Skip to main content

Adaptive coupled synchronization among three coupled chaos systems and its application to secure communications

Abstract

In this paper, the adaptive synchronization method of three coupled identical chaos systems is proposed. New generic criteria of global chaos synchronization and strict theoretical proofs are given. The unidirectional (bidirectional) coupled system will synchronize by adding three adaptive feedback gain equations. As an example, the three Rössler chaotic systems with unidirectional coupling are given to realize the adaptive coupled synchronization; at the same time, the three Lorenz chaotic systems donate the bidirectional coupling adaptive synchronization. This paper also extends the above adaptive synchronization method to secure chaos communications through the method of chaos masking. Based on the three coupled identical Lorenz chaotic systems, a novel method of chaos encryption is proposed, and the basic idea is that after encrypting two times in two transmitters and one receiver, information signal can be recovered exactly at the receiver end. In consideration of interfering random white noise, the results of encoding and decoding are simulated and analyzed for the multistage chaos synchronized system. By analyzing the characteristics of noise, this paper presents a de-noising method using wavelet transform. At last, a secure communications method for high amplitude information signal transmission based on chaotic masking is studied. With the MATLAB, the effects of signal de-noising could be demonstrated.

1 Introduction

In recent years, the idea of synchronization of chaotic systems has received a great deal of interest among scientists from various fields [1–8]. In their seminal paper, Pecora and Carroll addressed the synchronization of chaotic system by using a drive-response configuration. The basic idea is to use the outputs of the drive system to control the response system so that the trajectories of the response’s outputs can synchronize those of drive system. So far, many synchronization schemes have been developed such as adaptive synchronization approach [9, 10], system approach [11], and system decomposition approach [12]. More recently, many useful methods have been developed. We have also investigated chaos synchronization between two coupled identical systems, from a rigorous mathematical approach.

However, for three coupled (even more) identical systems, the stability of periodic orbit and chaos synchronization are much more complex, and there does not seem to be much result reported in the literatures about this special synchronization configuration [13–16]. In the recent work, the authors propose the simple generic criteria for realizing the chaos synchronization respectively according to the way of coupling. The generic criteria can be satisfied by choosing nine suitable coupled coefficients of three coupled chaotic systems. In the paper of Lu [17], the adaptive synchronization method for coupled system with multi-systems is proposed; this method can avoid estimating too many values of coupling coefficient by adding some adaptive feedback gain equations. In this paper, we improve the adaptive synchronization method of the paper and establish the global synchronization criteria for three coupled chaotic systems via unidirectional or bidirectional linear error feedback approach. In this method, the adaptive feedback gain equations are replaced with the values of coupling coefficients. This method can avoid the difficulty of designing the adaptive feedback gain equations. At the same time, it needs estimate fewer coupling coefficients than the method in the paper [18].

Over the past decades, there has been tremendous interest in studying the behavior of chaotic system. Chaotic systems are characterized by a number of features, such as sensitive dependence on initial conditions; aperiodicity, random-like behavior, continuous broadband power spectrum, and so on. These properties coincide with the requirements for signals applied in secure communication systems. A large variety of encryption algorithms have been proposed for realizing chaotic communication since Pecora and Carroll proposed synchronization of chaotic systems. Up to now, many chaos-based secure communication systems have been proposed, which can be roughly classified into the following categories: chaotic masking (addition method) [19], chaotic switching [20], chaotic modulation (inclusion method) [21], digital communication [22], and inverse system approach [23]. One can refer to [24] for a recent survey. In chaotic communication schemes, a chaotic system is used as transmitter and the information signal is mixed at the transmitter end to generate a chaotic transmit signal, which is then transmitted to the receiver end. The receiver is also a chaotic dynamic system constructed based on the structure of transmitter and it is able to synchronize the transmitter by receiving the transmit signal. Once synchronization is achieved, the information signal is recovered by the receiver. The main idea is that chaotic signal can be used as a carrier and transmitted together with an information signal to a receiver, and at the receiver end chaos synchronization is employed to recover the information signal. There is a problem on how to improve the security of the chaos secure system. Until now, most of the literatures are all about second order of chaos synchronized secure communication system [25–32], and only a few papers investigate the multistage chaos synchronized secure communication system [33, 34].

There are many methods [35–39] to improve the security of chaotic communication. In [40], a linear output feedback synchronization approach for chaotic Genesio system with application to secure communications is described. The sufficient condition of stable asymptotic synchronization and the boundary of feedback gain are given, based on the linear stability theorem. In [41], Chua’s chaotic synchronized systems and its main properties are investigated and a multistage chaotic synchronized systems for secure communication is proposed. It is down that the message signal hidden in chaotic carrier of the systems can be perfectly reconstructed, and the bandwidth, the characteristic of distortion, and the level of security are improved. The chaos masking method based on multistage chaotic synchronization system for secure communications, to some extent, enhances the degree of security, as the message is not only just added to the chaotic carrier signal twice but is also decrypted twice. For example, in [42], a new method of global chaos synchronization among three different structures of chaotic systems is proposed under the framework of drive-response systems based on Lyapunov stabilization theorem; then, this method is applied to secure communication through chaotic masking. At last, it analyzes the characteristics of noise and then presents a de-noising method using wavelet transform. With the MATLAB, the effects of signal de-noising could be demonstrated.

This work, inspired by previous works, improves the security of the chaos secure system by adding the second order of chaos synchronized secure communication system to multistage ones, that is, it proposes a novel method of chaos encryption using three coupled identical systems. After encrypting in the first two coupled systems, encryption is done again in the later two coupled systems. This system designs simpler than the ones designed in [43, 44] and can employ more states easily. More significantly, this method can be extended to four or even more order chaos synchronized secure communication system. Due to the uniqueness of the three coupled chaos synchronization secure communication system, the possibility for an interceptor to extract the information from the transmitted signal is therefore greatly reduced.

Considering the noise in existence in the chaotic systems, we study the random white noise perturbing for the signal. In addition, eliminate the noise using wavelet transform. In order to maintain synchronization between the transmitter and receiver, the ratio of the power of the chaotic carrier to the information signal should be greater than approximately 30 dB to guarantee a fairly small distortion on the chaotic attractor. In [45, 46], Li proposes a secure communication method for high-amplitude information signal transmission based on chaotic masking. The degree of security is enhanced because the amplitude of information signal is equivalent to that of chaotic signal. At the receiving end, an adaline is adopted to maintain the chaotic synchronization of transmitting and receiving systems and simultaneously recovers the information signal. For a definite chaos system, the lower the frequency of information signal, the smaller the error of the recovered signal and original signal. Besides, Chua’s circuit is considered as an illustrative example to demonstrate the effectiveness of the proposed method. This paper improves the above method, designs an adaptive controller by using two attenuation factor, and adjusts the amplitude significantly. As the change of attenuation factor, the information signal can be selected within a relatively big range. Recently, Xu et al. [47–49] proposed a crowdsensing-based wireless communication data processing methods. In [50], Zheng deals with the problem of secure communication based on multi-input multi-output (MIMO) chaotic systems. Moreover, since the amplitude of messages in traditional schemes is limited because it would affect the quality of synchronization, the proposed scheme is also improved into an amplitude-independent one. This paper improves the method in [51] and transmits a high-amplitude discrete signal using two attenuation factors. At the receiving end, it restores the information signal by decrypting twice. Well effect has been acquired in the experiment.

This paper is organized as follows. In Section 2, we show the adaptive synchronization of three Rössler systems with unidirectional coupling. In Section 3, adaptive synchronization of three Lorenz systems with bidirectional coupling is discussed. In Section 4, the secure communication theory and multistage chaos synchronized system for secure communications are shown. The noise resistance effects for the transmitter of a signals and wavelet de-noise are shown in Section 5. In Section 6, we show the transmission of a high-amplitude discrete signal. Finally, conclusions are drawn.

