaotic sequence: (a) autocorrelation;
(b) cross-correlation of two sequences with different parameter p; (c) cross-correlation of two
sequences with different x1 (0); and (d) cross-correlation of two sequences with different parameter u.
randomly, and the results are shown in Table 7.2. As shown, all of them pass the test
and show excellent performance.
To ensure the security of the cipher, it is necessary to carry out the correlation test.
The sequences with different lengths are chosen to carry out the autocorrelation and
cross-correlation tests. Test results are shown in Figure 7.17.
Obviously, the results of autocorrelation tests are ideal as shown in Figure 7.17(a). Us-
ing two different values of p, x1 (0), and u, respectively, two different chaotic sequences
with the same length are obtained to make the cross-correlation test, and the res-
ults are shown in Figure 7.17(b–d). As shown, the test results are also satisfied, which
means that the chaotic binary sequence has high sensitivity to parameters of chaotic
system.
In this scheme, the sequence s as the stream cipher is used to encrypt the fixed
length data of video stream, and the ciphertext feedback mode is adopted to resist the
known plaintext attack in the encryption process.
7.4 MPEG Video Encryption Algorithm Based on Chaotic Sequence 229
The algorithm requires that each frame takes different scrambling tables to scramble
macro-block. Here, the sorting-based method is adopted, and it has advantages on
simple operation and fast running speed. We suppose that each frame is made up of
N macro-blocks. The specific scrambling process for each frame is as follows.
1. A sequence with length N, a = {a1 , a2 , . . . , aN }, is extracted from the chaotic
integer sequence. Here, the chaotic sequence is generated by the same chaotic
map with the upper stream cipher. That is to say, a sequence with length N can
be obtained from the chaotic sequence x1 , y1 or x2 , and x1 is selected in this
experiment.
2. Rearrange the sequence in ascending or descending order, and then a new se-
quence is generated as ã = {ã1 , ã2 , . . . , ãN }. This method is feasible because there
do not exist the same elements of chaotic sequence.
3. Record the location in new sequence {ã1 , ã2 , . . . , ãN } of each element in the ori-
ginal sequence a = {a1 , a2 , . . . , aN } to get the corresponding address sequence
p = {p1 , p2 , . . . , pN }.
4. Use the scrambling addresses p = {p1 , p2 , . . . , pN } to scramble the macro-block
after the current frame is scanned.
The above scrambling method does not increase the redundancy iteration, which
makes the whole process simple and quick.
Sampling
DCT transform
Quantification
N
Fixed length encoding data?
Stream encrption
Entropy encoding
Macro-block
scrambling
Output video
stream
Figure 7.18: Flowchart of the encryption algorithm combined with compression encoding.
the encoder samples the pixels, and then do DCT. The encryption of the fixed length
data is carried out after quantification, and the scrambling of macro-block is done
after the entropy encoding. To do so, it will not affect encoding.
According to this procedure, a series of standard test sequences are tested. Figure 7.19
is the encryption effect diagram for two different standard test sequences. Fig-
ure 7.19(a) and 7.19(c) is the first frame image of foreman and akiyo, respectively.
Figure 7.19(b) is the first frame decoding image of foreman only using the macro-block
scrambling method, and Figure 7.19(d) is the first frame decoding image of akiyo using
the complete encryption algorithm.
Therefore, attackers cannot get any valuable information from the scrambled and
encrypted image. This scheme has good property of format invariance and its control
parameters can be further set up to achieve different security levels.
The performances of encryption system are analyzed mainly from the following two
aspects.
7.4 MPEG Video Encryption Algorithm Based on Chaotic Sequence 231
(a) (b)
(c) (d)
Figure 7.19: Video encryption effects: (a) foreman plain image; (b) effect of macro-block scrambling;
(c) akiyo plain image; and (d) full encryption effect of this scheme.
(a) (b)
Figure 7.20: Results of ECA attack on the first frame of “akiyo”: (a) encryption algorithm with fixed
length data and (b) new algorithm.
Figure 7.20. As can be seen, if a single compressed video stream is encrypted by using
fixed length data, a basic outline can be seen after the ECA attack. But it is completely
unable to be identified by using our encryption scheme.
To reduce the amount of data to be encrypted, the most effective data must be selected
for encryption. Because the human eye is more sensitive to the brightness information
than the color information, and the brightness information and color information are
contained in the compressed file separately. Here a few key data are selected to en-
crypt. The basic encryption framework is shown in Figure 7.21. The encryption content
of this scheme includes all sign bits of DC and AC coefficients in 4 × 4 luminance
block, the sign bits of DC coefficients in chroma block, and the sign bits in motion
vector of P/SP frame and B frame. The reason for choosing these data to encrypt is
234 7 Audio and Video Chaotic Encryption and Communication Technology
Video signal
Intra-prediction Inter-prediction
Motion
Sign bit of coefficients? vector
N
Y
Chaotic stream
encryption
Entropy encoding
Pack
Encrypted
video stream
because those data can maximize the impact of visual effects and maintain the basic
compression ratio and signal-to-noise ratio (SNR) of encoding at the minimum cost.
The chaotic stream cipher is designed by using the above pseudorandom se-
quence s. To improve the security, the following ciphertext feedback mode is adopted.
Encryption process is described by
where XOR is the bit XOR operation; s is the secrete key stream; and C(i) is the
ciphertext.
Experiments are carried out on the H.264 open-source codec JM. JM is one of the
three official encoders of H.264. Although the algorithm is complex and its speed is
slow, it is suitable for the second development. To run JM in the VC6.0 compiler, you
7.5 H.264 Video Encryption Algorithm Based on Chaos 235
(a) (b)
(c) (d)
(e) (f)
(g) (h)
Figure 7.22: H.264 video encryption effects. (a) First frame of foreman. (b) First frame full encryption
of foreman. (c) Encryption symbol bit of brightness of DCT coefficient. (d) Encryption symbol bit of
chroma DC coefficient. (e) mv encryption for frame 89 of foreman. (f) Full encryption for frame 89 of
foreman. (g) Mobile plain image. (h) Full encryption of mobile image.
have to set up configuration file before the coding and decoding. For example, the
encoding configuration file can be set to encoder_baseline.cfg.
In this experiment, the encryption effect of different data in the standard video se-
quence is recorded as shown in Figure 7.22. As it can be seen, different data can be en-
crypted to achieve different results. For the encryption of motion vector, an inevitable
236 7 Audio and Video Chaotic Encryption and Communication Technology
result is that the encryption effect is not obvious for a set of video sequences at the be-
ginning as shown in Figure 7.22(b). With the accumulation of motions, the ciphertext
information of encrypted motion vector will continue to be accumulated, and the
effect is more and more obvious as shown in Figure 7.22(e) and 7.22(f). After full encryp-
tion, the image has become very blurred as shown in Figure 7.22(f) and 7.22(h). To im-
prove the security of encryption further, we can scramble the frequency coefficient, 4×
4 change block or Flexible Macroblock Ordering (FMO)-based macro-block. Of course,
those algorithms are based on the cost of compression ratio and encryption delay.
in Table 7.4. The percentage of encryption time accounting for encoding time shows
that the encryption system has good real-time performance.
Any encryption method may have an impact on the encoding effect of video se-
quences. Practical encryption algorithm should reduce the influence of compression
ratio and SNR of video sequences. Because only the sign bits of video data are en-
crypted, the encryption algorithm has little impact on the SNR and compression ratio
of video sequence. This algorithm takes the macro-block, the frame, and the image
group as the encoding unit, so it can keep the frame synchronization information of
the video data to be invariable, and it has certain data operability, such as supporting
the operations of position index, pasting, and cutting. For the encryption to DCT and
quantization coefficients, it does not change any information about data format. The
experimental results show that the SNR and compression ratio are not affected.
Questions
1. What are the technical difficulties of real-time data stream encryption?
2. How to evaluate the security of real-time data stream encryption?
3. How to deal with the relationship between encryption and compression in video
transmission?
4. Design a wireless transmission scheme based on chaos.
8 Analysis and Simulation of Fractional-Order
Chaotic System
With the further research of nonlinear chaotic theory, fractional-order chaotic system
has become a hot topic. To apply the fractional-order chaotic system in the field of in-
formation security, it is necessary to reveal its characteristics. Moreover, key technical
problems are required to be solved quickly, such as accurate solution of fractional
differential equations, digital signal processing (DSP) circuit realization, and so on.
In this chapter, we focus on solution algorithm and simulation technology. It is the
theoretical and experimental basis for applications of fractional-order chaotic system.
measured. However, when using Caputo definition, its physical meaning of fractional
differential is clear and its value is easy to be measured. Based on these two defini-
tions, people proposed two different approximate methods for solving the fractional
differential equation. One is time–frequency method based on R-L definition [170].
First, the fractional integral operator in the time domain is transformed into transfer
function in frequency domain. Then piecewise linear approximation method is used
to realize approximation calculation in frequency domain. The other is predictor–
corrector method based on Caputo definition [171–173]. It is a time domain method.
The time series of the fractional-order system are obtained by Adams–Bashforth
prediction equation and Adams–Moulton correction equation. However, frequency
domain method cannot reflect the dynamic characteristic of fractional-order chaotic
system accurately. As for the time domain method, the calculation step can be set
small enough for more accuracy, but its calculation is more complex relatively.
By far, the chaotic characteristic study of fractional-order system is mainly based
on existing integer-order chaotic system. The main idea is to observe whether the sys-
tem is still chaotic when the system order changed from integer to fractional. However,
the system order when system entering into chaotic still needs further research, as well
as dynamic characteristic of fractional-order chaotic system. For example, Ahmad re-
ported that when the order of system is 2 + % (0 < % < 1), third-order chaotic systems
still perform chaotic behavior [6]. And fourth-order chaotic systems still perform hy-
perchaotic behavior when the system order is 3 + % (0 < % < 1) [174]. Obviously, the
range of % is too big in this case. Is it possible to narrow? For example, fractional-order
Chua system performs chaotic behavior when the order is 2.7. People get the conclu-
sion only through observing system behavior when the system order is 2.7 and 2.6. So
is it chaotic when the order is 2.65? As a result, smaller step size should be chosen
and smaller error fractional differential approximation algorithm model should be
designed. Besides, dynamic characteristics such as Lyapunov exponent spectrum,
bifurcation, and dimension remain further research.
Synchronization technology is the key of application of chaotic system to secure
communication. In 1990, Pecora and Corroll first proposed the concept of chaotic syn-
chronization [10]. They also realized synchronization of two mutually coupled chaotic
systems in the laboratory by using the same signal circuits driven [11]. In the next
20 years, chaotic synchronization developed a lot. Even though synchronization of
integral chaotic system has achieved much research results, research of fractional-
order system synchronization is still in the beginning because it is too complex and
the effective mathematical tool is deficient. If we apply integral-order control method
to fractional-order system, true characteristic will be ignored. As a result, studying
control method of fractional-order chaotic system has practical significance.
By far, more effective synchronization control method has not been proposed
for fractional-order chaotic system. In most cases, we develop integral chaotic syn-
chronization method to fractional-order chaotic, so its synchronization control mech-
anism and performance need further study. Studies show that the mutual coupling
240 8 Analysis and Simulation of Fractional-Order Chaotic System
Definition 8.1: Gamma function A(x) is a basic function for fractional calculus, and its
definition is
∞
A(x) = tx–1 e–t dt. (8.1)
0
where q ∈ R, n is the first integer greater than q, which means n – 1 ≤ q < n, A(⋅)
is Gamma function. According to the above definition, q-order differential of power
function and constant is
q A(r + 1)
Dt0 tr = (t – t0 )r–q , (8.4)
A(r + 1 – q)
q C
Dt0 C = (t – t0 )–q . (8.5)
A(1 – q)
q
L{0 Dt f (t)} = sq F(s), q ≤ 0, (8.6)
n–1
q q–k–1
L{0 Dt f (t)} = sq F(s) – s k 0 Dt f (0), n – 1 < q ≤ n ∈ N. (8.7)
k=0
where m is the first integer greater than q. The Laplace transform of Caputo fractional
differential is
n–1
q
L{0 Dt f (t)} = sq F(s) – sq–1–k f (k) (0), n – 1 < q ≤ n ∈ N. (8.9)
k=0
When compared with Laplace transform of R-L fractional differential, for Caputo
fractional differential, only integer-order differential is needed in Laplace transform.
When the initial value of operator is zero, its corresponding Laplace transform is
q
L{0 Dt f (t)} = sq F(s). (8.10)
∗ q q
Dt0 Jt0 f (t) = f (t), (8.11)
m–1
q q q m–q (t – t0 )k
Jt0 (∗ Dt0 )f (t) = Jt0 Jt0 Dm m m
t0 f (t) = Jt0 Dt0 f (t) = x(t) – x(k) (t0+ ) . (8.12)
k!
k=0
Thus, the q-order differential of the power function and constant are defined as
∗ q r A(r + 1)
Dt0 t = (t – t0 )r–q , (8.13)
A(r + 1 – q)
∗ q
Dt0 C = 0. (8.14)
Integer-order calculus has clear geometric interpretation and physical meaning. How-
ever, because of the complexity of fractional calculus, it is difficult to understand the
concept of fractional calculus. Therefore, there exist some obstacles in practical ap-
plications. At present, fractional calculus does not have universal and unified physical
meaning and geometric interpretation yet [180].
It is easy to get the physical meaning of fractional integral according to its defin-
ition. If we suppose integral as storage, then the fractional integral can be taken as
memory storage. The fractional integral only store near information and abandon
the past information gradually. Professor Liu et al. in Peking University described the
fractional differential as a “bridge between weather and climate,” which means the
fractional differential of climate is weather. It is the fractional differential that makes
climate has greater memory than weather [181].
8.3 Solution Methods of Fractional-Order Chaotic System 243
There are several methods and algorithms for solving fractional differential equations
and fractional-order systems, for example, Laplace transform, Fourier transform al-
gorithm, and numerical algorithms. However, these methods have some drawbacks.
At present, people are most interested in using integer-order model to approximate
the fractional-order system.
Bode graphics approximating method of the fractional-order system is realized
by the time–frequency conversion. The transfer functions are calculated by piecewise
linear approximation in frequency domain. This method is in favor of the project im-
plementation. The idea is to obtain frequency domain expansion of fractional integral
operator by solving 1/s! in frequency domain. And then the frequency domain func-
tion is transformed to the integer-order state equation [170]. This approximation error
is within the permissible range and can fully meet the needs of engineering.
If the initial condition is set to zero, then the Laplace transform of R-L in formula
(8.7) becomes to
dq f (t)
L = sq L{f (t)}. (8.15)
dtq
Therefore, the fractional integral operator in frequency domain with q-order can be
described by the transfer function F(s) = 1/sq . To analyze dynamics of fractional-order
chaotic system effectively, standard integral-order operator is required to approxim-
ate fractional-order operators (Bode plot approximation). In this case, approximation
error will definitely be within the permissible range and can fully meet engineering
requirement. Fractional integral operators are defined as
1
H(s) = !i , 0 < !i < 1; i = 1, 2, . . . , n, (8.17)
n s
i=1 1+ pT
i
where 1/pTi is relaxation time and !i is fractional power factor. Formula (8.16) is called
single structural model of single fractional-order system. Through a fractional extreme
representation of single frequency, the transfer function in frequency domain can be
represented as
1
H(s) = ! , (8.18)
s
1+ pT
where 1/pT is relaxation time and ! is fractional power factor (0 < ! < 1).
By using –20 dB segments with “zigzag” type to approximate, formula (8.18) can
be approximated as [170]
N–1 s
1 i=0 1+ zi
H(s) = ! ≈ lim , (8.19)
s N→∞ N s
1+ pT i=0 1+ pi
where N represents the number of poles. Since working frequency in engineering prac-
tice is limited, the number of the above formula can be limited to N. Then the above
formula can be further approximated as
N–1 s
1 i=0 1+ zi
H(s) = ! ≈ . (8.20)
s N s
1+ pT i=0 1+ pi
Here PT is the angular frequency and p0 is the first singular value which is determined
by the setting error y. PN is the last singular value which is determined by N.
Now, let a = 10y/(10(1–!)) , b = 10y/(10!) , then we have
ab = 10y/(10!(1–!)) . (8.21)
According to the above relationship and p0 , we can obtain all zero-pole values:
pi = (ab)i p0 , i = 1, 2, 3, . . . , (8.26)
Therefore,
9max
log p0
N–1< < N, (8.32)
log(ab)
⎡ ⎤
log 9pmax
N = int ⎣ ⎦ + 1.
0
(8.33)
log(ab)
1 501.14(s + 0.16811)
0.1
s0.1 (s + 0.3162)(s + 681.1)
1 141.2538(s + 0.1334)(s + 10)
0.2
s0.2 (s + 0.035623)(s + 4.217)(s + 316.2)
1 125.8925(s + 0.08483)(s + 2.276)(s + 61.05)
0.3
s0.3 (s + 0.03162)(s + 0.8483)(s + 22.76)(s + 610.5)
1 26.6073(s + 0.07499)(s + 1.334)(s + 23.71)
0.4
s0.4 (s + 0.02371)(s + 0.4217)(s + 7.499)(s + 133.4)
1 50.1187(s + 0.07943)(s + 1.259)(s + 19.95)(s + 316.2)
0.5
s0.5 (s + 0.01995)(s + 0.3162)(s + 5.021)(s + 79.43)(s + 12.59)
1 28.1838(s + 0.1)(s + 1.778)(s + 31.62)(s + 562.3)
0.6
s0.6 (s + 0.01778)(s + 0.3162)(s + 5.623)(s + 100)(s + 1778)
1 7.9433(s + 0.1638)(s + 4.394)(s + 117.9)
0.7
s0.7 (s + 0.016389)(s + 0.4393)(s + 11.79)(s + 100)(s + 316.2)
1 8.1752(s + 0.487)(s + 36.52)(s + 2, 738)
0.8
s0.8 (s + 0.0154)(s + 1.155)(s + 86.6)(s + 6, 494)
1 4.2987(s + 14.68)(s + 31, 620)
0.9
s0.9 (s + 0.01468)(s + 31.62)(s + 68, 130)
8.3 Solution Methods of Fractional-Order Chaotic System 247
n–1
k t
t 1
x(t) = x0(k) + (t – 4)q–1 f (4, x(t))d4. (8.35)
k! A(q)
k=0 0
Obviously, the two parts of the right side in the above equation totally determined
by the initial value. A typical case is 0 < q < 1, and the Volterra equation has weak
singularity. In Refs [171–173], a predictor–corrector scheme for eq. (8.35) is reported. It
can be regarded as a similar algorithm of Adams–Moulton algorithm with one step.
