Literature DB >> 22969355

Bluetooth based chaos synchronization using particle swarm optimization and its applications to image encryption.

Her-Terng Yau1, Tzu-Hsiang Hung, Chia-Chun Hsieh.   

Abstract

This study used the complex dynamic characteristics of chaotic systems and Bluetooth to explore the topic of wireless chaotic communication secrecy and develop a communication security system. The PID controller for chaos synchronization control was applied, and the optimum parameters of this PID controller were obtained using a Particle Swarm Optimization (PSO) algorithm. Bluetooth was used to realize wireless transmissions, and a chaotic wireless communication security system was developed in the design concept of a chaotic communication security system. The experimental results show that this scheme can be used successfully in image encryption.

Entities:  

Keywords:  Bluetooth; PID controller; Particle Swarm Optimization algorithm; chaotic system; communications security

Year:  2012        PMID: 22969355      PMCID: PMC3435984          DOI: 10.3390/s120607468

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


Introduction

The chaos phenomenon was first proposed by Lorenz using the simulation equation of the atmosphere, but it did not attract much attention from scientists until Feigenbaum proposed the general theory of chaos phenomenon. Chaos is a phenomenon that seems disorderly but contains rules. It is a complex dynamic non-periodic and nonlinear system that cannot be explained by single data, and should be analyzed using overall continuous data. It has a very extensive Fourier spectrum, and has a fractal in the phase plane. The key in its state response is the initial value of the system. If a system has different initial values, the response varies largely; this phenomenon is called the butterfly effect [1-3]. At present, many scientists have applied the chaotic system concept to image encryption. This work can be briefly introduced as follows: Gao et al. proposed an image encryption algorithm, which randomly shuffles the matrices of image pixel positions, and uses a hyper-chaotic system to mix the relation between plainimage and cipherimage [4]. Guan et al. used a 2D cat map in random image pixel positions, and the output pixels of discrete Chen's system to cover the original pixel value [5]. Lian proposed an image encryption algorithm based on a spatiotemporal chaos system. The spatiotemporal lattices were used to generate a random sequence, and this sequence was used to select cryptographic parameters in each segment [6] Pareek et al. proposed an image encryption method based on chaotic Logistic maps, using one 80-bit external key and two chaotic Logistic maps. The initial conditions of the Logistic maps were obtained using the external key, and eight different operation types were used for the encryption of images [7]. Chen et al. proposed a real-time secure image encryption algorithm extending the image encryption algorithm for two-dimensional chaotic maps to three-dimensional ones. This method used a three-dimensional cat map in random image pixel positions, and employed the relation between another chaotic map encryption and the original image for confusion [8]. Although the above methods are all feasible, they are too complex and have high commercialization costs. This study used a simple method with the chaotic system to encrypt and decrypt images. The chaotic synchronization system generally consists of a master chaotic system, a slave chaotic system, and a controller synchronizing the master and slave systems. The controller processes the signals of the master chaotic system, and transmits them to the slave chaotic system, so as to synchronize the trajectories of the two systems [9-13]. In this study, a PID controller was used to control the two systems, and the three parameters K and K of the PID were selected using a Particle Swarm Optimization (PSO) algorithm. The optimum parameters were thus obtained. Finally, the LabVIEW software was used to integrate the cryptological concept with the chaotic synchronization system into a chaotic synchronous cryptographic system, which was applied to the wireless communication secrecy for image encryption.

System Description and Formulation Problem

In order to observe the procedure of chaotic synchronization, the Master/Slave system of a single input single output (SISO) is used. The differential equations [14,15] are described below: Master System: Slave System: Among which, x=[x]∈R and x=[x]∈R are the status values of Master System and Slave System, f:R×R→R is the nonlinear function, y∈R and y∈R are the outputs of Master System and Slave System, B∈Rn×1 and C∈R1×n, u∈R is the controller in the Slave system, the control objective is: Since the initial value conditions of the master system and slave system are different, the synchronous controller is added, and the slave system is driven by the signals of the synchronous controller. Thus, the master system and the slave system have coincident response, that is synchronization. The state error of master and slave systems is defined as follows: The primary objective of this system is to propose a simple and effective PID controller, using a PSO algorithm to obtain the optimum PID parameter values to synchronize two identical chaotic systems with different initial conditions. The u in Equation (2) is the PID controller ensuring the synchronization effect based on the PSO algorithm. In order to determine the u of PID controller, the output error signal y = y − y is defined first, and the PID controller and input y and output u(t) can be expressed in continuous form as the following equation: where K is the proportional gain, T is the constant of integral time, and T is the constant of derivative time. As the PID controller is realized in digital control, the continuous PID controller is converted into a discrete PID. Equation (5) can be changed to the following form [16]: where u(k) is the output of controller from k samples, S(k) is the sum of the deviations, T is the sampling time. Equation (6) can be expressed as follows: where is the integral gain, and is the derivative gain. In general cases, the adjustment of PID controller involves selecting proper parameters K to ensure the system has better control performance, and the performance standard (objective function) can be defined according to the required specifications. There are two performance indexes: Integrated Squared Error (ISE) and Integrated Absolute Error (IAE). Their mathematical definitions are shown below: This paper uses IAE as the objective function (OF), so Equation (9) is changed to the following equation: According to PSO algorithm, an ideal gain parameter adjustment method for PID controller is determined to minimize the objective function.

