Next Article in Journal
Maxpro Designs for Experiments with Multiple Types of Branching and Nested Factors
Previous Article in Journal
Density–Density Correlation Spectra of Ultracold Bosonic Gas Released from a Deep 1D Optical Lattice
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

RBFNN-PSO Intelligent Synchronisation Method for Sprott B Chaotic Systems with External Noise and Its Application in an Image Encryption System

1
Electrical Engineering College, Heilongjiang University, Harbin 150080, China
2
Suihua University Artificial Intelligence Innovation and Application Engineering Technology Research Centre, Suihua University, Suihua 151100, China
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(10), 855; https://doi.org/10.3390/e26100855
Submission received: 5 September 2024 / Revised: 6 October 2024 / Accepted: 8 October 2024 / Published: 10 October 2024

Abstract

:
In the past two decades, research in the field of chaotic synchronization has attracted extensive attention from scholars, and at the same time, more synchronization methods, such as chaotic master–slave synchronization, projection synchronization, sliding film synchronization, fractional-order synchronization and so on, have been proposed and applied to chaotic secure communication. In this paper, based on radial basis function neural network theory and the particle swarm optimisation algorithm, the RBFNN-PSO synchronisation method is proposed for the Sprott B chaotic system with external noise. The RBFNN controller is constructed, and its parameters are used as the particle swarm particle optimisation parameters, and the optimal values of the controller parameters are obtained by the PSO training method, which overcomes the influence of external noise and achieves the synchronisation of the master–slave system. Then, it is shown by numerical simulation and analysis that the scheme has a good performance against external noise. Because the Sprott B system has multiple chaotic attractors with richer dynamics, the synchronization system based on Sprott B chaos is applied to the image encryption system. In particular, the Zigzag disambiguation method for top corner rotation and RGB channel selection is proposed, and the master–slave chaotic system synchronisation sequences are diffused to the disambiguated data streams, respectively. Therefore, the encryption and decryption of image transmission are implemented and the numerical simulation results are given, the random distribution characteristics of encrypted images are analysed using histogram and Shannon entropy methods, and the final results achieve the expected results.