Let h = T/N, tj = jh (j = 0, 1, 2, . . . , N), where T is the integral upper limit of this
equation. Then the corrector formula of eq. (8.35) is given by
q–1 n
k
tn+1 hq p hq
xh (tn+1 ) = x0(k) + f (tn+1 , xh (tn+1 ))+ aj,n+1 f (tj , xh (tj )), (8.36)
k! A(q + 2) A(q + 2)
k=0 j=0
where
nq+1 – (n – q)(n + 1)q , j=0
aj,n+1 = . (8.37)
(n – j – 2)q+1 + (n – j)q+1 – 2(n – j + 1)q+1 , 1≤j≤n
n–1
n
p
k
tn+1 1
xh (tn+1 ) = x0(k) + bj,n+1 f (tj , xh (tj ), (8.38)
k! A(q)
k=0 j=0
where
hq
bj,n+1 = ((n – j + 1)q – (n – j)q ), 0 ≤ j ≤ n. (8.39)
q
and (8.39), respectively. The estimate error of this method is e = max |x(tj ) – xh (tj )| =
i=0,1,...,N
o(hp ), where p = min (2, 1 + q). Although the time domain method is more complex
than the frequency domain method, the step size can be smaller, and it is much better
for analysis of dynamics of fractional-order system.
q
where ∗ Dt0 represents q-order Caputo differential operator. L represents the linear
term. N represents the nonlinear term, and bk is the initial value. Applying the integral
operator to both sides of the equation, we have
q q q
x = Jt0 Lx + Jt0 Nx + Jt0 g + I, (8.41)
(t–t0 )k
where I = m–1 k=0 bk k! is the initial value. According to the Adomian decomposi-
tion algorithm, the solution of the equation can be represented as x = ∞ i
i=0 x . The
nonlinear term can be decomposed as
⎧
i di
⎪
⎨A j =
1
i! d+i
N(vji (+))
+=0
⎪ i , (8.42)
⎩vji (+) = k
(+) xj k
k=0
∞
Nx = Ai (x0 , x1 , . . . , xi ). (8.43)
i=0
8.3 Solution Methods of Fractional-Order Chaotic System 249
According to eq. (8.44), the first seven items of nonlinear term are [187]
⎧
⎪
⎪ A02 = –x10 x30
⎪
⎪
⎪
⎪
⎨A2 = –x1 x3 – x1 x3
1 1 0 0 1
⎪
A32 = –x12 x30 – x11 x31 – x10 x32 , (8.48)
⎪
⎪
⎪
⎪
⎪A2 = –x1 x3 – x12 x31 – x12 x32 – x1 x3
4 3 0 0 3
⎪
⎪
⎩ 5
A2 = –x1 x3 – x1 x3 – x1 x3 – x13 x32 – x12 x33 – x10 x35
5 0 4 1 1 4
⎧
⎪
⎪ A03 = x10 x20
⎪
⎪
⎪
⎪
⎨A3 = x1 x2 + x1 x2
1 1 0 0 1
⎪
A33 = x12 x20 + x11 x21 + x10 x22 (8.49)
⎪
⎪
⎪
⎪ A43 = x13 x20 + x12 x21 + x12 x22 + x10 x23
⎪
⎪
⎪
⎩ 5
A3 = x15 x20 + x14 x21 + x11 x24 + x13 x22 + x12 x23 + x10 x25 .
250 8 Analysis and Simulation of Fractional-Order Chaotic System
q
Let c01 = x10 , c02 = x20 , c03 = x30 , which means c0 = [c01 , c02 , c03 ]. According to x1 = Jt0 Lx0 +
q
Jt0 A0 in formula (8.45) and properties of fractional calculus, we have
⎧
⎪ 0 (t–t0 )q
⎨x1 = 10(c2 – c1 ) A(q+1)
1 0
⎪
q
x21 = [(24 – 4c)c01 + cc02 – c01 c03 ] (t–t 0) . (8.51)
⎪ A(q+1)
⎩x1 = – 8 c0 + c0 c0 (t–t0 )
⎪
3 3 1 1 2 A(q+1)
If c11 = 10(c02 – c01 ), c12 = (24 – 4c)c01 + cc02 + c04 – c01 c03 , c13 = –(8/3)c01 + c01 c02 , then
x1 = c1 (t – t0 )q /A(q + 1). So we only need to solve the corresponding coefficient of each
term. According to formula (8.46), the other five coefficients are obtained as
⎧
⎪
⎨c1 = 10(c2 – c1 )
2 1 1
⎪
c22 = (24 – 4c)c11 + cc12 – c11 c03 – c01 c13 , (8.52)
⎪
⎪
⎩c2 = – 8 c1 + c1 c0 + c0 c1
3 3 1 1 2 1 2
⎧
⎪
⎪ c3 = 10(c22 – c21 )
⎨ 1
c32 = (24 – 4c)c21 + cc22 – c21 c03 – c11 c13 AA(2q+1)
2 (q+1) – c1 c3 ,
0 2
(8.53)
⎪
⎪
⎩c3 = – 8 c2 + c2 c0 + c1 c1 A(2q+1) + c0 c2
3 3 1 1 2 1 2 A2 (q+1) 1 2
⎧
⎪
⎨c1 = 10(c2 – c1 )
4 3 3
⎪
A(3q+1)
c42 = (24 – 4c)c31 + cc32 – c31 c03 – (c21 c13 + c11 c23 ) A(q+1)A(2q+1) – c01 c33 , (8.54)
⎪
⎪
⎩c4 = – 8 c3 + c3 c0 + (c1 c2 + c2 c1 ) A(3q+1) + c0 c3
3 3 1 1 2 1 2 1 2 A(q+1)A(2q+1) 1 2
⎧
⎪
⎪c51 = 10(c42 – c41 )
⎪
⎪
⎪
⎨c5 = (24 – 4c)c4 cc4 – c4 c0 – (c3 c1 + c1 c3 ) A(4q+1) –
2 1 2 1 3 1 3 1 3 A(q+1)A(3q+1)
, (8.55)
⎪
⎪
⎪ c21 c23 AA(4q+1)
2 (2q+1) – c1 c3
0 4
⎪
⎪
⎩c5 = – 8 c4 + c4 c0 + (c1 c3 + c3 c1 ) A(4q+1) + c2 c2 A(4q+1) + c0 c4
3 3 1 1 2 1 2 1 2 A(q+1)A(3q+1) 1 2 A2 (2q+1) 1 2
⎧
⎪
⎪c61 = 10(c52 – c51 )
⎪
⎪
⎪
⎪ A(5q+1)
⎪
⎨c2 = (24 – 4c)c1 + cc2 – c1 c3 – (c1 c3 + c1 c3 ) A(q+1)A(4q+1) –
6 5 5 5 0 4 1 1 4
⎪
A(5q+1)
(c21 c33 + c31 c23 ) A(2q+1)A(3q+1) – c01 c53 . (8.56)
⎪
⎪
⎪
⎪ 8 5 5 4 4 A(5q+1)
c63 = – 3 c1 + c1 c02 + (c11 c2 + c1 c12 ) A(q+1)A(4q+1) +
⎪
⎪
⎪
⎪
⎩ (c2 c3 + c3 c2 ) A(5q+1)
1 2 A(2q+1)A(3q+1) + c1 c2
0 5
1 2
8.4 Simulation Method for Fractional-Order Chaotic System 251
15 20
(a) (b)
10
15
5
x3
0
x2
–5
5
–10
–15 0
–10 –5 0 5 10 –10 –5 0 5 10
x1 x1
Figure 8.1: Attractor of fractional-order simplified Lorenz system: (a) x1 –x2 plane and (b) x1 –x3 plane.
(t – t0 )q (t – t0 )2q (t – t0 )3q
x̃j (t) = c0j + c1j + c2j + c3j
A(q + 1) A(2q + 1) A(3q + 1)
, (8.57)
(t – t0 )4q (t – t0 )5q (t – t0 )6q
+ c4j + c5j + c6j
A(4q + 1) A(5q + 1) A(6q + 1)
where j = 1, 2, 3. Then we can get the analytic solution of system variable. In practical
calculation, the time period [t0 , t] should be divided into smaller time interval [tk , tk+1 ].
In each interval, t0 is set as tk , and then the value of corresponding tk+1 is obtained. The
attractor phase diagram of fractional-order simplified Lorenz system based on formula
(8.57) is shown in Figure 8.1. In this figure, the length of small time interval is 0.01 s.
The initial values are [0.1, 0.2, 0.3]. Parameter c = 5 and fractional order q = 0.98.
Dynamic simulation analysis method is to use the dynamic model to represent the
state change over time, and the dynamical characteristics of the system are analyzed
by observing the real-time evolution of the variables. By employing this method,
we can directly observe the simulation results and also can make a quantitative
analysis for the simulation output data. It has the characteristics of intuition and flex-
ibility. Based on frequency domain analysis method of fractional calculus operator,
fractional-order system simulation model is designed through state-space module in
Simulink. State-space module is a state-space description module for input–output
variables, which is defined as
252 8 Analysis and Simulation of Fractional-Order Chaotic System
ẋ = Ax + Bu
, (8.58)
y = Cx + Du
where x is the state vector, u is the input vector, and y is the output vector. A, B, C, and
D are coefficient matrices. Obviously, those modules receive inputs and then generate
outputs. Parameters of coefficient matrices A, B, C, and D are corresponding to that of
transform function, respectively, which can be calculated by tf2ss transform function
in Matlab.
Steps of the dynamic simulation are as follows:
1. Determine the function modules listed according to the differential equation of
fractional-order chaotic system. The simulation system is built by connecting
these modules.
2. Set simulation parameters. It includes system operating parameters (e.g., sys-
tem operating time, integration step size, tolerance error, integration algorithms,
etc.) and function modules operating parameters (such as integrator initial value,
signal amplitude, frequency, etc.).
3. Set observation module. It is used to output data and observe operation status of
simulation system.
4. Analyze the simulation results. Simulation results are analyzed by output data
and waveform, and compared with that of theoretical analysis. If it is not consist-
ent with each other, the model and parameters should be revised.
During the simulation, Scope module is used to show real-time output signal dynamic-
ally. Phase diagram can be observed by XY graph module. In phase space, convergence
motion corresponds to the equilibrium point, periodic motion corresponds to a closed
trajectory, and chaotic motion corresponds to random separation of the never closed
trajectory in a certain region (strange attractor). So, the output phase diagram of XY
graph module is used to preliminarily judge whether the system is chaotic. Out module
can save results to workspace automatically, so the saved data can be output by yout()
function, and it is used to calculate the power spectrum and the maximum Lyapunov
exponent of the system.
How to set the state-space module is the key of realizing dynamic simulation of
fractional-order chaotic system. Parameter matrices A, B, C, and D in the property dia-
log box are determined by the order of fractional-order system. To obtain each matrix
element, we can call command [A,B,C,D] = TF2SS(NUM,DEN) (where NUM represents
the molecular coefficient matrix and DEN represents the denominator coefficient mat-
rix) or [A,B,C,D] = ZP2SS(Z,P,K) (where Z represents the zeros matrix of transform
function, P represents the poles matrix, and K represents the coefficient).
For example, when q = 0.95, the transform function of fractional-order integral
operator is written as [167]
For formula (8.59), calling format of the function TF2SS is [A,B,C,D] = TF2SS
(1.2831,18.6004,2.0833], [1,18.4738,2.6547,0.003]). Its corresponding return value is
⎡ ⎤ ⎡ ⎤
–18.4738 –2.6547 –0.003 1
⎢ ⎥ ⎢ ⎥
A=⎣ 1 0 0 ⎦ , B = ⎣ 0 ⎦, C = [1.2831, 18.6004, 2.0833140], D = 0.
0 1 0 0
where R is the parameter of system. When R ∈ (0, 5), the system is chaotic. Its
corresponding fractional-order diffusionless Lorenz system is written as
⎧ !
⎪ d x
⎪
⎪ = –x – y
⎪
⎪ dt!
⎪
⎪
⎪
⎨
d" y
= –xz , (8.61)
⎪
⎪ dt"
⎪
⎪
⎪
⎪
⎪ #
⎩ d z = xy + R
⎪
dt#
where 0 < !, ", # ≤ 1 are fractional orders. Dynamic simulation model of the system
is constructed as shown in Figure 8.2. The initial values of system are set as [0.3782,
0.6748, 2.8831]. Let ! = " = # = 0.95 and simulation time is 200 s. By using ODE45
differential equation solvers, the strange attractor of diffusionless Lorenz system in
x–z plane is shown in Figure 8.3.
Design of fractional integral operator circuit is the key of Electronics Workbench cir-
cuit simulation for fractional-order chaotic system. Because the fractional integral
operator with q-order is described by transform function F(s) = 1/sq in frequency do-
main, the unit circuit as shown in Figure 8.4 is used to achieve the expansion of 1/sq
[177]. The nonlinear terms are realized by multipliers. Then the equivalent circuit of
the fractional-order system is constructed.
In Figure 8.4, system function of the equivalent circuit between A and B is
described as
R1 R2 R3 Rn
H(s) = + + +⋯+ , (8.62)
sR1 C1 + 1 sR2 C2 + 1 sR3 C3 + 1 sRn Cn + 1
254 8 Analysis and Simulation of Fractional-Order Chaotic System
Scope
xʹ = Ax + Bu
y = Cx + Du
α = 0.95
XYGraph
–1 xʹ = Ax + Bu
y = Cx + Du
Product2 Gain β = 0.95 XYGraph1
xʹ= Ax + Bu
y = Cx + Du
Product1 XYGraph2
γ = 0.95
5 1
Out2
R
20
10
0
z
–10
–20
–10 –5 0 5 10
x
Figure 8.3: Attractor of diffusionless Lorenz system in the x–z plane when q = 0.95.
R1 R2 R3 Rn
...
A B
C1 C2 C3 Cn
where n is the highest order of s in denominator of 1/s! when q varied from 0.1 to 0.9.
For example, when q = 0.95, n = 3, according to eq. (8.59), we have
R1 R2 R3
F(s) = + + . (8.63)
sR1 C1 + 1 sR2 C2 + 1 sR3 C3 + 1
Comparing eq. (8.63) with eq. (8.59), we have R1 = 15.1 kK, R2 = 1.51 kK, R3 = 692.9 MK,
C1 = 3.616 ,F, C2 = 4.602 ,F, C3 = 1.267 ,F. Resistors and capacitors of 1/sq calculated
in Ref. [166] are shown in Tables 8.3 and 8.4, respectively [177].
The circuit of fractional-order diffusionless Lorenz system is shown in Figure 8.5,
in which the resistance values are R1 = R2 = R3 = R4 = R7 = 10 kK, R6 = R8 = R9 = 100 kK,
1
sa R1 /MK R2 /MK R3 /MK R4 /MK R5 /MK R6 /MK
1
s0.1
0.636 0.3815 0.5672
1
s0.2
1.130 0.6070 0.3500 0.425 0.2498
1
s0.3
2.050 0.9380 0.4830 0.262 0.1430 0.106
1
s0.4
3.744 1.3920 0.6310 0.294 0.1230 0.068
1
s0.5
6.824 1.9440 0.7440 0.296 0.0754 0.030
1
s0.6
12.330 2.4480 0.7380 0.233 0.0754 0.006
1
s0.7
21.900 2.6000 0.5260 0.113 0.0246
1
s0.8
37.850 1.7540 0.1700 0.017 0.0018
1
s0.9
62.840 0.2500 0.0025
1
sa C1 /,F C2 /,F C3 /,F C4 /,F C5 /,F C6 /,F
1
s0.1
15.720 0.1572 0.0006335
1
s0.2
27.990 2.9300 0.285 0.0132
1
s0.3
22.640 5.5200 1.200 0.2460 0.029
1
s0.4
15.020 5.9260 1.920 0.6050 0.183 0.036
1
s0.5
9.246 5.1450 2.129 0.8480 0.324 0.925
1
s0.6
5.527 4.0850 1.990 0.9260 0.420 0.156
1
s0.7
3.284 3.1390 1.700 0.8860 0.454 0.207
1
s0.8
1.980 2.4000 1.390 0.7800 0.420
1
s0.9
1.232 1.8400 1.100
256 8 Analysis and Simulation of Fractional-Order Chaotic System
R1 R4 fraction
R5
R2
R3
AD633 fraction
Y R6
X
R9
AD633 fraction
Y R7
X R10
R8
5V
Figure 8.5: Circuit simulation model of diffusionless Lorenz system with q = 0.95.
10
5
Voltage(z)
–5
–10
–10 –5 0 5 10
Voltage(x)
Figure 8.6: Attractor of fractional-order diffusionless Lorenz system based on circuit simulation.
R5 = R10 = 1 MK. “Fraction” is the integrator unit circuit of 0.95-order after packaged.
When R = 5 and q = 2.85, its attractor of x–z plane is shown in Figure 8.6. Obviously, it
is consistent with that of simulation result as shown in Figure 8.3.
on a computer. The main advantage of this method is that it can solve complex
problems analytically. The basic steps are as follows [188]:
1. Establish mathematical model for fractional-order chaotic system.
2. According to the characteristic of this model, choose suitable software as simula-
tion tool and design the computer program according to the mathematical model.
