Next Article in Journal
Restricted Phase Space Thermodynamics of Einstein-Power-Yang–Mills AdS Black Hole
Next Article in Special Issue
Master–Slave Outer Synchronization in Different Inner–Outer Coupling Network Topologies
Previous Article in Journal
Weighted BATS Codes with LDPC Precoding
Previous Article in Special Issue
Bio-Inspired Autonomous Navigation and Formation Controller for Differential Mobile Robots
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Network Synchronization of MACM Circuits and Its Application to Secure Communications

by
Rodrigo Méndez-Ramírez
1,
Adrian Arellano-Delgado
2,3 and
Miguel Ángel Murillo-Escobar
1,3,*
1
Scientific Research and Advanced Studies Center of Ensenada (CICESE), Ensenada 22860, BC, Mexico
2
National Council of Science and Technology (CONACYT), Ciudad de Mexico 03940, CDMX, Mexico
3
Engineering, Architecture and Design Faculty, Autonomous University of Baja California (UABC), Ensenada 22860, BC, Mexico
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(4), 688; https://doi.org/10.3390/e25040688
Submission received: 16 February 2023 / Revised: 14 March 2023 / Accepted: 15 March 2023 / Published: 19 April 2023
(This article belongs to the Special Issue Synchronization in Time-Evolving Complex Networks)

Abstract

:
In recent years, chaotic synchronization has received a lot of interest in applications in different fields, including in the design of private and secure communication systems. The purpose of this paper was to achieve the synchronization of the Méndez–Arellano–Cruz–Martínez (MACM) 3D chaotic system coupled in star topology. The MACM electronic circuit is used as chaotic nodes in the communication channels to achieve synchronization in the proposed star network; the corresponding electrical hardware in the slave stages receives the coupling signal from the master node. In addition, a novel application to the digital image encryption process is proposed using the coupled-star-network; and the switching parameter technique is finally used to transmit an image as an encrypted message from the master node to the slave coupled nodes. Finally, the cryptosystem is submitted to statistical tests in order to show the effectiveness in multi-user secure image applications.

1. Introduction

Synchronization has received a lot of interest in applications in different fields [1,2,3,4], and in recent years, chaotic synchronization has received attention in the implementation of private and secure communication systems [1,5,6,7,8,9,10,11,12,13,14]. Confidential information is encrypted into a transmission using a chaotic signal by direct modulation, masking, or other techniques [7,11]. Thus, one widely studied chaotic system is that of the Chua circuit in synchronization and communication applications [15,16,17,18,19]. In optical communication applications, chaotic synchronization is achieved using a transmitter and a receiver to extract hidden information from the transmitted signal; some studies have been reported in [20,21,22,23,24,25,26,27].
Synchronization in complex dynamic networks has direct applications in different fields, as synchronization is carried out in complex dynamic networks using nodes in different topologies which are connected and coupled, and displaying chaotic behavior in their dynamics once synchronization is achieved, as can be seen in e.g., [9,13,28,29,30,31,32,33,34,35]. Additionally, the synchronization of the two-well Duffing equation is reported using two unidirectionally and bidirectionally coupled piecewise linear maps [36], and the chaotic behavior of the two-well Duffing equation with forcing is computed using the topological entropy—studies of the kneading theory are conducted for symmetric unimodal maps and bimodal maps [37]. Furthermore, the synchronization of complex network spaces has recently been studied in network topologies and explicitly determined in regular ring-lattices [38], whilst networks of discontinuous piecewise linear maps with different slopes [39] are characterized by circulating matrices and the conditional Lyapunov exponents.
Star-coupled networks have several applications in the transmission of information which are implemented using nodes in network coupling, where the master node is the transmitter and it provides a digital message to multiple receivers as slave nodes, e.g., using electronic and optical circuits [31,40], and the experimental proofs to validate the chaos existence using optical circuit communications is proposed in [24].
The objective of this work was to obtain network coupling synchronization using the chaotic MACM circuits in star topology [41]. A single-master circuit with four slave circuits is proposed using the complex systems theory, and the continuous version of the proposed network coupling and the simulation of the electronic circuit simulation is conducted using the Proteus 8 Professional of Labcenter Electronics. The MATLAB tools were used to transmit encrypted confidential digital messages from a single transmitter to multiple receivers, and the digital message process is validated using security analysis such as histograms, correlation analysis, and information entropy.
The organization of the paper is as follows: In Section 2, a brief review on network synchronization theory is provided. In Section 3, a mathematical model of the MACM circuit being used like nodes is described. Section 4 shows the mathematical model of the star coupled network and its synchronization using the MACM circuit, and we show the physical implementation and experimental results for chaos network synchronization using MATLAB and analog circuit simulation as communication channels. In Section 5, we apply the results obtained in the experimental network synchronization to transmit encrypted information from a transmitter to multiple receivers and the security analysis to validate the digital image as a message. Finally, the conclusions are given in Section 6.

2. Brief Review on Synchronization of Complex Networks

In this section, a brief review on complex dynamical networks is given, particularly on star coupling topology and its synchronization.

2.1. Synchronization of Complex Network

We consider a complex network as composed of N identical nodes, which are linearly and diffusively coupled through the first state of each node. In this network, each node constitutes an n-dimensional dynamical system, described as follows
x ˙ i = f ( x i ) + u i , i = 1 , 2 , , N ,
where x i = x i 1 , x i 2 , , x i n T R n are the state variables of the node i, u i = u i 1 R is the input signal of the node i, and is defined by
u i 1 = k j = 1 N a i j Γ x j , i = 1 , 2 , , N ,
the constant k > 0 represents the coupling strength of the complex network, and Γ R n × n is a constant 0–1 matrix linking coupled state variables. For simplicity, assume that Γ = d i a g r 1 , r 2 , , r n is a diagonal matrix with r i = 1 for a particular i and r j = 0 for j i . This means that two coupled nodes are linked through their i-th state variables. Whereas, A = a i j R N × N is the coupling matrix, which represents the coupling topology of the complex network. If there is a connection between node i and node j, then a i j = 1 ; otherwise, a i j = 0 for i j . The diagonal elements of the coupling matrix A are defined as
a i i = j = 1 , j i N a i j = j = 1 , j i N a j i , i = 1 , 2 , , N .
If the degree of node i is d i , then a i i = d i , i = 1 , 2 , , N .
Now, suppose that the complex network is connected without isolated clusters. Then, A is a symmetric irreducible matrix. In this case, it can be shown that zero is an eigenvalue of A with a multiplicity of 1 and all the other eigenvalues of A are strictly negative [29,30].
The synchronization state of nodes in complex systems can be characterized by the nonzero eigenvalues of A . The complex networks (1) and (2) are said to (asymptotically) achieve synchronization if [30]:
x 1 ( t ) = x 2 ( t ) = = x N ( t ) , a s t .
The diffusive coupling condition (3) guarantees that the synchronization state is a solution, s ( t ) R n , of an isolated node, that is
s ˙ ( t ) = f s ( t ) ,
where s ( t ) can be an equilibrium point, a periodic orbit, or a chaotic attractor. Thus, the stability of the synchronization state
x 1 ( t ) = x 2 ( t ) = = x N ( t ) = s ( t ) ,
of complex network (1) and (2) is determined by the dynamics of an isolated node—function f and solution s ( t ) —the coupling strength c, the inner linking matrix Γ , and the coupling matrix A .