1. Introduction

Chaos theory is a popular research topic in nonlinear systems theory. A chaotic motion state is a seemingly random motion that occurs in a dynamical system, which in essence is the sensitivity of the long-term behaviour of the system to the initial conditions [1,2,3]. Chaotic systems are also characterised by unpredictability, non-periodicity, natural iteration and pseudo-randomness, and these properties have led to a wide range of applications in fields such as cryptography, secure communications, signal processing and image encryption [4,5,6,7,8]. In 1990, the scholars Pecora and Carrol proposed the chaotic self-synchronisation method, in which synchronisation between two chaotic systems was achieved for the first time by the drive–response method, while the first observation of the chaotic synchronisation phenomenon was made on electronic circuits [9,10]. This groundbreaking research progress breaks the traditional notion that chaotic motion patterns are uncontrollable and dangerous. It shows that chaos is not only controllable and synchronisable, but that it also can be used as one of the components of the fundamental theoretical study of the dynamics of information transmission and processing, thus making it possible to apply chaotic systems to the field of confidential information communication.
It is well known that external noise is prevalent in real communication processes. The presence of noise not only increases the challenge of chaotic synchronisation, but also easily destroys the established synchronisation state. Therefore, the design of chaotic synchronisation controllers in the presence of external noise must be investigated [11]. In Ref. [12], Cheng propose a synchronisation scheme based on a chaotic system with bounded noise and uncertain parameters to achieve the asymptotic synchronisation of two different chaotic systems, on the basis of the theory of Lyapunov stability and the deadband algorithm. In Ref. [13], Yang et al. design a reduced-order observer asymptotically to estimate the state of the enhanced auxiliary drive system and propose a method that can recover the information signal as well as reconstruct the signal recovery method with uncertain parameter interference and channel noise. In Ref. [14], Xu et al. design a decay function that could decay to zero in a finite time to accelerate the convergence of the global sliding mode surface and construct an improved Global Nonlinear Integral Sliding Mode Squares (GNISMS) to achieve the synchronous control of chaotic systems with external disturbances and internal parameter uncertainties.
Multi-attractor chaotic systems have been emphasized by scholars due to their richer dynamical behaviours. Multi-attractor is a phenomenon in which a chaotic system produces the coexistence of multiple attractors when the system parameters are the same. In Ref. [15], Sprott studies general three-dimensional autonomous constant differential systems with second-order nonlinearities, revealing 19 different examples of chaotic flows, named in the order of the letters A-S, of which the Sprott B system is one. In Ref. [16], the scholars Carroll and Pecora conduct a study of symmetric chaotic systems by synchronizing two multi-attractor Rössler systems with a unidirectional drive, proving that the response system is always synchronized with the drive system, even though it has two attractors, thus demonstrating that multi-attractor chaotic systems can be used in confidential communication systems. In Ref. [17], the problem of the coexistence of multiple attractors in a Sprott B system is investigated, and an extension of the Sprott B system with a polynomial function is proposed to enable the system to generate several different independent attractors, which enhances the dynamical behaviour of the system. In Ref. [18], Ramesh et al. propose a 4D memory mixing degree Sprott B system that adjusts the symmetry of the proposed model through a deviation term, which in turn induces the homogeneous and heterogeneous behaviours of the chaotic system. Based on the needs of image encryption system design, this paper uses the polynomial extended Sprott B system proposed by Lai et al. in Ref. [15] to perform synchronization control research.
At present, researchers have designed a large number of intelligent synchronization control schemes using the rapid development of chaos control theory, intelligent neural controllers and hardware computing resources. In Ref. [19], the information-granularity-based fuzzy radial basis function neural network (IG-FRBFNN) is used to dynamically obtain the weights of each source image, chaotic brainstorm optimization (CBSO) is finally proposed, and the structure optimization and parameter optimization of the network are carried out, respectively. In Ref. [20], a flow inference measurement method based on improved radial basis function neural network (RBFNN) is used to solve the problem of the inaccurate estimation of the valve flow rate, which is affected by the nonlinearities and uncertainties of multiple parameters, and particle swarm optimization (PSO) combined with a least squares algorithm is used to optimize the parameters of the RBFNN, such as the centre, the width and the weights. In Ref. [21], the classical variable projection algorithm (VP) is applied to radial basis function neural networks, and the problem corresponding to the sum of squares of errors (SSE) of the minimization of the general radial basis function neural network (GRBFNN) is transformed into a lower dimensional optimization problem, and it is theoretically proved that the smooth point set of the objective function of the lower dimensional problem is equivalent to that of the original objective function. In Ref. [22], a black-box and Multi-objective Particle Swarm Optimization (MOPSO) algorithm is proposed to optimize the parameters of RBFNN to achieve the prediction of the performance of a cyclone with variable pitch spiral baffle when the cyclone cone becomes rough. The analysis shows that the RBFNN, as a controller, is able to approximate nonlinear functions with arbitrary accuracy and has good generalization ability.
Optimization algorithms play an important role in the parameter optimization of neural network controllers, and Genetic Algorithms (GAs), Gray Wolf Optimization Algorithms (GWOs), Particle Swarm Optimization Algorithms (PSOs), etc., have been widely used in various optimization problems. In Ref. [23], a steganography technique based on a general hybrid chaotic mapping of the 3D displacement function of pixels of a colour image is proposed and a genetic algorithm with permutation coding is proposed to optimize the parameters of the 3D displacement function, which improves the transparency and security of this steganography technique. A new local stochastic optimization strategy is proposed in Ref. [24] to compensate for the defects of GWOs. The method randomly selects several points near the current position of each individual as candidate points in the axial direction and chooses the best point to participate in the update decision of the individual. In Ref. [25], the problems of premature convergence and the lower convergence accuracy of the gray wolf optimization algorithm are addressed, and an improved scale-free network topology (SFGWO)-based gray wolf optimization algorithm is proposed to solve these problems. The improved algorithm first adopts a population construction strategy based on a scale-free network topology, in which the interactions between particles are limited to the topological neighbour directions, which helps to improve the exploration ability of the algorithm. Compared with the gray wolf optimization algorithm, the particle swarm algorithm also has the global search capability, in which the global optimal solution is found through the continuous iteration of particles in the solution space. In Ref. [26], a chaotic dynamic weights particle swarm optimization (CDW-PSO) algorithm is proposed; this introduces chaotic mapping and dynamic weights to modify the search process, and overcomes the problems of the PSO algorithm, such as premature convergence and its easy capture of the local optimal solution. In Ref. [27] applies the PSO optimization algorithm to cluster routing design and proposes an improved cluster routing protocol based on levy chaotic particle swarm optimization (LCPSO-CRP), which enhances the routing efficiency of sensor networks. Based on the above, this paper adopts PSO as the optimization algorithm for the RBFNN controller parameters, and in order to overcome the problem of the PSO algorithm being prone to falling into the local optimal solution, it adopts the method of linear dynamic change of weights from the literature [26], which enhances the global searching ability of the PSO algorithm solution space.
In summary, in this paper, based on the theory of the radial basis function neural network (RBFNN) and particle swarm training algorithm (PSO), we propose a synchronous design scheme for the externally noisy chaotic system RBFNN-PSO, and the main contributions are as follows:
  • A controller based on RBFNN is constructed, considering the influence of external noise on the performance of the system, and the controller parameters are optimized by the group intelligent optimization algorithm to realize the suppression of the influence of external noise on the performance of the synchronous system.
  • The PSO optimization algorithm is selected and improved, and the linear dynamic adjustment of the optimization parameters is used to update the weights, so as to overcome the problem of the PSO optimization algorithm being prone to falling into the local optimal situation; meanwhile, the characteristics of the rich dynamics behaviour of the multi-attractor chaotic system are taken into account, the Sprott B system is selected as the synchronization object, and the parameters of the synchronization controller of the Sprott B chaotic system are introduced into the training process, so as to achieve the optimal solution of the controller parameters of the chaotic system, which is the best solution for the chaotic system. The optimal solution of the controller parameters realizes the consistent synchronization of the two Sprott B systems.
  • In order to enhance the complexity of image encryption, an improved Zigzag top-angle rotation image disruption algorithm is proposed to overcome the problem of the first data in the first place not changing and being easily recognized when the Zigzag is disrupted; at the same time, the method in which the mean size of the image determines the disruption channel is adopted to expand the encrypted secret key space; an analysis of the security performance of the image encryption is carried out, and the encryption system has a better resistance to the differential attack and statistical analysis.
The remaining parts of this paper are organised as follows: Section 2 mainly introduces the basic knowledge of RBF neural networks and particle swarm algorithms, explains the problems solved in this thesis, and constructs the master–slave synchronisation system as an example of the Sprott B system; Section 3 mainly introduces the Sprott B chaotic synchronisation scheme with the specific PSO training process, gives the optimal values of the controller parameters, and analyses the system performance, the overall scheme of image encryption and the enhanced Zigzag disruption algorithm and diffusion method. The simulation results are presented along with the safety analysis in Section 4; Section 5 gives a summary of the whole paper.

2. Proposed Model and Preliminary Work

2.1. RBF Neural Network

RBF neural networks are widely used in many fields such as time series prediction, classification, function approximation and system control [28,29]. In the current study, the RBF neural network can estimate any disturbance and uncertainty, then estimate its output, which in turn can be used to find the optimal solution to the uncertain parameters of the chaotic system. There can be many form of RBF; in this paper, the Gaussian function is chosen as the interpolation basis function [30]. Thus, the output of the RBF neural network is calculated as follows:
y m ( X ) = k = 1 K w k m ϕ k ( X ) θ 0 m ,   m = 1 , 2 , , M
ϕ k ( X ) = exp ( X C k 2 2 δ k 2 ) ,   k = 1 , 2 , , K
where w k m is the ideal constant weight value of the radial basis function, K is denoted as the number of nodes in the hidden layer, and M denotes the number of outputs of the radial basis function; X is denoted as the N-dimensional input vector and its individual components are x i ( i = 1 , 2 , , N ) , and is also denoted as the N-dimensional vector, which is the centroid position vector of ϕ k ( X ) , with the individual components of ϕ k ( X ) being C j k ( j = 1 , 2 , , N ) ; and δ k is denoted as the value of the width of the radial basis function, which is also one of the parameters being trained. The structure of the radial basis function neural network is shown in Figure 1.