3. Run the program and get the numerical solution of the system.
4. According to the numerical solution, analyze dynamic characteristic such as
calculating Lyapunov exponent and fractal dimension.
where
⎧
⎪ p 1 n
⎪
⎪xn+1 = x0 + b (–yj – xj )
⎪
⎪ A(!) j=0 1,j,n+1
⎪
⎪
⎨ 1 n
p
yn+1 = y0 + b (–xj zj ) , (8.65)
⎪
⎪ A(") j=0 2,j,n+1
⎪
⎪
⎪
⎪ p 1 n
⎪
⎩zn+1 = z0 + b (xj yj + R)
A(#) j=0 3,j,n+1
⎧
⎪ h!
⎪
⎪ b1,j,n+1 = ((n – j + 1)! – (n – j)! ), 0 ≤ j ≤ n
⎪
⎪ !
⎨ h"
b2,j,n+1 = ((n – j + 1)" – (n – j)" ), 0 ≤ j ≤ n , (8.66)
⎪
⎪ "
⎪
⎪ h#
⎪
⎩b3,j,n+1 = ((n – j + 1)# – (n – j)# ), 0 ≤ j ≤ n
#
⎧
⎪
⎪ n! – (n – !)(n + 1)! j=0
⎪
⎪ a =
⎪
⎪ 1,j,n+1
⎪
⎪ (n – j + 2)!+1 + (n – j)!+1 – 2(n – j + 1)!+1 , 1≤j≤n
⎪
⎪
⎨ n" – (n – ")(n + 1)" j=0
a2,j,n+1 = . (8.67)
⎪
⎪ (n – j + 2)"+1 + (n – j)"+1 – 2(n – j + 1)"+1 , 1≤j≤n
⎪
⎪
⎪
⎪
⎪
⎪ n# – (n – #)(n + 1)# j=0
⎪
⎩a3,j,n+1 =
⎪
(n – j + 2)#+1 + (n – j)#+1 – 2(n – j + 1)#+1 , 1≤j≤n
Based on Matlab, we let ! = " = # = 0.95, R = 5, h = 0.01, T = 200, and the computer
program is designed. The chaotic attractor of fractional-order diffusionless Lorenz
258 8 Analysis and Simulation of Fractional-Order Chaotic System
20
10
0
z
–10
–20
–10 –5 0 5 10
x
Figure 8.7: Attractor of fractional-order diffusionless Lorenz system based on numerical simulation.
chaotic system with q = 0.95 is shown in Figure 8.7. Obviously, it is consistent with
the results of dynamic simulation and circuit simulation.
2. Comparison between ADM and predictor–corrector scheme. Both of them are time
domain methods. Comparison of time complexity and space complexity of the
two methods is shown in Table 8.6. It can be seen that the ADM is better than
predictor–corrector method from both of these two aspects. The data in last three
lines of Table 8.6 is the requirement time for getting time series with the differ-
ent lengths (the results are different with different CPU frequencies. Here, the
computer parameter is Intel Dual E2180 2.0 GHz). It can be seen that the growth
rate of time required for predictor–corrector method is much faster than that of
Adomian decomposition algorithm. So, we can get the conclusion that Adomian
decomposition algorithm is better than predictor–corrector scheme when solving
fractional-order chaotic system.
In 2002, a new chaotic system is proposed [84], which connects Lorenz attractor and
Chen attractor. Meanwhile, Lü system is a special case of this system. So it is called
unified chaotic system [189], and its mathematic model is
⎧
⎪
⎨ẋ = (25a + 10)(y – x)
⎪
ẏ = (28 – 35a)x – xz + (29a – 1)y , (8.68)
⎪
⎪
⎩ż = xy – (a + 8)/3z
260 8 Analysis and Simulation of Fractional-Order Chaotic System
where a is the system parameter. When a ∈ [0,1], it is chaotic. This system represents a
family of chaotic system. Chaotic attractor in x–z plane of unified chaotic system with
different parameters is shown in Figure 3.20.
After replacement of integer-order differential operator with fractional-order dif-
ferential operator, fractional-order unified system becomes
⎧ !
⎪ d x
⎨ dt! = (25a + 10)(y – x)
⎪
d" y
= (28 – 35a)x – xz + (29a – 1)y , (8.69)
⎪
⎪ dt"
⎩ d# z a+8
dt# = xy – 3 z
where !, ", and # are fractional orders and system parameter a ∈ [0,1]. The fractional
order for different variables x, y, and z may be different. The principle is the same for
different fractional orders or the same fractional order. Here, we set 0 < ! = " = # =
q ≤ 1 to analyze fractional-order unified system.
In this section, we focus on the dynamics of the fractional-order unified chaotic system
by Simulink simulation
According to eq. (8.70), when we design the model of fractional-order system, some
modules are required, including state-space module, gain module, sum module, and
produce module. Based on Simulink, we copy the required modules from module lib-
rary to edit window, and then connecting these modules according to system (8.70) as
shown in Figure 8.8.
State-Space1
xʹ = Ax + Bu
y = Cx + Du
35
State-Space2
Gain
xʹ = Ax + Bu
y = Cx + Du
–7
28
Gain2
Gain1
State-Space3
xʹ = Ax + Bu
y = Cx + Du
Product Gain3
Product1
60 40
40
40
20
z
z
20
20
(a) (b) (c)
0 0 0
–20 0 20 –20 0 20 –20 0 20
x x x
40 40 40
20 20 20
z
z
(d) (e) (f)
0 0 0
–20 0 20 –20 0 20 –20 0 20
x x x
40 40 40
20 20 20
z
z
(g) (h) (i)
0 0 0
–20 0 20 –20 0 20 –20 0 20
x x x
Figure 8.9: Attractors in the x–z plane of fractional-order unified system with different orders:
(a) q = 0.1, (b) q = 0.2, (c) q = 0.3, (d) q = 0.4, (e) q = 0.5, (f) q = 0.6, (g) q = 0.7, (h) q = 0.8, and (i)
q = 0.9.
Let q = 0.1–1 and set step size as 0.1. Simulation time is set to 40 s. For different frac-
tional orders, we get the trajectory in x–z phase plane as shown in Figure 8.9. It can be
seen that there exist the random separate states in the phase space when q = 0.1–0.3
and q = 0.8–1. It means chaotic attractor exists and the system is chaotic in this case.
When q = 0.4–0.7, the phase curve finally converges to one point, which means the
system is in periodic state.
By observing phase diagrams of the fractional-order unified system directly, we
get the following conclusions. When q = 0.1–0.3, the system is chaotic. When
q = 0.4–0.7, the system is periodic. When q = 0.8–1, the system shows chaotic behavior
again. Therefore, fractional-order unified system is piecewise chaotic.
1 1 1
p(t)
p(t)
p(t)
0.5 0.5 0.5
1 1 1
p(t)
p(t)
p(t)
1 1 1
p(t)
p(t)
p(t)
Figure 8.10: Normalized power spectrum density of fractional-order unified system with different
orders: (a) q = 0.1, (b) q = 0.2, (c)q = 0.3, (d) q = 0.4, (e) q = 0.5, (f) q = 0.6, (g) q = 0.7, (h) q = 0.8,
and (i) q = 0.9.
can tell whether the system is chaotic or not by observing power spectrum. Based on
Matlab, we calculated normalized power spectrum when fractional order q = 0.1–1,
which is shown in Figure 8.10.
From Figure 8.10, we get the following conclusions. When q = 0.8–1 and
q = 0.1–0.3, the power spectrum is continuous, which means the system is chaotic.
When q = 0.4–0.7, the power spectrum is discrete, which means the system is peri-
odic. Therefore, by observing power spectrum, the fractional-order unified system
is piecewise chaotic, which is consistent with the conclusion obtained by direct
observation.
Table 8.7: Largest Lyapunov exponent of unified system with different order q.
Here, we use Wolf method [190] to calculate the largest Lyapunov exponent of
fractional-order unified system. When the fractional order q = 0.1–1 with step size
of 0.1, the results are shown in Table 8.7. When q = 0.8–1 and q = 0.1–0.3, the largest
Lyapunov exponent is positive, which means the system is chaotic. When q = 0.4–0.7,
the largest Lyapunov exponent is zero, which means the system is periodic. Thus, from
the largest Lyapunov exponent, we can get the conclusion that the system is piecewise
chaotic [191].
the system is piecewise chaotic. When the fractional order is fixed, it is possible for
the system to change from nonchaotic to chaotic. Besides, it can be seen that with the
increase of parameter and order, the chaotic range of the system expands, while the
nonchaotic range of order narrows.
8.5.4.2 Routes to Chaos with Fixed Fractional Order and Parameter Varying
We take q = 0.3 as an example to discuss the routes to chaos of the fractional-
order system. When the initial values are (–4.7508, –7.3886, 12.3605) and parameter
a = 0–1, the phase diagram on the x–z plane of fractional-order unified system is
shown in Figure 8.11. When the system parameter a is relatively small, the system
40 40 40
(a) (b) (c)
20 20 20
0 0 0
–20 0 20 –20 0 20 –20 0 20
40 40 40
(d) (e) (f)
20 20 20
0 0 0
–20 0 20 –20 0 20 –20 0 20
Figure 8.11: Attractors in the x–z phase of unified system with different parameter and q = 0.3:
(a) a = 0, (b) a = 0.1, (c) a = 0.2, (d) a = 0.3, (e) a = 0.45, and (f) a = 0.49.
266 8 Analysis and Simulation of Fractional-Order Chaotic System
converges to the equilibrium point (as shown in Figure 8.11(a), 8.11(b), and 8.11(c)).
However, with the increase of a, the evolution time of state variable tending to the
equilibrium point becomes longer (as shown in Figure 8.11(d) and 8.11(e)). As a further
increase to a certain value, such as a = 0.49, system reaches a border of attrac-
tion basin. At this time, system enters into chaos through boundary crisis bifurcation
(as shown in Figure 8.11(f)). However, if we pursue accurate analysis for routes to
chaos of fractional-order system, complex mathematical analysis and calculation are
required.
By observing system phase diagrams and calculating power spectrum and the
largest Lyapunov exponent, we analyzed dynamical characteristic of fractional-order
unified system in detail. We also find that system shows piecewise chaotic behavior
with the variation of system parameter and differential order.
where R is the system parameter. When R ∈ (0, 5), there exist equilibrium points
√ √
(x∗ , y∗ , z∗ ) = (± R, ∓ R, 0). The eigenvalues of this system satisfy the equation
+3 + +2 + R+ + 2R = 0. When R = 3.4693, the chaotic attractor of diffusionless Lorenz
system is shown in Figure 8.12(a). Its maximum Kaplan–Yorke fractal is 2.23542 [192].
10 (a) 10 (b)
0 0
z
–10 –10
10 10 10 10
0 0 0 0
y –10 y –10
–10 x –10 x
Figure 8.12: Attractors of diffusionless Lorenz system with R = 3.4693: (a) ! = " = # = 1 and
(b) ! = " = # = 0.95.
8.6 Dynamics of Fractional-Order Diffusionless Lorenz System Based 267
where !, ", and # are the fractional order and 0 < !, ", # ≤ 1. When ! = " =
# = 0.95 and R = 3.4693, the chaotic attractor of diffusionless Lorenz system is shown
in Figure 8.12(b).
According to the previous discussion about time domain solution algorithm of the
fractional-order system, we can get the iterative calculation equation of fractional-
order diffusionless system as shown in eq. (8.64). Next, we analyze its dynamic
characteristic in detail.
Here, we adopt Wolf algorithm [190] calculating the largest Lyapunov exponent. Let
! = " = # = q and control the variation of parameter, we can get the effective chaotic
range of frictional-order diffusionless system as shown in Figure 8.13. Obviously, there
exist three different dynamic statuses: limit circle, chaos, and convergence. If the
integer-order system is chaotic, the corresponding chaotic range of fractional-order
system will narrow slowly with the increase of system control parameter. If the integer-
order system shows limit circle, the corresponding fractional-order system is chaotic.
But the chaotic range will narrow quickly with the increase of system parameter. When
R = 8, the largest Lyapunov exponent of fractional-order diffusionless Lorenz system
1.05
1
Limit circle
0.95 Chaotic
q
0.9
Converge
0.85
0.5 2 4 6 8 10
R
0.1
0.05
The largest LE
–0.05
–0.1
0.9 0.95 1
q
Figure 8.14: The largest Lyapunov exponent of fractional-order diffusionless Lorenz system
with R = 8.
is shown in Figure 8.14. Obviously, its chaotic characteristic is consistent with the
chaotic range as shown in Figure 8.13.
Here, we set the fractional order ! = " = # = 0.95 and let the system control parameter
R vary from 0.5 to 11 with the step size of 0.01. The initial values are x(0) = –0.0249,
y(0) = –0.1563, and z(0) = 0.9441, and the simulation time is 140 s. The bifurc-
ation diagram of fractional-order system is shown in Figure 8.15. Obviously, when
the order of fractional-order diffusionless system is 2.85 and R varies, the system is
chaotic with a periodic window. When the control parameter R decreased from 11, the
30
25
20
15
Zmax
10
5
0
–5
–10
0 1 2 3 4 5 6 7 8 9 10 11
R
Figure 8.15: Bifurcation diagram of fractional-order diffusionless system with R varying at q = 0.95.
8.6 Dynamics of Fractional-Order Diffusionless Lorenz System Based 269
18
14
Zmax
10
2
9 9.4 9.8 10.2 10.6 11
R
Figure 8.16: Periodic window of fractional-order diffusionless system with R varying at q = 0.95.
Now, we set ! = " = # = q, R = 8 and q varying from 0.9 to 1. The initial val-
ues and running time kept the same as above, but the step size of R is 0.0005. The
system bifurcation diagram is shown in Figure 8.17. The system enters into chaos by
period-doubling bifurcation with decreasing fractional order. It is interesting to note
that a chaotic transient is observed when q is less than 0.912. The state-space traject-
ory is shown in Figure 8.18(a) for q = 0.911, which suddenly switches to a pattern
of oscillation that decays to the right equilibrium point. The time domain waveform
of variation z(t) shown in Figure 8.18(b) eventually converges to the fixed point. On
the average, the transform from chaotic behavior into damped state requires about
70 oscillations. When q is relatively greater, its chaotic behavior will remain longer.
Similar phenomenon has been reported in the standard Lorenz system [195]. The
fractional-order system enters to chaos by a period-doubling bifurcation as shown
270 8 Analysis and Simulation of Fractional-Order Chaotic System
25
20
15
Zmax
10
0
0.9 0.92 0.94 0.96 0.98 1
q
20
(b)
20
(a) 10
0 0
z
–10
–20
20 Chaotic oscillation Decay
10 –20
0 0 50 100
y 0
–20 –10 x t/s
Figure 8.18: Transient chaotic behavior in system (8.72) with R = 8 and q = 0.911:
(a) attractor diagram in the x–y–z plane and (b) time domain waveform.
1. Fix " = # = 1, R = 8 and let ! vary. The system is calculated numerically for
! ∈ [0.4,1] with an increment of 0.002. The bifurcation diagram is shown in Fig-
ure 8.20(a). Obviously, the fractional-order system is chaotic when ! ∈ [0.43,0.94)
8.6 Dynamics of Fractional-Order Diffusionless Lorenz System Based 271
20 25
(a) (b)
16 20
12 15
Zmax
Zmax
8 10
4 5
0 0
0.95 0.96 0.97 0.98 0.99 1 0.93 0.934 0.938 0.942 0.946 0.95
q q
25 18
(a) (b)
20 16
15 14
10
12
5
Zmax
Zmax
10
0
–5 8
–10 6
–15 4
–20 2
0.4 0.5 0.6 0.7 0.8 0.9 1 0.48 0.49 0.5 0.51 0.52
α(β = γ = 1) α(β = γ = 1)
Figure 8.20: Bifurcation diagrams of fractional-order diffusionless Lorenz system with ! at " = # = 1:
(a) ! ∈ [0.4, 1] and (b) ! ∈ [0.48, 0.52].
25
20
15
Zmax
10
0
0.75 0.8 0.85 0.9 0.95 1
β (α = γ = 1)
25
(a) 24 (b)
20 22
20
15
18
Zmax
Zmax
10 16
5 14
12
0
10
–5 8
0.8 0.84 0.88 0.92 0.96 1 0.81 0.82 0.83 0.84 0.85 0.86
γ (α = β = 1) γ (α = β = 1)
Figure 8.22: Bifurcation diagrams of fractional-order diffusionless Lorenz system with # at ! = " = 1:
(a) # ∈ [0.8, 1] and (b) # ∈ [0.81, 0.86].
# = 0.816. However, its range of chaotic order is smaller. The dynamic behaviors
in the periodic window are similar with the case of (2) as shown in Figure 8.22(b)
with steps of 0.0002.
The analysis results mentioned above show the fractional-order diffusionless Lorenz
system has rich dynamical behaviors. It provides a theoretical and simulation basis
for practical application of fractional-order chaotic system.
Questions
1. What is the difference and relationship between fractional-order chaotic system
and integer-order system?
Questions 273
Chaos system can be applied in many fields, such as secure communications, in-
formation encryption, system control, system optimization, and so on. To develop the
applications of chaos theory, the hardware design and implementation of chaotic sys-
tem must be solved, including the design and implementation of chaotic analog circuit
and chaotic digital circuit. In this chapter, we focus on the simulation and hardware
implementation of chaotic system.
Dynamic simulation steps of Simulink are shown in Figure 9.1. The steps include
establishing simulation model, setting system parameters and observation window,
analyzing simulation results, and modifying model and parameters [188]. A detailed
description is presented as follows:
1. Establishing simulation mathematical model. It is the key for the simulation of
chaos system. According to the chaotic system equation, the whole system is sim-
plified to the source system. Functions of the system are determined, and each
part of the function is modeled. We should find out the relationship between
the various parts and draw the system flow diagram model. With the increase
of the modules and complexity of the system, the model will become more and
more complicated. To reduce the number of modules in the model window, we
can group the same function modules and simplify the complex problem by
packaging subsystem. For example, to observe the time evolution of the syn-
chronization error signal (|e| = (x2 – x1 )2 + (y2 – y1 )2 + (z2 – z1 )2 ), the module
is constructed as shown in Figure 9.2(a), which can be packaged into a subsys-
tem as shown in Figure 9.2(b), which simplifies the structure of the simulation
system.
