Next Article in Journal
Efficient Scalar Multiplication of ECC Using Lookup Table and Fast Repeating Point Doubling
Previous Article in Journal
Preface to the Special Issue on Probability and Stochastic Processes with Applications to Communications, Systems and Networks, 2nd Edition
Previous Article in Special Issue
A Novel Time Delay Nonsingular Fast Terminal Sliding Mode Control for Robot Manipulators with Input Saturation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Takagi–Sugeno–Kang Fuzzy Neural Network for Nonlinear Chaotic Systems and Its Utilization in Secure Medical Image Encryption

1
Faculty of Electrical and Electronic Engineering, Hung Yen University of Technology and Education, Hung Yen 17000, Vietnam
2
Department of Artificial Intelligence and Robotics, Sejong University, Seoul 05006, Republic of Korea
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(6), 923; https://doi.org/10.3390/math13060923
Submission received: 2 February 2025 / Revised: 24 February 2025 / Accepted: 26 February 2025 / Published: 11 March 2025
(This article belongs to the Special Issue Advancements in Nonlinear Control Strategies)

Abstract

:
This study introduces a novel control framework based on the Takagi–Sugeno–Kang wavelet fuzzy neural network, integrating brain imitated network and cerebellar network. The proposed controller demonstrates high robustness, making it an excellent candidate for handling intricate nonlinear dynamics, effectively mapping input–output relationships and efficiently learning from data. To enhance its performance, the controller’s parameters are fine-tuned using Lyapunov stability theory. Compared to existing approaches, the proposed model exhibits superior learning capabilities and achieves outstanding performance metrics. Furthermore, the study applies this synchronization technique to the secure transmission of medical images. By encrypting a medical image into a chaotic trajectory before transmission, the system ensures data security. On the receiving end, the original image is successfully reconstructed using chaotic trajectory synchronization. Experimental results confirm the effectiveness and reliability of the proposed neural network model, as well as the encryption and decryption process. Specifically, the average_RMSE of the Takagi–Sugeno–Kang fuzzy wavelet brain cerebral controller (TFWBCC) method is 2.004 times smaller than the cerebellar model articulation controller (CMAC) method, 1.923 times smaller than the RCMAC method, 1.8829 times smaller than the TSKCMAC method, and 1.8153 times smaller than the brain emotional learning controller (BELC) method.
MSC:
93A10; 93B05; 93D05; 93C10; 93C42; 93C95

1. Introduction

With the rapid spread of the Internet, e-health is becoming more widespread and accessible. This approach, also known as e-healthcare, uses digital and telecommunications technologies—such as computers, mobile devices and online networks—to improve medical services. E-healthcare is often integrated with traditional healthcare to provide patients and healthcare consumers with direct access to medical information [1,2,3]. However, when confidential images are subjected to cryptanalysis, sensitive data may be exposed, which could jeopardize individual privacy. Therefore, ensuring the security of medical image data has become an important priority [4,5,6].
To safeguard sensitive medical data, patient images must undergo anonymization through encryption. Accessing the original image requires the use of a precise decryption key [7,8,9]. Medical images possess unique characteristics, including strong pixel correlation, large data size, and significant redundancy [10,11,12]. Encryption techniques such as tent maps and bit-plane manipulation can be employed to secure these images. Consequently, ensuring robust security measures for both the transmission and storage of digital medical images is essential.
In recent years, researchers have extensively explored the synchronization of chaotic trajectories, a topic that has garnered significant scientific attention. Chaotic synchronization refers to the phenomenon where initially uncoordinated chaotic systems evolve into a state of organized behavior over time, offering valuable insights into the dynamics of complex systems. Several studies have examined the application of the 3D Lorenz chaotic system for secure data transmission [13,14] and investigated methods to synchronize chaotic systems for enhancing secure communication [15,16].
The interest in chaotic synchronization stems from the intricate and partially unexplored characteristics of chaotic behavior. This field holds critical relevance across various domains, including secure communications, control engineering, robotics, neuroscience, information processing, and biomedical applications. Despite its promising potential, chaotic systems present significant challenges due to their inherent unpredictability and highly nonlinear properties, making their control and synchronization a complex endeavor.
In modern times, model-free approaches have become increasingly popular for describing systems with unpredictable and random properties in both structure and parameters. A growing challenge in control theory is the need for precise management of complex systems. While traditional control techniques are effective in well-defined, stable, and linear environments, they struggle to cope with the complexity and uncertainty inherent in nonlinear chaotic systems [17,18]. Although adaptive controllers offer partial solutions, they remain difficult to implement in high-dimensional datasets or unstructured environments [19,20].
To address these challenges, extensive research has focused on fuzzy mathematical models, which emulate human-like reasoning [21,22,23,24]. Fuzzy systems are broadly categorized into two types: the Takagi–Sugeno–Kang (TSK) fuzzy systems and the Mamdani–Larsen fuzzy systems. The Mamdani–Larsen approach is known for its linguistic clarity, robustness, and rule-based structure, making it suitable for interpretability and smooth decision-making. On the other hand, TSK fuzzy systems excel in function approximation, offering simpler rule bases, superior nonlinear modeling, fast learning, flexibility, and effective parameterization for optimization techniques. These properties make TSK fuzzy models particularly suitable for handling intricate nonlinear relationships between input and output variables and for efficient training using data. A deep TSK fuzzy classifier with a hierarchical architecture and interpretable linguistic rules has been developed and tested through computational experiments and real-world applications [25]. Additionally, TSK fuzzy systems have been widely used in domains such as finance, medicine, and intelligent control systems [26,27].
Despite their advantages, fuzzy control in chaotic systems remains challenging due to issues such as inherent imprecision, the complexity of designing rule bases, difficulty in tuning membership functions, high implementation costs, and limited theoretical guarantees. Furthermore, fuzzy controllers may struggle to adapt to external disturbances and parameter uncertainties, leading to synchronization errors and increased system complexity.
In recent years, neural networks (NNs) have gained significant attention across multiple scientific and engineering disciplines for their capacity to handle complex nonlinear functions [28,29]. Neural networks are particularly powerful in modeling complex systems, function approximation, and integrating diverse data sources. Several biologically inspired neural architectures have been investigated, including the brain emotional learning controller (BELC) [30], the cerebellar model articulation controller (CMAC) [31,32], RNN [33,34], radial basis function neural network (RBFNN) preprocessors combined with CMAC [35,36], and fuzzy neural networks (FNN) [37,38].
Neural networks possess several advantages, including the ability to process imprecise information, integrate human expertise, perform parallel computations, and exhibit high fault tolerance, making them well-suited for controlling complex systems. However, controlling chaotic systems remains highly challenging due to their sensitivity to initial conditions. The design and training of neural network controllers require careful selection of network architecture, data, and learning algorithms. Additionally, neural networks demand vast amounts of training data, involve computationally intensive architectures, and may face challenges in generalizability—controllers optimized for one system may not necessarily perform well for another.
The proposed method integrates the strengths of wavelet features with Takagi–Sugeno–Kang fuzzy system (TSKFS) to create a TSK fuzzy wavelet brain cerebellar controller (TFWBCC). The effectiveness of the method is demonstrated by simulating 4D hyperchaotic synchronization. The main contributions of this work are as follows:
(1)
A novel wavelet function is incorporated into the BELC and CMAC channels and improves their ability to account for uncertainty in the membership function. This approach utilizes TSKFS for dual-channel CMAC and BELC and enables more flexible parameter updates, improved mapping capabilities, and precise approximation performance.
(2)
A TFWBCC is proposed to achieve synchronization in hyperchaotic systems.
(3)
The stability of the proposed system is rigorously verified using Lyapunov stability theory.
This paper is structured as follows: The first section provides an overview of the problem being addressed. In the second section, the proposed TFWBCC approach for achieving chaotic system synchronization is detailed, along with an explanation of how the Lyapunov method is utilized to update the controller parameters, Section 3 shows the proposed TFWBCC for 4D hyper master and slave chaotic synchronization and its application for medical secure image transmission. Section 4 presents the numerical simulation results for the 4D hyperchaotic in MATLAB software. Section 5 presents the medical image encryption using 4D hyper chaotic synchronization. Finally, Section 6 presents the conclusion of the paper. To make it easier to understand the abbreviations, you can see the list of abbreviations used in this article in Table 1.
The primary differences between the proposed control strategy and conventional methods are presented in Table 2.

