No-chatter model-free sliding mode control for synchronization of chaotic fractional-order systems with application in image encryption

被引:17
作者
Taheri, Mostafa [1 ]
Zhang, Chongqi [1 ]
Berardehi, Zahra Rasooli [1 ]
Chen, Yucheng [2 ]
Roohi, Majid [1 ]
机构
[1] Guangzhou Univ, Sch Econ & Stat, Guangzhou 510006, Peoples R China
[2] Jiaying Univ, Sch Math, Meizhou 514015, Peoples R China
关键词
Model-free sliding mode control; Chaotic fractional-order systems; Chattering-free method; Synchronization; Encryption; decryption; SECURE COMMUNICATION; TIME SYNCHRONIZATION; STABILIZATION; DESIGN; SCHEME;
D O I
10.1007/s11042-022-12329-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Synchronization of different Chaotic dynamical systems is one of the main issues in engineering which has a lot of applications in applied sciences like secure communications and cryptography. In this work, a chattering-free fractional-integral-based sliding mode control (SMC) methodology is proposed for the synchronization of different chaotic fractional-order systems with input saturation. Based on the frequency distributed model and the non-integer version of the Lyapunov stability theorem and using a new continuous function instead of sign function, a novel model-free SMC (MFSMC) method is proposed to overcome the chaotic behavior of the FOSs without any undesired chattering phenomenon. In addition, utilizing the boundedness property of the fractional-order chaotic system is caused to design the method. Then, by operating the proposed scheme on chaotic fractional-order systems, which are applied in electrical systems and secure communications, the effectiveness and applicability of the MFSMC are validated. After that, to show the real-world application, a novel encryption/decryption method for color images is introduced based on the proposed MFSMC. According to an adaption of the pre-diffusion-permutation-diffusion, the structure is adopted to improve the level of security. Furthermore, the performance and security analyses are given to confirm the superiority of the proposed encryption scheme, including histogram analysis, adjacent pixel correlation analysis, and information entropy analysis.
引用
收藏
页码:24167 / 24197
页数:31
相关论文
共 50 条