Solve Optimization Problem Using PSO Algorithm

As the PSO algorithm has memory and distributed search features [17-19], it has high accuracy in the optimization of complicated systems, so the PSO algorithm is used in our system to solve the parametric problem of the PID controller. The PID control system consists of a master chaotic system, a slave chaotic system, a PID controller, and the PSO algorithm. The corresponding block diagram is shown in Figure 1.
Figure 1.

Block diagram of PID controlled chaotic synchronization system of the PSO algorithm.

In Figure 1, y is the output of master chaotic system, y is the output of slave chaotic system, y(e) is the output error between the master chaotic system and the slave chaotic system, u(t) is the control output of PID controller defined as Equation (7). The optimum parameters K of PID controller are obtained using the PSO algorithm to search for the convergent minimum value of performance index of IAE defined as Equation (10).

Optimization Problem Formulation and Procedure

The PSO algorithm is used to solve the parametric optimization as mentioned in the previous section. First, K∈S is defined, let K be continuous differentiable matrix value function, S = {z≤R∣0≤z≤z<∞, i = 1,2,3}, z is the search area. The result of optimization problem includes z*=[K*,K*,K*]∈S, such a parameter value can minimize IAE. This optimization problem is described as mathematical expression for accuracy, namely, to determine a parameter z*∈S to minimize IAE: According to “PSO in Electromagnetics” [20], a block flow diagram can be induced from the PSO algorithm, as shown in Figure 2.
Figure 2.

PSO algorithm process block diagram.

The velocity update equation is shown below where: V: Velocity of each particle i: Number of particle W: Inertia Weight C1, C2: Learning constant R: Random number between 0 and 1 P: The optimum position of each particle up to now G: The optimum position of all particles up to now X: The present position of each particle Position update equation of each particle point in particle swarm:

Image Encryption and Decryption

This study used the Sprott chaotic synchronization system and cryptology concept to design a wireless communication secrecy system, and employed LabVIEW software to transmit images in wireless mode. The data were encrypted and decrypted by computer to computer. Bluetooth, which is a wireless personal LAN, was used for wireless transmission. The transmission frequency of Bluetooth was 2.45 GHz. Besides digital data transmission, sound transmission was also available. The transmission speed of Bluetooth was 2∼3 Mb per second, and encryption protection could be set. The frequency changed 1,600 times per min, so it was unlikely to be intercepted and was free from interference from electromagnetic waves. Each Bluetooth-based connecting device had a 48-bit address according to the IEEE 802 standard. It could connect one or many devices, and the maximum transmission range was about 100 m. This study used a D401 mini-Bluetooth receiver V2.0 EDR, with a transmission distance of 20 m, and a transmission speed of 2.1 Mb per second. In the image encryption and decryption, the user has to enter a key, and this value is mixed with the chaotic signal. A password is then generated randomly as the chaotic signal changes, and is mixed with the pixels of the original image. The chaotic signal is used to select 16 different data ordering modes. The RGB values of pixels are combined by staggered arrangement for encryption and decryption. The initial value of this chaotic system is generated randomly. In synchronous signal transmission, another chaotic system is used for encryption and decryption, and the initial value of this chaotic signal is obtained from the key entered by the user. The system structure is shown in Figure 3, and the control interface of system is shown in Figures 4 and 5.
Figure 3.

Structure diagram of Image encryption and decryption of chaotic synchronous cryptographic system.

Figure 4.

Transmission interface.

Figure 5.

Reception control interface.

Simulation and Experimental Results

This study used LabVIEW to design the PID controller, applied a PSO algorithm to obtain the optimum parameter values and perform synchronization control for the Sprott [13,14] chaotic circuit system. The system equations are shown below: Master: Slave: where the x derived from each ẋ are related to Time t, and u(t) is the controller added. The Master and Slave trajectories demonstrate chaotic motions when the controller u(t) = 0, the control objective is: where the master chaotic system and slave chaotic system come to synchronization. MATLAB and Simulink were used for simulation. If the initial conditions of the master chaotic system and slave chaotic system are [x] = [0.1 0.1 0.1] and [x] = [−0.5 −0.5 −0.5], and the particle population and number of iterations of optimization problem are set as 10 and 300 to determine the optimum parameter values of the PID controller. The IAE converges at 45 iterations as calculated by the PSO algorithm and 68 iterations as calculated by the EP algorithm. The steady state values of IAE are 0.8451 by PSO and 1.231 by EP, as shown in Figure 6. Compared with [16] and [21] under the same initial conditions, it can be seen that the IAE convergence speed of the PSO algorithm is faster than the evolutionary programming (EP) algorithm, as shown in Tables 1, 2 and Figure 7. Therefore, we can find that the PSO algorithm calculation performance is better than the EP algorithm in this study. The k parameter values of PID controller by PSO algorithm are z*=[K*,K*,K*]=[10.9554 0.005 10.9504], as shown in Figures 8–10. The simulation results of adding synchronizing signal in after 50 s of Sprott are shown in Figures 11–13.
Figure 6.

