Design and FPGA Implementation of Encrypted Frame Transmission Scheme Based On Chaotic Reverse Synchronization
Design and FPGA Implementation of Encrypted Frame Transmission Scheme Based On Chaotic Reverse Synchronization
https://doi.org/10.1007/s11071-024-10538-6
RESEARCH
Received: 24 August 2024 / Accepted: 19 October 2024 / Published online: 1 November 2024
© The Author(s), under exclusive licence to Springer Nature B.V. 2024
Abstract Chaos exhibits significant characteristics, was designed and implemented in FPGA for the first
including pseudo-randomness and unpredictability. time, with the objective of improving the security of
These properties render chaos a valuable tool in prac- frame transmission. The experimental results demon-
tical applications such as secure communication. Fur- strate that the system is capable of precisely regulating
thermore, chaos synchronization represents a crucial the time synchronization between the sender and the
avenue of research within the field of chaos. The paper receiver. Furthermore, the establishment of synchro-
addresses the issue of the lack of flexibility and prac- nization is rapid, and the transmission speed is consid-
ticality associated with the synchronization method erable, which aligns with the practical requirements of
of discrete chaos synchronization control. To address the project.
the limitations of the discrete chaotic synchroniza-
tion method, this paper proposes a novel approach Keywords Encrypted transmission scheme · Discrete
to reverse synchronization of hyperchaotic Chen sys- backward chaotic synchronization · Chaotic frame
tems based on field-programmable gate arrays. This synchronization · FPGA
method offers a flexible and practical solution that can
facilitate the direct implementation of discrete chaotic
synchronization in real-world applications. Firstly, the 1 Introduction
dynamic behavior of the hyperchaotic Chen system is
analyzed, and a reverse synchronization method for the A chaotic system is a nonlinear system that exhibits
hyperchaotic Chen system is proposed to advance the properties of pseudo-randomness, ergodicity, initial
research of reverse synchronization theory and enhance value sensitivity, and long-term unpredictability. These
the flexibility of controller design. Secondly, based characteristics enable chaotic systems to achieve a high
on the synchronization scheme, an encrypted trans- degree of complexity and variability, making them
mission scheme combined with frame synchronization useful in a range of applications, including secure
communication [1], image processing [2,3], and other
Q. Shi · Y. Zhao · Q. Ding (B)
Electrical Engineering College, Heilongjiang University, 74
fields. A number of technologies based on chaos the-
Xuefu Road, Harbin 150080, China ory have been proposed. Furthermore, due to the fact
e-mail: [email protected] that chaotic systems demonstrate seemingly random
Q. Shi yet inherently deterministic dynamic behaviors, it was
e-mail: [email protected] previously hypothesized by researchers that it was
Y. Zhao impossible to gradually and stably synchronize with
e-mail: [email protected] another chaotic system [4]. Nevertheless, Pecora and
123
5512 Q.Shi et al.
Carroll observed the phenomenon of synchronization port for the chaotic communication field, can address
and reached the conclusion that two chaotic systems the issue of chaotic parameter mismatch to a certain
can be synchronized by the application of an appro- extent, and has considerable potential for further devel-
priate control method [5]. In recent times, numer- opment.
ous experts and scholars have identified various forms In [14], an adaptive synchronous sliding mode con-
of chaotic synchronization in disparate chaotic sys- trol method was employed to synchronize the hyper-
tems. These include full synchronization [6], anti- chaotic system. A proportional-integral-derivative (PID)
synchronization [7], projection synchronization [8], controller was utilized to optimize the synchroniza-
adaptive synchronization [9] and other forms of syn- tion control time and synchronization accuracy. Finally,
chronization. FPGA technology was used to realize the hyper-
The study of chaotic communication has been a sig- chaotic system. [15] Active control synchronization
nificant area of research within the field of commu- is employed to realize the four-dimensional hyper-
nication, with numerous techniques based on chaotic chaotic four-wing memristor system, with the safety
synchronization having been proposed. One such tech- signal shielding application realized based on FPGA
nique is chaotic masking, which was first proposed by and numerical simulation design. The experimental
[10]. This method employs a chaotic signal as the car- results demonstrate that the useful signal can be con-
rier at the transmitter, with the intention of conceal- cealed within a chaotic sequence through the utilization
ing the information being transmitted. Following syn- of FPGA, and that the decryption signal exhibits opti-
chronization, the chaotic signal is then utilized at the mal quality. In [16], the Hamiltonian form is employed
receiver to obscure the original signal, thereby facili- to achieve the synchronization of spherical attractors,
tating the recovery of the desired information. In their and an image encryption transmission system is devised
study, [11] employed chaotic keying technology to based on simulation and FPGA. The security analysis
select carrier signals from two or more distinct chaotic indicates that the received image can be fully recov-
attractors for binary message signals. In [12], chaotic ered without the loss of information after decryption.