2.2. The PSO Algorithm

The Particle Swarm Algorithm (PSO) was co-proposed by Eberhart and Kennedy [31]. The PSO algorithm process is a population-based search process, in which individuals are called particles, and their positions (states) change successively with time. In a PSO system, particles fly around in a multidimensional search space, and during the flight, every other particle adjusts its position based on its own experience and the neighbouring particles, and then adjusts to the optimal position by using its own positional information and that of the neighbouring particles [32]. In PSO, each particle has a velocity and a position as follows:
v i ( k + 1 ) = φ i ( k ) v i ( k ) + α 1 γ 1 i ( P i x i ( k ) ) + α 2 γ 2 i ( G x i ( k ) )
x i ( k + 1 ) = x i ( k ) + v i ( k + 1 )
where i is denoted as the particle index, k is the discrete time index, and v i is the velocity of the i-th particle; x i is the current position of the i-th particle and P i is the personal best of the i-th particle; G is denoted as the global best of the group, and γ 1 i and γ 2 i are the random numbers on the interval [0, 1] that correspond to the i-th particle; φ i ( k ) is denoted as the inertia function; and α 1 and α 2 are acceleration constants, which generally take values in [0, 2].

2.3. Design Methodology for Synchronous System Controllers

In this paper, the synchronisation of master–slave Sprott B chaotic systems with additional additive noise is discussed. The concept of synchronisation means that after a period of time, the state trajectories of the slave chaotic system gradually converge with those of the master chaotic system, and finally an asymptotically stable state is achieved. For this purpose, we define the master chaotic system and the slave chaotic system as Equations (5) and (6), respectively [11].
x ˙ m = f ( x m ) + g ( x m )
x ˙ s = f ( x s ) + g ( x s ) + φ ( x s ) + u
where x m ,   x s R n , which denote the state vectors of the master and slave systems, respectively. f ( ) ,   g ( ) are denoted as linear and nonlinear continuously differentiable functions, respectively. φ ( ) denotes bounded additional additive noise, and u is denoted as the controller.
There are a number of controller design methods that can be used for synchronous chaotic systems (5) and (6); however, these all involve the construction of Lyapunov functions, and some even require the clever design of sliding-mode surfaces, which in turn can be used to invert the synchronous controller u [33]. However, these controller design methods for chaotic systems have specific requirements that are necessary for synchronisation accuracy and setup time. In addition, the fact that these methods require a large number of controllers with a fixed design form makes the practical application of these methods somewhat limited. And the related development of intelligent controllers proves that RBFNN and Fuzzy Neural Networks (FNNs) can approximate the objective function with arbitrary accuracy. Therefore, the design problem of controllers for synchronised chaotic systems (5) and (6) can be transformed into the design problem of suitable parameters for RBFNN controllers. During the design process, these observable parameters should satisfy Equation (7).
a r g m i n p R N p 1 n N x i = 1 N x j = 1 n ( x j m ( t i ) x j s ( u ( p ) , t i ) 2
where n is the dimension of the state variables of the chaotic system, N x is the length of the numerical solution of the nonlinear system, p is the relevant parameter of the neural network controller that includes c , w , δ , and N p denotes the sum.

2.4. Constructed Chaotic System Models

For the purpose of comparison, the equations of the Sprott B chaotic system are chosen as the model of the chaotic system. The expressed equation of Sprott B is written as follows:
x ˙ m = a ( y m x m ) y ˙ m = b x m z m f ( z m ) z ˙ m = c x m y m
where f ( z ) = i = 1 n ( z l i ) ( z + l i ) , and l i is constant; moreover, l i = 2.5 is defined, and n can take the value of 1, or 2, or 3, or 4, depending on the actual situation. In this paper, n takes the value of 1. When a = 5 , b = 2 , c = 1 , given the corresponding initial conditions, the Sprott B system is in a chaotic state and has two chaotic attractors [17]. Figure 2 gives the attractor case for the Sprott B system. In Figure 2, the image depicted by the red line at the top is the phase diagram of the Sprott B system when the initial value is x 0 = [ 0.1 , 0.1 , 1 ] , and the image depicted by the pink line at the bottom is the phase diagram of the Sprott B system when the initial value is x 1 = [ 0.1 , 0.1 , 1 ] .
The Sprott B system is used as the basic model of the master system, and the master chaotic system is used in Equation (8), which in turn constructs the slave chaotic system as if it were shown in Equation (9) below.
x ˙ s = a ( y s x s ) y ˙ s = b x s z s f ( z s ) + g ( t ) + u ( t ) z ˙ s = c x s y s
where g ( t ) is used to simulate the extra additional noise of the system, in which g ( t ) = 2 sin ( π x s ) ( 1 + cos ( π z s ) is set to facilitate the simulation solution. Let u ( t ) be the controller of the response system, and according to the RBFNN theory, the Gaussian function is used as the radial basis function to obtain the expression of the controller u ( t ) , which is as follows:
u ( t ) = w × ϕ ( e ( t ) ) ϕ ( e ( t ) ) = ϕ 1 ( e ( t ) )   ϕ 2 ( e ( t ) ) ϕ n ( e ( t ) ) T ϕ i ( e ( t ) ) = exp ( 1 δ i 2 j = 1 n ( e j ( t ) c i j ) 2 ) e ( t ) = e 1 ( t )   e 2 ( t )   e 3 ( t ) T = x s x m   y s y m   z s z m T
where n = 3 , which is the number of neurons. w ( t ) = w 1 ( t ) w 2 ( t )   w n ( t )   is the weight of the radial basis function, and δ i is the value of the width of the radial basis function ϕ i ( t ) . And c i j ( j = 1 , 2 , , n ) is the centre position of the radial basis function ϕ i ( t ) . x m , y m , z m and x s , y s , z s are the state vectors of the master chaotic system and slave chaotic system, respectively. Moreover, e ( t ) = x m x s denotes the state error vector of the master chaotic system and slave chaotic system. Figure 3 illustrates the master–slave system synchronisation scheme.
In order to verify the feasibility of the proposed scheme, the Lorenz chaotic system is selected and compared with the linear feedback synchronization and RBFNN-PSO synchronization schemes, respectively. The Lorenz mixed-degree master system equations are given in Equation (11).
x ˙ m =   a ( y m - x m ) y ˙ m = r x m y m x m y m z ˙ m = x m y m b z m
The equation of the chaotic Lorenz system using linear feedback synchronization is shown in Equation (12).
x ˙ s = a ( y s - x s ) y ˙ s = r x s y s x s y s + u z ˙ s = x s y s b z s
where u = K ( y m y s ) = K e 2 ( t ) is the linear feedback controller and K is the feedback gain. The equations of the chaotic Lorenz system using the RBFNN-PSO synchronization scheme are shown in Equation (13).
x ˙ s = a ( y s - x s ) y ˙ s = r x s y s x s y s + i = 0 5 w i Φ i z ˙ s = x s y s b z s
where u = i = 0 5 w i Φ i is the RBFNN controller, Φ i is the mirror base Gaussian function and w i is its weights. Numerical simulation is carried out using MATLAB 2022B and the results are shown in Figure 4. From an analysis of Figure 4, the synchronization results obtained by using the chaotic Lorenz system with linear feedback synchronization and the RBFNN-PSO synchronization scheme, respectively, are close to each other, which proves that the proposed RBFNN-PSO synchronization scheme is feasible.

