Robust Multi-Mode Synchronization of Chaotic Fractional Order Systems in the Presence of Disturbance, Time Delay and Uncertainty with Application in Secure Communications

: This paper investigates the robust adaptive synchronization of multi-mode fractional-order chaotic systems (MMFOCS). To that end, synchronization was performed with unknown parameters, unknown time delays, the presence of disturbance, and uncertainty with the unknown boundary. The convergence of the synchronization error to zero was guaranteed using the Lyapunov function. Additionally, the control rules were extracted as explicit continuous functions. An image encryption approach was proposed based on maps with time-dependent coding for secure communication. The simulations indicated the effectiveness of the proposed design regarding the suitability of the parameters, the convergence of errors, and robustness. Subsequently, the presented method was applied to fractional-order Chen systems and was encrypted using the chaotic masking of different benchmark images. The results indicated the desirable performance of the proposed method in encrypting the benchmark images.


Introduction
Today, many people use digital communications in daily activities, changing this field into one of the most special human needs [1][2][3]. Additionally, digital communications facilitate commerce in different industrial and medical contexts [4,5]. In that regard, information security is vital. The digital communications system includes a transmitter, communication channel, and receiver. Information security in communication channels is of great importance. The particular importance of information security in digital communications has led to extensive studies in this domain, and scientists have presented various methods [6][7][8][9]. Encryption is one of the most important information security contexts in digital communications and includes multiple methods such as chaos theory techniques [10]. Numerous synchronization techniques for various chaotic systems have been proposed based on control techniques. Generally, chaotic systems fall into standard and fractional order types, and each is analyzed in many synchronization systems. Control methods applied in synchronization incorporate linear and nonlinear [11,12], fuzzy [13], active [14,15], backstepping [16,17], sliding mode control (SMC) [18,19], and adaptive control [20]. Lai used various methods such as designing a new memristor that is flux-controlled [21], a Lü chaos system with coexisting attractors and a nonlinear controller [22], and a new encryption algorithm performed on hyper chaotic neurons [23] to enhance image encryption security.
The idea of this paper is to employ SMC alongside three chaotic systems. To further increase efficiency, the parameters of the chaotic systems that are unknown are introduced. The authors in [24] investigated Hopf bifurcation and amplitude controls in the chaotic (1) Synchronization, despite the stepwise changes of system parameters.
(2) Determination of control rule as an explicit and continuous function that prohibits the manifestation of chattering phenomenon. (3) Synchronization is independent of the type of chaotic system. (4) Determination of several adaptive rules such that the system stability is guaranteed and the convergence of synchronization errors and estimating errors of disturbance and uncertainty boundaries converge to zero. (5) A novel secure communication design was considered the modulation function for chaotic masking.
To evaluate the performance of the proposed scheme, simulations were carried out on three fractional-order hyper-chaotic Chen systems with unknown parameters and external Big Data Cogn. Comput. 2022, 6, 51 3 of 24 disturbances. Their results indicated the adequacy and robustness of the proposed adaptive controller scheme.
The next part of this paper presents the formulation of the proposed method. It contains the fractional-order systems and adaptive synchronization of multiple FOCS with unknown parameters expressed in two transmission and circular multi-mode synchronization. This issue was also tested in the presence of disturbance. Section 4 presents the simulation results. The standard benchmark images were simulated and evaluated with the statistic criterion. The efficiency of the method was evaluated by histogram analysis, correlation analysis, number of pixel change rate (NPCR), unified average changing intensity (UACI), peak signal to noise ratio (PSNR), and information entropy. The experiment results indicated the proposed encryption method's ability to uplift security and performance. Section 6 presents the discussion of the proposed method, followed by the conclusion.

Problem Formulation
This section discusses the proposed scheme of the paper. First, fractional-order systems are presented. Subsequently, the synchronization of chaotic systems of multiple transmission fractional order is described. Finally, the multiple circular synchronizations are discussed. In both cases, adaptive rules and controllers are designed using the adaptive control method. Two examples are given to demonstrate the efficiency and performance of the proposed method.

