- freely available
- re-usable
Sensors 2012, 12(6), 7468-7484; doi:10.3390/s120607468
Published: 1 June 2012
Abstract
: This study used the complex dynamic characteristics of chaotic systems and Bluetooth to explore the topic of wireless chaotic communication secrecy and develop a communication security system. The PID controller for chaos synchronization control was applied, and the optimum parameters of this PID controller were obtained using a Particle Swarm Optimization (PSO) algorithm. Bluetooth was used to realize wireless transmissions, and a chaotic wireless communication security system was developed in the design concept of a chaotic communication security system. The experimental results show that this scheme can be used successfully in image encryption.1. Introduction
The chaos phenomenon was first proposed by Lorenz using the simulation equation of the atmosphere, but it did not attract much attention from scientists until Feigenbaum proposed the general theory of chaos phenomenon. Chaos is a phenomenon that seems disorderly but contains rules. It is a complex dynamic non-periodic and nonlinear system that cannot be explained by single data, and should be analyzed using overall continuous data. It has a very extensive Fourier spectrum, and has a fractal in the phase plane. The key in its state response is the initial value of the system. If a system has different initial values, the response varies largely; this phenomenon is called the butterfly effect [1–3].
At present, many scientists have applied the chaotic system concept to image encryption. This work can be briefly introduced as follows: Gao et al. proposed an image encryption algorithm, which randomly shuffles the matrices of image pixel positions, and uses a hyper-chaotic system to mix the relation between plainimage and cipherimage [4]. Guan et al. used a 2D cat map in random image pixel positions, and the output pixels of discrete Chen's system to cover the original pixel value [5]. Lian proposed an image encryption algorithm based on a spatiotemporal chaos system. The spatiotemporal lattices were used to generate a random sequence, and this sequence was used to select cryptographic parameters in each segment [6] Pareek et al. proposed an image encryption method based on chaotic Logistic maps, using one 80-bit external key and two chaotic Logistic maps. The initial conditions of the Logistic maps were obtained using the external key, and eight different operation types were used for the encryption of images [7]. Chen et al. proposed a real-time secure image encryption algorithm extending the image encryption algorithm for two-dimensional chaotic maps to three-dimensional ones. This method used a three-dimensional cat map in random image pixel positions, and employed the relation between another chaotic map encryption and the original image for confusion [8]. Although the above methods are all feasible, they are too complex and have high commercialization costs. This study used a simple method with the chaotic system to encrypt and decrypt images.
The chaotic synchronization system generally consists of a master chaotic system, a slave chaotic system, and a controller synchronizing the master and slave systems. The controller processes the signals of the master chaotic system, and transmits them to the slave chaotic system, so as to synchronize the trajectories of the two systems [9–13]. In this study, a PID controller was used to control the two systems, and the three parameters K_{p}, K_{i} and K_{d} of the PID were selected using a Particle Swarm Optimization (PSO) algorithm. The optimum parameters were thus obtained. Finally, the LabVIEW software was used to integrate the cryptological concept with the chaotic synchronization system into a chaotic synchronous cryptographic system, which was applied to the wireless communication secrecy for image encryption.
2. System Description and Formulation Problem
In order to observe the procedure of chaotic synchronization, the Master/Slave system of a single input single output (SISO) is used. The differential equations [14,15] are described below:
Master System:
Slave System:
Among which, x_{m}(t)=[x_{m1},x_{m2},x_{m3}]∈R^{n} and x_{s}(t)=[x_{s1},x_{s2},x_{s3}]∈R^{n} are the status values of Master System and Slave System, f:R×R^{n}→R^{n} is the nonlinear function, y_{m}(t)∈R and y_{s}(t)∈R are the outputs of Master System and Slave System, B∈R^{n×1} and C∈R^{1×n}, u∈R is the controller in the Slave system, the control objective is:
Since the initial value conditions of the master system and slave system are different, the synchronous controller is added, and the slave system is driven by the signals of the synchronous controller. Thus, the master system and the slave system have coincident response, that is synchronization. The state error of master and slave systems is defined as follows:
The primary objective of this system is to propose a simple and effective PID controller, using a PSO algorithm to obtain the optimum PID parameter values to synchronize two identical chaotic systems with different initial conditions. The u in Equation (2) is the PID controller ensuring the synchronization effect based on the PSO algorithm. In order to determine the u of PID controller, the output error signal y_{e} = y_{m} − y_{s} is defined first, and the PID controller and input y_{e}(t) and output u(t) can be expressed in continuous form as the following equation:
As the PID controller is realized in digital control, the continuous PID controller is converted into a discrete PID. Equation (5) can be changed to the following form [16]:
In general cases, the adjustment of PID controller involves selecting proper parameters K_{p}, K_{i}, K_{d} to ensure the system has better control performance, and the performance standard (objective function) can be defined according to the required specifications. There are two performance indexes: Integrated Squared Error (ISE) and Integrated Absolute Error (IAE). Their mathematical definitions are shown below:
This paper uses IAE as the objective function (OF), so Equation (9) is changed to the following equation:
According to PSO algorithm, an ideal gain parameter adjustment method for PID controller is determined to minimize the objective function.