3. Synchronisation Schemes for Master–Slave Sprott B Chaotic Systems with Additional Noise

3.1. Training Process for PSO Parameters

In this section, considering Equation (8) as the master chaotic system and Equation (9) as the slave chaotic system, the RBFNN controller is directly involved in the mediation process of the response system and is responsible for performing the role of the controller. The Advanced Particle Swarm Optimisation algorithm (APSO) is indirectly involved in the process rectifying the parameters of the response system, which is responsible for finding the optimal values of the parameters of the neural controllers through pre-training. At the same time, the main process of synchronising Equations (8) and (9) is transformed into determining the appropriate parameters of the neural network and system coefficients that will be used as controllers.
According to the requirements of the PSO optimisation algorithm, the fitness function must be pre-designed before the introduction of the optimisation controller. And the fitness function must be effective and direct, which should reflect the degree of approximation of the objective function under the current conditions and simplify the whole operation process as much as possible to improve the computational efficiency. In order to overcome the drawbacks of computational complexity and the high cost of integral mean error (IEA), the mean square error (MSE) is chosen here as the fitness function to reduce the computational complexity. The equation for fitness is specified in Equation (14).
I M S E = 1 n N x k = 1 N x j = 1 n ( x j m ( p , k ) x j s ( k ) ) 2
where N x is the length of the numerical solution of the chaotic system during the training process, and x m ( p , k ) R n is the state of the main chaotic system at time k. x s ( k ) R n is the state of the slave chaotic system at time k; additionally, p = [ w T c T δ T ] T R N p is the parameter that the RBF controller is waiting to learn. The parameters w , c , δ are stored sequentially in parameters N , n × N and N , respectively. Note that N p = N × ( 2 + n ) . Figure 5 illustrates the training scheme of the overall RBFNN-PSO algorithm.
The steps for training the parameters of the PSO algorithm are as follows:
Step 1: Determine the elements of the particle vector X , including the three controller training parameters w ,   c and δ , to form the 25 × 1 dimensional matrix that is shown in Equation (15); then, randomly assign the initial values of the parameters w 0 ,   c 0 and δ 0 ;
X = [ w 1   w 2   w 3   w 4   w 5   c 1   c 2   c 3 c 15 δ 1   δ 2   δ 3   δ 4   δ 5 ] T
Step 2: Solve the master–slave chaotic system equations in a certain interval by using the MATLAB library function ODE45;
Step 3: Quantitatively evaluate the performance of the parameters using the fitness function ( I M S E );
Step 4: Based on the above evaluation, select the automatic update parameters of the PSO optimisation algorithm;
Step 5: Repeat steps 2–4 until the minimisation of the value of the fitness function or the maximum number of search iterations defined by the algorithm is reached;
Step 6: Fix the controller parameters of the RBFNN algorithm and the parameters of the system.
The pseudo-code for the calculation of the fitness function and the pseudo-code for the PSO parameter training process are given in Table 1 and Table 2, respectively.
The value of the fitness function is the key condition for the parameter training of the PSO algorithm, and the solution of the master–slave chaotic system and the corresponding time are thus given by the ODE45 library function in MATLAB. Then, the solution of the master–slave chaotic system is subjected to the mean square error operation and finally I M S E is obtained. The functions and methods described above provide us with the ability to create an optimal neural controller for the slave chaotic system. The controller is capable of generating the same motion and chaotic sequences as the master chaotic system, while maintaining a specified level of accuracy. After these several processing steps, we obtained two different chaotic sequences, called Y m and Y s , to facilitate the subsequent application of the synchronised system.

3.2. Synchronisation Characterisation of Chaotic Systems

In this section, Equation (8) is used as the master chaotic system and Equation (9) is used as the slave chaotic system, with the initial values chosen as A and B, respectively. The RBFNN algorithm is used to set up the controllers in accordance with Equation (10) and the controllers are given the corresponding initial values. Thereafter, the number of particles for the PSO algorithm is set to 1000 while the number of iterations is set to 50, followed by the training of the controller parameters. The final trajectory diagrams of the master Sprott B system and the slave Sprott B system, as well as the trajectory diagrams of each state variable, are shown in Figure 6 and Figure 7, respectively. In Figure 6, the image depicted by the blue line at the top is the phase diagram of the Sprott B system when the initial value is x 0 = [ 0.1 , 0.1 , 1 ] , and the image depicted by the orange line at the bottom is the phase diagram of the Sprott B system when the initial value is x 1 = [ 0.1 , 0.1 , 1 ] .
From the state trajectories of the Sprott B master–slave system trained by the PSO algorithm in Figure 7, the blue and orange iteration curves correspond to the blue and orange systems in Figure 6, respectively, andwhere the master system is in blue and the slave system is in red. It can be seen that the Sprott B master–slave chaotic system trained by PSO using the RBFNN controller retains the chaotic properties of the source system, and has a good sensitivity to the initial value of different initial conditions.

