Brought to you by:
Paper

Real-time fuzzy-pid synchronization of memristor-based chaotic circuit using graphical coded algorithm in secure communication applications

Published 25 April 2022 © 2022 IOP Publishing Ltd
, , Citation Hasan Guler 2022 Phys. Scr. 97 055212 DOI 10.1088/1402-4896/ac6707

1402-4896/97/5/055212

Abstract

The main goal of this study is to implement real-time synchronization of a memristor-based chaotic circuit for secure communication on LabVIEW virtual instrument environments. Memristors can be used in chaotic circuits because of their nonlinear behavior. In this paper, an application for secure communication systems is proposed by using the chaotic property of the memristor. Phase portraits, Lyapunov exponential spectrum, and bifurcation diagrams of the memristor-based chaotic circuit were investigated. A Fuzzy-PID controller was used for master-slave synchronization of memristive chaotic circuit and in secure communication application, three images were also used for encryption and decryption. NI 6251 DAQ card was used to obtain real-time results. Information entropy values, correlation coefficients (CC), peak signal to noise ratio (PSNR), structural similarity index (SSIM), correlation coefficients for the horizontal, vertical and diagonal directions from the three encrypted images, number of pixels change rate (NPCR) and unified average changing intensity (UACI) are calculated to test encryption/decryption performance in the designed system. The results obtained from real-time applications and simulations prove that memristor-based chaotic circuits can be used in secure communication systems where privacy is important.

Export citation and abstract BibTeX RIS

1. Introduction

In 1971, L. Chua found the fourth missing element and called memristor (memory resistor) [1]. Definition of the memristor is the relationship between two of the four basic circuit variables, such as the current i, the voltage v, the charge q, and the flux φ and it provides a functional relation between magnetic flux and charge as

Equation (1)

The relation of the fundamental circuit component and the I–V curve are given in figure 1 [2]. When the relation of flux-charge is analyzed for memristor, the electrical characteristic of the element is called memristance. If the relation of charge-flux is analyzed, that is described as memductance [3]. Memristance has the same unit with the resistance whereas memductance has the inverse of the resistance. As can be seen from figure 1, the I−V curve shows a non-linear characteristic, a pinched hysteresis loop, and a straight line at low frequencies, at intermediate frequencies, and at high frequencies, respectively.

Figure 1.

Figure 1. The relation of a fundamental circuit component.

Standard image High-resolution image

The charge-controlled memristor is called memristance and its equations are given in (2).

Equation (2)

The charge-controlled memristor is called memductance and its equations are given in (3).

Equation (3)

Memristor can be used in a wide range of work areas due to its scalability, low power consumption, and good compatibility with CMOS structures. However, except for a few products produced in a laboratory environment, it still has not taken its place in the markets as a commercial product [4, 5]. Thus, many studies about memristor-based systems such as chaotic systems and analog integrated circuits are implemented only by using simulation tools like SPICE and emulator circuits [312]. While doing these, linear and nonlinear dopant drift models are generally used to implement circuits.

Since memristors have a natural nonlinear behavior, they can be successfully applied to chaotic circuits. Hence, many scientists have studied this topic. It would not be wrong to say that one of the main application areas of memristive systems is chaotic systems and circuits [1322].

Since information security comes to the fore due to the rapidly developing internet technology, scientists are trying to implement secure communication applications using chaotic systems. In these studies, the master-slave synchronization of the chaotic system and secure communication applications with various control algorithms have been implemented [1622].

In this paper, the master-slave synchronization of the memristor-based chaotic circuit was performed for a secure communication application by using LabVIEW environments. Recently, LabVIEW software and hardware such as data acquisition cards (DAQs) and c-RIO systems have been widely used to implement systems like control, communication, biomedical systems [1319]. In the designed system, the Fuzzy-PID controller synchronizes the master-slave chaotic system. At the same time, image encryption and decryption are realized to implement secure communication applications. Various test parameters such as information entropy value, correlation coefficient value, etc. are calculated to test the result of the secure communication application.