2. Problem Formulation

Generic four-dimensional master systems, which can be represented as follows:
{ x ˙ M 1 ( t ) = f 1 ( x M i ) x ˙ M 2 ( t ) = f 2 ( x M i ) x ˙ M 3 ( t ) = f 3 ( x M i ) x ˙ M 4 ( t ) = f 4 ( x M i )
where x M i and f i   ( i = 1 , 2 , 3 , 4 ) are, respectively, the states of the master system and nonlinear functions.
The typical structure of the slave system is outlined below:
{ y ˙ S 1 ( t ) = f 1 ( y S i ) + Δ f ( y S 1 ) + n 1 + u 1 y ˙ S 2 ( t ) = f 2 ( y S i ) + Δ f ( y S 2 ) + n 2 + u 2 y ˙ S 3 ( t ) = f 3 ( y S i ) + Δ f ( y S 3 ) + n 3 + u 3 y ˙ S 4 ( t ) = f 4 ( y S i ) + Δ f ( y S 4 ) + n 4 + u 4
where y S i , n i , u i , and Δ f ( y S i )   ( i = 1 , 2 , 3 , 4 ) are, respectively, system states, unknown external disturbances, control inputs, and uncertainties of the system. If a proper control input u i , ( i = 1 , 2 , 3 , 4 ) is structured to ensure that the slave’s states align with those of the master. It indicates that both systems operate in perfect harmony, thus, lim t | y S i ( t ) x M i ( t ) | 0 . Take into account a particular instance of a four-dimensional hyperchaotic master system, as described in reference [38]:
{ x ˙ M 1 = a ( x M 2 x M 1 ) + x M 4 x ˙ M 2 = b x M 1 x M 1 x M 3 + x M 4 x ˙ M 3 = x M 1 x M 2 x M 3 x M 4 x ˙ M 4 = c ( x M 1 + x M 2 )
in which the exact values a ,   b ,   and   c can be determined, allowing the slave system to be represented as follows:
{ y ˙ S 1 = a ( y S 2 y S 1 ) y S 4 + Δ Y ( y S 1 ) + n d 1 + u 1 y ˙ S 2 = b y S 1 y S 1 y S 3 + y S 4 + Δ Y ( y S 2 ) + n d 2 + u 2 y ˙ S 3 = y S 1 y S 2 y S 3 y S 4 + Δ Y ( y S 3 ) + n d 3 + u 3 y ˙ S 4 = c ( y S 1 + y S 2 ) + Δ Y ( y S 4 ) + n d 4 + u 4
where u = [ u 1 , u 2 , u 3 , u 4 ] T is the control input vector, n d = [ n d 1 , n d 2 , n d 3 , n d 4 ] T is the unknown external disturbance, Δ Y ( y S ) = [ Δ Y ( y S 1 ) , Δ Y ( y S 2 ) , Δ Y ( y S 3 ) , Δ Y ( y S 4 ) ] T is the uncertainty of the system, and y S i   ( i = 1 , 2 , 3 , 4 ) is the slave state. The tracking error can be calculated as follows:
{ e 1 = y 1 S x 1 M e 2 = y 2 S x 2 M e 3 = y 3 S x 3 M e 4 = y 4 S x 4 M
The measurement of the tracking discrepancy is determined as follows:
{ e ˙ 1 = y ˙ S 1 x ˙ M 1 = a ( e 2 e 1 ) e 4 + Δ Y ( y S 1 ) + n d 1 + u 1 e ˙ 2 = y ˙ S 2 x ˙ M 2 = b e 1 y S 1 y S 3 + x M 1 x M 3 + Δ Y ( y S 2 ) + n d 2 + u 2 e ˙ 3 = y ˙ S 3 x ˙ M 3 = y S 1 y S 2 x M 1 x M 2 e 4 + Δ Y ( y S 3 ) + n d 3 + u 3 e ˙ 4 = y ˙ S 4 x ˙ M 4 = c ( e 1 + e 2 ) + Δ Y ( y S 4 ) + n d 4 + u 4
Rewriting Equation (6) to the vector form as follows:
e ˙ = Π e + Ω + Δ Y ( y S ) + n d + u
where Π = [ a a 0 1 b 0 0 0 0 0 0 1 c c 0 0 ] , e = [ e 1 e 2 e 3 e 4 ] , Ω = [ 0 y S 1 y S 3 + x M 1 x M 3 y S 1 y S 2 x M 1 x M 2 0 ] .
Given the known values Δ Y ( y )   and   n d , an optimal controller can be determined as follows:
u * = Π e Ω Δ Y ( y S ) n d Ψ e
where Ψ = diag ( ψ 1 , ψ 2 , ψ 3 , ψ 4 ) represents the feedback gain matrix. Substituting Equation (8) into Equation (7) yields
e ˙ + Ψ e = 0
when Ψ is adjusted to satisfy the Hurwitz stability condition, then lim t e 0 . However, in real-world applications, the ideal controller described in Equation (8) cannot be fully realized due to the unknown nature of the lumped uncertainty, n d ( t ) . To address this challenge, this research introduces the TFWBCC model, aiming to ensure effective synchronization of four-dimensional hyperchaotic systems.

3. TFWBCC Model

This section introduces a novel control framework based on the TSKFS, combining wavelet BELC and wavelet CMAC. Figure 1 presents the flowchart for synchronizing 4D chaotic systems using the proposed TFWBCC, while Figure 2 outlines the TFWBCC framework, comprising two main components: the TSK wavelet BELC (TSKWBC) and the TSK wavelet cerebellar controller (TFWCC). Each of these branches operates based on specific TSK fuzzy inference rules, outlined as follows:
R l : If   I 1   is   f 1 j k B ,   I 2   is   f 2 j k B , ,   and   I M   i s   f M j k B ,   then   ω j k B = I 1 t 1 j k B + I 2 t 2 j k B + I M t M j k B for   j = 1 ,   2 , ,   N ,   k = 1 ,   2 , ,   K ,   and   l = 1 ,   2 , ,   L
where f i j k B is the fuzzy set for the i-th input, j-th layer, and k-th block; ω j k B is the TSK-type output weight of TFWBC. M is the dimension of the input, N is the layer dimension, K is the number of blocks for each layer; L = N × K is the number of fuzzy rules.
R l : If   I 1   is   f 1 j k C ,   I 2   is   f 2 j k C , ,   and   I M   i s   f M j k C ,   then   ω j k C = I 1 t 1 j k C + I 2 t 2 j k C + I M t M j k C for   j = 1 ,   2 , ,   N ,   k = 1 ,   2 , ,   K ,   and   l = 1 ,   2 , ,   L
where f i j k C is the fuzzy set for the i-th input, j-th layer, and k-th block; ω j k C is the TSK-type output weight of TFWCC.

3.1. Input Storage

I = [ I 1 ,   I 2 ,   ,   I M ] T R M is simultaneously an input vector for both TFWBC and TFWCC branches.

3.2. TFWBC Branch

(a)
Storage area for relational data: This storage contains some blocks K; each block is expressed by a wavelet function and it is determined as follows:
f i j k B = ( I i m i j k B δ i j k B ) exp ( ( I i m i j k B ) 2 δ i j k B 2 )
where m i j k B and δ i j k B are, respectively, the mean and variance, then:
ψ j k B = i = 1 n i ( f i j k B ) = i = 1 n i ( I i m i j k B δ i j k B ) exp ( ( I i m i j k B ) 2 δ i j k B 2 )
Let
Ψ B = [ ψ 11 B ,   ψ 1 K B , ψ N 1 B , ψ N K B ] T N K
(b)
Weight Storage ( Ω B ): The weight matrix of TFWBC is defined as follows:
Ω B = [ t 111 B t 211 B t M 11 B       t 11 K B t 21 K B t M 1 K B t 121 B t 221 B t M 11 B       t 12 K B t 22 K B t M 2 K B       t 1 N 1 B t 2 N 1 B t M N 1 B       t 1 N K B t 2 N K B t M N K B ] [ I 1 I 2 I M ] × ξ o B = T C T I × ξ o B N K
where
T B T = [ t 111 B t 211 B t M 11 B       t 11 K B t 21 K B t M 1 K B t 121 B t 221 B t M 11 B       t 12 K B t 22 K B t M 2 K B       t 1 N 1 B t 2 N 1 B t M N 1 B       t 1 N K B t 2 N K B t M N K B ] N K × M
and ξ o B is o-th output weight value of TFWBC; o = 1 , 2 , O with O represents the dimensionality of the output in the TFWBC system.
Set
Ƴ = [ Ƴ 1 , Ƴ 2 , Ƴ o , Ƴ O ] N K × O
where { Ƴ 1 = T B I × ξ 1 B Ƴ 2 = T B I × ξ 2 B   Ƴ n o = T B I × ξ O B .
Set
ξ B = [ ξ 1 B ,   ξ 2 B , ,   ξ o B ,   ,   ξ O B ] T O
Then
Ω B = T B T I ξ B T N K × O
(c)
Sub-output Storage ( u B )
u B = Ω B T Ψ B = ( T B T I ξ B T ) T Ψ = ξ B I T T B Ψ B O