4. Application of the Introduced Synchronization Scheme in Image Encryption System

4.1. Proposed Image Encryption Scheme

In most of the existing research on image encryption, the initial values of the chaotic system are used as the initial key; therefore, if the initial key is lost, although the image encryption system can rely on the interrupt algorithm alone for encryption, this greatly reduces the security of the algorithm. Accordingly, this paper implements image encryption based on the chaotic synchronisation method, which overcomes the disadvantage of relying on the initial value of the chaotic system for encryption. An enhanced zigzag destruction and diffusion method is proposed to solve the problem of the low periodicity of the initial transformation of the image, and the complete image encryption scheme is given in Figure 8.

4.2. Zigzag Image Scrambling Scheme

The image scrambling algorithm is an information-hiding technique that enables the hiding and protection of image information as the image after the scrambling algorithm is unrecognisable. The main purpose of image scrambling is to turn a given image into a random image without explicit information after scrambling. According to the characteristics of image scrambling, image scrambling can be divided into space-domain scrambling, frequency-domain scrambling, and mixed space–frequency-domain scrambling, so this paper considers image scrambling in the space-domain.
To enhance the complexity of Zigzag image disarrangement, an enhanced disarrangement algorithm is proposed, as shown in Figure 9. The Zigzag image scrambling algorithm is a scrambling technique in the spatial domain of an image, which rearranges the pixels of an image through the Zigzag scanning method in order to encrypt or protect the image information. This technique is not only applicable to grey-scale images, but also to colour images, which improves the security and confidentiality of images by causing double disruption in the spatial and colour domains.
As can be seen from Figure 9, where the red arrow indicates the direction of movement, the enhanced Zigzag algorithm firstly adopts this way of exchanging the top corner positions with each other, which overcomes the problem of the first and the last data positions remaining unchanged in the Zigzag scrambling algorithm due to easy cracking; and secondly, it adopts the order of the size of the mean value of the original image to disrupt the pixel values of the R, G, and B channels, respectively, which enhances the complexity of the image disarrangement. The mean value of the image is sent to the receiver as the initial key to be used in image decryption. Finally, the scrambled data stream is generated after scrambling by the enhanced Zigzag algorithm.

4.3. Image Diffusion Program

The diffusion algorithm involves the process of dispersing an input message into multiple parts that can ultimately reduce the risk of the plaintext message being deciphered. In cryptography, diffusion algorithms usually refer to the dispersal of a plaintext message into multiple ciphertext messages, thereby reducing the likelihood of an attacker gaining access to the complete message.
The encryption process is as follows: take sequences Y m , Y s and Y m , which were generated by the chaotic synchronisation system in Section 3.1, and use them as the sequences of the diffusion algorithm part of the encryption system, which in turn performs a heterodyne operation with the disrupted data stream P m to form the encrypted data stream E m ( E m = P m Y m ). The specific encryption formula is as follows:
Y m = m o d ( Y m × 10 6 , 256 ) E m = P m Y m
The decryption process is as follows: the encrypted data stream E m is received by the receiver through the channel, and the receiver uses the synchronisation sequences Y s and E m , which are generated by the chaotic system, and performs the heterodyne operation with the data streams Y s and E m to obtain the disrupted data stream D s ( D s = E m Y s ). The Zigzag inverse scanning operation is then implemented to recover the original image. The specific decryption formula is as follows:
Y s = m o d ( Y s × 10 6 , 256 ) D s = E m Y s

4.4. Simulation Results of the Encryption System

4.4.1. Analysis of Encryption and Decryption Results

Adopting the enhanced Zigzag image disambiguation method introduced in this paper, the chaotic sequence generated by the master system of Sprott B is used to operate the diffusion algorithm on the disambiguated image during the encryption process, and then the received encrypted image is decrypted by the chaotic sequences generated by the synchronised Sprott B slave system; the results are shown in Figure 10.

4.4.2. Histogram Analysis

In order to analyse this more intuitively, this study carried out a histogram analysis of the original image, the encrypted image, and the decrypted image, and it can be seen that the encryption and decryption have better results. In this paper, the histogram method is used to evaluate the uniformity of the pixels of the encrypted image and the statistical value χ 2 is defined as follows:
χ 2 = i = 0 255 ( E i Y ) 2 Y
where E i is the current pixel value and Y is the frequency of occurrence expected for each pixel. When the χ 2 value of the cipher image is calculated to be not more than 293.2478, the encrypted image can be used according to the method of chi-square evaluation [34] (Table 3).
The chi-square value of each type of encrypted image is shown in Figure 11, and it can be seen that the chi-square value of each encrypted image is not more than 293.2478; therefore, the distribution of the pixel values of the encrypted image is uniform.

4.4.3. Shannon Entropy of Encrypted Images

In this paper, Shannon entropy is used to evaluate the random distribution of pixels in an encrypted image, and Shannon entropy is defined as follows:
H ( R ) = i = 0 N 1 P ( R i ) log 2 P ( R i )
where N and R are the maximum and individual pixel values of the image, respectively. P ( ) is the discrete probability density function. Table 4 lists the Shannon entropy of some of the test images, and it can be seen that the average value of the Shannon entropy of the encrypted image is 7.9937, which is closer to 8, indicating that the encrypted image is uniformly distributed.

4.4.4. Correlation Analysis

The pixel correlation of an image covers three directions: horizontal, vertical, and diagonal. Thus, for a good encryption algorithm, the goal should be to reduce the correlation between adjacent pixels. This can be defined as the correlation between two pixel sequences, which is given as follows:
r u v = cov ( u , v ) D ( u ) D ( v )
cov ( u , v ) = 1 N i = 1 N ( u i E ( u ) ) ( v i E ( v ) )
E ( u ) = 1 N i = 1 N u i
where u and v are adjacent pixels values, and r u v is the correlation coefficient of the adjacent pixels. The 4500 pairs of adjacent pixels—from the plaintext and encrypted images in the horizontal, vertical, and diagonal directions—are randomly selected. The distribution of the 4500 pairs is shown in Figure 11. The plaintext image has pixels close to the diagonal, while the ciphertext image has a random distribution of pixels, which can be seen in Figure 11. The comparative results of the correlation obtained by using different encryption schemes are presented in Table 5.

