Next Article in Journal
Does a Fractional-Order Recurrent Neural Network Improve the Identification of Chaotic Dynamics?
Previous Article in Journal
An Error Analysis Study for the Distributed-Order Time-Fraction Model Using an Efficient Numerical Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Finite-Time Projective Synchronization in Fractional-Order Inertial Memristive Neural Networks: A Novel Approach to Image Encryption

by
Huixian Weng
1,
Yongqing Yang
1,*,
Rixu Hao
2 and
Fengyi Liu
3
1
School of Science, Jiangnan University, Wuxi 214122, China
2
School of IOT Engineering, Jiangnan University, Wuxi 214122, China
3
School of Science, Wuxi University, Wuxi 214000, China
*
Author to whom correspondence should be addressed.
Fractal Fract. 2024, 8(11), 631; https://doi.org/10.3390/fractalfract8110631
Submission received: 21 August 2024 / Revised: 20 October 2024 / Accepted: 24 October 2024 / Published: 25 October 2024

Abstract

:
This paper presents a novel finite-time projective synchronization (FTPS) control strategy for fractional-order inertial memristive neural networks (FOIMNNs), exploring its application in image encryption. A sufficient condition for ensuring FTPS in FOIMNNs is established and validated through numerical simulations. These simulations indicate that the proposed strategy provides reliable synchronization performance. Furthermore, an efficient method for image encryption was developed, potentially improving data security. Comparative analyses with existing methods suggest that this approach could offer incremental benefits in secure communication and data protection.

1. Introduction

Neural networks (NNs) play a crucial role in various fields, including associative memory [1] and secure communication [2,3,4]. However, traditional NNs may struggle to maintain robust memory and adaptability in tasks that require long-term dependencies and dynamic adaptability, especially in complex computational environments. The integration of memristor elements into NNs has led to the development of memristive neural networks (MNNs) [5], which enhance memory retention and adaptability. Memristors, as nonlinear resistors, imbue NNs with dynamic memory attributes, making them ideal for tasks requiring high adaptability and efficient memory storage.
In recent years, there has been growing interest in incorporating inertia into neural network models to better replicate the dynamics of biological systems. Inertia introduces a form of resistance to sudden changes in neuron states, which allows the network to exhibit more stable and realistic temporal behaviors. This characteristic is especially valuable in tasks that involve dynamic processing or require robustness against rapid fluctuations. Building on this idea, inertial memristive neural networks (IMNNs) represent a major advancement integrating both memristive and inertial properties into the architecture [6,7]. IMNNs not only benefit from the enhanced memory retention and adaptability provided by memristors but also leverage the inertia mechanism to simulate more realistic neural dynamics.
Fractional-order calculus generalizes traditional calculus by allowing non-integer-order differentiation and integration, making it an ideal tool for describing systems with memory effects and long-term dependencies, especially in neural networks. Unlike classical integer-order models, fractional-order systems provide a more accurate representation of neural processes, where the current state depends not only on the immediate past but also on the historical states. This characteristic is particularly valuable in modeling complex neural dynamics, such as those found in inertial memristive neural networks (IMNNs), where the ability to capture both current and historical neuron states is critical. In the context of neural networks, fractional-order calculus has proven to be instrumental in describing chaotic behaviors and enhancing synchronization strategies. For instance, previous studies have demonstrated the chaotic behaviors in systems like the fractional-order Chua circuit [8], the Chen system [9], and the Lü system [10]. These foundational works laid the groundwork for recent advancements in fractional-order modeling in neural networks, particularly in the synchronization of complex, dynamic systems such as FOIMNNs.
The academic literature has conducted extensive research on the diverse types of synchronization within neural networks, including complete synchronization [11], anti-synchronization [12], and lag synchronization [13]. However, most of the existing research on FOIMNNs has focused on asymptotic synchronization, where synchronization is achieved as time approaches infinity [14]. This approach may not be suitable for real-time applications that require quicker convergence. To address this limitation, finite-time projective synchronization (FTPS) has emerged as a promising alternative. FTPS ensures synchronization within a finite and predefined timeframe, offering practical benefits for applications that demand rapid response times, such as encryption and communication systems. While FTPS has seen limited exploration in FOIMNNs, it holds significant potential for real-world applications. Zheng et al. [15] established sufficient conditions for synchronization through linear feedback control, further advancing the understanding of FTPS in fractional-order systems.
Moreover, the use of FOIMNNs in image encryption has attracted significant interest due to their inherent randomness and complexity, making them particularly effective for cryptographic purposes where robust security is crucial. Through employing FTPS, a novel image encryption method can be developed, offering enhanced security and efficiency. The synchronous chaotic encryption system ensures that the driving sequence for image encryption is perfectly aligned with the response sequence for decryption, achieving lossless recovery of encrypted images. This newly proposed algorithm demonstrates superior performance in key metrics such as pixel correlation and entropy, where lower pixel correlation reflects reduced pixel dependency, and higher entropy suggests increased randomness, both contributing to enhanced encryption security. Recent studies by Yang et al. [2] and Hui et al. [4] further explored synchronization criteria in neural networks, applying them to secure image encryption systems with promising results.
In synchronization technology, timing uncertainties pose significant challenges, particularly in secure communication systems. Unpredictable timing can undermine encryption and decryption processes, affecting communication reliability. To address these challenges, this paper proposes a control strategy that incorporates fractional-order calculus, inertial effects, and memristive dynamics for FTPS in FOIMNNs. With the use of an appropriately designed controller, this approach ensures synchronization with well-defined timing parameters. This method aims to improve both the synchronization efficiency and security of encrypted communications. It contributes to the advancement of synchronization techniques, with a particular focus on protecting digital images from unauthorized access.
This research provides a perspective on the dynamics of FOIMNNs and their potential applications in secure communication and information processing. By applying fractional-order chaotic systems, our approach seeks to introduce greater complexity and unpredictability into the system, both of which are relevant factors for communication security. The key contributions of this study include the development of a fractional-order FTPS framework and its successful application in image encryption, demonstrating its effectiveness in ensuring the secure transmission and recovery of encrypted images. The main contributions of this study include:
  • Extension of Fractional-Order Inertial Memristive Neural Networks: A new FOIMNN model is introduced. Both the inertial term and the state term are modeled with fractional-order dynamics. This model extends the application of fractional calculus in neural networks. It offers fewer restrictions on the fractional-order inertial term compared to in existing studies, such as [16,17]. The proposed model provides a more flexible framework for studying dynamic behaviors in neural networks.
  • Finite-Time Projective Synchronization Control Strategy: A new FTPS control strategy is proposed for FOIMNNs. Synchronization is achieved within a finite timeframe. Numerical simulations are conducted to validate this approach, demonstrating its performance in a three-dimensional FOIMNN model.
  • Application in Image Encryption: The proposed synchronization control strategy is applied to image encryption as an initial exploration into practical applications. FTPS is used for both encryption and decryptionto ensure synchronization between these processes. Metrics such as pixel correlation and entropy show favorable results, suggesting that FOIMNNs have potential utility in secure communication and data protection.
The structure of this paper is organized as follows: Section 2 introduces the FOIMNN model, outlining pertinent lemmas and assumptions. Section 3 discusses the theoretical derivation of FTPS for FOIMNNs, supplemented by two corollaries. Section 4 presents numerical simulations to substantiate the theorem’s applicability. Section 5 explores the practical application of FOIMNN synchronization in image protection. Finally, Section 6 concludes this paper, summarizing its findings and implications.