2.2. Star Coupled Networks

In this work, we consider complex networks (1) and (2) as composed of coupled chaotic nodes in star topology. We assume that all the nodes are connected, without self-loops, and without multiple edges between two nodes. The coupling matrix for star-coupled master–slave networks is given by
A = 0 0 0 0 1 1 0 0 1 0 1 0 1 0 0 1 .
The eigenvalues of A are ( 0 , 1 , 1 , , 1 ). Therefore, the second largest eigenvalue of A is λ 2 = 1 , which is unrelated to the size of the network.

2.3. Synchronization Analysis Based on Master Stability Function Approach

We consider a simple complex dynamical network consisting of two coupled chaotic continuous-time nonlinear oscillators (1) in a master–slave configuration. The well-known master stability function approach [2] is the stability analysis used for studying the synchronous solution in (1). The generic variational equation governing the behavior around the synchronous solution is
ξ ˙ q = D f ( s ) + ζ q Γ ξ q
where D f is the local Jacobian of the vector function f evaluated on a (bounded) trajectory s , in this case of the master system, q = 0 , 1 , 2 , , N 1 with ζ q being an eigenvalue of the coupling matrix A , with ζ 0 = 0 . We calculated the maximum Floquet or Lyapunov exponents λ m a x for the generic variational Equation (8) as a function of the coupling strengths k, where the synchronous state for λ m a x > 0 is unstable if λ m a x < 0 the synchronous state is stable. For the computational calculation of the λ m a x , we use the programming software Matlab with initial conditions s ( 0 ) = [ 1.2 , 1 , 1 ] T .

3. MACM Circuit like Node

In this section, we describe the MACM electronic circuit used as a node to construct the network in the star topology. The objective of this paper was to achieve experimental synchronization in this network using OAs like communication channels [41]. The MACM chaotic system is described as follows
x ˙ y ˙ z ˙ = = = a x b y z , x + c y , d y 2 z .
MACM’s circuit consists of two no. linear multipliers, it has seven terms and four parameters a, b, c, and d, R + , where b and d are characterized as the bifurcation parameters a = 2, b = 2, c = 0.5, and d = 4.
The electronic implementation of the MACM system is given by the following electronic circuit representation:
x ˙ = 1 RC 1 ( R R 1 x R 10 R 2 y z ) , y ˙ = 1 RC 2 ( x + R R 6 y ) , z ˙ = 1 RC 3 ( R R 9 d R 10 R 10 y 2 z ) .
From the system (10), the electronic components are OAs TL084 U2, U3, analog-multipliers AD633 U1, U4, capacitors C1 = C2 = C3 = 10 nF, and the resistors R1 = 500 k Ω , R2 = 47 k Ω , R3 = R4 = R7 = R8 = R12 = R13 = 10 k Ω , R = R5 = R9 = R11 = 1 M Ω , R6 = 2 M Ω , and R10 = 94 k Ω . The bifurcation parameter d was fixed in V d = +3.8 V, the circuit is powered with + V c c = +18 V and V c c = −18 V. Evaluating the proposed electrical components in the system (10), the set of parameters of system (9) are conducted using a = R R 1 = 2, b = R 10 R 2 = 2.127, c = R R 6 = 0.5, and d = R R 9 = 1.
Figure 1 shows the electronic circuit of the MACM system (10), and its circuit simulation is conducted using the Proteus 8 Professional from Labcenter Electronics [42]. Figure 2 shows temporary trajectories and the phase-planes of the system (10).
As such, the normalized MACM’s circuit is given by
x ˙ 1 x ˙ 2 x ˙ 3 = = = a x 1 b x 2 x 3 , x 1 + c x 2 , d x 2 2 x 3 .

4. Star Network Synchronization of MACM’s Circuits

In this section, we describe the complex network to be constructed with N-coupled MACM’s circuits (11), which take the following form (according to Equations (1) and (2)):
x ˙ i 1 x ˙ i 2 x ˙ i 3 = a x i 1 b x i 2 x i 3 + u i 1 x i 1 + c x i 2 d x i 2 2 x i 3 , i = 1 , 2 , , N ,
u i 1 = k j = 1 N a i j Γ x j .
If the control signal in (13) is u i 1 0 for i = 1 , 2 , , N , then we have the original set of N uncoupled MACM’s circuits, which evolve according to their own dynamics. We consider, for illustrative purposes, in this work, that N = 5 , i.e., we have five-coupled MACM’s circuit-like nodes to be synchronized in a star-coupling topology and Γ = d i a g ( 1 , 0 , 0 , 0 , 0 ) and a coupling constant k. In particular, we consider a single master node N 1 and four slave nodes N 2 , N 3 , N 4 , and N 5 , for the physical implementation of this network (12) and (13), the topology of which is shown in Figure 3.
Five isolated nodes, such as Equation (11) are considered to be synchronized in a star network with master node N 1 and slave nodes N 2 , N 3 , N 4 , and N 5 . The master node N 1 of the dynamical network is arranged as follows
x ˙ 11 x ˙ 12 x ˙ 13 = a x 11 b x 12 x 13 + u 11 x 11 + c x 12 d x 12 2 x 13 ,
u 11 = 0 ,
the first slave node N 2 is given by
x ˙ 21 x ˙ 22 x ˙ 23 = a x 21 b x 22 x 23 + u 21 x 21 + c x 22 d x 22 2 x 23 ,
u 21 = k ( x 11 x 21 ) ,
the second slave node N 3 by means of
x ˙ 31 x ˙ 32 x ˙ 33 = a x 31 b x 32 x 33 + u 31 x 31 + c x 32 d x 32 2 x 33 ,
u 31 = k ( x 11 x 31 ) ,
the third slave node N 4 as follows
x ˙ 41 x ˙ 42 x ˙ 43 = a x 41 b x 42 x 43 + u 41 x 41 + c x 42 d x 42 2 x 43 ,
u 41 = k ( x 11 x 41 ) ,
and the fourth slave node N 5 given by
x ˙ 51 x ˙ 52 x ˙ 53 = a x 51 b x 52 x 53 + u 51 x 51 + c x 52 d x 52 2 x 53 ,
u 51 = k ( x 11 x 51 ) .
Now, using Equations (14) and (23) as chaotic nodes, we have constructed the star network with master node N 1 to be synchronized according to Figure 3. The corresponding coupling matrix is given by
A = 0 0 0 0 0 1 1 0 0 0 1 0 1 0 0 1 0 0 1 0 1 0 0 0 1 .
with eigenvalues λ 1 = 0 , λ 2 = λ 3 = λ 4 =   λ 5 = 1 .
Figure 4 shows λ m a x applying the coupling matrix (24) for a range 0 k 35 using the MACM system (9) as a node, where the sufficient coupling strength k to achieve network synchronization is k > 7 ; therefore, this analysis is used to consider the coupling strengths used in the numerical simulations and in the corresponding electronic implementation.

