Image Cryptography Communication Using FPAA-based
Image Cryptography Communication Using FPAA-based
https://doi.org/10.1007/s11071-024-09275-7 (0123456789().,-volV)
( 01234567
89().,-volV)
ORIGINAL PAPER
Received: 5 October 2023 / Accepted: 13 December 2023 / Published online: 26 January 2024
Ó The Author(s), under exclusive licence to Springer Nature B.V. 2024
Abstract This research presents an image cryptog- and six-scroll attractors by adjusting only one coeffi-
raphy communication system based on a novel 3D cient. The fundamental dynamical properties of the
high-complex chaotic system. The chaotic system is proposed system are investigated, viz., equilibria and
implemented by field programmable analog array stability, dissipative, phase portraits, bifurcation, and
(FPAA), which is a conveniently reconfigurable Lyapunov exponent, etc. The four-scroll attractor of
system. The image cryptography communication the proposed system is applied in image encryption.
system is realized using low-cost microcontrollers The multi-scroll attractor’s characteristic in this work
and commercially available devices. The proposed can achieve relatively high complexity, with a high
chaotic system based on the jerk model incorporated Kaplan–Yorke dimension of up to 2.45. The perfor-
two different nonlinear functions that can generate mances of the multi-scroll chaotic using FPAAs are
single-scroll, double-scroll, three-scroll, four-scroll, proven by comparing the experimental and numerical
results. The image cryptography communication sys-
tem based on the chaotic masking method (CM) has
K. Karawanich J. Chimnoy P. Prommee (&) been tested around 1 9 107 bits under 9600 bps. The
Department of Telecommunications Engineering, School measuring signals of the image cryptography commu-
of Engineering, King Mongkut’s Institute of Technology nication system are demonstrated in different scenar-
Ladkrabang, Bangkok 10520, Thailand
e-mail: [email protected]
ios. The experimental results can be ensured that
mismatched parameters give the complete cipher
F. Khateb image if and only if the bit error rate is more
Department of Microelectronics, Brno University of significant than 490,000 9 10–6.
Technology, Technická 10, 601 90 Brno, Czech Republic
F. Khateb
Department of Electrical Engineering, Brno University of
Defence, Kounicova 65, 662 10 Brno, Czech Republic
M. Marwan
School of Mathematics and Statistics, Linyi University,
Linyi 276005, Shandong, China
123
123
Matthews [22]. Since then, there has been extensive proposed chaotic system’s four-scroll attractor is
research on chaos-based cryptography, including the applied to image encryption based on the chaotic
practical application stage. masking method (CM). Using FPAA, the system can
Currently, image information is widely transmitted facilitate the adjustment of parameters in the encryp-
over the Internet. As a result, image data security is an tion processing. The communications system is pro-
essential requirement [23]. Much research on image totyped using a low-cost microcontroller and
and video encryption has been published. The princi- commercially available devices. The experimental
ple of chaos encryption is based on the ability to results of image encryption and communications are
produce a sequence of numbers that are unpredictable. demonstrated. The results consist of reconstructed
This property is used to encrypt messages. The images in successfully recovered and mismatched
difficulty of decryption for chaos depends on the cases, including the output waveforms in each process
initial condition and the parameter of the chaotic and the values of each realized parameter.
system used for generating. A slight deviation between
the transmitter and the receiver for a chaotic system
causes a mismatch decryption. Moreover, P. Sanprang 2 Description and analysis of the proposed system
et al. proposed image cryptography using FPAA-based
two conventional chaotic systems [24]. Other litera- 2.1 Description of the proposed jerk chaotic
ture proposed a Feedback Chaotic Synchronization system
(FCS) for designing a real-time secure symmetric
encryption scheme implemented in hardware [25]. One of the hallmarks of the jerk model is a simple
Multi-scroll chaotic generation on a 3D system customized independent nonlinear function [9]. This
challenge, a novel 3D chaotic jerk system with two work chooses the jerk model for designing the multi-
different nonlinear functions, is aimed to generate the scroll chaotic attractor. The model is reestablished by
multi-scroll output. One of the highlights in this work is using two nonlinear functions by increasing the G(x)
the several dynamic behaviors, viz., single-scroll, and G(y) nonlinear functions of variable x and y
double-scroll, three-scroll, four-scroll, and six-scroll positions [26, 27]. The ordinary differential equation
attractors from only one parameter control. Moreover, (ODE) of the proposed system can be expressed in
multistability can be found in symmetry and asymme- Eq. (1a). The nonlinear functions G(x) and G(y) are
try boundaries from parallel branch bifurcation exam- designed as Eqs. (1b) and (1c), respectively.
ination. With characteristics of a strange attractor, the 8
< x_ ¼ y þ GðyÞ;
complexity of this work is high, up to 2.45 by the
y_ ¼ z; ð1aÞ
Kaplan–Yorke dimension. The proposed system has :
z_ ¼ kz y GðxÞ;
essential dynamic properties investigation, including
equilibrium, stability, dissipative of attractor, phase Cx
portraits, Lyapunov exponents, and bifurcation. Some GðxÞ ¼ CxRectðDxÞ ððtanhðmðx þ 1=2DÞÞ
2
special features are graphically illustrated, viz., Poin- tanhðmðx 1=2DÞÞÞ þ 1Þ;
caré map, 0–1 test chart, amplitude control, and offset
boosting. The several basins of attraction are also used ð1bÞ
to confirm the multistability phenomenon. The several
GðyÞ ¼ Ay BsgnðyÞ Ay B tanhðmyÞ ð1cÞ
dynamic behaviors that occur in the proposed system
can be gainful in various fields of application. where all coefficients (A, B, C, D, k) are positive
The proposed multi-scroll chaotic system is imple- constants, and m = 100.