2. Building simulation system model. According to the established mathematical
model, the function module is dragged into the editing window from the Simulink
model library. After the modules are connected, the simulation model of chaotic
system is constructed.
3. Setting simulation parameters. It is an important part of the simulation process,
which may directly affect the simulation times and results. Parameters setting in-
clude setting operating system parameters (such as the system running time, the
integration step size, the tolerable error, the integral algorithm) and the operation
9.1 Dynamic Simulation of Chaotic System 275
1
x
2 Product1
x'
MATLAB
3 1 x
y Function
d x'
sprt
4 Product2 y
y' d
y'
5
z z
6 Product3 z'
z' distance
(a) (b)
Figure 9.2: Error calculation submodule for synchronization system: (a) error signal function module
and (b) packaged subsystem.
parameters of the function modules (such as the initial value, signal amplitude,
frequency). The former is finished in the parameter submenu of the Simulink
menu, and the latter is finished in the pop-up window by double-clicking the
module.
4. Setting observation window. The observation module is used to observe the op-
eration of the simulation system, so as to adjust the parameters and analyze
the results. The observation modules include the oscilloscope (Scope), XYgraph,
Display, to workspace, and so on.
5. Analyzing simulation results and correcting model or parameter. We can judge
whether the simulation results are consistent with that of the theoretical ana-
lysis by analyzing the output waveform and output data of the simulation system.
Generally, it is difficult to succeed at a time. Many factors affect the simulation
results. First, you need to check whether the simulation system is consistent
with the theoretical model or whether the parameter settings are correct. If the
correct simulation results cannot be obtained by checking and modifying the
simulation parameters, you need to consider whether the simulation model is
correct. We need to modify the model and then simulate it until the results are
satisfactory.
276 9 Simulation and Hardware Implementation of Chaotic System
Circuit diagram
Component parameters
Observe the
Adjust circuit
experimental results
N
Results are
right?
Data analysis
4. Use EWB virtual instrument to observe the experimental results, analyze data, and
compare whether the results are consistent with that of the theoretical analysis.
Otherwise we should adjust the circuit.
There are three kinds of chaotic circuit design methods, such as individual design,
modular design, and improved modular design. The advantage of the individual
design is that the number of circuit components is the least, but it needs a rich prior
knowledge and circuit design skills. The modular design is based on the nondimen-
sional state equation, which is universal but needs more components. The improved
modular design is applied to determine the system parameters by comparing the state
differential equation with the actual circuit state differential equation so that the num-
ber of components is the minimum. Chaotic circuit modular design flowchart is shown
in Figure 9.4. First, based on the dimensionless chaotic state equation, the phase
278 9 Simulation and Hardware Implementation of Chaotic System
N
Beyond component range?
diagrams are calculated to determine the range of the state variables. If the variable is
too large to beyond the scope of the dynamic variables of components, the proportion
of compression transform is needed, and all variables will be reduced N times. If the
variables are within the range, it is not necessary to carry out the compression trans-
formation. Then the EWB circuit simulation is carried out, and the circuit is designed
finally.
Circuit design process mainly includes following five steps.
1. Variable ratio compression transformation. Because the common power supply
voltage is 15 V, the linear dynamic range of an operational amplifier (OA) is 13.5 V.
According to the simulation graph, one needs to analyze whether the variable
range is beyond. If it is beyond, it needs to do compression transformation.
2. Do timescale transformation.
3. Do differential integral transformation.
4. The equation was standardized to adapt to the inverse phase adder in the module
circuit.
5. According to the standard integral equation, the corresponding modular circuit is
designed.
9.3 Design of Chaotic Analog Circuit 279
Reverse phase
× Inverse integrator2 Inverter2
additive ratio2 F2 –x2 x2
f2
∙ ∙ ∙
∙ ∙ ∙
∙ ∙ ∙
In general, a chaotic circuit contains a nonlinear unit and a linear unit. A nonlinear
unit circuit includes analog multiplier, Chua’s diode circuit, the absolute value of the
arithmetic circuit and index operation circuit, and so on. Based on the OA device, the
common linear basic unit circuits are shown in Figure 9.6, and the input and output
expressions of each unit circuit are presented as follows.
1. Reverse phase proportion amplifier: vo = – RR21 vi as shown in Figure 9.6(a).
2. Reverse phase adder: vo = – RR31 vi1 + RR32 vi2 as shown in Figure 9.6(b).
R2
3. Subtractor: vo = R1 (vi2 – vi1 ) as shown in Figure 9.6(c).
R1 +R2
4. Proportional amplifier: vo = R1 vi as shown in Figure 9.6(d).
dv
5. Reverse phase differentiator: vo = –RC dti as shown in Figure 9.6(e).
6. 1
Reverse phase integrator: vo = – RC vi dt as shown in Figure 9.6(f).
280 9 Simulation and Hardware Implementation of Chaotic System
R2 νi1 R1 R3
νi R1 νi2 R2
νo νo
(a) (b)
R2
νi
νi R1 νo
νo
νi2 R1 R1 R2
R2
(c) (d)
R C
νi C νi R
νo νo
(e) (f)
Figure 9.6: Linear unit circuits: (a) reverse phase proportion amplifier; (b) reverse phase adder;
(c) subtractor; (d) proportional amplifier; (e) inverse phase differentiator; and (f) reverse phase
integrator.
Now taking the simplified Lorenz system as an example, the modular design
process is described in detail. The mathematical model of simplified Lorenz
system is [56]
⎧
⎪
⎨ẋ = 10(y – x)
⎪
ẏ = –xz + (24 – 4c)x + cy , (9.1)
⎪
⎪
⎩ż = xy – 8z/3
⎧
⎪ ′ ′ ′
⎨ẋ = R0 C0 10(y – x )
1
⎪
ẏ′ = 1 ′ ′
R0 C0 (–4x z + 4x +
′ 5y′ ) . (9.3)
⎪
⎪
⎩ż′ = ′ ′ ′
R0 C0 (4x y – 8z /3)
1
4. According to system (9.4), the basic circuit units include inverter, inverting adder,
integrator, and multiplier. The circuit is shown in Figure 9.7.
In Figure 9.7, x, y, and z represent the output voltage values, respectively. According
to the circuit theory, the state equation of the circuit is obtained:
⎧
⎪ R3
y – RR31 x
⎪ẋ =
1
⎪ R4 C1
⎨ R2
ẏ = 1
R11 C2 – R10 0.1xz + RR107 x + R10
R8 y . (9.5)
⎪
⎪ R9
⎪
⎩ż = 1 R16 R16
R17 C3 R14 0.1xy – R15 z
R1 R3 C1
x R6
R2
y R4
R5
x x
R7
x
R8 R10 C2
x Y y R13
R9
–z X R11
R12
y y
x Y
R14 R16 C3
X
y R19
R15
z R17
R18
z z
Comparing eq. (9.4) with eq. (9.5), the value of the components is obtained as
Ri = 10 kK (i = 1, 2, 4, 5, 6, 11, 12, 13, 17, 18, 19), Ri = 100 kK (i = 3, 10, 16), R7 = 20 kK,
R8 = 25 kK, R9 = R14 = 2.5 kK, R15 = 37.5 kK, Ci = 100 nF (i = 1, 2, 3).
The circuit units for system (9.7) include basic unit circuit module, inverter module,
and nonlinear circuit module. Next, we design the system circuit based on OA and
current conveyor (CC).
R1
νi1
R2 C
νi2
R3
νi3
νo
if
Figure 9.8: General basic unit circuit module based on improved modular design.
9.4 Improved Modular Design of Chaotic Circuit 283
Comparing eq. (9.7) with eq. (9.8), the values of the components are obtained as fol-
lows: Ri = 10 kK (i = 1, 2, 3, 4, 5, 6), Rxi = 135 kK (i = 1, 2, 3), R7 = 16.7 kK, Ci = 10
nF (i = 1, 2, 3). According to Figure 9.9, we do simulations on EWB, and the results are
shown in Figure 9.10.
The CC is the active device commonly used in current mode circuit, and it has strong
versatility, high precision, less external devices, and good high-frequency character-
istics. It has been widely used in active power filter, analog signal processing, and
so on. Among the CCs, the second-generation current conveyor (CCII) is widely ap-
plied. Its circuit symbol is shown in Figure 9.11. Characteristics of the ports are iy = 0,
Vx = Vy , and iz = ±ix . When iz = ix , it is the second-generation current conveyor
(CCII+). When iz = –ix , it is the reverse second-generation current conveyor (CCII–).
(a) (b)
i (x)
f (x)
R5 R4
Rx1
R6 +2 V
R7 y x
Rx2 i(x)
R3
C3
C2
C1
Rx3
R2
R1 ‒2 V
z
y x
Figure 9.9: Multiscroll Jerk circuit based on OA devices: (a) main circuit and
(b) subcircuit of function f (x).
284 9 Simulation and Hardware Implementation of Chaotic System
(a) (b)
2 2
1 1
0 0
z
y
‒1 ‒1
‒2 ‒2
‒5 ‒3 ‒1 1 3 5 ‒5 ‒3 ‒1 1 3 5
x x
Figure 9.10: Jerk circuit simulation with four scrolls based on the OA: (a) phase diagram on x–y plane
and (b) phase diagram on x–z plane.
iy
Vy Y iz
ix CC Z Vz
Vx X
iy C C II +
Vy Y iy CC II –
Vz Vy Y
ix W Y Vz
Vx X Z iz ix W W
Vx X Z X Z iz
(a) C C
(b) CC II–
Figure 9.12: CCII implementation circuit : (a) CCII+ and (b) CCII–.
CCII+ can be implemented by employing an AD844 device, while CCII– can be realized
by cascading two AD844 devices as shown in Figure 9.12.
Based on CCII+, the common linear basic unit circuits are shown in Figure 9.13;
the input and output expressions of each unit circuit are shown as follows [198]:
1. Proportional amplifier: vo = RR21 vi , as shown in Figure 9.13(a).
2. Reverse proportional amplifier: vo = – RR21 vi , as shown in Figure 9.13(b).
dv
3. Inverting differential device: vo = –RC dti , as shown in Figure 9.13(c).
4. Inverting adder: vo = – RR31 vi1 + RR32 vi2 , as shown in Figure 9.13(d).
5. Reverse integrator: vo = – RC 1
vi dt, as shown in Figure 9.13(e).
6. 1
Integrator: vo = RC vi dt, as shown in Figure 9.13(f).
9.4 Improved Modular Design of Chaotic Circuit 285
νi Y W νo Y W νo
CC CC
X Z νi X Z
R1 R2 R1 R2
(a) (b)
Y W νo Y W νo
CC CC
νi X Z νi1 X Z
R1 R3
C
νi2
R R2
(c) (d)
Y W νo νi Y W νo
CC CC
νi X Z X Z
R C R C
(e) (f)
Figure 9.13: Basic unit circuits: (a) proportional amplifier; (b) reverse proportional amplifier;
(c) reverse differentiator; (d) inverting adder; (e) reverse integrator; and (f) integrator.
i(x)
f (x)
Rwx N1
R3 W Y 2V Y W
CC CC
Z X X Z
R4 Ra Rb
y Rwx
R5 R7 Y W
R6 x x CC i(x)
Y W X Z
R1 CC Ra Rb
Y W y X Z Rwx
R2 CC ‒2V Y W
X Z C1
Y W CC
CC z C2 X Z
X Z Ra Rb
C3
(a) (b)
Figure 9.14: Four-scroll Jerk circuit based on CCII device: (a) main circuit and (b) subcircuit f (x).
Based on the mathematical models and system (9.7), the four-scroll Jerk circuit is
designed based on CCII as shown in Figure 9.14.
Nonlinear function f (x) is a step function, and a saturation function is achieved
based on the N1 network as shown in Figure 9.14(b). The saturation function sequence
is realized by parallel network. If Rb /Ra is large enough, the sequence of saturation
function can be approximated by infinite step function. The output current is i(x) =
–[sgn(x –2)+sgn(x)+sgn(x +2)]/Rwx . According to the circuit theory, the state equation
of the circuit is
286 9 Simulation and Hardware Implementation of Chaotic System
(a) (b)
2 2
1 1
0 0
y
z
‒1 ‒1
‒2 ‒2
‒5 ‒3 ‒1 1 3 5 ‒5 ‒3 ‒1 1 3 5
x x
Figure 9.15: Four-scroll Jerk chaotic attractor based on CCII: (a) phase diagram on x–y plane and
(b) phase diagram on x–z plane.
(a) (b)
Figure 9.16: Phase diagram on x–y plane: (a) circuit implement based on OA and (b) circuit
implement based on CC.
⎧
⎪
⎨ẋ = R1 C1 y
1
⎪
ẏ = R21C2 z . (9.9)
⎪
⎪
⎩ż = – 1 x
+ y
+ z
+ i(x)
C3 R3 R4 R5
When comparing eq. (9.7) with eq. (9.9), the value of each component was obtained
as follows: Ri = 10 kK (i = 1, 2, 3, 4, 6), R5 = 16.7 kK, R7 = 20 kK, Rwx = 102 kK,
Ra = 470 K, Rb = 1 MK, Ci = 10 nF (i = 1, 2, 3). The circuit in Figure 9.14 is simulated on
EWB. According to Figure 9.14, we do simulations on EWB, and the results are shown
in Figure 9.15.
According to Figures 9.9 and 9.14, the four-scroll Jerk circuit is designed based on
CC and OA devices, and the phase diagram is observed by oscilloscope as shown in
9.5 Digital Signal Processor Design and Implementation of Chaotic Systems 287
Figure 9.16. When compared with Figures 9.10 and 9.15, respectively, we concluded that
the results of actual circuit experiment and circuit simulation experiment are consist-
ent, and it verified the correctness of the circuit design and the physical realization of
the four-scroll Jerk system.
Communication imterface
Computer
(MAX3232)
DSP
(TMS320F2812)
DA conversion
Oscilloscope
(DAC8552)
C 1+ 1 16 VCC
V+ 2 15 GND
C1– 3 14 T1OUT
C2– 4 MAX3232 13 R1IN
VDD 1 8 GND C2+ 5 12 R1OUT
VREF 2 7 DIN V– 6 11 T1IN
DAC8552
VOUTB 3 6 SCLK 10 T2IN
T2OUT 7
VOUT B 4 5 SYNC R2IN 8 9 R2OUT
(a) (b)
system conveniently. Here, we choose TMS320F2812 with 32-bit fixed point DSP chip,
amount of peripheral interfaces, and 150 MHz main frequency. Universal Asynchron-
ous Receiver/Transmitter (UART) serial interface is generally used in communication
interface, which transmits chaos sequences to the computer in real time. The D/A con-
verter converts the chaotic sequence generated by DSP into analog signals, which can
be observed on the oscilloscope. So it demands that the D/A conversion has the dual-
channel conversion function for synchronous output, and its conversion speed and
precision are high enough. The operation command words of DSP for the DAC8552 are
shown in Figure 9.19, where DB15–DB0 is the converted digital signal.
By employing CCS4.2 as the DSP integrated development environment, the exper-
imental platform of chaotic system based on DSP is shown in Figure 9.20.
The software flowchart for the realization of the chaos system on DSP is shown in
Figure 9.21, which includes DSP initialization, setting of the clock frequency, initializ-
ation of the related interface, and so on. Different chaotic system has different system
parameters, and the iteration step size, iteration number, and iteration initial value
also need to be determined. According to different solution algorithm, we can derive
the iterative calculation formula. Each iteration calculation results needs to be stored
as the initial value of the next iteration. If data output to D/A or PC, the corresponding
data processing is needed, as shown in Figures 9.22 and 9.23.
Oscilloscope
D/A converter
TMS320F2812
UART experimental platform
Start
DA To PC or PC
DSP initialization
DA ?
Iterative computation
To DA To PC
Data entry
Replace iteration Y
initial value End
Proportional amplification
1. Data processing 1: To realize the D/A conversion correctly, a large enough positive
number is added to all of the output value of chaotic sequence, which is equival-
ent to coordinate translation on the output of the system. DAC8552 is a 16-bit D/A
converter, and the converted digital quantity must be positive integers between 0
290 9 Simulation and Hardware Implementation of Chaotic System
Output to PC
and 65,535, while the majority value of the chaos sequence generated by DSP is
too small. So we need to multiply the sequence value with a positive integer so
that the digital numbers are distributed in the whole range of conversion as far as
possible.
2. Data processing 2: Similarly, the sequence value of variable is turned to positive.
To facilitate the computer display and process, each bit of the chaotic sequence
value is converted to ASCII code. Namely, each decimal adds 48 and transmits
to the computer bit by bit. Each complete sequence is separated with commas
(ASCII 0 × 2C). The length of the data can be chosen. When we analyzing it on
computer, the chaotic sequence value can be restored to the values calculated
by DSP.
The DSP implementation steps are presented by taking integer-order simplified Lorenz
system and its fractional-order counterpart as examples.