4.1. Synchronization Analysis Based on Master Stability Function Approach and Its Simulation

The chaotic synchronization in a star network topology is implemented in MATLAB for numerical results. We use the ODE45 function to integrate the system of differential equations of first order using the explicit formula Runge–Kutta (4,5) [43]. The control parameters are the same for each MACM system (9), i.e., a = 2 , b = 2 , c = 0.5 , and d = 4 , but with different initial conditions for each system presented in Table 1, and the time-series and phase-plane graphics of master MACM system 1 are shown in Figure 5. Thus, all the MACM systems present chaotic behavior.
We define the error synchronization as e 2 = x 11 x 21 , e 3 = x 11 x 31 , e 4 = x 11 x 41 , e 5 = x 11 x 51 . In Figure 6 and Figure 7, the time series of the errors and the phase graphics between the master and the four slaves are presented without coupling, i.e., the coupling constant is defined as zero. The results show that the network is not synchronized. Considering a coupling constant k = 10 , the four slave MACM systems in the star network synchronize with the master MACM system after the transient time, as presented in Figure 8 with the errors over time, and Figure 9 shows the synchronization graphic by plotting the corresponding phases between the MACM master and the four MACM slaves systems and producing a line with 45 degrees after the transient time. Based on the simulation results, the synchronization is achieved in the three chaotic states after 40 time units.

4.2. Star Network Electronic Circuit Synchronization

In this section, we describe the simulation of the electronic circuit implementation of the coupled-star-network and its synchronization to conduct the set-up among the master node ( N 1 ) and four slave nodes ( N 2 , N 3 , N 4 , and N 5 ). Based on the arrangement of five coupled MACM circuits, as shownvi in Equations (14)–(23) with the coupling signal u 11 0 in (), the entire electronic circuit implementation is conducted by the means of analog circuits and passive electrical components which are shown in Figure 10. Table 2 shows the hardware used in the electronic implementation of the coupled-star-network to achieve network synchronization in each channel, the same power supply of Figure 1 was used in this electronic implementation using V d = +3.8 V, + V c c = +18 V and V c c = −18 V, and the set of 15 capacitors and 97 resistors electronic components, 10 analog multipliers AD633, and 9 OAs TL084 as ICs.
In order to obtain different initial conditions in the electronic simulation of Figure 10, we propose the initial condition settings for each node using electric components with slightly different values; for the slave nodes N 2 , N 3 , N 4 , and N 5 , we used the resistors R24, R50, R29, and R55, respectively.
The chaotic dynamics of the states x 11 ( t ) and x 12 ( t ) and the chaotic attractor ( x 11 versus x 12 ) of the electrical simulation corresponding to the master MACM circuit, as shown in Figure 11.
As the state x 11 ( t ) of master N 1 versus state x 21 ( t ) of slave N 2 is shown in Figure 12, we can see the chaotic nodes N 1 and N 2 without coupling. The synchronization of the MACM circuits of the Equations (14) and (23) is achieved using the proposed network circuit depicted in Figure 12, the errors are shown in Figure 13, and the phase-planes are shown in Figure 14. For the other three slave nodes N 3 , N 4 , and N 5 , we used the same process given for the synchronization of N 1 versus N 2 .

5. Application to Image Encryption

The encryption of sensitive data in networks provides privacy to users. Particularly, digital images are transmitted over insecure channels throughout the Internet. The application of chaos synchronization to secure communications was proposed by Pecora and Carrol in 1990 [1].
In contrast with chaos-based cryptography which uses permutation and diffusion to encrypt image data to one receptor [44,45], we present the application of image encryption in a star network to securely transmit a digital image from the master MACM system to four slave MACM systems (multiple receptors) using chaotic synchronization and switching parameter technique [40,46]. In Figure 15, the schematic of the proposed image encryption process is presented. The process to transmit the digital image is described in the next steps:
1.
Binary string. The 8-bit gray-scale digital image with M ( r o w ) × N ( c o l u m n s ) pixels are placed row-by-row in a binary string with M × N × 8 bits.
2.
Synchronization of star network. We used a coupling constant of k = 10 between the master and slave MACM systems; different initial conditions are used for each MACM system (see Table 1); the control parameters are the same in all MACM systems, i.e., a = 2 , b = 2 , c = 0.5 , and d = 4 . After 50 time units (transient time), the star network is synchronized as shown in Figure 16.
3.
Extended plain binary data. Since synchronization is achieved after a transient time and to avoid data loss in the receptors, the plain binary string is mounted over 400 time units for each bit producing an extended plain binary data of M × N × 8 × 400 . As an example, Figure 16a–d show the first two bytes of the plain image transmitted, which are defined as 1010010010100011 with a length of 6400 time units (dashed line).
4.
Switching parameter d of master MACM. The parameter d of the master node is switched between d = 4 and d = 4.05 , for 0 and 1 in the extended plain binary data, respectively. During this time, the absolute synchronization error is determined in e 2 , e 3 , e 4 , and e 5 , which are shown in Figure 16a–d with a blue line. Since initial conditions are considerably different at the start communication, the error is bigger in the first time units.
5.
Processing the error. The recovered binary string in the receptor is calculated with the sum of the last 100 data in each error signal considering windows of 400 data; if the sum is greater than 0.7, a bit of 1 is defined for such window or bit of 0 in other case. Figure 16e–h presents the first recovered binary string in each slave MACM system (receptor).
6.
Image construction. The digital image is constructed using the recovered binary string and the inverse process of step 1; the string is separated into 8-bit segments and assigned to rows and columns to form the corresponding digital image. Figure 16i–l present the difference between the plain image and recovered image at the bit level (first 8000 bits) for slaves 2–5, respectively.
The proposed image encryption process is implemented at the software level in MATLAB (R2015a) in one laptop with a Intel Core 2.9 GHz processor, 8 GB of RAM, and operative system Windows 10 of 64 bits. The results of image encryption and decryption with the coupling constant k = 10 are presented in Figure 17. Figure 17a shows the plain image of Lena with 150 × 150 pixels to be transmitted by the master MACM; Figure 17b shows the cryptogram, which is constructed with the chaotic signal x 11 as a noise image; Figure 17c–f present the decrypted image in slaves 1–4, respectively. When the network is not synchronized, the images cannot be recovered in the slaves.
Figure 16. First bytes transmitted and recovered data: (a) absolute of e 2 (blue line) and plain binary data (dashed line); (b) absolute of e 3 (blue line) and plain binary data (dashed line); (c) absolute of e 4 (blue line) and plain binary data (dashed line); (d) absolute of e 5 (blue line) and plain binary data (dashed line); (e) recovered data in slave 2; (f) recovered data in slave 3; (g) recovered data in slave 4; (h) recovered data in slave 5; (i) error between plain image end recovered image in slave 2; (j) error between plain image end recovered image in slave 3; (k) error between plain image end recovered image in slave 4; and (l) error between plain image end recovered image in slave 5.
Figure 16. First bytes transmitted and recovered data: (a) absolute of e 2 (blue line) and plain binary data (dashed line); (b) absolute of e 3 (blue line) and plain binary data (dashed line); (c) absolute of e 4 (blue line) and plain binary data (dashed line); (d) absolute of e 5 (blue line) and plain binary data (dashed line); (e) recovered data in slave 2; (f) recovered data in slave 3; (g) recovered data in slave 4; (h) recovered data in slave 5; (i) error between plain image end recovered image in slave 2; (j) error between plain image end recovered image in slave 3; (k) error between plain image end recovered image in slave 4; and (l) error between plain image end recovered image in slave 5.
Entropy 25 00688 g016
On the other hand, the results of image encryption and decryption with coupling constant k = 5 is presented in Figure 18. Figure 18a shows the plain image of Lena with 150 × 150 pixels to be transmitted by the master MACM; Figure 18b shows the cryptogram, which is constructed with the chaotic signal x 11 as a noise image; and Figure 18c–f present the decrypted image in slaves 1–4, respectively. Since slaves nodes do not synchronize with the master node, the Lena image cannot be recovered correctly.