Basic Definitions Fractional-Order Derivative
Due to simple implementation and high performance, several numerical definitions have been proposed to solve fractional differential equations [40]. This paper uses the definition of Caputo, whose fractional derivative is as follows [40]: where h (m) represents the derivative of mth order of h(x), m = [q] is the first integer that is less than q, and the Riemann-Lewil integral operator with order q of function g(x) is described as follows [40]: where Γ(q) is the gamma function and the D q operator is called the Caputo fractional operator of q order. Stability analysis of fractional-order systems by Lyapunov's direct method and determining the necessary and sufficient conditions guaranteeing stability with the Mittag-Leffler concept [41] and stability analysis based on convex of the Lyapunov functions [40] for nonlinear systems are demonstrated. Lemma 1. [40]: Suppose h(t) ∈ R is a continuous and derivable function. Then, for t ≥ t 0 , we have: Lemma 2. [40]: Suppose h(t) ∈ R n is a continuous and derivable function. Then, for t ≥ t 0 , we have: Theorem 1. [41]: Suppose x = 0 is the equilibrium point of the fractional-order system (5) and its definition domain includes the origin. Suppose V(t.x(t)) is continuous and derivable and that the Lipschitz function is relative to x such that: where 0 < q < 1 and a 1 , a 2 , a 3 , a, b are arbitrary and positive constants. Then, x = 0 is stable in the sense of Mittag-Leffler. Theorem 2. [41]: Suppose x = 0 is the equilibrium point of the fractional-order system (5), where f (x.t) satisfies the Lipshitz condition and q ∈ (0, 1). If the relations (8) and (9) are established for the Lyapunov function V(t,x(t)) and the class-K functions δ i : Then, the system (5) is asymptotically stable in the sense of Mittag-Leffler [42].
Theorem 3. [43]: For the fractional-order system (5) and the Lyapunov function V(x): 2.2. Adaptive Synchronization between One Drive System and Several Response Systems Figure 1 shows the synchronization between one master system and several slave systems.
Then, the system (5) is asymptotically stable in the sense of Mittag-Leffler [42].

Theorem 3.[43]
:For the fractional-order system (5) and the Lyapunov function ( ): Figure 1 shows the synchronization between one master system and several slave systems. The master hyper-chaotic system with unknown parameters is as follows [44]:

Adaptive Synchronization between One Drive System and Several Response Systems
where ( ) = [ , , ⋯ , ] are the state vectors of the system,  The master hyper-chaotic system with unknown parameters is as follows [44]: where x 1 (t) = [x 11 , x 12 , · · · , x 1n ] T are the state vectors of the system, f 1 (x 1 (t)) = [ f 11 , f 12 , · · · , f 1n ] T is a continuous function, H 1 (x 1 (t)) = [H 11 , H 12 , · · · , H 1n ] T is the matrix function, and θ 1 (t) = [θ 11 , θ 12 . · · · .θ 1n ] T are the basic parameters of the master system that are unknown and variable. N-1 slave hyper-chaotic systems with control function are as follows [44]: where , θ i2 , · · · , θ in ] T are the basic parameters of i th slave system, and T is the control function of i th slave system. Therefore, according to Equations (11) and (12), the synchronization of the chaotic system with the control function is stated as follows: In multimode synchronization form, the synchronization error is given as follows: For N FOCS expressed by (13), if adaptive controllers u i−1 (t) exist such that for dynamic systems the error is given by: The required conditions are: If satisfied, then the adaptive transmission multi-mode synchronization between N chaotic systems with unknown parameters is realized. The design of controllers and adaptive rules to achieve the above objective is based on the Lyapunov function, and synchronization is fulfilled with transmission mode synchronization. The controller law for u 1 (t), u 2 (t), u 3 (t), · · · , u N−1 (t) is designed as below: Therefore, the errors of dynamics are given as follows: is an approximation error, and:  In this type of synchronization, all systems (except system 1) play both slave and master roles contemporarily, which helps to achieve more complexity. Figure 2 depicts a demonstration of circular multi-mode synchronizations. type of synchronization, all systems (except system 1) play both slave and maste contemporarily, which helps to achieve more complexity.  In this case, the first chaotic system is described as the following.