3. Solve Optimization Problem Using PSO Algorithm
As the PSO algorithm has memory and distributed search features [17–19], it has high accuracy in the optimization of complicated systems, so the PSO algorithm is used in our system to solve the parametric problem of the PID controller. The PID control system consists of a master chaotic system, a slave chaotic system, a PID controller, and the PSO algorithm. The corresponding block diagram is shown in Figure 1.
In Figure 1, y_{m} is the output of master chaotic system, y_{s} is the output of slave chaotic system, y(e) is the output error between the master chaotic system and the slave chaotic system, u(t) is the control output of PID controller defined as Equation (7). The optimum parameters K_{p}, K_{i}, K_{d} of PID controller are obtained using the PSO algorithm to search for the convergent minimum value of performance index of IAE defined as Equation (10).
4. Optimization Problem Formulation and Procedure
The PSO algorithm is used to solve the parametric optimization as mentioned in the previous section. First, K∈S is defined, let K be continuous differentiable matrix value function, S = {z≤R^{3}∣0≤z_{i}≤z_{max},z_{max}<∞, i = 1,2,3}, z_{max} is the search area. The result of optimization problem includes z*=[K_{p}*,K_{i}*,K_{d}*]∈S, such a parameter value can minimize IAE. This optimization problem is described as mathematical expression for accuracy, namely, to determine a parameter z*∈S to minimize IAE:
According to “PSO in Electromagnetics” [20], a block flow diagram can be induced from the PSO algorithm, as shown in Figure 2.
The velocity update equation is shown below
V_{i}: Velocity of each particle
i: Number of particle
W: Inertia Weight
C_{1}, C_{2}: Learning constant
R_{and}: Random number between 0 and 1
P_{best}: The optimum position of each particle up to now
G_{best}: The optimum position of all particles up to now
X_{i}: The present position of each particle
Position update equation of each particle point in particle swarm:
5. Image Encryption and Decryption
This study used the Sprott chaotic synchronization system and cryptology concept to design a wireless communication secrecy system, and employed LabVIEW software to transmit images in wireless mode. The data were encrypted and decrypted by computer to computer. Bluetooth, which is a wireless personal LAN, was used for wireless transmission. The transmission frequency of Bluetooth was 2.45 GHz. Besides digital data transmission, sound transmission was also available. The transmission speed of Bluetooth was 2∼3 Mb per second, and encryption protection could be set. The frequency changed 1,600 times per min, so it was unlikely to be intercepted and was free from interference from electromagnetic waves. Each Bluetooth-based connecting device had a 48-bit address according to the IEEE 802 standard. It could connect one or many devices, and the maximum transmission range was about 100 m. This study used a D401 mini-Bluetooth receiver V2.0 EDR, with a transmission distance of 20 m, and a transmission speed of 2.1 Mb per second.
In the image encryption and decryption, the user has to enter a key, and this value is mixed with the chaotic signal. A password is then generated randomly as the chaotic signal changes, and is mixed with the pixels of the original image. The chaotic signal is used to select 16 different data ordering modes. The RGB values of pixels are combined by staggered arrangement for encryption and decryption. The initial value of this chaotic system is generated randomly. In synchronous signal transmission, another chaotic system is used for encryption and decryption, and the initial value of this chaotic signal is obtained from the key entered by the user. The system structure is shown in Figure 3, and the control interface of system is shown in Figures 4 and 5.
6. Simulation and Experimental Results
This study used LabVIEW to design the PID controller, applied a PSO algorithm to obtain the optimum parameter values and perform synchronization control for the Sprott [13,14] chaotic circuit system. The system equations are shown below:
Master:
Slave:
This study produced two images for encryption and decryption. One was a picture of an airplane, and the experimental results are shown in Figures 14–22. Figure 14 is the original airplane picture to be transmitted, and the image is disorganized into Figure 15 after encryption processing. Figure 16 shows the decryption when the key entered is incorrect. Figures 17–19 show the RGB distribution of the original picture. Figures 20–22 show the RGB distribution of the encrypted picture. Another image is a scenery picture, and the experimental results are shown in Figures 23–25. Figure 23 is the original scenery picture to be transmitted, and the image is disorganized into Figure 24 after encryption processing. Figure 25 shows the decryption when the key entered is incorrect. Figures 26–28 show the RGB distribution of the original picture. Figures 29–31 show the RGB distribution of the decrypted picture.
7. Conclusions
This study successfully used PSO to obtain the optimum parameter values of a chaotic synchronization PID controller, and applied it in chaotic communication secrecy. A traditional PID controller can only be used in fixed systems, and must be redesigned if it is to be used in different systems, which consumes a high hardware setting time and cost. This study used LabVIEW, instead of the traditional PID controller, so that when it is applied in other systems, only the parameters of the PID controller need to be changed, so the time and cost can be reduced. Bluetooth was used to realize wireless transmissions. In the application of wireless communications, future studies can focus on the encryption and decryption of images in order to improve the security of wireless transmission.
The financial support of this research by the National Science Council of the R.O.C., under Grant No. NSC 100-2628-E-167-002-MY3 is greatly appreciated.
References
- Lerescu, A.I.; Constandache, N.; Oancea, S.; Grosu, I. Collection of master–slave synchronized chaotic systems. Chaos Solitons Fractals 2004, 22, 599–604. [Google Scholar]
- Chua, L.O.; Lin, G.N. Canonical realization of Chua's circuit family. IEEE Trans. Circuits Syst. 1990, 37, 885–902. [Google Scholar]
- Lorenz, E.N. Deterministic non-periodic flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar]
- Gao, T.; Chen, Z. A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 2008, 372, 394–400. [Google Scholar]
- Guan, Z.-H.; Huang, F.; Guan, W. Chaos based image encryption algorithm. Phys. Lett. A 2005, 346, 153–157. [Google Scholar]
- Lian, S. Efficient image or video encryption based on spatiotemporal chaos system. Chaos Solitons Fractals 2009, 40, 2509–2519. [Google Scholar]
- Pareek, N.K.; Patidar, V.; Sud, K.K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar]
- Chen, G.; Mao, Y.; Chui, C.K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitions Fractals 2004, 21, 749–761. [Google Scholar]
- Chen, S.; Lü, J. Synchronization of an uncertain unified chaotic system via adaptive control. Chaos Solitons Fractals 2002, 14, 643–647. [Google Scholar]
- Zhang, H.; Ma, X.K.; Liu, W.Z. Synchronization of chaotic systems with parametric uncertainty using active sliding mode control. Chaos Solitons Fractals 2004, 21, 1249–1257. [Google Scholar]
- Wen, G.; Wang, Q.G.; Lin, C.; Han, X.; Li, G. Synthesis for robust synchronization of chaotic systems under output feedback control with multiple random delays. Chaos Solitons Fractals 2006, 29, 1142–1146. [Google Scholar]
- Pecora, L.M.; Carroll, T.L. Synchronization in chaotic systems. Phys. Rev. Lett. 1990, 64, 821–824. [Google Scholar]
- Ott, E.; Grebogi, C.; Yorke, J.A. Controlling chaos. Phys. Rev. Lett. 1990, 64, 1196–1199. [Google Scholar]
- Sprott, J.C. A new class of chaotic circuits. Phys. Lett. A 2000, 266, 19–23. [Google Scholar]
- Almeida, D.I.R.; Alvarez, J.; Barajas, J.G. Robust synchronization of Sprott circuits using sliding mode control. Chaos Solitons Fractals 2006, 30, 11–18. [Google Scholar]
- Yau, H.T.; Pu, Y.C.; Li, S.C. An FPGA-based PID controller design for chaos synchronization by evolutionary programming. Discret. Dyn. Nat. Soc. 2011, 2011, 1–11. [Google Scholar]
- Chang, J.C. DOA Estimation for local scattered cdma signals by particle swarm optimization. Sensors 2012, 12, 3228–3242. [Google Scholar]
- Zhang, Y.; Wu, L. Crop classification by forward neural network with adaptive chaotic particle swarm optimization. Sensors 2011, 11, 4721–4743. [Google Scholar]
- Wang, X.; Wang, S.; Ma, J.J. An improved co-evolutionary particle swarm optimization for wireless sensor networks with dynamic deployment. Sensors 2007, 7, 354–370. [Google Scholar]
- Robinson, J.; Rahmat-Samii, Y. Particle swarm optimization in electromagnetics. IEEE Trans. Antennas Propag. 2004, 52, 397–407. [Google Scholar]
- Chen, H.C.; Chang, J.F.; Yan, J.J.; Liao, T.L. EP-based PID control design for chaotic synchronization with application in secure communication. Expert Syst. Appl. 2008, 34, 1169–1177. [Google Scholar]
Table 1. The convergence situation of PSO vs. EP with the initial conditions [xm1(0), xm2(0), xm3(0)] = [0.1, 0.1, 0.1] and [xs1(0), xs2(0), xs3(0)] = [−1, −1, −1]. |
Converged iterations | Steady state of IAE | |
---|---|---|
The EP method in reference [16] | 170 | 0.7592 |
The PSO method in this paper | 53 | 0.6697 |
Table 2. The convergence situation of PSO vs. EP with the initial conditions [xm1(0), xm2(0), xm3(0)] = [0.1, 0.1, 0.1] and [xs1(0), xs2(0), xs3(0)] = [−1, −2, 1]. |
Converged iterations | Steady state of IAE | |
---|---|---|
The EP method in reference [21] | 80 | 0.6726 |
The PSO method in this paper | 26 | 0.4132 |
© 2012 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).