5.1. Security Analysis

In this subsection, we present the security analysis such as histograms, correlation, and entropy tests to show the effectiveness of the propose encryption mechanism.

5.1.1. Histograms

In the histogram attack, the cryptanalyst attempts to find a statistical relation with plain text. It must be uniform to resist such an attack. In Figure 19 and Figure 20, the histograms of Figure 17 and Figure 18 are presented, respectively. The plain Lena image in all cases has its particular histogram curves, whereas the encrypted image and the incorrect recovered images have a uniform data distribution. Thus, the proposed schema can resist a histogram attack.

5.1.2. Statistics of Histogram

The statistics of histograms are evaluated using the variance and standard deviation as metrics of data dispersion, i.e., such metrics provide information about variations in a dataset. First, the variance measures the average difference with respect the mean called m ¯ . The more uniform the histogram is, the lower the variance is. The variance is calculated with the following expression
α = 1 256 i = 1 256 m i m ¯ 2 ,
where
m ¯ = M × N 256 ,
and where m is the frequency in the histogram, α is the variance, M is the rows of image, N is the columns of the image, and m ¯ is the mean of the histogram. On the other hand, the standard deviation provides information about the fluctuations versus the mean and it is calculated as follows
β = α ,
with β as the standard deviation.
Table 3 presents the variance and the standard deviation for Figure 17 (correct decryption in slaves with k = 10 ) and Figure 18 (incorrect decryption in slaves with k = 5 ) for the plain and encrypted image of Lena with 150 pixels. The plain image presents high variance and standard deviation since data in the histogram are not uniform with fluctuations of 60 around the mean. The uniformity of histograms in encrypted image reduces considerably both metrics achieving a variance of 101.04 with fluctuations of just 10 around the mean.

5.1.3. Structural Similarity Index

The structural similarity index (SSIM) is used to determine the similarity structurally between the plain image and the encrypted image. SSIM uses the mean, standard deviation, and the cross-correlation of two images P and E. SSIM is evaluated as follows
S S I M = 2 P ¯ E ¯ + T 1 2 σ P E + T 2 P ¯ 2 + E ¯ 2 + T 1 β P 2 + β E 2 + T 2 ,
where
σ P E = 1 M × N i = 1 M j = 1 N [ P ( i , j ) P ¯ ] [ E ( i , j ) E ¯ ] ,
and P ¯ is the mean of the plain image, E ¯ is the mean of encrypted image, β P is the standard deviation of plain image, β E is the standard deviation of encrypted image, σ P E is the cross-correlation of plain and encrypted image, and S S I M 1 . T 1 = W 1 L 2 and T 2 = W 2 L 2 are used for stability, where L = 255 (for gray-scale) is the dynamic range of the pixel values with W 1 = 0.01 and W 2 = 0.03 .
Table 4 presents the SSIM for Figure 17 (correct decryption in slaves with k = 10 ) and Figure 18 (incorrect decryption in slaves with k = 5 ). If both tested images are identical, the SSIM=1. A value of SSIM close to zero means both tested images are structurally different, as expected between plain image and correctly decrypted images in slaves ( k = 10 ). Nevertheless, the SSIM is close to 1 if k = 5 since the system does not synchronize and the images cannot be recovered in slaves. Thus, the SSIM is close to 1 in such cases.

5.1.4. Correlation Analysis

Plain images present high correlation between the neighbors pixels that must be eliminated in encrypted images to provide security and reduce the risk of statistical attacks. It can be visually observed by using a graphical image correlation and calculating the Pearson correlation coefficient [47].
First, the value between two pixels in any direction of the plain image is similar and plotting the graphic correlation produces several points over the 45 degree line. On the other hand, the encrypted image plot datas in all the space of the graphical correlation, which means that two pixels proximate to one another are different in amplitude. In Figure 21 and Figure 22, the graphic correlation of Figure 17 and Figure 18 are presented, respectively. The plain image and the retrieved images in the five slaves graphically show high correlation between the proximate pixels, whereas the encrypted image presents different pixel values between the neighbors. In Table 5, the Pearson correlation coefficient is presented.

5.1.5. Information Entropy

The information entropy is a metric to numerically determine the level of randomness in images. Since plain images are based on 8-bit data, the maximum entropy is eight [48]. In Table 6, the entropy results of Figure 21 and Figure 22 are presented, respectively. The entropy value close to 8 in an encrypted image means a highly unpredictable message, whereas lower entropy is expected in plain images.

5.1.6. Decryption Error Test

In several applications in chaos-based image encryption such as in telemedicine or biometric systems, the decrypted image must be identical to an encrypted image. Thus, the error between both images must be determined quantitatively, where the plain image and the decrypted image are compared pixel-by-pixel. Based on [49], the decryption error is defined as follows
E ( % ) = 100 M × N i = 1 M j = 1 N Q ( i , j )
and
Q ( i , j ) = 0 i f P ( i , j ) = D ( i , j ) 1 i f P ( i , j ) D ( i , j )
and P is the original plain image, the D is the decrypted image, and E is the error calculated in percentage. In Table 7, the errors in percentage between the plain image and the decrypted images in the slaves are presented. When the coupling constant is k = 10 , just the 0.0044% of the pixels are lost, i.e., 8 bits of 180000. On the other hand, when the slaves do not synchronize with the master system ( k = 5 ), the error the in decrypted image is close to 100%.

6. Conclusions

In this study, the simulation of the network synchronization among one-master and four-slave chaotic MACM-systems was conducted by means of complex systems theory. The electronic circuit of the MACM-system was carried-out using the Proteus 8 Labcenter Electronics as an electrical circuit simulator to achieve the coupled-star-network synchronization, the set of one-master and four-slave nodes were implemented using simple integrated circuits, such as operational amplifiers, analog multipliers, and passive components. In addition, the application of the secure communication was conducted in the MATLAB simulation to transmit a digital image message encrypted from a chaotic transmitter to four chaotic receivers, the coupled-star-network synchronization showed good performance in the security analysis results, such as an uniform histogram, high correlation between neighbors, and low performance in the tests of information entropy and decryption error. Finally, the simulation results of the electronic circuits implementation and secure communication showed good performance in the synchronization of the chaotic coupled-star network of the MACM system for encrypting, transmitting, and recovering the secret messages. In future work, we will conduct the digital implementation of the coupled-star-network synchronization of the MACM chaotic system using embedded systems.

Author Contributions

Conceptualization, R.M.-R. and A.A.-D.; methodology, R.M.-R. and A.A.-D.; software, R.M.-R. and M.Á.M.-E.; validation, R.M.-R., A.A.-D., and M.Á.M.-E.; formal analysis, M.Á.M.-E. and A.A.-D.; investigation, R.M.-R. and M.Á.M.-E.; writing—original draft preparation, R.M.-R. and A.A.-D.; writing—review and editing, M.Á.M.-E. and A.A.-D.; supervision, M.Á.M.-E.; funding acquisition, M.Á.M.-E. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Council for Research and Technology (CONACyT), Mexico, under research grant 166654 (A1-S-31628).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data used to support the findings of this study are included within the article.