2 Adaptive synchronization of three Rössler systems with unidirectional coupling

With respect to two coupled chaotic systems, by unidirectional coupling we mean that the behavior of response system is dependent on the behavior of another identical drive system, but the second one is not influenced by the behavior of the first. But the situation is very different to consider the synchronization of three chaotic systems with unidirectional coupling.

Consider the classical Rössler chaotic system

$$ \left\{\begin{array}{l}{\overset{.}{x}}_1=-\left({x}_2+{x}_3\right)\\ {}{\overset{.}{x}}_2={x}_1+a{x}_2\\ {}{\overset{.}{x}}_3={x}_3\left({x}_1-c\right)+b\end{array}\right. $$

where x i  (i = 1, 2, 3) are the state variables and a, b, c are positive real constants, where a = 0.2, b = 0.2, and c = 5.7, so that the Rössler system has chaotic attractors. Here, we consider the unidirectional coupling among three identical Rössler chaotic systems

$$ \left\{\begin{array}{l}{\overset{.}{x}}_1=-\left({x}_2+{x}_3\right)-{d}_1\left({x}_1-{y}_1\right)\\ {}{\overset{.}{x}}_2={x}_1+a{x}_2\\ {}{\overset{.}{x}}_3={x}_3\left({x}_1-c\right)+b\\ {}{\overset{.}{y}}_1=-\left({y}_2+{y}_3\right)-{d}_2\left({y}_1-{z}_1\right)\\ {}{\overset{.}{y}}_2={y}_1+a{y}_2\\ {}{\overset{.}{y}}_3={y}_3\left({y}_1-c\right)+b\\ {}{\overset{.}{z}}_1=-\left({z}_2+{z}_3\right)-{d}_3\left({z}_1-{x}_1\right)\\ {}{\overset{.}{z}}_2={z}_1+a{z}_2\\ {}{\overset{.}{z}}_3={z}_3\left({z}_1-c\right)+b\end{array}\right. $$
(1)

Selecting the synchronization errors as follows:

$$ \begin{array}{l}{e}_{11}(t)={x}_1(t)-{y}_1(t),\ {e}_{21}(t)={y}_1(t)-{z}_1(t),\ {e}_{31}(t)={z}_1(t)-{x}_1(t)\\ {}{e}_{12}(t)={x}_2(t)-{y}_2(t),\ {e}_{22}(t)={y}_2(t)-{z}_2(t),\ {e}_{32}(t)={z}_2(t)-{x}_2(t)\\ {}{e}_{13}(t)={x}_3(t)-{y}_3(t),\ {e}_{23}(t)={y}_3(t)-{z}_3(t),\ {e}_{33}(t)={z}_3(t)-{x}_3(t)\end{array} $$
(2)

And we have e 31 = − e 11 − e 21, e 32 = − e 12 − e 22, e 33 = − e 13 − e 23.

Assuming that

$$ {\overset{.}{d}}_1={k}_1{e}_{11}^2,\ {\overset{.}{d}}_2={k}_2\left({e}_{21}^2-{e}_{11}{e}_{21}\right),\ {\overset{.}{d}}_3={k}_3\left({e}_{21}^2+{e}_{11}{e}_{21}\right).\ {k}_1, {k}_2, {k}_3>0, $$
(3)

According to formulas (2) and (3), the dynamical error system is written as follows:

$$ \left\{\begin{array}{l}{\overset{.}{e}}_{11}=-{e}_{12}-{e}_{13}-{d}_1{e}_{11}+{d}_2{e}_{21}\\ {}{\overset{.}{e}}_{12}={e}_{11}+a{e}_{12}\\ {}{\overset{.}{e}}_{13}={x}_1{e}_{13}+{y}_3{e}_{11}-c{e}_{13}\\ {}{\overset{.}{e}}_{21}=-{e}_{22}-{e}_{23}-{d}_2{e}_{21}-{d}_3{e}_{11}-{d}_3{e}_{21}\\ {}{\overset{.}{e}}_{22}={e}_{21}+a{e}_{22}\\ {}{\overset{.}{e}}_{23}={y}_1{e}_{23}+{z}_3{e}_{21}-c{e}_{23}\end{array}\right. $$
(4)

2.1 Theorem 1

The coupled system (1) will synchronize for any initial values (x 1(0), x 2(0), x 3(0)); (y 1(0), y 2(0), y 3(0)); (z 1(0), z 2(0), z 3(0)); d 1(0); d 2(0); d 3(0). That is, e ij  → 0 as t → ∞, (i, j = 1, 2, 3).

2.2 Proof

We construct a Lyapunov function

$$ V=\frac{1}{2}\left[{e}_{11}^2+{e}_{12}^2+{e}_{13}^2+{e}_{21}^2+{e}_{22}^2+{e}_{23}^2+\frac{1}{k_1}{\left({d}_1-{d}_1^{\ast}\right)}^2+\frac{1}{k_2}{\left({d}_2-{d}_2^{\ast}\right)}^2+\frac{1}{k_3}{\left({d}_3-{d}_3^{\ast}\right)}^2\right] $$

where \( {d}_1^{\ast },{d}_2^{\ast },{d}_3^{\ast }>0 \) are to be determined. Since the Rössler system is chaotic, we assume |x 1|, |y 1| ≤ M 1, |y 3|, |z 3| ≤ M 3, where M 1, M 3 are positive constants. The time derivative of V along the orbits of the system (1) is

$$ \begin{array}{l}\overset{.}{V}={e}_{11}{\overset{.}{e}}_{11}+{e}_{12}{\overset{.}{e}}_{12}+{e}_{13}{\overset{.}{e}}_{13}+{e}_{21}{\overset{.}{e}}_{21}+{e}_{22}{\overset{.}{e}}_{22}+{e}_{23}{\overset{.}{e}}_{23}+\frac{1}{k_1}\left({d}_1-{d}_1^{\ast}\right){\overset{.}{d}}_1+\frac{1}{k_2}\left({d}_2-{d}_2^{\ast}\right){\overset{.}{d}}_2+\frac{1}{k_3}\left({d}_3-{d}_3^{\ast}\right){\overset{.}{d}}_3\\ {}\kern0.5em ={e}_{11}\left(-{e}_{12}-{e}_{13}-{d}_1{e}_{11}+{d}_2{e}_{21}\right)+{e}_{12}\left({e}_{11}+a{e}_{12}\right)+{e}_{13}\left({x}_1{e}_{13}+{y}_3{e}_{11}-c{e}_{13}\right)\\ {}\kern0.5em +{e}_{21}\left(-{e}_{22}-{e}_{23}-{d}_2{e}_{21}-{d}_3{e}_{11}-{d}_3{e}_{21}\right)+{e}_{22}\left({e}_{21}+a{e}_{22}\right)+{e}_{23}\left({y}_1{e}_{23}+{z}_3{e}_{21}-c{e}_{23}\right)\\ {}\kern0.5em +\left({d}_1-{d}_1^{\ast}\right){e}_{11}^2+\left({d}_2-{d}_2^{\ast}\right)\left({e}_{21}^2-{e}_{11}{e}_{21}\right)+\left({d}_3-{d}_3^{\ast}\right)\left({e}_{21}^2+{e}_{11}{e}_{21}\right)\\ {}\kern0.5em =-{d}_1{e}_{11}^2+a{e}_{12}^2+\left({x}_1-c\right){e}_{13}^2-\left({d}_2+{d}_3\right){e}_{21}^2+a{e}_{22}^2+\left({y}_1-c\right){e}_{23}^2-\left(1-{y}_3\right){e}_{11}{e}_{13}+\left({d}_2-{d}_3\right){e}_{11}{e}_{21}\\ {}\kern0.5em -\left(1-{z}_3\right){e}_{21}{e}_{23}+\left({d}_1-{d}_1^{\ast}\right){e}_{11}^2+\left({d}_2-{d}_2^{\ast}\right)\left({e}_{21}^2-{e}_{11}{e}_{21}\right)+\left({d}_2-{d}_2^{\ast}\right)\left({e}_{21}^2+{e}_{11}{e}_{21}\right)\\ {}\kern0.5em \le -{d}_1^{\ast }{e}_{11}^2+a{e}_{12}^2+\left({M}_1-c\right){e}_{13}^2-\left({d}_2^{\ast }+{d}_3^{\ast}\right){e}_{21}^2+a{e}_{22}^2+\left({M}_1-c\right){e}_{23}^2+\left({M}_3-c\right){e}_{11}{e}_{13}\\ {}\kern0.5em +\left({d}_2-{d}_3\right){e}_{11}{e}_{21}+\left({M}_3-1\right){e}_{21}{e}_{23}\\ {}\kern0.5em =-\left(\left|{e}_{11}\right|,\;\left|{e}_{12}\right|,\;\left|{e}_{12}\right|,\;\left|{e}_{21}\right|,\;\left|{e}_{22}\right|,\;\left|{e}_{23}\right|\right)\mathbf{P}{\left(\left|{e}_{11}\right|,\;\left|{e}_{12}\right|,\;\left|{e}_{12}\right|,\;\left|{e}_{21}\right|,\;\left|{e}_{22}\right|,\;\left|{e}_{23}\right|\right)}^{\mathrm{T}}\end{array} $$