modulation technology is employed to modulate the [17] designed a synchronization scheme based on adap-
parameters of the chaotic system by utilising the sig- tive observer and adaptive controller to simulate the
nal transmitted by the transmitter. Subsequently, the synchronization of different brain regions, and used
corresponding parameters of the chaotic system are FPGA to complete the digital circuit implementation
extracted by employing the chaotic synchronisation and functional verification of multi-vortex HNN based
signal at the receiver, thereby enabling the recovery on memristor.
of the transmitted signal. However, the sensitivity of The synchronization control method employed in
chaotic synchronization to channel noise and parameter [14–17] represents a highly developed technology
mismatch means that the solutions proposed in [10–12] for regulating chaotic systems. However, the design
cannot be implemented in practice for secure commu- methodology of the controller is relatively complex,
nication. inflexible and exhibits a strong specificity and poor
In the context of contemporary electronic technol- versatility. Yan et al. [18] employed an FPGA to phys-
ogy, characterized by rapid development, Field Pro- ically implement the constructed four-dimensional
grammable Gate Array (FPGA) exhibits a high degree chaotic system, proposed a system combining back-
of flexibility and programmability [13], which can stepping control and multi-switch synchronization,
markedly enhance the operational speed and efficiency and then designed a controller that couples the syn-
of the system. It exhibits robust stability, straight- chronization system and memristor chaotic system.
forward integration with communication devices, and In a further development of the technology, Yan et
rapid execution speed, thereby offering a promising al. [19] proposed a method of reverse realization of
avenue for research in secure communication. Never- generalized synchronization. This involved construct-
theless, discrete chaotic synchronization can be more ing a response system by introducing feedback con-
readily incorporated into digital circuits and computer trol coefficients, which could make the error sys-
systems, which is advantageous for practical applica- tem tend to zero when the coefficients met certain
tions. Consequently, the discrete chaotic synchroniza- conditions. The literature improves the flexibility of
tion system based on FPGA offers robust technical sup- the controller design and exhibits strong universal-
123
Design and FPGA implementation... 5513
123
5514 Q.Shi et al.
123
Design and FPGA implementation... 5515
⎧
⎪
⎪ ẋ1 = 32(y1 − x1 ) + w1 + ux In the aforementioned derivation formula, the vari-
⎨
ẏ1 = 8x1 − x1 z 1 + 8y1 + u y ables x, y, z, w are iterative, while u represents the con-
(3)
⎪
⎪ ż = x1 y1 − 4z 1 + uz troller and λ is the feedback control coefficient. Let the
⎩ 1
ẇ1 = y1 z 1 + 0.25w1 + uw Lyapunov function of Eq. (7) be as follows
123
5516 Q.Shi et al.
123
Design and FPGA implementation... 5517
7.8 × 10−
4
Generalized projective synchronization method x1 19
6.7 × 10−
4
x2 17
6.9 × 10−
4
x3 18
6.1 × 10−
4
x4 18
3.7 × 10−
4
Chaotic backward generalized synchronization x1 10
3.4 × 10−
4
x2 8
3.4 × 10−
4
x3 8
3.7 × 10−
4
x4 10
ing a smaller error coefficient, thereby enhancing the the more effective the synchronization, but the lower
flexibility of discrete chaotic generalized synchroniza- the efficiency [22]. A check code is employed to ascer-
tion system construction. tain whether an error has occurred during transmission.