2. Preliminaries

This section introduces essential mathematical concepts related to the study. Initially, it defines fractional calculus, and then delves into the theoretical foundations of fractional differential equations. Subsequently, it explores solutions for discontinuous fractional differential equations, following Filippov’s interpretations, and concludes with the model assumptions required for this research.

2.1. Basic Knowledge

In this section, we outline the fundamental concepts relevant to our study. For a detailed explanation of the Riemann–Liouville fractional integral and the Caputo fractional derivative, please refer to Appendix A.
Definition 1
([18]). Let γ be a nonzero constant in  R . Two dynamical systems are considered: the leader system and the follower system, with solutions  x ( t )  and  y ( t ) , respectively, originating from different initial conditions  x 0  and  y 0 . If the distance between these solutions measured using the Euclidean norm satisfies
lim t x ( t ) γ y ( t ) = 0 ,
then there is global asymptotic projective synchronization between the leader and follower systems, where γ is referred to as the projective coefficient.
Lemma 1
([19]). Let  v ( t ) : [ t 0 , + ) R *  be a continuous, positive definite function. For  σ > 0  and  ϕ > 0 , if
D t α 0 C v ( t ) σ v ( t ) ϕ for v ( t ) > 0 ,
with  0 < α < 1 , then the following results are obtained: For  σ > 0 , for all  t t ^ 1 * , the function  v ( t )  approaches 0 in finite time  t ^ 1 * , meaning that there exists a time  t ^ 1 *  such that  v ( t ) = 0  for all  t t ^ 1 * . Here,  t ^ 1 *  can be estimated as follows:
t ^ 1 * t 0 + Γ ( α + 1 ) v ( t 0 ) ϕ 1 α
Lemma 2
([20]). If there exists a positive definite Lyapunov function  V ( x )  such that  D α V ( x ) < 0  for all  t t 0 , then  V ( x )  asymptotically approaches 0 as t approaches infinity.
Lemma 3
([21]). Consider a function  f ( t ) , continuously differentiable over  t [ 0 , ) . For any α such that  0 < α < 1 , the inequality presented below is valid:
D α f ( t ) sign ( f ( t ) ) D α f ( t ) .
Lemma 4
([22]). For functions  h 1 ( t ) , h 2 ( t ) C n ( [ 0 , ) , R n )  with constants  λ 1 , λ 2 R  and α satisfying  n 1 < α < n ,
D t α ( λ 1 h 1 ( t ) + λ 2 h 2 ( t ) ) = λ 1 D t α h 1 ( t ) + λ 2 D t α h 2 ( t ) .
Lemma 5
([23]). Let  h ( x )  be a continuous and differentiable function for  h ( t ) C n ( [ 0 , ) , R n ) , and consider the Caputo fractional derivatives. If  0 < q 1  and  1 < p < 1 + q 2 , the following holds:
d p q d x p q d q d x q h ( x ) = d p d x p h ( x ) .
Assumption 1.
For any  i = 1 , 2 , , n , there exist constants  l i , M i > 0  such that for all  x , w R ,
| f i ( x ) f i ( w ) | l i | x w | and | f i ( · ) | M i .

2.2. System Descriptions

A class of FOIMNNs is defined as follows:
D t α x i ( t ) = a i D t β x i ( t ) b i x i ( t ) + j = 1 n h i j x j ( t ) f j ( x j ( t ) ) + I i
where  0 β < 1 1 α < 2 β a i > b i , and  t > t 0  are established. The state of each neuron i (for  i = 1 , 2 , , n ) at time t is represented by  x i ( t ) . The following initial value complements system (2):  x i ( t 0 ) = x i 0 , x i 0 R , i = 1 , 2 , , n , with  a i  and  b i  as constants.  h i j  denotes the weights assigned to the links in memristive networks and is defined as follows:
h i j ( x i ( t ) ) = h ^ i j , | x i ( t ) | T i h ˇ i j , | x i ( t ) | > T i
and the switching jump time  T i h ^ i j , and  h ˇ i j  denote the known values of memristive resistance, whereas  f j ( · )  is the activation function for neuron j at time t.
Remark 1.
The fractional derivatives  D t α  and  D t β  significantly influence the dynamic behavior of the state variables  x i ( t ) , capturing memory and inertia in FOIMNNs. Introducing α and β allows the model to better handle complex data patterns, especially in tasks like image encryption. Fractional derivatives offer a notable advantage over traditional integer-order models [24,25] in capturing complex dynamics.
Variable substitution is defined as
r i ( t ) = D t β x i ( t ) + x i ( t ) , i = 1 , 2 , , n .
An interpretation of an FOIMNNs is as follows:
D t α β r i ( t ) = a i r i ( b i a i ) x i ( t ) + j = 1 n h i j ( x j ( t ) ) f j ( x j ( t ) ) + D t α β x i ( t ) + I i D t β x i ( t ) = r i ( t ) x i ( t )
where  i = 1 , 2 , , n .
Let us define the set-valued maps
K [ h i j ( x i ( t ) ) ] = h ^ i j , | x i ( t ) | < T i co { h ^ i j , h ˇ i j } , | x i ( t ) | = T i h ˇ i j , | x i ( t ) | > T i
where  co E  is the closure of the convex hull of the set  E R n .
Hereinafter, systems are discussed using the Filippov framework [26], as the presence of memristors introduces discontinuities in the system’s derivatives. To address this, Filippov theory is applied throughout the analysis [6,27,28,29].
Definition 2.
A function  x i ( t ) : [ t 0 , T ) R , where  T > t 0 , qualifies as a solution to system (4), provided that it satisfies the initial condition  x i ( t 0 ) = x i 0  and remains absolutely continuous on each compact subinterval of  [ t 0 , T ) .
D t α β r i ( t ) a i r i ( b i a i ) x i ( t ) + j = 1 n K [ h i j ( x i ( t ) ) ] f j ( x j ( t ) ) + D t α β x i ( t ) + I i D t β x i ( t ) = r i ( t ) x i ( t )
Then, there exist measurable functions  H i j ( t ) K [ h i j ( x i ( t ) ) ]  such that
D t α β r i ( t ) = a i r i ( b i a i ) x i ( t ) + j = 1 n H i j ( x j ( t ) ) f j ( x j ( t ) ) + D t α β x i ( t ) + I i D t β x i ( t ) = r i ( t ) x i ( t )
In this analysis, a response system is developed, associated with the driven system.
D t α y i ( t ) = a i D t β y i ( t ) b i y i ( t ) + j = 1 n h i j y j ( t ) f j ( y j ( t ) ) + I i
It is delineated using a comparable reduced-order transformation, as shown below:
D t α β s i ( t ) = a i s i + ( a i b i ) y i ( t ) + j = 1 n h i j ( y j ( t ) ) f j ( y j ( t ) ) + D t α β y i ( t ) + u i ( t ) + I i D t β y i ( t ) = s i ( t ) y i ( t )
where  i , j = 1 , 2 , , n u i ( t )  are the appropriate controllers.
In a manner similar to (4), system (8) is translatable into the following form:
D t α β s i ( t ) a i s i + ( a i b i ) y i ( t ) + j = 1 n K [ h i j ( y i ( t ) ) ] f j ( y j ( t ) ) + D t α β y i ( t ) + u i ( t ) + I i D t β y i ( t ) = s i ( t ) y i ( t )
where  i , j = 1 , 2 , , n .
In a manner similar to (5), system (9) is translatable into the following form:
D t α β s i ( t ) = a i s i ( b i a i ) y i ( t ) + j = 1 n H ¯ i j ( y j ( t ) ) f j ( y j ( t ) ) + D t α β y i ( t ) + I i D t β y i ( t ) = s i ( t ) y i ( t )
Within this framework, synchronization discrepancies for systems (2) and (7) are represented by  z i ( t ) = r i ( t ) γ s i ( t )  and  e i ( t ) = x i ( t ) γ y i ( t ) , respectively. Then,
D t α β z i ( t ) = a i z i + ( a i b i ) e i ( t ) + j = 1 n H i j ( x j ( t ) ) f j ( x j ( t ) ) γ H ¯ i j ( y j ( t ) ) f j ( y j ( t ) ) + D t α β e i ( t ) + ( 1 γ ) I i + u i D t β e i ( t ) = z i ( t ) e i ( t )

