Abstract

This paper investigates the anticontrol of the fractional-order chaotic system. The necessary condition of the anticontrol of the fractional-order chaotic system is proposed, and based on this necessary condition, a 3D fractional-order chaotic system is driven to two new 4D fractional-order hyperchaotic systems, respectively, without changing the parameters and fractional order. Hyperchaotic properties of these new fractional dynamic systems are confirmed by Lyapunov exponents and bifurcation diagrams. Furthermore, a color image encryption algorithm is designed based on these fractional hyperchaotic systems. The effectiveness of their application in image encryption is verified.

1. Introduction

In recent years, how to make a dynamic system chaotic or enhance the chaos of the system, that is to say, study on the anticontrol of the chaotic system, has become a very hot research topic [17]. A feedback control design method is proposed to make all the Lyapunov exponents of the discrete-time dynamical system strictly positive by Chen and Lai [1]. Based on time-delay feedback, a systematic design approach is developed for anticontrol of chaos in a continuous-time system [2, 3]. Li et al. present a simple parameter perturbation control technique to drive a unified chaotic system to hyperchaotic [4]. In [5], a state feedback control is used to design a hyperchaotic Chua system with piecewise-linear nonlinearity. A systematic methodology is proposed to construct the continuous-time autonomous hyperchaotic system with multiple positive Lyapunov exponents, and a 6-dimensional hyperchaotic circuit is implemented [6, 7].

In the aforementioned works, the dynamical systems are all chaotic systems with integer order. However, compared with the integer-order chaotic system, the fractional-order system has higher nonlinearity. Moreover, the derivative orders can be used as secret keys in the encryption algorithm based on the chaotic system. At the same time, because high-dimensional chaotic systems have multiple positive Lyapunov exponents and control parameters, it can display more complex dynamical behaviors. Therefore, study on the fractional-order hyperchaotic systems has attracted interest of many scholars [819]. Some new high-dimensional fractional-order chaotic systems have been proposed and studied, including dynamic analysis [811], control [12, 13], synchronization [14, 15], circuit implementation [16], and application in information encryption [1719]. But, these fractional-order hyperchaotic systems are obtained by directly modifying the order of integer-order hyperchaotic systems, instead of getting from the anticontrol of the fractional-order system.

Inspired by the above discussions, in this paper, based on linear feedback and nonlinear feedback, we directly drive the 3D fractional-order chaotic system to two new 4D fractional-order hyperchaotic systems, respectively, without changing the parameters and fractional order. We propose the necessary conditions of the anticontrol for the fractional-order chaotic system and to calculate the Lyapunov exponents and bifurcation diagrams of the new fractional hyperchaotic dynamic systems. Furthermore, based on these two fractional-order hyperchaotic systems, a color image encryption algorithm is designed. The security analysis verifies that these hyperchaotic systems are effective for image encryption.

2. Problem Formulation

A 3D autonomous chaotic system is proposed by Qi et al. [20], which can be described aswhere , , and are state variables. When the parameters , , and , system (1) shows a chaotic behavior. The fractional-order equation of system (1) can be expressed aswhere is the fractional order, . According to the algorithm presented by Wolf et al. [21], we calculate the largest Lyapunov exponent of fractional-order system (2). When , system (2) exhibits a chaotic behavior with the largest Lyapunov exponent . In this paper, the numerical simulation of fractional-order systems is derived according to Caputo derivative. More detailed introduction about Caputo derivative definition can be seen in [22].

In the following, fractional-order chaotic system (2) is driven to two new 4D fractional-order hyperchaotic systems, respectively, with the same parameters and fractional order, that is, , , , and .