This paper presents a novel approach to utilizing
the first dimensional chaotic sequence among the four-
2.2 Chaotic frame synchronization dimensional pseudo-random sequences generated by
a synchronized master chaotic system as the frame
Frame synchronization technology is a commonplace head, with the remaining three-dimensional sequences
technology in the field of communication, primarily forming the key stream. The three-dimensional key
to enable the receiver to accurately identify the start- stream was spliced and XOR encrypted with the plain-
ing and ending positions of a group of data from the text information, thereby obtaining the ciphertext infor-
received sequence [21]. The most common data frame mation. The frame header was then inserted into the
format is illustrated in Fig. 5. It typically comprises encrypted ciphertext information, thus forming a frame
a frame header, data and a check code. The frame for transmission. In the slave system, a similar four-
header contains either synchronization bytes or syn- dimensional pseudo-random sequence is generated.
chronization signals, with the objective of establishing The first dimension is employed for sliding detection,
the length of each frame. The longer the frame header, whereby the frame header is searched. The remaining
123
5518 Q.Shi et al.
Fig. 6 Flowchart of the frame transmission scheme combined with chaotic synchronization
three dimensions are then used for decryption of the transmission system will not fail due to a frame being
ciphertext, thus obtaining the plaintext data. The infor- out of sync, resulting in subsequent frame disloca-
mation contained within the continuous data stream is tion and decryption failure. Concurrently, the pseudo-
identified in sequence to ascertain the received data. random sequence of the chaotic system is employed
From the perspective of hardware implementation, the as the frame head, with its frame head undergoing a
design employs the characteristics of a chaotic system constant alteration with the iteration of the chaotic sys-
and chaotic synchronization, utilizing the chaotic syn- tem. This renders the system challenging to decipher.
chronization sequence as the frame head. This ensures Figure 6 illustrates the flow of the designed frame trans-
that the normal decryption of the subsequent frame data mission scheme, while Fig. 7 presents the flow chart of
is not affected when a frame is disrupted or even lost stream cipher encryption and decryption. In these fig-
during transmission. Furthermore, it guarantees that the ures, 1, 2, ..., n represent the number of frames trans-
123
Design and FPGA implementation... 5519
mitted, while x, y, z, w represent the chaotic sequence 3 Design and implementation of encrypted frame
generated by the master–slave chaotic system. In com- transmission system based on chaotic reverse
parison with the conventional frame synchronization synchronization control
approach, this section employs the attributes of chaotic
synchronization to embed the data within the chaotic 3.1 Synchronous byte and encrypted sequence
signal. The receiver is then able to recover the infor- generation
mation by synchronously receiving the chaotic signal,
thus facilitating secure communication. The generated In this section, the simple Euler algorithm is employed
random sequence is utilized as the frame synchroniza- to discretise each system, thus facilitating the FPGA
tion head sequence, which enables the dynamic update implementation of chaotic reverse synchronisation.
of the key through a slight alteration of the synchro- The driving system and response system are illustrated
nization parameter, thereby enhancing communication in Eqs. (10) and (11), respectively.
security.
123
5520 Q.Shi et al.
123
Design and FPGA implementation... 5521
123
5522 Q.Shi et al.
3.2 Implementation of encrypted frame transmission into two stages: the synchronization stage (SS) and the
scheme encrypted transmission stage (ETS).
The initial key was first input through the serial
3.2.1 The top-level design of the system port at the transmitter, whereupon the four-dimensional
chaotic sequence x, y, z, w are obtained by driving the
The.coe file is a common file format utilised in the system and subsequently transmitted to the receiver.
Vivado software for the initialisation of memory con- The receiver also inputs the initial key through the serial
tents. The file contains the address of the memory and port and iterates with the received chaotic sequence
is essentially text-based. To facilitate the observation (x, y, z, w) in the response system to obtain the chaotic
of data from both the sending and receiving ends in a sequences (x1 , y1 , z 1 , w1 ). Upon generation of an iden-
more intuitive manner, the image is stored in the mem- tical chaotic sequence by the receiver and transmitter,
ory of the development board in the form of a.coe file, the four LED indicators representing synchronization
serving as an information source, thereby establishing a status are activated and deactivated. The receiver then
continuous and stable data flow for transmission. Given transmits a synchronization success signal syn_sig to
the length of the image sequence, a single transmission the transmitter, signifying that the two systems are fully
would result in a greater number of states within the synchronized.