Adaptive Circular Multimode Synchronization of Chaotic Systems
The N-1 chaotic systems are given as follows [44]: For N chaotic system explained by (18), if there are adaptive controllers such that the error dynamic systems are given as follows: In addition, conditions are given by: If satisfied, then an adaptive circular multi-mode synchronization between N chaotic systems with unknown parameters is accomplished.

Theorem 4.
For multi-mode synchronization of hyper-chaotic in two circular and transitional states, the following statements are satisfied.

1-A.
If the transmission and circular synchronization are established with the controllers u i (t) and m i (t), then: If transmission synchronization is established, then circular synchronization is also realized and vice versa.
Proof 2-A. The following relationships between errors exist in two synchronization modes: If the transmission synchronization is true, e i (t) → 0 ; therefore: So, circular synchronization is true. Conversely, assume that circular synchronization is true; r i (t) → 0 . Therefore: Therefore, transmission synchronization is also true. So, both types of synchronization are equivalent to each other.

Theorem 5.
The control law is identical for transmission synchronization u i (t) and circular synchronization m i (t) of the fractional-order of chaotic systems.
Proof. Utilizing the relationship between two types of errors, we have: D q e i (t) = D q e i−1 (t) + D q r i (t) Which can be acquired by substituting in Equations (14) and (23): For i = 1, we have: By the substitution of (22) in (21) we have: m i (t) = u i (t); hence, the proof is complete.

Synchronization in the Presence of Disturbance, Time Delay and Uncertainty in the Systems
In this case, the master and slave system with disturbance, time delay, and uncertainty is as follows: . . . It is assumed that F i (x i (t − τ i )) are Lipschitz, uncertainties and disturbances are bounded but with an unknown boundary.
where γ i , l i and d i are constant but unknown and g i (x i ) is definite and positive. The error dynamic is described as follows: Defining the control function as follows: whereθ i ,τ i are estimations of θ i , τ i and u i−1 (t) is the section of the control function, which is introduced below. By placing the control function in (24), the error dynamics are given as follows: Theorem 6. The error dynamics system (26) is under control law (36), the update rules (35) are stable, and the synchronization errors converge to zero despite the uncertainty, time delay, and disturbance.
Proof. By explaining the Lyapunov function as follows: Wherein: By calculating the fractional derivative of the Lyapunov function and replacing control function (27): Therefore: The disturbance and uncertainty boundary condition can be extended to the components of ∆ f i and D i (t) as follows: which we have by substituting in (30): If u i−1 j (t) is defined as follows: Through the estimation of disturbance and uncertainty bounds in u i−1 j (t), an effort was made to eliminate the effects of disturbance, delay, and uncertainty as much as possible. Therefore, Lyapunov function derivatives will be negative by selecting the proper update rules, and, ultimately, the convergence of the synchronization error to zero will be guaranteed. Then, The rules updating estimation errors are as follows: where α i , β i , σ i , µ i are positive. By placing the above update rules in (33), we have: Therefore, according to the Theorems 1 and 2 and being Hurwitz K i−1 , the stability of the system according to Mittag-Leffler is also confirmed. The convergence of synchronization errors to zero is also guaranteed despite uncertainty and disturbance.
The estimations updating rules are obtained as follows: Therefore, the final control function is as follows: Selecting u i−1 j (t) as (36) due to the presence of the discontinuous function sgn e j i−1 (t) causes discontinuity in the control function (48). This problem will be solved by correcting Equation (32) and update rules (42)(43)(44)(45)(46)(47), as well as Theorem 7.
i−1 , λ , then the control function u i−1 (t) will become continuous and the convergence of synchronization errors would be guaranteed to be at zero. Further, update rules will be as follows: where λ and ε are small positive numbers and: By classifying the function above as below: To determine update rules, we can act as below: Given the definition of function ϕ i−1 (t), the obtained update rules will be as follows: In Equation (52), it is possible that each of the estimation errors ( d i , γ i , τ i , i = 1, 2, 3, · · · N) equal zero, in which case the update rules cannot be used. Therefore, to prevent denominators from tending to zero in the update rules, the rules will be corrected as follows: where ε is positive and very small in the equation above (0 < ε 1).
In the rules above, if e j i−1 ≥ λ ⇒ ϕ i−1 (t) = 0 , they change to the previous rules (54). Hence, Equation (33) stands for e j i−1 ≥ λ. Given the definition of equation ϕ i−1 (t), we get: By placing corrected update rules (52) in (39), we get: where: Given condition e j i−1 ≥ λ ⇒ ϕ i−1 (t) = 0, we get: Which indicates the norm reduction of e i−1 , θ i , γ i , d i , and τ i . Therefore, the norm of synchronization errors is bounded.
In e j i−1 < λ, we have: and bounded. Therefore: If the tracking error enters zone e j i−1 < λ, it will remain there because, as soon as it reaches that zone, e j i−1 = λ. Given condition ϕ i−1 (t) = 0 ⇒ ρ(t) = 0 and Equation (54), the Lyapunov function derivative in the equation is as follows: Which indicates a decrease in all errors. Hence, by selecting λ and ε, which are sufficiently small, synchronization errors would consistently be very small, and synchronization will be conducted with proper precision.
Therefore, the final control function is as follows: Note 2: Theorems 5 and 6 are valid despite the uncertainty and disturbance, because the nature of their proof does not depend on the existence or non-existence of uncertainty and disturbance. Therefore, the problem of circular multi-mode synchronization is addressed in the presence of uncertainty and disturbance.