mented on the FPAA evaluation board. The experi-
mental results are compared with numerical results to 2.2 The configuration and approximation
confirm the possibility of several dynamic behaviors. of the nonlinear functions
The programmability of the FPAA device allows for
exploring accurate experimental results. Finally, The nonlinear function of a chaotic system is an essential
applying a multi-scroll chaotic attractor in encryption ingredient that makes the system generate chaotic signals.
improves the security of communication systems. The The characteristics of the nonlinear function influence
123
Fig. 1 Plot of modified rectangular function G(x) a the relation of coefficients C and D b the compatibility between the modified
rectangular functions and approximating functions with varying C and D
various complex behaviors of the system. Significantly, system is described by e = (x, y, z)T, e_ ¼ HðeÞ and
adjusting the related condition of parameters can exhibit _ T. Thus, the divergence of the system
H(e) = (x,_ y,_ z)
the presence of symmetry or asymmetry coexisting (1) can be easily derived as follows:
behaviors (complex dynamic features), making chaotic ox_ oy_ oz_
K¼rHðeÞ¼ þ þ
systems more interesting for education. ox oy oz
This work uses two nonlinear functions, viz., K¼rHðeÞ¼
o½yþfAyBtanhðmyÞg oðzÞ
þ
modified rectangular function (G(x)) and modified ox oy
o½kzyfCx=2ððtanhmðxþ1=2DÞtanhmðx1=2DÞÞþ1Þg
signum function (G(y)) expressed as Eqs. (1b) and (1c), þ
oz
respectively. The nonlinear functions consist of the K¼rHðeÞ¼k\0:
coefficients of the gain (C) and boundary (1/2D) for ð2Þ
G(x), the slope (A), and amplitude (B) for G(y) [26, 27]
and given m = 100. The approximation method of Since K = -k \ 0, the proposed system is dissipa-
nonlinear function transformed into trigonometric tive (convergent). Hence, the trajectories are confined
form can be seen in [26]. The graphical of the nonlinear in a contracted volume and could eventually form an
functions proposed are shown in Figs. 1 and 2. attractor [28, 29].
From the above design principles, an interesting
example of the strange four-scroll attractor (falcon- 2.4 Dynamical analysis of the proposed system
like scroll attractor) for the proposed system is shown
in Fig. 3. Observed that the trajectories orbit in the 2.4.1 Equilibrium points
phase space is the novel strange attractor, the proposed
system will be analyzed thoroughly such as dissipa- The equilibrium points of the proposed chaotic system
tive, stability, bifurcation, Lyapunov, multiple attrac- are obtained by solving:
tors, special features, etc. However, investigating the 8
< x_ ¼ y þ GðyÞ ¼ 0
parameters (A, B, C, D, and k) leads to proven y_ ¼ z ¼ 0 ð3Þ
multistability and analysis of various dynamic behav- :
z_ ¼ kz y GðxÞ ¼ 0
iors. Finally, the proposed system will be designed on
the FPAA to confirm the numerical results. The equilibrium of the chaotic system can be
calculated by equating derivatives of the state vari-
2.3 Dissipative of the proposed system ables to zero (i.e., x_ ¼ y_ ¼ z_ ¼ 0) as described in
Eq. (4).
The existence of attractors in the proposed system
could be obtained by analyzing the volume contraction
or expansion rate in the state space. The volume
contraction rate of a continuous-time dynamical
123
Fig. 2 Plot of modified signum function G(y) a the relation of coefficients A and B b the compatibility between the modified signum
functions and approximating functions with varying A and B
Fig. 3 The 2D strange attractor of the proposed system (1) with two nonlinear functions by given A = 0.6, B = 0.2, C = 1, D = 2.5,
k = 0.6, and initial condition (x0, y0, z0) = (0.1, 0.1, 0.1) a x–y plane b x–z plane c y–z plane
Cx 2.4.2 Eigenvalue and stabilities
GðyÞGðxÞ¼ ½AyBtanhðmyÞ
2
ððtanhðmðxþ1=2DÞÞtanhðmðx1=2DÞÞÞþ1Þ The calculated eigenvalues can determine the stability
¼0 of the dynamic system by assuming the system is in the
equilibrium state [26, 30]. The stability properties of
ð4Þ
the system are investigated from the equilibrium
where A = 0.6, B = 0.2, C = 1, D = 2.5 and m = 100. points [26]. The Jacobian matrix of the proposed
Given G(y) - G(x) = 0, (mx ? m/2D) = a, and chaotic system is expressed in Eq. (6).