3. Main Results

FTPS of FOIMNNS

This subsection describes the creation of a feedback controller and the definition of algebraic conditions necessary for ensuring the finite-time projective stability of the error system. The initial design of the feedback control scheme is presented below.
u i ( t ) = l i e i ( t ) k i z i ( t ) D t α β e i ( t ) λ i D t α 2 β z i ( t ) sign ( z i ( t ) ) χ i H ¯ i j ( x j ( t ) ) f j ( γ y j ( t ) ) f j ( y j ( t ) ) ( 1 γ ) I i
where  l i > 0 , k i > 0 ,  and  χ i > 0 .
Given that  sign ( z i ( t ) )  exhibits discontinuity at  z i ( t ) = 0 , the error system can be described as follows:
D t α β z i ( t ) = a i z i + ( a i b i ) e i ( t ) + j = 1 n H i j ( x j ( t ) ) f j ( x j ( t ) ) γ H ¯ i j ( y j ( t ) ) f j ( y j ( t ) ) + D t α β e i ( t ) l i e i ( t ) k i z i ( t ) D t α β e i ( t ) λ i D t α 2 β z i ( t ) ρ i χ i H ¯ i j ( x j ( t ) ) f j ( γ y j ( t ) ) f j ( y j ( t ) ) ( 1 γ ) I i D t β e i ( t ) = z i ( t ) e i ( t )
where  ρ i co [ sign ( z i ( t ) ) ]  and
co [ sign ( z i ( t ) ) ] = { 1 } , z i ( t ) 0 [ 1 , 1 ] , z i ( t ) = 0 { 1 } , z i ( t ) 0
Theorem 1.
Consider the FOIMNNs described by Equations (2) and (7) under Assumption 1 and control scheme (12). The system can achieve FTPS if the following conditions are satisfied:
1 a i k i 0 ( a i b i ) 1 + j = 1 n | h i j * | F j + l i λ i j = 1 n ( 1 γ ) | h i j * | M j < χ i
let  λ ¯ = min 1 i n λ i , χ ¯ = min 1 i n χ i , | h i j * | = max { | h ^ i j | , | h ˇ i j | } .
Proof of Theorem 1.
Construct the Lyapunov function as follows:
V = i = 1 n | e i ( t ) | + i = 1 n D t α 2 β | z i ( t ) |
Based on Lemma 3, when  V ( t ) R + , the results indicate that
D t β V D t β i = 1 n | e i ( t ) | + D t α β i = 1 n | z i ( t ) | i = 1 n sign ( e i ( t ) ) D t β e i ( t ) + sign ( z i ( t ) ) D t α β z i ( t ) = i = 1 n { sign ( e i ( t ) ) ( z i ( t ) e i ( t ) ) + sign ( z i ( t ) ) ( a i z i ( t ) + ( a i b i ) e i ( t ) + j = 1 n H i j ( x j ( t ) ) f j ( x j ( t ) ) γ H ¯ i j ( y j ( t ) ) f j ( y j ( t ) ) + D t α β e i ( t ) + ( 1 γ ) I i l i e i ( t ) k i z i ( t ) D t α β e i ( t ) λ i D t α 2 β z i ( t ) ρ i χ i j = 1 n H ¯ i j ( x j ( t ) ) f j ( γ y j ( t ) ) f j ( y j ( t ) ) ( 1 γ ) I i ) }
Given that Assumption 1 is satisfied, the equation can be expressed as
H i j ( x j ( t ) ) f j ( x j ( t ) ) γ H ¯ i j ( y j ( t ) ) f j ( y j ( t ) ) = H ¯ i j ( x j ( t ) ) f j ( e j ( t ) ) + H ¯ i j ( x j ( t ) ) γ H i j ( y j ( t ) ) f j ( y j ( t ) ) + H ¯ i j ( x j ( t ) ) f j ( γ y j ( t ) ) f j ( y j ( t ) )
where  f j ( e j ( t ) ) = f j ( x j ( t ) ) f j ( γ y j ( t ) ) , in which the following is the case:
H ¯ i j ( x j ( t ) ) f j ( e j ( t ) ) | h i j * | F j | ( e i ( t ) ) |
H ¯ i j ( x j ( t ) ) γ H i j ( y j ( t ) ) f j ( y j ( t ) ) ( 1 γ ) | h i j * | M j
Based on the above assumptions, it follows that
D t β V i = 1 n { z i ( t ) e i ( t ) a i z i ( t ) + ( a i b i ) e i ( t ) + j = 1 n | h i j * | F j e i ( t ) + ( 1 γ ) | h i j * | M j + l i e i ( t ) k i z i ( t ) λ i D t α 2 β z i ( t ) χ i } i = 1 n { ( 1 a i k i ) z i ( t ) + ( a i b i ) 1 + j = 1 n | h i j * | F j + l i e i ( t ) + j = 1 n ( 1 γ ) | h i j * | M j χ i λ i D t α 2 β z i ( t ) }
Given the specified conditions, it follows that
D t β V = D t β i = 1 n V i ( t ) i = 1 n λ i i = 1 n | e i ( t ) | + i = 1 n D t α 2 β | z i ( t ) | + j = 1 n ( 1 γ ) | h i j * | M j χ i
The variable  η i  is defined as  χ i j = 1 n ( 1 γ ) | h i j * | M j . Let  η ¯ = min 1 i n η i . Consequently, the fractional derivative of V can be expressed as follows:
D t β V i = 1 n λ i V i ( t ) η i λ ¯ V ( t ) η ¯
Projective finite-time synchronization between FOIMNNs (2) and (7) can be achieved, as concluded from Lemma 1. The specific finite time is estimated by  t * t ^ * , and  t ^ *  can be estimated as follows:
t ^ 1 * t 0 + Γ ( α + 1 ) v ( t 0 ) η ¯ 1 α
   □
Remark 2.
The connection weights of FOMINNs (2) and (7) are state-dependent, categorizing these systems as state-dependent switching systems. When these weights are equal, the systems reduce to fractional-order inertial neural networks [30], making the findings of this paper relevant to their FTPS. Consequently, this study complements existing research on fractional-order inertial neural networks.
Remark 3.
The wide acknowledgment of finite-time synchronization necessity in practical applications is evident. Therefore, the finite-time synchronization results presented in this study, which are more general than those of exponential and asymptotic synchronization, are distinct from the results found in complex dynamical networks [31] and memristive neural networks [32].
Remark 4.
Projective synchronization allows for the flexible adjustment of the synchronization scale, enabling synchronization at different proportions as needed. This method enhances flexibility in managing complex systems. Unlike traditional synchronization [24,25], which demands full coherence between systems, projective synchronization allows for synchronization at predetermined ratios, thereby broadening its applicability in practical scenarios.
Theorem 2.
Consider drive-response FOIMNNs under Assumption 1. The system can achieve asymptotic projective synchronization if the following control strategy is applied:
u i ( t ) = l i e i ( t ) k i z i ( t ) D t α β e i ( t ) sign ( z i ( t ) ) χ i H ¯ i j ( x j ( t ) ) f j ( γ y j ( t ) f j ( y j ( t ) ) ( 1 γ ) I i
For the control strategy to be effective, the following conditions must be satisfied for each i:
1 a i k i 0 ( a i b i ) 1 + j = 1 n | h i j * | F j + l i 0 j = 1 n ( 1 γ ) | h i j * | M j = χ i
Under these conditions, the control strategy guarantees that the drive-response FOIMNNs achieve asymptotic projective synchronization.
Proof of Theorem 2.
Combining Equation (18) with the conditions provided in Theorem 1, we can conclude that  D t β V < 0 .
Based on Lemma 2, we can conclude that, under control scheme (20), leader system (2) and follower system (7) achieve global asymptotic projective synchronization.    □
Remark 5.
The projective synchronization’s application is broadened to include complete synchronization  ( γ = 1 )  and anti-synchronization  ( γ = 1 )  in driver-response systems, depending on the γ values. Consequently, this analysis results in two corollaries.
Corollary 1.
The finite-time complete synchronization of the FOIMNNs, described by Equations (2) and (7), is guaranteed when the scaling factor γ is set to 1 in error system (11) and controller (12), under Assumption 1, and the sufficient condition (14) is satisfied.
Corollary 2.
The finite-time anti-synchronization of the FOIMNNs, described by Equations (2) and (7), is guaranteed when the scaling factor γ is set to  1  in error system (11) and controller (12), under Assumption 1, and the sufficient condition (14) is satisfied.
Remark 6.
This study discusses networks with fractional-order inertia characterized by fractional derivatives of orders α and β. This differs from the commonly seen models in the existing literature, which typically involve derivatives of orders α and  2 α  [16,17]. Through employing this unique approach, this paper extends the depth and breadth of our understanding of fractional-order network systems, providing a new perspective and methodological foundation for future research.
Table 1 provides comparisons between the proposed method and recent related works for enhanced understanding.