Application in Secure Communication Based on Mapping and Chaotic Masking
Chaotic signals have complex behavior and are thus hardly predictable. Using chaotic signals as message carriers in secure communications and cryptography is a suitable and secure solution. Chaotic masking is a way to hide the signal (integration of synchronization with masking) [33,37]. In this approach, the message signal is added to a linear combination of state vector components of the master system. In other words, the message signal information is concealed within the chaotic behavior of the state components, which can enhance communication channel security. The message signal can be recovered from the receiver side by synchronizing the slave system with the master system. Ensuring the synchronization error convergence to zero and the disturbance signals and unknown parameters in the master and slave systems can increase security in the communication channel.
The following lines discuss the application of the proposed method in secure communication for chaotic masking. Suppose m(t) is a message. It is encrypted with a proper map: where Λ(m(t), f (t), a) is a definite and continuous function as the map, and f (t) is a definite and continuous signal as a coder. For instance, we can define Λ(m(t), f (t), a) as follows: Λ(m(t), f (t), a) = tanh(a·m(t) + f (t)) , where a is a coefficient so that |a·m(t) + f (t)| ≤ 4 will stand. Signals m 0 (t) , f (t) will be masked as follows and transmitted in two components different from the chaotic system: The receiver initially obtains the estimation of signals m 0 (t) and f (t). Then, it will calculatem 0 (t), and, ultimately, we will calculatem(t) as follows: To recover the signal of message m(t), we can do as follows: (63) Figure 3 shows the chaotic masking in multi-mode synchronization.
To recover the signal of message ( ), we can do as follows:  Various statistical methods demonstrate the efficiency of synchronization systems of chaotic systems using image encryption. The histogram, correlation, number of pixels change rate (NPCR), unified average changing intensity (UACI), peak signal-to-noise ratio (PSNR), and information entropy parameters were used to demonstrate the efficacy of the proposed synchronization method for the synchronization of fractional-order chaotic systems. The description of the image evaluation parameters is given in references [45][46][47][48][49].

Simulation and Results
Here, the fractional-order hyper-chaotic Chen system [47] and two fractional-order Chen systems are considered as master and slave, respectively. They were determined as follows: are control inputs and Various statistical methods demonstrate the efficiency of synchronization systems of chaotic systems using image encryption. The histogram, correlation, number of pixels change rate (NPCR), unified average changing intensity (UACI), peak signal-to-noise ratio (PSNR), and information entropy parameters were used to demonstrate the efficacy of the proposed synchronization method for the synchronization of fractional-order chaotic systems. The description of the image evaluation parameters is given in references [45][46][47][48][49].