4.4.5. Differential Attack

When little modifications to the source picture cause substantial changes to the encrypted image, differential attacks are largely ineffective. Number of pixels change rate (NPCR) and unitary averaged changed intensity (UACI) tests are used to assess the capacity of the proposed picture encryption methods to withstand differential assaults. The NPCR and UACI can be expressed as follows:
N P C R = m = 1 M n = 1 N D ( m , n ) M N × 100 %
D ( m , n ) = 1 , f o r   C 1 ( m , n ) C 2 ( m , n ) ; 0 , o t h e r w i s e .
U A C I ( C 1 , C 2 ) = m = 1 M n = 1 M C 1 ( m , n ) C 2 ( m , n ) 256 × M × N × 100 % .
where C 1 and C 2 denote the two encrypted pictures, which are identical to the original images except for a single additional pixel, and D ( m , n ) is the total number of pixels in the encrypted images C 1 and C 2 . The ideal expected NPCR and UACI values are 99.61% and 33.46%, respectively. The suggested encryption scheme’s mean NPCR and UACI values are shown in Table 6. These findings show that the suggested method performs better in terms of defending against differential assaults.

5. Conclusions

In this paper, to address design inflexibility problems such as the chaotic system synchronisation design relying on specialised controllers and the lack of chaotic systems with uncertain parameters and external noise, the RBFNN-PSO chaotic system design methodology is proposed, and the RBF neural network controller is designed, with the PSO training scheme given to achieve the synchronisation of two chaotic systems. The subsequent simulation results show that the designed controller has better robustness to noise. In addition, the designed chaotic synchronisation system is applied to the image encryption system with the enhanced Zigzag disruption method, and the final simulation results show that the chaotic system encryption has better confidentiality and attack resistance.

Author Contributions

Methodology, Y.Z.; Software, W.Y.; Formal analysis, J.Z.; Investigation, Q.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors of the manuscript declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