4. Numerical Examples for FTPS of FOIMNNs

To demonstrate the efficacy of Theorem 1, a simulation involving a three-dimensional fractional-order inertial memristive neural network (FOIMNN) model is presented:
D t α β r i ( t ) = a i r i ( b i a i ) x i ( t ) + j = 1 n h i j ( x j ( t ) ) f j ( x j ( t ) ) + D t α β x i ( t ) + I i D t β x i ( t ) = r i ( t ) x i ( t )
where  i = 1 , 2 , 3 , a 1 = 2 ,   a 2 = 4.0 ,   a 3 = 2.8 ;   b 1 = 2 ,   b 2 = 3.9 ,   b 3 = 2.7 ;   I 1 = 0 ,   I 2 = 0 ,   I 3 = 0 ;    and activation functions  f 1 ( x ) = f 2 ( x ) = f 3 ( x ) = t a n h ( x )  and  x 1 ( 0 ) = 1.1 ,   x 2 ( 0 ) = 1.3 , x 3 ( 0 ) = 1 .  It is evident that the activation function meets the conditions of Assumption 1. Details of the system’s memristive connection weights are provided below:
h 11 ( x 1 ( t ) ) = 0.55 | x 1 ( t ) | 1 0.54 | x 1 ( t ) | > 1 h 12 ( x 2 ( t ) ) = 0.5 | x 2 ( t ) | 1 0.56 | x 2 ( t ) | > 1 h 13 ( x 3 ( t ) ) = 0.42 | x 3 ( t ) | 1 0.4 | x 3 ( t ) | > 1 h 21 ( x 1 ( t ) ) = 0.29 | x 1 ( t ) | 1 0.4 | x 1 ( t ) | > 1 h 22 ( x 2 ( t ) ) = 0.23 | x 2 ( t ) | 1 0.28 | x 2 ( t ) | > 1 h 23 ( x 3 ( t ) ) = 0.32 | x 3 ( t ) | 1 0.3 | x 3 ( t ) | > 1 h 31 ( x 1 ( t ) ) = 0.61 | x 1 ( t ) | 1 0.76 | x 1 ( t ) | > 1 h 32 ( x 2 ( t ) ) = 0.8 | x 2 ( t ) | 1 0.78 | x 2 ( t ) | > 1 h 33 ( x 3 ( t ) ) = 0.25 | x 3 ( t ) | 1 0.3 | x 3 ( t ) | > 1
The response system is
D t α β s i ( t ) = a i s i + ( a i b i ) y i ( t ) + j = 1 n h i j ( y j ( t ) ) f j ( y j ( t ) ) + D t α β y i ( t ) + u i ( t ) + I i D t β y i ( t ) = s i ( t ) y i ( t )
Define  z i ( t ) = r i ( t ) γ s i ( t )  and  e i ( t ) = x i ( t ) γ y i ( t ) i = 1 , 2 , 3 , as the synchronization error system, where  0 β < 1 1 α < 2 β . Set the parameters as follows:  α = 1.9 β = 0.97 . And the initial conditions are  y 1 ( 0 ) = 2.1 , y 2 ( 0 ) = 2.3 ,  and  y 3 ( 0 ) = 2 .  From inequalities (14), set the parameters as follows:  l 1 = 0.36 l 2 = 0.238 l 3 = 0.308 k 1 = 12 k 2 = 7 k 3 = 20 λ 1 = 0.2 λ 2 = 0.3 λ 3 = 0.1 χ 1 = 3 χ 2 = 2 , and  χ 3 = 3 . Figure 1, Figure 2, Figure 3, Figure 4, Figure 5 and Figure 6 illustrate the state trajectories for  γ  values of -1, -3, and 1, respectively. The synchronization error curves for drive system (2) and response system (7) at  γ = 1  are depicted in Figure 7 and Figure 8. Thus, the validation of the synchronization criterion and the correctness of Theorem 1 are confirmed.