where

$$ \mathbf{P}=\left(\begin{array}{cccccc}\hfill {d}_1^{\ast}\hfill & \hfill 0\hfill & \hfill \frac{-{M}_3+1}{2}\hfill & \hfill \frac{d_2^{\ast }+{d}_3^{\ast }}{2}\hfill & \hfill 0\hfill & \hfill 0\hfill \\ {}\hfill 0\hfill & \hfill -a\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill \\ {}\hfill \frac{-{M}_3+1}{2}\hfill & \hfill 0\hfill & \hfill -{M}_1+c\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill \\ {}\hfill \frac{d_2^{\ast }+{d}_3^{\ast }}{2}\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill {d}_2^{\ast }+{d}_3^{\ast}\hfill & \hfill 0\hfill & \hfill \frac{-{M}_3+1}{2}\hfill \\ {}\hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill -a\hfill & \hfill 0\hfill \\ {}\hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill \frac{-{M}_3+1}{2}\hfill & \hfill -{M}_1+c\hfill \end{array}\right) $$
(5)

The symmetrical matrix P will be positive definite if positive constants \( {d}_1^{\ast } \), \( {d}_2^{\ast } \), and \( {d}_3^{\ast } \) satisfy the following inequalities

$$ {d}_1\left({d}_2+{d}_3\right){a}^2{\left(c-{M}_1\right)}^2-1/4{a}^2\left(C-{M}_1\right)\left({d}_2+{d}_3\right)\left({M}_3^3-2{M}_2+1\right)>0 $$
(6)

Obviously, (6) holds if \( {d}_1^{\ast } \), \( {d}_2^{\ast } \), and \( {d}_3^{\ast } \) are large enough. That is, \( \overset{.}{V} \) is negative semi-definite for e 11, e 12, e 13, e 21, e 22, e 23, d 1, d 2, and d 3. Thus, \( {e}_{11},\;{e}_{12},\;{e}_{13},\;{e}_{21},\;{e}_{22},\;{e}_{23},{d}_1-{d}_1^{\ast },{d}_2-{d}_2^{\ast },{d}_3-{d}_3^{\ast}\in {L}_{\infty } \).

Since \( \overset{.}{V}\le -{e}^{\mathrm{T}}\mathbf{P}e \) and P is positive definite, one has

$$ {\displaystyle {\int}_0^t{\lambda}_{\min }}(P)\left({e}_1^2+{e}_1^2+{e}_1^2\right)dt\le {\displaystyle {\int}_0^t{e}^{\mathrm{T}}} Pedt\le -{\displaystyle {\int}_0^t\overset{.}{V}dt}\le V\left({e}_{11}(0),{e}_{12}(0),{e}_{13}(0),{e}_{21}(0),{e}_{22}(0),{e}_{23}(0)\right) $$

where λ min(P) is the minimum eigenvalue of the symmetrical positive definite matrix P. It follows that e 11, e 12, e 13, e 21, e 22, e 23 ∈ L 2. We have \( {\overset{.}{e}}_{11},\;{\overset{.}{e}}_{12},\;{\overset{.}{e}}_{13},\;{\overset{.}{e}}_{21},\;{\overset{.}{e}}_{22},\;{\overset{.}{e}}_{23}\in {L}_{\infty } \) from error system (4). Therefore, by Barbalat’s lemma, e 11, e 12, e 13, e 21, e 22, e 23 → 0 as t → ∞.

In numerical simulations for coupled system with Rössler systems, Fig. 1 shows the synchronization errors of the coupled system with three Rössler systems for k 1 = 0.1, k 2 = 0.3, and k 3 = 0.5. The initial states of three coupled systems are the following: x 1(0) = 0.1, x 2(0) = 0.1, x 3(0) = 0.1; y 1(0) = 0.2, y 2(0) = 0.2, y 3(0) = 0.2; z 1(0) = 0.3, z 2(0) = 0.3, z 3(0) = 0.3; d 1(0) = 0.5, d 2(0) = 0.4, d 3(0) = 0.3.

Fig. 1
figure 1

The convergence dynamics of the error system

From Fig. 1, we can see that the three coupled Rössler chaotic systems realize synchronization in a short amount of time, so the above generic criteria of global chaos synchronization are effective.

3 Adaptive synchronization of three Lorenz systems with bidirectional coupling

Next, the synchronization of three chaotic systems with bidirectional coupling is studied. In this section, we select one adaptive feedback gain equation to reach for the goal.

Consider the classical Lorenz chaotic system

$$ \left\{\begin{array}{l}{\overset{.}{x}}_1=a\left({x}_2-{x}_1\right)\\ {}{\overset{.}{x}}_2=c{x}_1-{x}_1{x}_3-{x}_2\\ {}{\overset{.}{x}}_3={x}_1{x}_2-b{x}_3\end{array}\right. $$

where a = 10, b = 8/3, and c = 28, so that the Lorenz system has chaotic attractors.

The three Lorenz systems using bidirectional coupling can be written as

$$ \left\{\begin{array}{l}{\overset{.}{x}}_1=a\left({x}_2-{x}_1\right)-d\left(2{x}_1-{y}_1-{z}_1\right)\\ {}{\overset{.}{x}}_2=c{x}_1-{x}_1{x}_3-{x}_2\\ {}{\overset{.}{x}}_3={x}_1{x}_2-b{x}_3\\ {}{\overset{.}{y}}_1=a\left({y}_2-{y}_1\right)-d\left(2{y}_1-{x}_1-{z}_1\right)\\ {}{\overset{.}{y}}_2=c{y}_1-{y}_1{y}_3-{y}_2\\ {}{\overset{.}{y}}_3={y}_1{y}_2-b{y}_3\\ {}{\overset{.}{z}}_1=a\left({z}_2-{z}_1\right)-d\left(2{z}_1-{x}_1-{y}_1\right)\\ {}{\overset{.}{z}}_2=c{z}_1-{z}_1{z}_3-{z}_2\\ {}{\overset{.}{z}}_3={z}_1{z}_2-b{z}_3\end{array}\right. $$
(7)

where a = 10, b = 8/3, and c = 28, so that the Lorenz system has chaotic attractors.