state machine and occupy a larger memory space. Con- Following synchronization at the transmitter, the
sequently, in this section, the data stream is divided into chaotic sequences y, z, w, generated by the drive sys-
multiple frames and transmitted in a sequential manner. tem, serve to generate the master key pseudorandom
The overarching principle of the design is illus- sequence generator. Additionally, the first 16 bits of the
trated in Fig. 11, which depicts the principal archi- chaotic sequence x are responsible for generating the
tectural components. The overall workflow is divided master synchronization head pseudorandom sequence
123
Design and FPGA implementation... 5523
generator. Then, the sequences y, z, w are subjected to the ciphertext, thereby facilitating the restoration of the
XOR encryption with the plaintext, thereby obtaining plaintext image.
the ciphertext. Subsequently, the ciphertext is divided To facilitate the verification of results, the plaintext
into multiple sections, which are enclosed within the and ciphertext images are output by the HDMI interface
synchronization header, and transmitted to the recip- on the display screen by pressing the relevant key at
ient. At the receiver, a similar chaotic sequence is the transmitter and receiver. This allows for a more
generated by the response system through the method convenient visual design.
of reverse synchronization control. Subsequently, the Furthermore, the comprehensive illustration of the
slave key pseudo-random chaotic sequences y1 , z 1 , w1 overall frame transmission process for this section can
and the slave synchronization head pseudo-random be found in Fig. 12. The sequence receiving module
sequence x1 are designed, respectively. The purpose of (SRM) performs a preprocessing step, wherein the data
x1 is to detect the synchronization head of the received is split and the resulting split data is continuously
ciphertext, and the encrypted data is restored after a suc- passed to the encryption module(EM) for encryption.
cessful detection. Subsequently, the chaotic sequences Subsequently, a frame was constructed by the synchro-
y1 , z 1 , w1 are employed for the purpose of decrypting nisation header and the check bit in the frame formation
module(FFM) and the 113-bit data was transmitted in
123
5524 Q.Shi et al.
Fig. 11 The top-level architecture of encrypted frame transmission system based on chaotic reverse synchronization
serial in the parallel conversion module(PSCM). The the decryption module(DCM) and subsequently passed
receiver transmits the received data to the detection to the sequence transmission module(STM).
module(DM), where it is converted back into 113-bit
parallel data and subjected to shift detection. Should
3.2.2 FPGA implementation of the system
the synchronisation header be consistent with the pack-
age, the frame synchronisation signal is set to 1, the
The synchronous encryption system described in this
state machine commences operation, and the subse-
paper is implemented using two identical AX7103
quent functions are initiated. In accordance with the
development boards, which serve as the transmit-
prescribed frame structure, the frame splitting mod-
ter and receiver, respectively. The transmitter and
ule(FSM) parses the 96-bit data and 1-bit check bit
receiver are composed of two distinct modules: a
in sequence, under the control of the counter, and per-
synchronization module and a transmission module.
forms a parity check on the parsed data during the pars-
The overall RTL diagram of the sender is illustrated
ing process, subsequently outputting the 1-bit check
in Fig. 13a. The chaos_syn_t x(SPTX) module repre-
result. The remaining 96-bit data is then decrypted in
sents the sender’s synchronisation module, while the
comm_transmitter (CPTX) module corresponds to
123
Design and FPGA implementation... 5525
the sender’s encryption transmission module. The func- (IKR) module is analogous to that of the IKT, enabling
tion of SPTX is to generate the chaotic sequence that the reception of the key. Upon the circuit board being
forms the basis of the main system. The CPTX module powered on or reset, the circuit enters a waiting state.
is responsible for encrypting the plaintext and transmit- The IKR then inputs the key to the SPRX for buffer-
ting it. Furthermore, the initial_key_r ec(IKT) mod- ing and awaits the chaotic sequence from the SPTX.
ule serves as the initial key receiving module. And the When the chaotic sequences generated by the master
function of the S_LED module is to facilitate the con- and slave systems are fully synchronised, it is indica-
trol of the illumination. Upon the activation of the cir- tive of the attainment of a synchronisation state at both
cuit board or a reset, the IKT module is responsible for ends. The LED indicator on the development board is
converting the serial data received (r xd) into a 128-bit deactivated, and the synchronisation signal syn_sig is
parallel initial key (t_data). The key is then fed into set to 1 and fed back to SPTX. Upon receipt of the syn-
the SPTX for iterative operation, whereby it generates chronisation success signal by the SPTX, the CPTX
the chaotic sequence x, y, z, w, which is subsequently commenced operation. In contrast, the CPRX module
transmitted to the receiver. At this juncture, the cir- awaits the encrypted data transmitted by CPTX before
cuit is in a waiting synchronisation state. Upon receipt initiating its own operations.