5. Application of FTPS to Image Protection

This section applies Corollary 2 to image protection by establishing a synchronization mechanism between the drive and response systems. The drive system sequences the encryption by generating key synchronization signals based on Corollary 2, ensuring secure data transformation. The response system, using the same synchronization principle, manages the decryption by reconstructing the original image from the encrypted data.

5.1. Detailed Steps for Image Encryption

The implementation of image encryption involves four specific steps:
  • Pixel-Value Extraction: Initially, each pixel of the image is extracted in terms of its RGB color space representation, i.e., the pixel values for the R, G, and B channels. Let the image be denoted as I; then,  I = { I R , I G , I B } I R , I G ,  and  I B  denote the pixel matrices corresponding to the red, green, and blue channels.
  • Image Disruption Process: In using a pseudo-random sequence  S D  generated by the drive system, the image’s one-dimensional vector form undergoes disruption. In this step, each color channel of the image  I R , I G ,  and  I B  is unrolled into one-dimensional vectors  V R , V G ,  and  V B . These vectors are then permuted by the sequence  S D  to obtain the disrupted vectors  V R , V G ,  and  V B .
  • Encryption Operation: The disrupted vectors  V R , V G ,  and  V B  are encrypted using diffusion sequences  S F  and  S R  also generated by the drive system, applying both forward and reverse diffusions. Specifically, for each disrupted vector  V , the operation  E ( V ) = S F ( V ) S R ( V )  is performed, where ⊕ denotes the bitwise exclusive OR operation, and  S F  and  S R  are the forward and reverse diffusion sequences, respectively.
  • Reassembly of Encrypted Image: Finally, the encrypted vectors  E ( V R ) , E ( V G ) ,  and  E ( V B )  are rearranged and recombined to restore the two-dimensional format of the image, producing the encrypted image  I e n c . In the decryption process, using sequences from the response system in reverse order for diffusion and the inverse of the disruption operation, the original image can be successfully recovered.
The core of this method lies in the design of the system’s disruption and encryption sequences, enhancing the security of the image data while maintaining the reversibility of decryption, ensuring that the image can be correctly restored under authorized access. The following Algorithm 1 outlines the steps for the image encryption process:
Algorithm 1 Image Encryption
  • Input:  I R , I G , I B , S D , S F , S R , M , N
  • Output:  I e n c
  • // Step 1: Pixel-Value Extraction
  • V R = flatten ( I R )
  • V G = flatten ( I G )
  • V B = flatten ( I B )
  • // Step 2: Image Disruption Process
  • for  i = 1  to  M × N  do
  •     i d x = mod ( S D ( i ) + i , M × N ) + 1
  •     V R ( i ) = V R ( i d x )
  •     V G ( i ) = V G ( i d x )
  •     V B ( i ) = V B ( i d x )
  • end for
  • // Step 3: Encryption Operation
  • for  i = 1  to  M × N  do
  •     E ( V R ( i ) ) = V R ( i ) S F ( i ) S R ( i )
  •     E ( V G ( i ) ) = V G ( i ) S F ( i ) S R ( i )
  •     E ( V B ( i ) ) = V B ( i ) S F ( i ) S R ( i )
  • end for
  • // Step 4: Reassembly of Encrypted Image
  • I e n c R = reshape ( E ( V R ) , M , N )
  • I e n c G = reshape ( E ( V G ) , M , N )
  • I e n c B = reshape ( E ( V B ) , M , N )
  • I e n c = { I e n c R , I e n c G , I e n c B }
  • return  I e n c

5.2. Example

This section assesses the FTS encryption method’s effectiveness in protecting images by evaluating key metrics including histogram uniformity, correlation coefficients, and information entropy. The analysis of these metrics offers a detailed insight into the method’s robustness and reliability.

5.2.1. Histogram Analysis

This section elaborates on the process of encrypting and subsequently decrypting an image (using ‘Baboon’ as an example) utilizing a specific algorithm. Figure 9a,b show the Baboon image after encryption. The image content is scrambled effectively. The effectiveness of the encryption is demonstrated by analyzing the histograms of the gray value distribution for Figure 9e,f. The histogram  H ( v )  can be expressed as
H ( v ) = i = 1 n δ ( v i v )
where v represents the gray value, n is the total number of pixels, and  v i  is the gray value of pixel i. The Kronecker delta function  δ  counts the occurrences of each gray value v, indicating counting occurrences of each gray value v. The analysis shows consistent gray distributions, indicating that the original image information is uniformly and randomly dispersed.
Further analysis is presented in Figure 9g, which shows the distribution of gray values across each channel post encryption. The histogram shows that the gray value is fully obscured, concealing the image’s original content and protecting the information. Following the decryption, Figure 9d illustrates the complete restoration of the original Baboon image. Figure 9h shows that the gray value distribution of the decrypted image perfectly matches the original, as demonstrated by
H d e c ( v ) = H o r i g ( v )
where  H d e c ( v )  and  H o r i g ( v )  are the histograms of the decrypted and original images, respectively.
This process not only validates the effectiveness of the employed encryption and decryption algorithms but also suggests the possible application of these algorithms in securing image data.

5.2.2. Correlation Coefficients

Correlation coefficients quantify the strength of a linear relationship between two variables. In the context of image encryption, the correlation of adjacent pixel values is investigated in the horizontal, vertical, and diagonal directions before and after encryption. These coefficients are calculated using the following formula:
r x y = i = 1 n ( x i x ¯ ) ( y i y ¯ ) i = 1 n ( x i x ¯ ) 2 i = 1 n ( y i y ¯ ) 2
where  x i  and  y i  represent adjacent pixel values in the specified direction,  x ¯  and  y ¯  are the mean values of these pixel pairs, and n is the total number of pixel pairs.
To visually present these data, scatter plots are employed to depict the relationship between pixel values of images before and after encryption. For unencrypted images, the scatter plot shows a high degree of linear association between adjacent pixels, as shown in Figure 10, whereas the encrypted images display a significantly reduced correlation in their scatter distribution, as shown in Figure 11, indicating a substantial decrease in correlation. The different colors in the scatter plots represent pixel values from the red, green, and blue channels: red dots for the red channel, yellow for green, and blue for blue.
This method allows us to clearly see how the encryption algorithm effectively reduces the pixel correlation, breaking the direct association between adjacent pixels in the image. These results highlight the encryption algorithm’s ability to disrupt the linear relationship between pixels, thereby improving the unpredictability of pixel values after encryption.