3.3. TFWCC Branch

f i j k C is Wavelet function
f i j k C = ( I i m i j k C δ i j k C ) exp ( ( I i m i j k C ) 2 δ i j k C 2 )
where m i j k C and δ i j k C are, respectively, the mean and variance of TFWCC.
(a)
Receptive-field Storage ( ψ C ): Each block value is the product of the equivalent block of the recurrent associative memory storage, R, which is determined by the following:
ψ j k C = ( i = 1 n i f i j k C )
Let
ψ C = [ ψ 11 C , ,   ψ 1 K C , ,   ψ N 1 C , ,   ψ N K C ] T N K
(b)
Weight Memory Storage  ( Ω C ) :
Let
Ω o C = [ t 111 C t 211 C t M 11 C       t 11 K C t 21 K C t M 1 K C t 121 C t 221 C t N 11 C       t 12 K C t 22 K C t M 2 K C       t 1 N 1 C t 2 N 1 C t M N 1 C       t 1 N K C t 2 N K C t M N K C ] [ I 1 I 2 I M ] × ξ o C = T C T I × ξ o C N K
where T C T = [ t 111 C t 211 C t M 11 C       t 11 K C t 21 K C t M 1 K C t 121 C t 221 C t N 11 C       t 12 K C t 22 K C t M 2 K C       t 1 N 1 C t 2 N 1 C t M N 1 C       t 1 N K C t 2 N K C t M N K C ] N K × M .
ξ o C is the o-th output weight value of TFWCC, and O is the output dimension of TFWCC.
Set
Ω C = [ Ω 1 C , Ω 2 C , ,   Ω o C , ,   Ω O C ] N K × O
where { Ω 1 C = T C T I × ξ 1 C Ω 2 C = T C T I × ξ 2 C   Ω O C = T C T I × ξ O C .
Set
ξ C = [ ξ 1 C ,   ξ 2 C , ,   ξ o C ,   ,   ξ O C ] T O
Then
Ω C = T C T I ξ C T N K × O