of the synchronisation signal (syn_sig_r x), the LED Among the diagrams presented, that of CPTX is
indicators transition from an active state to an inactive shown in Fig. 14a. The plaintext_storge(PTS) mod-
state, and CPTX commences operation. The plaintext ule is employed for the storage and retrieval of images,
data is XOR encrypted, and then the ciphertext data the trans_ f sm(TFSM) module serves as the state
is transformed in parallel to serial, encapsulated with machine for sending control, the text_encr ypt(TE)
the synchronisation header and detection bit, and then module is utilised for encryption, the parit y_coder
transmitted frame by frame. (PC) module is responsible for frame formation, the
The comprehensive receiver-side RTL diagram is ser _coder (SC) module facilitates parallel and serial
illustrated in Fig. 13b, which encompasses the chaos_ conversion, and the video_out_test_t x(HDMI_OUT
syn_r x(SPRX) and the comm_r eceive(CPRX). SPRX _TX) module is dedicated to displaying encrypted
and SPTX correspond to the slave system module in the and decrypted images at the sender. The PTS divides
chaotic synchronization system, while CPRX serves to the.coe format picture into 96-bit continuous data and
split the received ciphertext data and restore it to plain- stores it in FIFO, subsequently generating the sig-
text. Furthermore, the function of the initial_key_r ec nal ct f _empt y for the FIFO. Upon receipt of the
123
5526 Q.Shi et al.
Fig. 13 RTL diagram of frame synchronization encrypted transmission system based on chaotic reverse synchronization
ct f _empt y signal by the TFSM module, a clock pulse the sc_en signal, which in turn controls the SC module
signal ct f _r dr eq, is generated and transmitted to initi- to send the data in a serial format, one byte at a time.
ate the reading of the initial 96-bit data. Subsequently, Upon completion of the transmission, the ct f _r dr eq
the TFSM module generates a clock pulse signal, des- signal outputs a clock pulse, initiating a repetition of
ignated te_en, which is transmitted to the TE module the subsequent operation until the entirety of the PTS
and the received chaotic sequence. This signal serves module data has been transmitted.
to encrypt the frame data, resulting in the output of Figure 14b illustrates the RTL diagram of CPRX.
96-bit encrypted data, designated te. Subsequently, a More, the function of the f rame_syn(FS) mod-
clock pulse signal pc_en, is output to control the PC ule is to detect the synchronisation header in the
module for encapsulation. The received 16-bit synchro- data stream.The r ec_ f sm(RFSM) module controls
nisation bytes, 96-bit encrypted data, and 1-bit parity the state machine of each module for the receiver.
are then combined to form a frame, and the resulting The text_decr ypt(TD) module decrypts the cipher-
113-bit data pc, is finally output. This signal controls text. The des_coder (DC) module performs a serial-
123
Design and FPGA implementation... 5527
Fig. 14 RTL diagram of the data stream encrypted frame transmission system
parallel conversion. The parit y_check(PCH) mod- to 97-bit data parallel transmission. Subsequently, the
ule splits the frame. The RFSM module controls the PCH module is triggered to unpack the 1-bit parity error
state machine of each module. The HDMI_OUT_RX and 96-bit encrypted data. The TD module is then ini-
module is employed for the purpose of displaying the tiated via the output of the td_en control signal, which
encrypted and decrypted image of the receiver. Upon initiates the corresponding decryption operation in con-
receipt of the data, the FS module initiates the search junction with the decrypted chaotic sequence. Once the
for the synchronization header, shifting from the data decryption process is complete, the FS module initi-
stream to do so. In the event of the detection of the frame ates a further frame header detection and repeats this
header, the pulse signal f s_syn is outputted over the step until no further synchronization headers are iden-
course of a single clock cycle. Upon the assignment tified, indicating that the entirety of the data has been
of the value of 1 to f s_syn, the RFSM module com- received. Upon completion of the data reception pro-
mences its operation. Firstly, the dc_en, which outputs cess, the HDMI_OUT_RX module displays the result-
a single clock cycle, controls the DC module to trans- ing data.