5.2.3. Information Entropy

Information entropy, quantifying the randomness or unpredictability in a dataset, serves as a critical metric for assessing the efficiency of encryption algorithms. In the context of image encryption, the entropy for each color channel—red, green, and blue—is computed using the designated formula:
H ( X ) = i = 1 n p ( x i ) log 2 p ( x i )
where  p ( x i )  represents the probability of occurrence of pixel value  x i  in the image, and n is the number of possible pixel values.
The information entropy for the original image, along with its encrypted and decrypted versions, was calculated in this study. Table 2 displays the results. An increase in information entropy across all color channels, as shown by the data, indicates that the encryption algorithm significantly enhanced the image’s randomness and security. After decryption, the information entropy returned to the same level as the original image, validating the reversibility of the encryption algorithm and ensuring that the image can be correctly restored under authorized access. These results not only demonstrate the effectiveness of the encryption algorithm in protecting image content but also suggest its potential contribution to information security and privacy protection.
These metrics affirm that the FTS encryption method provides robust protection for digital images, effectively obscuring original content and making it more challenging for unauthorized access.

5.3. Comparison

The data analyses presented in Table 3 and Table 4 illustrate that the image encryption algorithm proposed in this study significantly outperforms existing methods across several key performance metrics. The pixel correlation indices for encrypted images are particularly notable, indicating modest improvements in reducing pixel interdependencies.
Specifically, the correlation achieved by the algorithm in the horizontal direction for the red channel was −0.0012. compared to −0.0190 and −0.0033 in references [3,34], respectively. This demonstrates a correlation value closer to zero, indicating a substantial reduction in pixel dependency, thereby enhancing the security of the encryption. Additionally, for the green channel in the vertical direction, a correlation of 0.0021 was observed using the algorithm, which is lower than 0.0032 and 0.0113 reported in references [3,34], further demonstrating its improved encryption performance.
In this study, the proposed image encryption algorithm demonstrated superior performance, achieving entropy values of 7.9993, 7.9991, and 7.9993 for the red, green, and blue channels, respectively, nearly reaching the theoretical maximum entropy of 8.0000. These figures exceed the entropy values reported in reference [35], which were 7.9966 for the red channel, 7.9972 for the green channel, and 7.9967 for the blue channel. This indicates that the algorithm effectively increases the randomness of image data across all three channels, thereby enhancing image security.
Particularly in the green channel, the algorithm’s entropy value of 7.9991, which is an increase of 0.0019 over the 7.9972 reported in reference [35], might seem small but it is meaningful in the assessment of encryption security. Even minor increases can substantially raise the difficulty of cracking the encryption. Additionally, in both the red and blue channels, this algorithm’s entropy values match those of the high-performing algorithms noted in reference [3].
The differences observed in the results indicate the potential of this algorithm in reducing the predictability between image pixels, contributing to the protection of image data privacy and enhancing security. By optimizing information entropy values and reducing pixel correlation in encrypted images, the algorithm demonstrates an ability to defend against statistical analysis-based recovery attempts. The comparison of data in this study offers useful technical references and practical insights for further research on image encryption algorithms.
Remark 7.
Chaotic (unpredictable) solutions are necessary for the proposed method to be used in encryption/decryption processes. A set of parameters was chosen, causing the FOIMNNs to exhibit chaos. Without chaotic characteristics based on the chosen parameter setting, the proposed method cannot be used for image encryption/decryption.
Remark 8.
The definition of fractional-order derivatives allows them to be reduced to integer-order derivatives under certain conditions. However, the adoption of fractional orders in this study was driven by clear research needs. Current research on projective synchronization mainly focuses on integer-order systems, which present limitations in security applications. This paper introduces techniques of fractional-order chaotic systems to enhance system complexity and unpredictability, which are crucial for communication security [36]. The increased complexity enhances the system’s defense capabilities against external attacks, thereby securing the transmission of information.

6. Conclusions

In this study, the synchronization issues of FOIMNNs were investigated and their potential application in image encryption. A novel synchronization control strategy was introduced, achieving FTPS. The effectiveness of the proposed method was verified through simulations. In practical applications to image encryption, the proposed designed method showed potential in enhancing the security of image data. The results suggest that the encryption technique has the potential to protect image content and support the recovery of the original image under authorized access. While these results are preliminary, they suggest possible directions for future research in secure communications and data protection. Building on this foundation, they point to future research directions such as refining the synchronization control strategy and improving encryption efficiency.

Author Contributions

Conceptualization was carried out by H.W. and Y.Y.; the methodology was developed by H.W.; software was provided and maintained by R.H.; writing—original draft preparation, H.W., Y.Y., R.H. and F.L.; writing—review and editing, H.W. and F.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data supporting the findings of this study are fully included within the article.

Acknowledgments

The authors would like to express their gratitude to the anonymous referees and reviewers whose insightful comments and suggestions have significantly improved the presentation and quality of this manuscript.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Fractional Calculus Definitions

Definition A1
([37]). The Riemann–Liouville fractional integral of order  0 < β < 1  for an integrable function  f ( t )  is given by
D t β f ( t ) = 1 Γ ( β ) t 0 t ( t s ) β 1 f ( s ) d s .
where  t t 0 Γ ( β )  is Euler’s gamma function  Γ ( β ) = 0 s β 1 e s d s .
Definition A2
([37]). Define the Caputo fractional derivative for a differentiable function  f ( t )  as follows:
D t β f ( t ) = 1 Γ ( n β ) t 0 t ( t s ) n β 1 f ( n ) ( s ) d s ,
For  n 1 β < n , n is a positive integer.  t > t 0 , and in cases where  0 < β < 1 ,
D t β f ( t ) = 1 Γ ( 1 β ) t 0 t f ( s ) ( t s ) β d s .