Simulation and Results
Here, the fractional-order hyper-chaotic Chen system [47] and two fractional-order Chen systems are considered as master and slave, respectively. They were determined as follows: where θ 11 , θ 12 , θ 13 , θ 14 , θ 15 are unknown parameters. When θ i4 = 0.3, θ i1 = 35, θ i2 = 3, θ i3 = 12, θ i5 = 7, i = 1, 2, 3, then systems (64)  are control inputs and Error dynamics systems are attained as follows: In order to simulate, the initial states of the master system and two slave systems are chosen as follows: It is assumed that the initial values of the adaptive parameters are as follows: The parameters of the controller gains K i−1 are as follows: Time-varying delay for master and slave systems has been considered as below: Later, phase diagrams for chaotic synchronization systems will be depicted. Figure 4 illustrates the chaotic behavior of the fractional-order system. Master and slave systems display chaotic behavior, and their parameters are determined so that the behavior of all the systems will be chaotic. As can be seen from Figure 4, the phase curves of all three systems are chaotic In the simulations, it is supposed that the main parameters vary with time stepwise. The values of disturbances and uncertainties are supposed as follows:  As can be seen from Figure 4, the phase curves of all three systems are chaotic.
In the simulations, it is supposed that the main parameters vary with time stepwise. The values of disturbances and uncertainties are supposed as follows: 2 11 cos(x 11 ) 0.02sin(x 12 ) 0.015x 13 cos(x 13 ) 0.025sin( The estimation errors of the system parameters and time delay errors are shown in Figure 5. The paths of error dynamics systems and control efforts are exhibited in Figure 6.  Figure 5 shows that the parameters and time delay errors in the multi-mode synchronization properly converge to zero despite the uncertainty and disturbance. The figure shows minimal fluctuation. Therefore, the synchronization approach produced successful results despite the parametric changes. Figure 5 depicts the multi-mode synchronization errors during disturbance and structural uncertainty. Figure 6 presents the error values for the disturbance and uncertainty boundaries estimation.
As indicated in Figure 6,despite the disturbance and uncertainty, the errors were large initially and then approached zero with very little fluctuation. There were fluctuations in these control efforts. Synchronization errors altered slightly with parameter variation, which rapidly converged to zero over time. Figure 7 indicates that the errors in estimating the uncertain boundaries were initially large due to the initial values of the parameters but are approximated to zero over time. Additionally, the errors related to the uncertainty have converged with very little oscillation to near-zero values. The proper and fast estimation of error boundaries as well as the  Figure 5 shows that the parameters and time delay errors in the multi-mode synchronization properly converge to zero despite the uncertainty and disturbance. The figure shows minimal fluctuation. Therefore, the synchronization approach produced successful results despite the parametric changes. Figure 5 depicts the multi-mode synchronization errors during disturbance and structural uncertainty. Figure 6 presents the error values for the disturbance and uncertainty boundaries estimation.
As indicated in Figure 6,despite the disturbance and uncertainty, the errors were large initially and then approached zero with very little fluctuation. There were fluctuations in these control efforts. Synchronization errors altered slightly with parameter variation, which rapidly converged to zero over time. Figure 7 indicates that the errors in estimating the uncertain boundaries were initially large due to the initial values of the parameters but are approximated to zero over time. Additionally, the errors related to the uncertainty have converged with very little oscillation to near-zero values. The proper and fast estimation of error boundaries as well as the rapid identification of system parameters leads to proper controller performance. Overall, despite the disturbances, uncertainties, and parametric changes in the master and slave hyper-chaotic systems, the multi-mode synchronization, with the help of the proposed adaptive controller, performed desirably and produced excellent results. rapid identification of system parameters leads to proper controller performance. Overall, despite the disturbances, uncertainties, and parametric changes in the master and slave hyper-chaotic systems, the multi-mode synchronization, with the help of the proposed adaptive controller, performed desirably and produced excellent results.