Acknowledgments

This work was supported by CONACYT, Mexico through the Research Project “Synchronization of complex systems and its applications” under grant number 166654 (A1-S-31628). A. Arellano-Delgado is a CONACYT Research Fellow commissioned to the Universidad Autónoma de Baja California, Mexico (Project no. 3059).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
3DThree-dimensional
MACMMéndez–Arellano–Cruz–Martínez
ICIntegrated circuit
OAOperational amplifier

References

  1. Pecora, L.M.; Carroll, T.L. Synchronization in chaotic systems. Phys. Rev. Lett. 1990, 64, 812–824. [Google Scholar] [CrossRef] [PubMed]
  2. Pecora, L.M.; Caroll, T.L. Master Stability Functions for Synchronized Coupled Systems. Phys. Rev. Lett. 1997, 80, 2109–2112. [Google Scholar] [CrossRef]
  3. Nijmeijer, H.; Mareels, I.M.Y. An observer looks at synchronization. IEEE Trans. Circuits Syst. I 1997, 44, 882–890. [Google Scholar] [CrossRef]
  4. Cruz-Hernández, C.; Nijmeijer, H. Synchronization through filtering. Int. J. Bifurc. Chaos 2000, 10, 763–775. [Google Scholar] [CrossRef]
  5. Sira-Ramírez, H.; Cruz-Hernández, C. Synchronization of chaotic systems: A Generalized Hamiltonian systems approach. Int. Bifurct. Chaos 2001, 11, 1381–1395. [Google Scholar] [CrossRef]
  6. López-Mancilla, D.; Cruz-Hernández, C. Output synchronization of chaotic systems: Model-matching approach with application to secure communication. Nonlinear Dyn. Syst. Theory 2005, 5, 141–156. [Google Scholar]
  7. Feldmann, U.; Hasler, M.; Schwarz, W. Communication by chaotic signals: The inverse system approach. Int. J. Circ. Theory Appl. 1996, 24, 551–579. [Google Scholar] [CrossRef]
  8. Boukabou, A. On nonlinear control and synchronization design for autonomous chaotic systems. Nonlinear Dyn. Syst. Theory 2008, 8, 151–167. [Google Scholar]
  9. Cruz-Hernández, C.; Martynyuk, A.A. Advances in Chaotic Dynamics with Applications; Cambridge Scientific Publishers: London, UK, 2010; Volume 4. [Google Scholar]
  10. Cuomo, K.M.; Oppenheim, A.V. Circuit implementation of synchronized chaos with applications to communications. Phys. Rev. Lett. 1993, 71, 65–68. [Google Scholar] [CrossRef]
  11. Cruz-Hernández, C.; López-Mancilla, D.; García, V.; Serrano, H.; Núñez, R. Experimental realization of binary signal transmission using chaos. J. Circ. Syst. Comput. 2005, 14, 453–468. [Google Scholar] [CrossRef]
  12. Cruz-Hernández, C. Synchronization of time-delay Chua’s oscillator with application to secure communication. Nonlinear Dyn. Syst. Theory 2004, 4, 1–13. [Google Scholar]
  13. Posadas-Castillo, C.; López-Gutiérrez, R.M.; Cruz-Hernández, C. Synchronization of chaotic solid-state Nd:YAG lasers: Application to secure communication. Commun. Nonlinear Sci. Numer. Simul. 2008, 13, 1655–1667. [Google Scholar] [CrossRef]
  14. Hou, Y.-Y. Synchronization of Chaotic Systems and Its Application in Security Terminal Sensing Node of Internet of Things. Micromachines 2022, 13, 1993. [Google Scholar] [CrossRef]
  15. Madan, R.N. (Ed.) Chua’s Circuit: A Paradigm for Chaos; World Scientific: River Edge, NJ, USA, 1993. [Google Scholar]
  16. Kennedy, M.P. Robust Op-Amp realization of Chua’s circuit. Frequenz 1992, 46, 66–80. [Google Scholar] [CrossRef]
  17. Muthuswamy, B.; Chua, L.O. Simplest chaotic circuit. Int. J. Bifurc. Chaos 2010, 20, 1567–1580. [Google Scholar] [CrossRef]
  18. Gámez-Guzmxaxn, L.; Cruz-Hernxaxndez, C.; López-Gutiérrez, R.M.; García-Guerrero, E.E. Synchronization of Chua’s circuits with multi-scroll attractors: Application to communication. Commun. Nonlinear Sci. Numer. Simul. 2009, 14, 2765–2775. [Google Scholar] [CrossRef]
  19. Cruz-Hernández, C.; Romero-Haros, N. Communicating via synchronized time-delay Chua’s circuits. Commun. Nonlinear Sci. Numer. Simul. 2008, 13, 645–659. [Google Scholar] [CrossRef]
  20. Kusumot, K.; Ohtsubo, J. 1.5-GHz message transmission based on synchronization of chaos in semiconductor lasers. Opt. Lett. 2002, 27, 989–991. [Google Scholar] [CrossRef]
  21. Lee, M.W.; Paul, J.; Sivaprakasam, S.; Shore, K.A. Comparison of closed-loop and open-loop feedback schemes of message decoding using chaotic laser diodes. Opt. Lett. 2003, 28, 2168–2170. [Google Scholar] [CrossRef]
  22. Paul, J.; Sivaprakasam, S.; Shore, K.A. Dual-channel chaotic optical communications using external-cavity semiconductor lasers. J. Opt. Soc. Am. B 2004, 21, 514–521. [Google Scholar] [CrossRef]
  23. Lu, J.; Chen, R. Generating multiscroll chaotic attractors: Theories, methods and applications. Int. J. Bifurc. Chaos 2006, 16, 775–858. [Google Scholar] [CrossRef]
  24. Cardoza-Avendaño, L.; Spirin, V.; López-Gutiérrez, R.M.; Lxoxpez-Mercado, C.A.; Cruz-Hernández, C. Experimental characterization of DFB and FP chaotic lasers with strong incoherent optical feedback. Opt. Laser Technol. 2011, 43, 949–955. [Google Scholar] [CrossRef]
  25. Spirin, V.; López-Mercado, C.A.; Miridonov, S.V.; Cardoza-Avendaño, L.; Lxoxpez-Gutiérrez, R.M.; Cruz-Hernández, C. Elimination of low-frequency fluctuations of backscattered Rayleigh radiation from optical fiber with chaotic lasers. Opt. Fiber Technol. 2011, 17, 258–261. [Google Scholar] [CrossRef]
  26. Tang, S.; Liu, J.M. Chaotic pulsing and quasi-periodic route to chaos in a semiconductor laser with delayed opto-electronic feedback. IEEE J. Quantum Electron. 2001, 37, 329–336. [Google Scholar] [CrossRef]
  27. Wang, A.; Wang, Y.; He, H. Enhancing the bandwidth of the optical chaotic signal generated by a semiconductor laser with optical feedback. IEEE Photonics Technol. Lett. 2008, 20, 1633–1635. [Google Scholar] [CrossRef]
  28. Argyris, A.; Syvridis, D.; Larger, L.; Annovazzi-Lodi, V.; Colet, P.; Fischer, I.; García-Ojalvo, J.; Mirasso, C.R.; Pesquera, L.; Shore, K.A. Chaos-based communications at high bit rates using commercial fibre-optic links. Nature 2005, 438, 343–346. [Google Scholar] [CrossRef]