(mx - m/2D) = b, [26] the rest equilibrium points 0 1
0 1 þ ðvðyÞÞ 0
can be calculated by
JE ðx; y; zÞ ¼ @ 0 0 1 A
0 ¼ ðtanhðaÞ tanhðbÞÞ þ 1 ð5Þ ðuðxÞÞ 1 k ðx;y;zÞ
123
123
The Kaplan–Yorke dimensions of the proposed A = 1.5, A = 1, A = 0.6, A = 0.2) and two initial
chaotic system are obtained at 2.45. To verify the conditions (x0, y0, z0) = (± 0.1, 0.1, 0.1) as Fig. 5, to
complexity of the chaotic system based on attractors observe the occurrence of various dynamic behaviors.
and waveforms. The bifurcation in Fig. 5a reveals the superimposed
(regular chaotic attractor area) within the green border
when A = 1.5. Likewise, Fig. 5b–d reveals the super-
3 Numerical study of the proposed system imposed asymmetry and symmetry boundary when
parameter A is adjusted and two different initial
The various dynamics behaviors of the proposed conditions. One of the highlights of this work is the
system (1) are investigated by using Lyapunov and variety of dynamics. Thus, Fig. 5c is most remarkable
bifurcation diagrams. The presence of multistability because within one scenario of bifurcation can be
[34, 35] is proved by coexisting symmetrical solutions. found superimposed, symmetry, and asymmetry
Numerical results are presented by nonlinear graphics boundaries. The values of these parameters set
analysis tools, viz., phase portraits, Poincare, 0–1 test (A = 0.6, B = 0.2, C = 1, D = 2.5 of Fig. 5c) are
chart, and basin of attraction. chosen to analyze for other dynamic behaviors.
123
Fig. 5 Bifurcation analysis of parameter k in range 0.1 B k B 1.2 for four discrete of parameter A by fixed B = 0.2, C = 1, D = 2.5
with initial condition (0.1, 0.1, 0.1) for red color and (- 0.1, 0.1, 0.1) for blue color a A = 1.5 b A = 1 c A = 0.6 d A = 0.2
123
respectively. Figure 6d–e shows superimposed big- control parameter C is in the range of 0.5 B C B 2,
size four-scroll attractors and an irregular dual asym- given A = 0.6, B = 0.2, D = 2.5, and k = 0.6. Fig-
metry of four-scroll attractors at A = 1.18 and ure 8b–c shows a pair symmetry of a single-band
A = 1.84, respectively. These results are just some scroll and a symmetry of limit cycle coexisting with a
attractors on phase portraits obtained from the influ- falcon-like scroll attractor at C = 0.54 and C = 1.12,
ence of parameter A. respectively. Figure 8d–e shows the superimposed
The rich dynamic behaviors of the proposed system approach to the six-scroll attractor and an irregular
can be noticed by varying the parameter B as well. dual asymmetry of four-scroll attractors at C = 1.55
Figure 7a shows the bifurcation diagram of the control and C = 1.82, respectively. Figure 9a shows the
parameter B in the range of 0 B B B 0.4, given bifurcation for varying the parameter D in the
A = 0.6, C = 1, D = 2.5, k = 0.6, and the initial 0.1 B D B 4 range, given A = 0.6, B = 0.2, C = 1,
condition see through below of Fig. 7. Figure 7b–c and k = 0.6. Figure 9b–c shows the asymmetry of a
shows a pair symmetry of mono attractors and mono attractor coexisting with a double-scroll attrac-
superimposed of approach to six-scroll attractors at tor and the asymmetry of three-scroll attractors
B = 0.01 and B = 0.13, respectively. Figure 7d–e coexisting with four-scroll attractors at D = 0.2 and
shows the asymmetry of the limit cycle coexisting D = 1.45, respectively. Figure 9d–e shows a pair of
with a single-band attractor and a pair asymmetry of symmetry of double-scroll attractors and a pair of
single-band attractors at B = 0.24 and B = 0.35, symmetry of single-band attractors at D = 2.8 and
respectively. D = 3.5, respectively.
The whole mention of parameters influence (A, B,
3.1.2 Examination for variation of parameters C C, and D) is just some dynamic behaviors that occur on
and D phase portraits, it is evident that the proposed system
can be generated rich types of attractors and has
The bifurcation diagrams for the parameters of the multistability behavior. Which consist of single-band
modified rectangular function (G(x)) are revealed in scroll, double-scroll attractor, three-scroll attractor,
Figs. 8 and 9, which can be observed as the initial four-scroll attractor, and six-scroll attractor, including
condition according to the below figure. The meta- irregular attractor, approach to variety attractor until
morphosis of dynamics on the bifurcation diagram of dual attractor of case superimposed, symmetry, and
parameter C is similar to parameter A. Figure 8a asymmetry that occur from the different initial con-
reveals the fragmentation of state variable x when dition. One of the challenges of chaotic major
123
researchers is attempting to thoroughly explore the spectrum is shown in Fig. 10. The overview of phase
complex behavior of systems to implement the portraits corresponding to time series when the control
designed system for various applications. parameter k is varied is shown in Fig. 11a–f. The main
proposed attractor in this work (falcon-like scroll
3.1.3 Route to chaos respect with parameter k attractor) is used to confirm the experimental setup
presented in Fig. 11d (similar to Fig. 3) because the
The route to the chaos of the proposed system is characteristics of trajectories on phase space have an
determined by varying the parameter k. The bifurca- evident structural attractor suitable for observation
tion diagram corresponding with the Lyapunov and comparison.
123
0
-0.2 double-scroll attractors are plotted in Fig. 14a–d,
-0.4
-0.6
respectively. Two colors of attractors from Fig. 14e
-0.8 (x0, y0, z0) = (0.1, 0.1, 0.1) and g correspond with the colors of the basin of
-1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 attraction in Fig. 15a and b, respectively. The beige
k color zone of basins is related to divergent dynamics.
