Hyperbolic Sine Function Control-Based Finite-Time Bipartite Synchronization of Fractional-Order Spatiotemporal Networks and Its Application in Image Encryption

This work is devoted to the hyperbolic sine function (HSF) control-based finite-time bipartite synchronization of fractional-order spatiotemporal networks and its application in image encryption. Initially, the addressed networks adequately take into account the nature of anisotropic diffusion, i.e....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Fractal and fractional 2025-01, Vol.9 (1), p.36
Hauptverfasser: Liu, Lvming, Jiang, Haijun, Hu, Cheng, Yu, Haizheng, Chen, Siyu, Ren, Yue, Chen, Shenglong, Shi, Tingting
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This work is devoted to the hyperbolic sine function (HSF) control-based finite-time bipartite synchronization of fractional-order spatiotemporal networks and its application in image encryption. Initially, the addressed networks adequately take into account the nature of anisotropic diffusion, i.e., the diffusion matrix can be not only non-diagonal but also non-square, without the conservative requirements in plenty of the existing literature. Next, an equation transformation and an inequality estimate for the anisotropic diffusion term are established, which are fundamental for analyzing the diffusion phenomenon in network dynamics. Subsequently, three control laws are devised to offer a detailed discussion for HSF control law’s outstanding performances, including the swifter convergence rate, the tighter bound of the settling time and the suppression of chattering. Following this, by a designed chaotic system with multi-scroll chaotic attractors tested with bifurcation diagrams, Poincaré map, and Turing pattern, several simulations are pvorided to attest the correctness of our developed findings. Finally, a formulated image encryption algorithm, which is evaluated through imperative security tests, reveals the effectiveness and superiority of the obtained results.
ISSN:2504-3110
2504-3110
DOI:10.3390/fractalfract9010036