3.4. Output Storage (u)

The output of the proposed TFWBCC is defined as follows:
u T F W B C C = u B u C = ξ B I T T B Ψ B ξ C I T T C Ψ C
Then
Ω C = T C T I ξ C T N K × O
Figure 1. The diagram for chaotic synchronization using the proposed TFWBCC.
Figure 1. The diagram for chaotic synchronization using the proposed TFWBCC.
Mathematics 13 00923 g001
Figure 2. The architecture of the proposed TFWBCC.
Figure 2. The architecture of the proposed TFWBCC.
Mathematics 13 00923 g002
There always exists an approximate error ε = u u between the proposed TFWBCC and the ideal controller. Thus,
u * = u T S K H M * + ε = ξ B * I T T B * Ψ B * ξ C * I T T C * Ψ C * + ε
where ε is a minimum error vector; ξ B * , T B * , Ψ B * , ξ C * , T C * , Ψ C * are the optimal parameter matrices and vectors of ξ B , T B , Ψ B , ξ C , T C , Ψ C . However, the ideal controller may be unattainable. Therefore, a compensation is used to calculate with the ideal controller.
u ^ = u ^ T F W B C C + u T C = ξ ^ B I T T ^ B Ψ ^ B ξ ^ C I T T ^ C Ψ ^ C + u T C
where u ^ T F W B C C is the estimated TFWBCC, u T C is the robust compensator using to estimate the approximate error ε . ξ ^ B , T ^ B , Ψ ^ B , ξ ^ C , T ^ C , Ψ ^ C are the estimate values of the optimal parameter matrices and vectors ξ B * , T B * , Ψ B * , ξ C * , T C * , Ψ C * , respectively. From Equations (29) and (30), the approximate error can be calculated as follows:
u ˜ = u * u ^ = ξ B * I T T B * Ψ B * ξ C * I T T C * Ψ C * + ε ξ ^ B I T T ^ B Ψ ^ B + ξ ^ C I T T ^ C Ψ ^ C u S
where ξ ^ B = ξ B * ξ ˜ B , T ^ B = T B * T ˜ B , Ψ ^ B = Ψ B * Ψ ˜ B , ξ ^ C = ξ C * ξ ˜ C , T ^ C = T C * T ˜ C ,   Ψ ^ C = Ψ C * Ψ ˜ C .
The extension of Ψ ˜ B   and   Ψ ˜ C in the Taylor series can be achieved as follows [39]:
{ Ψ ˜ B = Ψ ˜ m B B m ˜ B + Ψ δ B B δ ˜ B + O Ψ B Ψ ˜ C = Ψ ˜ m C C m ˜ C + Ψ δ C C δ ˜ C + O Ψ C
where m ˜ B = m B * m ^ B , δ ˜ B = δ B * δ ^ B , m ˜ C = m C * m ^ C , δ ˜ C = δ C * δ ^ C ; O Ψ B   and   O Ψ c are, respectively, higher-order term vectors of Ψ B   and   Ψ C . Ψ B m B , Ψ B δ B , Ψ C m C , Ψ C δ C , are defined by:
{ [ Ψ B m B ] = [ 0 , , 0 ( j 1 ) × N , ψ 11 B m B , , ψ N K B m B , 0 , , 0 ( N 1 ) × M ] [ Ψ B δ B ] = [ 0 , , 0 ( j 1 ) × n j , ψ 11 B δ B , , ψ N K B δ B , 0 , , 0 ( N 1 ) × M ] [ Ψ C m C ] = [ 0 , , 0 ( j 1 ) × N , ψ 11 C m C , , ψ N K C m C , 0 , , 0 ( N 1 ) × M ] [ Ψ C δ C ] = [ 0 , , 0 ( j 1 ) × n j , ψ 11 C δ B , , ψ N K C δ B , 0 , , 0 ( N 1 ) × M ]
From Equation (33), we can attain:
{ Ψ B * = Ψ ^ B + Ψ ˜ m B B m ˜ B + Ψ δ B B δ ˜ B + O Ψ B Ψ C * = Ψ ^ C + Ψ ˜ m C C m ˜ C + Ψ δ C C δ ˜ C + O Ψ C
Substituting Equation (34) to Equation (31), yields:
u ˜ = = ξ ˜ B I T T ^ B Ψ ^ B + ξ ^ B I T T ˜ B Ψ ^ B ξ ˜ C I T T ^ C Ψ ^ C ξ ^ C I T T ˜ C Ψ ^ C + ξ ^ B I T T ^ B Ψ ˜ m B B m ˜ B + ξ ^ B I T T ^ B Ψ δ B B δ ˜ B ξ ^ C I T T ^ C Ψ m C C m ˜ C ξ ^ C I T T ^ C Ψ δ C C δ ˜ C + Ξ ( t ) u T C
where
Ξ ( t ) = ξ ˜ B I T T ˜ B Ψ ^ B + ξ ^ B I T T ^ B O Ψ B ξ ˜ C I T T ˜ C Ψ ^ C ξ ^ C I T T ^ C O Ψ C + ( ξ ^ B I T T ˜ B + ξ ˜ B I T T ^ B + ξ ˜ B I T T ˜ B ) ( Ψ ˜ m B B m ˜ B + Ψ δ B B δ ˜ B + O Ψ B ) ( ξ ^ C I T T ˜ C + ξ ˜ C I T T ^ C + ξ ˜ C I T T ˜ C ) ( Ψ ˜ m C C m ˜ C + Ψ δ C C δ ˜ C + O Ψ C ) + ε
It is supposed that Ξ ( t ) is bounded by | Ξ ( t ) | < E , and 0 | ε | E , where E represents a constant with a positive value.
Theorem 1. 
Consider a four-dimensional hyperchaotic system described by Equations (1) and (2). The introduced TFWBCC framework is formulated in Equation (28), incorporating updated parameters from Equations (36)–(43). Additionally, the robust compensator is specified in Equation (44) and governed by the adaptive update law in Equation (45). Under these conditions, the stability of the robust system is assured.
m ^ ˙ B = n m B ( Ψ m B B ) T T ^ B T I ξ ^ B T s ( t )
m ^ ˙ C = n m C ( Ψ m C C ) T T ^ C T I ξ ^ C T s ( t )
ξ ^ ˙ B = n ξ B ( Ψ ξ B B ) T T ^ B T I ξ ^ B T s ( t )
ξ ^ ˙ C = n ξ C ( Ψ ξ B C ) T T ^ C T I ξ ^ C T s ( t )
T ^ ˙ B = n T B I ξ ^ B T s ( t ) Ψ ^ B T
ξ ^ ˙ C = n ξ C s ( t ) Ψ ^ C T T ^ C T I
ξ ^ ˙ B = n ξ B s ( t ) Ψ ^ B T T ^ B T I
where n ξ C , n T B , n T C , n m B , n ξ B , n m C , n ξ C , n ξ B are learning rates, and u T C is a hyperbolic tangent compensator,
u T C = E ^ tanh ( s ( t ) Δ )
where E ^ denotes estimated value of the approximation error bound, Δ denotes a positive parameter, and tanh(.) denotes a hyperbolic tangent function, then
E ^ . = n E [ s ( t ) tanh ( s ( t ) Δ ) ] α ( E ^ E 0 ) ]
where α is a positive coefficient, E 0 is initial value of E.
Proof. 
Set sliding mode control function as follows:
s ( t ) = e ( t ) + H e d t
where s ( t ) = [ s 1 ( t ) , s 2 ( t ) , s 3 ( t ) , s 4 ( t ) ] T . The differential equation of s ( t ) is taken as follows:
s ˙ ( t ) = ξ ˜ B I T T ^ B Ψ ^ B + ξ ^ B I T T ˜ B Ψ ^ B ξ ˜ C I T T ^ C Ψ ^ C ξ ^ C I T T ˜ C Ψ ^ C + ξ ^ B I T T ^ B Ψ ˜ m B B m ˜ B + ξ ^ B I T T ^ B Ψ δ B B δ ˜ B ξ ^ C I T T ^ C Ψ m C C m ˜ C ξ ^ C I T T ^ C Ψ δ C C δ ˜ C + Ξ ( t ) u T C
Equation (46) is calculated via Equation (35) as follows:
s ˙ ( t ) = u ˜ = ξ ˜ B I T T ^ B Ψ ^ B + ξ ^ B I T T ˜ B Ψ ^ B ξ ˜ C I T T ^ C Ψ ^ C ξ ^ C I T T ˜ C Ψ ^ C + ξ ^ B I T T ^ B Ψ ˜ m B B m ˜ B + ξ ^ B I T T ^ B Ψ δ B B δ ˜ B ξ ^ C I T T ^ C Ψ m C C m ˜ C ξ ^ C I T T ^ C Ψ δ C C δ ˜ C + Ξ ( t ) u T C
Choosing the Lyapunov function as follows:
V ( t ) = 1 2 n δ B δ ˜ B T δ ˜ B + 1 2 n m C m ˜ C T m ˜ C + 1 2 n δ C δ ˜ C T δ ˜ C + E ˜ 2 2 n E + 1 2 s T ( t ) s ( t ) + 1 2 n ξ B ξ ˜ B T ξ ˜ B + 1 2 n T B t r ( T ˜ B T T ˜ B ) + 1 2 n ξ C ξ ˜ C T ξ ˜ C + 1 2 n T C t r ( T ˜ C T T ˜ C ) + 1 2 n m B m ˜ B T m ˜ B
Then,
V ˙ ( t ) = s T ( t ) ( ξ ˜ B I T T ^ B Ψ ^ B + ξ ^ B I T T ˜ B Ψ ^ B ξ ˜ C I T T ^ C Ψ ^ C ξ ^ C I T T ˜ C Ψ ^ C + ξ ^ B I T T ^ B Ψ ˜ m B B m ˜ B                    + ξ ^ B I T T ^ B Ψ δ B B δ ˜ B ξ ^ C I T T ^ C Ψ m C C m ˜ C ξ ^ C I T T ^ C Ψ δ C C δ ˜ C + Ξ ( t ) u T C )             1 n ξ B ξ ˜ B T ξ ^ ˙ B 1 n T B t r ( T ˜ B T T ^ ˙ B ) 1 n ξ C ξ ˜ C T ξ ^ ˙ C 1 n T C t r ( T ˜ C T T ^ ˙ C ) + 1 n m B m ˜ B T m ˜ ˙ B             1 n δ B δ ˜ B T δ ^ ˙ B 1 n m C m ˜ C T m ^ ˙ C 1 n δ C δ ˜ C T δ ^ ˙ C + E ˜ E ˜ ˙ n E = ( s T ( t ) ξ ˜ B I T T ^ B Ψ ^ B 1 n ξ B ξ ˜ B T ξ ^ ˙ B ) + ( s T ( t ) ξ ^ B I T T ˜ B Ψ ^ B 1 n T B t r ( T ˜ B T T ^ ˙ B ) ) ( s T ( t ) ξ ˜ C I T T ^ C Ψ ^ C + 1 n ξ C ξ ˜ C T ξ ^ ˙ C )    ( s T ( t ) ξ ^ C I T T ˜ C Ψ ^ C + 1 n T C t r ( T ˜ C T T ^ ˙ C ) + ( s T ( t ) ξ ^ B I T T ^ B Ψ ˜ m B B m ˜ B 1 n m B m ˜ B T m ^ ˙ B ) + ( s T ( t ) ξ ^ B I T T ^ B Ψ δ B B δ ˜ B 1 n δ B δ ˜ B T δ ^ ˙ B )    ( s T ( t ) ξ ^ C I T T ^ C Ψ m C C m ˜ C + 1 n m C m ˜ C T m ^ ˙ C ) ( s T ( t ) ξ ^ C I T T ^ C Ψ δ C C δ ˜ C + 1 n δ C δ ˜ C T δ ˜ ˙ C ) + s T ( Ξ ( t ) u T C ) + E ˜ E ˜ ˙ n E = ξ ˜ B T ( Ψ ^ B T T ˜ B T I s ( t ) 1 n ξ B ξ ^ ˙ B ) + j = 1 N T ˜ B T ( Ι ξ ^ B T s ( t ) Ψ ^ B T 1 n T B T ^ ˙ B ) ξ ˜ C T ( Ψ ^ C T T ^ C T I s ( t ) + 1 n ξ C ξ ˜ ˙ C ) j = 1 N T ˜ C T ( I ξ ^ C T s ( t ) Ψ ^ C T + 1 n T C T ^ ˙ C ) + m ˜ B T ( Ψ ˜ m B B T T ^ B T ξ ^ B T s ( t ) 1 n m B m ^ ˙ B ) + δ ˜ B T ( Ψ δ B B T T ^ B T I ξ ^ B T s ( t ) 1 n δ B δ ^ ˙ B ) m ˜ C T ( Ψ ˜ m C C T T ^ C T ξ ^ C T s ( t ) + 1 n m C m ^ ˙ C ) δ ˜ C T ( Ψ δ C C T T ^ C T I ξ ^ C T s ( t ) + 1 n δ C δ ˜ ˙ C ) + s T ( Ξ ( t ) u T C ) + E ˜ E ˜ ˙ n E
Remark 1. 
ξ B * , T B * , Ψ B * , ξ C * , T C * , Ψ C * , m B * , δ B * , m C * , δ C * are constants, therefore, ξ ˜ ˙ B = ξ ^ ˙ B , T ˜ ˙ B = T ^ ˙ B , Ψ ˜ ˙ B = Ψ ^ ˙ B , ξ ˜ ˙ C = ξ ^ ˙ C , T ˜ ˙ C = T ^ ˙ C , Ψ ˜ ˙ C = Ψ ^ ˙ C , m ˜ ˙ B = m ^ ˙ B , δ ˜ ˙ B = δ ^ ˙ B , m ˜ ˙ C = m ^ ˙ C , and δ ˜ ˙ C = δ ^ ˙ C .
Remark 2. 
{ s T ( t ) ξ ˜ B I T T ^ B Ψ ^ B = Ψ ^ B T T ^ B T I ξ ˜ B T s ( t ) s T ( t ) ξ ^ B I T T ˜ B Ψ ^ B = Ψ ^ B T T ˜ B T I ξ ^ B T s ( t ) s T ( t ) ξ ˜ C I T T ^ C Ψ ^ C = Ψ ^ C T T ^ C T I ξ ˜ C T s ( t ) s T ( t ) ξ ^ C I T T ˜ C Ψ ^ C = Ψ ^ C T T ˜ C T I ξ ^ C T s ( t ) s T ( t ) ξ ^ B I T T ^ B Ψ ˜ m B B m ˜ B = m ˜ B T Ψ ˜ m B B T T ^ B T ξ ^ B T s ( t ) s T ( t ) ξ ^ B I T T ^ B Ψ δ B B δ ˜ B = δ ˜ B T Ψ δ B B T T ^ B T I ξ ^ B T s ( t ) s T ( t ) ξ ^ C I T T ^ C Ψ m C C m ˜ C = m ˜ C T Ψ ˜ m C C T T ^ C T ξ ^ C T s ( t ) s T ( t ) ξ ^ C I T T ^ C Ψ δ C C δ ˜ C = δ ˜ C T Ψ δ C C T T ^ C T I ξ ^ C T s ( t )
Remark 3. 
For 4D hyper chaotic, M = O = 4 ; N = 4 ,   and   K = 2 .
Via the hyperbolic tangent compensator in Equation (43) and the update parameters in Equations (36)–(42) and Equation (44), V ˙ ( t ) becomes:
V ˙ ( t ) = s T ( Ξ ( t ) u T C ) + E ˜ E ˜ ˙ n E = s T ( Ξ ( t ) E ^ tanh ( s ( t ) Δ ) ) E ˜ E ^ . n E = s T ( t ) ( Ξ ( t ) E ^ tanh ( s ( t ) Δ ) ) E ˜ n E n E ( s T ( t ) tanh ( s ( t ) Δ ) α ( E ^ E 0 ) ) E ( s T ( t ) s T ( t ) tanh ( s ( t ) Δ ) ) + E ˜ α ( E ^ E 0 )
for Δ > 0, attains
0 s T ( t ) s T ( t ) tanh ( s ( t ) Δ ) β Δ
where β is a positive coefficient that satisfies β = exp ( ( β + 1 ) ) . Using inequality (50), (49) can be rewritten as follows:
V ˙ ( t ) α E ˜ ( E ^ E 0 ) + E Δ υ 1 2 α ( ( E E ^ ) 2 ( E E 0 ) 2 ) + E Δ υ                1 2 α E ˜ 2 + 1 2 α ( E E 0 ) 2 + E Δ υ
V ˙ λ 1 V + λ 2
where λ 1 and λ 2 are positive constants given by the following:
{ λ 1 = α n E λ 2 = E α β + 1 2 α ( E E 0 ) 2
Meanwhile ρ = λ 1 λ 2 > 0 and the solution of Equation (52) satisfies:
0 V ρ + ( V 0 ρ ) e λ 1 t
where V 0 is the initial value of V , then E is bound [39,40]. From Equation (54),
1 2 e i 2 ρ + ( V 0 ρ ) e ω ¯ t ρ + V 0 e λ 1 t
So
e i 2 2 ( ρ + V 0 e λ 1 t )
which implies ϖ > 2 ρ , such that for all t T , the tracking error system satisfies:
| e i ( t ) | < ϖ   for   i = 1 , 2 M
Here, ϖ represents a positive constant. A small value is selected for ϖ , ensuring that the finite time remains extended, which results in accurate error tracking. Consequently, the stability of the suggested system is assured [39,40].

4. Synchronization of a 4D Hyper Chaotic System [38]

This part of the study evaluates the performance of the proposed control approach by conducting extensive computational experiments in MATLAB/Simulink R2022b. The specific parameter values for the four-dimensional hyperchaotic model can be found in Table 3.
The function rand(.) generates a random value within the interval [0, 1]. For the TFWBCC control framework, the chosen parameter settings are specifically tailored to its operation. A detailed overview of these parameters is provided in Table 4.
Figure 3 showcases the projection views of the synchronized states in the four-dimensional hyper-chaotic system using the TFWBCC approach. In Figure 4, the comparative analysis of state trajectories between the master and slave systems under the proposed TFWBCC methodology is illustrated. Figure 5 highlights the tracking error evolution, while Figure 6 visualizes the applied control inputs. The simulation results confirm that the proposed strategy successfully achieves synchronization with minimal tracking deviations.
Notably, the TFWBCC method significantly reduces the average RMSE, attaining the lowest error value among all compared techniques (see Table 5). However, due to its complex structure, the computational cost is higher. This trade-off is reasonable, as improved synchronization accuracy generally comes at the expense of increased processing demands. Specifically, the average RMSE of TFWBCC is reduced by a factor of 2.004 compared to the CMAC [32] method, 1.923 times compared to RCMAC [35], 1.8829 times compared to TSKCMAC [13], and 1.8153 times compared to BELC [13]. Additionally, the computation time of the TFWBCC approach is 5.6923 times lower than that of CMAC [32], 5.2857 times lower than RCMAC [35], and 4.3529 times lower than BELC [13].

5. The Application of 4D Master–Slave Chaotic Synchronization for Medical Image Encryption

The following outlines the image security algorithm:
Step 1: The original medical image undergoes a sorting process based on a dual-number scheme [13,41]
I = [ I 1 , I 2 , I 3 ,   I m n ]
where m and n are the length size and width size of the original image, respectively.
Step 2: Synchronize the master and the slave system.
Step 3: After the synchronization, discrete the master system of the chaotic 4D system
{ B ( j ) ,   j = 1 , 2 , p × q }
where j = 1, 2, … p × q represents the index of the j-th iteration within the chaotic system’s progression.
Step 4: The initial step involves thoroughly preprocessing the decimal value as follows:
C = round ( mod ( ( abs ( c m ( j ) ) floor ( abs ( c m ( j ) ) ) × 10 8 , 256 ) )
where round(x) approximates x to the nearest whole number, mod(x, y) computes the remainder when x is divided by y, abs(x) determines the absolute magnitude of x, and floor(x) rounds x down to the nearest integer that is less than or equal to x.
Step 5: The process of image encryption is integrated with the primary chaotic system through the application of the XOR logical operation, as described below
G = de 2 bi ( I ) de 2 bi ( C )
here, de2bi(.) transforms a decimal number into its binary equivalent, while represents the logical XOR operation.
Step 6: Convert the binary representation of G into decimal form, then reorganize X = [ X 1 , X 2   ,   X p × q ] to generate the encrypted image.
Step 7: Decryption Procedure.
The decryption method reverses the encryption steps, with the key difference being that the master chaotic time series is substituted by the corresponding slave chaotic time series. The structure of the medical image encryption using master–slave chaotic synchronization is presented in Figure 7.
Some statistical analyses are performed to validate the proposed algorithm, such as histogram analysis and entropy analysis and NIST-SP800-22 test.

5.1. Histogram Examination

A histogram represents the pixel distribution within an image. To ensure security, the encrypted image must exhibit a distinct statistical distribution compared to the original plain image (refer to Figure 8 and Figure 9).

5.2. Entropy

Entropy quantifies the dispersion of grayscale values within an image. A uniform distribution results in a higher entropy value, reaching a theoretical maximum of 8. The entropy calculation is defined as follows:
E ( ζ j ) = j = 0 2 N 1 P ( ζ j ) log 2 1 P ( ζ j )
where 2N represents the total number of states in the information source, while E ( ζ j ) denotes the probability of occurrence for the symbol ζ j . An ideally random image, R, exhibits a uniform pixel intensity distribution within the range [0, 255], implying that the probability P ( ζ j ) is equal to 1/2561/2561/256 for every j within [0, 255].
The entropy of the original image and the scrambled image is described in Table 6. The different values between the original and the brain show that our method works well. Table 6 shows the entropy of the scrambled images of our method compared to other methods. It can be seen that our method achieves a value close to 8, namely 7.9988 for the scrambled image lung and 7.9967 for the scrambled image ruptured brain. Our method gives the highest value among all methods. This shows that the content of the image is secure when there is an attack on the image information.

5.3. NIST SP800-22 Test

Referring to [42], the randomness of output sequences is evaluated using the National Institute of Standards and Technology (NIST) SP800-22 test suite. This standard includes 15 distinct subtests, each producing a p-value. To be considered random, the resulting p-value for each subtest must lie between 0.01 and 1. Table 7 presents the assessment results for a 100-bit sample derived from 262,144 (512 × 512) bits of the encrypted “Brain Image”. The findings indicate that all p-values from the 15 subtests fall within the permissible range of 0–1, demonstrating that the encrypted image’s binary sequences successfully meet the randomness criteria. Consequently, the encryption effectively ensures pixel-level randomness.