Fig. 10 Route to the chaos of parameter k in range 0.1 B k
B 0.8 (Given A = 0.6, B = 0.2, C = 1, D = 2.5) Lyapunov 3.2.2 Asymmetry behavior
spectrum (Upper panel) and Bifurcation diagram (Lower panel)
At this stage, the presence of multiple coexisting
To confirm the highly complex chaotic behavior of asymmetry attractors is presented. The asymmetry
the proposed system, gaining further insight into other behavior study is helpful to in-depth about the chaotic
field results of the system is essential. Figure 12a, b system proposed to prove adjunct complex dynamic
depicts the 3D trajectory on a cross-section Poincaré behaviors. To investigate the coexisting asymmetric
coupled with the proposed system’s Poincaré map attractors of the system. Figure 16, the bifurcation of
[36]. Figure 12c shows the Brownian motion for parameter k is plotted in the range 0.4 B k B 0.8 with
specified chaotic behavior on the p, s plot of the 0–1 different initial conditions (x0, y0, z0) = (± 0.25,
test chart [37]. ± 0.2, 0.01) in the green, and black colors, respec-
tively. Figure 17a–d demonstrates asymmetric behav-
3.2 Multistability analysis iors for coexisting double-scroll attractors with
stable cycle, coexisting approach four-scroll attractors
The multistability of multiple coexisting attractors for with double-scroll attractors, coexisting shuriken four-
the same values of parameters is an essential property scroll attractors with irregular four-scroll attractors,
found in nonlinear dynamical systems from various coexisting big-size four-scroll attractors with irregular
fields of science and engineering [34, 35]. The analysis four-scroll attractors, respectively. The basin of
of the proposed system reveals the multistability results attraction has confirmed the dynamic behavior of
from the presence of parallel bifurcation branches. This initial conditions on x0-y0 planes. Figure 17c and d is
also reflects the unpredictability in the system’s behav- plotted by the attractor’s colors corresponding with the
ior, contributing to enriching its complexity. The colors of the basin of attraction in Fig. 18a and b,
proposed system is highly sensitive to initial conditions respectively. The beige color zone of basins is related
and can generate many attractors. The following results to unbounded dynamics.
show the occurrence of multiple coexisting attractors for From the results in Sects. 3.2.1 and 3.2.2, the
the symmetric and asymmetric dynamics. proposed system can be produced multiple coexisting
attractors, both symmetry and asymmetry, by chang-
3.2.1 Symmetry behavior ing the initial conditions but fixing other parameters.
Multiple attractors represent an additional source of
The sample of symmetry of the proposed system can randomness, and obvious potential applications
be found from the influence of parameter C with include chaos-based secure communication and ran-
dom signal generation [38].
123
0.7
0.02 a(i) a(ii)
0.6
0 0.5
0.4
y
-0.02
x 0.3
-0.04 0.2
0.1
-0.06
k=0.78 0
-0.08 -0.1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0 50 100 150
x time
0.1 0.6
b(i) b(ii)
0.05 0.5
0 0.4
-0.05 0.3
y x
-0.1 0.2
-0.15 0.1
-0.2 k=0.67 0
-0.25 -0.1
-0.1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0 50 100 150
x time
0.3 0.6
c(i) c(ii)
0.2 0.4
0.1 0.2
y 0 x 0
-0.1 -0.2
-0.2 -0.4
k=0.638
-0.3 -0.6
-0.8 -0.4 0 0.4 0.8 0 20 40 60 80 100 120 140 160 180 200
x time
0.8
d(ii)
0.2 d(i)
0.6
0.1 0.4
0.2
y 0 x
0
-0.1 -0.2
-0.4
-0.2 k=0.6
-0.6
-0.8 -0.4 0 0.4 0.8 0 50 100 150 200 250 300
x time
123
0.4 0.8
e(i) e(ii)
0.3 0.6
0.2 0.4
0.1
0.2
y 0 x
0
-0.1
-0.2
-0.2
-0.3 k=0.4 -0.4
-0.4 -0.6
-0.8 -0.4 0 0.4 0.8 0 50 100 150 200 250 300
x time
0.8
0.4 f(i)
f(ii)
0.6
0.4
0.2
0.2
y 0 x 0
-0.2
-0.2
-0.4
123
Fig. 12 The main attractor proposed, given A = 0.6, B = 0.2, C = 1, D = 2.5, k = 0.6 and the initial condition (x0, y0, z0) = (0.1, 0.1,
0.1) a 3D shuriken four-scroll attractor b Poincaré map c 0–1 test chart
123
Fig. 14 The phase portraits 2D plane y–z of the coexistence of a pair symmetric attractor for varying parameter C, with different initial
conditions (± 0.1, 0.1, 0.01) for blue and red colors. a C = 0.6, b C = 0.7, c C = 0.79, d C = 0.87
AnadigmDesigner2, which can be a modification and is adopted for amplification, by defining Q = 2. The
building block including parameters setting by using ODE of the proposed system is rewritten as Eq. (16).