Taking the simplified Lorenz system as an example, the DSP implementation of the
chaotic system based on the fourth-order Runge–Kutta algorithm is described. The
simplified Lorenz system equation is [56]
⎧
⎪
⎪ẋ = 10(y – x)
⎨
ẏ = (24 – 4c)x – xz + cy , (9.10)
⎪
⎪
⎩ż = xy – 8z/3
where c is the system parameter. When c ∈ [–1.59, 7.75], it is chaotic. By solving the
differential equations based on the fourth-order Runge–Kutta method, we obtain
9.5 Digital Signal Processor Design and Implementation of Chaotic Systems 291
⎧
⎪
⎨xn+1 = xn + (K11 + 2K12 + 2K13 + K14 )/6
⎪
yn+1 = yn + (K21 + 2K22 + 2K23 + K24 )/6 . (9.11)
⎪
⎪
⎩z = z + (K + 2K + 2K + K )/6
n+1 n 31 32 33 34
⎧
⎪
⎨K11 = 10[(yn – xn )]T
⎪
K21 = [(24 – 4c)xn – xn zn + cyn ]T , (9.12)
⎪
⎪
⎩K = [x y – 8z /3]T
31 n n n
⎧
⎪
⎨K12 = 10[(yn + 0.5K21 ) – (xn + 0.5K11 )]T
⎪
K22 = [(24 – 4c)(xn + 0.5K11 ) – (xn + 0.5K11 )(zn + 0.5K31 ) + c(yn + 0.5K21 )]T , (9.13)
⎪
⎪
⎩K = [(x + 0.5K )(y + 0.5K ) – 8(z + 0.5K )/3]T
32 n 11 n 21 n 31
⎧
⎪
⎨K13 = 10[(yn + 0.5K22 ) – (xn + 0.5K12 )]T
⎪
K = [(24 – 4c)(xn + 0.5K12 ) – (xn + 0.5K12 )(zn + 0.5K32 ) + c(yn + 0.5K22 )]T , (9.14)
⎪ 23
⎪
⎩K = [(x + 0.5K )(y + 0.5K ) – 8(z + 0.5K )/3]T
33 n 12 n 22 n 32
⎧
⎪
⎨K14 = 10[(yn + K23 ) – (xn + K13 )]T
⎪
K24 = [(24 – 4c)(xn + K13 ) – (xn + K13 )(zn + K33 ) + c(yn + K23 )]T , (9.15)
⎪
⎪
⎩K = [(x + K )(y + K ) – 8(z + K )/3]T
34 n 13 n 23 n 33
where T is the iteration step size. According to eqs (9.11)–(9.15), setting initial values
x = 0.1, y = 0.2, z = 0.3, c = 5, and T = 0.01, the attractor phase diagram is generated
by the hardware implementation as shown in Figure 9.24.
Taking 4 bits after decimal point of the chaotic sequence generated by DSP,
and transmitting a total of 10,000 sequence values between 1,001 and 20,000 to the
computer, the phase diagram of the attractor is plotted as shown in Figure 9.25.
z
z
x x y
Figure 9.24: Attractors in an oscilloscope for the Lorenz system based on the DSP: (a) x–y plane;
(b) x–z plane; and (c) y–z plane.
292 9 Simulation and Hardware Implementation of Chaotic System
0 9 9
y
z
‒15 0 0
‒15 0 15 ‒15 0 15 ‒15 0 15
x x y
Figure 9.25: Attractors of the simplified Lorenz system by experiment data from DSP: (a) x–y plane;
(b) x–z plane; and (c) y–z plane.
⎧
⎪ ∗ q
⎨ Dt0 x = 10(y – x)
⎪
∗ Dq y = (24 – 4c)x – xz + cy , (9.16)
⎪ t0
⎪
⎩∗ Dq z = xy – 8z/3
t0
where q is the order of fractional differential and c is the system parameter. Choosing
suitable q and c, it is chaotic. According to the Adomian decomposition algorithm, the
fractional differential equations are solved, and the first seven items are obtained as
follows [202]:
⎧
⎪
⎨C10 = xm
⎪
C20 = ym , (9.17)
⎪
⎪
⎩C = z
30 m
⎧
⎪
⎪ C = 10(C20 – C10 )
⎪
⎨ 11
C21 = (24 – 4c)C10 + cC20 – C10 C30 , (9.18)
⎪
⎪
⎪C = – 8 C + C C
⎩ 31 30 10 20
3
⎧
⎪
⎪ C = 10(C21 – C11 )
⎪
⎨ 12
C22 = (24 – 4c)C11 + cC21 – C11 C30 – C10 C31 , (9.19)
⎪
⎪ 8
⎪
⎩C32 = – C31 + C11 C20 + C10 C21
3
9.5 Digital Signal Processor Design and Implementation of Chaotic Systems 293
⎧
⎪
⎪C = 10(C22 – C12 )
⎨ 13
C23 = (24 – 4c)C12 + cC22 – C12 C30 – C11 C31 AA(2q+1)
2 (q+1) – C10 C32 , (9.20)
⎪
⎪
⎩C = – 8 C + C C + C C A(2q+1) + C C
33 3 32 12 20 11 21 A2 (q+1) 10 22
⎧
⎪
⎨C14 = 10(C23 – C13 )
⎪
A(3q+1)
C24 = (24 – 4c)C13 + cC23 – C13 C30 – (C12 C31 + C11 C32 ) A(q+1)A(2q+1) – C10 C33 , (9.21)
⎪
⎪
⎩C = – 8 C + C C + (C C + C C ) A(3q+1) + C C
34 3 33 13 20 12 21 11 22 A(q+1)A(2q+1) 10 23
⎧
⎪
⎪ C15 = 10(C24 – C14 )
⎪
⎪
⎪
⎪ A(4q+1)
⎪
⎪C25 = (24 – 4c)C14 + cC24 – C14 C30 – (C13 C31 + C11 C33 ) A(q+1)A(3q+1)
⎨
–C12 C32 AA(4q+1)
2 (2q+1) – C10 C34 , (9.22)
⎪
⎪
⎪
⎪C35 = – C34 + C14 C20 + (C13 C21 + C11 C23 )
8 A(4q+1)
⎪
⎪ A(q+1)A(3q+1)
⎪
⎪
3
⎩+C12 C22 A(4q+1) + C10 C24
A2 (2q+1)
⎧
⎪
⎪C16 = 10(C25 – C15 )
⎪
⎪
⎪
⎪ A(5q+1)
⎪
⎨C26 = (24 – 4c)C15 + cC25 – C15 C30 – (C14 C31 + C11 C34 ) A(q+1)A(4q+1)
⎪
A(5q+1)
–(C13 C32 + C12 C33 ) A(2q+1)A(3q+1) – C10 C35 , (9.23)
⎪
⎪
⎪
⎪ A(5q+1)
⎪C36 = – 3 C35 + C15 C20 + (C14 C21 + C11 C24 ) A(q+1)A(4q+1)
8
⎪
⎪
⎪
⎩+(C13 C22 + C12 C23 ) A(5q+1) + C10 C25
A(2q+1)A(3q+1)
⎡ ⎤ ⎡ ⎤
xm+1 C10 C11 C12 C13 C14 C15 C16
⎢ ⎥ ⎢ ⎥
⎣ ym+1 ⎦ = ⎣ C20 C21 C22 C23 C24 C25 C26 ⎦
zm+1 C30 C31 C32 C33 C34 C35 C36
T
hq h2q h3q h4q h5q h6q
1 . (9.24)
A(q + 1) A(2q + 1) A(3q + 1) A(4q + 1) A(5q + 1) A(6q + 1)
For all the above-mentioned equations, h is the iterative step size and A(⋅) is the gamma
function. According to the calculating process, A(⋅) and hnq are unchanged in the iter-
ative process, so to speed up the calculation, we need to calculate the relevant A(⋅) and
hnq before iteration, taking them as constants in iterative process. The initial values are
x0 = 0.1, y0 = 0.2, z0 = 0.3, c = 5, q = 0.9, and h = 0.01, and hardware implementation
of the attractor phase diagram is shown in Figure 9.26.
Taking 4 bits after decimal point of the chaotic sequence generated by DSP and
transmitting a total of 10,000 sequence values between 10,001 and 20,000 to the
computer, the phase diagram of the attractor is plotted as shown in Figure 9.27.
In this chapter, we study the simulation and circuit design techniques of the chaotic
system, including the dynamic simulation, circuit simulation, and realization of the
chaotic system. The realization of analog circuit and digital circuit of chaotic system
has laid an experimental foundation for the applications of chaotic system.
294 9 Simulation and Hardware Implementation of Chaotic System
z
z
x x y
Figure 9.26: Attractors in an oscilloscope for the fractional-order simplified Lorenz system based on
the DSP: (a) x–y plane; (b) x–z plane; and (c) y–z plane.
0 9 9
y
z
‒15 0 0
‒15 0 15 ‒15 0 15 ‒15 0 15
x x y
Figure 9.27: Attractors of the fractional-order simplified Lorenz system by experiment data from DSP:
(a) x–y plane; (b) x–z plane; and (c) y–z plane.
Questions
1. Try to study a chaotic system by using different simulation methods and compare
the results.
2. What are the similarities and differences of the chaotic systems based on the OA
device and the CC device? What is the difference between the chaotic signals
generated by them?
3. To achieve the digital circuit implementation of a chaotic system, what are the
demands for solving algorithm of differential equations?
4. Is there finite precision effect in DSP implementation of the chaotic system, and
how to overcome it?
5. Design and implement a chaotic system circuit.
Appendix A: Important Academic Journals
in the Field of Chaos
Taking the simplified Lorenz system as an example, Matlab simulation programs are
presented. First, the analysis method of integer-order system is introduced, includ-
ing Runge–Kutta solving algorithm, Euler solving algorithm, Lyapunov exponents
(LE) calculation, plotting phase diagram, bifurcation diagram, Poincaré section, and
0–1 test method. Second, the programs about solving and analyzing algorithm of the
fractional-order chaotic system are designed, including frequency domain approach
(Simulink simulation), Adams–Bashforth–Moulton approach, Adomian decomposi-
tion method, C0 complexity algorithm, and chaos diagram method. Finally, Matlab
programs about chaotic synchronization algorithm are introduced for readers’ refer-
ence. Of course, readers can modify the relevant codes according to their own needs
to meet the system or research.
If a document begins with “function,” then it is a function. The reader needs to
be entered and saved in a separate .m file, so that you can call it when you need it.
Design program by employing function belongs to the module design approach, which
is beneficial to improve the programming efficiency.
where c is the system parameter. When c ∈ [–1.59 7.75], the system is chaotic.
The fractional-order simplified Lorenz system is defined as
⎧ q
⎪ ∗ D x = 10(y – x)
⎪
⎪ t0
⎨
∗ Dq y = (24 – 4c)x – xz + cy . (B.2)
⎪ t0
⎪
⎪
⎩∗ q
Dt0 z = xy – 8z/3
In this system, there are two parameters, order q and control parameter c.
Appendix B: Matlab Source Programs of Chaos Characteristic Analysis 297
function f=chao_SimpleLorenz(t,y)
global c
f=zeros(3,1);
f(1)=10*(y(2)-y(1));
f(2)=(24-4*c)*y(1)+c*y(2)-y(1)*y(3);
f(3)=y(1)*y(2)-8/3*y(3);
Running the following codes in Matlab window, the attractor phase diagram is
obtained as shown in Figure B.1.
clc
clear
global c
c=2;
[T,Y]=ode45(@chao_SimpleLorenz,0:0.01:500,[1 2 3 ]);
figure
plot(Y(30000:end,1),Y(30000:end,3))
xlim([-15 15])
xlabel(‘\itx’)
ylabel(‘\itz’)
35
30
25
20
y
15
10
0
‒15 ‒10 ‒5 0 5 10 15
x
relevant code to solve the numerical solution algorithm, and cannot use the Matlab
toolbox program. So solution algorithm based on the Euler algorithm and Runge–
Kutta method has a good application value.
1. Numerical solution program based on Euler algorithm:
function [x y z]=EulerSolve(c,x0,h,N)
% c is the system parameter; x0 is the ini-
tial value; h is the
iteration step size; N is the iteration number.
x=zeros(1,N);
y=zeros(1,N);
z=zeros(1,N);
x(1)=x0(1)+h*(10*(x0(2)-x0(1)));
y(1)=x0(2)+h*((24-4*c)*x0(1)-x0(1)*x0(3)+c*x0(2));
z(1)=x0(3)+h*(x0(1)*x0(2)-(8/3)*x0(3));
for i=2:N
x(i)=x(i-1)+h*(10*(y(i-1)-x(i-1)));
y(i)=y(i-1)+h*((24-4*c)*x(i-1)-x(i-1)*z(i-
1)+c*y(i-1));
z(i)=z(i-1)+h*(x(i-1)*y(i-1)-(8/3)*z(i-1));
end
Running the following codes in Matlab window, the attractor phase diagram is
obtained as shown in Figure B.1.
k11=10*(-x0+y0);
k21=(24-4*c)*x0-x0*z0+c*y0;
k31=x0*y0-(8/3)*z0;
Appendix B: Matlab Source Programs of Chaos Characteristic Analysis 299
k12=10*(-(x0+0.5*h*k11)+(y0+0.5*h*k21));
k22=(24-4*c)*(x0+0.5*h*k11)-(x0+0.5*h*k11)*(z0+0.5*h*k31)
+c*(y0+0.5*h*k21);
k32=(x0+0.5*h*k11)*(y0+0.5*h*k21)-(8/3)*(z0+0.5*h*k31);
k13=10*(-(x0+0.5*h*k12)+(y0+0.5*h*k22));
k23=(24-4*c)*(x0+0.5*h*k12)-(x0+0.5*h*k12)*(z0+0.5*h*k32)
+c*(y0+0.5*h*k22);
k33=(x0+0.5*h*k12)*(y0+0.5*h*k22)-(8/3)*(z0+0.5*h*k32);
k14=10*(-(x0+h*k13)+(y0+h*k23));
k24=(24-4*c)*(x0+h*k13)-(x0+h*k13)*(z0+h*k33)+c*(y0+h*k23);
k34=(x0+h*k13)*(y0+h*k23)-(8/3)*(z0+h*k33);
x0=x0+h*(k11+2*k12+2*k13+k14)/6;
y0=y0+h*(k21+2*k22+2*k23+k24)/6;
z0=z0+h*(k31+2*k32+2*k33+k34)/6;
x(1)=x0;y(1)=y0;z(1)=z0;
for i=2:N
k11=10*(-x0+y0);
k21=(24-4*c)*x0-x0*z0+c*y0;
k31=x0*y0-(8/3)*z0;
k12=10*(-(x0+0.5*h*k11)+(y0+0.5*h*k21));
k22=(24-4*c)*(x0+0.5*h*k11)-(x0+0.5*h*k11)
*(z0+0.5*h*k31)+c*(y0+0.5*h*k21);
k32=(x0+0.5*h*k11)*(y0+0.5*h*k21)-
(8/3)*(z0+0.5*h*k31);
k13=10*(-(x0+0.5*h*k12)+(y0+0.5*h*k22));
k23=(24-4*c)*(x0+0.5*h*k12)-(x0+0.5*h*k12)
*(z0+0.5*h*k32)+c*(y0+0.5*h*k22);
k33=(x0+0.5*h*k12)*(y0+0.5*h*k22)-
(8/3)*(z0+0.5*h*k32);
k14=10*(-(x0+h*k13)+(y0+h*k23));
k24=(24-4*c)*(x0+h*k13)-(x0+h*k13)*(z0+h*k33)
+c*(y0+h*k23);
k34=(x0+h*k13)*(y0+h*k23)-(8/3)*(z0+h*k33);
x0=x0+h*(k11+2*k12+2*k13+k14)/6;
y0=y0+h*(k21+2*k22+2*k23+k24)/6;
z0=z0+h*(k31+2*k32+2*k33+k34)/6;
300 Appendix B: Matlab Source Programs of Chaos Characteristic Analysis
x(i)=x0;y(i)=y0;z(i)=z0;
end
Running the following codes in Matlab window, the attractor phase diagram is
obtained as shown in Figure B.1.
