4.5 Article

A finite-time sliding mode control technique for synchronization chaotic fractional-order laser systems with application on encryption of color images

Journal

OPTIK
Volume 285, Issue -, Pages -

Publisher

ELSEVIER GMBH
DOI: 10.1016/j.ijleo.2023.170948

Keywords

Synchronization; Finite-time SMC; FO Laser systems; Dynamic-free scheme; Encryption

Categories

Ask authors/readers for more resources

In recent years, fractional order Laser chaotic systems have gained popularity in both theory and applications, and various classes of these systems have been introduced. This paper presents a novel finite-time sliding mode control (SMC) methodology to synchronize a class of unknown fractional order (FO) Laser chaotic systems with input saturation. The proposed method is based on the FO version of the Lyapunov stability theorem and effectively suppresses chaotic behavior without undesirable chattering. It is demonstrated by applying the method to a chaotic FO Laser system and using it for encrypting/decrypting color pictures.
In recent years, fractional order Laser chaotic systems have gained popularity in both theory and applications, and various classes of these systems have been introduced. This paper presents a dynamic-free sliding mode control (SMC) methodology to synchronize a class of unknown frac-tional order (FO) Laser chaotic systems with input saturation. The proposed method uses a defined continuous function instead of the discrete sign function and is based on the FO version of the Lyapunov stability theorem. The result is a novel finite-time SMC (FTSMC) methodology that effectively suppresses chaotic behavior in FO Laser chaotic systems without undesirable chat-tering. This approach is designed to take advantage of the boundedness feature of the FO chaotic system. The efficacy of the FTSMC is demonstrated by applying the method to a chaotic FO Laser system at two different non-integer orders, and its practical applicability is demonstrated by using it to encrypt/decrypt color pictures. The suggested encryption/decryption methodology uses an adaptation of the pre-diffusion permutation-diffusion structure to increase security. Performance and security analyses, including histogram analysis, neighboring pixel correlation analysis, and information entropy analysis, provide further support for the suggested encryption system's superiority.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available