fer the comm_t x received data from serial transmission
123
5528 Q.Shi et al.
Table 3 Transmitter
Resource Utilization Available Utilization%
resource consumption
LUT 3076 63400 4.85
LUTRAM 250 19000 1.32
FF 4990 126800 3.94
BRAM 82.50 135 61.11
DSP 12 240 5.00
IO 77 285 27.02
BUFG 12 32 37.50
MMCM 2 6 33.33
3.3 Board level verification The results of the FPGA implementation of the syn-
chronous encrypted transmission system are illustrated
Following the completion of the functional simulation, in Fig. 16. The image at the sending end is displayed
it is necessary to proceed with the verification of the on the left computer, which controls the left display
board to confirm that the system is capable of function- screen. The original image and the encrypted image
ing on the actual FPGA development board. This was are transformed by the key control. The image of the
achieved by using two AX7103 development boards receiving end is controlled by the right computer, which
as the transmitter and receiver, respectively, with the also displays the image on the right display screen.
external display serving as the final demonstration of Furthermore, the encrypted and decrypted images are
the results. Figure 15 illustrates the output display result converted by pressing the key, and the data is trans-
of the 128 × 128 Baboon image encryption effect. mitted through the DuPont line between the two ends.
Figure 15a depicts the zoom-in display of the Baboon The error valid signal (err _valid) is employed as the
plaintext image, while Fig. 15b shows the zoom-in dis- trigger condition for the ILA, and the chaotic sequence
play of the encrypted image. The resources employed generator at the receiver captures the error sequences
on the development board for the FPGA implemen- (err or _x[31 : 0], err or _y[31 : 0], err or _z[31 :
tation of the transmitter are detailed in Table 3. The 0], err or _w[31 : 0]), as illustrated in Fig. 17. It can be
resources utilized on the development board for the observed that a period of 150 ns elapses between the
FPGA implementation of the receiver are outlined in reception of the four-dimensional chaotic sequence and
Table 4. the generation of the error sequence. Furthermore, the
four-dimensional error sequence tends towards zero.
123
Design and FPGA implementation... 5529
Fig. 16 FPGA
Implementation Results
123
5530 Q.Shi et al.
123
Design and FPGA implementation... 5531
Fig. 19 Correlation detection of original and encrypted images in horizontal, vertical and diagonal directions
decrypted in horizontal, vertical and diagonal direc- the table, the generated sequence has been shown to
tions for the purpose of correlation analysis. The results pass all the NIST test items, thereby indicating that the
of the experiment are presented in Fig. 19. As can be randomness of the sequence meets the requisite stan-
observed in the figure, all the pixels of the original dards.
image are concentrated on the diagonal, and there is a
strong correlation between them. In contrast, the adja-
cent pixels of the encrypted image are distributed uni- 4.1.4 Information entropy analysis
formly across the entire coordinate plane, resulting in
a significantly reduced correlation between pixels. The concept of information entropy is employed to
quantify the uncertainty inherent to any given piece
of information. As uncertainty increases, the entropy
4.1.3 Randomness test value also rises. The definition formula is presented
in Eq. (14), in which is the probability when the grey
The National Institute of Standards and Technology value is m i , and L is the grey level. A value of entropy
(NIST) system testing standards are a widely utilized approaching 8 indicates a high degree of image clutter.
methodology for the assessment of the randomness
level of sequences [25]. In this section, the output
chaotic sequence is subjected to an evaluation by the
L
NIST-SP800-2 test suite. The selected data set com- H =− P (m i ) log2 P (m i ) (14)
prises 4 × 106 elements, and the significance level is i=0
set to 0.01. A p-value exceeding 0.01 signifies that the
test has been successfully completed. The test results The results of the image information entropy test are
are presented in Table 5. In instances where multiple p presented in Table 6. These results demonstrate that the
values are generated from a single test, the minimum information entropy of each component of the cipher-
value is reported in this section. As can be seen from text image is closer to 8 than that of the original image,
123
5532 Q.Shi et al.
indicating that the encryption process meets the stan- an increase in transmission rate results in a more seam-
dards and requirements of information hiding. less transmission and a reduction in delay [26]. In this
section, the ILA is employed for signal capture, with
the dc_en signal serving as the trigger condition for the
4.2 Frame synchronization effect ILA. The captured waveform is illustrated in Fig. 20.
The orange waveform represents the frame synchroni-
The synchronisation speed and stability of chaotic sation signal f s_syn, the dark grey line marks the point
synchronisation have a direct impact on the efficacy at which synchronisation is first achieved, which occurs
of frame synchronisation. Consequently, this paper at 1009 ns, and the blue line marks the point at which
employs a performance index of frame synchronisa- the rising edge of f s_syn is achieved. The generation
tion as a means of indirectly assessing the stability of of stable f s_syn requires a mere 113 ns between two
chaotic synchronisation. In this section, a 128 × 128 pulses, indicating that the transmission rate of this sys-
Baboon graph in the form of.coe is utilised as the data tem is 8.44 Mbps, a notably rapid speed and a relatively
source, with a total of 16384 24-bit data points trans- brief establishment time for synchronisation.
mitted.
4.2.2 Frame loss rate
4.2.1 Data transfer rate
The term ’frame loss rate(FLR)’ is used to describe
In the context of word communication systems, data the proportion of frames that are lost during the trans-
transmission rate is defined as the number of data mission or processing of data. A high frame loss rate
frames transmitted per second. It can be observed that will result in incomplete images, which will have a
123
Design and FPGA implementation... 5533
Fig. 20 Waveform diagram of ILA grasp signal for frame synchronization signal fs_syn
detrimental impact on the visual effect. Given that the was designed. Secondly, an encrypted frame transmis-
system transmits 96-bit data per frame, it is theoret- sion system combining traditional frame synchroniza-
ically feasible to send 4096 frames to convey 16384 tion and chaotic sequence was proposed, which was
24-bit data. In this section, the logic analyser ILA is mainly divided into three stages. First, in the establish-
employed to capture the waveform, ascertain the actual ment stage of chaotic synchronization, after the master
total number of transmitted frames and subsequently and slave system input the key, the four-dimensional
calculate the frame loss rate. This section presents the chaotic systems at both ends were synchronized by the
results of five tests, as detailed in Table 7. As can be controller, and the four-dimensional chaotic sequence
observed from the data presented in the table, the actual was generated, and the synchronization success signal
number of frames transmitted is largely in alignment was generated. Second, frame synchronization stage,
with the theoretical number of frames. Because of the in this stage, the first-dimension chaotic sequence gen-
discrepancy in asynchronous clocks between the vari- erated by the chaotic system acts as a synchroniza-
ous levels of the board, it is inevitable that interference tion head to insert a frame data, and the same chaotic
will occur, which will result in the loss of frames during sequence generated from the system is used to check the
the transmission process. Nevertheless, the information synchronization head from the data stream to achieve
contained within the original image can be discerned in frame synchronization. Thirdly, in the encryption trans-
these five tests. Upon decryption and restoration of the mission stage, the post-3D chaotic sequence of the
received data to the image, the five decrypted, enlarged chaotic system is used to encrypt the input plaintext
images at the receiver are presented in Fig. 21. This image and transmit it. Finally, the encryption effect and
indicates that the system is relatively stable. frame synchronization effect were analyzed by experi-
mental verification in FPGA. The analysis results show
that the synchronization establishment time is short, the
5 Conclusion transmission speed is fast, the encryption effect is good,
and the security is high, which promotes the research
In this paper, we propose an encrypted frame trans- and development of chaotic synchronization in the field
mission scheme based on FPGA with chaotic reverse of secure communication. Nevertheless, this paper also
synchronization. Firstly, a new chaotic reverse synchro- requires the optimal utilization of the storage resources
nization method was proposed, and a controller for the of the development board to address the issue of insuf-
reverse synchronization of hyper-Chen chaotic systems ficient image data transmission.