  29. Wang, X.F.; Chen, G. Synchronization in small-world dynamical networks. Int. J. Bifurc. Chaos 2002, 12, 187–192. [Google Scholar] [CrossRef]
  30. Wang, X.F. Complex networks: Topology, dynamics and synchronization. Int. J. Bifurc. Chaos 2002, 12, 885–916. [Google Scholar] [CrossRef]
  31. Posadas-Castillo, C.; Cruz-Hernández, C.; López-Gutiérrez, R.M. Experimental realization of synchronization in complex networks with Chua’s circuits like nodes. Chaos Solitons Fractals 2009, 40, 1963–1975. [Google Scholar] [CrossRef]
  32. López-Gutiérrez, R.M.; Posadas-Castillo, C.; Lxoxpez-Mancilla, D.; Cruz-Hernández, C. Communicating via robust synchronization of chaotic lasers. Chaos Solitons Fractals 2009, 42, 277–285. [Google Scholar] [CrossRef]
  33. Posadas-Castillo, C.; Cruz-Hernández, C.; López-Gutiérrez, R.M. Synchronization of chaotic neural networks with delay in irregular networks. Appl. Math. Comput. 2008, 205, 487–496. [Google Scholar] [CrossRef]
  34. Serrano-Guerrero, H.; Cruz-Hernández, C.; López-Gutiérrez, R.M.; Posadas-Castillo, C.; Inzunza-Gonzxaxlez, E. Chaotic synchronization in star coupled networks of three-dimensional cellular neural networks and its application in communications. Int. J. Nonlinear Sci. Numer. Simul. 2010, 11, 571–580. [Google Scholar] [CrossRef]
  35. Acosta-Del Campo, O.R.; Cruz-Hernández, C.; López-Gutiérrez, R.M.; Arellano-Delgado, A.; Cardoza-Avendaño, L.; Chxaxvez-Pxexrez, R. Complex network synchronization of coupled time-delay Chua’s oscillators in different topologies. Nonlinear Dyn. Syst. Theory 2011, 11, 341–372. [Google Scholar]
  36. Acilina Caneco, J.; Rocha, L.; Grácio, C. Topological Entropy in the Synchronization of Piecewise Linear and Monotone Maps. Coupled Duffing Oscillators. Int. J. Bifurc. Chaos 2009, 11, 3855–3868. [Google Scholar] [CrossRef]
  37. Acilina Caneco, J. Leonel Rocha and Clara Grácio. Kneading Theory Analysis of the Duffing Equation. Chaos Solitons Fractals 2011, 42, 1529–1538. [Google Scholar] [CrossRef]
  38. Rocha, J.L.; Carvalho, S. Information Theory, Synchronization and Topological Order in Complete Dynamical Networks of Discontinuous Maps. Math. Comput. Simul. 2021, 182, 340–352. [Google Scholar] [CrossRef]
  39. Rocha, J.L.; Carvalho, S. Complete Dynamical Networks: Synchronization, Information Transmission and Topological Order, Discontinuity. Nonlinearity Complex. 2023, 1, 99–109. [Google Scholar] [CrossRef]
  40. Arellano-Delgado, A.; López-Gutiérrez, R.; Cruz-Hernández, C.; Posadas-Castillo, C.; Cardoza-Avendaño, L.; Serrano-Guerrero, H. Experimental network synchronization via plastic optical fiber. Opt. Fiber Technol. 2013, 19, 93–98. [Google Scholar] [CrossRef]
  41. Méndez-Ramírez, R.; Cruz-Hernández, C.; Arellano-Delgado, A.; Martínez-Clark, R. A new simple chaotic Lorenz-type system and its digital realization using a TFT touch-screen display embedded system. Complexity 2017, 2017, 6820492. [Google Scholar] [CrossRef]
  42. Proteus 8 Professional from Labcenter Electronics. Available online: https://www.labcenter.com/ (accessed on 2 February 2023).
  43. Shampine, L.F.; Reichelt, M.W. The MATLAB ODE Suite. SIAM J. Sci. Comput. 1997, 18, 1–22. [Google Scholar] [CrossRef]
  44. Fridrich, J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 1998, 8, 1259–1284. [Google Scholar] [CrossRef]
  45. Murillo-Escobar, M.A.; Cruz-Hernández, C.; Abundiz-Pérez, F.; López-Gutiérrez, R.M.; Del Campo, O.A. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 2015, 109, 119–131. [Google Scholar] [CrossRef]
  46. Cruz-Hernández, C.; López-Gutiérrez, R.M.; Aguilar-Bustos, A.Y.; Posadas-Castillo, C. Communicating encrypted information based on synchronized hyperchaotic maps. Int. J. Nonlin. Sci. Num. 2010, 11, 337–349. [Google Scholar] [CrossRef]
  47. Abundiz-Pérez, F.; Cruz-Hernández, C.; Murillo-Escobar, M.A.; López-Gutiérrez, R.M.; Arellano-Delgado, A. A fingerprint image encryption scheme based on hyperchaotic Rössler Map. Math. Prob. Eng. 2016, 2016, 2670494. [Google Scholar] [CrossRef]
  48. Li, Z.; Peng, C.; Li, L.; Zhu, X. A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlinear Dyn. 2018, 94, 1319–1333. [Google Scholar] [CrossRef]
  49. Murillo-Escobar, M.A.; Meranza-Castillón, M.O.; López-Gutiérrez, R.M.; Cruz-Hernández, C. Suggested integral analysis for chaos-based image cryptosystems. Entropy 2019, 21, 815. [Google Scholar] [CrossRef]
Figure 1. Electronic circuit of the MACM’s system (10).
Figure 1. Electronic circuit of the MACM’s system (10).
Entropy 25 00688 g001
Figure 2. Electronic circuit simulation of the chaotic 3D MACM system (1): (a) time evolution of states x ( t ) , y ( t ) , and z ( t ) ; (b) phase plane x ( t ) versus y ( t ) ; (c) phase plane x ( t ) versus z ( t ) ; and (d) phase plane y ( t ) versus z ( t ) .
Figure 2. Electronic circuit simulation of the chaotic 3D MACM system (1): (a) time evolution of states x ( t ) , y ( t ) , and z ( t ) ; (b) phase plane x ( t ) versus y ( t ) ; (c) phase plane x ( t ) versus z ( t ) ; and (d) phase plane y ( t ) versus z ( t ) .
Entropy 25 00688 g002
Figure 3. Star network with master node N 1 and four slave nodes.
Figure 3. Star network with master node N 1 and four slave nodes.
Entropy 25 00688 g003
Figure 4. Maximum Lyapunov exponent λ m a x applying coupling matrix A for 0 k 35 .
Figure 4. Maximum Lyapunov exponent λ m a x applying coupling matrix A for 0 k 35 .
Entropy 25 00688 g004
Figure 5. Master MACM system in chaotic regime: (a) x versus time; (b) y versus time; (c) z versus time; (d) x versus y; (e) x versus z; and (f) y versus z.
Figure 5. Master MACM system in chaotic regime: (a) x versus time; (b) y versus time; (c) z versus time; (d) x versus y; (e) x versus z; and (f) y versus z.
Entropy 25 00688 g005
Figure 6. Time series of the errors for each MACM system in the star network without coupling: (a) e 2 ; (b) e 3 ; (c) e 4 ; and (d) e 5 .