  1. Wang, X.; Chen, X. An image encryption algorithm based on dynamic row scrambling and Zigzag transformation. Chaos Solitons Fractals 2021, 147, 110962. [Google Scholar] [CrossRef]
  2. Zhang, Y.; Yan, W.; Dong, W.; Ding, Q. Linear Feedback Synchronization of High-Dimensional Discrete Chaotic Systems and Their Application to Image Encryption Systems. In Proceedings of the 2nd International Joint Conference on Information and Communication Engineering (JCICE), Chengdu, China, 12–14 May 2023; pp. 100–104. [Google Scholar]
  3. Luo, L.; Wang, Y.; Deng, S. Adaptive synchronization on uncertain dynamics of high-order nonlinear multi-agent systems with partition of unity approach. Int. J. Control. Autom. Syst. 2014, 12, 259–264. [Google Scholar] [CrossRef]
  4. Li, D.; Li, J.; Di, X. A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform. J. Inf. Secur. Appl. 2022, 69, 103304. [Google Scholar] [CrossRef]
  5. Deng, Q.; Wang, C.; Sun, Y.; Deng, Z.; Yang, G. Memristive Tabu Learning Neuron Generated Multi-Wing Attractor with FPGA Implementation and Application in Encryption. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 1–12. [Google Scholar] [CrossRef]
  6. Wang, C.; Luo, D.; Deng, Q.; Yang, G. Dynamics analysis and FPGA implementation of discrete memristive cellular neural network with heterogeneous activation functions. Chaos Solitons Fractals 2024, 187, 115471. [Google Scholar] [CrossRef]
  7. Li, J.; Wang, C.; Deng, Q. Symmetric multi-double-scroll attractors in Hopfield neural network under pulse controlled memristor. Nonlinear Dyn. 2024, 112, 14463–14477. [Google Scholar] [CrossRef]
  8. Wang, C.; Liang, J.; Deng, Q. Dynamics of heterogeneous Hopfield neural network with adaptive activation function based on memristor. Neural Netw. 2024, 178, 106408. [Google Scholar] [CrossRef]
  9. Pecora, L.M.; Carroll, T.L. Synchronization in chaotic systems. Phys. Rev. Lett. 1990, 64, 821–824. [Google Scholar] [CrossRef]
  10. Pecora, L.M.; Carroll, T.L. Driving systems with chaotic signals. Phys. Rev. A 1991, 44, 2374–2383. [Google Scholar] [CrossRef]
  11. Guo, P.; Shi, Q.; Jian, Z.; Zhang, J.; Ding, Q.; Yan, W. An intelligent controller of homo-structured chaotic systems under noisy conditions and applications in image encryption. Chaos Solitons Fractals 2024, 180, 114524. [Google Scholar] [CrossRef]
  12. Cheng, C.-J. Robust synchronization of uncertain unified chaotic systems subject to noise and its application to secure communication. Appl. Math. Comput. 2012, 219, 2698–2712. [Google Scholar] [CrossRef]
  13. Yang, J.; Chen, Y.; Zhu, F. Associated observer-based synchronization for uncertain chaotic systems subject to channel noise and chaos-based secure communication. Neurocomputing 2015, 167, 587–595. [Google Scholar] [CrossRef]
  14. Xu, G.; Zhao, S.; Cheng, Y. Chaotic synchronization based on improved global nonlinear integral sliding mode control. Comput. Electr. Eng. 2021, 96, 107497. [Google Scholar] [CrossRef]
  15. Sprott, J.C. Some simple chaotic flows. Phys. Rev. E 1994, 50, R647–R650. [Google Scholar] [CrossRef] [PubMed]
  16. Carroll, T.; Pecora, L. Using Multiple Attractor Chaotic Systems for Communication. In Proceedings of the 1998 IEEE International Conference on Electronics, Circuits and Systems: Surfing the Waves of Science and Technology, Lisbon, Portugal, 7–10 September 1998. [Google Scholar]
  17. Qiang, L.; Chen, S. Generating Multiple Chaotic Attractors from Sprott B System. Int. J. Bifurc. Chaos 2016, 26, 1650177. [Google Scholar] [CrossRef]
  18. Ramamoorthy, R.; Rajagopal, K.; Leutcho, G.D.; Krejcar, O.; Namazi, H.; Hussain, I. Multistable dynamics and control of a new 4D memristive chaotic Sprott B system. Chaos Solitons Fractals 2022, 156, 111834. [Google Scholar] [CrossRef]
  19. Li, C.; Duan, H. Information granulation-based fuzzy RBFNN for image fusion based on chaotic brain storm optimization. Optik 2015, 126, 1400–1406. [Google Scholar] [CrossRef]
  20. Ding, R.; Yan, P.; Cheng, M.; Xu, B. A flow inferential measurement of the independent metering multi-way valve based on an improved RBF neural network. Measurement 2023, 223, 113750. [Google Scholar] [CrossRef]
  21. Zheng, S.; Feng, R. A variable projection method for the general radial basis function neural network. Appl. Math. Comput. 2023, 451, 128009. [Google Scholar] [CrossRef]
  22. Dehdarinejad, E.; Bayareh, M. Performance analysis of a novel cyclone separator using RBFNN and MOPSO algorithms. Powder Technol. 2023, 426, 118663. [Google Scholar] [CrossRef]
  23. Darani, A.Y.; Yengejeh, Y.K.; Navarro, G.; Pakmanesh, H.; Sharafi, J. Optimal location using genetic algorithms for chaotic image steganography technique based on discrete framelet transform. Digit. Signal Process. 2024, 144, 104228. [Google Scholar] [CrossRef]
  24. Yanzhuang, X.; Shibin, X. Grey Wolf Optimization algorithm with random local optimal regulation and first-element dominance. Egypt. Inform. J. 2024, 27, 100486. [Google Scholar] [CrossRef]
  25. Zhang, J.; Dai, Y.; Shi, Q. An improved grey wolf optimization algorithm based on scale-free network topology. Heliyon 2024, 10, e35958. [Google Scholar] [CrossRef] [PubMed]
  26. Chen, K.; Zhou, F.; Liu, A. Chaotic dynamic weight particle swarm optimization for numerical function optimization. Knowl. Based Syst. 2018, 139, 23–40. [Google Scholar] [CrossRef]
  27. Luo, T.; Xie, J.; Zhang, B.; Zhang, Y.; Li, C.; Zhou, J. An improved levy chaotic particle swarm optimization algorithm for energy-efficient cluster routing scheme in industrial wireless sensor networks. Expert Syst. Appl. 2024, 241, 122780. [Google Scholar] [CrossRef]
  28. Akbilgic, O.; Bozdogan, H.; Balaban, M.E. A novel Hybrid RBF Neural Networks model as a forecaster. Stat. Comput. 2013, 24, 365–375. [Google Scholar] [CrossRef]
  29. Seshagiri, S.; Khalil, H. Output feedback control of nonlinear systems using RBF neural networks. IEEE Trans. Neural Netw. 2000, 11, 69–79. [Google Scholar] [CrossRef]
  30. Wang, B.; Jahanshahi, H.; Volos, C.; Bekiros, S.; Khan, M.A.; Agarwal, P.; Aly, A.A. A New RBF Neural Network-Based Fault-Tolerant Active Control for Fractional Time-Delayed Systems. Electronics 2021, 10, 1501. [Google Scholar] [CrossRef]
  31. Kennedy, J.; Eberhart, R. Particle Swarm Optimization. In Proceedings of the ICNN’95—International Conference on Neural Networks, Perth, Australia, 27 November–1 December 1995; Volume 4, pp. 1942–1948. [Google Scholar] [CrossRef]
  32. Sheikhan, M.; Shahnazi, R.; Garoucy, S. Synchronization of general chaotic systems using neural controllers with application to secure communication. Neural Comput. Appl. 2011, 22, 361–373. [Google Scholar] [CrossRef]
  33. Zhang, X.; Hu, Y. Multiple-image encryption algorithm based on the 3D scrambling model and dynamic DNA coding. Opt. Laser Technol. 2021, 141, 107073. [Google Scholar] [CrossRef]
  34. Zhang, Y.; Dong, W.; Zhang, J.; Ding, Q. An Image Encryption Transmission Scheme Based on a Polynomial Chaotic Map. Entropy 2023, 25, 1005. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Block diagram of the structure of the radial basis function neural network.
Figure 1. Block diagram of the structure of the radial basis function neural network.
Entropy 26 00855 g001