3. New Fractional-Order Hyperchaotic Systems

About the anticontrol of the fractional-order chaotic systems, we give the two necessary conditions as follows:(1)The new dynamic system must be dissipative(2)None of equilibriums of the new fractional-order system is stable

The stable and unstable region division at the zero equilibrium of the fractional-order system is shown in Figure 1. According to the stability theory of the fractional-order system [23], it can be proved that, for n-dimensional fractional system, if all the eigenvalues () of the Jacobian matrix of some equilibrium point satisfythen the fractional-order system is asymptotically steady at the equilibrium. From Figure 1, it can be seen that, for the fractional-order system, as long as there is a stable equilibrium, it will be steady at one point; it is in chaos only when none equilibrium is stable. Moreover, a dynamic system with chaotic characteristics must be dissipative. Therefore, the above necessary conditions can be obtained.

In the following, we analyze the dynamical behaviors of fractional-order system (2). We can calculate that system (2) has three equilibriums , , and .

For the equilibrium , it can be calculated that the eigenvalues of the Jacobian matrix are , , and . Further, it can be obtained that , , and . From formula (3), when , is unstable equilibrium. In the same way, it can be obtained that the equilibrium is unstable when , and is unstable equilibrium of system (2).

To sum up, when , , , and are all unstable equilibriums of system (2). So, the value of fractional order of system (2) must be between and . Finally, we select as fractional order of system (2).

3.1. Fractional Hyperchaotic System Obtained by Linear Feedback

For convenience of expression, the variables of system (2) are replaced with . With the same parameters and fractional order, a new 4-dimensional fractional-order dynamic system is obtained by introducing a linear feedback control term to the equation of system (2) as follows:where is a control parameter, and system (4) is possible to be chaotic only when its value satisfies the above necessary condition of the anticontrol.

In order to ensure the dissipative structure of system (4), the requirement is that

It is concluded that the value of control parameter must be less than 38.7. In order to maintain the dissipative structure better, we choose near zero.

When , , , and , we calculate that system (4) has three equilibriums , , and .

First, let us study whether equilibrium is stable. The Jacobian matrix of system (4) at equilibrium point is as follows:

It is calculated that the eigenvalues of the Jacobian matrix are , , , and . Furthermore, we can get that , , , and , without satisfying that (). Therefore, it can be concluded that S0 is unstable equilibrium.

Next, is chosen to study. We can compute that the eigenvalues of the Jacobian matrix , , , and , and we can obtain that , , , and . So, the equilibrium is not stable. In the same way, it can be obtained that is also unstable.

To sum up, when , , , and are all unstable equilibriums of system (4). We obtain the Lyapunov exponents of system (4): , , , and when and . Therefore, it is proved that system (4) shows a hyperchaotic behavior. The part of projections of the hyperchaotic attractor is shown in Figure 2.

According to the method presented by Ramasubramanian and Sriram [24], when , the Lyapunov exponent spectrum of fractional-order system (4) is calculated, and it is shown in Figure 3(a). The corresponding bifurcation diagram of system (4) is shown in Figure 3(b). From Figure 3, it is easy to observe that when , fractional-order system (4) is hyperchaotic with satisfying that , , , and .

3.2. Fractional Hyperchaotic System Obtained by Nonlinear Feedback

The variables of system (2) are taken the place of , and a nonlinear feedback control term is added to system (2). A new 4D fractional-order dynamic system is obtained as follows:where is a control parameter, and we choose in order to ensure system (7) be dissipative.

When , it can be computed that system (7) has only one equilibrium . Furthermore, we can calculate that , , , and . So, it is not satisfied that . Therefore, is not stable equilibrium.

When and , fractional-order system (7) displays a hyperchaotic behavior with Lyapunov exponents , , , and . The part of projections of the hyperchaotic attractor is shown in Figure 4.

When , the Lyapunov exponent spectrum of system (7) is computed according to Ramasubramanian and Sriram method [24]. It is shown in Figure 5(a), and the corresponding bifurcation diagram of system (7) is shown in Figure 5(b). From Figure 5, it can be seen that when , system (7) is hyperchaotic with two positive, a zero, and a negative Lyapunov exponents.

4. Image Encryption Based on the Fractional-Order Hyperchaotic Systems

In this section, a color image encryption algorithm is designed based on fractional-order hyperchaotic system (4) and system (7).

4.1. Design of Image Encryption Algorithm
4.1.1. Permutation Process

In order to break the correlation of the neighboring pixels in the plaintext, the plain image is permutated in bit-level. A color image with size of is chosen as the plain image .Step 1. First, the plain image is converted into a grayscale image whose size is according to the red, green, and blue components of the color image. Then, each pixel of the grayscale image is transformed into an 8-bit array. So, the whole plain image is changed into a binary matrix with a size of .Step 2. The sequences are generated by fractional-order hyperchaotic system (4) with initial values . The key vectors and are produced by equations (8) and (9), respectively:where is a disturbance item related to the plain image, which can be obtained by equation (10) as follows:where is the sum of all the elements with value of 1 in the matrix . Therefore, the key vectors and are related to the plain image . Because different plain images are encrypted by different keys, this algorithm can resist the chosen plaintext attack.Step 3. Set two auxiliary vectors and . They represent the line numbers and the column numbers of in the ascending order, respectively. Next, the vectors and are generated by equations (11) and (12), separately. Then, a binary matrix is obtained by permuting the rows and columns of image , respectively, according to the vectors and . Finally, we transform this binary matrix into color image .

4.1.2. Encryption Algorithm

In this stage, the permutated color image is encrypted in pixel-level, and the detailed steps are as follows:Step 1. Separate the permuted color image into red, green, and blue grayscale images, and the i-th pixel value of these three grayscale images is represented by , , and , respectively.Step 2. With initial values , the sequences are produced by fractional-order hyperchaotic system (7). Then, an integer sequence between 0 and 255 is obtained:where and . The encryption key sequences can be gained by the key selection table, and it is shown in Table 1.

There are three groups of keys in Table 1. is used to decide which group is selected to encrypt , , and of the i-th pixel. So, it is realized that different plain images are encrypted by different key streams. The sequence is generated by equations (14) and (15):where are produced by fractional-order hyperchaotic system (4).Step 3. After , , and of three grayscale images are encrypted by equation (16), respectively, we can get the encrypted , , and :whereStep 4. Repeat the aforementioned steps appropriately. In the end, the encrypted color image is created by the composition of the three encrypted grayscale images.
4.2. Design of the Decryption Algorithm
4.2.1. Decryption Algorithm

Step 1. Separate the encrypted image into red, green, and blue grayscale images, and set , , and to represent the i-th pixel value of these grayscale images, respectively. The decryption begins from the back to the front, that is to say that the mn-th pixel is firstly decrypted.Step 2. With the same initial values with the encryption process, the sequences are generated by fractional-order dynamic system (7). Next, it can be calculated that by equation (15). Then, the keys can be obtained by equation (13) and . Finally, we can get , , and after the following equation:Step 3. With values of , , and and , the value of can be computed by equations (14) and (15). Then, the (mn−1)-th pixel can be decrypted. Similarly, it is finished until the values of , , and are decrypted.Step 4. After repeating the above steps for the same rounds with the encryption process, the decrypted image is obtained.

4.2.2. Inverse Permutation Process

Step 1. According to the red, green, and blue components of the color image, the image is converted into a grayscale image with size of . Then, a binary matrix with size of is obtained by each pixel of the grayscale image which is changed into an 8-bit array.Step 2. Because the sum of all the elements with value of 1 in the binary matrix is equal to one of all the elements with value of 1 in the binary matrix , the value of is computed by the following equation:Step 3. With the same initial values as permutation process, the sequences are generated by system (4). Then, the keys and are computed by equations (8) and (9), respectively. Finally, the vectors and are obtained by equations (11) and (12) separately.Step 4. According to the array vectors and , the rows and columns of binary image are inversely permuted, respectively. The image is obtained by this inverse permutation. We convert with size of into the plain color image whose size is of . Thus, the decryption is achieved completely.

4.3. Experimental Result

The color image named pepper is selected as the plain images, whose size is . The initial values of fractional-order hyperchaotic system (4) and system (7) are , , , , , ,, and . The experimental results are shown in Figure 6.

4.4. Performance and Security Analysis
4.4.1. Key Space and Sensitivity

In the encryption algorithm, the secret keys are the initial values of the two hyperchaotic systems, that is, and . Because the maximum precision of these initial values is , the total key space is that , which is much larger than [25]. Therefore, our algorithm can resist all kinds of brute force attacks.

For the key sensitive test, the tiny change is selected as the error of these initial values, and it is shown in Table 2. Due to space limitations, only the changes of , , , and were made. The experimental results are shown in Figure 7. It can be seen that these decrypted images are extremely similar to noise and absolutely different from the plain image, and those pixel distribution histograms are uniform. Moreover, we calculate the NPCR and UACI of the original image and recovered images (peppers) with different keys; it is shown in Table 3. It is easy to observe that NPCR is over 99%, and the UACI is close to 33%. It demonstrates that the recovered images with different keys are greatly different from their original form. Therefore, our algorithm is sensitive to the secret key.

4.4.2. χ2 Test

We compute the χ2 values of both plain image and encrypted image named Pepper, Flower, Yacht, and Baboon, whose sizes are all . It is shown in Table 4. Obviously, the χ2 values of the ciphered images are far lower than those of the plain images and similar to the algorithm in [26, 27]; they are all within the effective interval .

4.4.3. Statistical Analysis

From the plain image and encrypted image, 2500 pairs of adjacent pixels are randomly selected in horizontal, vertical, and diagonal directions, respectively. Then, we calculate the correlation coefficients of two adjacent pixels, which are shown in Table 5. From Table 5, it can be observed that the correlations of two adjacent pixels are close to 1 in the plain images, while the ones of the encrypted images are round 0 and similar to the algorithm in [28, 29]. Therefore, the encryption algorithm can eliminate the correlation of the adjacent pixels.

4.4.4. Information Entropy

We compute the information entropy of the encrypted images according to the red, green, and blue components of the color image, which is shown in Table 6. It can be seen that the information entropy of these ciphered images is all close to the value 8. So, it proves that the unpredictability of the encrypted images is very high.

4.4.5. Differential Attack

To test the differential attack, some color images are encrypted with altering a pixel in the plain images, respectively, and NPCR and UACI are calculated in Table 7. It can be found that the NPCR is over 99%, the UACI is over 33%, and similar to the algorithm in [2830]. It indicates that our algorithm can resist the differential attack.

5. Conclusion

In this paper, the anticontrol of the fractional-order chaotic system is studied. We give the necessary conditions for the anticontrol of the fractional-order chaotic system. With the same parameters and fractional order, a 3D chaotic system is driven to two new 4D fractional-order hyperchaotic systems, respectively. We compute Lyapunov exponents and bifurcation diagrams of these new fractional dynamic systems.

Based on these two fractional-order hyperchaotic systems, a color image encryption algorithm is designed. In permutation process, the key is related to the plain image, and the key in encryption process is dynamically changing with different plain images and encrypted images. Therefore, our algorithm can resist the chosen plaintext (ciphertext) attacks and overcome the difficulty of key management in the “one time and one secret (one time one key)” scheme. In addition, the security analysis shows that our algorithm has better security. Therefore, it verifies the effectiveness of these fractional dynamic systems for image encryption.

In the future, we will further study on the anticontrol of the fractional-order chaotic system and identify the new chaotic system scientifically by the criteria from the work [31]. In image encryption, the fractional hyperchaotic system could be extended to a computational model for parallel image encryption algorithms.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This research was supported by the National Natural Science Foundation of China (nos. 61662073, 11701061, and 11501074) and the General Research Project of Liaoning Provincial Education Department of China (no. L2015023).