[x y z]=RungeSolve(2,[1 2 3],0.01,20000);
plot(x(10000:end),z(10000:end))
xlabel(‘\itx’)
ylabel(‘\itz’)
k12=10*(-(x0+0.5*h*k11)+(y0+0.5*h*k21));
k22=(24-4*c)*(x0+0.5*h*k11)-(x0+0.5*h*k11)
*(z0+0.5*h*k31)+c*(y0+0.5*h*k21);
k32=(x0+0.5*h*k11)*(y0+0.5*h*k21)-(8/3)
*(z0+0.5*h*k31);
302 Appendix B: Matlab Source Programs of Chaos Characteristic Analysis
k13=10*(-(x0+0.5*h*k12)+(y0+0.5*h*k22));
k23=(24-4*c)*(x0+0.5*h*k12)-(x0+0.5*h*k12)
*(z0+0.5*h*k32)+c*(y0+0.5*h*k22);
k33=(x0+0.5*h*k12)*(y0+0.5*h*k22)-
(8/3)*(z0+0.5*h*k32);
k14=10*(-(x0+h*k13)+(y0+h*k23));
k24=(24-4*c)*(x0+h*k13)-(x0+h*k13)*(z0+h*k33)
+c*(y0+h*k23);
k34=(x0+h*k13)*(y0+h*k23)-(8/3)*(z0+h*k33);
x0=x0+h*(k11+2*k12+2*k13+k14)/6;
y0=y0+h*(k21+2*k22+2*k23+k24)/6;
z0=z0+h*(k31+2*k32+2*k33+k34)/6;
J1=[-10 10 0;(24-4*c)-z0 c -x0;y0 x0 -8/3];
J2=[-10 10 0;(24-4*c)-(z0+0.5*h*k31) c -
(x0+0.5*h*k11);y0+0.5*h*k21x0+0.5*h*k11 -8/3];%
J3=[-10 10 0; (24-4*c)-(z0+0.5*h*k32) c -
(x0+0.5*h*k12); y0+0.5*h*k22x0+0.5*h*k12 -8/3];%
J4=[-10 10 0;(24-4*c)-(z0+h*k33) c -
(x0+h*k13);y0+h*k23 x0+h*k13-8/3];%
J=I+h*(J1+2*J2*(I+0.5*h*J1)+2*J3*(I+0.5*h*J2*(I+0.5*h*J1))
+J4*(I+h*J3*(I+0.5*h*J2*(I+0.5*h*J1))))/6;
B=J*Q;
[Q,R]=qr(B);
ly1=ly1+log(abs(R(1,1)));
ly2=ly2+log(abs(R(2,2)));
ly3=ly3+log(abs(R(3,3)));
end
ly=[ly1/(m*h) ly2/(m*h) ly3/(m*h)];
Running in the Matlab window
ly=RungeJianhua(2)
The result is
ly=
0.8620 -0.0041 -11.5245
4. Program of calculating LEs with parameter varying:
Here, program is presented for the calculation of LEs of the simplified Lorenz sys-
tem with parameter c. LE diagram as shown in Figure B.2 is obtained by employing
Lyapunov.m:
clc
clear
Appendix B: Matlab Source Programs of Chaos Characteristic Analysis 303
–5
Lyapunov
–10
–15
–2 0 2 4 6 8
c
global c
C=-2:0.05:8;
L=length(C);
ly=zeros(3,L);
for i=1:L
c=C(i);
[T,Res]=lyapunov(3,@SimLorenz_ly,@ode45,0,0.5,500,
[ 0.1 0 0.1],5);ly(:,i)=Res(end,:);
end
plot(C,ly)
xlabel(‘\itc’)
ylabel(‘Lyapunov’)
function Ly=MaxLypunov(cc)
% simplified Lorenz system
global c;
c=cc;
T,Y]=ode45(@chao_SimpleLorenz,200:0.01:202,[0.1 0.1 0.1]);
lyap=0;
tao=2; % time interval
x0=Y(end,:);
y0=[x0(1)-3e-2,x0(2)-4e-2,x0(3)-5e-2];
d0=sqrt((y0(1)-x0(1))^2+(y0(2)-x0(2))^2+(y0(3)-x0(3))^2);
304 Appendix B: Matlab Source Programs of Chaos Characteristic Analysis
N=1000;
d=zeros(1,N);
for i=1:N
[T,Y]=ode45(@chao_SimpleLorenz,0:0.01:tao,x0);
x0=Y(end,:);
[T,Y]=ode45(@chao_SimpleLorenz,0:0.01:tao,y0);
y1=Y(end,:);
d(i)=sqrt((y1(1)-x0(1))^2+(y1(2)-x0(2))^2+(y1(3)-
x0(3))^2);
z=d0/d(i);
y0=x0+(y1-x0)*z;
if mod(i,40)==0
lyap1=lyap;
lyap=0;
for j=1:i
lyap=lyap+log(d(i)/d0);
end
lyap=lyap/(j*tao);
if abs(lyap-lyap1)<0.001
break;
end
end
end
Ly=0;
for j=1:i
Ly=Ly+log(d(i)/d0);
end
Ly=Ly/(j*tao);
Input in the Matlab window
Ly=MaxLypunov(2)
The result is
Ly =
0.6559
clc
clear
global c
C=-2:0.025:8;
L=length(C);
for i=1:L
Appendix B: Matlab Source Programs of Chaos Characteristic Analysis 305
c=C(i);
[T,Y]=ode45(@chao_SimpleLorenz,0:0.01:200,[1 2 3]);
data=Y(10000:end,3);
for j=2:(length(data)-1)
if data(j)>data(j-1)&&data(j)>data(j+1)
plot(c,data(j),‘.’,‘markersize’,1);
hold on;
if j==20
break;
end
end
end
end
xlabel(‘\itc’)
ylabel(‘\itzmax’)
Running the above codes, the bifurcation diagram of the simplified Lorenz system
can be obtained as shown in Figure B.3. In practice, the step size of parameter c is
appropriate to take a smaller one.
clc
clear
global c
c=2;
[t,Y]=ode45(@chao_SimpleLorenz,0:0.01:500,[1 2 3]);
A=3; % z
B=2; % y
D=1; % x
m=22; %value of the section
50
40
30
zmax
20
10
0
‒2 0 2 4 6 8
c
N=length(Y);
for k=1:N-1
if (Y(k,A)>m&&Y(k+1,A)<m)||(Y(k,A)<m&&Y(k+1,A)>m)
%choose a plane on z axis
a=(Y(k+1,A)-Y(k,A))/(t(k+1)-t(k));
% the chosen plane
b=(Y(k,A)*t(k+1)-Y(k+1,A)*t(k))/(t(k+1)-t(k));
% t=0, Intercept of z line (coordinates)
c=(Y(k+1,B)-Y(k,B))/(t(k+1)-t(k));
% slope of y line
d=(Y(k,B)*t(k+1)-Y(k+1,B)*t(k))/(t(k+1)-t(k));
% t=0 Intercept of y line (coordinates)
e=(Y(k+1,D)-Y(k,D))/(t(k+1)-t(k));
% slope of x line
f=(Y(k,D)*t(k+1)-Y(k+1,D)*t(k))/(t(k+1)-t(k));
% t=0 Intercept of x line (coordinates)x
g=(m-b)/a; % z=10, the time needed
q=e*g+f; % z=10, the value of x
p=c*g+d; % z=10, the value of y plot(q,p);hold on;
end
end
xlabel(‘y’)
ylabel(‘x’)
Running the above codes, the Poincaré section of the simplified Lorenz system can be
obtained as shown in Figure B.4.
20
10
0
x
–10
–20
–15 –10 –5 0 5 10 15
y
clc
clear
global c
c=2;
[T,Y]=ode45(@chao_SimpleLorenz,0:0.01:1500,[1 2 3]);
xt=Y(10000:end,3);
N=length(xt)-5;
n=floor(N/15);
th=zeros(1,N+1);
p=th;
s=p;
o=p;
M=p;
for i=2:N+1
th(i)=c+th(i-1)+xt(i);%
end
for i=2:N+1
p(i)=p(i-1)+xt(i)*cos(th(i));
end
for i=2:N+1
s(i)=s(i-1)+xt(i)*sin(th(i));
end
plot(p,s)
xlabel(‘p’)
ylabel(‘s’)
Running the above codes, the p–s diagram of the simplified Lorenz system with 0–1
test can be obtained as shown in Figure B.5.
1000
–1000
–2000
S
–3000
–4000
–5000
–6000
–5000–4000–3000–2000–1000 0 1000 2000
p
Figure B.5: p–s diagram of the simplified Lorenz system with 0–1 test.
308 Appendix B: Matlab Source Programs of Chaos Characteristic Analysis
N3=N3+((n-j+1) q3-(n-j)^q3)*(x(j)*y(j)-8*z(j)/3);
end
x1(n+1)=x0+h^q1*N1/(gamma(q1)*q1);
y1(n+1)=y0+h^q2*N2/(gamma(q2)*q2);
z1(n+1)=z0+h^q3*N3/(gamma(q3)*q3);
x(n+1)=x0+h^q1*(10*(y1(n+1)-x1(n+1))+M1)/gamma(q1+2);
y(n+1)=y0+h^q2*((24-4*c)*x1(n+1)-x1(n+1)*z1(n+1)
+c*y1(n+1)+M2)/gamma(q2+2);
z(n+1)=z0+h^q3*(x1(n+1)*y1(n+1)-8*z1(n+1)/3+M3)
/gamma(q3+2);
end
Running following codes in Matlab window:
[x y z]=jianhua(2,0.98,0.98,0.98);
plot(x,z)
xlabel(‘\itx’)
ylabel(‘\itz’)
function dy=SimpleFratral(x0,h,q,c)
dy=zeros(1,3);
b=8/3;
a=10;
if q<=1 && q>0
c10=x0(1);
c20=x0(2);
30
25
20
15
z
10
0
–15 –10 –5 0 5 10 15
x
Figure B.6: Phase diagram of the fractional-order simplified Lorenz system with q = 0.98, c = 2.
310 Appendix B: Matlab Source Programs of Chaos Characteristic Analysis
c30=x0(3);
end
if q>1&& q<2
c10=x0(1)+x0(1)*h;
c20=x0(2)+x0(2)*h;
c30=x0(3)+x0(3)*h;
end
c11=a*(c20-c10);
c21=(24-4*c)*c10+c*c20-c10*c30;
c31=-b*c30+c10*c20;
c12=a*(c21-c11);
c22=(24-4*c)*c11+c*c21-c11*c30-c10*c31;
c32=-b*c31+c11*c20+c10*c21;
c13=a*(c22-c12);
c23=(24-4*c)*c12+c*c22-c12*c30-c11*c31*(gamma(2*q+1)
/gamma(q+1)^2)-c10*c32;
c33=-b*c32+c12*c20+c11*c21*(gamma(2*q+1)/gamma(q+1)^2)+c10*c22;
c14=a*(c23-c13);
c24=(24-4*c)*c13+c*c23-c13*c30-(c12*c31+c11*c32)*(gamma(3*q+1)
/(gamma(q+1)*gamma(2*q+1)))-c10*c33;
c34=-b*c33+c13*c20+(c12*c21+c11*c22)*(gamma(3*q+1)/(gamma(q+1)
*gamma(2*q+1)))+c10*c23;
c15=a*(c24-c14);
c25=(24-4*c)*c14+c*c24-c14*c30-(c13*c31+c11*c33)*(gamma(4*q+1)
/(gamma(q+1)*gamma(3*q+1)))-c12*c32*(gamma(4*q+1)
/gamma(2*q+1)^2)-c10*c34;
c35=-b*c34+c14*c20+(c13*c21+c11*c23)*(gamma(4*q+1)
/(gamma(q+1)*gamma(3*q+1)))+c12*c22*(gamma(4*q+1)
/gamma(2*q+1)^2)+c10*c24;
c16=a*(c25-c15);
c26=(24-4*c)*c15+c*c25-c15*c30-(c14*c31+c11*c34)
*(gamma(5*q+1)/(gamma(q+1)*gamma(4*q+1)))
-(c13*c32+c12*c33)
*(gamma(5*q+1)/gamma(2*q+1)*gamma(3*q+1))-c10*c35;
c36=-b*c35+c15*c20+(c14*c21+c11*c24)*(gamma(5*q+1)
/(gamma(q+1)*gamma(4*q+1)))+(c13*c22+c12*c23)
*(gamma(5*q+1)/gamma(2*q+1)*gamma(3*q+1))+c10*c25;
Appendix B: Matlab Source Programs of Chaos Characteristic Analysis 311
dy(1)=c10+c11*(h^q/gamma(q+1))+c12*h^(2*q)/gamma(2*q+1)+c13
*h^(3*q)/gamma(3*q+1)+c14*h^(4*q)/gamma(4*q+1)+c15*h^(5*q)
/gamma(5*q+1)+c16*h^(6*q)/gamma(6*q+1);
dy(2)=c20+c21*(h^q/gamma(q+1))+c22*h^(2*q)/gamma(2*q+1)+c23
*h^(3*q)/gamma(3*q+1)+c24*h^(4*q)/gamma(4*q+1)+c25*h^(5*q)
/gamma(5*q+1)+c26*h^(6*q)/gamma(6*q+1);
dy(3)=c30+c31*(h^q/gamma(q+1))+c32*h^(2*q)/gamma(2*q+1)
+c33*h^(3*q)/gamma(3*q+1)+c34*h^(4*q)/gamma(4*q+1)+c35
*h^(5*q)/gamma(5*q+1)+c36*h^(6*q)/gamma(6*q+1);
function [t,y]=FratalSim(h,N,x0,q,c)
y=zeros(3,N);
t=zeros(1,N);
tt=0;
for i=1:N
t(i)=tt;
dy=SimpleFratral(x0,h,q,c);
y(:,i)=dy;
x0=dy;
tt=tt+h;
end
Running in Matlab window,
clc
clear
h=0.01;
c=5;
N=10000;
q=0.95;
x0=[0.1 0.2 0.3];
[t,y]=FratalSim(h,N,x0,q,c);
plot(y(1,:),y(3,:))
xlim([-12 12])
xlabel(‘\itx’)
ylabel(‘\itz’)
The attractor (similar to Figure B.6) and the chaotic sequences of the fractional-order
simplified Lorenz system are obtained.
312 Appendix B: Matlab Source Programs of Chaos Characteristic Analysis
end
Y=fft(x);
Xk=(abs(Y).^ 2)./N;
Xk=Xk(1:(floor(N/2)));
ptot=sum(Xk);
PK=Xk./ptot;
P=0;
for i=1:N/2
if PK(i)~=0
P=P-PK(i)*log(PK(i));
end
end
se2=sum(P);
SE=se2/log(N/2);
3. Program for complexity with order q varying
clc
clear
L=201;
c=5;
Q=linspace(0.5,1,L);
C0=zeros(1,L);
SE=zeros(1,L);
for i=1:L
q=Q(i);
[t,y]=FratalSim(0.01,11000,[1 2 3],q,c);
temp=y(1,1001:end);
C0(i)=COFuZadu(temp,15);
SE(i)=SEShannon(temp);
disp(i)
end
figure
plot(Q,SE)
xlabel(‘q’)
ylabel(‘SE’)
figure
plot(Q,C0)
xlabel(‘q’)
ylabel(‘C0’)
Running the above codes, the complexity of the fractional-order simplified Lorenz
system with varying q can be obtained as shown in Figure B.7.
314 Appendix B: Matlab Source Programs of Chaos Characteristic Analysis
0.8 0.7
(a) (b)
0.6
0.6
0.5
0.4
SE
0.4
C0
0.3
0.2
0.2
0.1
0 0
0.5 0.6 0.7 0.8 0.9 1 0.5 0.6 0.7 0.8 0.9 1
q q
Figure B.7: Complexity of the fractional-order simplified Lorenz system with varying q(c = 2):
(a) SE complexity and (b) C0 complexity.
0.6 0.2
(a) (b)
0.15
0.4
0.1
C0
SE
0.2
0.05
0 0
–2 0 2 4 6 8 –2 0 2 4 6 8
c c
Figure B.8: Complexity of the fractional-order simplified Lorenz system with c varying (q= 0.98):
(a) SE complexity and (b) C0 complexity.
(a) (b)
1 0.6 1 0.6
q
q
0.8 0.8
0.2 0.2
0.75 0.75
Figure B.9: Chaos diagram of the fractional-order simplified Lorenz system on q–c plane:
(a) based on SE complexity and (b) based on C0 complexity.
xlabel(‘c’)
ylabel(‘q’)
Running the above codes, the complexity-based chaos diagram on q–c plane of the
fractional-order simplified Lorenz system can be obtained as shown in Figure B.9.
It is worth pointing out that the greater the value of L, the more the mesh of the
parameters plane, and the more details can be reflected. But the code running time is
relatively long, and it needs to wait patiently. We suggest to choose L = 101 at least.
At the same time, the length of the sequence is also important when we calculate the
complexity. Because both the SE algorithm and C0 algorithm are based on fast Fourier
transformation, the length of the sequence is suggested to choose N = 104. For test,
we choose L = 51 and N = 104.
⎧
⎪
⎨ẋ = 10 (y – x)
⎪
Drive system: ẏ = (24 – 4c) x – xz + cy , (B.3)
⎪
⎪
⎩ż = xy – 8z/3
⎧
⎪
⎨ẋ1 = 10 (y1 – x1 )
⎪
Response system: ẏ1 = (24 – 4c) x – xz1 + cy1 , (B.4)
⎪
⎪
⎩ż = xy – 8z /3
1 1 1
Appendix B: Matlab Source Programs of Chaos Characteristic Analysis 317
⎧
⎪
⎨ė1 = ẋ1 – ẋ
⎪
Error system: ė2 = ẏ1 – ẏ . (B.5)
⎪
⎪
⎩ė = ż – ż
3 1
It will be very convenient to solve this problem by using the Matlab Ode45 function, if
the drive system and the response system are considered as a big system. Of course,
readers can also solve the drive system and input the drive system sequence into the
response system, but the program may be relatively complex:
function dy = SimplePC(t,y)
%Function name: SimplePC
%function: the drive-response synchronization of the simpli-
fied Lorenz system
global c;
dy = zeros(6,1);
dy(1)=10*(y(2)-y(1));
dy(2)=(24-4*c)*y(4)-y(4)*y(3)+c*y(2);
dy(3)=y(4)*y(2)-8*y(3)/3;
dy(4)=10*(y(5)-y(4));
dy(5)=(24-4*c)*y(4)-y(4)*y(6)+c*y(5);
dy(6)=y(4)*y(5)-8*y(6)/3;
Setting c = –1, initial values of the drive system are [5, 8, –10] and the initial values
of the response system are [5, –5, 20]. Running the below Matlab codes, the syn-
chronization error curves of the synchronization system are obtained as shown in
Figure B.10:
clc
clear
global c
c=-1;
[T,Y]=ode45(@SimplePC,0:0.01:15,[5, -5, 20, 15, 8, -10 ]);
figure
plot(T,Y(:,1)-Y(:,4))
xlabel(’t’)
ylabel(’e1’)
figure
plot(T,Y(:,2)-Y(:,5))
xlabel(‘t’)
ylabel(‘e2’)
figure
plot(T,Y(:,3)-Y(:,6))
xlabel(‘t’)
ylabel(‘e3’)
318 Appendix B: Matlab Source Programs of Chaos Characteristic Analysis
15 30 30
(a) (b) (c)
10 20 20
5
10 10
0
e3
0
e2
e1
0
–5
–10 –10
–10
–15 –20 –20
–20 –30 –30
0 5 10 15 0 5 10 15 0 5 10 15
t t t
Figure B.10: Synchronization error curves of the simplified Lorenz system: (a) error curve of
sequence x; (b) error curve of sequence y; and (c) error curve of sequence z.