5.4. Cropping Attack Analysis

Our approach effectively handles data loss caused by cropping attacks. Figure 10 a,c,e displays scrambled images with varying levels of data removal—specifically, 1/16, 1/4, and 1/2 of the original content. Correspondingly, Figure 10b,d,f showcase the reconstructed images after decryption. The results indicate that our technique successfully recovers missing data. A comparative analysis in Table 8 demonstrates that our method achieves a higher PSNR value, validating its superior ability to reconstruct images even in the presence of data loss.

5.5. Image with Noise Analysis

To evaluate the effectiveness of the suggested approach, an image with adjustable noise parameters—both mean and variance—is utilized. This allows for an assessment of how varying levels of degradation impact on the method’s ability to encode the image while minimizing data loss. In this analysis, a lung image serves as the benchmark for testing the proposed technique. Figure 11 presents the encoded image subjected to Salt and Pepper Noise (SPN) with noise variances of 0.005, 0.05, and 0.1. The corresponding PSNR values, which are detailed in Table 9, indicate that (1) our encoding algorithm demonstrates significant robustness against SPN, maintaining PSNR values above 5.8 dB, and (2) the reconstructed images retain superior visual quality. These results confirm the method’s strong resistance to noise-induced distortions.

6. Conclusions

This research introduces a novel synchronization strategy for a four-dimensional hyper-jerk hyper-chaotic system. To accomplish this, adaptive parameter laws are formulated using a hybrid neural framework that combines TFWBC and TFWCC. The Lyapunov stability theorem is employed to establish online learning rules, ensuring both stability and system convergence. The proposed control mechanism effectively synchronizes the 4D master–slave hyper-jerk hyper-chaotic system with high precision. Additionally, the innovative TFWBCC approach is utilized to achieve synchronization of the chaotic states within the 4D Lorenz system. Furthermore, it is highlighted that this method can be applied to enhance the secure transmission of medical images. Simulation outcomes confirm the robustness and efficiency of the proposed control and encryption/decryption techniques. Statistical analyses further validate that the encryption/decryption approach ensures a high level of security.
Future advancements will first focus on adapting the proposed approach for hardware implementation, along with the development of a novel optimization algorithm, specifically an improved sparrow swarm optimization, will be implemented to improve the performance of the TFWBCC. In this study, we proposed a novel method for medical image encryption, demonstrating its effectiveness in ensuring data security and privacy. While the primary focus has been on medical imaging, the proposed approach holds significant potential for broader applications. Future studies could also explore its adaptation to other domains, such as secure communication systems, IoT device data encryption, and financial data protection. Investigating these avenues would further validate the versatility and scalability of the method, addressing critical security challenges across diverse fields. We believe these explorations will open new research directions and enhance the practical impact of the proposed framework.

Author Contributions

D.H.P. and M.T.V. jointly contributed to the conceptualization and methodology of the study. D.H.P. and M.T.V. were responsible for software development, validation, formal analysis, resource management, data curation, original draft preparation, review and editing, visualization (alongside M.T.V.), and supervision. M.T.V. handled project administration and secured funding. All authors have read and agreed to the published version of the manuscript.