Selecting the synchronization errors as follows:

$$ \begin{array}{l}{e}_1(t)={x}_1(t)-{y}_1(t),\ {e}_4(t)={y}_1(t)-{z}_1(t),\ {e}_7(t)={z}_1(t)-{x}_1(t)\\ {}{e}_2(t)={x}_2(t)-{y}_2(t),\ {e}_5(t)={y}_2(t)-{z}_2(t),\ {e}_8(t)={z}_2(t)-{x}_2(t)\\ {}{e}_3(t)={x}_3(t)-{y}_3(t),\ {e}_6(t)={y}_3(t)-{z}_3(t),\ {e}_9(t)={z}_3(t)-{x}_3(t)\end{array} $$
(8)

and we have e 7 = − e 1 − e 4, e 8 = − e 2 − e 5, and e 9 = − e 3 − e 6.

Assuming that

$$ \overset{.}{d}=k\left(3{e}_1^2+3{e}_4^2\right),\ k>0. $$
(9)

According to formulas (8) and (9), the dynamical error system is written as follows:

$$ \left\{\begin{array}{l}{\overset{.}{e}}_1=a{e}_2-\left(3d+a\right){e}_1\\ {}{\overset{.}{e}}_2=c{e}_1-{e}_2-{x}_1{e}_3-{y}_3{e}_1\\ {}{\overset{.}{e}}_3={x}_1{e}_2+{y}_2{e}_1-b{e}_3\\ {}{\overset{.}{e}}_4=a{e}_5-\left(3d+a\right){e}_4\\ {}{\overset{.}{e}}_5=c{e}_4-{e}_5-{y}_1{e}_6-{z}_3{e}_4\\ {}{\overset{.}{e}}_6={y}_1{e}_5+{z}_2{e}_4-b{e}_6\end{array}\right. $$
(10)

3.1 Theorem 2

The coupled system (7) will synchronize for any initial values (x 1(0), x 2(0), x 3(0)); (y 1(0), y 2(0), y 3(0)); (z 1(0), z 2(0), z 3(0)); d(0). That is, e i  → 0 as t → ∞, (i = 1, 2, ⋯, 9).

3.2 Proof

Construct a Lyapunov function

$$ V=\frac{1}{2}\left[{e}_1^2+{e}_2^2+{e}_3^2+{e}_4^2+{e}_5^2+{e}_6^2+\frac{1}{k}{\left(d-{d}^{\ast}\right)}^2\right] $$

where d * > 0 is to be determined. Since the Lorenz system is chaotic, we assume |y 2|, |z 2| ≤ M 2, |y 3|, |z 3| ≤ M 3, where M 2, M 3 are positive constants. The time derivative of V along the orbits of system (7) is

$$ \begin{array}{l}\overset{.}{V}={e}_1{\overset{.}{e}}_1+{e}_2{\overset{.}{e}}_2+{e}_3{\overset{.}{e}}_3+{e}_4{\overset{.}{e}}_4+{e}_5{\overset{.}{e}}_5+{e}_6{\overset{.}{e}}_6+\frac{1}{k}\left(d-{d}^{\ast}\right)\overset{.}{d}\\ {}\kern0.5em ={e}_1\left[a{e}_2-\left(3d+a\right){e}_1\right]+{e}_2\left(c{e}_1-{e}_2-{x}_3{e}_3-{y}_3{e}_1\right)+{e}_3\left({x}_1{e}_2+{y}_2{e}_1-b{e}_3\right)+{e}_4\left[a{e}_5-\left(3d+a\right){e}_4\right]\\ {}\kern0.5em +{e}_5\left(c{e}_4-{e}_5-{y}_1{e}_6-{z}_3{e}_4\right)+{e}_6\left({y}_1{e}_5+{z}_2{e}_4-b{e}_6\right)+1/k\left(d-{d}^{\ast}\right)k\left(3{e}_1^2+3{e}_4^2\right)\\ {}\kern0.5em =-\left(3d+a\right){e}_1^2-{e}_2^2-b{e}_3^2-\left(3d+a\right){e}_4^2-{e}_5^2-b{e}_6^2+\left(a+c-{y}_3\right){e}_1{e}_2+\left(a+c-{z}_3\right){e}_4{e}_5\\ {}\kern0.5em +{y}_2{e}_1{e}_3+{z}_2{e}_4{e}_6+\left(d-{d}^{\ast}\right)\left(3{e}_1^2+3{e}_4^2\right)\\ {}\kern0.5em =-\left(a+3{d}^{\ast}\right){e}_1^2-{e}_2^2-b{e}_3^2-\left(a+3{d}^{\ast}\right){e}_4^2-{e}_5^2-b{e}_6^2+\left(a+c-{y}_3\right){e}_1{e}_2+\left(a+c-{z}_3\right){e}_4{e}_5+{y}_2{e}_1{e}_3+{z}_2{e}_4{e}_6\\ {}\kern0.5em \le -\left(a+3{d}^{\ast}\right){e}_1^2-{e}_2^2-b{e}_3^2-\left(a+3{d}^{\ast}\right){e}_4^2-{e}_5^2-b{e}_6^2+\left(a+c+{M}_3\right)\left|{e}_1\right|\left|{e}_2\right|+\left(a+c+{M}_3\right)\left|{e}_4\right|\left|{e}_5\right|\\ {}\kern0.5em +{M}_2\left|{e}_1\right|\left|{e}_3\right|+{M}_2\left|{e}_4\right|\left|{e}_6\right|\\ {}\kern0.5em =-\left(\left|{e}_1\right|,\;\left|{e}_2\right|,\;\left|{e}_3\right|,\;\left|{e}_4\right|,\;\left|{e}_5\right|,\;\left|{e}_6\right|\right)\mathbf{P}{\left(\left|{e}_1\right|,\;\left|{e}_2\right|,\;\left|{e}_3\right|,\;\left|{e}_4\right|,\;\left|{e}_5\right|,\;\left|{e}_6\right|\right)}^{\mathrm{T}}\end{array} $$

where

$$ \mathbf{P}=\left(\begin{array}{cccccc}\hfill a+3{d}^{\ast}\hfill & \hfill -\frac{a+c+{M}_3}{2}\hfill & \hfill -\frac{M_2}{2}\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill \\ {}\hfill -\frac{a+c+{M}_3}{2}\hfill & \hfill 1\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill \\ {}\hfill -\frac{M_2}{2}\hfill & \hfill 0\hfill & \hfill b\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill \\ {}\hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill a+3{d}^{\ast}\hfill & \hfill -\frac{a+c+{M}_3}{2}\hfill & \hfill -\frac{M_2}{2}\hfill \\ {}\hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill -\frac{a+c+{M}_3}{2}\hfill & \hfill 1\hfill & \hfill 0\hfill \\ {}\hfill 0\hfill & \hfill 0\hfill & \hfill 0\hfill & \hfill -\frac{M_2}{2}\hfill & \hfill 0\hfill & \hfill b\hfill \end{array}\right) $$
(11)

The matrix P will be positive definite if positive constants \( {d}^{\ast }>\frac{M_2^2}{4b}+\frac{{\left(a+c+{M}_3\right)}^2}{4}-a \), because with this condition, all the principal minor determinants of matrix P are positive. Similar to the proof of Theorem 1, we obtain \( {e}_1,{e}_2,{e}_3,{e}_4,{e}_5,{e}_6,{\overset{.}{e}}_1,{\overset{.}{e}}_2,{\overset{.}{e}}_3,{\overset{.}{e}}_4,{\overset{.}{e}}_5,{\overset{.}{e}}_6,d\in {L}_{\infty } \), e 1, e 2, e 3, e 4, e 5, e 6 ∈ L 2. By Barbalat’s lemma, e 1, e 2, e 3, e 4, e 5, e 6 → 0 as t → ∞, then

$$ {e}_1,{e}_2,{e}_3,{e}_4,{e}_5,{e}_6,{e}_7,{e}_8,{e}_9\to 0\left(t\to \infty \right) $$

In numerical simulations for coupled system with Lorenz systems, Fig. 2 shows the synchronization errors of the coupled system with three Lorenz systems for k = 0.1. The initial states of three coupled systems are x 1(0) = 0.1, x 2(0) = 0.1, x 3(0) = 0.1; y 1(0) = 0.2, y 2(0) = 0.2, y 3(0) = 0.2; z 1(0) = 0.3, z 2(0) = 0.3, z 3(0) = 0.3; d 1(0) = 0.5.

Fig. 2
figure 2

The convergence dynamics of the error system

From Fig. 2, like in Section 2, we can see that the three coupled Rössler chaotic systems realize synchronization in a short amount of time, so the above generic criteria of global chaos synchronization is effective.

4 The secure communication theory and multistage chaos synchronized system for secure communications

In this section, the multistage chaos synchronized system scheme proposed above is applied to chaotic secure communications system. Secure communication has been an interesting field of application of chaotic synchronization since the last decade. Due to their unpredictability and broadband spectrum, chaotic signals have been used to encode information by simple masking (addition) or using modulation. These chaotic characters of sensitive dependence on initial conditions and random-like behavior make the chaos signal be fit for applying in secure communication. In chaotic communication schemes, a chaotic system is used as transmitter and the information signal is mixed at the transmitter end to generate a chaotic transmit signal, which is then transmitted to the receiver end. The receiver is also a chaotic dynamic system constructed based on the structure of transmitter and it is able to synchronize the transmitter by receiving the transmit signal. Once synchronization is achieved, the information signal is recovered by the receiver. It should be noted that the power of the information signal is required to be sufficiently lower than that of the chaotic carrier.

However, the recent researches show that even with chaotic dynamics completely hidden most of known models of chaotic communication are insecure. They are insecure against some very weak attacks, including nonlinear dynamics forecasting and reconstructing. Apart from this, slow encryption speed and weakness in resistance to channel noise are also the serious inherent drawbacks of chaotic cryptosystems. For the reason given above, we have to explore the algorithm with higher security.

Based on above discussion and analysis, within the drive-response configuration, this paper presents a method about twice encryption based on multistage chaos synchronized system for secure communications. Figure 3 illustrates the proposed secure communication system consisting of two transmitters (or drive systems) at the sending end and one receiver (or response systems) at the receiving end. As it is shown in Fig. 1, x i  (i = 1, 2, ⋯ n) and y i  (i = 1, 2, ⋯ n) are the two drive chaotic systems, z i  (i = 1, 2, ⋯ n) is the response chaotic systems. Firstly, the transmitted signal s(t) is the sum of the information signal i(t) and the output variables x 1 (or x 2, x 3) of the first chaotic transmitter at the sending end. Then, the mixed signal is transmitted to the second transmitter y i  (i = 1, 2, ⋯ n), as is seen in Fig. 3. Add the transmitted mixed signal to the output variables y 1 (or y 2, y 3) to be the pretend of the chaos signal \( \overset{.}{s}(t) \), which will be transmitted to the receiver end. At the receiver end, when the synchronization occurrence among three identical chaos systems, the original information signal i(t) can be recovered from the mixed ï(t). In this method, the original information signal i(t) has two encryption processes, one is x i  (i = 1, 2, ⋯ n) and one is y i  (i = 1, 2, ⋯ n), so if one wants to obtain the original information signal i(t), he has to decrypt the transmitted mixed signal \( \ddot{s}(t) \) twice. Considering chaos signal depending on initial values, obviously, by comparison with the original chaos masking mode, this method has higher security.

Fig. 3
figure 3

Method about secondary encryption based on chaotic synchronization

5 The noise resistance effect for the transmitter of a discrete signal and wavelet de-noise

The sensitivity of noise is also an important research area for chaos communication. However, to the best of our knowledge, few profound and general results have been reported in the literature so far because of the complexity.

5.1 Analyzing the discrete signal with random white noise perturbation

The channel constitutes an absolutely necessary part of communication system, and noise in the channel is unavoidable. Noise and information signal existed in the same process of radio communications. The existence of the noise is more or less inevitable. In the secure communication, the transforming information signal is easy to mask by noise. However, in certain nonlinear systems, including electronic circuits and biological sensory systems, the presence of noise can enhance the diction of weak signal.

In order to analyze the noise resistance effect for the signal, we consider the random white noise, as is shown in Fig. 4.

Fig. 4
figure 4

Random white noise and frequency spectrum. a Random white noise signal. b Frequency spectrum

When the signal-noise ratio is 5 dB, we analyze its effect for the transmitter of discrete signal. Suppose m(t) is the discrete signal, let the transmit signal be s(t) = m(t) + x 1(t) + n(t), n(t) be random white noise. From Fig. 3, we have \( \overset{.}{s}(t)=s(t)+{y}_1(t) \), \( \ddot{s}(t)=\overset{.}{s}(t)+{z}_1(t) \). Suppose \( \overset{.}{m}(t) \) is the first recovery of information signal and \( \ddot{m}(t) \) is the second one. According to Fig. 3 and system (7), let the transmitters be

$$ \left\{\begin{array}{l}{\overset{.}{x}}_1=a\left({x}_2-{x}_1\right)-d\left(2{x}_1-{y}_1-{z}_1\right)+s(t)\\ {}{\overset{.}{x}}_2=c{x}_1-{x}_1{x}_3-{x}_2\\ {}{\overset{.}{x}}_3={x}_1{x}_2-b{x}_3\end{array}\right. $$

and

$$ \left\{\begin{array}{l}{\overset{.}{y}}_1=a\left({y}_2-{y}_1\right)-d\left(2{y}_1-{x}_1-{z}_1\right)+\overset{.}{s}(t)\\ {}{\overset{.}{y}}_2=c{y}_1-{y}_1{y}_3-{y}_2\\ {}{\overset{.}{y}}_3={y}_1{y}_2-b{y}_3\end{array}\right. $$

And let the receiver be

$$ \left\{\begin{array}{l}{\overset{.}{z}}_1=a\left({z}_2-{z}_1\right)-d\left(2{z}_1-{x}_1-{y}_1\right)+\ddot{s}(t)\\ {}{\overset{.}{z}}_2=c{z}_1-{z}_1{z}_3-{z}_2\\ {}{\overset{.}{z}}_3={z}_1{z}_2-b{z}_3\end{array}\right. $$

Numerical simulation was done by the MATLAB environment. Figure 5 depicts the numerical results. From Fig. 5a, b, we can see the time series of x 1 and x 1 + y 1. The information signal m(t) is shown in Fig. 5c; obviously, the power of the information signal m(t) is lower than that of the chaotic carrier x 1 and x 1 + y 1. The transmitted signal s(t) and the second transmitted signal \( \overset{.}{s}(t) \) with noise perturbation are shown in Fig. 5d, e; The first recovery of information noised-signal \( \overset{.}{m}(t) \) and the second recovery of information noised-signal \( \ddot{m}(t) \) are shown in Fig. 5f, g. Figure 5h shows the error of the information signal \( \ddot{m}(t)-m(t) \). Obviously, it is easy to find that the information signal is recovered after a short transmission. This method of secondary encryption-based chaos synchronization of three identical systems has two encryptions; compared to traditional chaos masking mode, it can additionally enhance the security of communication and is harder to decode.