⎧
⎪
⎨ẋ = 10 (y – x)
⎪
Drive system: ẏ = (24 – 4c) x – xz + cy , (B.6)
⎪
⎪
⎩ż = xy – 8z/3
⎧
⎪
⎨ẋ1 = 10 (y1 – x1 ) + k1 (x – x1 )
⎪
Response system: ẏ1 = (24 – 4c) x1 – x1 z1 + cy1 + k2 (y – y1 ) , (B.7)
⎪
⎪
⎩ż = x y – 8z /3 + k (z – z )
1 1 1 1 3 1
⎧
⎪
⎨ė1 = ẋ1 – ẋ
⎪
Error system: ė2 = ẏ1 – ẏ . (B.8)
⎪
⎪
⎩ė = ż – ż
3 1
function dy = SimpleOH(t,y)
%function name: SimpleOH %function: the coupling synchroniza-
tion of the simplified Lorenz system
global c;
global k1;
global k2;
global k3;
dy = zeros(6,1);
dy(1)=10*(y(2)-y(1))+k1*(y(4)-y(1));
dy(2)=(24-4*c)*y(1)-y(1)*y(3)+c*y(2)+k2*(y(5)-y(2));
dy(3)=y(1)*y(2)-8*y(3)/3+k3*(y(6)-y(3));
dy(4)=10*(y(5)-y(4));
dy(5)=(24-4*c)*y(4)-y(4)*y(6)+c*y(5);
dy(6)=y(4)*y(5)-8*y(6)/3;
Appendix B: Matlab Source Programs of Chaos Characteristic Analysis 319
3 8 4
(a) (b) (c)
2 6 2
1 4 0
0 2 –2
e3
e2
e1
–1 0 –4
–2 –2 –6
–3 –4 –8
–4 –6 –10
0 5 10 15 0 5 10 15 0 5 10 15
t t t
Figure B.11: Coupling synchronization error curves of the simplified Lorenz system: (a) error curve of
sequence x; (b) error curve of sequence y; and
(c) error curve of sequence z.
Setting c = 2, k1 = 4, k2 = 2, and k3 = 3, the initial values of the drive system are [4, 5, 6]
and the initial values of the coupling system are [1, 2, 3]. Running the Matlab codes
below, the synchronization error curves of the synchronization system are obtained
as shown in Figure B.11:
clc
clear
global c
global k1
global k2
global k3
c=2;
k1=4;k2=2;k3=3;
[T,Y]=ode45(@SimpleOH,0:0.01:15,[1 2 3 4 5 6 ]);
figure
plot(T,Y(:,1)-Y(:,4))
xlabel(‘t’)
ylabel(‘e1’)
figure
plot(T,Y(:,2)-Y(:,5))
xlabel(‘t’)
ylabel(‘e2’)
figure
plot(T,Y(:,3)-Y(:,6))
xlabel(‘t’)
ylabel(‘e3’)
320 Appendix B: Matlab Source Programs of Chaos Characteristic Analysis
⎧
⎪
⎨ẋ = 10 (y – x) + u1
⎪
ẏ = (24 – 4c) x – xz + cy + u2 . (B.9)
⎪
⎪
⎩ż = xy – 8z/3 + u
3
clc; clear
L=10000;
c=2;h=0.001;k=0.21;
y0=[1 2 1];
yy0=[5 6 7 8];
data=zeros(3,L);
T=zeros(1,L);
R1=zeros(1,L);
R2=zeros(1,L);
R3=zeros(1,L);
t=0;
for i=1:L
t=t+h;
yy0(1)=yy0(1)+h*(10*(yy0(2)-yy0(1)));
yy0(2)=yy0(2)+h*(-yy0(1)*yy0(3)+28*yy0(1)+yy0(2)-yy0(4));
yy0(3)=yy0(3)+h*(yy0(1)*yy0(2)-8/3*yy0(3));
Appendix B: Matlab Source Programs of Chaos Characteristic Analysis 321
yy0(4)=yy0(4)+h*(k*yy0(2)*yy0(3));
r1=sin(t);dr1=cos(t);
r2=4;dr2=0;
r3=yy0(1);dr3=10*(yy0(2)-yy0(1));
u1=dr1+r1-10*y0(2)+9*y0(1);
u2=dr2+r2-(24-4*c)*y0(1)+y0(1)*y0(3)-(c+1)*y0(2);
u3=dr3+r3-y0(1)*y0(2)+5*y0(3)/3;
y0(1)=y0(1)+h*(10*(y0(2)-y0(1))+u1);
y0(2)=y0(2)+h*((24-4*c)*y0(1)-y0(1)*y0(3)+c*y0(2)+u2);
y0(3)=y0(3)+h*(y0(1)*y0(2)-8*y0(3)/3+u3);
data(1,i)=y0(1);data(2,i)=y0(2);data(3,i)=y0(3);
T(i)=t;
R1(i)=r1;
R2(i)=r2;
R3(i)=r3;
end
figure
plot(T,R1,‘-.’)
hold on
plot(T,data(1,:),‘--’)
hold off
legend(‘r1’,‘x’)
xlabel(‘t’)
ylabel(‘r1,x’)
figure
plot(T,R2,‘-.’)
hold on
plot(T,data(2,:),‘--’)
hold off
legend(‘r2’,‘x’)
xlabel(‘t’)
ylabel(‘r2,x’)
figure
plot(T,R3,‘-.’)
hold on
plot(T,data(3,:),‘--’)
hold off
legend(‘r3’,‘x’)
xlabel(‘t’)
322 Appendix B: Matlab Source Programs of Chaos Characteristic Analysis
1.5 4.5 20
r1 (a) (b) r3 (c)
1 x 4
10
0.5 3.5 r2
r2,y
r1,x
r2,z
y 0
0 3
Figure B.12: Tracking curves of the simplified Lorenz system: (a) sequence x; (b) sequence y; and
(c) sequence z.
ylabel(‘r3,x’)
Running the above Matlab codes, the tracking curves of the simplified Lorenz system
are obtained as shown in Figure B.12. Of course, readers can also plot the tracking
error curves.
References
[1] Ford J. Chaos: Solving the unsolvable, predicting the unpredictable, in chaotic dynamic and
fractal. New York, Academic Press, 1986.
[2] Lorenz EN. Deterministic nonperiodic flows. J Atmos Sci 1963, 20, 130–41.
[3] Li TY, Yorke JA. Period three implies chaos. Am Math Mon 1975, 82(10), 985–92.
[4] May R. Simple mathematical models with very complicated dynamics. Nature 1976, 261,
459–67.
[5] Feigenbaum MJ. Quantitative universality for a class of non-linear transformations. J Stat Phys
1978, 19(1), 25–52.
[6] Feigenbaum MJ. The universal metric properties of non-linear transformations. J Stat Phys
1979, 21(6), 669–706.
[7] Takens F. “Detecting strange attractors in turbulence” in Dynamical systems and turhulence,
Warwick, 1980, Lecture Notes in Mathematics, vol. 898. D. A. Rand and L. S. Young, Eds.
Berlin, Springer, 1981, 366–81.
[8] Glass L, Guevara MR, Shrier A, Perez R. Bifurcation and chaos in a periodically stimulated
cardiac oscillator. Physica D 1983, 7, 89–101.
[9] Grassberger P. Toward a quantitative theory of self-generated complexity. Int J Theor Phys
1986, 25(9), 907–38.
[10] Pecora LM, Carroll TL. Synchronization in chaotic systems. Phys Rev Lett 1990, 64(8), 821–4.
[11] Pecora LM, Carroll TL. Driving systems with chaotic signals. Phys Rev A 1991, 44(4), 2374–83.
[12] Ott E, Grebogi C, Yorke JA. Controlling chaos. Phys Rev Lett 1990, 64(11), 1196–9.
[13] Ding J. Puzzles of the wise men-a brief history of chaos and fractals. Beijing, Higher Education
Press, 2013.
[14] Liang ML, Wang ZK. Talks about chaos and balance. Dalian, Dalian University of Technology
Press, 2008.
[15] Matsumoto T, Chua LO, Tanaka S. Simplest chaotic nonautonomous circuit. Phys Rev A 1984,
30, 1155–7.
[16] Chen GR, Ueta T. Yet another chaotic attractor. Int J Bifurcation Chaos 1999, 9(7), 1465–6.
[17] Wu CW, Chua LO. A unified framework for synchronization and control of dynamical systems.
Int J Bifurcation Chaos 1994, 4(4), 979–98.
[18] Fang JQ. Controlling chaos and developing high and new technology. Beijing, Atomic Energy
Press, 2002.
[19] Cuomo KM, Oppenheim AV, Strogatz SH. Synchronization of Lorenz-based chaotic circuits with
applications to communications. IEEE Trans Circuits Syst II 1993, 40(10), 626–33.
[20] Carroll TL, Pecora LM. Cascading synchronized chaotic systems. Physica D 1993, 67(1),
126–40.
[21] Kocarev L, Parlitz U. General synchronization with application to communication. Phys Rev Lett
1995, 74(25), 5028–31.
[22] Kapitaniak T, Chua LO. Hyperchaotic attractors of unidirectionally-coupled Chua’s circuits. Int J
Bifurcation Chaos 1994, 4(2), 477–82.
[23] Pyragas K, Tamasevicius A. Experimental control of chaos by delayed self-controlling
feedback. Phys Lett A 1993, 180(1–2), 99–102.
[24] Huberman BA, Lumer E. Dynamics of adaptive systems. IEEE Trans CAS-I 1990, 37(4), 547–50.
[25] John JK, Amritkar RE. Synchronization of unstable orbits using adaptive control. Phys Rev E
1994, 49(6), 4843–8.
[26] Yang T, Chua LO. Impulsive stabilization for control and synchronization of chaotic systems:
Theory and application to secure communication. IEEE Trans CAS-I 1997, 44(10), 976–88.
[27] Yang T, Chua LO. Impulsive control and synchronization of nonlinear dynamical systems and
application to secure communication. Int J Bifurcation Chaos 1997, 7(3), 645–64.
324 References
[54] Utami D, Suwastio H, Sumadjudin BB. FPGA implementation of digital chaotic cryptography.
Lect Notes Comput Sci 2002, 25(10), 239–47.
[55] Sun KH, Sprott JC. Periodically forced chaotic system with signum nonlinearity. Int J Bifurcation
Chaos 2010, 20(5), 1499–507.
[56] Sun KH, Sprott JC. Dynamics of a simplified Lorenz system. Int J Bifurcation Chaos 2009, 19(4),
1357–66.
[57] Gottwald GA, Melbourne I. A new test for chaos in deterministic systems. Proc R Soc Med
2004, 460, 603–11.
[58] Gottwald GA, Melbourne I. Testing for chaos in deterministic systems with noise. Physica D
2005, 212, 100–10.
[59] Sun KH, Liu X, Zhu CX. The 0–1 test algorithm for chaos and its applications. Chin Phys B 2010,
19(11), 110510.
[60] Horgan J. From complexity to perplexity. Sci Am 1995, 272(6), 104–9.
[61] Lempel A, Ziv J. On the complexity of finite sequence. IEEE Trans 1976, IT-22, 75–9.
[62] Pincus SM. Approximate entropy (ApEn) as a complexity measure. Chaos 1995, 5(1), 110–17.
[63] Sun KH, Tan GQ, Sheng LY. Complexity analysis of TD-ERCS discrete chaotic pseudo-random
sequences. Acta Phys Sin 2008, 57(6), 3359–68.
[64] Chen WT, Zhuang J, Yu WX, Wang ZZ. Measuring complexity using FuzzyEn, ApEn, and SampEn.
Med Eng Phys 2009, 31(1), 61–8.
[65] Sun KH, He SB, Yin LZ, A Di-Li⋅Duo Li-Kun. Application of FuzzyEn algorithm to the analysis of
complexity of chaotic sequence. Acta Phys Sin 2012, 61(13), 130507.
[66] Larrondo HA, González CM, Martin MT, Plastino A, Rosso OA. Intensive statistical complexity
measure of pseudorandom number generators. Phys A Stat Mech Appl 2005, 356, 133–8.
[67] Sun KH, He SB, Sheng LY. Complexity analysis of chaotic sequence based on the intensive
statistical complexity algorithm. Acta Phys Sin 2011, 60(2), 020505
[68] Rajeev KA, Subba JR, Ramakrishna Ramaswamy. Information-entropic analysis of chaotic time
series: Determination of time-delays and dynamical coupling. Chaos Solitons Fractals 2002,
14(4), 633–41.
[69] Malihe S, Serajeddin K, Reza B. Entropy and complexity measures for EEG signal classification
of schizophrenic and control participants. Artif Intell Med 2009, 47(3), 263–74.
[70] Abdulnasir Y, Mehmet A, Mustafa P. Application of adaptive neuro-fuzzy inference system for
vigilance level estimation by using wavelet-entropy feature extraction. Expert Syst Appl 2009,
36(4), 7390–9.
[71] Chen F, Xu JH, Gu FJ. Dynamic process of information transmission complexity in human
brains. Biol Cybern 2000, 83 (4), 355–66.
[72] Shen EH, Cai ZJ, Gu FJ. Mathematical foundation of a new complexity measure. Appl Math
Mech 2005, 26(9), 1188–96.
[73] Cai ZJ, Sun J. Modified C0 complexity and applications. Journal of Fudan University (Natural
Science), 2008, 47(6), 791–96
[74] Sun KH, He SB, He Y, Yin LZ. Complexity analysis of chaotic pseudo-random sequences based
on spectral entropy algorithm. Acta Phys Sin 2013, 62(1), 010501.
[75] Sun KH, He SB, Zhu CX, He Y. Analysis of chaotic complexity characteristics based on C0
algorithm. Acta Electronica Sin 2013, 41(9), 1765–71
[76] Hénon M. A two-dimensional mapping with a strange attractor. Commun Math Phys 1976, 50,
291–312.
[77] Sheng LY, Sun KH, Li CB. Study of a discrete chaotic system based on tangent-delay for elliptic
reflecting cavity and its properties. Acta Phys Sin 2004, 53(9), 2871–6.
[78] Duffing G. Erzwungene Schwingungen bei Veränderlicher Eigenfrequenz. Braunschweig,
Vieweg, 1918.
326 References
[79] van der Pol B. On relaxation-oscillations. The London, Edinburgh, and Dublin Philosophical
Magazine and Journal of Sciences Series 1926, 7(2), 978–92.
[80] Rössler OE. An equation for continuous chaos. Phys Lett A 1976, 57(5), 397–8.
[81] Zhong GQ, Tang KS. Circuitry implementation and synchronization of Chen’s attractor. Int J
Bifurcation Chaos 2002, 12(6), 1423–7.
[82] Lü JH, Chen GR. A new chaotic attractor coined. Int J Bifurcation Chaos 2002, 12(3), 659–61.
[83] Vanĕček A, Čelikovský S. Control systems: From linear analysis to synthesis of chaos. London,
Pretice-Hall, 1996.
[84] Lü JH, Chen GR, Cheng DZ, Čelikovský S. Bridge the gap between the Lorenz system and the
Chen system. Int J Bifurcation Chaos 2002, 12(12), 2917–26.
[85] Lü JH, Zhou TS, Chen GR, Zhang SC. The compound structure of Chen’s attractor. Int J
Bifurcation Chaos 2002, 12(4), 855–8.
[86] Zhang ZQ, Park J H; Shao HY. Adaptive synchronization of uncertain unified chaotic systems via
novel feedback controls. Nonlinear Dyn 2015, 81(1–2), 695–706.
[87] Cheng CJ. Robust synchronization of uncertain unified chaotic systems subject to noise and its
application to secure communication. Appl Math Comput 2012, 219(5), 2698–712.
[88] Sun KH, Yang JL, Ding JF, Sheng LY. Circuit design and implementation of Lorenz chaotic system
with one parameter. Acta Phys Sin 2010, 59(12), 8385–92.
[89] Sprott JC. A proposed standard for the publication of new chaotic systems. Int J Bifurcation
Chaos 2011, 21(9), 2391–4.
[90] Saltzman B. Finite amplitude free connection as an initial value problem-I. J Atmos Sci 1962 19,
329–41.
[91] Rössler OE. An equation for hyperchaos. Phys Lett A 1979, 71(2–3), 155–7.
[92] Li Y, Chen G, Tang KS. Generating hyperchaos via state feedback control. Int J Bifurcation
Chaos 2005, 15(10), 3367–75.
[93] Zgliczynski P. Symbolic dynamics for the Rössler folded towel map. Banach Center Publ 1999,
47(1), 253–8.
[94] Carroll TL, Pecora LM. Synchronization chaotic circuits. IEEE Trans CAS-I 1991, 38(4), 453–6.
[95] Fang JQ. Control and synchronization of chaos in nonlinear systems and its application
prospect (I). Prog Phys 1996, 16(1), 1–74.
[96] Fang JQ. Control and synchronization of chaos in nonlinear systems and its application
prospect (II). Prog Phys 1996, 16(2), 137–201.
[97] Sun KH. Chaos synchronization control theory and its application in information encryption.
Central South University, 2005.
[98] He R, Vaidya PG. Analysis and synthesis of synchronous periodic and chaotic systems. Phys
Rev A 1992, 46(12), 7387–92.
[99] Zhou CS, Lai CH. Analysis of spurious synchronization with positive conditional Lyapunov
exponents in computer simulations. Physica D 2000, 135(1–2), 1–23.
[100] Sun KH, Shang F, Zhong K, Sheng Z. Synchronous control between unified chaotic system and
its modified system based on intermittent feedback. J Electron Inf Technol 2009, 31(1), 71–4.
[101] Ma J, Liao GH, Mo XH. Hyperchaos synchronization and control using intermittent feedback.
Acta Phys Sin 2005, 54(12), 5585–90.
[102] Guan XP, Fang ZP, Chen CL, Hua CC. Chaos control and its application in secure
communication. Beijing, National Defence Industry Press, 2002.
[103] Zhou P. Observers for a class of 3D continuous chaotic systems. Acta Phys Sin 2003, 52(5),
1108–11.
[104] Yang XS. On observability of 3D continuous-time autonomous chaotic systems based on scalar
output measurement. Int J Bifurcation Chaos 2002, 12(5), 1159–62.
[105] Xu DL, Li ZG. Controlled projective synchronization in nonpartially-linear chaotic systems. Int J
Bifurcation Chaos 2002, 12(6), 1395–402.
References 327
[106] Li GH. Modified projective synchronization of chaotic system. Chaos Solitons & Fractals 2007,
32 (5), 1786–90.
[107] Cafagna D, Grassi G. Observer-based projective synchronization of fractional systems via a
scalar signal: Application to hyperchaotic Rössler systems. Nonlinear Dyn 2012, 68(1–2),
117–28.
[108] Farivar F, Nekoui MA, Shoorehdeli MA, Teshnehlab M. Modified projective synchronization of
chaotic dissipative gyroscope systems via backstepping control. Indian J Phys 2012, 86(10),
901–6.