References

  1. Carpenter, G.A. Neural network models for pattern recognition and associative memory. Neural Netw. 1989, 2, 243–257. [Google Scholar] [CrossRef]
  2. Yang, W.; Huang, J.; He, X.; Wen, S. Fixed-time synchronization of complex-valued neural networks for image protection and 3D point cloud information protection. Neural Netw. 2024, 172, 106089. [Google Scholar] [CrossRef] [PubMed]
  3. Wei, F.; Chen, G.; Zeng, Z.; Gunasekaran, N. Finite/fixed-time synchronization of inertial memristive neural networks by interval matrix method for secure communication. Neural Netw. 2023, 167, 168–182. [Google Scholar] [CrossRef] [PubMed]
  4. Hui, M.; Liu, X.; Zhu, S.; Cao, J. Event-triggered impulsive cluster synchronization of coupled reaction–diffusion neural networks and its application to image encryption. Neural Netw. 2024, 170, 46–54. [Google Scholar] [CrossRef] [PubMed]
  5. Chua, L. Memristor-the missing circuit element. IEEE Trans. Circuit Theory 1971, 18, 507–519. [Google Scholar] [CrossRef]
  6. Zhang, G.; Hu, J.; Zeng, Z. New criteria on global stabilization of delayed memristive neural networks with inertial item. IEEE Trans. Cybern. 2019, 50, 2770–2780. [Google Scholar] [CrossRef]
  7. Wei, R.; Cao, J.; Alsaedi, A. Finite-time and fixed-time synchronization analysis of inertial memristive neural networks with time-varying delays. Cogn. Neurodyn. 2018, 12, 121–134. [Google Scholar] [CrossRef]
  8. Hartley, T.T.; Lorenzo, C.F.; Qammer, H.K. Chaos in a fractional order Chua’s system. IEEE Trans. Circuits Syst. Fundam. Theory Appl. 1995, 42, 485–490. [Google Scholar] [CrossRef]
  9. Lu, J.G.; Chen, G. A note on the fractional-order Chen system. Chaos Solitons Fractals 2006, 27, 685–688. [Google Scholar] [CrossRef]
  10. Deng, W.; Li, C. Chaos synchronization of the fractional Lü system. Phys. Stat. Mech. Its Appl. 2005, 353, 61–72. [Google Scholar] [CrossRef]
  11. Yan, J.; Li, C. On chaos synchronization of fractional differential equations. Chaos Solitons Fractals 2007, 32, 725–735. [Google Scholar] [CrossRef]
  12. Pan, L.; Zhou, W.; Fang, J.; Li, D. Synchronization and anti-synchronization of new uncertain fractional-order modified unified chaotic systems via novel active pinning control. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 3754–3762. [Google Scholar] [CrossRef]
  13. Zhu, H.; He, Z.; Zhou, S. Lag synchronization of the fractional-order system via nonlinear observer. Int. J. Mod. Phys. B 2011, 25, 3951–3964. [Google Scholar] [CrossRef]
  14. Gu, Y.; Wang, H.; Yu, Y. Stability and synchronization for Riemann-Liouville fractional-order time-delayed inertial neural networks. Neurocomputing 2019, 340, 270–280. [Google Scholar] [CrossRef]
  15. Zheng, M.; Li, L.; Peng, H.; Xiao, J.; Yang, Y.; Zhao, H. Finite-time projective synchronization of memristor-based delay fractional-order neural networks. Nonlinear Dyn. 2017, 89, 2641–2655. [Google Scholar] [CrossRef]
  16. Luo, L.; Li, L.; Huang, W.; Cui, Q. Stability of the Caputo fractional-order inertial neural network with delay-dependent impulses. Neurocomputing 2023, 520, 25–32. [Google Scholar] [CrossRef]
  17. Ke, L. Mittag-Leffler stability and asymptotic ω-periodicity of fractional-order inertial neural networks with time-delays. Neurocomputing 2021, 465, 53–62. [Google Scholar] [CrossRef]
  18. Yu, J.; Hu, C.; Jiang, H.; Fan, X. Projective synchronization for fractional neural networks. Neural Netw. 2014, 49, 87–95. [Google Scholar] [CrossRef]
  19. Zhang, Y.; Deng, S. Finite-time projective synchronization of fractional-order complex-valued memristor-based neural networks with delay. Chaos Solitons Fractals 2019, 128, 176–190. [Google Scholar] [CrossRef]
  20. Chen, D.; Zhang, R.; Liu, X.; Ma, X. Fractional order Lyapunov stability theorem and its applications in synchronization of complex dynamical networks. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 4105–4121. [Google Scholar] [CrossRef]
  21. Zhang, S.; Yu, Y.; Hu, W. Robust stability analysis of fractional-order Hopfield neural networks with parameter uncertainties. Math. Probl. Eng. 2014, 2014, 302702. [Google Scholar] [CrossRef]
  22. Monje, C.A.; Chen, Y.; Vinagre, B.M.; Xue, D.; Feliu-Batlle, V. Fractional-Order Systems and Controls: Fundamentals and Applications; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2010. [Google Scholar]
  23. Wang, H.; Gu, Y.; Zhang, X.; Yu, Y. Stability and synchronization of fractional-order reaction–diffusion inertial time-delayed neural networks with parameters perturbation. Neural Netw. 2024, 179, 106564. [Google Scholar] [CrossRef] [PubMed]
  24. Li, X.; Li, X.; Hu, C. Some new results on stability and synchronization for delayed inertial neural networks based on non-reduced order method. Neural Netw. 2017, 96, 91–100. [Google Scholar] [CrossRef]
  25. Li, W.; Gao, X.; Li, R. Stability and synchronization control of inertial neural networks with mixed delays. Appl. Math. Comput. 2020, 367, 124779. [Google Scholar] [CrossRef]
  26. Henderson, J.; Ouahab, A. Fractional functional differential inclusions with finite delay. Nonlinear Anal. Theory Methods Appl. 2009, 70, 2091–2105. [Google Scholar] [CrossRef]
  27. Yang, S.; Yu, J.; Hu, C.; Jiang, H. Finite-time synchronization of memristive neural networks with fractional-order. IEEE Trans. Syst. Man Cybern. Syst. 2019, 51, 3739–3750. [Google Scholar] [CrossRef]
  28. Li, X.; Fang, J.A.; Zhang, W.; Li, H. Finite-time synchronization of fractional-order memristive recurrent neural networks with discontinuous activation functions. Neurocomputing 2018, 316, 284–293. [Google Scholar] [CrossRef]
  29. Zhang, J.R.; Lu, J.G.; Jin, X.C.; Yang, X.Y. Novel results on asymptotic stability and synchronization of fractional-order memristive neural networks with time delays: The 0 < δ ≤ 1 case. Neural Netw. 2023, 167, 680–691. [Google Scholar] [PubMed]
  30. Aouiti, C.; Cao, J.; Jallouli, H.; Huang, C. Finite-time stabilization for fractional-order inertial neural networks with time varying delays. Nonlinear Anal. Model. Control 2022, 27, 1–18. [Google Scholar] [CrossRef]
  31. Li, R.; Wu, H.; Cao, J. Impulsive exponential synchronization of fractional-order complex dynamical networks with derivative couplings via feedback control based on discrete time state observations. Acta Math. Sci. 2022, 42, 737–754. [Google Scholar] [CrossRef]
  32. Chen, L.; Cao, J.; Wu, R.; Machado, J.T.; Lopes, A.M.; Yang, H. Stability and synchronization of fractional-order memristive neural networks with multiple delays. Neural Netw. 2017, 94, 76–85. [Google Scholar] [CrossRef] [PubMed]