123
5534 Q.Shi et al.
123
Design and FPGA implementation... 5535
7. Alsaade, F.W., Yao, Q., Bekiros, S., et al.: Chaotic atti- 19. Xing, Y., Yan, W., Zhang, Y., et al.: An error control-blended
tude synchronization and anti-synchronization of master- new design for an inverse discrete chaotic synchronization
slave satellites using a robust fixed-time adaptive controller. system. Nonlinear Dyn. 111(21), 19911–19930 (2023)
Chaos, Solitons Fractals 165, 112883 (2022) 20. Li, C., Chen, G.: Chaos in the fractional order Chen sys-
8. Thivagar, M. L., Al-Obeidi, A. S., Tamilarasan, B., et al.: tem and its control. Chaos, Solitons Fractals 22(3), 549–554
Dynamic analysis and projective synchronization of a new (2004)
4D system. In: IoT and Analytics for Sensor Networks: 21. Lim, Y.S., Park, J.S., Kim, J.Y.: Novel frame synchronization
Proceedings of ICWSNUCA 2021. Springer Singapore, pp. of OFDM scheme for high-speed power line communication
323–332. (2022) systems. In: IEEE International Symposium on Power Line
9. Tutueva, A.V., Nepomuceno, E.G., Karimov, A.I., et al.: Communications & Its Applications. IEEE. https://doi.org/
Adaptive chaotic maps and their application to pseudo- 10.1109/ISPLC.2008.4510420. (2008)
random numbers generation. Chaos, Solitons Fractals 133, 22. Janjaap, V. D. B., Sandell, M., Isaksson, M., et al.: Low-
109615 (2020) complex frame synchronization in OFDM systems. In:
10. Ohtsubo, J.: Chaos synchronization and chaotic signal mask- IEEE International Conference on Universal Personal Com-
ing in semiconductor lasers with optical feedback. IEEE J. munications. IEEE, https://doi.org/10.1109/ICUPC.1995.
Quantum Electron. 38(9), 1141–1154 (2002) 497156. (1995)
11. Kolumbán, G., Vizvári, B., Schwarz, W., et al.: Differential 23. Faragallah, O.S., Afifi, A., Elashry, I.F., et al.: Efficient
chaos shift keying: A robust coding for chaos communica- optical double image cryptosystem using chaotic mapping-
tion. Proc. NDES. 96, 87–92 (1996) based Fresnel transform. Opt. Quant. Electron. 53(6), 311–
12. Kolumbán, G., Kennedy, M.P., Chua, L.O.: The role of 321 (2021)
synchronization in digital communications using chaos. 24. Wen, H., Lin, Y., Yang, L., et al.: Cryptanalysis of an image
II. Chaotic modulation and chaotic synchronization. IEEE encryption scheme using variant Hill cipher and chaos.
Trans. Circuits Syst. I Fundam. Theory Appl. 45(11), 1129– Expert Syst. Appl. 250, 123748 (2024)
1140 (1998) 25. Ferraiolo, D.F., Sandhu, R., Gavrila, S., et al.: Proposed
13. Monmasson, E., Cirstea, M.N.: FPGA design methodol- NIST standard for role-based access control. ACM Trans.
ogy for industrial control systems—A review. IEEE Trans. Inf. Syst. Secur. (TISSEC) 4(3), 224–274 (2001)
Industr. Electron. 54(4), 1824–1842 (2007) 26. Zhang, J., Wang, Y., Liu, W., et al.: Frame-event alignment
14. Yan, S., Wang, E., Wang, Q., et al.: Analysis, circuit imple- and fusion network for high frame rate tracking. In: Pro-
mentation and synchronization control of a hyperchaotic ceedings of the IEEE/CVF Conference on Computer Vision
system. Phys. Scr. 96(12), 125257 (2021) and Pattern Recognition. pp. 9781–9790. (2023)
15. Yu, F., Liu, L., He, B., et al.: Analysis and FPGA realization
of a novel 5D hyperchaotic four-wing memristive system,
active control synchronization, and secure communication Publisher’s Note Springer Nature remains neutral with regard
application. Complexity 2019(1), 4047957 (2019) to jurisdictional claims in published maps and institutional affil-
16. Nuñez-Perez, J.C., Adeyemi, V.A., Sandoval-Ibarra, Y., iations.
et al.: FPGA realization of spherical chaotic system with
application in image transmission. Math. Probl. Eng. Springer Nature or its licensor (e.g. a society or other partner)
2021(1), 5532106 (2021) holds exclusive rights to this article under a publishing agreement
17. Yu, F., Kong, X., Yao, W., et al.: Dynamics analysis, synchro- with the author(s) or other rightsholder(s); author self-archiving
nization and FPGA implementation of multiscroll Hopfield of the accepted manuscript version of this article is solely gov-
neural networks with non-polynomial memristor. Chaos, erned by the terms of such publishing agreement and applicable
Solitons & Fractals 179, 114440 (2024) law.
18. Yan, S., Wang, E., Wang, Q., et al.: Analysis, circuit imple-
mentation and synchronization control of a hyperchaotic
system. Phys. Scr. 96(12), 125257 (2021)
123