IAE convergence curve.

Table 1.

The convergence situation of PSO vs. EP with the initial conditions [xm1(0), xm2(0), xm3(0)] = [0.1, 0.1, 0.1] and [xs1(0), xs2(0), xs3(0)] = [−1, −1, −1].

Converged iterationsSteady state of IAE
The EP method in reference [16]1700.7592
The PSO method in this paper530.6697
Table 2.

The convergence situation of PSO vs. EP with the initial conditions [xm1(0), xm2(0), xm3(0)] = [0.1, 0.1, 0.1] and [xs1(0), xs2(0), xs3(0)] = [−1, −2, 1].

Converged iterationsSteady state of IAE
The EP method in reference [21]800.6726
The PSO method in this paper260.4132
Figure 7.

IAE convergence curve by PSO and EP with the initial conditions [xm1(0), xm2(0), xm3(0)] = [0.1, 0.1, 0.1] and [xs1(0), xs2(0), xs3(0)] = [−1, −1, −1].

Figure 8.

k convergence curve.

Figure 10.

k convergence curve.

Figure 11.

x and x synchronization curve.

Figure 13.

x and x synchronization curve.

This study produced two images for encryption and decryption. One was a picture of an airplane, and the experimental results are shown in Figures 14–22. Figure 14 is the original airplane picture to be transmitted, and the image is disorganized into Figure 15 after encryption processing. Figure 16 shows the decryption when the key entered is incorrect. Figures 17–19 show the RGB distribution of the original picture. Figures 20–22 show the RGB distribution of the encrypted picture. Another image is a scenery picture, and the experimental results are shown in Figures 23–25. Figure 23 is the original scenery picture to be transmitted, and the image is disorganized into Figure 24 after encryption processing. Figure 25 shows the decryption when the key entered is incorrect. Figures 26–28 show the RGB distribution of the original picture. Figures 29–31 show the RGB distribution of the decrypted picture.
Figure 14.

Original picture of an airplane.

Figure 22.

Statistical chart of B value distribution after encryption.

Figure 15.

Post-encryption effect.

Figure 16.

Decryption effect when the key entered is incorrect.

Figure 17.

Statistical chart of R value distribution of the original image.

Figure 19.

Statistical chart of B value distribution of the original image.

Figure 20.

Statistical chart of R value distribution after encryption.

Figure 23.

Original scenery picture.

Figure 25.

Decryption effect when the key entered is incorrect.

Figure 24.

Post-encryption effect.

Figure 26.

Statistical chart of R value distribution of the original image.

Figure 28.

Statistical chart of B value distribution of the original image.

Figure 29.

Statistical chart of R value distribution after encryption.

Figure 31.

Statistical chart of B value distribution after encryption.

Conclusions

This study successfully used PSO to obtain the optimum parameter values of a chaotic synchronization PID controller, and applied it in chaotic communication secrecy. A traditional PID controller can only be used in fixed systems, and must be redesigned if it is to be used in different systems, which consumes a high hardware setting time and cost. This study used LabVIEW, instead of the traditional PID controller, so that when it is applied in other systems, only the parameters of the PID controller need to be changed, so the time and cost can be reduced. Bluetooth was used to realize wireless transmissions. In the application of wireless communications, future studies can focus on the encryption and decryption of images in order to improve the security of wireless transmission.
  4 in total

1.  Controlling chaos.

Authors: 
Journal:  Phys Rev Lett       Date:  1990-03-12       Impact factor: 9.161

2.  Synchronization in chaotic systems.

Authors: 
Journal:  Phys Rev Lett       Date:  1990-02-19       Impact factor: 9.161

3.  Crop classification by forward neural network with adaptive chaotic particle swarm optimization.

Authors:  Yudong Zhang; Lenan Wu
Journal:  Sensors (Basel)       Date:  2011-05-02       Impact factor: 3.576

4.  DOA estimation for local scattered CDMA signals by particle swarm optimization.

Authors:  Jhih-Chung Chang
Journal:  Sensors (Basel)       Date:  2012-03-07       Impact factor: 3.576

  4 in total
  2 in total

1.  Novel image encryption scheme based on Chebyshev polynomial and Duffing map.

Authors:  Borislav Stoyanov; Krasimir Kordov
Journal:  ScientificWorldJournal       Date:  2014-03-26

2.  CFHBA-PID Algorithm: Dual-Loop PID Balancing Robot Attitude Control Algorithm Based on Complementary Factor and Honey Badger Algorithm.

Authors:  Jianan Lin; Rongjia Zheng; Yirong Zhang; Jinkai Feng; Wei Li; Kaiqing Luo
Journal:  Sensors (Basel)       Date:  2022-06-14       Impact factor: 3.847

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.