Funding

This study did not receive any external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Alber, D.A.; Yang, Z.; Alyakin, A.; Yang, E.; Rai, S.; Valliani, A.A.; Zhang, J.; Rosenbaum, G.R.; Amend-Thomas, A.K.; Kurland, D.B.; et al. Medical large language models are vulnerable to data-poisoning attacks. Nat. Med. 2025, 31, 618–626. [Google Scholar] [CrossRef]
  2. Wang, W.; Yan, D.; Wu, X.; He, W.; Chen, Z.; Yuan, X.; Li, L. Low-light image enhancement based on virtual exposure. Signal Process. Image Commun. 2023, 118, 117016. [Google Scholar] [CrossRef]
  3. An, X.; Du, L.; Jiang, F.; Zhang, Y.; Deng, Z.; Kurths, J. A few-shot identification method for stochastic dynamical systems based on residual multipeaks adaptive sampling. Chaos Interdiscip. J. Nonlinear Sci. 2024, 34, 073118. [Google Scholar] [CrossRef]
  4. Polson, L.A.; Fedrigo, R.; Li, C.; Sabouri, M.; Dzikunu, O.; Ahamed, S.; Karakatsanis, N.; Kurkowska, S.; Sheikhzadeh, P.; Esquinas, P.; et al. PyTomography: A python library for medical image reconstruction. SoftwareX 2025, 29, 102020. [Google Scholar] [CrossRef]
  5. Lu, S.Y.; Zhu, Z.; Tang, Y.; Zhang, X.; Liu, X. CTBViT: A novel ViT for tuberculosis classification with efficient block and randomized classifier. Biomed. Signal Process. Control 2025, 100, 106981. [Google Scholar] [CrossRef]
  6. Cai, L.; Fang, H.; Xu, N.; Ren, B. Counterfactual Causal-Effect Intervention for Interpretable Medical Visual Question Answering. IEEE Trans. Med. Imaging 2024, 43, 4430–4441. [Google Scholar] [CrossRef]
  7. Liu, X.; Yang, J. A novel multi-layer image encryption algorithm based on 2D drop-wave function. Nonlinear Dyn. 2025, 113, 1775–1797. [Google Scholar] [CrossRef]
  8. Han, X.; Li, Y.; Liu, W.; Chen, X.; Song, Z.; Wang, X.; Deng, Y.; Tang, X.; Jiang, Z. The Applications of Magnetic Particle Imaging: From Cell to Body. Diagnostics 2020, 10, 800. [Google Scholar] [CrossRef] [PubMed]
  9. Bing, P.; Liu, W.; Zhai, Z.; Li, J.; Guo, Z.; Xiang, Y.; He, B.; Zhu, L. A novel approach for denoising electrocardiogram signals to detect cardiovascular diseases using an efficient hybrid scheme. Front. Cardiovasc. Med. 2024, 11, 1277123. [Google Scholar] [CrossRef] [PubMed]
  10. Lai, Q.; Hua, H. Secure medical image encryption scheme for Healthcare IoT using novel hyperchaotic map and DNA cubes. Expert Syst. Appl. 2025, 264, 125854. [Google Scholar] [CrossRef]
  11. Wang, Y.; Xu, Y.; Song, J.; Liu, X.; Liu, S.; Yang, N.; Wang, L.; Liu, Y.; Zhao, Y.; Zhou, W.; et al. Tumor Cell-Targeting and Tumor Microenvironment–Responsive Nanoplatforms for the Multimodal Imaging-Guided Photodynamic/Photothermal/Chemodynamic Treatment of Cervical Cancer. Int. J. Nanomed. 2024, 19, 5837–5858. [Google Scholar] [CrossRef] [PubMed]
  12. Chu, L.; Su, Y.; Zan, X.; Lin, W.; Yao, X.; Xu, P.; Liu, W. A Deniable Encryption Method for Modulation-Based DNA Storage. Interdiscip. Sci. Comput. Life Sci. 2024, 16, 872–881. [Google Scholar] [CrossRef]
  13. Lin, C.-M.; Pham, D.-H.; Huynh, T.-T. Encryption and decryption of audio signal and image secure communications using chaotic system synchronization control by TSK fuzzy brain emotional learning controllers. IEEE Trans. Cybern. 2021, 52, 13684–13698. [Google Scholar] [CrossRef] [PubMed]
  14. Giap, V.N.; Pham, D.H.; Lin, C.-M.; Trinh, M.H.; Le, M.C.; Nguyen, Q.D. Fractional Order T–S Fuzzy Chaotic Models for Secure EEG Signal via a Wireless Communication Protocol Using a Disturbance Observer and Sliding Mode Control Technique. Int. J. Fuzzy Syst. 2024, 26, 1897–1915. [Google Scholar] [CrossRef]
  15. Aliabadi, F.; Majidi, M.-H.; Khorashadizadeh, S. Chaos synchronization using adaptive quantum neural networks and its application in secure communication and cryptography. Neural Comput. Appl. 2022, 34, 6521–6533. [Google Scholar] [CrossRef]
  16. Zhang, S.; Peng, X.; Wang, X.; Chen, C.; Zeng, Z. A Novel Memristive Multiscroll Multistable Neural Network with Application to Secure Medical Image Communication. IEEE Trans. Circuits Syst. Video Technol. 2024, 35, 1774–1786. [Google Scholar] [CrossRef]
  17. Katsikis, V.N.; Stanimirović, P.S.; Mourtas, S.D.; Xiao, L.; Karabašević, D.; Stanujkić, D. Zeroing neural network with fuzzy parameter for computing pseudoinverse of arbitrary matrix. IEEE Trans. Fuzzy Syst. 2021, 30, 3426–3435. [Google Scholar] [CrossRef]
  18. Zhu, G.; Ma, Y.; Hu, S. Event-Sampled Adaptive Fuzzy Control of MASS via Intermittent Position Data. IEEE Trans. Emerg. Top. Comput. Intell. 2025, 1–13. [Google Scholar] [CrossRef]
  19. Luo, Y.; Huang, Y.; Yu, F.; Liang, D.; Lin, H. Adaptive Asymptotic Shape Synchronization of a Chaotic System with Applications for Image Encryption. Mathematics 2025, 13, 128. [Google Scholar] [CrossRef]
  20. Liu, X.; Lv, H. Disturbance Observer-based Adaptive Synchronization of Heterogeneous Chaotic Systems with Uncertainties via DNA Strand Displacement. IEEE Trans. Comput. Biol. Bioinform. 2025, 22, 250–260. [Google Scholar] [CrossRef]
  21. Li, K.; Liu, X. Fuzzy Adaptive Cooperative Prescribed Time Control for Nonlinear Vehicular Platoon Systems. IEEE Trans. Fuzzy Syst. 2025, 1–10. [Google Scholar] [CrossRef]
  22. Yi, J.; Mao, J.; Zhang, H.; Chen, Y.; Liu, T.; Zeng, K.; Xie, H.; Wang, Y. Balancing Accuracy and Efficiency with a Multiscale Uncertainty-Aware Knowledge-Based Network for Transmission Line Inspection. IEEE Trans. Ind. Inform. 2025, 1–10. [Google Scholar] [CrossRef]
  23. Dang, G.; Wang, D. Online Self-Learning Fuzzy Recurrent Stochastic Configuration Networks for Modeling Nonstationary Dynamics. IEEE Trans. Fuzzy Syst. 2025, 1–14. [Google Scholar] [CrossRef]
  24. Fan, Q.; Ji, D. Identification and Convergence Analysis of Interval Type-2 Takagi-Sugeno-Kang Fuzzy Systems for High-Dimensional Classification Problems. IEEE Trans. Fuzzy Syst. 2025, 1–16. [Google Scholar] [CrossRef]
  25. Li, Y.; Zhou, E.; Vong, C.-M.; Wang, S. Stacked Ensemble of Extremely Interpretable Takagi–Sugeno–Kang Fuzzy Classifiers for High-Dimensional Data. IEEE Trans. Syst. Man Cybern. Syst. 2025, 1–12. [Google Scholar] [CrossRef]
  26. Shirgir, S.; Farahmand-Tabar, S. An enhanced optimum design of a Takagi-Sugeno-Kang fuzzy inference system for seismic response prediction of bridges. Expert Syst. Appl. 2025, 266, 126096. [Google Scholar] [CrossRef]
  27. Liu, C.-L.; Chang, Y.-H. Learning from imbalanced data with deep density hybrid sampling. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 7065–7077. [Google Scholar] [CrossRef]
  28. Liu, A.; Zhao, H.; Song, T.; Liu, Z.; Wang, H.; Sun, D. Adaptive control of manipulator based on neural network. Neural Comput. Appl. 2021, 33, 4077–4085. [Google Scholar] [CrossRef]
  29. Liang, H.; Liu, G.; Zhang, H.; Huang, T. Neural-network-based event-triggered adaptive control of nonaffine nonlinear multiagent systems with dynamic uncertainties. IEEE Trans. Neural Netw. Learn. Syst. 2020, 32, 2239–2250. [Google Scholar] [CrossRef] [PubMed]
  30. Murugan, S.; Anh, L.H.; Le, T.-L. Non-linear Control System Using Function-Link Fuzzy Brain Emotional Controller. Int. J. Fuzzy Syst. 2024, 26, 434–448. [Google Scholar] [CrossRef]
  31. Chao, F.; Zhou, D.; Lin, C.M.; Yang, L.; Zhou, C.; Shang, C. Type-2 Fuzzy Hybrid Controller Network for Robotic Systems. IEEE Trans Cybern 2020, 50, 3778–3792. [Google Scholar] [CrossRef] [PubMed]
  32. Lin, F.-J.; Sun, I.-F.; Yang, K.-J.; Chang, J.-K. Recurrent fuzzy neural cerebellar model articulation network fault-tolerant control of six-phase permanent magnet synchronous motor position servo drive. IEEE Trans. Fuzzy Syst. 2015, 24, 153–167. [Google Scholar] [CrossRef]
  33. Yu, Y.; Si, X.; Hu, C.; Zhang, J. A review of recurrent neural networks: LSTM cells and network architectures. Neural Comput. 2019, 31, 1235–1270. [Google Scholar] [CrossRef] [PubMed]
  34. Sherstinsky, A. Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Phys. D Nonlinear Phenom. 2020, 404, 132306. [Google Scholar] [CrossRef]
  35. Fan, R.; Li, Y. An adaptive fuzzy trajectory tracking control via improved cerebellar model articulation controller for electro-hydraulic shovel. IEEE/ASME Trans. Mechatron. 2021, 26, 2870–2880. [Google Scholar] [CrossRef]
  36. Hou, S.; Fei, J.; Chen, C.; Chu, Y. Finite-time adaptive fuzzy-neural-network control of active power filter. IEEE Trans. Power Electron. 2019, 34, 10298–10313. [Google Scholar] [CrossRef]
  37. Zheng, K.; Zhang, Q.; Hu, Y.; Wu, B. Design of fuzzy system-fuzzy neural network-backstepping control for complex robot system. Inf. Sci. 2021, 546, 1230–1255. [Google Scholar] [CrossRef]
  38. Pham, V.-T.; Vaidyanathan, S.; Volos, C.; Wang, X.; Hoang, D.V. A hyperjerk memristive system with hidden attractors. In Advances in Memristors, Memristive Devices and Systems; Springer: Berlin/Heidelberg, Germany, 2017; pp. 59–80. [Google Scholar]
  39. Huynh, T.-T.; Lin, C.-M.; Pham, T.-T.T.; Cho, H.-Y.; Le, T.-L. A modified function-link fuzzy cerebellar model articulation controller using a PI-type learning algorithm for nonlinear system synchronization and control. Chaos Solitons Fractals 2019, 118, 65–82. [Google Scholar] [CrossRef]
  40. Utkin, V.I. Sliding Modes in Control and Optimization; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