In this study, the following sections introduce as follows: the second section consists of two parts. The first part introduces memristor-based chaotic circuits while the second introduces the dynamics of the system. In section 3, the synchronization of the memristor-based chaotic circuit with the Fuzzy-PID control method is given. Real-time applications of secure communication systems and some security analyses are implemented in section 4. In the last section, conclusions are presented.

2. Model of memristor based chaotic circuit

The memristor-based chaotic circuit is shown in figure 2.

Figure 2.

Figure 2. The relation of the fundamental circuit component.

Standard image High-resolution image

The state equations of this chaotic circuit are obtained using Kirchoff's laws and are presented below:

Equation (4)

When the equations of the memristor-based chaotic circuit developed using a flux controlled memristor model created using the nonlinear cubic property given in [17]:

Equation (5)

For the set of equations given above, if VC1 x1 , VC2 x2 , iL x3 , VCM u, a = 1/C1 , b = 1/C2 , d = 1/L and n = 1/R1 CM , new sets of nondimensional equations:

Equation (6)

In order for the circuit to show chaotic properties, the coefficients in equation (5) are a = 3.75, b = 10, d = 1, m0 = −0.33, m1 = 0.25 and n = −1. Also, the initial parameters of the chaotic circuit which are x1 (0), x2 (0) x3 (0) and u(0) are chosen as 0.01, 0,0 and 0, respectively. State space diagrams on x1 -x2 , x1 -x3 , x1 -x4 , x2 -x3, and x3 -x4 of memristor based chaotic circuit are shown in figure 3.

Figure 3.

Figure 3. The 2D projections of the memristor-based chaotic system on (a) x1 -x2 plain, (b) x1 -x3 plain, (c) x1 -x4 plain (d) x2 -x3, (e) x2 -x4 and (f) x3 -x4 plain.

Standard image High-resolution image

2.1. Lyapunov exponents of the memristor-based chaotic circuit

The Lyapunov exponent of a dynamic system is defined as a quantity that characterizes the rate of separation of infinitely close trajectories. Thus, it can be said that they mathematically indicate whether a system has time series. It is known that at least one of the Lyapunov exponents must be positive for a system to be said to exhibit chaotic behavior [15]. For this dynamical system, four Lyapunov exponents are obtained and their values are L1 = 1.7875, L2 = 2.1063, L3 = 0.00001, and L4 = −0.5057. Initial conditions of the system are selected for (0.01, 0, 0, 0). The Lyapunov exponent spectrum of the memristor-based chaotic circuit is given in figure 4.

Figure 4.

Figure 4. Lyapunov exponent spectra of memristor-based chaotic circuit.

Standard image High-resolution image

As can be seen, since two of the Lyapunov exponents in figure 4 have positive values, the necessary condition is fulfilled for being a chaotic system.

2.2. Bifurcation behavior analysis of the memristor-based chaotic circuit

Bifurcation diagrams are important in the analysis of dynamic systems and chaos. Bifurcation analysis is performed to determine the sensitivity of the system to the initial conditions and from where the system has moved from periodicity to chaos [2325]. The bifurcation diagram obtained for the selected control parameters a and d in the state-equations is shown in figure 5. The range for a is between 0.9 and 1.35 and that for d is between 1.1–1.8. The diagrams are represented with two different colors which show the obtained results with different initial conditions like black (0.1, 0, 0, 0) and blue (0.1, 0, 0.01, 0). It is understood that the a and d parameters show chaotic properties in the determined ranges.

Figure 5.

Figure 5. (a) Bifurcation diagrams (a) for a parameter (b) for d parameter.

Standard image High-resolution image

3. Master-slave synchronization of the system

To realize the synchronization of the memristor-based chaotic circuit with the Fuzzy-PID control method, it will be necessary to obtain the error dynamics of the outputs at different initial conditions. In equation (6) the model of the Master system, in (7) the models of the system consisting of the Slave system and the control function are given.

Master system:

Equation (7)

Slave system:

Equation (8)

Error:

Equation (9)

where xm , xs , c(t), and e are respectively master system, slave system, control function, and error. The coefficients of master and slave system are a = 3.75, b = 10, d = 1, m0 = −0.33, m1 = 0.25 and n = −1. The equation of the control function is given in (9). It is calculated by the Fuzzy-PID algorithm. The fuzzy system determines the Kp, Ki, and Kd parameters depending on the error and the change in the error. Thus, control function μ (t) is obtained to provide synchronization performance.