Figure 6. Time series of the errors for each MACM system in the star network without coupling: (a) e 2 ; (b) e 3 ; (c) e 4 ; and (d) e 5 .
Entropy 25 00688 g006
Figure 7. Phase graphics between the master MACM and slaves in the star network without coupling: (a) x 11 versus x 21 ; (b) x 11 versus x 31 ; (c) x 11 versus x 41 ; and (d) x 11 versus x 51 .
Figure 7. Phase graphics between the master MACM and slaves in the star network without coupling: (a) x 11 versus x 21 ; (b) x 11 versus x 31 ; (c) x 11 versus x 41 ; and (d) x 11 versus x 51 .
Entropy 25 00688 g007
Figure 8. Time series of the errors for each MACM system in the star network with coupling constant k = 10 : (a) e 2 ; (b) e 3 ; (c) e 4 ; and (d) e 5 .
Figure 8. Time series of the errors for each MACM system in the star network with coupling constant k = 10 : (a) e 2 ; (b) e 3 ; (c) e 4 ; and (d) e 5 .
Entropy 25 00688 g008
Figure 9. Phase graphics between the master MACM and slaves in the star network with coupling constant k = 10 : (a) x 11 versus x 21 ; (b) x 11 versus x 31 ; (c) x 11 versus x 41 ; and (d) x 11 versus x 51 .
Figure 9. Phase graphics between the master MACM and slaves in the star network with coupling constant k = 10 : (a) x 11 versus x 21 ; (b) x 11 versus x 31 ; (c) x 11 versus x 41 ; and (d) x 11 versus x 51 .
Entropy 25 00688 g009
Figure 10. Experimental set-up for network synchronization of five coupled MACM electronic circuits in star topology: (a) master node N 1 ; (b) slave node N 2 ; (c) slave node N 3 ; (d) slave node N 4 ; and (e) slave node N 5 .
Figure 10. Experimental set-up for network synchronization of five coupled MACM electronic circuits in star topology: (a) master node N 1 ; (b) slave node N 2 ; (c) slave node N 3 ; (d) slave node N 4 ; and (e) slave node N 5 .
Entropy 25 00688 g010aEntropy 25 00688 g010bEntropy 25 00688 g010c
Figure 11. Chaotic trajectories of the system of the Equations (14) and (23): (a) state x 11 ( t ) , error e 2 ( t ) = x 11 ( t ) x 21 ( t ) , and state x 21 ( t ) ; (b) state x 11 ( t ) , error e 3 ( t ) = x 11 ( t ) x 31 ( t ) , and state x 31 ( t ) ; (c) state x 11 ( t ) , error e 4 ( t ) = x 11 ( t ) x 41 ( t ) , and state x 41 ( t ) ; and (d) state x 11 ( t ) , error e 5 ( t ) = x 11 ( t ) x 51 ( t ) , and state x 51 ( t ) .
Figure 11. Chaotic trajectories of the system of the Equations (14) and (23): (a) state x 11 ( t ) , error e 2 ( t ) = x 11 ( t ) x 21 ( t ) , and state x 21 ( t ) ; (b) state x 11 ( t ) , error e 3 ( t ) = x 11 ( t ) x 31 ( t ) , and state x 31 ( t ) ; (c) state x 11 ( t ) , error e 4 ( t ) = x 11 ( t ) x 41 ( t ) , and state x 41 ( t ) ; and (d) state x 11 ( t ) , error e 5 ( t ) = x 11 ( t ) x 51 ( t ) , and state x 51 ( t ) .
Entropy 25 00688 g011aEntropy 25 00688 g011b
Figure 12. Plane phase of the system of Equations (14) and (23): (a) x 21 ( t ) versus x 11 ( t ) ; (b) x 11 ( t ) versus x 31 ( t ) ; (c) x 11 ( t ) versus x 41 ( t ) ; and (d) x 11 ( t ) versus x 51 ( t ) .
Figure 12. Plane phase of the system of Equations (14) and (23): (a) x 21 ( t ) versus x 11 ( t ) ; (b) x 11 ( t ) versus x 31 ( t ) ; (c) x 11 ( t ) versus x 41 ( t ) ; and (d) x 11 ( t ) versus x 51 ( t ) .
Entropy 25 00688 g012aEntropy 25 00688 g012b
Figure 13. Chaotic trajectories of Equations (14) and (23): (a) state x 11 ( t ) , error e 2 ( t ) = x 11 ( t ) x 21 ( t ) , and state x 21 ( t ) ; (b) state x 11 ( t ) , error e 3 ( t ) = x 11 ( t ) x 31 ( t ) , and state x 31 ( t ) ; (c) state x 11 ( t ) , error e 4 ( t ) = x 11 ( t ) x 41 ( t ) , and state x 41 ( t ) ; and (d) state x 11 ( t ) , error e 5 ( t ) = x 11 ( t ) x 51 ( t ) , and state x 51 ( t ) .
Figure 13. Chaotic trajectories of Equations (14) and (23): (a) state x 11 ( t ) , error e 2 ( t ) = x 11 ( t ) x 21 ( t ) , and state x 21 ( t ) ; (b) state x 11 ( t ) , error e 3 ( t ) = x 11 ( t ) x 31 ( t ) , and state x 31 ( t ) ; (c) state x 11 ( t ) , error e 4 ( t ) = x 11 ( t ) x 41 ( t ) , and state x 41 ( t ) ; and (d) state x 11 ( t ) , error e 5 ( t ) = x 11 ( t ) x 51 ( t ) , and state x 51 ( t ) .
Entropy 25 00688 g013aEntropy 25 00688 g013b
Figure 14. Plane phase of Equations (14) and (23): (a) x 21 ( t ) versus x 11 ( t ) ; (b) x 11 ( t ) versus x 31 ( t ) ; (c) x 11 ( t ) versus x 41 ( t ) ; and (d) x 11 ( t ) versus x 51 ( t ) .
Figure 14. Plane phase of Equations (14) and (23): (a) x 21 ( t ) versus x 11 ( t ) ; (b) x 11 ( t ) versus x 31 ( t ) ; (c) x 11 ( t ) versus x 41 ( t ) ; and (d) x 11 ( t ) versus x 51 ( t ) .
Entropy 25 00688 g014aEntropy 25 00688 g014b
Figure 15. Schematic of the proposed image encryption process.
Figure 15. Schematic of the proposed image encryption process.
Entropy 25 00688 g015
Figure 17. Experimental results of image encryption with the coupling constant k = 10 : (a) plain Lena image; (b) cryptogram; (c) decrypted image in slave 2 MACM; (d) decrypted image in slave 3 MACM; (e) decrypted image in slave 4 MACM; and (f) decrypted image in slave 5 MACM.
Figure 17. Experimental results of image encryption with the coupling constant k = 10 : (a) plain Lena image; (b) cryptogram; (c) decrypted image in slave 2 MACM; (d) decrypted image in slave 3 MACM; (e) decrypted image in slave 4 MACM; and (f) decrypted image in slave 5 MACM.
Entropy 25 00688 g017
Figure 18. Experimental results of image encryption with coupling constant k = 5 : (a) plain Lena image; (b) cryptogram; (c) decrypted image in slave 2 MACM; (d) decrypted image in slave 3 MACM; (e) decrypted image in slave 4 MACM; and (f) decrypted image in slave 5 MACM.
Figure 18. Experimental results of image encryption with coupling constant k = 5 : (a) plain Lena image; (b) cryptogram; (c) decrypted image in slave 2 MACM; (d) decrypted image in slave 3 MACM; (e) decrypted image in slave 4 MACM; and (f) decrypted image in slave 5 MACM.
Entropy 25 00688 g018
Figure 19. Histograms of images with the coupling constant k = 10 : (a) plain Lena histogram; (b) histogram of cryptogram; (c) histogram in slave 2 MACM; (d) histogram in slave 3 MACM; (e) histogram in slave 4 MACM; and (f) histogram in slave 5 MACM.