Configurable Analog Modules (CAMs) [43]. Then, the 8
< x_ ¼ Q ðy þ GðyÞÞ;
system will be set corresponding with numerical
y_ ¼ Q z; ð16Þ
simulation and be rescaled according to the limited :
z_ ¼ Q ðkz y GðxÞÞ;
operation voltage of FPAA. When the experimental
results are compared with the simulation results, Figure 22 shows the blocks that design inside the
FPAA modeling needs to be modified until the results AnadigmDesigner2 environment of the proposed
are satisfactory. system. Because the resource of CAMs on FPAA is
Since, the proposed system has a small amplitude of limited, it needs two AN231E04 chips to implement.
the chaotic signal, less than ± 1 V. There is no need to Each CAMs replaced the name device with M1–M12
reduce the signal amplitude. On the contrary, signal and the parameters setting of each CAMs in the first
amplification is required to limit noise problems. In and second AN231E04 are shown Fig. 23a, b. The
order to outdo this problem, the rescale parameter (Q) parameters of the implementation FPAA are defined
123
Fig. 15 Cross sections of the basin of attraction by computed for z0 = 0.01, corresponding with coexisting symmetric attractors in
Fig. 14a and d. a x0–y0 plane for C = 0.6 b x0–y0 plane for C = 0.87
123
Fig. 17 The phase portraits 2D plane x–y of the coexistence of two asymmetric attractors for varying parameter k, with different initial
conditions (± 0.25, ± 0.2, 0.01) green and black a k = 0.71, b k = 0.65, c k = 0.52, d k = 0.43
Fig. 18 Cross sections of the basin of attraction by computed for z0 = 0.01, corresponding with coexisting asymmetric attractors in
Fig. 17c and d. a x0–y0 plane for k = 0.52 b x0–y0 plane for k = 0.43
123
Fig. 19 The falcon-like attractors on x–z plane of the proposed system with different amplitude rescaling and offset boosting by
defined A = 0.6, B = 0.2, C = 1, D = 2.5, k = 0.6 with the initial condition (0.1, 0.1, 0.01)
scroll, four-scroll, and six-scroll attractors, including methods but have yet to have a presentation for image
high-value Kaplan–Yorke chaotic systems. Moreover, encryption [45, 46]. Some of them have yet to be
the parameter adjustment thoroughly of the system actual experiments [47]. However, more efficient
leads to proven multiple attractors, both symmetric encryption algorithms with highly complex system
and asymmetric. With this feature, using FPAA for requirements have been presented [48–52]. They have
experimental setup allows for handy investigation and no results on the image cryptography communications
is helpful for in-depth education, allowing us to or experimental results. This study demonstrates the
comprehensively explore the entire range of simulation and experimental results of various sce-
parameters. narios of image encryption by varying the parameters
of the chaotic communication system with a low-
complexity cryptography communication method.
5 Image cryptography communication
5.1 Implementation of proposed cryptosystems
This section presents an image cryptography applica-
tion using a chaotic proposed system based on The block diagram for the approach proposed is shown
principles of the CM method. The CM method is in Fig. 26. CM uses the structure of cryptography. The
suitable for a chaotic communication system [44]. The commercially available electronic components and
encryption and decryption processes are implemented microcontrollers are implemented for encryption and
on an FPAA device that can conveniently reconfig- decryption, such as MCU, FPAA, LM358, and LF347
ure parameters. The communication circuit prototype (LM358 and LF347 are used in Amp.). The DC supply
is designed on a PCB based on a commercially voltage is ? 5 V, except for LF347, which is used
available, low-cost device designed in conjunction ± 12 V. The variable I(t) is the information signal,
with a microcontroller (ESP32). The proposed chaotic CD(t) is a chaotic decrypted signal, S(t) is a secret
system has a highly complexity chaotic signal with a signal, CE(t) is a chaotic encrypted signal, R(t) is a
multi-scroll attractor, which increases security as it is recovered signal, and I(t) is a reconstructed signal.
more difficult to attack or copy the encryption. For the cryptography approach proposed by CM,
Furthermore, the bit error rate can be improved by the chaotic equation proposed in (1) is rewritten
the designed circuit. Many researchers have used CM according to Fig. 26.
123
Fig. 20 The chaotic circuit implementation based on AN231E04 FPAA a experimental Setup for chaos signal b experimental setup for
image cryptography
Modifying system in
FPAA
Testing system by
Mathematical definition Design system in FPAA Experimental
Numerical simulations
of The proposed system by AnadigmDesigner measurements
(MATLAB)
123
n8
M1 n7
Output x M6
M2 M4
M7 M8
Output y
M3 M9 M10
M5 M11 M12
Output z
n3
n4
Fig. 22 FPAA implementation schemes of the proposed system with two different nonlinear functions
M1 M7
M2
M9
Gain = C (GC)
M5 Gain 3 = k (Gk)
M8
M4 Gain 1 = B (GB)
Gain 2 = A (GA) M10 Gain 1, 2 = D (GD)
M3 M12
M11
M6
(a) (b)
Fig. 23 CAM (Configurable Analog Modules) parameters setting for the proposed system a first AN231E04 b second AN231E04
123
Fig. 24 The four-scroll attractor results by FPAA implementation using GA = 1.2, GB = 0.4, GC = 1, GD = 0.155, and Gk = 1.2
a output x–y plane (falcon-like) b output x–z plane c output y–z plane
The CAMs of FPAA are defined according to R(t), and I(t). In the decrypted correct image, the
Fig. 23. The Clock frequencies of CAMs are reas- transmitter and receiver are defined as Gk correspond-
signed from 250 kHz to 1000 kHz for ClockA and ing at Gk = 0.3. In the cipher image, the parameter Gk
4–16 MHz for ClockB to the cryptography procedure. varies in the receiver since Gk = 0.55, Gk = 0.68,
For synchronization, the transmitter and the receiver Gk = 0.73, and Gk = 0.95, respectively. At the correct
use the z key as the Sync. signal (zr = zt). The decryption image, it is evidence that the received
parameters of a transmitter are GA = 1.2, GB = 0.4, information I(t) can be decrypted and reconstructed
GC = 1, GD = 0.155, and Gk = 0.3. The parameteri- identically with the transmitted information I0 (t). From
zation of the receiver is defined as corresponding with Fig. 29, the bit error rate (BER) of decrypted images
the transmitter, except for Gk (case cipher image). are verified with 0 (Gk = 0.3), 443,403 9 10–6 (Gk =
0.55), 486,338 9 10–6 (Gk = 0.68), 490,919 9 10–6
5.2 Image cryptography results (Gk = 0.73), 492,225 9 10–6 (Gk = 0.95) for a mis-
match parameter in receiver. As the results, the best
For image cryptography, the transmitter and the cipher image should have BER larger than
receiver circuits are designed to be implemented 490,000 9 10–6.