The Fuzzy-PID control:

Equation (10)

Figure 6 shows the communication system general block diagram. In this system, the control input of the PID system is defined as the μ function.

Figure 6.

Figure 6. The block diagram of the Fuzzy-PID controlled master-slave synchronization.

Standard image High-resolution image

The fuzzy controller has two inputs and three outputs. The inputs are error and change in error whereas the outputs are Kp, Ki, and Kd. The membership functions of inputs and outputs are shown in figures 7 and 8.

Figure 7.

Figure 7. The inputs of the fuzzy controller.

Standard image High-resolution image
Figure 8.

Figure 8. The outputs of the fuzzy controller.

Standard image High-resolution image

One of the rule tables of the fuzzy system is given in table 1.

Table 1. Rule table for Kp.

μde μeNZP
NSSM
ZSMB
PMBB

Linguistic variables in membership functions represent negative, zero, and positive for the inputs while they represent small, medium, and big for the outputs.

4. Design of the system on the LabVIEW platform

Simulation and real-time synchronization of the memristor-based chaotic system are implemented in the LabVIEW environment. The master-slave synchronization system performed with the Fuzzy-PID controller using the eight differential equations of the chaotic system is shown in figure 9.

Figure 9.

Figure 9. Block diagram of the memristor-based chaotic circuit.

Standard image High-resolution image

In the block diagram, first of all, the eight-state equations of the master and slave system are created. At the same time, the image was imported into the system and the encrypted image was obtained with the help of the image encryption algorithm by using the signals from the state equations.

During the specified time, the algorithm transmits the encrypted image. At the end of the specified time, the Fuzzy-PID controller is activated and the slave system follows the master system. The real image is obtained again with the developed decryption algorithm.

According to the fuzzy controller algorithm, the PID control parameters were obtained as [Kp Ki Kd] = [8.33 62.8 27.9]. After the designed system is run, master and slave systems' variables and errors between them are obtained as figure 10. The designed Fuzzy-PID synchronization was activated at 10 s. After that time, the error between the master and slave system quickly decreased to zero.

Figure 10.

Figure 10.  xm -xs and error between xm and xs .

Standard image High-resolution image

The appearance of the real-time experimental setup and the real-time state-space diagrams are shown in figures 11 and 12.

Figure 11.

Figure 11. The general appearance of the real-time experimental setup.

Standard image High-resolution image
Figure 12.

Figure 12. The real-time state-space diagrams of the memristor-based chaotic circuit.

Standard image High-resolution image

As can be seen from figure 10, it is understood that xm which is the master system's first variable and xs which is the slave system's first variable has different values up to the 10th second and the error between them is large. After the 10th second, it is seen that xm and xs have the same values when the controller is activated and the error goes to zero. This situation has also been achieved in real-time applications. In addition, 5 different state-space diagrams obtained from the simulation are also obtained in real-time applications. During this application, since the analog input voltage range of the DAQ is 0–10 V, scaling processing has been carried out in the algorithm so that it does not exceed this value.

As can be seen in figure 11, the developed algorithm has a user interface (GUI). In this GUI, both the chaotic signals and the encryption/decryption process can be seen instantly. In the encryption process of the developed algorithm, firstly, pseudo-random numbers were generated and then applied to the master and slave system's every chaotic variable. Image encryption was performed for 10 s. During this time, the chaotic signals of eight variables taken from the master and slave systems were sampled separately, and the image encryption process was carried out by performing an XOR operation between these scaled eight variables and the real image data. The decryption process starts after the Fuzzy-PID synchronization process takes place after 10 s. Also, this process is performed for XOR processing between the encrypted variables and slave systems' variables for 40 s [26, 27].

Three images used in the literature were used to test the performance of the image encryption process for the secure communication system. Histogram graphs and real-time results for three images in the encryption/decryption process are shown between figures 1318 [28].