Experiment Results
This section describes the results of the synchronization method of the fractionalorder Chen chaotic systems for image encryption. First, the images used to perform the experiments were investigated. In the next stage, the encrypted images were represented using the synchronization methods of the fractional-order Chen chaotic systems for q=0.97, followed by illustrating the histogram of the encrypted images for q=0.97. Finally, various statistical parameters indicated the effectiveness of the synchronization methods with the fractional-order chaotic system. Figure 8 illustrates the results obtained from the encryption and decryption results of the proposed secure communication design in five benchmark images. Error curves obtained for estimating the uncertain boundaries (right) and disturbances (left).

Experiment Results
This section describes the results of the synchronization method of the fractional-order Chen chaotic systems for image encryption. First, the images used to perform the experiments were investigated. In the next stage, the encrypted images were represented using the synchronization methods of the fractional-order Chen chaotic systems for q = 0.97, followed by illustrating the histogram of the encrypted images for q = 0.97. Finally, various statistical parameters indicated the effectiveness of the synchronization methods with the fractional-order chaotic system. Figure 8 illustrates the results obtained from the encryption and decryption results of the proposed secure communication design in five benchmark images. Figure 8 shows the proper encryption and decryption of the five benchmarks. Figure 8 gives a more precise evaluation by comparing the histograms of the main and recovered images. Figure 9 shows the main images on the left. In the next column, the histogram of the encrypted image is illustrated. The third column depicts the recovered image. The fourth column shows the histogram of the recovered image. This figure reveals that the histograms of the main image and recovered images have slight differences. However, for more precise analysis, Table 1 Figure 8 shows the proper encryption and decryption of the five benchmarks. Figure  8 gives a more precise evaluation by comparing the histograms of the main and recovered images. Figure 9 shows the main images on the left. In the next column, the histogram of the encrypted image is illustrated. The third column depicts the recovered image. The fourth column shows the histogram of the recovered image. This figure reveals that the histograms of the main image and recovered images have slight differences. However, for more precise analysis, Table 1 demonstrates the results of various statistical criteria. This table shows histogram criteria, correlation, UACI, NPCR, PSNR, and information entropy.       Table 1 reveals that the histograms obtained from the main and the recovered images have slight differences. The correlation between the main and the recovered images is extremely close to 1. The NPCR is approximately 100%. Moreover, good values were obtained for UACI and PSNR. All five images have an information entropy greater than 7. The results suggest that the proposed communication design method successfully encrypted and recovered the main images.

Discussion, Advantages and Disadvantages, and Future Works
This paper presents a new secure communication based on Chen fractional order-order chaotic synchronization. This study mainly aims to propose a synchronization method based on multi-mode adaptive control and the Chen fraction order chaos system to encode images. In this work, experiments on five benchmark images were used with 256 × 256 dimensions. Next, the cryptographic method based on synchronization of the Chen fractional order chaos system was applied to benchmark images. The fractional order Chen chaotic system had different delay and q values in this section. Moreover, the presence of an unknown delay factor in the systems complicated the synchronization problem.
Next, the masking technique of chaotic systems was used to encode images. Then, the parameters of histogram, correlation, N.P.C.R., U.A.C.I., P.S.N.R., and information entropy for benchmark images were obtained to demonstrate the efficiency of the proposed synchronization method. The experimental results indicated that the Chen fractional order synchronization method performed successfully. Derivative change varies the behavior of the system as a whole. This is an essential point in cryptography that reduces the possibility of decryption. Considering that the image data are combined with chaotic signals, the amount of security in encryption is sufficiently high. In this mechanism, the parameters of system and time delays are unknown. Moreover, the presence of nonlinear uncertainty makes its detection harder. Results from the rigorous security analysis (fractional order, correlation coefficient, entropy, NPCR, etc.) proved that the proposed method was robust and that the proposed scheme had a high security order. Thus, it can be used for real-time transmission of other images. Table 2 indicates the high efficiency of the proposed method compared to other studies. According to Table 2, it can be perceived that our proposed method has a high efficiency compared to other research.
Reviewing the previous studies indicates that little attention has been paid to time delays in communication designs with fractional chaotic system synchronization. The available secure communication synchronization designs ignore unknown time delays, exogenous disturbances, and unknown parameters at the same time. However, our proposed design is comprehensive, considers all factors, and is accompanied by a new function introduced for secure communication based on a flexible map with time-varying coding. The simulations showed that the proposed algorithm performed flawlessly against parameter changes, disturbance, time delays, and uncertainty. The guarantee of system stability is based on Lyapunov's function. The main reason for the proper performance of the proposed method lies in the form of updated rules obtained in the article; these rules were defined in such a way that the necessary and sufficient conditions for stability in the concept of Mittag-Leffler were established. On the other hand, the method can quickly estimate the parameters and the error of estimating the disturbance and uncertainty boundaries, which results in a faster reaction of the controller against undesirable factors. In general, the proposed method meets all the requirements and has the ability to be implemented in different applications.