[109] Wang SB, Wang XY, Zhou YF. A memristor-based complex Lorenz system and its modified
projective synchronization. Entropy 2015, 17(11), 7628–44.
[110] Kim DW, Chang PH, Kim SH. A new chaotic attractor and its robust function projective
synchronization. Nonlinear Dyn 2013, 73(3), 1883–93.
[111] Liu J, Liu ST, Sprott JC. Adaptive complex modified hybrid function projective synchronization
of different dimensional complex chaos with uncertain complex parameters. Nonlinear Dyn
2016, 83(1–2), 1109–21.
[112] Santo B. Chaos synchronization and cryptography for secure communications. New York,
Hershey, 2010.
[113] Cuomo KM, Oppengeim AV, Strogatz SH. Synchronization of Lorenz-based chaotic circuits with
applications to communications. IEEE Trans CAS-II 1993, 140(10), 626–33.
[114] Mianovic V, Zaghloul ME. Improved masking algorithm for chaotic communication systems.
Electron Lett 1996, 32(1), 11–12.
[115] Carroll TC, Heagy JF, Pecora LM. Transforming signals with chaotic synchronization. Phys Rev E
1996, 54(5), 4676–80.
[116] Parlitz U, Chua LO, Kocarev L, Halle KS, Shang A. Transmission of digital signals by chaotic
synchronization. Int J Bifurcation Chaos 1992, 2(2), 973–7.
[117] Kolumban G, Kennedy MP, Jako Z, Kis G. Chaotic communications with correlator receivers:
Theory and performance limits. Proc IEEE 2002, 90(5), 711–32.
[118] Kolnmban G, Kis G, Kennedy MP, Já Z. FM-DCSK: A new and robust solution to chaos
communications. In: Proceedings of International Symposium Nonlinear Theory and Its
Applications, Hawaii, 1997, 117–20.
[119] Galias Z, Maggio GM. Quadrature chaos-shift keying: Theory and performance analysis. IEEE
Trans CAS-I 2001, 48(12), 1510–19.
[120] Kennedy MP, Kolumbán G. Digital communications using chaos. Signal Process 2000, 80(7),
1307–20.
[121] Rulkov NF, Sushchik MM, Tsimring LS, et al. Digital communication using
chaotic-pulse-position modulation. IEEE Trans CAS-I 2001, 48(12), 1436–44.
[122] Heidari-Bateni G, McGillem CD. A chaotic direct-sequence spread-spectrum communication
system. IEEE Trans Commun 1994, 42(2/3/4), 1524–7.
[123] Sun KH, Zhou JL, Mou J. Design and performance analysis of multi-user chaotic sequence
spread-spectrum communication system. J Electron Inf Technol 2007, 29(10),
2436–40.
[124] Liao XF, Xiao D, Chen Y, Xiang T. Principle of chaos cryptography and its application. Beijing,
Science Press, 2009.
[125] Li CB, He B. Chaotic encryption algorithm and hash function construction research. Beijing,
Publishing House of Electronic Industry, 2011.
[126] Su M, Wen WY, Zhang Y S Security evaluation of bilateral-diffusion based image encryption
algorithm. Nonlinear Dyn 2014, 77(1–2), 243–6
[127] Dong C. Color image encryption using one-time keys and coupled chaotic systems. Signal
Process Image Commun 2014, 29(5), 628–40.
328 References
[128] Yang YX, Lin XD. Coding cryptology. Beijing, People’s Posts and Telecommunications
Publishing House, 1992.
[129] Roland S. Use of chaotic dynamical systems in cryptography. J Franklin Inst 2001, 338(4),
429–41.
[130] Li P, Zhang W, Li Z. FPGA implementation of a coupled-map-lattice-based cryptosystem. Int J
Circuit Theor Appl 2010, 38(1), 85–98.
[131] Wang FL. A new pseudo-random number generator and application to a digital secure
communication scheme based on compound symbolic chaos. Acta Phys Sin 2011, 60(11),
110517.
[132] Hu YH, Luo J, Su H. A new method for improving the limited precision effect of chaotic
sequences. Syst Simul 2012, 24 (11), 2349–52.
[133] Wang XS. A chaotic sequence encryption method. Chin J Comput 2002, (4), 351–6.
[134] Liu WH, Sun, KH, Zhu CX. A fast image encryption algorithm based on chaotic map. Optics and
Lasers in Engineering 2016, 84: 26–36.
[135] Wang L. A novel chaos-based pseudo-random number generator. Acta Phys Sin 2006, 55(8),
3964–8.
[136] Wang XY, Bao XM. A novel block cryptosystem based on the coupled chaotic map lattice.
Nonlinear Dyn 2013, 72(4), 707–15.
[137] Sheng LY, Wen J, Cao LL, Xiao YY. Differential cryptanalysis of TD-ERCS chaos. Acta Phys Sin
2007, 56(1), 78–83.
[138] Sheng LY, Xiao YY, Sheng Z. A universal algorithm for transforming chaotic sequences into
uniform pseudo-random sequences. Acta Phys Sin 2008, 57(7), 4007–13
[139] McLauchlan L, Mehruebeoglu M. DWT and DCT embedded watermarking using Chaos theory.
Conference on Mathematics of Data/Image Coding, Compression, and Encryption with
Applications XII, San Diego, CA, 2010, 8.
[140] Millerioux G. Crypyanalysis of hybrid cryptosystems. Int J Bifurcation Chaos 2013, 23(10),
1350173.
[141] Gangadhar C, Rao KD. Hyperchaos based image encryption. Int J Bifurcation Chaos 2009,
19(11), 3833–9.
[142] Cao GH. Image scrambling algorithm based on chaotic weighted sampling theory and sorting
transformation. J Beijing Univ Aeronaut Astronaut 2013, 39(1), 67–72
[143] Li HJ, Zhang JS. Embedding adaptive arithmetic coder in chaos-based cryptography. Chin Phys
B 2010, 19(5), 050508.
[144] Rahman SMM, Hossain MA, Mouftah H. Chaos-cryptography based privacy preservation
technique for video surveillance. Multimedia Syst 2012, 18(2), 145–55.
[145] Vidal G, Baptista MS, Mancini H. Fundamentals of a classical chaos-based Cryptosystem with
some quantum cryptography features. Int J Bifurcation Chaos 2012, 22(10), 1250243.
[146] Fouda JSAE, Effa JY, Sabat SL, Ali M. A fast chaotic block cipher for image encryption. Commun
Nonlinear Sci Numer Simul 2014, 19(3), 578–88.
[147] Wang YM, Liu JW. Security of communication network-theory and technology. Xi’an, Xi’an
Electronic and Science University Press, 2000.
[148] Zhang FX, Zheng YJ. Communication secure technology. Beijing, National Defence Industry
Press, 2003.
[149] Feng DG. Research status and development trend of domestic and foreign cryptography.
J Commun 2002, 23(5), 18–26.
[150] American National Standards Institute, Triple Data Encryption Algorithm Modes of Operation,
ANSI standard X9.52, 1998.
[151] Kocarev L. Chaos-based cryptography: A brief overview. IEEE Circuit Syst Mag 2001, 1(3), 6–21.
[152] Dachselt F, Kelber K, Schwartz W. Discrete-time chaotic encryption system-part III:
Cryptographical analysis. IEEE Trans CAS-I 1998, 45(9), 1–19.
References 329
[153] Yang T, Yang LB, Yang CM. Cryptanalyzing chaos secure communication using return maps.
Phys Lett A 1998, 245(6), 495–510.
[154] Zhou LH, Peng ZW, Feng ZJ, Zhong TX. Security property of chaotic encryption systems.
J Shanghai Jiaotong Univ 2001, 35(1), 133–8.
[155] Syyid Umar. The adaptive communication environment: “ACE”. Hughes network systems,
1998.
[156] Bhargava B, Shi CG, Wang SY. MPEG video encryption algorithms. Multimedia Tool Appl 2004,
24(1), 57–79.
[157] Zeng W, Lei S. Efficient frequency domain selective scrambling of digital video. IEEE Trans
Multimedia 2003, 5(1), 118–29.
[158] Liu Z, Li X, Dong ZY. Enhancing security of frequency domain video encryption. Proceedings of
ACM Multimedia, New York, USA, Poster Session, 2004, 304–7.
[159] Liu G, Ikenaga T, Goto S, Baba T. A selective video encryption scheme for MPEG compression
standard. IEICE Trans Fundam Electron Commun Comput Sci 2006, E89–A(1), 194–202.
[160] Shang F, Sun K H, Cai YQ. A new efficient MPEG video encryption system based on chaotic
maps. Proceedings-1st International Congress on Image and Signal Processing, CISP, 2008, v
3, 12–16, Haikou.
[161] Hilfer R. Applications of fractional calculus in physics. New Jersey, World Scientific, 2001.
[162] Mandelbort BB. The fractal geometry of nature. New York, Freeman, 1983.
[163] Hartley TT, Lorenzo CF, Qammer HK. Chaos in a fractional order Chua’s system. IEEE Trans
Circuits Syst- 1995, 42(8), 485–90.
[164] Arena P, Caponetto R, Fortuna L, Porto D. Chaos in fractional order Duffing system.
Proceedings of the European Conference on Circuit Theory and Design. (ECCTD, 97), Budapest.
Hungary, September 1997, 1258–72.
[165] Ge ZM, Ou CY. Chaos in a fractional order modified Duffing system. Chaos Solitons Fractals
2007, 34(2), 262–91.
[166] Ahmad WM, Sprott JC. Chaos in fractional-order autonomous nonlinear system. Chaos
Solitons Fractals 2003, 16(2), 339–51.
[167] Li CG, Chen GR. Chaos and hyperchaos in the fractional-order Rössler equations. Phys A: Stat
Mech Appl 2004, 341(1–4), 55–61.
[168] Podlubny I. Fractional differential equations. New York, Academic Press, 1999.
[169] Li CP, Deng WH. Remarks on fractional derivatives. Appl Math Comput 2007, 187(2), 777–84.
[170] Charef A, Sun HH. Fractal system as represented by singularity function. IEEE Trans Autom
Control 1992, 37(9), 1465–70.
[171] Kai D. An algorithm for the numerical solution of differential equations of fractional order.
Electron Trans Numer Anal 1998, 5(Mar.), 612–7.
[172] Kai D, Ford NJ, Freed AD. A predictor-corrector approach for the numerical solution of fractional
differential equations. Nonlinear Dyn 2002, 29(1–4), 3–22.
[173] Kai D, Ford NJ. Analysis of fractional differential equations. J Math Anal Appl 2002, 265(2),
229–48.
[174] Ahmad W. Hyperchaos in fractional order nonlinear systems. Chaos Solitons Fractals 2005,
26(5), 1459–65.
[175] Arman KB, Kia F, Naser P, Henry L. A chaotic secure communication scheme using fractional
chaotic systems based on an extended fractional Kalman filter. Commun Nonlinear Sci Numer
Simul 2009, 14(3), 863–79.
[176] Bohannan GW, Hurst SK, Spangler L. Electrical component with fractional order impedance.
2006, No. PCT/US2006/008821.
[177] Wang FQ, Liu CX. Study on the critical chaotic system with fractional order and circuit
experiment. Acta Phys Sin 2006, 55(8), 3922–7
330 References
[178] Liu CX. A hyperchaotic system and its fractional-order circuit simulation. Acta Phys Sin 2007,
56(12), 6865–73.
[179] Chen XR, Liu CX, Wang FQ. Study on the fractional-order Liu chaotic system with circuit
experiment and its control. Acta Phys Sin 2008, 57(3), 1416–22.
[180] Zhu CX, Zou Y. Summary of research on fractional-order control. Control Decis 2009, 24(2),
161–9.
[181] Liu SD, Shi SY, Liu SS. Bridge between weather and climate: Fractional derivatives. Meteor Sci
Technol 2007, 35(1), 15–19.
[182] Zhao CN, Li YS, Lu T.Analysis and design of fractional-order system. Beijing, National Defense
Industry Press, 2011.
[183] Adomian G. A new approach to nonlinear partial differential equations. J Math Anal Appl 1984,
102(2), 420–34.
[184] Cafagna D, Grassi G. Bifurcation and chaos in the fractional-order Chen system via a
time-domain approach. Int J Bifurcation Chaos 2008, 18(18), 1845–63.
[185] Cafagna D, Grassi G. Hyperchaos in the fractional-order Rössler system with lowest-order. Int J
Bifurcation Chaos 2009, 19(1), 338–47.
[186] Sun KH, Wang X, Sprott JC. Bifurcations and chaos in fractional-order simplified Lorenz
system. Int J Bifurcation Chaos 2010, 20(4), 1208–19.
[187] He SB, Sun KH, Wang HH. Solution of the fractional-order chaotic system based on Adomian
decomposition algorithm and its complexity analysis. Acta Phys Sin 2014, 63(3), 030502.
[188] Sun KH, Yang JL, Qiu SS. Study of Simulation approaches for fractional-order chaotic systems.
J Syst Simul 2011, 23(11), 2361–5, 2370.
[189] Chen GR, Lü JH. Dynamic analysis, control and synchronization of lorenz family. Beijing,
Science Press, 2006.
[190] Wolf A, Swift JB, Swinney HL, Vastano JA. Determining Lyapunov exponents from a time series.
Physica D 1985, 16(3), 285–317.
[191] Sun KH, Ren J, Qiu SS. Chaotic dynamic characteristics of fractional-order unified system.
J South China Univ Technol (Natural Science Edition) 2008, 36(8), 6–10.
[192] Sun KH, Sprott JC. Bifurcations of fractional-order diffusionless Lorenz system. Electron J Theor
Phys 2009, 6(22), 123–34.
[193] Pomeau Y, Manneville P. Intermittent transition to turbulence in dissipative dynamical
systems. Commun Math Phys 1980, 74(2), 189–97.
[194] Sprott JC. Chaos and time-series analysis. New York, Oxford University Press, 2003.
[195] Yorke JA, Yorke ED. Metastable chaos: The transition to sustained chaotic behavior in the
Lorenz model. J Stat Phys 1979, 21(3), 263–77.
[196] Yang JL. Research on circuit design and implementation of simplified Lorenz system. Central
South University, 2011.
[197] Sprott JC. Some simple chaotic Jerk functions. Am J Phys 1997, 65(6), 537–43.
[198] Zuo T, Sun KH, Ai XX, Wang HH. High-order grid multi-scroll chaotic attractors generated by the
second generation current conveyor circuit. IEEE Trans Circuits Syst-II 2014, 61(10), 818–22.
[199] Merah L, Ali-Pacha A, Said N H, Mamat M. Design and FPGA implementation of Lorenz chaotic
system for information security issues. Appl Math Sci 2013, 7(5), 237–46.
[200] Xu X, Yu S, Xu L. Chaotic digital image encryption and its hardware implementation based on
DSP technology. Electron Sci Technol 2011, 24(3), 1–5.
[201] Yu SM. Chaotic systems and chaotic circuits: Principle, design and its application in
communications. Xi’an, Xi’an Electronic and Science University Press, 2011.
[202] Wang HH, Sun KH, He SB. Characteristic analysis and DSP realization of fractional-order
simplified Lorenz system based on Adomain decomposition method. Int J Bifurcation Chaos
2015, 25(6), 155008.
Index
0-1 test 30, 33 Chaotic sequence encryption 168
3DES 210 Chaotic spread spectrum code 150
Chaotic spread spectrum communication 148
Active-passive synchronization 12 Chaotic spread-spectrum communication 17
Adaptive communication environment 216, 218, Chaotic stream cipher 233
220 Chen attractor 55
Adaptive synchronization 12, 84 Chen hyperchaotic system 63
Adomian decomposition algorithm 248, 292 Chen’s attractor 9
Adomian decomposition method 259 Chosen-ciphertext 216
Anti brute force attack 182, 204 Chosen-plaintext 216
Anti-chosen plaintext attack 168 Chua’s circuit 8, 51
Auto-correlation 228 Cipher synchronization 209, 210
Autonomous equation 50 Circuit design process 278
Circuit implementation 240
Balance degree 151
Circuit simulation 253, 258, 276
Behavior complexity 35
Circuit simulation method 253
Bifurcation analysis 268
Color image watermark 182
Biorthogonal wavelet 188
Complexity 35, 240
Block cipher system 165, 207
Condition Lyapunov exponent 29, 69
Brute-force attack 215, 231
Continuous time chaotic system 47
Butterfly effect 3, 4
Continuous variable feedback
C 0 algorithm 36 synchronization 12
C 0 complexity 38, 39 COOK 131
Caputo fractional differential 242 Correlation analysis 202
Cat map 226 Correlation coefficient 202
Chaos 2, 3, 6, 9 Correlator 134
Chaos communication 125 Coupling synchronization 12
Chaos control 11 Current conveyor 282
Chaos cryptography 18
Chaos encryption 18 Data encryption standard 176, 210
Chaos observer 104 Dead-Beat Synchronization 13
Chaos parameter modulation 17, 145 Diffusionless Lorenz system 253
Chaos phenomenon 2 Digital voice encryption communication
Chaos self-synchronization 11 system 207
Chaos sequence encryption 167 Direct observation analysis 261
Chaos shift keying 16, 130 Discrete cosine transform 224
Chaos synchronization 11, 66 Discrete time chaotic map 41
Chaos theory 2, 164 Dividing frequency sampling method 33
Chaotic cryptography 164 Double-scroll attractor 52
Chaotic diffusion 201 Drive feedback synchronization 69
Chaotic encryption 164, 166 Drive-response synchronization 11
Chaotic masking 16, 125, 126 DSP implementation 290, 292
Chaotic pseudo random sequence generator 178 Duffing oscillator 48
Chaotic pulse position modulation 148 Dynamic characteristic 239
Chaotic scrambling 197 Dynamic simulation 252, 253, 258, 274
Chaotic secure communication 15, 125 Dynamic simulation analysis method 251
332 Index