  41. Wu, Y.; Zhang, L.; Berretti, S.; Wan, S. Medical image encryption by content-aware DNA computing for secure healthcare. IEEE Trans. Ind. Inform. 2022, 19, 2089–2098. [Google Scholar] [CrossRef]
  42. Bassham, L.E., III; Rukhin, A.L.; Soto, J.; Nechvatal, J.R.; Smid, M.E.; Barker, E.B.; Leigh, S.D.; Levenson, M.; Vangel, M.; Heckert, N.A.; et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; SP 800-22 Rev. 1a; National Institute of Standards & Technology: Gaithersburg, MD, USA, 2010. [Google Scholar]
Figure 3. Visualization of a four-dimensional chaotic system in three-dimensional space.
Figure 3. Visualization of a four-dimensional chaotic system in three-dimensional space.
Mathematics 13 00923 g003
Figure 4. Utilizing TFWBCC for monitoring the path of each dimension in a four-dimensional chaotic framework.
Figure 4. Utilizing TFWBCC for monitoring the path of each dimension in a four-dimensional chaotic framework.
Mathematics 13 00923 g004
Figure 5. Application of TFWBCC to analyze the deviance signals across all dimensions in a four-dimensional chaotic model.
Figure 5. Application of TFWBCC to analyze the deviance signals across all dimensions in a four-dimensional chaotic model.
Mathematics 13 00923 g005
Figure 6. Employing TFWBCC to regulate the command signals for every dimension in a four-dimensional chaotic system.
Figure 6. Employing TFWBCC to regulate the command signals for every dimension in a four-dimensional chaotic system.
Mathematics 13 00923 g006
Figure 7. The structure of the medical image encryption using 4D master–slave chaotic synchronization.
Figure 7. The structure of the medical image encryption using 4D master–slave chaotic synchronization.
Mathematics 13 00923 g007
Figure 8. (a) The initial brain image, (b) its encrypted counterpart, (c) the decrypted version after restoration, (d) the pixel intensity distribution of the original image, (e) the histogram analysis of the encrypted image, and (f) the histogram corresponding to the decrypted image.
Figure 8. (a) The initial brain image, (b) its encrypted counterpart, (c) the decrypted version after restoration, (d) the pixel intensity distribution of the original image, (e) the histogram analysis of the encrypted image, and (f) the histogram corresponding to the decrypted image.
Mathematics 13 00923 g008
Figure 9. (a) Unaltered brain scan, (b) its encrypted transformation, (c) the restored image post-decryption, (d) intensity distribution analysis of the original image, (e) histogram visualization of the encrypted version, and (f) histogram representation of the decrypted image.
Figure 9. (a) Unaltered brain scan, (b) its encrypted transformation, (c) the restored image post-decryption, (d) intensity distribution analysis of the original image, (e) histogram visualization of the encrypted version, and (f) histogram representation of the decrypted image.
Mathematics 13 00923 g009
Figure 10. The result of brain image cropping attack, (a) 1/16 data loss, (b) 1/4 data loss, (c) 1/2 data loss, (d) decrypted image of (a), (e) decrypted image of (b), (f) decrypted image of (c).
Figure 10. The result of brain image cropping attack, (a) 1/16 data loss, (b) 1/4 data loss, (c) 1/2 data loss, (d) decrypted image of (a), (e) decrypted image of (b), (f) decrypted image of (c).
Mathematics 13 00923 g010
Figure 11. Decrypted images under different noises with different variances.
Figure 11. Decrypted images under different noises with different variances.
Mathematics 13 00923 g011
Table 1. List of abbreviations used in the article.
Table 1. List of abbreviations used in the article.
SymbolMeaning
TFWBCCTakagi–Sugeno–Kang Fuzzy Wavelet Brain Cereberal Controller
CMACCerebellar Model Articulation Controller
BELC Brain Emotional Learning Controller
RNNRecurrent Neural Network
RBFNNRadial Basis Function Neural Network
FNNFuzzy Neural Networks
NNNeural Network
TSKFSTakagi–Sugeno–Kang Fuzzy System
TWBC Takagi–Sugeno–Kang Wavelet Brain Emotional Learning Controller
TFWCCTakagi–Sugeno–Kang Wavelet Cerebellar Controller
Table 2. Key distinctions of the proposed control approach compared to existing methods.
Table 2. Key distinctions of the proposed control approach compared to existing methods.
MethodMain Advance of MethodsRobust Compensator and Convergence Analysis
Our methodConsisting TSK fuzzy system to update weights of two both channels CMAC and BELC, and using wavelet function for approximate the uncertainty of inputs more effectively.Using tanhypeboloic function as an compensate the intelligent controler with the ideal controller. Then, using Lapunov theory to propose the convergence of the proposed control system.
TSK FBELC [13]Only use Gausian function for normailize the uncertainty of the input.Only use sign function to compensate the intelligent controller with the ideal controller.
Type-2 FNN [31]Only using fuzzy inference system not use TSK fuzzy systemOnly use sign function to compensate the intelligent controller with the ideal controller.
Improved CMAC [35]Using the convergence speed of CMAC to improve the trajectory tracking performance.Using tanhypeboloic function as an compensate the intelligent controler with the ideal controller, and using Lyapunov function to propose the convergence of the control system
Function-link fuzzy CMAC [39]Using the convergence speed of CMAC to improve the trajectory tracking performance.Using tanhypeboloic function as an compensate the intelligent controler with the ideal controller, and using Lyapunov function to propose the convergence of the control system
Table 3. The parameter values of 4D master–slave hyper chaotic system.
Table 3. The parameter values of 4D master–slave hyper chaotic system.
The initial values for master system x = [ 5 5 8 3 ]
The initial values for slave system y = [ 12 20 11 9 ]
Disturbance values n ( t ) = [ 0.01 sin ( 3.14 × t )   0.01 sin ( 3.14 × t )   0.03 sin ( 3.14 × t )   0.05 sin ( 3.14 × t ) ]
Uncertainty values Δ f ( y S ) = r a n d ( . ) [ 0.1 y 1 0.1 y 2 0.1 y 3 0.1 y 4 ]
Table 4. The parameter values of the proposed TFWBCC.
Table 4. The parameter values of the proposed TFWBCC.
Values for learnig rates n ξ B , n ξ C , n T B , n T C , n m B , n ξ B , n m C , n ξ C , n E 0.01
Initial values for m i j k B and δ i j k B [−0.1, 0.1]
Initial values for m i j k C and δ i j k C [−0.1, 0.1]
Initial values range for t i j k B and t i j k C [−0.2, 0.2]
Initial values for ξ o B and ξ o C 0.001
Table 5. Evaluating the RMSE performance of TFWBCC against alternative approaches.
Table 5. Evaluating the RMSE performance of TFWBCC against alternative approaches.
MethodRMSE1RMSE2RMSE3RMSE4Average_RMSEComputation Time (s)
CMAC [32]0.05050.04410.02670.05760.04450.00013
RCMAC [35]0.04770.04250.02560.05480.04270.00014
TSKCMAC [13]0.04790.04180.02520.05350.04180.00017
BELC [13]0.04540.040490.02430.05110.04030.00029
The proposed TFWBCC0.02770.02360.01180.02580.02220.00074
Table 6. Entropy of the cipher image.
Table 6. Entropy of the cipher image.
MethodEntropy of Cipher Image LungEntropy of Cipher Image Ruptured Brain
Method TSKCMAC [13]7.98657.9851
Method TS Fuzzy [14]7.98667.9852
Proposed method7.9687.9971
Table 7. Analysis results of the NIST evaluation for the scrambled brain image.
Table 7. Analysis results of the NIST evaluation for the scrambled brain image.
Statistical Testp-Value Results
Overlapping templates0.1485The evaluation confirmed that the shuffled image met the required criteria, as all 15 subtests produced p-values falling within the acceptable threshold of 0.01 to 1.
Rank0.0416
Serial p-value 20.2351
Random-excursions0.2328
Linear complexity0.2246
Longest run0.0467
Random-excursions variant0.3578
Discrete Fourier transform0.3368
Serial p-value 10.3658
Approximate Entropy0.3285
Frequency0.249
Cumulative sums reserve0.0419
Cumulative sums forward0.0314
Runs0.8358
Universal0.5238
Table 8. Quantitative results of cropping attacks using our method.
Table 8. Quantitative results of cropping attacks using our method.
Lung Image 512 × 512Average of PSNR (Original-Decrypted Images) (dB)
TSKCMAC [13]Our Method
1/16 data loss10.234710.7549
1/4 data loss6.25426.6141
1/2 data loss5.2573 5.69453
Table 9. Image with difference noise addition.
Table 9. Image with difference noise addition.
Type of NoiseVariancesPSNR (Original-Decrypted Images) (dB)
Salt and pepper 0.0055.886591
0.055.890404
0.15.836653
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Pham, D.H.; Vu, M.T. Takagi–Sugeno–Kang Fuzzy Neural Network for Nonlinear Chaotic Systems and Its Utilization in Secure Medical Image Encryption. Mathematics 2025, 13, 923. https://doi.org/10.3390/math13060923

AMA Style

Pham DH, Vu MT. Takagi–Sugeno–Kang Fuzzy Neural Network for Nonlinear Chaotic Systems and Its Utilization in Secure Medical Image Encryption. Mathematics. 2025; 13(6):923. https://doi.org/10.3390/math13060923

Chicago/Turabian Style

Pham, Duc Hung, and Mai The Vu. 2025. "Takagi–Sugeno–Kang Fuzzy Neural Network for Nonlinear Chaotic Systems and Its Utilization in Secure Medical Image Encryption" Mathematics 13, no. 6: 923. https://doi.org/10.3390/math13060923

APA Style

Pham, D. H., & Vu, M. T. (2025). Takagi–Sugeno–Kang Fuzzy Neural Network for Nonlinear Chaotic Systems and Its Utilization in Secure Medical Image Encryption. Mathematics, 13(6), 923. https://doi.org/10.3390/math13060923

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop