999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Finite-time complex projective synchronization of fractional-order complex-valued uncertain multi-link network and its image encryption application

2022-11-21 09:33:56YongBingHu胡永兵XiaoMinYang楊曉敏DaWeiDing丁大為andZongLiYang楊宗立
Chinese Physics B 2022年11期

Yong-Bing Hu(胡永兵) Xiao-Min Yang(楊曉敏) Da-Wei Ding(丁大為) and Zong-Li Yang(楊宗立)

1School of Electronics and Information Engineering,Anhui University,Hefei 230601,China

2National Engineering Research Center for Agro-Ecological Big Data Analysis&Application,Anhui University,Hefei 230601,China

Multi-link networks are universal in the real world such as relationship networks,transportation networks,and communication networks. It is significant to investigate the synchronization of the network with multi-link. In this paper,considering the complex network with uncertain parameters,new adaptive controller and update laws are proposed to ensure that complex-valued multilink network realizes finite-time complex projective synchronization(FTCPS).In addition,based on fractional-order Lyapunov functional method and finite-time stability theory, the criteria of FTCPS are derived and synchronization time is given which is associated with fractional order and control parameters. Meanwhile,numerical example is given to verify the validity of proposed finite-time complex projection strategy and analyze the relationship between synchronization time and fractional order and control parameters.Finally,the network is applied to image encryption,and the security analysis is carried out to verify the correctness of this method.

Keywords: multi-links network, fractional order, complex-valued network, finite-time complex projective synchronization,image encryption

1. Introduction

Complex networks (CNs) are effective system modeling tools in the real world, every network can be described in terms of nodes and edges, where each edge represents a connection between nodes. Multi-link networks[1–3]are the networks that have more than one connection between two nodes.There are numerous multilink networks in life, such as relationship networks, transportation networks, and communication networks.[4,5]For example, in the transportation networks, the speeds of transmission among highway network,railway network, and airline network are different from each other,which can be seen as that the connections of transportation network have different delays. In Refs.[6,7],the complex multi-link network is split into sub-networks with delay so as to describe the delay characteristics of multi-links network.As a special case of multi-link network, single-link network has been investigated by many researchers. Nevertheless, little attention has been paid to multi-link networks. Therefore,complex dynamic networks with multiple links have certain research value.[8,9]

Synchronization is an important research topic in CNs.Researchers have studied many synchronization methods,such as projective synchronization,[10]pinning synchronization,[11]and exponential synchronization.[12,13]Projective synchronization(PS)reflects the proportional relationship between synchronization states by introducing a scaling factor.In Ref.[14], Shaet al.used the control method based on uncertainty and disturbance estimation and linear feedback to accomplish PS in complex chaotic systems. As an extension of PS, complex projective synchronization (CPS) leads to synchronization complexity and diversity because its scale factor is a complex number. In Ref.[15],using the stability theorem of the fractional-order systems with multiple delays, Dinget al.achieved CPS in memristive neural network. The CPS occurs asymptotically and it has unbounded convergence time.In fact,the synchronization is often required to accomplish in a finite time. The finite-time control technology is made realize finite-time synchronization in CNs.[16,17]By using a functional scaling factor,Wanget al.investigated finite-time function projective synchronization for multi-link networks with time-varying delay.[18]In Ref. [19], Zhaoet al. realized the fixed-time synchronization and finite-time synchronization in CNs with multilink by using Lyapunov function and linear matrix inequality. In Ref. [20], Zhenget al. studied the decay synchronization of complex multi-link time-varying dynamic network.

In the existing literature concerning multi-link networks,most of researches are based on integer-order multi-link networks. As a mathematical element that deals with integrals and derivatives in the form of non-integer order,fractional calculus not only has more degrees of freedom than integer calculus,but also possesses unique properties including heredity and infinite memory. At present, fractional calculus has been widely used in CNs which is called fractional order CNs. For example, in Ref.[21], Liet al.used hybrid impulsive control to investigate the global synchronization for two fractional order CNs with non-delayed and delayed coupling. Baoet al.achieved the synchronization of fractional order neural networks with output coupling on the basis of fractional-order Lyapunov function and linear matrix inequalities.[22]Nevertheless, as far as we know, the research results of fractional order multi-link networks are few until now. Therefore, it is significant to incorporate fractional calculus into multi-links networks.

Comparing with real-valued networks, the applications of complex-valued networks are more extensive. For example, there are more variables and transmitted information in complex-valued networks, and the security of transmitted information is also greatly enhanced. Furthermore,complex-valued networks show complex dynamic behaviors and can describe some physical phenomena such as electromagnetic field amplitude, and rotating fluid.[23,24]Yanget al. studied the quasi-projective synchronization of fractional order complex-valued neural networks via linear control strategy.[25]In Ref.[26],Xuet al.used complex function theory and combined Lyapunov method with graph theory to address finite-time synchronization for fractional order complexvalued multi-weighted dynamical networks.

Because the fluctuation of system parameters and the disturbance of external environment are always inevitable, they lead to the uncertainty of system parameters. When analyzing system dynamic characteristics, parameter uncertainties should be considered because they may have influence on the synchronization performance and system stability. Therefore,uncertain complex networks are valuable.[27–30]In Ref. [31],making use of the properties of fractional calculus, Liet al.accomplished finite-time synchronization for fractional order complex dynamical networks (FOCDNs) with unknown parameters and the parameters were identified. Duet al. investigated synchronization of all nodes in FOCDNs with uncertain parameters by adaptive control strategy.[32]Yanget al.designed two different controllers to study finite-time lag synchronization of uncertain complex networks with impulsive disturbance.[33]

In addition, synchronization can improve the security of image transmission and has great applications in secure communication. Considering the highly nonlinear nature of complex networks and non-locality of fractional order chaotic systems, fractional order complex networks are worth applying to image encryption.[34]Wang and Yang proposed a new encryption system algorithm for encrypting/decrypting color images.[35]The DNA encoding algorithm has advantages of high parallelism, high storage capacity and low power consumption in the field of image encryption.[36,37]Moreover,image encryption based on complex network and DNA approach has a good encryption effect.

From the above analysis,this paper is to address FTCPS of fractional order complex-valued multi-links network and applies it to the image encryption. The main difficulty is how to deal with the delay problem in fractional order multi-link networks. The synchronization is realized via adaptive controller.The criteria of FTCPS are obtained by using fractionalorder Lyapunov functional method and finite-time stability theory. Two examples are used to verify the validity of theoretical results. The main contributions are listed below. First,most of researches are based on integer-order multi-links networks,but we extend the integer-order multi-link networks to the fractional-order networks to make the results more general. Secondly,most of previous multi-link networks are realvalued,but this paper focuses on complex-valued field. Then,considering the uncertainty of network parameters, new update laws are designed and the control strategy of FTCPS is proposed. Compared with the infinite-time synchronization,this finite-time synchronization can improve convergence performance. Finally, the criteria of FTCPS are derived and the relationship between synchronization time and fractional order and control parameters is analyzed. Besides, the network is applied to image encryption and the security analysis is carried out.

The rest of this paper is structured as follows.In Section 2 some preliminaries and network description are introduced.In Section 3, the main results are demonstrated. Numerical example and image encryption application are provided in Section 4 to verify the validity of the proposed results. In Section 5 some conclusions are drawn from the researches of this paper.

2. Preliminaries and network description

We introduce some definitions and lemmas in this section,which are helpful for our later research.

Definition 1[38]Caputo derivative of orderαfor a functionf(t)∈Cn([t0,+∞)R) (the set of alln-order continuous differentiable functions on[t0,+∞))is defined as

wheret≥t0,nis a positive integer,n-1<α <n.Γ(·)is the Gamma function. Particularly,when 0<α <1,

In this paper,we consider the fractional order complex-valued multi-links network with uncertain parameters, which is described by

Lemma 3[42]Forδr≥0 withr=1,2,...,k, 0≤σ≤1,then

Remark 2 Compared with the finite-time synchronization issue of integer-order systems,Lemma 4 has a wide range of applications, and the Lemma 4 can be used to study the finite-time stability or synchronization issue for fractionalorder systems or FOCDNs.

3. Main results

In this section,we put forward an adaptive controller for accomplishing FTCPS in the fractional-order complex-valued uncertain multi-links network.

Network(1)can be rewritten as follows:

then it will follow that

Using Lemma 3,it follows that

4. Numerical simulation and application to image encryption

4.1. Numerical examples

In this section,the Lorenz system and application to image encryption are used to verify the validity of the proposed theorem.Example 1 Consider complex Lorenz system as the node dynamic system of network with five nodes as follows:

whereα=0.95,Θ=(a,b,c)T=(10,28,8/3)T,xi1,xi2∈Cn,xi3∈Rn,i=1,2,...5. Chaotic behavior of fractional order complex Lorenz system is exhibited in Fig.1.

Fig.1. Chaotic behavior of fractional order complex Lorenz system.

Consider the multi-link network with two different subnetworks,each with five nodes. The weight configuration matrixesA0andA1are respectively chosen as

whereA0has no time-delay. Figure 2 shows the topological structures of two weighted subgraphsA0andA1respectively.

Fig.2. Topological structures of two weighted subgraphs,showing(a)topological structures of weighted subgraph A0 and (b) topological structure of weighted subgraph A1.

The fractional-order complex-valued uncertain multilinks network containing five nodes is expressed as achieve CPS with Eq. (18) within the limited time, and we obtain the estimationt1

Figure 3 shows the trajectories of synchronization errorei(t)(i=1,2,...,5)We can see thatei(t)=0(i=1,2,...,5)whent ≥1.3087, which denotes that the networks (17) and(18) can accomplish CPS in a finite time. Figure 4 displays the trajectories of uncertain parameters. Moreover, we observe from Fig. 4 that?1→10 andβi2→28 within a finite time interval,which indicates that the uncertain parameters are successfully identified.

Fig.3. Synchronization errors ei(t)(i=1,2,...,5)of networks(17)and(18),showing[(a),(c),and(e)]real part of synchronization error,and[(b),(d),and(f)]imaginary part of synchronization error.

Fig.4. Uncertain parameters of the networks(17)and(18): (a)estimation of ?1 (b)estimation of βi2.

In the following Figs. 5–10, we display the relations between the estimatedt1and the fractional-order parameterαand the control parametersρandλ. From Fig.5,we can observe that the estimatedt1increases with the growth of the the fractional-orderα. From Fig.6,we can observe that the estimatedt1firstly decreases as the control parameterρincreases,then it increases as theρincreases. From Fig. 7, we can see that the estimatedt1decreases with the control parameterλincreasing.

Fig.5. Relations between estimated t1 and α.

Fig.6. Relations between estimated t1 and ρ.

Fig.7. Relation between estimated t1 and λ.

Fig.8. Relations between estimated t1 and α,λ.

Fig.9. Relations between estimated t1 and ρ,α.

Fig.10. Relations between estimated t1 and ρ,λ.

Example 2 Based on synchronization results derived in Example 1, we apply them to image encryption. We take the network (17) as the encryption chaotic sequences to realize the image encryption and the synchronous node (18) as the decryption chaotic sequences to realize image decryption.

Here,we use the image encryption scheme on DNA coding. The DNA sequence consists of A(adenine),G(guanine),C (cytosine), and T (thymine), where A and T, G and C are two complementary base pairs. Owing to 0 and 1 being complementary in binary,we can encode four nucleic acids A,C,G and T with 00, 01, 10, and 11. Table 1 gives 8 kinds of encoding combinations which satisfy the Watson-Crick complement rule. Table 2 show the addition,subtraction and XOR operations of DNA sequences.

Table 1. Rules of DNA coding.

Table 2. Operations of DNA sequences.

4.2. Processes of image encryption and decryption

We use the fractional order complex-valued uncertain multi-links network to generate chaotic sequences to disturb the pixels of original image. The encryption flowchart is shown in Fig.11,which includes the generation of chaotic sequence and encryption of image by DNA coding and chaotic sequence.

Fig.11. Flowchart of encryption.

4.2.1. Generate chaotic sequence

Step 1 The fractional order complex-valued uncertain multi-links network is iteratedN0+mntimes, and the lastmniterations are regarded as valid data,then the four state valuesxi(1),xi(2),xi(3),andxi(1)+xi(2),i=1,2,3,...,mnare obtained.

Step 2 Four state values are used to generate sequencess(i,j)∈[0,255],s′(i,j)∈[0,255],j=1,2,3,4.The calculation formulas are as follows:

4.3. Simulation results and security analyses

We select the color image with the size of 256×256×3 as the original image, which is depicted in Fig. 12(a). Using the encryption algorithm, we obtain the encrypted image in Fig. 12(b). It has no trace of the original image. The decrypted-image is shown in Fig.12(c).

As for encrypted image,it must be secure and can resist different security attacks. For this,we analyze the security from the histogram distributions and correlation coefficients.

4.3.1. Histograms test

The distribution of image pixel intensity values can be evaluated by histogram. We can see that the histograms of the encrypted image are equally distributed which can protect the original image information and resist the statistical attack. Figures 13(a)–13(f)display the histograms of the original image and encrypted image in the R,G,and B channels,respectively.

Fig.13. Histograms of[(a)–(c)]original images and[(d)–(f)]encrypted images.

4.3.2. Correlation coefficient analysis

The correlation of adjacent pixels reflects the correlation degree of pixel values at the adjacent positions of images.

Generally,we calculate the correlations of adjacent pixels in horizontal, vertical, and diagonal directions from the following formula:

wherexandyare the pixel values of two adjacent pixels,NdenotesNpairs of adjacent pixels selected,and

From Fig. 14 and Table 3, we can observe that correlations of adjacent pixels in the original image are high, but in the encrypted image, the correlations are efficiently reduced,which indicates that the encrypted image can effectively hide the information about original image.

Fig.14. Correlation of adjacent pixels in horizontal directions,showing[(a)–(c)]original images and[(d)–(f)]encrypted images.

Table 3. Correlation coefficients of adjacent pixels in original images and encrypted images.

5. Conclusions

This paper addresses FTCPS problem of fractional order complex-valued uncertain multi-link networks. Considering the uncertain parameters, the adaptive controller and parameter update laws are designed. On the basis of fractionalorder Lyapunov functional method and finite-time stability theory, the criteria of FTCPS in fractional-order complexvalued multi-link network are derived. In addition, the relationship between synchronization time and fractional order and control parameters are analyzed. Finally, simulation example and image encryption application are provided to verify the correctness of the obtained results. In the future, we will study the finite-time function projective synchronization in fractional order complex multi-links networks with timevarying delay.

主站蜘蛛池模板: 国产精品免费露脸视频| 2022国产无码在线| 九九热精品视频在线| P尤物久久99国产综合精品| 日本高清在线看免费观看| 免费无遮挡AV| 欧美日韩精品在线播放| 五月天综合网亚洲综合天堂网| 亚洲a级毛片| 亚洲欧美在线综合图区| 亚洲综合18p| 欧美一级高清片欧美国产欧美| 波多野结衣亚洲一区| 国产a网站| 国产黄网永久免费| 中国美女**毛片录像在线| 天堂久久久久久中文字幕| 国产成人你懂的在线观看| 精品伊人久久久香线蕉| 全部免费特黄特色大片视频| 亚洲av片在线免费观看| 欧美第一页在线| 99偷拍视频精品一区二区| 丁香婷婷综合激情| 香蕉精品在线| 最新国产高清在线| 麻豆精品视频在线原创| 深爱婷婷激情网| 久综合日韩| 国产在线小视频| 91精品人妻一区二区| 永久免费无码日韩视频| 欧美日韩午夜| 久久亚洲黄色视频| 无码有码中文字幕| 美女免费精品高清毛片在线视| 刘亦菲一区二区在线观看| 毛片基地视频| 青青草91视频| 国产精品分类视频分类一区| 在线观看欧美国产| 9966国产精品视频| 国产青榴视频在线观看网站| 美女国产在线| 亚洲综合色在线| 99国产精品免费观看视频| 亚洲视频a| 日韩免费中文字幕| 精品成人免费自拍视频| 亚洲欧美日韩动漫| 亚洲天堂区| 在线亚洲精品福利网址导航| 国产在线精彩视频二区| 在线精品亚洲一区二区古装| 无码中文字幕精品推荐| 在线欧美国产| 亚洲欧美一区在线| 看国产一级毛片| 老司机精品99在线播放| 国产拍在线| 中文字幕1区2区| 国产素人在线| 日日拍夜夜嗷嗷叫国产| 色婷婷成人| 欧美a在线视频| 国产麻豆福利av在线播放 | 在线观看国产网址你懂的| 国产成人综合亚洲欧洲色就色| 国产欧美精品专区一区二区| 久久永久精品免费视频| 亚洲欧洲天堂色AV| 久久99精品久久久久纯品| 国产日韩欧美在线播放| 亚洲视频在线观看免费视频| 毛片久久久| 中文无码毛片又爽又刺激| 自慰网址在线观看| 久久久久九九精品影院| 狠狠久久综合伊人不卡| 永久免费无码成人网站| 日韩国产另类| 国产手机在线小视频免费观看|