√ √
In the proposed method, four significant and real factors, including disturbance, uncertainty, time delays, and parameter changes, are considered simultaneously, which helps achieve the highest performance. It is also beneficial in practical implementations. Still, the presented approach applies to a variety of chaotic systems. The resulting control law is considered as an explicit and continuous function. Additionally, the proposed theorems have the ability of two types of multi-mode synchronization. Additionally, the amplitude of the control function is generally significant in the proposed method; if the changes in the parameters are permanent and at a high rate, the recommended algorithm will not yield outstanding performance.
Being based on the Caputo fractional-order derivative can be considered one of the disadvantages of this method. Moreover, parameter changes are only considered as a step change. Proving equivalence between the two types of synchronization, proving convergence of all the errors to zero in the presence of disturbance and uncertainty, the continuation of control laws, and proving efficiency are some of the advantages of this proposed method. To develop the proposed method and solve its weaknesses, we must do as follows: develop the proposed method for other fractional-order derivatives, develop the proposed method for parameters with permanent changes, and analyze the application of the proposed method in secure communication.
It is recommended that future research should address the values of time-varying fractional orders, since reference [56] suggests that this could describe the system more effectively. As future tasks in the synchronization method section, first-and-second-order fuzzy controllers can be adopted. Due to the uncertainty in medical data, fuzzy systems (type 1 and type 2) are highly productive. Modeling chaotic systems using fuzzy systems and fuzzy controller design can provide better answers to the synchronization problem. Applying a fuzzy polynomial system is highly effective in chaotic systems modeling and in their synchronization.

Conclusions
This paper investigated the multi-mode synchronization of fractional-order hyper-chaotic systems in the presence of uncertainty, disturbance, time delays, and parameters with stepwise changes in both transmission and circular modes. First, the results confirmed that they are equivalent to the synchronization method. Then, by defining the appropriate Lyapunov function and proofing the theorems, the rules for updating the parameters, as well as error estimating the disturbance and uncertainty boundaries, were assigned. Nonetheless, it should be noted that the stability of the dynamical synchronization system guarantees that all of the synchronization errors, the parameter estimation errors, the disturbance boundary estimation errors, and the uncertainty boundary estimation errors converge to zero. Determining the control law as an explicit and continuous function inhibited chattering. The results also indicated that the rate of change of parameters was not high since the proposed algorithm still displayed an acceptable performance. Simulations were conducted in the presence and absence of disturbance and uncertainty to investigate the effectiveness of the proposed method. The proposed controller reduced synchronization errors, disturbance errors, and uncertainties to zero with low fluctuation near zero, despite changes in time-varying parameters of hyper-chaotic systems. During the parameters changing, a small deviation in synchronization errors was quickly depreciated.
Moreover, unknown time delays were considered. With the help of adaptive regulations, these delays were estimated and used in equations of control effort. Despite these delays, the results revealed that synchronization was appropriately conducted. Additionally, a novel masking design was proposed using the hyperbolic tangent modulation function. To assess this design, benchmark images were encrypted. Various statistical criteria including PSNR, UACI, NPCR, histogram, and correlation were analyzed. The simulation results indicated that the proposed design was successful. The obtained higher efficiency results clearly demonstrated the superiority of the proposed method.