together with FPAA, as shown in Fig. 27. The In the second case, an unsynchronized key for the
Barbara and Girl RGB images [53] are used for Girl RGB image tested the transmitter and receiver.
image cryptography, which the pixel of the image is The receiver cannot be decrypted from the original
814 9 542 pixels for 10,588,512 bits. The informa- image, as shown in Fig. 30. In this case, and it can be
tion signal I(t) is a bit stream with an amplitude of found in several methods, whether different model
? 0.7 V defined and a bit rate of 9600 bit/s. The chaotic systems in transmitter and receiver, incorrect
amplitude of the chaotic signal (CD(t) and CE(t)) is state-key synchronization, etc. The BER is verified
defined as 3Vp-p. The frequencies of the signals in the with 498,289 9 10–6 for a mismatch synchronization.
procedure are 4.81 kHz for the information signal
(I(t)) and 27.70 kHz for the chaos signal (CD(t) and
CE(t)), as shown in Fig. 28. The overall processing 6 Conclusion
time of image cryptography communication approx-
imately 24 min. This research aims to present an image cryptography
The image cryptography results are shown in two communication system based on a 3D chaotic system
cases. The first case is a parameter mismatch between with two different nonlinear functions that can be
the transmitter and receiver. The second case is a generated to multi-scroll chaotic attractors. The
mismatch in the synchronization of the system. reconfigurable chaotic and cryptography communica-
Figure 29. The results show the first case by using tion systems are realized by field programmable
Barbara RGB image for a decrypted image together analog array (FPAA) and low-cost microcontrollers
with the analog signal on the oscilloscope, viz., I(t), and commercially available devices. The proposed
chaotic system can generate up to six-scroll attractors
123
c(i) c(ii)
d(i) d(ii)
Output x - y
Gk=0.78 Output x
e(i) e(ii)
f(i) f(ii)
Gk=0.78
Output x - y Output x
123
Fig. 26 Block diagram of proposed cryptosystem based on FPAA with transmitter and receiver
I(t) I´(t)
Regulator MCU Trans. picture MCU Receiv. picture
CE(t) CD(t) Regulator
Power Power
Supply Supply
S(t)
Syn. signal
123
Fig. 29 The results of decryption for the proposed cryptosystem by varying of parameter Gk in the receiver from correct decrypted to
high level cipher image
123
by adjusting only one coefficient. The several dynam- 11. Elwakil, A.S., Ozoguz, S., Kennedy, M.P.: A four-wing
ical properties of the proposed system are investigated. butterfly attractor from a fully autonomous system. Int.
J. Bifurc. Chaos Appl. Sci. Eng. 13(10), 3093–3098 (2003)
The multi-scroll attractor achieves relatively high 12. Dadras, S., Momeni, H.R.: A novel three-dimensional
complexity by DKY = 2.45. The numerical and exper- autonomous chaotic system generating two, three and four-
imental results of the multi-scroll chaotic system are scroll attractors. Phys. Lett. A 373(40), 3637–3642 (2009)
compared with good agreement. The successful image 13. Chunxia, L., Jie, Y., Xiangchun, X.A., Limin, Q., Yongqing,
F.: Research on the multi-scroll chaos generation based on
can be reconstructed without error if the transmitter jerk mode. Procedia Eng. 29, 957–961 (2012)
and receiver parameters are matched. The mismatched 14. Ding, P., Feng, X.: Generation of multi-scroll chaotic
parameters give the cipher image if and only if BER is attractors from a jerk circuit with a special form of a sine
more significant than 490,000 9 10–6. function. Electronics 9, 842 (2020)
15. Wolf, A., Swift, J.B., Swinney, H.L., Vastano, J.A.:
Determining Lyapunov exponents from a time series. Phys.
D 16, 285–317 (1985)
Author contributions PP contributed to the study of the 16. Argyris, J., Faust, G., Haase, M.: An exploration of chaos.
conception and design. PP and KK performed material Springer-Verlag, Berlin Heidelberg (2015)
preparation, data collection, and analysis. JC and KK 17. Le, X., Sen, Z., Yicheng, Z., Boquan, L.: Dynamics of a new
performed experimental. FK and MM provided the literature composite four-scroll chaotic system. Chin. J. Phys. 56,
reviews. PP wrote the first draft of the manuscript, and all 2381–2394 (2018)
authors commented on previous versions. All authors read and 18. Janakiraman, S., Thenmozhi, K., Rayappan, J.B.B.,
approved the final manuscript. Amirtharajan, R.: Lightewight chaotic image encryption
algorithm for real-time embedded system: implementation
Funding The authors declare that no funds, grants, or other and analysis on 32-bit microcontroller. Microprocess.
support were received during the preparation of this manuscript. Microsyst. 56, 1–12 (2018)
19. Azzaz, M.S., Tanougast, C., Sadoudi, S., Fellah, R., Dan-
Data availability Original testing images are available at dache, A.: A new auto-switched chaotic system and its
https://www.hlevkin.com/hlevkin/06testimages.htm. FPGA implementation. Commun. Nonlinear Sci. Numer.
Simul. 18, 1792–1804 (2013)
20. Tuna, M., Alçın, M., Koyuncu, İ, Fidan, C.B., Pehlivan, İ:
High speed FPGA-based chaotic oscillator design. Micro-
References process. Microsyst. 66, 72–80 (2019)
21. Frasca, M., Fortuna, L., Arena, P.: Implementation and
1. Elzaher, M.F.A., Shalaby, M., Kamal, Y., Ramly, S.E.: synchronization of 3x3 grid scroll chaotic circuits with
Securing digital voice communication using non-au- analog programmable devices. Chaos 16, 013121 (2006)
tonomous modulated chaotic signal. J. Inf. Secur. Appl. 34, 22. Matthews, R.: On the derivation of a ‘‘chaotic’’ encryption
243–250 (2017) algorithm. Cryptologia 13, 29–42 (1989)
2. Xingyuan, W., Junjian, Z., Guanghui, C.: An image 23. Hossam, H.E., Kalash, H.M., Allah, O.S.F.: Anefficient
encryption algorithm based on ZigZag transform and LL chaos-based feedback stream cipher (ECBFSC) forimage
compound chaotic system. Opt. Laser Technol. 119, 105581 encryption and decryption. Informatica 31(1), 121–129
(2019) (2007)
3. Wang, N., Zhang, G., Ren, L., Bao, H.: Coexisting asym- 24. Sanprang, P. et al.: Realization of image cryptography using
metric behavior and free control in a simple 3-d chaotic FPAA-based two chaotic systems. ECTI-CON. ID:
system. AEÜ-Int. J. Electron. Commun. 122, 153234 (2020) 23321360 (2023).
4. Wang, N., Zhang, G., Bao, H.: Infinitely many coexisting 25. Azzaz, M.S., Tanougast, C. Sadoudi, S., Dandache, A., and
conservative flows in a 4D conservative system inspired by Monteiro, F.: Real-time image encryption based chaotic
LC circuit. Nonlinear Dyn. 99, 3197–3216 (2020) synchronized embedded cryptosystems. In: Proceedings of
5. Lorenz, E.N.: Deterministic nonperiodic flow. J. Atmos. the 8th IEEE International NEWCAS Conference (NEW-
Sci. 20(2), 130–141 (1963) CAS’10), pp. 61–64 (2010)
6. Rossler, O.E.: An equation for continuous chaos. Phys. Lett. 26. Karawanich, K., Prommee, P.: High-complex chaotic sys-
A 57(5), 397–398 (1976) tem based on new nonlinear function and OTA-based circuit
7. Matsumoto, T.: A Chaotic Attractor from chua’s Circuit. realization. Chaos Solit. Fract. 162, 112536 (2022)
IEEE. Trans. Circuits Syst. CAS12(12), 1056–1058 (1984) 27. Karawanich, K., Kumngern, M., Chimnoy, J., Prommee, P.:
8. Sprott, J.C.: Some simple chaotic flows. Am. J. Phys. 50(2), A four-scroll chaotic generator based on two nonlinear
647–650 (1994) functions and its telecommunications cryptography appli-
9. Sprott, J.C.: A new class of chaotic circuit. Phys. Lett. A cation. AEÜ-Int. J. Electron. Commun. 157, 154439 (2022)
266, 19–23 (2000) 28. Malasoma, J.M.: What is the simplest dissipative chaotic
10. Liu, W., Tang, W.K.S., Chen, G.: 2 9 2-scroll attractors jerk equation which is parity invariant? Phys. Lett. A 264,
generated in a three-dimensional smooth autonomous sys- 383–389 (2000)
tem. Int. J. Bifurc. Chaos 17(11), 4153–4157 (2007)
123
29. Shivamoggi, B.K.: Nonlinear Dynamics and Chaotic 44. Sun, K.: Chaotic Secure Communication. De Gruyter,
Phenomena: An Introduction. Fluid Mechanics Applica- Berlin (2016)
tions. Springer, Berlin (1997) 45. Rai, A. et al.: Realization of chaotic oscillator and use in
30. Strogatz, S.H.: Nonlinear Dynamics and Chaos. Routledge, secure communication. In: Advances in Electrical Engi-
Taylor & Francis Group (1994) neering, Electronics and Energy, vol. 6, p. 100321 (2023).
31. Hefferon, J.: Linear Algebra. Mathematics and Statistics, 46. Gokyildirim, A., et al.: A novel five-term 3D chaotic system
4th edn. Orthogonal Publishing, Michigan (2020) with cubic nonlinearity and its microcontroller-based secure
32. Glendinning, P., Sparrow, C.: Shilnikov’s saddle-node communication implementation. Int. J. Electron. Commun.
bifurcation. Int. J. Bifurc. Chaos 6(6), 1153–1160 (1996) (AEÜ) 160, 154497 (2023)
33. Pchelintsev, A.: An accurate numerical method and algo- 47. Zhang, Q., Guo, Y., Li, W., Ding, Q.: Image encryption
rithm for constructing solutions of chaotic systems. J. Appl. method based on discrete Lorenz chaotic sequences. J. Inf.
Nonlinear Dyn. 9(2), 207–221 (2020) Hiding Multimed. Signal Process. 7, 3 (2016)
34. Leutcho, G.D., Kengne, J.: A unique chaotic snap system 48. Ye, G., Liu, M., Yap, W.S., Goi, B.M.: Reversible image
with a smoothly adjustable symmetry and nonlinearity: hiding algorithm based on compressive sensing and deep
chaos, offset-boosting, antimonotonicity, and coexisting learning. Nonlinear Dyn. 111, 13535–13560 (2023)
multiple attractors. Chaos Solitons Fractals 113, 275–293 49. Ye, G., Wu, H.S., Huang, X., Tan, S.Y.: Asymmetric image
(2018) encryption algorithm based on a new three-dimensional
35. Yuan, F., Wang, G., Wang, X.: Extreme multistability in a improved logistic chaotic map. Chin. Phys. B 32(3), 030504
memristor-based multi-scroll hyper-chaotic system. Chaos (2023)
26(7), 073107 (2016) 50. Ye, G., Wu, H., Liu, M., Huang, X.: Reversible image-
36. Poincare, H.P.: Celestial mechanics. Dyn.-Syst. Theory hiding algorithm based on singular value sampling and
Chaos Phys. Rep. Rev. Sect. Phys. Lett. 193(3), 137–163 compressive sensing. Chaos Solitons Fractals 171, 113469
(1990) (2023)
37. Ke-Hui, S., Xuan, L., Cong-Xu, Z.: The 0–1 test algorithm 51. Ye, G., Du, S., Huang, X.: Image compression-hiding
for chaos and its applications. Chin. Phys. B 19(11), 110510 algorithm based on compressive sensing and integer
(2010) wavelet transformation. Appl. Math. Model. 124, 576–596
38. Pisarchik, A.N., Reategui, R.J., Flores, C.R., Lopezc, (2023)
J.H.G., Cuellar, G.H., Martı́n-Pasquı́n, F.J.: Secure chaotic 52. Ye, G., Guo, L., He, J.: Image encryption algorithm based
communication based on extreme multistability. J. Franklin on ElGamal cryptography and selective random diffusion.
Inst. 358, 2561–2575 (2021) Phys. Scr. 98(11), 115251 (2023)
39. Li, C., Jiang, Y., Ma, X.: On offset boosting in chaotic 53. Available online: https://www.hlevkin.com/hlevkin/
system. Chaos 3(2), 47–54 (2021) 06testimages.htm
40. Li, C., Sprott, J.C., Yuan, Z.Y., Li, H.: Constructing chaotic
systems with Total amplitude control. Int. J. Bifurc. Chaos
Publisher’s Note Springer Nature remains neutral with
25(10), 1530025 (2015)
regard to jurisdictional claims in published maps and
41. Caponetto, R., Mauro, A.D., Fortuna, L., Frasca, M.: Field
institutional affiliations.
programmable analog array to implement a programmable
Chua’s circuit. Int. J. Bifurc. Chaos 15(5), 1829–1836
(2005) Springer Nature or its licensor (e.g. a society or other partner)
42. AN231E04 Datasheet Rev 1.5. Available online. Anadigm; holds exclusive rights to this article under a publishing
2007. https://www.anadigm.com/_doc/UM231004-K002. agreement with the author(s) or other rightsholder(s); author
pdf self-archiving of the accepted manuscript version of this article
43. Understanding Anadigm. Available online. Anadigm; 2007. is solely governed by the terms of such publishing agreement
https://www.anadigm.com/_apps/PR021100-0024.pdf and applicable law.
123
1. use such content for the purpose of providing other users with access on a regular or large scale basis or as a means to
circumvent access control;
2. use such content where to do so would be considered a criminal or statutory offence in any jurisdiction, or gives rise to civil
liability, or is otherwise unlawful;
3. falsely or misleadingly imply or suggest endorsement, approval , sponsorship, or association unless explicitly agreed to by
Springer Nature in writing;
4. use bots or other automated methods to access the content or redirect messages
5. override any security feature or exclusionary protocol; or
6. share the content in order to create substitute for Springer Nature products or services or a systematic database of Springer
Nature journal content.
In line with the restriction against commercial use, Springer Nature does not permit the creation of a product or service that creates
revenue, royalties, rent or income from our content or its inclusion as part of a paid for service or for other commercial gain.
Springer Nature journal content cannot be used for inter-library loans and librarians may not upload Springer Nature journal
content on a large scale into their, or any other, institutional repository.
These terms of use are reviewed regularly and may be amended at any time. Springer Nature is not obligated to publish any
information or content on this website and may remove it or features or functionality at our sole discretion, at any time with or
without notice. Springer Nature may revoke this licence to you at any time and remove access to any copies of the Springer Nature
journal content which have been saved.
To the fullest extent permitted by law, Springer Nature makes no warranties, representations or guarantees to Users, either express
or implied with respect to the Springer nature journal content and all parties disclaim and waive any implied warranties or
warranties imposed by law, including merchantability or fitness for any particular purpose.
Please note that these rights do not automatically extend to content, data or other material published by Springer Nature that may be
licensed from third parties.
If you would like to use or distribute our Springer Nature journal content to a wider audience or on a regular basis or in any other
manner not expressly permitted by these Terms, please contact Springer Nature at