Fig. 5
figure 5

Transmission of a signal through the chaotic systems. a The chaos signal x 1. b The chaos signal x 1 + y 1. c The signal m(t). d The first transmitted noised-signal s(t). e The second transmitted noised-signal \( \overset{.}{s}(t) \). f The first recovered signal \( \overset{.}{m}(t) \). g The second recovered signal \( \ddot{m}(t) \). h. Error of the information signal \( \ddot{m}(t)-m(t) \)

From Fig. 5a–h, with the random white noise perturbing, although the information signal m(t) can recover after decoding, distortion occurs at the top of the signal, and the curve is not as smooth as before. This is because the error becomes large with the random white noise perturbation. But the distorted information signal is less useful in specific areas, and we should seek to the method to mend the information signal for realizing its precision of application.

5.2 Security analysis

There are many methods to improve the security of chaotic communication; the chaos masking method based on multistage chaos synchronized secure communication system is a simple and effective technique. For the first time, chaos synchronization of three identical chaotic systems is applied to secure communication through the method of chaotic masking. In the proposed method, it can enhance the security of information signal transmission; the reasons will be illustrated in the following. In this scheme, information signal can be transmitted in a form of any function pre-designed between a sender and a receiver and recovered exactly, since the function is arbitrary and the scaling factor in the above synchronization method is unpredictable.

For the above multistage chaos synchronized system for secure communications, the main advantage of using synchronization of three identical systems is that it is very difficult for an eavesdropper to predict the stochastic output of the chaotic transmitter. The proposed chaotic communication scheme is totally different from the traditional cryptosystems, due to employing three chaos states for synchronization and encryption. If the eavesdropper wants to receive the information signal m(t), one must use the state x i (t), (i = 1, 2, ⋯, n) to predict the system (y 1, y 2, ⋯, y n ), but the error is existent [52]. Then, he uses the prediction information in which error exists to predict the system (z 1, z 2, ⋯, z n ); obviously, this is difficult and, at the same time, the error will be magnified. So, the chaos synchronization of three identical systems method can enhance the security of signal transmission and also improve the vulnerable points of chaotic masking.

In other things, every chaotic system has a different state, and we can select a different state. For example, the information signal m(t) can be added to the state x i (t) and can be also added to the state x j (t), (i ≠ j). In the same way, there are different state y i (t) that can be selected to carry the transmitted mixed \( \overset{.}{s}(t) \); and at the receiving end, the transmitted mixed \( \ddot{s}(t) \) can be transmitted to the different state z i (t). In the mentioned cases, if the eavesdropper wants to get the information signal m(t), he must detect the correct state x i (t), y i (t), and z i (t), but that is very difficult or even impossible; he can only get the inaccurate information signal. And again, we can select different chaotic systems as the transmitters (or drive systems) at the sending end and one receiver (or response systems), and they may be hyperchaotic systems, or even different order, which will be more difficult for the eavesdropper to detect. So the proposed multistage chaos synchronized secure communication system has important theoretical and experimental value.

5.3 Wavelet de-nosing

Wavelet transform makes the decomposition of the original signal into detailed signal and approximate signal, which implements by translation and expansion of wavelet mother function. Although the wavelet transforms (WTs) are being used to process fault signals of power system widely, wavelet transforms can only filter white noises and are useless to filter colored noises.

The expression of wavelet function is defined as follows

$$ {\psi}_{a,b}(t)=\frac{1}{\sqrt{\left|a\right|}}\psi \left(\frac{t-b}{a}\right) $$
(12)

where a is the scale parameter and b is the time parameter. Wavelet function (12) shows an expansion.

When the parameter b varies, wavelet function activates with timeline. A cluster wavelet functions format when parameter a and b change at the same time. Signal f(t) can make decomposition by the cluster wavelet functions.

Considering the arbitrary signal f(t), the wavelet function can be defined as follows

$$ W\left(a,b\right)={\displaystyle {\int}_{-\infty}^{\infty }f}(t){\psi}_{a,b}^{*}(t)dt $$

The steps of threshold de-noising method based on usual wavelet transform are briefly described as

  1. (1)

    Obtaining wavelet coefficients W by selecting suitable wavelet and making decomposition of the original signal.

  2. (2)

    Calculating wavelet threshold and selecting suitable threshold method then choosing wavelet coefficients in order to get new wavelet coefficient W δ .

  3. (3)

    Obtaining signal after de-noising by making inverse wavelet transform to wavelet coefficient W δ .

Process the noised-signal as mentioned above. Simulated by MATLAB numerical value method, the effects of do-noising could be analyzed. After threshold de-nosing, reconstruct the de-noising signal in order to highlight the trend of original signal and keep up its smooth and similarity. Figure 6 presents the recovered discrete signals after wavelet de-noising; obviously, they are much smoother than that of Fig. 5g. Simulation results show that the algorithm is effective to reduce the impacts of random noise.

Fig. 6
figure 6

Discrete signal after wavelet de-nosing. a Processed by default threshold. b Processed by regulated threshold

6 The transmission of a high-amplitude discrete signal

One of the drawbacks of secure communication using synchronization of chaotic system is the limitation of the amplitude of the confidential messages. Usually, they have to be small enough in order to be masked by the chaotic signal (addition method) or in order to preserve the chaotic behavior (inclusion method). This constraint obviously limits the ratio of the transferred information with respect to the channel signal.

In this section, we use the three-grade chaos synchronization system for secure communication to transmit a high-amplitude discrete signal. In the transmitter, an adaptive controller is adopted to pick up the change of high-amplitude discrete signal, and to inject the controller's error into the transmitting system. At the same time, the information is directly added to the chaotic signal in transmission to drive the receiving system. In the receiver, another adaptive controller is used to maintain chaotic synchronization of the transmitting and receiving systems and to recover the information signal. Since the synchronization error is independent from the information signal and, at the same time, we adopt two attenuation factors, the power of the information signal can be equivalent to that of the chaotic signal, even much lower. So the frequency of the information signal can be set within the range of the principal frequencies of the chaotic signal.

According to Fig. 3 and system (7), let Lorenz chaotic systems be the transmitters

$$ \left\{\begin{array}{l}{\overset{.}{x}}_1=a\left({x}_2-{x}_1\right)-d\left(2{x}_1-{y}_1-{z}_1\right)\\ {}{\overset{.}{x}}_2=c{x}_1-{x}_1{x}_3-{x}_2+m{w}_1\\ {}{\overset{.}{x}}_3={x}_1{x}_2-b{x}_3\end{array}\right. $$
$$ {\overset{.}{w}}_1=n\left(h(t)-{w}_1\right) $$

and

$$ \left\{\begin{array}{l}{\overset{.}{y}}_1=a\left({y}_2-{y}_1\right)-d\left(2{y}_1-{x}_1-{z}_1\right)\\ {}{\overset{.}{y}}_2=c{y}_1-{y}_1{y}_3-{y}_2+m{w}_2\\ {}{\overset{.}{y}}_3={y}_1{y}_2-b{y}_3\end{array}\right. $$
$$ {\overset{.}{w}}_2=n\left(h(t)-{w}_2\right) $$

Let the receiver be

$$ \left\{\begin{array}{l}{\overset{.}{z}}_1=a\left({z}_2-{z}_1\right)-d\left(2{z}_1-{x}_1-{y}_1\right)\\ {}{\overset{.}{z}}_2=c{z}_1-{z}_1{z}_3-{z}_2+m{w}_3\\ {}{\overset{.}{z}}_3={z}_1{z}_2-b{z}_3\end{array}\right. $$
$$ {\overset{.}{w}}_3=n\left(h(t)-{w}_3\right) $$

where d is the control gain, and we can select it appropriately to get the synchronization of three chaotic systems with bidirectional coupling. h(t) is the information signal with a high amplitude 100, as be shown in the Fig. 7. m, n are attenuation factors, which will make the information signal be transmitted successfully. Hence, the power of the information signal can be equivalent to that of the chaotic signal and the frequency of the information signal can be set within the principal frequencies of the chaotic oscillation. w 1, w 2, w 3 are adaptive controllers for trace the signal at the transmitter and receiver end.

Fig. 7
figure 7

The discrete information signal

Without the attenuation factors, transmitter systems will lose original chaos characteristic when they mask the high-amplitude signal h(t). Conversely, the high amplitude has no effect on the chaotic system if it is treated by attenuation factor m = 0.2, n = 0.1, as shown in Fig. 8a, b. The experiment results show that phase phenomena are probably caused while the amplitude of input signal increase to some extent. Obviously, the fundamental frequency of the information signal is required within the center frequency band of the chaotic signal.

Fig. 8
figure 8

The chaotic states of transmitter systems. a The distortion state of transmitter system without attenuation factor. b The chaotic state of transmitter system with attenuation factor

This is because that the error of information signal h(t) and controller w 1 is added into transmitters, rather than the information signal h(t) is added into transmitters directly, therefore, the system still keep chaotic state even if the amplitude of h(t) is high.

Numerical simulation was done by the MATLAB environment. The information signal h(t) is transmitted at the receiving end by masking it into the chaotic signals x 2 and y 2, as been shown in Fig. 9a. Suppose h 1(t) is the first recovered signal, h 2(t) is the latter two recovered signal, as shown in Fig. 9b, c. From Fig. 9b, c, processed signal h(t) by the two attenuation factor can recover rapidly. This method not only expands the scope of transmitted signal but it also has stronger practicability.

Fig. 9
figure 9

The transmitted mixed signals. a The mixed signal m(t). b Recovered signal h 1(t). c Recovered signal h 2(t)

The results of theoretical analysis and numerical simulation show that the presented method not only enhances the degree of security of low-dimensional chaotic systems but also significantly improves the signal-to-noise ratio at the receiving end.

7 Conclusions

The paper studies an adaptive synchronization scheme of three coupled identical systems. Strict theoretical proofs are given to the method for three unidirectional coupled Rössler system and bidirectional Lorenz system. From Figs. 1 and 2, we can see that the two generic criteria of global chaos synchronization are effective; at the same time, the three coupled (even more) identical chaotic systems can be a foundation for chaos secure communication.

Meanwhile, almost all the methods of breaking ciphers are aiming mainly at second order of chaos synchronized secure communication system based on chaos masking but very few methods at multistage chaotic systems. So in the framework of multistage chaotic synchronization systems, we show that the above scheme could be applied in secure communication. We have provided an example to illustrate the implementation of the scheme for transmitting an information signal disturbed by random white noise. The information signal transmitted between two senders and one receiver can be recovered through simple operation. In addition, we reconstruct the original signal using wavelet de-nosing. Both theoretical analysis and numerical simulations demonstrate that the proposed system is of better security and high precision for recovered source signals even when channel noise is very high. Moreover, the high-amplitude signal transmitted between two senders and one receiver can be recovered through simple operation. Numerical results show the successfulness in transmitting the information signal through chaotic carriers.

Besides, this paper mainly researches the synchronization among three same order chaotic systems and the application in secure communication. Furthermore, we can seek the new methods to realize the global synchronization among three different order chaotic systems and their application in secure communication. The realization of secure communication systems based on three different order chaotic systems can enlarge the range of usable chaotic systems and increase the difficulty of information signal decryption. So, it has practical significance on the development and application of chaotic synchronization technology.

It is worth noting that the sensitivity of multistage chaotic system synchronization to initial parameter and noise is also an important research area for chaos communication. However, to the best of our knowledge, few profound and general results have been reported in the literature so far because of the complexity. Besides, in traditional schemes, the amplitude of the messages has to be smaller than that of the chaotic system’s signal. In other words, the message’s power spectrum should be buried into that of the chaotic signal. Therefore, in order to maintain synchronization between the transmitter and the receiver, and to ensure that the chaotic signal masks the messages, the dynamic range of the messages has to be significantly smaller than that of the chaotic scalar. In this paper, the amplitude of information signal should be smaller than that of the chaotic signal in order not to destroy the system chaotic behavior.

References

  1. LM Pecora, TL Carroll, Synchronization in chaotic systems. Phys. Rev. Lett. 64, 821–824 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  2. DY Chen, R Zhang, XY Ma, S Liu, Chaotic synchronization and anti-synchronization for a novel class of multiple chaotic systems via a sliding mode control scheme. Nonlinear. Dynam. 69, 35–55 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  3. DY Chen, C Wu, CF Liu, XY Ma, Synchronization and circuit simulation of a new double-wing chaos. Nonlinear. Dynam. 67, 1481–1504 (2012)

    Article  MATH  Google Scholar 

  4. DY Chen, R Zhang, JC Sprott, Synchronization between integer-order chaotic systems and a class of fractional-order chaotic systems via sliding mode control. Chaos 22, 023130 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  5. MF Hu, YQ Yang, ZY Xu, LX Guo, Hybrid projective synchronization in a chaotic complex nonlinear system. Math. Comput. Simulat. 79, 449–457 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  6. S Gakkhar, RK Naji, Order and chaos in a food web consisting of a predator and two independent preys. Commun. Nonlinear. Sci. Numer. Simul. 10, 105–120 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  7. XS Zhao, ZB Li, S Li, Synchronization of a chaotic finance system. Appl. Math. Comput. 217, 6031–6039 (2011)

    MathSciNet  MATH  Google Scholar 

  8. S Gakkhar, B Singh, Dynamics of modified Leslie–Gower-type prey–predator model with seasonally varying parameters. Chaos, Solitons & Fractals. 27, 1239–1255 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  9. S Teerawat, K Suwat, Adaptive synchronization of hyperchaotic systems via passivity feedback control with time-varying gains. J. Sound Vib. 329, 2490–2496 (2010)

    Article  MATH  Google Scholar 

  10. JJ Yan, ML Hung, TL Liao, Adaptive sliding mode control for synchronization of chaotic gyros with fully unknown parameters. J. Sound Vib. 298, 298–306 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  11. G Grassi, S Mascolo, Nonlinear observer design to synchronize hyperchaotic systems via a scalar signal. IEEE Trans. Circ. Syst. I. 44, 1011–1014 (1997)

    Article  Google Scholar 

  12. L Kocarev, U Parlitz, General approach for chaotic synchronization with application to communication. Phys. Rev. Lett. 74, 5028–5031 (1995)

    Article  Google Scholar 

  13. I Kyprianidis, I Stouboulos, Chaotic synchronization of three coupled oscillators with ring connection. Chaos, Solitons & Fractals. 17, 327–336 (2003)

    Article  MATH  Google Scholar 

  14. T Zhou, JH Lü, GR Chen, Synchronization stability of three chaotic systems with linear coupling. Phys Lett A. 301, 231–240 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  15. J Song, Global chaos synchronization or there coupled diffusionless Lorenz systems. Da xue shu xue. 23, 54–58 (2007)

    Google Scholar 

  16. XL An, JN Yu, YD Chu, Global chaos synchronization of three coupled nonlinear autonomous systems and a novel method of chaos encryption. Chaos, Solitons & Fractals. 42, 865–873 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  17. JA Lu, XP Han, YT Li, Adaptive coupled synchronization among multi-Lorenz systems family. Chaos, Solitons & Fractals. 31, 866–878 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  18. YG Yu, SC Zhang, Global synchronization of three coupled chaotic systems with ring connection. Chaos, Solitons & Fractals. 24, 1233–1242 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  19. L Kovarev, KS Eckert, LO Chua et al., Experimental demonstration of secure communications via chaotic synchronization. Int. J. Bifurcat. Chaos. 2, 709–713 (1992)

    Article  MATH  Google Scholar 

  20. U Parlitz, LO Chua et al., Transmission of digital signals by chaotic synchronization. Int. J. Bifurcat. Chaos. 2, 973–977 (1992)

    Article  MATH  Google Scholar 

  21. CW Wu, LO Chua, A simple way to synchronize chaotic systems with applications to secure communications systems. Int. J. Bifurcat. Chaos. 3, 1619–1627 (1993)

    Article  MATH  Google Scholar 

  22. M Feki, B Robert, G Gelle et al., Secure digital communication using discrete-time chaos synchronization. Chaos, Solitons & Fractals. 18, 881–890 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  23. U Feldmann, M Hasler, W Schwarz, Communication by chaotic signals: the inverse system approach. Int J Cricuit Theory Appl. 24, 551–576 (1996)

    Article  MATH  Google Scholar 

  24. T Yang, A survey of chaotic secure communication systems. Int. J. Comp. Cognit. 2, 81–130 (2004)

    Google Scholar 

  25. KM Cuomo, AV Oppenheim, Circuit implementation of synchronized chaos with applications to communications. Phys. Rev. Lett. 71, 65–68 (1993)

    Article  Google Scholar 

  26. JG Lu, YG Xi, Chaos communication based on synchronization of discrete-time chaotic systems. Chin Phys. 14, 274–278 (2005)

    Article  Google Scholar 

  27. KM Cuomo, AV Oppenheim, SH Strogatz, Robustness and signal recovery in a synchronized chaotic system. Int. J. Bifurcat. Chaos. 3, 1629–1638 (1993)

    Article  MATH  Google Scholar 

  28. J Garcia-Ojalvo, R Roy, Spatiotemporal communication with synchronized optical chaos. Phys. Rev. Lett. 86, 5204–5207 (2001)

    Article  Google Scholar 

  29. S Boccaletti, A Farini, FT Arecchi, Adaptive synchronization of chaos for secure communication. Phys Rev E. 55, 4979–4981 (1997)

    Article  MathSciNet  Google Scholar 

  30. AA Minai, T Anand, Synchronization of chaotic maps through a noisy coupling channel with application to digital communication. Phys Rev E. 59, 312–320 (1999)

    Article  Google Scholar 

  31. M Feki, B Robert, G Gelle, Secure digital communication using discrete-time chaos synchronization. Chaos, Solitons & ractals. 18, 881–890 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  32. E Konstantinos, JC Sprott, A comparison of correlation and Lyapunov dimensions. Physica D. 200, 156–164 (2005)

    Article  MATH  Google Scholar 

  33. JB He, JP Cai, J LiN, Synchronization of hyperchaotic systems with multiple unknown parameters and its application in secure communication. Optik 127, 2502–2508 (2016)

    Article  Google Scholar 

  34. LF Zhang, XL An, JG Zhang, A new chaos synchronization scheme and its application to secure communications. Nonlinear. Dyn. 73, 705–722 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  35. XL An, L Zhang, JN Yu, Study on a new multistage chaos synchronized secure communication system. J. Sichuan University. 49, 1087–1094 (2012)

    MathSciNet  Google Scholar 

  36. C Xiao, SG Lian, LF Wang et al., A speed-adaptive media encryption scheme for real-time recording and playback system. EURASIP J. Wirel. Commun. Netw. 1–9, 371513 (2010)

    Article  Google Scholar 

  37. HL Chen, W Lou, X Sun et al., A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wirel. Commun. Netw. 1–11, 627039 (2010)

    Google Scholar 

  38. HL Chen, W Lou, Z Wang, A novel secure localization approach in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 1–12, 981280 (2010)

    Article  Google Scholar 

  39. H Li, H Liu, S Vafi, Bipolar chaotic pulse position modulation communication system based on cyclic LDPC. EURASIP J. Wirel. Commun. Netw. 4, 1–9 (2014)

    Google Scholar 

  40. F Liu, XL Chen, L Mu ZH et al., Feedback synchronization of chaotic system with application to secure communications. Acta Electronica Sinica. 28, 46–48 (2000)

    Google Scholar 

  41. JY Kuang, LQ Pei, XJ Tang, A multistage chaotic synchronized system for secure communications. Acta Electronica Sinica. 27, 23–268 (1999)

    Google Scholar 

  42. XL An, JN Yu, YZ Li, YD Chu, Design of a new multistage chaos synchronized system for secure communications and study on noise perturbation. Math Comput Model 54, 7–18 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  43. JY Kuang, LQ Pei, XJ Tang, RH Huang, A multistage chaos synchronized system for secure communications. Acta electronica. 27, 23–26 (1999)

    Google Scholar 

  44. XP Guan, ZP Fan, HP Peng, LJ Li, A new multistage chaotic system and its application to secure communication. J. Yanshan University 25, 287–289 (2001)

    Google Scholar 

  45. JF Li, N Li, A new chaotic masking method for secure communications based on Chua’s circuit. Syst Eng Electron 24, 41–43 (2002)

    Google Scholar 

  46. JF Li, N Li, A secure communication method for a high-power information signal based on chaotic masking. Chin Phys 11(11), 1124–1127 (2002)

    Article  Google Scholar 

  47. Z. Xu et al. Crowdsourcing based description of urban emergency events using social media big data. IEEE Transactions on Cloud Computing, 10.1109/TCC.2016.2517638

  48. Z. Xu et al. Crowdsourcing based social media data analysis of urban emergency events. Multimedia Tools and Applications, 10.1007/s11042-015-2731-1

  49. Z Xu et al., Participatory sensing based semantic and spatial analysis of urban emergency events using mobile social media. EURASIP J. Wirel. Commun. Netw. 2016, 44 (2016)

    Article  Google Scholar 

  50. G Zheng, D Boutat, T Floquet, JP Barbot, Secure communication based on multi-input multi-output chaotic system with large message amplitude. Chaos, Solitons & Fractals. 41, 1510–1517 (2009)

    Article  Google Scholar 

  51. N Li, JF Li, Generalized projective synchronization of chaotic system based on a single driving variable and its application in secure communication. Acta Physica Sinica 57, 6093–6098(2008) (2008)

    MathSciNet  MATH  Google Scholar 

  52. KM Short, Steps toward unmasking secure communications. Int J Bifurcat Chaos. 4, 959–977 (1994)

    Article  MATH  Google Scholar 

Download references

Acknowledgements

The authors gratefully acknowledge the support from the National Natural Science Foundation (No. 61364001), Science and Technology Program of Gansu Province (No. 144GKCA018), and Lanzhou Jiaotong University Yong Scientific Research Fund Project (No. 2014024), China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiangang Zhang.

Additional information

Competing interests

The authors declare that they have no competing interests.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, J., Zhang, L., An, X. et al. Adaptive coupled synchronization among three coupled chaos systems and its application to secure communications. J Wireless Com Network 2016, 134 (2016). https://doi.org/10.1186/s13638-016-0630-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-016-0630-4

Keywords