  33. Liu, P.; Kong, M.; Zeng, Z. Projective synchronization analysis of fractional-order neural networks with mixed time delays. IEEE Trans. Cybern. 2020, 52, 6798–6808. [Google Scholar] [CrossRef] [PubMed]
  34. Yang, W.; Huang, J.; He, X.; Wen, S.; Huang, T. Finite-time synchronization of neural networks with proportional delays for RGB-D image protection. IEEE Trans. Neural Netw. Learn. Syst. 2022, 35, 8149–8160. [Google Scholar] [CrossRef] [PubMed]
  35. Ur Rehman, A.; Liao, X.; Ashraf, R.; Ullah, S.; Wang, H. A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2. Optik 2018, 159, 348–367. [Google Scholar] [CrossRef]
  36. Bao, H.B.; Cao, J.D. Projective synchronization of fractional-order memristor-based neural networks. Neural Netw. 2015, 63, 1–9. [Google Scholar] [CrossRef]
  37. Podlubny, I. Fractional Differential Equations: An Introduction to Fractional Derivatives, Fractional Differential Equations, to Methods of Their Solution and Some of Their Applications; Elsevier: Amsterdam, The Netherlands, 1998. [Google Scholar]
Figure 1. Time responses of states  r i ( t )  and  s i ( t )  with  γ = 1 .
Figure 1. Time responses of states  r i ( t )  and  s i ( t )  with  γ = 1 .
Fractalfract 08 00631 g001
Figure 2. Time responses of states  x i ( t )  and  y i ( t )  with  γ = 1 .
Figure 2. Time responses of states  x i ( t )  and  y i ( t )  with  γ = 1 .
Fractalfract 08 00631 g002
Figure 3. Time responses of states  r i ( t )  and  s i ( t )  with  γ = 3 .
Figure 3. Time responses of states  r i ( t )  and  s i ( t )  with  γ = 3 .
Fractalfract 08 00631 g003
Figure 4. Time responses of states  x i ( t )  and  y i ( t )  with  γ = 3 .
Figure 4. Time responses of states  x i ( t )  and  y i ( t )  with  γ = 3 .
Fractalfract 08 00631 g004
Figure 5. Time responses of states  r i ( t )  and  s i ( t )  with  γ = 1 .
Figure 5. Time responses of states  r i ( t )  and  s i ( t )  with  γ = 1 .
Fractalfract 08 00631 g005
Figure 6. Time responses of states  x i ( t )  and  y i ( t )  with  γ = 1 .
Figure 6. Time responses of states  x i ( t )  and  y i ( t )  with  γ = 1 .
Fractalfract 08 00631 g006
Figure 7. Time responses of states  e i ( t )  with  γ = 1 .
Figure 7. Time responses of states  e i ( t )  with  γ = 1 .
Fractalfract 08 00631 g007
Figure 8. Time responses of states  z i ( t )  with  γ = 1 .
Figure 8. Time responses of states  z i ( t )  with  γ = 1 .
Fractalfract 08 00631 g008
Figure 9. Encryption and decryption of “Baboon.png”. (a) Original image. (b) Disrupted image. (c) Encrypted image. (d) Decrypted image by respone sequences. (e) Histogram of (a). (f) Histogram of (b). (g) Histogram of (c). (h) Histogram of (d).
Figure 9. Encryption and decryption of “Baboon.png”. (a) Original image. (b) Disrupted image. (c) Encrypted image. (d) Decrypted image by respone sequences. (e) Histogram of (a). (f) Histogram of (b). (g) Histogram of (c). (h) Histogram of (d).
Fractalfract 08 00631 g009
Figure 10. Correlations in the plain image.
Figure 10. Correlations in the plain image.
Fractalfract 08 00631 g010
Figure 11. Correlations in the ciphered image.
Figure 11. Correlations in the ciphered image.
Fractalfract 08 00631 g011
Table 1. Overview of comparisons between the proposed method and related works.
Table 1. Overview of comparisons between the proposed method and related works.
ReferencesSystem TypeSynchronization StrategySynchronization TypeApplication Area
[24,25]INNsComplete SynchronizationAsymptotic SynchronizationNo application mentioned in those references
[29,32]FOMNNsComplete SynchronizationAsymptotic SynchronizationNo application mentioned in those references
[33]FONNsProjective SynchronizationAsymptotic SynchronizationNo application mentioned in this references
[34]NNsComplete SynchronizationFinite-Time SynchronizationImage Encryption
This paperFOIMNNsProjective SynchronizationFinite-Time SynchronizationImage Encryption
Table 2. Information entropy of original and encrypted images.
Table 2. Information entropy of original and encrypted images.
ImagesR ChannelG ChannelB Channel
Baboon image7.73577.45447.7736
Baboon encrypted image7.99937.99917.9993
Table 3. Correlation coefficients for RGB channels of plain and encrypted images.
Table 3. Correlation coefficients for RGB channels of plain and encrypted images.
ImageChannelPlain Image HorizontalPlain Image VerticalPlain Image DiagonalEncrypted Image HorizontalEncrypted Image VerticalEncrypted Image Diagonal
ProposedRed0.93190.86950.8468−0.00120.0017−0.0019
Green0.89630.81040.77150.00070.00210.0027
Blue0.93640.88630.86030.00060.0003−0.0010
[34]Red0.98920.96980.9798−0.00190.00630.00023
Green0.98270.95560.9691−0.00300.00320.0028
Blue0.95760.91850.93280.0024−0.0014−0.0057
[35]Red0.95750.94440.9272−0.0073−0.0011−0.0061
Green0.97690.99640.95370.0010−0.00200.0058
Blue0.95390.93750.9130−0.00130.0078−0.0003
[3]Red0.97660.98690.9638−0.00330.0119−0.0108
Green0.97660.98810.9646−0.00290.0113−0.0213
Blue0.95350.97300.9314−0.00400.00160.01628
Table 4. Performance comparison for RGB channels on Baboon image.
Table 4. Performance comparison for RGB channels on Baboon image.
AlgorithmRedGreenBlue
Proposed7.99937.99917.9993
[34]7.99937.99937.9993
[35]7.99667.99727.9967
[3]7.99937.99927.9994
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Weng, H.; Yang, Y.; Hao, R.; Liu, F. Finite-Time Projective Synchronization in Fractional-Order Inertial Memristive Neural Networks: A Novel Approach to Image Encryption. Fractal Fract. 2024, 8, 631. https://doi.org/10.3390/fractalfract8110631

AMA Style

Weng H, Yang Y, Hao R, Liu F. Finite-Time Projective Synchronization in Fractional-Order Inertial Memristive Neural Networks: A Novel Approach to Image Encryption. Fractal and Fractional. 2024; 8(11):631. https://doi.org/10.3390/fractalfract8110631

Chicago/Turabian Style

Weng, Huixian, Yongqing Yang, Rixu Hao, and Fengyi Liu. 2024. "Finite-Time Projective Synchronization in Fractional-Order Inertial Memristive Neural Networks: A Novel Approach to Image Encryption" Fractal and Fractional 8, no. 11: 631. https://doi.org/10.3390/fractalfract8110631

APA Style

Weng, H., Yang, Y., Hao, R., & Liu, F. (2024). Finite-Time Projective Synchronization in Fractional-Order Inertial Memristive Neural Networks: A Novel Approach to Image Encryption. Fractal and Fractional, 8(11), 631. https://doi.org/10.3390/fractalfract8110631

Article Metrics

Back to TopTop