Figure 13.

Figure 13. Histogram for Female: The original image (green)-the encrypted image (orange).

Standard image High-resolution image
Figure 14.

Figure 14. (a) Orginal grayscale image (U16) (b) Encrypted image (c) Decrypted image [28].

Standard image High-resolution image
Figure 15.

Figure 15. Histogram for Peppers: The original image (purple)-the encrypted image (orange).

Standard image High-resolution image
Figure 16.

Figure 16. (a) Orginal grayscale image (U16) (b) Encrypted image (c) Decrypted image [28].

Standard image High-resolution image
Figure 17.

Figure 17. Histogram for Sailboat: The original image (blue)-the encrypted image (red).

Standard image High-resolution image
Figure 18.

Figure 18. (a) Orginal grayscale image (U16) (b) Encrypted image (c) Decrypted image [28].

Standard image High-resolution image

When the histograms of three encrypted images are examined, it is seen that the image information is effectively hidden because of being distributed uniformly. The information entropy values of three encrypted images are calculated by equation (10) and the results are given in table 2 [29].

Equation (11)

Table 2. The information entropy values of three encrypted images.

ImagesInformation Entropy Value
Female7.9561
Peppers7.9917
Sailboat7.9899

As can be seen from table 2, information entropy values are very close to the ideal value of 8 for three encrypted images. In addition, correlation coefficient (CC), peak signal to noise ratio (PSNR), and structural similarity index (SSIM) are examined for every three images in table 3.

Table 3. The Similarity analysis for encrypted/decrypted images.

ImagesImage DimensionCCPSNRSSIM
Female256*2560,01719,64470,01994
Peppers512*512−0,054910,52690,02389
Sailboat512*5120,043699,01640,02378

The values of similarity analysis for three images in table 3 show that there are no similarities between encrypted and decrypted images as [3032].

In the final test of similarity analysis, the correlation coefficients obtained from randomly selected pixel pairs in the horizontal, vertical, and diagonal directions from the three encrypted images are given in table 4. It can be seen that the designed encryption algorithm reduces the correlation coefficient of the image. These values seem to be more appropriate when compared with the studies done in [33, 34].

Table 4. Correlation coefficients of real-time decrypted images results.

ImagesHorizontalVerticalDiagonal
Female0,00230,0019−0,0032
Peppers−0,00470,00170,0083
Sailboat0,00720,0048−0,0061

Number of pixels change rate (NPCR) and unified average changing intensity (UACI) which show the resistant to differential attacks were employed to test the sensitivity of the developed encryption algorithm. The equations of NPCR and UACI are given in (11). For a good encryption process, NPCR value is greater than 99.6% and UACI value is greater than or equal to 30% [23, 29, 35, 36]. The calculated NPRC and UACI values for three encrypted images are given in table 5.

Equation (12)

Table 5. NPRC and UACI values of real-time encrypted images.

ImagesNPRC (%)UACI (%)
Female99.692332.6223
Peppers99.869931,5117
Sailboats99.751530,8701

According to the tests results to see performance analysis for the designed encryption/decryption algorithm, it can be said that the memristor-based chaotic system has good encryption and decryption properties.

5. Conclusion

In the article study, real-time Fuzzy-PID synchronization of memristor-based chaotic circuits was implemented by using the LabVIEW environment. A secure communication simulation and image encryption process have been successfully performed with real-time Fuzzy-PID synchronization. Histogram analysis, correlation and entropy coefficient, UACI, NPCR were calculated to show the performance of the encryption algorithm and the reliability of the encrypted images. It has been seen that the results of these tests are among the values accepted for similarity and security analysis in the image encryption and decryption process in the literature. Thus, it can be said that the proposed system can be used secure communication process where privacy is important.

Data availability statement

The data generated and/or analysed during the current study are not publicly available for legal/ethical reasons but are available from the corresponding author on reasonable request.

A summary statement

Conflict of interest

The authors declare that they have no conflict of interest.

This study was not funded by any project.

All data generated or analyzed during this study are included in this published article.

Please wait… references are loading.
10.1088/1402-4896/ac6707