Figure 19. Histograms of images with the coupling constant k = 10 : (a) plain Lena histogram; (b) histogram of cryptogram; (c) histogram in slave 2 MACM; (d) histogram in slave 3 MACM; (e) histogram in slave 4 MACM; and (f) histogram in slave 5 MACM.
Entropy 25 00688 g019
Figure 20. Histograms of images with coupling constant k = 5 : (a) plain Lena histogram; (b) histogram of cryptogram; (c) histogram in slave 2 MACM; (d) histogram in slave 3 MACM; (e) histogram in slave 4 MACM; and (f) histogram in slave 5 MACM.
Figure 20. Histograms of images with coupling constant k = 5 : (a) plain Lena histogram; (b) histogram of cryptogram; (c) histogram in slave 2 MACM; (d) histogram in slave 3 MACM; (e) histogram in slave 4 MACM; and (f) histogram in slave 5 MACM.
Entropy 25 00688 g020
Figure 21. Graphic correlation of images with the coupling constant k = 10 : (a) plain Lena histogram; (b) cryptogram; (c) correlation in slave 2 MACM; (d) correlation in slave 3 MACM; (e) correlation in slave 4 MACM; (f) correlation in slave 5 MACM.
Figure 21. Graphic correlation of images with the coupling constant k = 10 : (a) plain Lena histogram; (b) cryptogram; (c) correlation in slave 2 MACM; (d) correlation in slave 3 MACM; (e) correlation in slave 4 MACM; (f) correlation in slave 5 MACM.
Entropy 25 00688 g021
Figure 22. Graphic correlation of images with coupling constant k = 5 : (a) plain Lena histogram; (b) correlation of cryptogram; (c) correlation in slave 2 MACM; (d) correlation in slave 3 MACM; (e) correlation in slave 4 MACM; (f) correlation in slave 5 MACM.
Figure 22. Graphic correlation of images with coupling constant k = 5 : (a) plain Lena histogram; (b) correlation of cryptogram; (c) correlation in slave 2 MACM; (d) correlation in slave 3 MACM; (e) correlation in slave 4 MACM; (f) correlation in slave 5 MACM.
Entropy 25 00688 g022
Table 1. Initial conditions of five master MACMs for numerical results in MATLAB.
Table 1. Initial conditions of five master MACMs for numerical results in MATLAB.
InitialMaster 1Slave 2Slave 3Slave 4Slave 5
ConditionMACMMACMMACMMACMMACM
x i 1 ( 0 ) −4.02.02.5−4.52.2
x i 2 ( 0 ) −4.02.02.5−4.52.2
x i 3 ( 0 ) −3.04.04.5−3.54.2
Table 2. Hardware description of the coupled-star-network to achieve network synchronization, as depicted in Figure 10.
Table 2. Hardware description of the coupled-star-network to achieve network synchronization, as depicted in Figure 10.
Component or ICValue or Description
C1, C2, C3, C4, C5, C6, C7, C8, C9, C10, C11, C12, C13, C14, C1510 nF
R1, R25, R38, R51, R64500 k Ω
R2, R37, R6347 k Ω
R3, R4, R7, R8, R12, R13, R14, R15, R19, R20, R23, R26, R27, R28, R32, R33, R36, R39, R40, R41, R45, R46, R49, R52, R53, R54, R58, R59, R62, R66, R66, R67, R68, R69, R70, R71, R72, R73, R74, R75, R76, R77, R78, R79, R80, R81, R82, R83, R84, R85, R86, R87 R88, R89, R90, R91, R92, R9310 k Ω
R5, R9, R11, R17, R18, R22, R31, R30, R35, R43, R44, R48, R56, R57, R61, R94, R95, R96, R971 M Ω
R6, R21, R34, R47, R602 M Ω
R10, R16, R4294 k Ω
R2447.5 k Ω
R5048 k Ω
R2994.5 k Ω
R5595 k Ω
U1, U4, U5, U6, U8, U9, U12, U13, U15, U16Analog-multiplier AD633
U2, U3, U7, U10, U11, U14, U17, U18, U19OA TL084
Table 3. Variance and standard deviation in histograms.
Table 3. Variance and standard deviation in histograms.
PlainEncryptedImage inImage inImage inImage in
ImageImageSlave 2Slave 3Slave 4Slave 5
α with k = 10 3713.12101.043711.783711.783711.783.71178
β with k = 10 60.9310.0560.9260.9260.9260.92
PlainEncryptedImage inImage inImage inImage in
ImageImageSlave 2Slave 3Slave 4Slave 5
α with k = 5 3713.12101.0496.9196.8796.9196.93
β with k = 5 60.9310.059.849.849.849.84
Table 4. Structural similarity index.
Table 4. Structural similarity index.
PE SSIM with k = 10 SSIM with k = 5
Plain imagePlain image11
Plain imageEncrypted image0.00300.0030
Plain imageImage in slave 20.99980.0135
Plain imageImage in slave 30.99980.0134
Plain imageImage in slave 40.99980.0135
Plain imageImage in slave 50.99980.0134
Table 5. Pearson correlation coefficient.
Table 5. Pearson correlation coefficient.
CouplingPlainEncryptedImage inImage inImage inImage in
ConstantImageImageSlave 2Slave 3Slave 4Slave 5
k = 10 0.87570.12550.85200.85200.85200.8520
k = 5 0.87580.12560.10600.09570.10600.0957
Table 6. Information entropy results.
Table 6. Information entropy results.
CouplingPlainEncryptedImage inImage inImage inImage in
ConstantImageImageSlave 2Slave 3Slave 4Slave 5
k = 10 7.52507.99037.52537.52537.52537.5253
k = 5 7.52507.99037.99107.99107.99107.9910
Table 7. Decryption error test.
Table 7. Decryption error test.
PD E (%) with k = 10 E (%) with k = 5
Plain imageEncrypted image99.568899.5688
Plain imageImage in slave 20.004499.6488
Plain imageImage in slave 30.004499.6488
Plain imageImage in slave 40.004499.6488
Plain imageImage in slave 50.004499.6488
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Méndez-Ramírez, R.; Arellano-Delgado, A.; Murillo-Escobar, M.Á. Network Synchronization of MACM Circuits and Its Application to Secure Communications. Entropy 2023, 25, 688. https://doi.org/10.3390/e25040688

AMA Style

Méndez-Ramírez R, Arellano-Delgado A, Murillo-Escobar MÁ. Network Synchronization of MACM Circuits and Its Application to Secure Communications. Entropy. 2023; 25(4):688. https://doi.org/10.3390/e25040688

Chicago/Turabian Style

Méndez-Ramírez, Rodrigo, Adrian Arellano-Delgado, and Miguel Ángel Murillo-Escobar. 2023. "Network Synchronization of MACM Circuits and Its Application to Secure Communications" Entropy 25, no. 4: 688. https://doi.org/10.3390/e25040688

APA Style

Méndez-Ramírez, R., Arellano-Delgado, A., & Murillo-Escobar, M. Á. (2023). Network Synchronization of MACM Circuits and Its Application to Secure Communications. Entropy, 25(4), 688. https://doi.org/10.3390/e25040688

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop