A Data Secured Communication System Design Procedure with a Chaotic Carrier and Synergetic Observer

: We have considered the problem of secure communication by means of chaotic carrier communication channels. Data protection is provided if the signal in the communication channel looks like a stochastic or noisy one, i.e., by the steganography property, and also by using advanced and secured approaches of mixing a useful signal into a chaotic carrier. The problem is to ﬁnd e ﬀ ective and e ﬃ cient techniques for useful signal reconstruction at the receiver side. We ﬁrstly use a synergetic nonlinear mathematical observer to recover the two useful signals transmitted simultaneously over a single communication channel. Compared to a known observer, the synergetic one operates with initial nonlinear models, i.e., it may be applied directly to chaotic systems. In that system structure, we consider the useful signals as unobservable variables and estimate them by the given model of a chaotic generator. A chaotic data transmission system with two channels is demonstrated; the presented mathematical procedure explains the steps of synergetic two-channel observer design. Computer simulation results prove the viability of our approach. The proposed data transmission scheme and the observer design procedure provide e ﬀ ective transmission and reconstruction of informational signals. Reconstruction error is up to approximately 25% but has a very short pulses shape and could be eliminated with further analog or digital ﬁltering algorithms. As an example application, simulation of image transmission and recovery is demonstrated. The study’s results may be used as a basis for further research into secure data transmission system design.


Introduction
Dynamic chaos as a phenomenon has attracted researchers' attention since the well-known works of Lorenz [1,2]. Chaotic systems have found application in the study of chemical reactions, phenomena in medicine, biology, economics, sociology, engineering, etc. [2][3][4][5][6][7][8]. Chaotic systems and the phenomena of dynamic chaos are also used in the development of communication systems [9][10][11][12]. Development of new methods of data protection is always a state-of-the-art problem. Traditional approaches are digital and/or analog signals hardware and software encryption with various algorithms. Another advanced approach is use of chaotic oscillation generators instead of a van der Pol oscillator as a carrier oscillation generator in data transmission systems. In such a case the unpredictable nature of a chaotic carrier to an external listener becomes a protective tool itself. It should be noted that the chaotic carrier dramatically complicates a communication system, producing a lot of engineering problems. The most important problems are: (i) introduction of the informational signal into the chaotic carrier at the transmitter side while providing a sufficient security level; and (ii) successful recovery/reconstruction of the information signal at the receiver side. Secondary problems may include transmitter and receiver systems synchronization, signal reconstruction accuracy, etc.
There are various methods for protecting a useful signal with chaotic oscillations [12]. These methods differ both in the way of introducing a useful signal into a chaotic one in a communication channel and in the way of recovering a useful signal on the receiver side. The most promising methods are nonlinear mixing (or chaotic generator parameter nonlinear modulation) of a useful signal into the structure of a chaotic generator and adaptive methods of signal reception [12,13].
In our study, we combine these advanced approaches and explore a chaotic carrier two-channel data transmission system using nonlinear parametric modulation at the transmitter side and a two-channel observer for useful signal estimation at the receiver side.
The main contributions of this study are summarized as follows: • Here we firstly present a design procedure for a two-channel nonlinear synergetic observer that we used as an adaptive method of signal reception in chaotic carrier communication system; • The presented design procedure is implemented for Rössler generator; • We built a chaotic communication system viable structure based on the combination of chaotic generator nonlinear parametric modulation, method of global reconstruction of a dynamic system and nonlinear synergetic observer; • Application of synergetic observer chaotic carrier communication system for image transmission.
The article is organized as follows. Section 2 presents an overview of various methods of secured signal transmission using the chaotic generator as a signal carrier including ones that use parametric modulation and various techniques of signal reconstruction on the receiver side including observer design methods. Section 3 presents the methodology of our approach considered here (Section 3.1), security analysis of the encoded transmission system (Section 3.3), a system design procedure algorithm with a design example (Sections 3.4 and 3.5) as well as an overall system computer simulation (Section 3.6). To compare the obtained results, the chaotic system was estimated using the least squares method in Section 3.7. In Section 4.1, some hardware system implementation options on an Arduino, Raspberry Pi and FPGAs are discussed based on examples from other studies described earlier [14][15][16][17][18][19][20]. Besides Section 4 provides examples of system software implementation, including an example of digital data software transmission (Section 4.2) and secured image transmission via the designed system in Section 4.3. Discussion and conclusions as well as the study's future directions are presented in Sections 5 and 6. Luenberger observer [32] No Not needed Limited Rigid/Postulated Yes Kalman filter [31] No Not needed Limited Rigid/Postulated Yes Chaotic synchronization [25,27] No Required Yes Rigid/Postulated Yes Adaptive observer [27][28][29] No Not needed Yes Rigid/Postulated No SMC observer [35] No Not needed Yes Rigid/Postulated Yes Reduced order observer [36,37] No Required Yes Rigid/Postulated No Synergetic observer [39] Yes Not needed Yes Object-defined No So, as described in Table 1 and beyond, the key advantages and main distinctive features in the design procedure of a synergetic observer in comparison with other observers are: • the structure of classical observers is rigid, i.e., the relationship between its variables are initially postulated but not formed during the design process for a particular object; • the synergetic observer's structure is formed directly during the design procedure, so the observer has to be specially designed for particular object model, but the design procedure is more complicated and should be defined in every case; • the synergetic observer's designed structure includes the right-hand sides of the equations of the chaotic generator, so it allows taking into account all the properties of a chaotic generator and the relationship between its variables.

General Methodology
We explored a nonlinear chaotic oscillations generator as a source of the carrier signal in a data secured communication system. Our goal was to transmit a useful signal over this chaotic carrier. To modulate our useful signal, we introduced it as a function directly into the structure of the generator of chaotic oscillations, so the output would be a highly-secured analog signal. Then this encoded signal entered the communication channel. To restore our useful signal on the receiver side we applied a known approach of synergetic nonlinear state observer design. To do so we treated our useful signal as an unknown variable and applied the designed observer for its estimation and reconstruction.
The adaptive reception methods used in this work, including the work of mixing a useful signal directly into the structure of the chaotic generator model, have been considered in the works of Professor V.S. Anishchenko [13] and studied in several earlier papers [27][28][29][30].
Within the framework of these previous methods, in our work two of the constant coefficients of the chaotic generator model were replaced by functions whose arguments were the sum of the initial coefficient and the useful signal that varies over time. Thus, the useful signals were embedded directly into the structure of the chaotic generator itself and the resulting chaotic oscillations carried hidden information within these useful signals. This approach to mixing useful signals, not into the resulting chaotic oscillations, but directly into the generator itself in a nonlinear, multiplicative manner only, increased the stealth and security of the system. The innovation of this work was to restore the useful signals on the receiver side if there was information about the model of the chaotic carrier signal generator and its parameters, the modulated useful signal parameter, which non-linear mixing was performed, and what was considered an unobservable variable, that was subject to recovery by a synthesized state observer. To restore useful signals, we used a synergetic nonlinear observer of state variables, proposed in the works of the scientific school of Professor A.A. Kolesnikov [38][39][40], to which the authors of this study belong; such an observer is able to work with a specific generator of deterministic chaos. The procedure for using a synergetic observer to reconstruct a signal with a chaotic carrier was presented earlier [39]. Our synergetic observer was based on the method of analytical design of an aggregated regulator (ADAR) that was first presented by Kolesnikov [41] and later extended to many applications in several papers and studies (e.g., [38,40]) within a framework of synergetic control theory. In previous research [42,43], a synergetic observer application for a single-channel system with a chaotic carrier was shown. In this paper, a new design procedure is presented that works with a system employing two-channel transmission of useful signals.
So, the communication system draft structure may be presented as in Figure 1. In the following subsections, we will specify each block of Figure 1 to build a communication system reflecting above mentioned general methodology.

General Methodology
We explored a nonlinear chaotic oscillations generator as a source of the carrier signal in a data secured communication system. Our goal was to transmit a useful signal over this chaotic carrier. To modulate our useful signal, we introduced it as a function directly into the structure of the generator of chaotic oscillations, so the output would be a highly-secured analog signal. Then this encoded signal entered the communication channel. To restore our useful signal on the receiver side we applied a known approach of synergetic nonlinear state observer design. To do so we treated our useful signal as an unknown variable and applied the designed observer for its estimation and reconstruction.
The adaptive reception methods used in this work, including the work of mixing a useful signal directly into the structure of the chaotic generator model, have been considered in the works of Professor V.S. Anishchenko [13] and studied in several earlier papers [27][28][29][30].
Within the framework of these previous methods, in our work two of the constant coefficients of the chaotic generator model were replaced by functions whose arguments were the sum of the initial coefficient and the useful signal that varies over time. Thus, the useful signals were embedded directly into the structure of the chaotic generator itself and the resulting chaotic oscillations carried hidden information within these useful signals. This approach to mixing useful signals, not into the resulting chaotic oscillations, but directly into the generator itself in a nonlinear, multiplicative manner only, increased the stealth and security of the system. The innovation of this work was to restore the useful signals on the receiver side if there was information about the model of the chaotic carrier signal generator and its parameters, the modulated useful signal parameter, which non-linear mixing was performed, and what was considered an unobservable variable, that was subject to recovery by a synthesized state observer. To restore useful signals, we used a synergetic nonlinear observer of state variables, proposed in the works of the scientific school of Professor A.A. Kolesnikov [38][39][40], to which the authors of this study belong; such an observer is able to work with a specific generator of deterministic chaos. The procedure for using a synergetic observer to reconstruct a signal with a chaotic carrier was presented earlier [39]. Our synergetic observer was based on the method of analytical design of an aggregated regulator (ADAR) that was first presented by Kolesnikov [41] and later extended to many applications in several papers and studies (e.g., [38,40]) within a framework of synergetic control theory. In previous research [42,43], a synergetic observer application for a single-channel system with a chaotic carrier was shown. In this paper, a new design procedure is presented that works with a system employing two-channel transmission of useful signals.
So, the communication system draft structure may be presented as in Figure 1. In the following subsections, we will specify each block of Figure 1 to build a communication system reflecting above mentioned general methodology.  As an approach to building communication systems with a chaotic carrier, chaotic synchronization is used in many studies. On the contrary, our system will allow not using chaotic synchronization and will provide a simpler circuit on the receiver's side.

Chaotic Generator Mathematical Model and Two-Channel Chaotic Transmitter Block Diagramm
Let us consider a dynamic chaos generator based on a "strange" attractor of Rössler [44], which describes the dynamic regimes by the following nonlinear differential equations .
where x, y and z are state variables, and µ 0 = [a, b, c] is the vector of constant parameters.
In accordance with the method of global reconstruction of dynamical systems [13], by using the following change of variables we transform Equation (1) to the following form . . . where The Rössler generator mathematical model in the form of Equations (3) and (4) provides transmission of variables x(t), y(t) and z(t) over a single communication channel with only one new variable Z(t). In verifying that Equations (1) and (3) are equivalent, in Figure 2 we show attractors of initial Rössler model (1) and reconstructed model (3).
Electronics 2020, 9, x FOR PEER REVIEW 5 of 25 As an approach to building communication systems with a chaotic carrier, chaotic synchronization is used in many studies. On the contrary, our system will allow not using chaotic synchronization and will provide a simpler circuit on the receiver's side.

Chaotic Generator Mathematical Model and Two-Channel Chaotic Transmitter Block Diagramm
Let us consider a dynamic chaos generator based on a "strange" attractor of Rössler [44], which describes the dynamic regimes by the following nonlinear differential equations where x, y and z are state variables, and = , , is the vector of constant parameters. In accordance with the method of global reconstruction of dynamical systems [13], by using the following change of variables we transform Equation (1)     Thus, the transformed system (3) in the general case contains three unknown parameters a, b, and c, which can be found by constructing a synergetic observer. Thus, the transformed system (3) in the general case contains three unknown parameters a, b, and c, which can be found by constructing a synergetic observer. As we decided to use a two-channel useful data transmission system, we perform modulation of parameters a and c from drive signals so that their value remains within the chaotic dynamic system model. This gives us the new control parameters of the Rössler system as follows.
The condition of chaotic mode existence in the system should be determined in the following intervals.
So, the transmitter MATLAB/Simulink model structure according to model (3) had the form as in Figure 3. In Figure 3 the block dz/dt consists function (4), and inputs a(t) and c(t) were modulated with useful signals according to (5).
Electronics 2020, 9, x FOR PEER REVIEW 6 of 25 As we decided to use a two-channel useful data transmission system, we perform modulation of parameters a and c from drive signals so that their value remains within the chaotic dynamic system model. This gives us the new control parameters of the Rössler system as follows. * ( ) = + ( ); с * ( ) = с + ( ). (5) The condition of chaotic mode existence in the system should be determined in the following intervals.
So, the transmitter MATLAB/Simulink model structure according to model (3) had the form as in Figure 3. In Figure 3 the block dz/dt consists function (4), and inputs a(t) and c(t) were modulated with useful signals according to (5).  Depending on the transmission system structure the different numbers of physical transmission lines may be enabled. In our case we used only single line transmission, so state variables X(t) and Y(t) were included in state variable Z(t) and only Z(t) signal (presented in Figure 6) is transmitted via the communication channel. Then the signal in the communication channel was under the influence of external disturbances.    In our case we used only single line transmission, so state variables X(t) and Y(t) were included in state variable Z(t) and only Z(t) signal (presented in Figure 6) is transmitted via the communication channel. Then the signal in the communication channel was under the influence of external disturbances.
Electronics 2020, 9, x FOR PEER REVIEW 6 of 25 As we decided to use a two-channel useful data transmission system, we perform modulation of parameters a and c from drive signals so that their value remains within the chaotic dynamic system model. This gives us the new control parameters of the Rössler system as follows. * ( ) = + ( ); с * ( ) = с + ( ). (5) The condition of chaotic mode existence in the system should be determined in the following intervals.
So, the transmitter MATLAB/Simulink model structure according to model (3) had the form as in Figure 3. In Figure 3 the block dz/dt consists function (4), and inputs a(t) and c(t) were modulated with useful signals according to (5).  Depending on the transmission system structure the different numbers of physical transmission lines may be enabled. In our case we used only single line transmission, so state variables X(t) and Y(t) were included in state variable Z(t) and only Z(t) signal (presented in Figure 6) is transmitted via the communication channel. Then the signal in the communication channel was under the influence of external disturbances.

Security Analysis of Chaotic Carrier Data Transmission System with Parameters Nonlinear Modulation
In the previous sections, we described different schemes for mixing a useful signal with a chaotic one. In particular, the works of Short [22] indicated in Section 2 show the vulnerability of systems with additive parametric modulation. In his works, it was shown that it is possible to create a filter that selects a useful (i.e., deterministic) signal from a chaotic carrier. In this regard, the security analysis of systems in Section 3.2 with multiplicative parametric modulation is valid. It is obvious that nonlinear mixing and the system (1) global reconstruction into Equations (3) and (4) will provide a more complex waveform for Z(t), but it is necessary to prove this mathematically. For this purpose, we applied the signal Z(t) to the communication channel with a multiplicatively mixed some useful periodic signal (hereinafter, a useful signal transmission) and without a mixed useful signal (hereinafter, an idle transmission). To analyze these transmissions, we used the standard signal processing functions from the MATLAB: autocorrelation and Fourier transform.

Autocorrelation Analysis
Autocorrelation is the correlation of a signal with itself, but with some time delay [45]. This estimation is also called a sequential correlation. The MATLAB system has a special function for obtaining correlograms, namely the xcorr function. Figure 7a and 7b shows that the shape of the correlograms did not indicate the presence of a useful signal in a chaotic carrier. Moreover, the shape of the correlogram of a completely random signal ( Figure 8) also did not differ from the correlograms of deterministic chaos. Thus, analysis using correlograms confirmed the possibility of using this method to protect data transmission. Moreover, this ensured the steganography of the system, i.e., concealment from an external listener of the very fact that we were transmitting a useful signal.

Security Analysis of Chaotic Carrier Data Transmission System with Parameters Nonlinear Modulation
In the previous sections, we described different schemes for mixing a useful signal with a chaotic one. In particular, the works of Short [22] indicated in Section 2 show the vulnerability of systems with additive parametric modulation. In his works, it was shown that it is possible to create a filter that selects a useful (i.e., deterministic) signal from a chaotic carrier. In this regard, the security analysis of systems in Section 3.2 with multiplicative parametric modulation is valid. It is obvious that nonlinear mixing and the system (1) global reconstruction into Equations (3) and (4) will provide a more complex waveform for Z(t), but it is necessary to prove this mathematically. For this purpose, we applied the signal Z(t) to the communication channel with a multiplicatively mixed some useful periodic signal (hereinafter, a useful signal transmission) and without a mixed useful signal (hereinafter, an idle transmission). To analyze these transmissions, we used the standard signal processing functions from the MATLAB: autocorrelation and Fourier transform.

Autocorrelation Analysis
Autocorrelation is the correlation of a signal with itself, but with some time delay [45]. This estimation is also called a sequential correlation. The MATLAB system has a special function for obtaining correlograms, namely the xcorr function. Figure 7a and 7b shows that the shape of the correlograms did not indicate the presence of a useful signal in a chaotic carrier. Moreover, the shape of the correlogram of a completely random signal ( Figure 8) also did not differ from the correlograms of deterministic chaos. Thus, analysis using correlograms confirmed the possibility of using this method to protect data transmission. Moreover, this ensured the steganography of the system, i.e., concealment from an external listener of the very fact that we were transmitting a useful signal.

Security Analysis of Chaotic Carrier Data Transmission System with Parameters Nonlinear Modulation
In the previous sections, we described different schemes for mixing a useful signal with a chaotic one. In particular, the works of Short [22] indicated in Section 2 show the vulnerability of systems with additive parametric modulation. In his works, it was shown that it is possible to create a filter that selects a useful (i.e., deterministic) signal from a chaotic carrier. In this regard, the security analysis of systems in Section 3.2 with multiplicative parametric modulation is valid. It is obvious that nonlinear mixing and the system (1) global reconstruction into Equations (3) and (4) will provide a more complex waveform for Z(t), but it is necessary to prove this mathematically. For this purpose, we applied the signal Z(t) to the communication channel with a multiplicatively mixed some useful periodic signal (hereinafter, a useful signal transmission) and without a mixed useful signal (hereinafter, an idle transmission). To analyze these transmissions, we used the standard signal processing functions from the MATLAB: autocorrelation and Fourier transform.

Autocorrelation Analysis
Autocorrelation is the correlation of a signal with itself, but with some time delay [45]. This estimation is also called a sequential correlation. The MATLAB system has a special function for obtaining correlograms, namely the xcorr function. Figure 7a,b shows that the shape of the correlograms did not indicate the presence of a useful signal in a chaotic carrier. Moreover, the shape of the correlogram of a completely random signal ( Figure 8) also did not differ from the correlograms of deterministic chaos. Thus, analysis using correlograms confirmed the possibility of using this method to protect data transmission. Moreover, this ensured the steganography of the system, i.e., concealment from an external listener of the very fact that we were transmitting a useful signal.

Fourier Series Analysis
Fourier series analysis allowed us to demonstrate the non-obvious frequency of the signal. This is so because the Fourier series result is the signal frequency spectrum. For extra analysis, we used Savitzky-Golay filtering. The red lines in Figures 9 and 10 show the filtered signal.
Here, according to Figure 9a and 9b, it is also impossible to find significant differences between the results for transmission with a useful signal and without a useful signal. However, the analysis of the non-deterministic random signal ( Figure 10) revealed a significant difference in the shape of the signal from the deterministic chaotic one ( Figure 9). The latter makes it possible to identify the fact of transmitting a useful signal or the fact of the presence of a useful signal generator in the data transmission medium (even in idle mode transmission). Thus a steganography property, in this case, could not be provided. However, in real systems, there always exist some deterministic signals (interference from other communication channels, etc.). This means it is virtually impossible to obtain an ideal non-deterministic noise in the communication channel in the absence of transmission of a useful signal.

Fourier Series Analysis
Fourier series analysis allowed us to demonstrate the non-obvious frequency of the signal. This is so because the Fourier series result is the signal frequency spectrum. For extra analysis, we used Savitzky-Golay filtering. The red lines in Figures 9 and 10 show the filtered signal.
Here, according to Figure 9a and 9b, it is also impossible to find significant differences between the results for transmission with a useful signal and without a useful signal. However, the analysis of the non-deterministic random signal ( Figure 10) revealed a significant difference in the shape of the signal from the deterministic chaotic one (Figure 9). The latter makes it possible to identify the fact of transmitting a useful signal or the fact of the presence of a useful signal generator in the data transmission medium (even in idle mode transmission). Thus a steganography property, in this case, could not be provided. However, in real systems, there always exist some deterministic signals (interference from other communication channels, etc.). This means it is virtually impossible to obtain an ideal non-deterministic noise in the communication channel in the absence of transmission of a useful signal.

Fourier Series Analysis
Fourier series analysis allowed us to demonstrate the non-obvious frequency of the signal. This is so because the Fourier series result is the signal frequency spectrum. For extra analysis, we used Savitzky-Golay filtering. The red lines in Figures 9 and 10 show the filtered signal.
Here, according to Figure 9a,b, it is also impossible to find significant differences between the results for transmission with a useful signal and without a useful signal. However, the analysis of the non-deterministic random signal ( Figure 10) revealed a significant difference in the shape of the signal from the deterministic chaotic one (Figure 9). The latter makes it possible to identify the fact of transmitting a useful signal or the fact of the presence of a useful signal generator in the data transmission medium (even in idle mode transmission). Thus a steganography property, in this case, could not be provided. However, in real systems, there always exist some deterministic signals (interference from other communication channels, etc.). This means it is virtually impossible to obtain an ideal non-deterministic noise in the communication channel in the absence of transmission of a useful signal.  Thus, the above analysis showed that the multiplicative modulation of a chaotic carrier does not allow us to separate the useful signal from the carrier and does not even allow us to establish the fact of transmission for an external listener. The above analysis using autocorrelation and Fourier series is the simplest analysis. The problem requires other solutions, however, the result above allows us to conclude that the used approach is viable for data protection.
In the following sections, we considered the procedure for reconstructing the useful signal on the receiver side using the methods and approaches of synergetic control theory [38][39][40][41].

Overall Steps of Synergetic Observer Design Procedure
The synergetic observer design consists in using of some mathematical algorithm that connects the values of the observed (measured) variables with the estimates of the unobserved variables, i.e., the observer performs restoring the complete state variables vector from the available signal and some a priori information. In the design procedure of a synergetic observer, both disturbing and setting actions, as well as object parameters, can act as unobserved variables.  Thus, the above analysis showed that the multiplicative modulation of a chaotic carrier does not allow us to separate the useful signal from the carrier and does not even allow us to establish the fact of transmission for an external listener. The above analysis using autocorrelation and Fourier series is the simplest analysis. The problem requires other solutions, however, the result above allows us to conclude that the used approach is viable for data protection.
In the following sections, we considered the procedure for reconstructing the useful signal on the receiver side using the methods and approaches of synergetic control theory [38][39][40][41].

Overall Steps of Synergetic Observer Design Procedure
The synergetic observer design consists in using of some mathematical algorithm that connects the values of the observed (measured) variables with the estimates of the unobserved variables, i.e., the observer performs restoring the complete state variables vector from the available signal and some a priori information. In the design procedure of a synergetic observer, both disturbing and setting actions, as well as object parameters, can act as unobserved variables. Thus, the above analysis showed that the multiplicative modulation of a chaotic carrier does not allow us to separate the useful signal from the carrier and does not even allow us to establish the fact of transmission for an external listener. The above analysis using autocorrelation and Fourier series is the simplest analysis. The problem requires other solutions, however, the result above allows us to conclude that the used approach is viable for data protection.
In the following sections, we considered the procedure for reconstructing the useful signal on the receiver side using the methods and approaches of synergetic control theory [38][39][40][41].

Overall Steps of Synergetic Observer Design Procedure
The synergetic observer design consists in using of some mathematical algorithm that connects the values of the observed (measured) variables with the estimates of the unobserved variables, i.e., the observer performs restoring the complete state variables vector from the available signal and some a priori information. In the design procedure of a synergetic observer, both disturbing and setting actions, as well as object parameters, can act as unobserved variables.
In the general case, the mathematical model of an extended system consists of observable and unobservable terms, and is represented as [40]: where x is the observed state variables vector, dim x = n; y is the vector of unobservable variables (unmeasured physical variables, parameters, setting and disturbing actions, etc.), dim y = k; g 0 and h 0 are the continuous nonlinear vector functions, dim The main steps of the synergetic observer design procedure [40] are: Main Step 1. Synthesis of a synergetic observer. The synthesis task is to construct an asymptotic estimationŷ of the vector y from the observed values of the vector x.
Main Step 2. Replacing unobserved variables y with their asymptotic estimatesŷ. In our case the equations of the asymptotic observer have the form: where z is the observer state variable vector; L is the numerical matrix, dim L = (k × k), selected based on the observer's stability conditions; Γ(x) is the functional matrix, dim Γ = (k × n), Γ(x) is the determined from the following matrix equation:

Two-Channel Synergetic Observer Analytical Design Procedure and Two-Channel Receiver Block Diagramm
Here we consider the design procedure for a synergetic state observer for the parameters of the Rössler chaotic generator [44]. The Rössler system is described by a system of nonlinear differential Equation (1).
As control parameters adopted by the parameters a and c, let us design the synergetic observer by setting parameter b as "known" [13,[26][27][28][29]. According to overall design procedure [40], we replace the unknown parameters with their dynamic models . w 1 (t) = 0, . w 2 (t) = 0, the solutions of which are w 1 (t) = const and w 2 (t) = const, and reflect the quick change in time of parameters a and c.
Then, we extend the system of Equations (1) to .
where w 1 . is the dynamic state variable model of parameter a, and w 2 is the dynamic state variable model of parameter c. Thus, in System (9) the observable variables are x, y and z, and the unobservable variables are w 1 and w 2 .
We introduce variablesŵ 1 andŵ 2 , which are estimates of the parameters w 1 and w 2 respectively. To find them we define the vector of the macro variable Ψ (t) by the expression Then, we write down the reduction equationŝ where Q 1 (x, y, z) and Q 2 (x, y, z) are the unknown functions of the observed system state variables in Equations (9), and v 1 and v 2 denote the state of the dynamic observer. Differentiating Equation (11) with respect to time produces The macro variable in Equation (10) must satisfy the following functional equation where L = L 11 L 12 L 21 L 22 is the coefficient matrix, which provides the stability of Equations (13) and defines the observer's dynamics. Then, from Equation (13) with regard to Equations (9) to (12), we obtain Since the equations of the observer cannot contain the unobservable state variables, we have the following expressions Since the system of Equation (15) is of the fourth order, but has six unknown terms, starting from the stability conditions of the observer, and taking into account Equation (9), we choose where α is the observer tuning parameter introduced to determine the rate of estimation. Then and Thus, taking into account Equations (17) and (18), the observer's Equation (14) take the following form: where the estimates of variablesŵ 1 andŵ 2 are calculated according to Equation (11). So, the receiver MATLAB/Simulink model structure according to model (5), (19) has the form shown in Figure 11.
Thus, taking into account Equations (17) and (18), the observer's Equation (14) take the following form: where the estimates of variables and are calculated according to Equation (11). So, the receiver MATLAB/Simulink model structure according to model (5), (19) has the form shown in Figure 11.

Building of the Data Trasmission System Model and Overall System Computer Simulation
In MATLAB/Simulink, we have built a model ( Figure 12) reflecting a two-channel chaotic data transmission system (Figures 3,11) and provided a source and reconstructed signals as in Figure 13. Figure 6 presents the encoded signal into the communication channel.
The following parameters were used in Figure 12 model simulation: • Rössler system parameter = 0.2; and • the parameter of the synergetic observer, which determines the rate of estimation = −0.1. Figure 11. MATLAB/Simulink model of the receiver (two-channel observer). Figure 11 displays our MATLAB/Simulink model of the receiver with the two-channel synergetic observer and implements the initial model and observer equations from Section 3.5. In Figure 11 the blocks a1 and c1 consist function (18).

Building of the Data Trasmission System Model and Overall System Computer Simulation
In MATLAB/Simulink, we have built a model ( Figure 12) reflecting a two-channel chaotic data transmission system (Figures 3 and 11) and provided a source and reconstructed signals as in Figure 13. Figure 6 presents the encoded signal into the communication channel.
The following parameters were used in Figure 12 model simulation: • Rössler system parameter b = 0.2; and • the parameter of the synergetic observer, which determines the rate of estimation α = −0.1.  Figure 12 displays the overall secure communication system model with a two-channel synergetic observer without presenting the transmitter and receivers in detail. In the figure, the useful signals were generated in the "Information signal" block 1. Then the useful signals were directed to the "Transmitter" block 2 where they were mixed into the chaotic generator mathematical model followed with mapping into unified variable Z(t). Then Z(t) entered the "Communication channel" block 3, where Z(t) was admixed with disturbances emulated with the MATLAB/Simulink block "Uniform Random number". Block 5 in Figure 12 was the receiver side with a synergetic observer.   Figure 12 displays the overall secure communication system model with a two-channel synergetic observer without presenting the transmitter and receivers in detail. In the figure, the useful signals were generated in the "Information signal" block 1. Then the useful signals were directed to the "Transmitter" block 2 where they were mixed into the chaotic generator mathematical model followed with mapping into unified variable Z(t). Then Z(t) entered the "Communication channel" block 3, where Z(t) was admixed with disturbances emulated with the MATLAB/Simulink block "Uniform Random number". Block 5 in Figure 12 was the receiver side with a synergetic observer.
In Figures 13 and 14, the simulation results of transmission and reconstruction of two piecewise-constant test signals are presented. In Figure 13a and 13b, the initial useful signals a and c are displayed as the blue lines, and the recovered signals are displayed via the red lines. We can see that the reconstructed signals had a form like the original ones but with an error. In order to illustrate the reconstruction error values, we displayed separate plots for reconstruction error values in Figure 14a and 14b. To compare the initial information signal with the transmitted one, we plotted the transmitted signal Z(t) with rectangular pulses in the communication channel encoded by the chaotic system in Figure 6.
(a) (b) Figure 13. Useful signal reconstruction with a two channel observer: (a) useful signal a (blue is the initial signal at the transmitter side; red is the reconstructed signal at the receiver side); (b) useful signal c (blue is the initial signal at the transmitter side; red is the reconstructed signal at the receiver side).  MATLAB/Simulink overall secure communication system block diagram with a two-channel synergetic observer. Here: block 1 is the useful signals source; block 2 is the transmitter with a chaotic generator; block 4 simulates errors in the communication channel; block 3 is the communication channel; and block 5 is the receiver (two-channel observer). Figure 12 displays the overall secure communication system model with a two-channel synergetic observer without presenting the transmitter and receivers in detail. In the figure, the useful signals were generated in the "Information signal" block 1. Then the useful signals were directed to the "Transmitter" block 2 where they were mixed into the chaotic generator mathematical model followed with mapping into unified variable Z(t). Then Z(t) entered the "Communication channel" block 3, where Z(t) was admixed with disturbances emulated with the MATLAB/Simulink block "Uniform Random number". Block 5 in Figure 12 was the receiver side with a synergetic observer.

Figures 3, 11 and 12 describe our virtual test bed in MATLAB/Simulink.
In Figures 13 and 14, the simulation results of transmission and reconstruction of two piecewise-constant test signals are presented. In Figure 13a and 13b, the initial useful signals a and c are displayed as the blue lines, and the recovered signals are displayed via the red lines. We can see that the reconstructed signals had a form like the original ones but with an error. In order to illustrate the reconstruction error values, we displayed separate plots for reconstruction error values in Figure 14a and 14b. To compare the initial information signal with the transmitted one, we plotted the transmitted signal Z(t) with rectangular pulses in the communication channel encoded by the chaotic system in Figure 6.
(a) (b) Figure 13. Useful signal reconstruction with a two channel observer: (a) useful signal a (blue is the initial signal at the transmitter side; red is the reconstructed signal at the receiver side); (b) useful signal c (blue is the initial signal at the transmitter side; red is the reconstructed signal at the receiver side). Figure 13. Useful signal reconstruction with a two channel observer: (a) useful signal a (blue is the initial signal at the transmitter side; red is the reconstructed signal at the receiver side); (b) useful signal c (blue is the initial signal at the transmitter side; red is the reconstructed signal at the receiver side).
In Figures 13 and 14, the simulation results of transmission and reconstruction of two piecewise-constant test signals are presented. In Figure 13a,b, the initial useful signals a and c are displayed as the blue lines, and the recovered signals are displayed via the red lines. We can see that the reconstructed signals had a form like the original ones but with an error. In order to illustrate the reconstruction error values, we displayed separate plots for reconstruction error values in Figure 14a,b. To compare the initial information signal with the transmitted one, we plotted the transmitted signal Z(t) with rectangular pulses in the communication channel encoded by the chaotic system in Figure 6.
To demonstrate the operability of the proposed algorithm, we perform additional simulation of the resulting closed-loop system with an observer in another computer mathematics package, Maple. Here we introduce a sinusoidal signal to the input of the system and provide simulations on a different time interval.
Let us compare the simulation results in Figures 13 and 14 and Figures 15 and 16. When simulating the reconstruction of a sinusoidal signal, it can be seen that along with the cases of Figures 13 and 14, a smaller error was achieved for channel a's signal transmission. In addition, at the initial time, the synergetic observer gave the largest recovery error. To demonstrate the operability of the proposed algorithm, we perform additional simulation of the resulting closed-loop system with an observer in another computer mathematics package, Maple. Here we introduce a sinusoidal signal to the input of the system and provide simulations on a different time interval.
Let us compare the simulation results in Figures 13 and 14 and Figures 15 and 16. When simulating the reconstruction of a sinusoidal signal, it can be seen that along with the cases of Figures 13 and 14, a smaller error was achieved for channel a's signal transmission. In addition, at the initial time, the synergetic observer gave the largest recovery error.
The overall block diagram illustrating the approach to communication system design is shown in Figure 17.
An algorithm for our synergetic observer design procedure is presented in Table 2. According to the above example of chaotic carrier communication system design and two-channel synergetic observer design procedure for a Rössler chaotic generator, we provide this algorithm in detail to provide its possible implementation for systems with other chaotic generators.
(a) (b) Figure 15. Sinusoidal signal reconstruction with a two channel observer: (a) Useful signal a (blue is the initial signal at the transmitter side; red is the reconstructed signal at the receiver side); and (b) Useful signal c (blue is the initial signal at the transmitter side; red is the reconstructed signal at the receiver side). To demonstrate the operability of the proposed algorithm, we perform additional simulation of the resulting closed-loop system with an observer in another computer mathematics package, Maple. Here we introduce a sinusoidal signal to the input of the system and provide simulations on a different time interval.
Let us compare the simulation results in Figures 13 and 14 and Figures 15 and 16. When simulating the reconstruction of a sinusoidal signal, it can be seen that along with the cases of Figures 13 and 14, a smaller error was achieved for channel a's signal transmission. In addition, at the initial time, the synergetic observer gave the largest recovery error.
The overall block diagram illustrating the approach to communication system design is shown in Figure 17.
An algorithm for our synergetic observer design procedure is presented in Table 2. According to the above example of chaotic carrier communication system design and two-channel synergetic observer design procedure for a Rössler chaotic generator, we provide this algorithm in detail to provide its possible implementation for systems with other chaotic generators.
(a) (b) Figure 15. Sinusoidal signal reconstruction with a two channel observer: (a) Useful signal a (blue is the initial signal at the transmitter side; red is the reconstructed signal at the receiver side); and (b) Useful signal c (blue is the initial signal at the transmitter side; red is the reconstructed signal at the receiver side).  The overall block diagram illustrating the approach to communication system design is shown in Figure 17.   Table 2. Example of steps for our synergetic observer design procedure for Rössler generator.

Design
Step Description Step 1 Deduce the system into a form suitable for transmitting a signal over a communication channel: for the initial nonlinear system of the 3 rd order, using the global reconstruction of a dynamic system [13] replace the variables for transmitting a useful signal to the communication channel (Equation (3)).
Step 2 Perform multiplicative parametric modulation: select two constant coefficients in different equations of the original model and replace them with the sum of this coefficient and the time function that reflects the useful signal (for each of the coefficients) (System (5)).
Step 3 Adopt these sums as new unknown parameters and and extend the generator's initial model by dynamic models of these parameters ( ) = 0, ( ) = 0. As a result we get a 5 th order system with 3 observable (x, y and z) and 2 unobservable ( and ) variables (Equation (9)). Step 4 Introduce variables and , which will be estimates of the parameters and .
Step 5 To find them we define the vector of the macro variable and write down the reduction equations with new unknown functions that will be defined on the final steps of the procedure (Matrix (10)).

Step 6
Differentiating reduction equations with respect to time (System (12)).
Step 7 Write down a main functional equation of the ADAR method [38,40] that will define the final system desired dynamics. The L coefficients matrix will provide a desired system stability condition (Equation (13)).  (2) variable; Z noise (t) is the Z(t) variable with noises admixed in the transmission media; aˆ(t) and cˆ(t) are the estimated modulated parameters; µ 1 (t) and µ 2 (t) are the initial useful signals; µ 1ˆ( t) and µ 2ˆ( t) are the reconstructed useful signals; and α is the observer tuning parameter.
An algorithm for our synergetic observer design procedure is presented in Table 2. According to the above example of chaotic carrier communication system design and two-channel synergetic observer design procedure for a Rössler chaotic generator, we provide this algorithm in detail to provide its possible implementation for systems with other chaotic generators. Table 2. Example of steps for our synergetic observer design procedure for Rössler generator.

Design Step Description
Step 1 Deduce the system into a form suitable for transmitting a signal over a communication channel: for the initial nonlinear system of the 3rd order, using the global reconstruction of a dynamic system [13] replace the variables for transmitting a useful signal to the communication channel (Equation (3)).
Step 2 Perform multiplicative parametric modulation: select two constant coefficients in different equations of the original model and replace them with the sum of this coefficient and the time function that reflects the useful signal (for each of the coefficients) (System (5)).
Step 3 Adopt these sums as new unknown parameters and and extend the generator's initial model by dynamic models of these parameters . w 1 (t) = 0, . w 2 (t) = 0. As a result we get a 5th order system with 3 observable (x, y and z) and 2 unobservable (w 1 and w 2 ) variables (Equation (9)).
Step 4 Introduce variablesŵ 1 andŵ 2 , which will be estimates of the parameters w 1 and w 2 .
Step 5 To find them we define the vector of the macro variable and write down the reduction equations with new unknown functions that will be defined on the final steps of the procedure (Matrix (10)).

Step 6
Differentiating reduction equations with respect to time (System (12)).
Step 7 Write down a main functional equation of the ADAR method [38,40] that will define the final system desired dynamics. The L coefficients matrix will provide a desired system stability condition (Equation (13)).
Step 8 From the main functional equation with respect to the extended initial mathematical model, the vector of the macro variable, the reduction equations and its derivative we obtain the draft equations of the observer (Equation (14)).
Step 9 The observer equations should not contain unobservable state variables, therefore, from the draft observer equations it is necessary to write out all terms containing unobservable variables and equate them to zero. We thus get a system of the 4th order (Equation (15)).
Step 10 For the resulting system, we choose values of the coefficients L based on the stability condition of the observer and the main functional equation (Equations (16)-(18)).
Step 11 We obtain the observer Equation (19) taking into account the found functions for the reduction Equation (11).

Alternative Reconstruction Method Demonstration
To demonstrate the advantages of the synergetic nonlinear state observer design procedure in the subsections above, we considered an alternative method for reconstructing a useful signal on the receiver side. The recovery methods described in the previous sections and given in Table 1 did not provide applicability to nonlinear mathematical models of chaotic generators and simultaneous interdependent recovery of two parameters. The procedure for reconstructing a signal using an estimation of the least squares method (LS method) is described here.
Let us identify the parameters a and c with the recursive least squares method. For the system: the formula for determining unknown parameters in discrete form is the following matrix expression: where B is the vector of parameters to be defined; x is the vector of input variables; y is the vector of output variables. Next, we move from the discrete form of Equation (21) to the continuous one: .
where R = P −1 , P is the arbitrary matrix, ∆ is the step of the system solution.
To build the a and c parameter identifiers of the mathematical model (1), we consider each of the equations separately. To design a parameter for observer a, we extract from model (1) an equation containing the following parameter: dy dt = x + ay.
In this case, the input and output vectors will look like where .ŷ (t) is the evaluation of the derived variable y, which can be obtained by a control loop with two integrators: where µ 2 = .ŷ (t) is the evaluation of the derived variable y; k 1 , and k 2 are the constant coefficients. The vector of unknown coefficients is formed from estimates of the corresponding parameters, in our case: As the initial values of the matrix R, we can take any numerical nonsingular matrix, but for better convergence of the parameter estimates we choose the following one: In the same way for the parameter c we get the following estimation: The simulation plots of system of Equation (1) alongside with Equations (24), (27), (28) and the reconstructed information signal are shown in Figures 18 and 19.
Electronics 2020, 9, In the same way for the parameter c we get the following estimation: The simulation plots of system of Equation (1) alongside with Equations (24), (27), (28) and the reconstructed information signal are shown in Figures 18 and 19. (a) (b) Figure 18. Useful signal reconstruction with a two channel LS method observer: (a) Useful signal a (blue is the initial signal at the transmitter side; and red is the reconstructed signal at the receiver side); (b) Useful signal c (blue is the initial signal at the transmitter side; and red is the reconstructed signal at the receiver side).
The simulation results show a low efficiency of this estimation method for reconstructing a signal with a chaotic carrier. In particular, in Figures 18 and 19, an unacceptably high recovery error was observed for parameter a. In general, based on the results of a qualitative comparison of Figures 13, 15 with Figure 18, we can outline the advantages of a synergetic nonlinear observer. In addition, in further modeling of the system of Equation (1) and Equations (24), (27), (28), the least squares method was inoperative due to the accumulation of estimation errors. Figure 18. Useful signal reconstruction with a two channel LS method observer: (a) Useful signal a (blue is the initial signal at the transmitter side; and red is the reconstructed signal at the receiver side); (b) Useful signal c (blue is the initial signal at the transmitter side; and red is the reconstructed signal at the receiver side).

The System Hardware and Software Implementation Options
In this study, the implementation of our new algorithms was performed by simulation in the MATLAB/Simulink and/or Maple environment. However, the obtained simulation results may have depended on MATLAB and/or Maple computation engine features. To test and validate the system, it is advisable to perform simulations on various software and/or hardware platforms.

Brief Overview of System Hardware Implementation Issues
The chaotic systems, as well as chaotic communication systems, may be hardware-implemented by using different kinds of embedded systems, for example: Arduino, Raspberry Pi and FPGAs.
Digital implementation of the four-dimension autonomous hyperchaotic system on a Field The simulation results show a low efficiency of this estimation method for reconstructing a signal with a chaotic carrier. In particular, in Figures 18 and 19, an unacceptably high recovery error was observed for parameter a. In general, based on the results of a qualitative comparison of Figure 13, Figure 15 with Figure 18, we can outline the advantages of a synergetic nonlinear observer. In addition, in further modeling of the system of Equation (1) and Equations (24), (27), (28), the least squares method was inoperative due to the accumulation of estimation errors.

The System Hardware and Software Implementation Options
In this study, the implementation of our new algorithms was performed by simulation in the MATLAB/Simulink and/or Maple environment. However, the obtained simulation results may have depended on MATLAB and/or Maple computation engine features. To test and validate the system, it is advisable to perform simulations on various software and/or hardware platforms.

Brief Overview of System Hardware Implementation Issues
The chaotic systems, as well as chaotic communication systems, may be hardware-implemented by using different kinds of embedded systems, for example: Arduino, Raspberry Pi and FPGAs.
Digital implementation of the four-dimension autonomous hyperchaotic system on a Field Programmable Gate Array (FPGA) for creating a chaotic secure communication system using a XILINX VERTEX5 chip recently reported by Tami et al. [14]. Bit error rate analysis in FPGA/FPAA based communication systems by using Arduino in a Matlab/Simulink environment with Sprott chaotic generator performed by Günay and Altun in [15]. The approach of chaotic system simulation in the Arduino platform is described by Silva, et al. in [16]. Dual-channel Chaotic Generator of Mackey-Glass system is implemented on Arduino Due in [17] by Voliansky et al. A Raspberry Pi 3 implementation of Lorenz Chaotic System with estimation by Hybrid Jaya-Powell Algorithm is described by Zhuang,et al. in [18]. This small overview defines several validated options of chaotic system hardware implementation, while a synergetic observer is a resource-intensive computational algorithm and requires additional research to find a suitable platform. The most promising and universal approach is to program a designed synergetic observer in FPGAs. For simulation, the resulting closed-loop system can be represented in a form suitable for numerical simulation. FPGA implementation techniques for chaotic systems are described by Tlelo-Cuautlea, et al. [20], by Guillen-Fernandezb et al. [19] and in other related papers. Notably, Tlelo-Cuautlea, et al. [20] demonstrate the implementation of Forward Euler and Runge-Kutta numerical methods on an FPGA. Guillen-Fernandezb et al. [19] demonstrate synchronization techniques examples applied to 22 chaotic oscillators. These implementation examples may be used in a hardware implementation of the designed system from Sections 3.5 and 3.6.

Example of Software Implementation on a Standard PC without MATLAB Computational Engine
The promising one is a model-oriented approach to modeling when the system created in MATLAB/Simulink is transformed into code in a high-level language (for example, C ++), and then it is executed as a separate application program on a standard PC or compatible embedded system. We used this approach when modeling a single-channel data transmission system with a chaotic carrier created in our earlier work [43].
In order to validate the system for transmission of useful digital data, our team with the help of Alexander D. Zolkin converted the MATLAB/Simulink system diagrams into C++ code and used it to create the virtual test bed providing transmission of a test phrase. The main window of the testbed is presented at Figure 20a,b. The test phrase is "Lorem ipsum dolor sit amet, consectetur adipiscing elit". As expected, the error of signal reconstruction in the proposed algorithm did not allow it to be used to transfer useful digital data without additional processing. As we needed only to validate the data transmission system, we only used multiple transmission as the simplest method of eliminating transmission errors. Figure 20a shows the result of the transmission with a number of retransmissions of 20,000.
A smaller number of transmissions, for example, 8000, resulted in the persistence of transmission errors (Figure 20b). We also evaluated the necessary number of repetitions to provide the desired error rate in transmission. However, this issue requires future study. The same procedure may be used for two-channel communication system validation.
transmission errors. Figure 20a shows the result of the transmission with a number of retransmissions of 20,000.
A smaller number of transmissions, for example, 8000, resulted in the persistence of transmission errors (Figure 20b). We also evaluated the necessary number of repetitions to provide the desired error rate in transmission. However, this issue requires future study. The same procedure may be used for two-channel communication system validation. The simulation software system used the simplest error correction algorithm: multiple transmission. This algorithm was chosen only to demonstrate the feasibility of the system with a synergetic observer to practical implementation for transmitting binary data. In Figure 21, we show the results of a statistical analysis of the created software system, having studied the dependence of the number of repetitions on the number of errors. The dependencies in Figure 21 make it possible to identify the best combination of the number of retries and the transmission rate that was used in the simulation results in Figure 20. The simulation software system used the simplest error correction algorithm: multiple transmission. This algorithm was chosen only to demonstrate the feasibility of the system with a synergetic observer to practical implementation for transmitting binary data. In Figure 21, we show the results of a statistical analysis of the created software system, having studied the dependence of the number of repetitions on the number of errors. The dependencies in Figure 21 make it possible to identify the best combination of the number of retries and the transmission rate that was used in the simulation results in Figure 20.

Example of Black-and-White Image Transmission with MATLAB Computational Engine
The encryption system described in the previous subsection (Figures 12 and 17) can be used to encode any type of information, including graphic information, which is one of the most popular application examples for chaotic data transmission. Therefore, to illustrate the operability of this system, we considered confidential image transmission. As a test image, a black-and-white image 200 × 200 pixels in size with 256 shades of gray level (a portrait of the writer Anton P. Chekhov (1860-1904)), shown in Figure 22a, was selected.
When transmitting images, the information signal is a two-dimensional function ( , ), where x and y are the spatial coordinates, and the amplitude is the intensity (brightness) or gray level at any point with a pair of coordinates ( , ).
To submit an image to the system input, we used a block From file to receive data from an external file. The data are presented in the form of a matrix . . . . . . (29) where the first row of the matrix represents time samples in ascending order, and the second one is the image elements (pixels) at these points in time.

Example of Black-and-White Image Transmission with MATLAB Computational Engine
The encryption system described in the previous subsection (Figures 12 and 17) can be used to encode any type of information, including graphic information, which is one of the most popular application examples for chaotic data transmission. Therefore, to illustrate the operability of this system, we considered confidential image transmission. As a test image, a black-and-white image 200 × 200 pixels in size with 256 shades of gray level (a portrait of the writer Anton P. Chekhov (1860-1904)), shown in Figure 22a, was selected.
When transmitting images, the information signal is a two-dimensional function f (x, y), where x and y are the spatial coordinates, and the amplitude f is the intensity (brightness) or gray level at any point with a pair of coordinates (x, y). Electronics 2020, 9,

Discussion
The designed system is presented in the form of a MATLAB/Simulink model, and the results of computer modeling of the constructed system are presented above. The simulation results confirm the viability of our approach. Moreover, earlier we have studied the cryptographic strength and steganography for another 3 rd order chaotic system with parametric modulation of only one parameter introduced into the system in a non-linear manner, i.e., multiplicatively using the autocorrelation method and the Fourier transform. As a result, autocorrelation has shown the complete identity of the signal analysis results with and without the added useful signal component. Analysis by the Fourier transform method has shown that the difference in the level of the leading frequency of the Fourier transform spectrograms is only 0.002 Hz for signals with and without the useful information component, which will not allow detecting the existence of the useful signal by an external listener. In our current studies, we have applied these methods, validated in previous research to build the two-channel transmission system presented here. The approach to low-level protection of transmitted data used in this work is extremely effective and, with the exception of cases of the simplest implementation of a coding and communication system, allows good protection of the transmitted information [12,13], including hiding the data and even the fact of its transmission, not allowing a malicious observer to determine or extract any useful signal from the noise in the communication channel. This idea was repeatedly considered in the work of various previous authors, however the implementation of this approach turned out to be difficult due to a number of problems with decryption of such a protected signal on the receiver side. A general description of the use of synergetic observers in systems with chaotic dynamics is given by Kolesnikov et al. [39], and the procedure for a single-channel system was presented in previous research [42,43]. In this regard, the present study, which allows developing a two-channel reconstruction technique for two useful signals masked by chaotic oscillations on the receiving side, can provide a practical implementation of a very promising and practical approach for developing new communication systems for transmitting signals with a chaotic carrier.
In this study we did not use the simplest forms of parametric modulation. In many other well-known works using the parametric modulation method the useful signal is added to the model of the chaotic generator as an additive component (e.g., [46]), but we use an approach in which the useful signal is added as a multiplicative component, i.e., we use "non-linear mixing", which will have greater security. Our procedure applied to the 3 rd order model of the chaotic system. According to Figure 13, we can see a reconstruction error rate up 25% of the original signal or even more, but mainly this error has the form of a short-time disturbance and may be eliminated with basic smoothing and filtration algorithms. To submit an image to the system input, we used a block From file to receive data from an external file. The data are presented in the form of a matrix where the first row of the matrix represents time samples in ascending order, and the second one is the image elements (pixels) at these points in time.
To convert a BMP image into data of the form in Equation (1), it is necessary to execute a script in the workspace of the MATLAB system as a standard MATLAB procedure from the digital image processing libraries. The input of the script is the initial image BMP-file, the output is a MATLAB data MAT-file. After simulation of the image's transmission, the script is executed in reverse order to generate an output BMP-image file.
Model parameters as per Equation (1) can be changed in the model topology file, or through the graphical user interface in the MATLAB/Simulink system. During the simulation, the following parameters were selected: • fixed parameters of the Rössler system: a = b = 0.2; • the parameter of the synergetic observer that determines the rate of estimation of the parameter, α = 0.01; and • the modulating signal is presented in the form of a stepwise time dependence, the height of each step corresponding to the gray level of the black-and-white image.
The resulting restored image is shown in Figure 22c and the encoded signal in the communication channel shown in Figure 22b.

Discussion
The designed system is presented in the form of a MATLAB/Simulink model, and the results of computer modeling of the constructed system are presented above. The simulation results confirm the viability of our approach. Moreover, earlier we have studied the cryptographic strength and steganography for another 3rd order chaotic system with parametric modulation of only one parameter introduced into the system in a non-linear manner, i.e., multiplicatively using the autocorrelation method and the Fourier transform. As a result, autocorrelation has shown the complete identity of the signal analysis results with and without the added useful signal component. Analysis by the Fourier transform method has shown that the difference in the level of the leading frequency of the Fourier transform spectrograms is only 0.002 Hz for signals with and without the useful information component, which will not allow detecting the existence of the useful signal by an external listener. In our current studies, we have applied these methods, validated in previous research to build the two-channel transmission system presented here. The approach to low-level protection of transmitted data used in this work is extremely effective and, with the exception of cases of the simplest implementation of a coding and communication system, allows good protection of the transmitted information [12,13], including hiding the data and even the fact of its transmission, not allowing a malicious observer to determine or extract any useful signal from the noise in the communication channel. This idea was repeatedly considered in the work of various previous authors, however the implementation of this approach turned out to be difficult due to a number of problems with decryption of such a protected signal on the receiver side. A general description of the use of synergetic observers in systems with chaotic dynamics is given by Kolesnikov et al. [39], and the procedure for a single-channel system was presented in previous research [42,43]. In this regard, the present study, which allows developing a two-channel reconstruction technique for two useful signals masked by chaotic oscillations on the receiving side, can provide a practical implementation of a very promising and practical approach for developing new communication systems for transmitting signals with a chaotic carrier.
In this study we did not use the simplest forms of parametric modulation. In many other well-known works using the parametric modulation method the useful signal is added to the model of the chaotic generator as an additive component (e.g., [46]), but we use an approach in which the useful signal is added as a multiplicative component, i.e., we use "non-linear mixing", which will have greater security. Our procedure applied to the 3rd order model of the chaotic system. According to Figure 13, we can see a reconstruction error rate up 25% of the original signal or even more, but mainly this error has the form of a short-time disturbance and may be eliminated with basic smoothing and filtration algorithms.

Conclusions
The paper presented a design procedure for a two-channel synergetic state observer for a system of secured information transmission with a chaotic carrier. A system based on a synergetic state observer has the following advantages: (i) it allows estimation of up to two signals simultaneously; (ii) it does not require chaotic synchronization of the receiver and transmitter; (iii) it does not require determining the Lyapunov function; (iv) the observer structure is not rigid, the structure is not postulated in advance, but is determined during the design procedure based on the model of a chaotic generator; and (v) it provides direct application to systems with nonlinear dynamics without linearization of generator's nonlinear model.
The simulation results confirmed the viability of the proposed procedure and the capability of organizing a system of chaotic information transmission. A qualitative assessment of the image transmission results according to Figure 13 confirms the possibility of secure image transmission with sufficient reliability because the quantitative value of the error plays a secondary role in such tasks. During the test transmission of rectangular pulses (the simulation results in Figure 13a,b a significant signal recovery error is observed; the recovery error can reach 25% of the amplitude of the useful signal. However, the error is pulsed, so its presence does not interfere with the conclusion about the original waveform. Moreover, such an error can be eliminated by additional signal processing using digital filtering and smoothing algorithms.
It seems that additional research on the accuracy of the useful signal recovery is needed. According to Figures 13 and 22, the receiver quality may be acceptable for the transmission of some images, but in the case of numerical message transmission, a procedure of error detection and a recovery process is necessary. One potential solution is to make the frequency of the useful signal significantly lower than the fundamental frequency of oscillations of the chaotic system. In addition, future research should make an extra study to explore the impact of the observer's tune parameter α not only for speed of estimation but for receiver quality. It is reasonable to explore application of some smoothing and filtration algorithms in order to decrease or eliminate a useful signal reconstruction error at the receiver side on the output of the synergetic observer. Meanwhile, the receiver error may be also related to the MATLAB system solver. It thus may be necessary to repeat the simulation in LabView or in a future hardware-implemented system. In addition, errors can occur due to external influences on the communication channel. Thus, one way to increase the accuracy is by including digital filtration algorithms into the system schematic.
In further studies, it will be useful to numerically compare the resulting synergetic observer with other methods of signal recovery. In addition, as we introduce the useful signal as a function directly into the structure of the generator of chaotic oscillations multiplicatively, another topic for further research may be a deep estimation of actual steganography of the transmitted signal on the output of the chaotic generator.