Figure 2. Attractor trajectory diagrams of the Sprott B system corresponding to different initial conditions, with initial condition x 0 = [ 0.1 , 0.1 , 1 ] and x 1 = [ 0.1 , 0.1 , 1 ] .
Figure 2. Attractor trajectory diagrams of the Sprott B system corresponding to different initial conditions, with initial condition x 0 = [ 0.1 , 0.1 , 1 ] and x 1 = [ 0.1 , 0.1 , 1 ] .
Entropy 26 00855 g002
Figure 3. Block diagram of master–slave Sprott B hybrid system synchronisation scheme.
Figure 3. Block diagram of master–slave Sprott B hybrid system synchronisation scheme.
Entropy 26 00855 g003
Figure 4. Comparison of simulation results: (a) phase diagram of a state variable under a linear feedback synchronization scheme; (c) state error of a state variable under a linear feedback synchronization scheme; (e) attractor phase diagram of a state variable under a linear feedback synchronization scheme; (b) phase diagram of state variables under the RBFNN-PSO synchronization scheme; (d) state errors under the RBFNN-PSO synchronization scheme; (f) attractor phase diagram under the RBFNN-PSO synchronization scheme.
Figure 4. Comparison of simulation results: (a) phase diagram of a state variable under a linear feedback synchronization scheme; (c) state error of a state variable under a linear feedback synchronization scheme; (e) attractor phase diagram of a state variable under a linear feedback synchronization scheme; (b) phase diagram of state variables under the RBFNN-PSO synchronization scheme; (d) state errors under the RBFNN-PSO synchronization scheme; (f) attractor phase diagram under the RBFNN-PSO synchronization scheme.
Entropy 26 00855 g004aEntropy 26 00855 g004b
Figure 5. Block diagram of the training scheme for the overall RBFNN-PSO algorithm.
Figure 5. Block diagram of the training scheme for the overall RBFNN-PSO algorithm.
Entropy 26 00855 g005
Figure 6. Trajectory diagram of the Sprott B master–slave chaotic system trained by PSO.
Figure 6. Trajectory diagram of the Sprott B master–slave chaotic system trained by PSO.
Entropy 26 00855 g006
Figure 7. State trajectory of the Sprott B master–slave system after being trained by the PSO algorithm.
Figure 7. State trajectory of the Sprott B master–slave system after being trained by the PSO algorithm.
Entropy 26 00855 g007
Figure 8. Block diagram of image encryption scheme.
Figure 8. Block diagram of image encryption scheme.
Entropy 26 00855 g008
Figure 9. Schematic diagram of enhanced Zigzag disambiguation algorithm (4 × 4 RGB image).
Figure 9. Schematic diagram of enhanced Zigzag disambiguation algorithm (4 × 4 RGB image).
Entropy 26 00855 g009
Figure 10. Encryption and decryption performance based on Sprott B master–slave chaotic system: (a) plaintext image; (b) histogram of the R, G, and B channels of the plaintext data; (c) ciphertext image; (d) histogram of the R, G, and B channels of the ciphertext data; (e) decrypted image; (f) histogram of the R, G, and B channels of the decrypted image data.
Figure 10. Encryption and decryption performance based on Sprott B master–slave chaotic system: (a) plaintext image; (b) histogram of the R, G, and B channels of the plaintext data; (c) ciphertext image; (d) histogram of the R, G, and B channels of the ciphertext data; (e) decrypted image; (f) histogram of the R, G, and B channels of the decrypted image data.
Entropy 26 00855 g010aEntropy 26 00855 g010b
Figure 11. The correlation distributions: (a) the plaintext image and correlation distributions of three directions; (b) the ciphertext image and correlation distributions of three directions.
Figure 11. The correlation distributions: (a) the plaintext image and correlation distributions of three directions; (b) the ciphertext image and correlation distributions of three directions.
Entropy 26 00855 g011aEntropy 26 00855 g011b
Table 1. The pseudo-code for the calculation of the fitness function.
Table 1. The pseudo-code for the calculation of the fitness function.
Input:  w , c , δ , t s p a n , y0;
Output: IMSE;
initialize w = w 0 , c = c 0 , δ = δ 0 , a , b , d = [ 5 , 2 , 1 ] ;
[t, ym] = ODE45 (Sprott B ( a , b , d ), tpan, y0);
[t, ys] = ODE45 (Sprott B ( w , c , δ , a , b , d ), tpan, y0);
L = length(t);
initialize IMSE = 0;
for k: 1 to L
I M S E = I M S E + i = 1 n ( y i m ( k ) y i s ( k ) ) 2
end for
IMSE = IMSE/(n*L);
Table 2. The pseudo-code for the training process of the parameters of the PSO algorithm.
Table 2. The pseudo-code for the training process of the parameters of the PSO algorithm.
Input: FP;
Output: p*;
intonation: N = 5, Np = 5*N, num_particles = 1000, num_iteration = 50, rp = rq = 2, wl = 0.3, wu = 0.95, y0 = [y01,y02], xpan,
lb = −125, ub = 125, p_position,g_positionϵR5*N, cost, vp, vg = inf;
generate randomly: p = p_position = g_position = p0;
for i = 1 to num_particles;
cost(i) = FP(p(i), y0, xpan);
update vp and vg according to comparative result with cost;
end for
for ite = 1 to num_iterationt;
w1 = wb(2) − (wb(2) − wb(1)) * ite/num_iteration;
for i = 1 to num_particles;
q(i) = w1 * q(i − 1) + cp * rp * (ppp(i − 1)) + cq * rq * (pqp(i − 1));
restric the scope of q;
p(i) = q(i); restic the scope of p;
cost(i) = FP(p(i), y0, xpan);
update vp and vg according to comparative result with cost or the cost small enough;
end for
end for
Table 3. The χ 2 value of the encrypted image.
Table 3. The χ 2 value of the encrypted image.
ImagesLenaRulerGrayPepperBoat
χ 2 247.985242.063237.382217.067245.313
Table 4. Shannon entropy values of some original and encrypted images.
Table 4. Shannon entropy values of some original and encrypted images.
File NameOriginal ImageEncrypted Image
Lena7.73197.9920
Ruler0.50007.9956
Gray4.39237.9970
Pepper7.66987.9920
Boat7.19417.9833
Mean value5.49737.9920
Table 5. Adjacent pixel correlations of the plaintext image “Pepper” and the proposed method for the ciphertext image.
Table 5. Adjacent pixel correlations of the plaintext image “Pepper” and the proposed method for the ciphertext image.
SchemesHorizontalVerticalDiagonal
“Pepper” image0.98310.98350.9723
Proposed method−0.00100−0.000930.00100
Table 6. The NPCR and UACI values of the ciphered images.
Table 6. The NPCR and UACI values of the ciphered images.
ImagesNPCR (%)UACI (%)
RGBRGB
Pepper99.3799.6299.5833.4233.3733.41
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, Y.; Zeng, J.; Yan, W.; Ding, Q. RBFNN-PSO Intelligent Synchronisation Method for Sprott B Chaotic Systems with External Noise and Its Application in an Image Encryption System. Entropy 2024, 26, 855. https://doi.org/10.3390/e26100855

AMA Style

Zhang Y, Zeng J, Yan W, Ding Q. RBFNN-PSO Intelligent Synchronisation Method for Sprott B Chaotic Systems with External Noise and Its Application in an Image Encryption System. Entropy. 2024; 26(10):855. https://doi.org/10.3390/e26100855

Chicago/Turabian Style

Zhang, Yanpeng, Jian Zeng, Wenhao Yan, and Qun Ding. 2024. "RBFNN-PSO Intelligent Synchronisation Method for Sprott B Chaotic Systems with External Noise and Its Application in an Image Encryption System" Entropy 26, no. 10: 855. https://doi.org/10.3390/e26100855

APA Style

Zhang, Y., Zeng, J., Yan, W., & Ding, Q. (2024). RBFNN-PSO Intelligent Synchronisation Method for Sprott B Chaotic Systems with External Noise and Its Application in an Image Encryption System. Entropy, 26(10), 855. https://doi.org/10.3390/e26100855

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop