key: cord-0825214-slsb24mt authors: Javan, Ali Akbar Kekha; Jafari, Mahboobeh; Shoeibi, Afshin; Zare, Assef; Khodatars, Marjane; Ghassemi, Navid; Alizadehsani, Roohallah; Gorriz, Juan Manuel title: Medical Images Encryption Based on Adaptive-Robust Multi-Mode Synchronization of Chen Hyper-Chaotic Systems date: 2021-06-07 journal: Sensors (Basel) DOI: 10.3390/s21113925 sha: f1b38ca4e791fab492a9a4adc8b46cca4bd1d927 doc_id: 825214 cord_uid: slsb24mt In this paper, a novel medical image encryption method based on multi-mode synchronization of hyper-chaotic systems is presented. The synchronization of hyper-chaotic systems is of great significance in secure communication tasks such as encryption of images. Multi-mode synchronization is a novel and highly complex issue, especially if there is uncertainty and disturbance. In this work, an adaptive-robust controller is designed for multimode synchronized chaotic systems with variable and unknown parameters, despite the bounded disturbance and uncertainty with a known function in two modes. In the first case, it is a main system with some response systems, and in the second case, it is a circular synchronization. Using theorems it is proved that the two synchronization methods are equivalent. Our results show that, we are able to obtain the convergence of synchronization error and parameter estimation error to zero using Lyapunov’s method. The new laws to update time-varying parameters, estimating disturbance and uncertainty bounds are proposed such that stability of system is guaranteed. To assess the performance of the proposed synchronization method, various statistical analyzes were carried out on the encrypted medical images and standard benchmark images. The results show effective performance of the proposed synchronization technique in the medical images encryption for telemedicine application. Recently, telemedicine systems have been introduced to assist the diagnosis and treatment of various diseases [1] [2] [3] . These systems, through telecommunication systems and clinical data registration devices, have been able to yield good medical services between specialists and patients easily; the significance of this issue arises when some patients for any reason cannot attend medical specialty centers [4, 5] . Specialist physicians can apply telemedicine to diagnose the disease using clinical data such as medical images and signals. When sending and receiving clinical data in telecommunication channels, information security is one of the main dilemmas of telemedicine systems [6] ; because telecommunication channels are not secure enough to send medical information. Various medical information of patients is confidential, and at the time of sending and receiving from the patient to the specialist must have a sufficient security communication channel and cannot be accessed by other individuals and organizations [7, 8] . In order to enhance the security of patients' information at the time of sending, various approaches are exploited that the most important of which are cryptographic techniques. One of the most important fields of cryptography is chaotic systems [9, 10] . The most significant feature of chaotic systems is the high reaction to small changes in the initial conditions [11, 12] . Much research has been conducted in this field for the last two decades since Correll et al. [13] [14] [15] introduced the synchronization of chaotic systems. In recent years, the employment of chaotic systems in clinical data encryption has grown remarkably [16] . Because chaos systems mainly guarantee medical information confidentiality when sending and receiving from telecommunication channels [16] . Data encryption is usually done by chaotic or hyper-chaotic methods . In some researches, chaotic or hyper-chaotic systems are used to encrypt peripheral data [38] [39] [40] [41] [42] [43] . In recent years, researchers have focused on the encryption of medical data using chaotic methods [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] . Medical data contains important information about patients [41, [44] [45] [46] . Therefore, the confidentiality of medical information is essential when sending it through telecommunication channels. Chaotic theory, as a nonlinear and complex phenomenon, plays an important role in increasing the security of medical data. In the following, a number of conducted investigations using cryptographic procedures in clinical data have been examined. Lin et al. [17] used chaos theory to the encryption of electroencephalogram (EEG) signals. In this paper, the chaos-based EEG encryption system involves three levels of encryption and is implemented in the C# programming language. A chaotic theory-based cryptographic method for clinical signals is presented in [18] . The proposed encryption algorithm is based on a logistic map with double chaotic layer encryption (DCLE). In this study, EEG, electrocardiograms (ECG), and blood pressure (BP) data from the PhysioBank database were acquired. The idea of the optical chaos method for secure EEG signals transmission in telemedicine applications has been discussed in Shahzadi et al.'s research [19] . In the proposed scheme, a semiconductor laser source is utilized to generate optical chaos and conceals the EEG signal in the chaotic signal before transmission over the optical fiber. The generated data is then sent over optical fiber. Applying chaotic modulation in intrinsic mode functions to encrypt medical ECG and EEG data is done in [20] . The results prove that the proposed method for encrypting and decrypting EEG and ECG signals containing chaotic behavior has satisfactory results. In the research of Ibrahim et al. [21] , medical image encryption was conducted using dynamic S-boxes and chaotic maps. Experimental results explicate that the proposed scheme has successfully passed all security tests in medical image encryption. Gafsi et al. [22] proposed an improved chaotic system for medical image encryption. In this paper, a complex chaotic-based pseudorandom number generator (PRNG) has been designed to generate a high-quality encryption key. The generated key indicates the high complexity behavior of the approach. In [23] , a medical image encryption method has been proposed based on a chaotic map and fractional discrete cosine transform (FrDCT) coefficients. The proposed method comprises two steps of applying FrDCT on an image and, after that, a chaotic map on the coefficients. The fourth-order chaotic system for clinical data encryption introduced in reference [24] . They calculated a variety of significant statistical parameters, such as correlation for the encrypted images in the proposed scheme. An encryption algorithm based on the properties of block encryption, 4-dimensional logistics map and, DNA systems has been introduced by Stalin et al. [25] . In this method, multiple key sequences are generated first. In the second step, the pixel is substituted by a 4D nonlinear logistic map. Finally, encryption is performed using DNA rules to ensure that the various blocks are securely encrypted. A chaotic system based on the Arnold cat method for medical images encryption in reference [26] is presented. The results demonstrate the high security and robustness of the proposed approach for secure medical image transmission. In another research, Choi et al. [27] presented a secure and robust medical images encryption method. The proposed method include two permutations based on plain image and Latin square (PPILS) and bi-directional adaptive diffusion. Choi et al. [28] proposed the NCA-based color medical image encryption algorithm and the generalized 3D chaotic cat map in another study. In this work, the NCA is an effective PRNG generating nonlinear pseudorandom sequences. Generalized 3D chaotic cat mapping is also adopted to create effective shuffle in encryption of color medical images. A medical image encryption system based on multiple chaotic and message-digest algorithm 5 (MD5) has been discussed in [29] . The system employs two rounds of chaotic diffusion using XOR bit operation to encrypt an image. The results show that the proposed method is highly efficient in medical image encryption. Designing a cryptographic algorithm based on pseudorandom sequence generation using a generalized double humped logistic map was done in [30] , which ensures the transmission of magnetic resonance imaging (MRI) and X-ray images with high security. In this work, various statistical analyzes have been exploited. Chaotic map-based authentication for telecare medicine information systems (TMISs) was examined by Li et al. in [31] . The results show that the proposed method presented in this paper can be applied in e-health services. A method based on the integration of fused coupled chaotic map (FCCM) to encrypt ECG signals has been proposed in Pandey et al.'s study [32] . The FCCM generates four different chaotic maps based on control parameters. The effective-ness of the proposed approach has been confirmed using various analyzes, including key sensitivity, key space, correlation evaluation, and histogram analysis. In the research of Sangavi et al. [33] , the method (MMIE) using Rossler dynamical system and sine map (Sine) for medical image encryption has been proposed. For the method, statistical metrics such as histogram analysis, entropy, differential, and correlation have been computed. Presented by researchers in [34] is an improved technique for medical image encryption based on discrete wavelet transform (DWT), discrete cosine transform (DCT) and, singular value decomposition (SVD) transformations. Additionally, the security of the method has been improved by exploiting 2D logistic maps based on chaotic cryptography. In Zheng et al.'s [35] study, the data encryption standard (DES) and elliptic curves cryptography (ECC) algorithms are used for EEG signals. The results reveal that the ECC method has superior performance in encryption and decryption of EEG signals. In this paper, a novel medical images encryption based on synchronization of hyper chaotic systems is presented. The main purpose of providing synchronization methods is to ad-just the controller parameters in chaotic systems properly. In order to synchronize, various control methods such as adaptive control [47, 48] , sliding mode [49, 50] , fuzzy [51, 52] , optimal [53, 54] , predictive [55, 56] , etc. have been proposed so far. Chaotic synchronization is such that the state paths of the following system follow the state paths of a base system [57, 58] . Due to the numerous applications of synchronization, various other methods have been proposed that have different applications based on the existence of chaos and uncer-tainty in them. The following are some of the newest synchronization methods. In [59] , the idea of synchronization based on the sliding mode control method and developing the advanced encryption standard algorithm is presented. Synchronization of chaotic systems based on additional Fourier modes is one of the newest methods proposed by [60] . Ding et al. [38] performed the encryption based on fractional-order Henon chaotic map and the discrete-time wavelet transform for a hyper-chaotic system. A new encryption idea based on the discrete-time sliding mode method and the improved El-Gamal encryption system is presented in [61] . Synchronization with the optimized proportional integral derivative (PID) controller with particle swarm optimization (PSO) algorithm is another new method in this field that has been introduced by [62] . In this paper, the main idea of medical image encryption is based on robust adaptive control. Also, the synchronization method is multi-mode. The multi-state synchronization with the presence of uncertainty, disturbance, unknowns, and variable parameters has been carried out. The proposed synchronization method is used alongside the Chen hyper chaotic system to encrypt medical images. In the provided example, one Chen hyperchaotic system is considered as the master system, and two Chen hyper chaotic systems are considered as the slave systems. According to the simulations, the robustness of the proposed method and the convergence of all error types to zero verify its capabilities. In the following, taking the advantage of masking technique, it is possible to use the proposed synchronization method for medical images encryption. For encryption, first, a variety of standard benchmark images have been employed. Then, the chest CT and X-ray images of COVID-19 patients with various noises have been examined. Also, to accurately verify the performance of the proposed method, a variety of important cryptographic parameters including histogram analysis, correlation, differential attack, PSNR and information entropy of CT images with different noises have been calculated to represent the performance of the proposed method correctly. The results reveal that the synchronization technique of the proposed hyper-chaotic system for encrypting standard images and medical images has shown successful results and can therefore be adopted as an encryption section in a COVID-19 detection telemedicine system. The proposed approach is capable of encrypting other medical images. In the following, other sections of the paper are presented. The second part is devoted to the theories of the proposed synchronization method. In the Section 3, the idea of encrypting medical images and standard benchmarks based on the chaotic masking method is expressed. The implementation of the proposed synchronization method on the Chen hyper-chaotic system is introduced in Section 4. The types of statistical parameters to show the efficiency of the proposed synchronization method in the encryption of different images are provided in the Section 5. The Section 6 is devoted to the results of the proposed method in encrypting medical images and standard benchmarks. The advantages and disadvantages of the proposed method are described in Section 7. Finally, the discussion and conclusion are presented in Section 8. This section first describes the problem of synchronization of multi-mode transitive chaotic systems. The multiple loop synchronization is then checked. In both cases, the adaptive laws and controllers are designed using the adaptive control method. Figure 1 shows the synchronization model between a master system and several slave systems. , is the control func tion of ith system. Therefore, according to Equations (1) and (2), synchronization of th chaotic system with the control function is as follows: In the form of multiple synchronization mode, the synchronization error is defined as follows: The master chaotic system is defined as follows [48] : . where x 1 (t) = [x 11 , x 12 , · · · , x 1n ] T is the state vector of the system. f 1 (x 1 (t)) = [ f 11 , f 12 , · · · , f 1n ] T is the continuous function, H 1 (x 1 (t)) = [H 11 , H 12 , · · · , H 1n ] T is matrix function and θ 1 (t) = [θ 11 , θ 12 , · · · , θ 1n ] T is the main parameters of the master system, which are piecewise constant. There are (N − 1) chaotic slave systems with control function as given by (2) [63] : . where , θ i2 , · · · , θ in ] T are the main parameters which are piecewise constant of the ith slave system, and u i−1 (t) = [u i−1.1 (t), u i−1.2 (t), · · · , u i−1.n (t)] T , is the control function of ith system. Therefore, according to Equations (1) and (2), synchronization of the chaotic system with the control function is as follows: . In the form of multiple synchronization mode, the synchronization error is defined as follows: Definition 1. Chaotic system (3) using the controllers u i (t) and unknown parameters have multi-state transformative synchronization if the following condition is held: where the error dynamic defined as follows: . is met, then the adaptive transmission synchronization between N chaotic systems with unknown parameters is realized. The design of controllers and adaptive laws to achieve the above goal is based on Lyapunov's function, and the synchronization under the mode of transmission synchronization is performed. The control law for u 1 (t), u 2 (t), . . . , u N−1 (t) can be designed as follows: in which: i−1,j > 0, j = 1, 2, · · · , n Therefore, error dynamics are given as follows: . is an approximation error. Proof. Consider the following Lyapunov function: The derivative of Lyapunov's function (7) is obtained according to Equation (8) Therefore, the parameters laws are chosen as follows: . . If θ i are constant then . θ i = 0 and the parameters estimation laws are determined as follows: .θ By setting the estimation laws in (8), we will have: where ϕ = min i−1.j > 0 and K 2 i−1 are Hurwitz. So system (6) is stable and ||e i (t)|| → 0. Therefore, obtain an adaptive synchronization between (N − 1) slave systems and a master system. Note 1. If the systems are time varying: θ i = θ i (t) Equations (9a) and (9b) are still stablished, then in these cases the Theorem 1 is also established. Since the synchronization error converges to zero, the Equations (10a) and (10b) are converted as follows for relatively long periods of time: is a vector with piecewise constant element and the appropriate time interval between changes in any element, the updating rule (10) is established and the parameters are estimated accurately. If d dt θ i (t) < s i < 1 then the update Equation (10) are also well established. Figure 2 displays circular multi-mode synchronization. In this type of synchronization, systems 1 and N have the role of master and slave respectively and other systems both have the role of slave and master at the same time (i-th system is master role of i + 1-th system), which makes it more complex. Therefore, if ( ) is a vector with piecewise constant element and the appropriate tim terval between changes in any element, the updating rule (10) is established and the paramete estimated accurately. If | ( ) | < < 1 then the update Equation (10) are also well e lished. Figure 2 displays circular multi-mode synchronization. In this type of synchro tion, systems 1 and N have the role of master and slave respectively and other sys both have the role of slave and master at the same time (i-th system is master role of th system), which makes it more complex. According to Figure 2 , the systems are synchronized with a circular structure. In case, the first chaotic system is described by the following expression: The (N − 1) chaotic systems are as follows: For N chaotic system described by Equation (13), if there are adaptive controlle that the error dynamics systems are defined as follows: According to Figure 2 , the systems are synchronized with a circular structure. In this case, the first chaotic system is described by the following expression: The (N − 1) chaotic systems are as follows: The control input is For N chaotic system described by Equation (13), if there are adaptive controllers, so that the error dynamics systems are defined as follows: is met then a circular synchronization between the N chaotic system and the unknown parameters is realized. The following statements are used to synchronize in both circular and transmission modes. (A) If there is a transmission and circular synchronization with the u(t) and m(t) controllers. Then: If transmission synchronization is established, circular synchronization is also realized and vice versa. Proof. Assume that a transmission synchronization is established, so: ∀ i : e i (t) → 0 so: If a circular synchronization is established (assuming i > j): Proof. The following relationships between errors are established in two synchronization modes: If a transmission synchronization is established, e i (t) → 0 therefore: So circular synchronization is established. Conversely, suppose a circular synchronization is established, r i (t) → 0 therefore: Therefore, transmission synchronization is also established. So the two types of synchronization are equivalent. Which is obtained by placing in Equations (2) and (14): For i = 1, we have: By placing in Equation (16), we have: m i (t) = u i (t) so the proof is completed. In this case, the master and slave systems are accompanied by disturbance and uncertainty as follows: where it is assumed that uncertainties and disturbances are bounded but with unknown bound. where γ i and d i are constant but indefinite and g i (x i ) is a definite function and in the special case g i (x i ) = |x i |. The dynamics of the errors are as follows: . By defining the control function as follows: whereθ i (t) is an estimate of θ i (t) and u i−1 (t) is part of the control function which is introduced below. By placing the control function in (18) , the dynamics of errors are as follows: . Theorem 4. The dynamic system of error Equation (20) under control Equation (19), Equation (25) and update laws Equations (29) and (31) is stable and synchronization errors are convergent to zero despite uncertainty and disturbance. Proof. by defining the Lyapunov function as follows: where: By calculating the derivative of Lyapunov's function: Note that for θ i (t) the same laws (9) and (10) are established, so Equation (22) becomes the following: Therefore: The bounded condition of disturbance and uncertainty can be developed on the components ∆ f i and D i as follows: Which we have placed in the following equation. If u i−1 j (t) is defined as follows: Then: By defining the estimation error: The update laws are as follows: where α i and β i are positive values. By placing the above update laws in Equation (28) we have: Hurwitz, the stability of the system is proved. Also, the convergence of synchronization errors to zero is guaranteed despite the uncertainty and disturbance. The laws for updating estimates will also be as follows: Note 2. Theorems 2 and 3 are established in spite of uncertainty and disturbance, because the nature of proving them does not depend on the existence or non-existence of uncertainty and disturbance. Therefore, the problem of circular synchronization is also solved in the presence of uncertainty and disturbance. Note 3. If systems are time-varying: θ i = θ i (t) Equations (9a) and (9b) are still established, so in these circumstances the Theorem 4 is also established. Therefore, as stated in note 1: circular synchronization of time-varying chaotic systems is also proven in the presence of uncertainty and disturbance. The following relation can be used to make the control function continuous: Note 5. If uncertainty forms are: . . , N then in update and control laws, it should be g i (x i ) = |x i |. The final control function is as follows: In this scheme, the information signal is added to the linear composition of the master chaotic system state signals. Assuming that S(t) is the information signal carried by the master system, then the transmission message q(t) is defined as follows [64, 65] : In the given relation, z i (t) denotes i-th component of the master system and the signal q(t) is masked using the chaotic signal. This signal is transmitted from the sender to the receiver through the communication channel. Adopting the proposed controller, multistate chaotic synchronization is conducted on one of its states. Using Equation (34), the received signal can be recovered [66] : The multistate system for image masking is shown in Figure 3 . According to Figure 3 , the model entails a master system and several slave systems. Consequently, here the message is first transmitted to the master system. In the next step, the image is encrypted and synchronized using the slave system. Finally, after synchronization in the receiver, the image is decrypted and the original messages are recovered. In the given relation, ( ) denotes i-th component of the master system and the signal ( ) is masked using the chaotic signal. This signal is transmitted from the sender to the receiver through the communication channel. Adopting the proposed controller, multi-state chaotic synchronization is conducted on one of its states. Using Equation (34), the received signal can be recovered [66] : The multistate system for image masking is shown in Figure 3 . According to Figure 3 , the model entails a master system and several slave systems. Consequently, here the message is first transmitted to the master system. In the next step, the image is encrypted and synchronized using the slave system. Finally, after synchronization in the receiver, the image is decrypted and the original messages are recovered. Utilizing the masking method, encryption and decryption of two signals are fulfilled using the proposed multi-state synchronization method. The simulation is executed with MATLAB software. Decryption and encryption are implemented after the synchronization of the master and slave chaotic systems in the presence of disturbance and uncer- Utilizing the masking method, encryption and decryption of two signals are fulfilled using the proposed multi-state synchronization method. The simulation is executed with MATLAB software. Decryption and encryption are implemented after the synchronization of the master and slave chaotic systems in the presence of disturbance and uncertainty. To that end, the given image is first converted into a signal. In the next step, this signal is added to one of the components of the master system state vector and is transmitted to the receiver through a communication channel. In the receiver part, first using the synchronization, the message signal is extracted from the chaotic signal and then converted into an image. A Chen hyper-chaotic system is considered as a master system and two Chen hyper chaotic systems are considered as slaves. They are defined as follows: In all examples, the parameters are set as follows: For parameter values, all systems are chaotic as follows: In the simulation of the basic conditions, the master system and two slave systems are selected as follows: The initial values of the parameters are assumed to be as follows: Figure 4 shows that synchronization errors in presence of uncertainty and disturbances are quickly converged to zero. On the other hand, parameter changes have little effect on synchronization errors and are quickly attenuated. Figure 5 shows that control laws are continuous functions prevent the phenomenon of chattering. As displayed in Figure 4 , synchronization of chaotic systems as the main objective is well carried out and synchronization errors converge to zero despite changes in parameters. As shown in Figure 5 , the obtained control signals are continuous. In addition, changes in the parameters are met with a rapid reaction in the control signals to converge the synchronization errors to zero. Case B. Multi-mode synchronization with time-varying parameters despite disturbance and uncertainty. In this case, disturbance and uncertainties are applied to master and slave systems as follows: In this case, the change in parameters is similar to case (A). Figure 6 shows the estimation of variable parameter of the system. It can be noted that, estimating time-varying parameters in the presence of uncertainty and disturbance is correctly done. Figure 6 shows the multi-mode synchronization errors despite the structural uncertainty and disturbance. We have obtained good performance as the synchronization errors are close to zero. Multi-mode synchronization errors for both master and slave systems, despite disturbance and uncertainties, have quickly reached to zero. Subsequently, change in the parameter causes small errors, which quickly converges to zero (Figure 7) . As displayed in Figure 4 , synchronization of chaotic systems as the main objective is well carried out and synchronization errors converge to zero despite changes in parameters. As shown in Figure 5 , the obtained control signals are continuous. In addition, changes in the parameters are met with a rapid reaction in the control signals to converge the synchronization errors to zero. Case B. Multi-mode synchronization with time-varying parameters despite disturbance and uncertainty. In this case, disturbance and uncertainties are applied to master and slave systems as follows: In this case, the change in parameters is similar to case (A). Figure 6 shows the estimation of variable parameter of the system. It can be noted that, estimating timevarying parameters in the presence of uncertainty and disturbance is correctly done. Figure 6 shows the multi-mode synchronization errors despite the structural uncertainty and disturbance. We have obtained good performance as the synchronization errors are close to zero. Multi-mode synchronization errors for both master and slave systems, despite disturbance and uncertainties, have quickly reached to zero. Subsequently, change in the parameter causes small errors, which quickly converges to zero (Figure 7) . As can be seen in Figure 6 , the synchronization of chaotic systems as the main aim is well done, and the synchronization errors converge to zero despite changes in parameters, presence of disturbance, and uncertainty. As can be seen in Figure 6 , the synchronization of chaotic systems as the main aim is well done, and the synchronization errors converge to zero despite changes in parameters, presence of disturbance, and uncertainty. As can be seen in Figure 6 , the synchronization of chaotic systems as the main aim is well done, and the synchronization errors converge to zero despite changes in parameters, presence of disturbance, and uncertainty. Case C. Multi-mode synchronization, taking into account the disturbance and uncertainties bounded with the function: For the case C |∆ | ≤ max|∆ | ≤ |∆ ( )| ≤ ( ) Case C. Multi-mode synchronization, taking into account the disturbance and uncertainties bounded with the function: For 24 2 sin(x 21 − x 22 ) 0.2x 23 2 cos(x 21 − 3x 22 ) 0.5 x 24 2 + 0.6x 22 2 cos(x 21 + 2x 23 ) 0.4 x 24 2 + 0.6x 22 2 In this case, the change in parameters is similar to case (A), the disturbances are similar to case (B) and uncertainties are not bounded with norm of states but bounded with a function of state norms. This increases the control problem complexity. In Figure 8 , the multi-mode synchronization error in case (C) shows that despite the time-varying parameters, the functional bounded uncertainty and disturbance converge to zero. As displayed in Figure 8 , the synchronization of chaotic systems as the main objective is well fulfilled, and in spite of changes in parameters, the presence of disturbance, and uncertainty, synchronization errors are converged to zero. Figure 9 shows that the estimation errors of uncertainties are more fluctuating than in case (B) but are close to zero. Estimation errors of disturbance and uncertainty bounds have reached zero with low fluctuations. The uncertainties are complex functions. The peaks appear in the figures only when the parameters have changed. However, over a short period of time, the magnitude of curves are decreased and eventually approached to zero. The proposed approach is able to reject uncertainties bounded with polynomial of state norms and unknown non-negative coefficients. As displayed in Figure 8 , the synchronization of chaotic systems as the main objective is well fulfilled, and in spite of changes in parameters, the presence of disturbance, and uncertainty, synchronization errors are converged to zero. Figure 9 shows that the estimation errors of uncertainties are more fluctuating than in case (B) but are close to zero. Estimation errors of disturbance and uncertainty bounds have reached zero with low fluctuations. The uncertainties are complex functions. The peaks appear in the figures only when the parameters have changed. However, over a short period of time, the magnitude of curves are decreased and eventually approached to zero. The proposed approach is able to reject uncertainties bounded with polynomial of state norms and unknown non-negative coefficients. in case (B) but are close to zero. Estimation errors of disturbance and uncertainty bou have reached zero with low fluctuations. The uncertainties are complex functions. peaks appear in the figures only when the parameters have changed. However, ov short period of time, the magnitude of curves are decreased and eventually approac to zero. The proposed approach is able to reject uncertainties bounded with polynom of state norms and unknown non-negative coefficients. The chaotic behavior of systems is shown in Figure 10 . The above figures exhibit chaotic behavior of the master (green) and slave systems (blue and red). The presenc disturbance and uncertainty as well as changes in system parameters make the sys behavior more complex. Chaotic behavior leads to the complicatedness of secure communications met and the possibility of detecting it is so low because in chaotic systems, in addition to certainty and disturbance, its parameters are assumed to be variable, which promotes security of the approach. The chaotic behavior of systems is shown in Figure 10 . The above figures exhibit the chaotic behavior of the master (green) and slave systems (blue and red). The presence of disturbance and uncertainty as well as changes in system parameters make the system behavior more complex. Chaotic behavior leads to the complicatedness of secure communications method and the possibility of detecting it is so low because in chaotic systems, in addition to uncertainty and disturbance, its parameters are assumed to be variable, which promotes the security of the approach. In image processing, the histogram represents the distribution of the pixel values of an image. Histogram variance is employed in image encryption. In this manner, low variance values indicate higher uniformity in encrypted images. The variance of histograms is expressed by Equation (36) [24] : In image processing, the histogram represents the distribution of the pixel values of an image. Histogram variance is employed in image encryption. In this manner, low variance values indicate higher uniformity in encrypted images. The variance of histograms is expressed by Equation (36) [24] : According to Equation (36), I denotes the vector of histogram values, I i and I j indicate the number of pixels whose gray values are equal to i and j, respectively [24] . Correlation distributions and correlation coefficients play a crucially significant role in the analysis of encrypted images, which are discussed in this section. The following statements are taken into account to calculate these values [24] : Pixel change rate (NPCR) and unified average changing Intensity (UACI) are two other important measurable parameters in image encryption, whose relationships of each are shown below [24] : Evaluation of encrypted images by NPCR and UACI parameters is depicted in Tables 1-5. The results reveal that a swift change in the original image leads to a change in the ciphered image. This signifies that the proposed scheme has a high ability to resist differential attack [24] . PSNR (peak signal to noise ratio) is the ratio of peak signal power to noise power. An encryption method achieves successful performance when the encrypted image has a low PSNR. PSNR relationships are described below [24] : PSNR = 20 * log 10 (MAX I ) − 10 * log 10 (MSE) (40) where MSE is the mean squared error and MAXI is the maximum possible pixel value of the image [24] . Information entropy is another image analysis procedure in cryptographic applications and is defined as follows [24] : The results of images encryption based on the synchronization method of the proposed chaotic systems are yielded in this section. In the following, first, the images used to perform the experiments are introduced. Then, the results of the proposed approach are expressed by application. In this paper, in order to evaluate the proposed cryptographic method, multiple medical images and benchmarks have been adopted. The images tested in this section contain a variety of standard benchmark images and medical images including CT and X-ray. In Figure 11 , 10 images of standard benchmarks for conducting experiments are displayed. Also, shown in Figure 12 are X-ray images of COVID-19 patients. Finally, 10 CT images of patients with COVID-19 are used for the final tests, as shown in Figure 13 . In this section, the results of the proposed synchronization method of chaotic systems for various images encryption are discussed. All images utilized in this research have a size of 300 × 300 in png format. Figures 14-16 show encrypted images of standard benchmark, X-ray, and CT patients with COVID-19, respectively. Information entropy is another image analysis procedure in cryptographic applications and is defined as follows [24] : The results of images encryption based on the synchronization method of the proposed chaotic systems are yielded in this section. In the following, first, the images used to perform the experiments are introduced. Then, the results of the proposed approach are expressed by application. In this paper, in order to evaluate the proposed cryptographic method, multiple medical images and benchmarks have been adopted. The images tested in this section contain a variety of standard benchmark images and medical images including CT and X-Ray. In Figure 11 , 10 images of standard benchmarks for conducting experiments are displayed. Also, shown in Figure 12 are X-ray images of COVID-19 patients. Finally, 10 CT images of patients with COVID-19 are used for the final tests, as shown in Figure 13 . In this section, the results of the proposed synchronization method of chaotic systems for various images encryption are discussed. All images utilized in this research have a size of 300 × 300 in png format. Figures 14-16 show encrypted images of standard benchmark, X-ray, and CT patients with COVID-19, respectively. The results of the proposed chaotic synchronization method for famous benchmark images encryption are shown in Figure 14 . As it is manifest, the ten selected images have different contrasts, and the results displayed in Figure 14 verify the high effectiveness of the proposed techniques in the encryption of these images. The results of the proposed chaotic synchronization method for famous benchmark images encryption are shown in Figure 14 . As it is manifest, the ten selected images have different contrasts, and the results displayed in Figure 14 verify the high effectiveness of the proposed techniques in the encryption of these images. The results of the proposed chaotic synchronization method for famous benchmark images encryption are shown in Figure 14 . As it is manifest, the ten selected images have different contrasts, and the results displayed in Figure 14 verify the high effectiveness of the proposed techniques in the encryption of these images. Output Images Encryption Input Images Output Images Encryption Input Images Figure 14 . Standard benchmarks images encryption using the proposed method. In Figure 15 , X-ray images of patients with COVID-19 for cryptography are exploited. According to Figure 13 , it can be seen that the synchronization method of the proposed chaotic system also achieves highly successful outcomes in X-Ray images encryption. Figure 16 demonstrates the various CT encrypted images. According to the figure, the CT images are first fed to the input of the proposed chaotic synchronization method. CT images encrypted are then generated. Finally, reconstructed CT images are represented. According to Figure 16 , it can be seen that the cryptographic procedure based on synchronization of the proposed chaotic system achieves successful results. In Figure 15 , X-ray images of patients with COVID-19 for cryptography are exploited. According to Figure 13 , it can be seen that the synchronization method of the proposed chaotic system also achieves highly successful outcomes in X-ray images encryption. Figure 16 demonstrates the various CT encrypted images. According to the figure, the CT images are first fed to the input of the proposed chaotic synchronization method. CT images encrypted are then generated. Finally, reconstructed CT images are represented. According to Figure 16 , it can be seen that the cryptographic procedure based on synchronization of the proposed chaotic system achieves successful results. Output Images Encryption Input Images Output Images Encryption Input Images Figure 15 . X-Ray images encryption using the proposed method. As can be observed in Figure 16 , the recommended method has also been very successful in CT images encryption of people with COVID-19. Additionally, with a conclusion, it is perceived that the cryptographic method based on synchronization of chaotic systems presented in this paper for various medical images and standard benchmarks achieves satisfactory results. In Figure 17 , a number of standard X-ray and CT images are randomly selected and their histogram diagrams are drawn. According to Figure 17 , histograms related to input and decoded images are displayed. As can be observed in Figure 16 , the recommended method has also been very successful in CT images encryption of people with COVID-19. Additionally, with a conclusion, it is perceived that the cryptographic method based on synchronization of chaotic systems presented in this paper for various medical images and standard benchmarks achieves satisfactory results. In Figure 17 , a number of standard X-ray and CT images are randomly selected and their histogram diagrams are drawn. According to Figure 17 , histograms related to input and decoded images are displayed. Output Images Encryption Input Images Output Images Encryption Input Images Figure 16 . CT images encrypted using the proposed method. In Figure 17 , histogram diagrams of the number of the original input images and encrypted images are illustrated. The results show that the histograms of the input and decoded images are very close to each other. This means that the proposed synchronization method of the chaotic system has performed highly successfully in encrypting and recovering various images. For further experiments, Gaussian noises with different variances have been applied to CT images. Then, the types of statistical parameters of Section 5 are calculated for them. CT images have been corrupted by Gaussian noise with 0.001, 0.003, 0.006, and 0.009 variances, and the results of their statistical analysis are shown in Tables 1-5. In Figure 17 , histogram diagrams of the number of the original input images and encrypted images are illustrated. The results show that the histograms of the input and decoded images are very close to each other. This means that the proposed synchronization method of the chaotic system has performed highly successfully in encrypting and recovering various images. For further experiments, Gaussian noises with different variances have been applied to CT images. Then, the types of statistical parameters of Section 5 are calculated for them. CT images have been corrupted by Gaussian noise with 0.001, 0.003, 0.006, and 0.009 variances, and the results of their statistical analysis are shown in Tables 1-5 . Histogram Output Images Output Images Histogram Input Images Input Images Figure 17 . Displayed histograms for various images encrypted using the proposed method. In Table 1 , the results of the proposed methodology have been yielded on CT images without noise. As can be seen, this method has statistically satisfactory results in CT cryptography of patients with COVID-19. In Table 2 , the results of the synchronization method of chaotic systems for CT images with Gaussian noise with 0.001 variance are shown. The results in this table prove In Table 1 , the results of the proposed methodology have been yielded on CT images without noise. As can be seen, this method has statistically satisfactory results in CT cryptography of patients with COVID-19. In Table 2 , the results of the synchronization method of chaotic systems for CT images with Gaussian noise with 0.001 variance are shown. The results in this table prove that the proposed method for encrypting CT images with Gaussian noise with 0.001 variance has been successful. Table 3 indicates the statistical results of the proposed synchronization approach for CT images cryptography of COVID-19 patients with Gaussian noise (variance 0.003). It can be perceived that the proposed technique has been functioned successfully in encrypting these noise-corrupted CT images. The findings of CT images encryption corrupted by Gaussian noise with 0.006 variance are given in Table 4 . It is obvious that the proposed scheme for CT images for Gaussian noise with 0.006 variance compared to the previous modes has been able to report good results. Finally, in Table 5 the results of the proposed method cryptography with CT images for Gaussian noise with 0.009 variance have been illustrated. From the results in this table, it can be seen that the proposed synchronization method is also robust to this type of Gaussian noise in CT images encryption. The proposed method has the ability to deal with uncertainty, disturbance, and changes in system parameters. On the other hand, the resulting control functions are continuous, which prevents the chattering problems. The only problem with our proposed algorithm is the large magnitude of few control functions. In the future, we intend to develop the proposed method for synchronization of chaotic and hyper-chaotic fractionalorder systems. Using an objective function as the total of control norms can reduce the magnitude of control functions. The proposed method has strengths from various perspectives, the most important of which are discussed in the following. Ensuring the synchronization error converges to zero, which is the most mattering objective in the synchronization issue. These errors converge to zero in a short period of time, despite uncertainty and disturbance, as well as changes in the master and slave systems. Providing a continuous control function that prevents the occurrence of the chattering phenomenon. Proving the equivalence of control functions in two synchronization methods is another significant result. Finally, according to the conducted analysis, the resulting procedure has good robustness against noise, which is one of the most important outcomes of this paper. Also, the disadvantages of the proposed method are expressed in this paragraph. In the proposed approach, there are some constraints, which incorporate: large control signal that increases the cost of synchronization. On the other hand, there is no physical factor and a significant delay in the master and slave systems. Ideal communication channel, as well as parameter changes that are considered stepwise, are other limitations of this method. Today, telemedicine is employed in a variety of medical applications. In all telemedicine systems, the issue of information security is vitally significant. To this end, various approaches for the information security of these systems have been presented so far [12] . Cryptography based on chaotic theory is one of the best approaches to protect the information in secure communications. Encryption techniques based on chaos theory in medicine have also attracted the attention of many. In the control field, it has been proven that synchronization techniques of hyper chaotic systems to enhance information security have reported remarkably successful outcomes [54] [55] [56] 66] . In this paper, for the first time, a novel multi-mode synchronization of a chaotic system has been utilized to encrypt medical images of CT and X-ray for COVID-19 patients. This method can be employed as an encryption section in the various telemedicine systems. In this paper, the multi-mode synchronization of two hyper chaotic systems in two forms of multi slave, and one master system synchronization and circular synchronization are examined. Firstly, it is proved that two forms of synchronizations are equivalent and control laws are exactly equal. The adaptive control method and the definition of appropri-ate Lyapunov function are used for synchronization. The convergence of synchronization errors to zero is ensured despite variable parameters with time and disturbance, and uncertainty is bounded with a known function. Adaptive laws to estimate the system-timevarying parameters, disturbance, and uncertainty bounds, are also determined to ensure that the system stability is guaranteed. For preventing the phenomenon of chattering, the law of controls is established as a continuous function. To test the effectiveness of the proposed method, simulations are performed in the presence of structural uncertainty and disturbance. The results show that the proposed controller is able to perform efficiently by yielding zero errors for synchronization, estimations of disturbance, and uncertainty bounds. After implementing the proposed multi-mode synchronization method, subsequently, medical image encryption of COVID-19 patients has been fulfilled. To verify the efficiency of the recommended method, CT images were corrupted by Gaussian noise with different variances and the statistical analysis results revealed the effectiveness of the proposed approach. The advantages of the method involve synchronization in the presence of disturbance and uncertainty, which indicates its robustness. Using the Lyapunov function, which guarantees the convergence of all types of errors, including synchronization error and the estimation error to zero. On the other hand, the variables of the system are another great issue that makes the synchronization problem more complicated, and finally, the images are encrypted with high security, which is very difficult to detect. In Table 6 , the advantages of the proposed method are compared with other researches in this field. According to Table 6 , the proposed method has more advantages than other proposals in the field of medical data encryption using chaotic methods. For future work, the proposed method can be utilized to encrypt EEG signals of epileptic seizures [67, 68] , attention deficit hyperactivity disorder (ADHD) [69, 70] , schizophrenia [71, 72] , and multiple sclerosis [73] . Additionally, the technique presented in this study can be adopted to encrypt MRI [74, 75] , X-ray [76] , mammography [77, 78] , and other medical data [79] [80] [81] [82] [83] [84] . In the continuation of this paper in order to develop and eliminate deficiencies such as applying optimal control to synchronize with less control effort and considering the important factor of delay in master and slave systems as well as method extension for fractional-order systems in which case the complexity of the control method increases and the security of the method is enhanced. For another future works, due to the fact that medical data has uncertainty, neuro fuzzy, fuzzy type1 or fuzzy type 2 systems can be used [85] [86] [87] [88] [89] [90] . Beyond patient monitoring: Conversational agents role in telemedicine & healthcare support for home-living elderly individuals A smart telemedicine system with deep learning to manage diabetic retinopathy and foot ulcers New development: 'Healing at a distance'-Telemedicine and COVID-19. Public Money Manag Telemedicine in the era of COVID-19 A home telemedicine system for continuous respiratory monitoring Telemedicine security: A systematic review Bilateral teleoperation system using QoS and secure communication networks for telemedicine applications Practical and secure telemedicine systems for user mobility Suggested integral analysis for chaos-based image cryptosystems Some basic cryptographic requirements for chaos-based cryptosystems A new fractional sliding mode controller based on nonlinear fractional-order proportional integral derivative controller structure to synchronize fractional-order chaotic systems with uncertainty and disturbances Design of Adaptive-Robust Controller for Multi-State Synchronization of Chaotic Systems with Unknown and Time-Varying Delays and Its Application in Secure Communication Robust Adaptive Synchronization of a Class of Uncertain Chaotic Systems with Unknown Time-Delay Synchronization in chaotic systems Finite-time synchronization of nonlinear fractional chaotic systems with stochastic actuator faults Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application Chaos based encryption system for encrypting electroencephalogram signals A double chaotic layer encryption algorithm for clinical signals in telemedicine Secure EEG signal transmission for remote health monitoring using optical chaos Computer cryptography through performing chaotic modulation on intrinsic mode functions with non-dyadic number of encrypted signals Framework for Efficient Medical Image Encryption Using Dynamic S-Boxes and Chaotic Maps Improved Chaos-Based Cryptosystem for Medical Image Encryption and Decryption Medical image encryption using fractional discrete cosine transform with chaotic function A novel fourth order chaotic system and its algorithm for medical image encryption Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA) Multilevel medical image encryption for secure communication Medical image encryption algorithm based on Latin square and memristive chaotic system Color medical image encryption using 3D Chaotic Cat Map and NCA An efficient di-chaotic diffusion based medical image cryptosystem Generalized double-humped logistic map-based medical image encryption A secure chaotic map-based remote authentication scheme for telecare medicine information systems A novel fused coupled chaotic map based confidential data embedding-then-encryption of electrocardiogram signal An exotic multi-dimensional conceptualization for medical image encryption exerting Rossler system and Sine map Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications Comparative study on electrocardiogram encryption using elliptic curves cryptography and data encryption standard for applications in Internet of medical things A RGB image encryption algorithm based on total plain image characteristics and chaos An asymmetric image encryption algorithm based on a fractional-order chaotic system and the RSA public-key cryptosystem A Novel Image Encryption Scheme Based on 2D Fractional Chaotic Map, DWT and 4D Hyper-chaos A novel encryption frame for medical image with watermark based on hyperchaotic system An image encryption scheme based on time-delay and hyperchaotic system Handling of uncertainty in medical data using machine learning and probability theory techniques: A review of 30 years Image encryption and hiding algorithm based on compressive sensing and random numbers insertion Fast color image encryption scheme based on 3D orthogonal Latin squares and matching matrix Automatic Myocarditis Diagnosis using Convolutional Neural Network Combined with K-means Clustering. Preprints A survey of signal processing algorithms in brain-computer interfaces based on electrical brain signals Review of medical image quality assessment Synchronization of Multiplex Networks with Stochastic Perturbations via Pinning Adaptive Control Fixed-Time Synchronization for Different Dimensional Complex Network Systems with Unknown Parameters via Adaptive Control A Disturbance-Observer-Based Sliding Mode Control for the Robust Synchronization of Uncertain Delayed Chaotic Systems: Application to Data Security Synchronization of second-order chaotic systems with uncertainties and disturbances using fixed-time adaptive sliding mode control Non-singleton fuzzy control for multi-synchronization of chaotic systems Optimal type-2 fuzzy synchronization of two different fractional-order chaotic systems with variable orders with an application to secure communication Nonlinear optimal control and synchronization for chaotic electronic circuits Synchronization of different-order chaotic systems: Adaptive active vs. optimal control TS fuzzy modeling and predictive control and synchronization of chaotic satellite systems A new approach in anti-synchronization of a fractional-order hyper-chaotic Duffing system based on new nonlinear predictive control Whale optimization based synchronization and control of two identical fractional order financial chaotic systems Spectral Entropy Analysis and Synchronization of a Multi-Stable Fractional-Order Chaotic System using a Novel Neural Network-Based Chattering-Free Sliding Mode Technique Chaos-Based Synchronized Dynamic Keys and Their Application to Image Encryption with an Improved AES Algorithm Chaos synchronization in generalized Lorenz systems and an application to image encryption Discrete sliding mode control for chaos synchronization and its application to an improved El-Gamal cryptosystem Bluetooth based chaos synchronization using particle swarm optimization and its applications to image encryption Sliding mode synchronization of multiple chaotic systems with uncertainties and disturbances Secure communication based on hyperchaotic Chen system with time-delay Synchronization of fuzzy modeling chaotic time delay memristor-based Chua's circuits with application to secure communication Secure communication based on chaotic synchronization via interval time-varying delay feedback control. Nonlinear Dyn A comprehensive comparison of handcrafted features and convolutional autoencoders for epileptic seizures detection in EEG signals Epileptic seizures detection in EEG signals using TQWT and ensemble learning Computer aided diagnosis system using deep convolutional neural networks for ADHD subtypes A deep learning framework for identifying children with ADHD using an EEG-based brain network An Overview on Artificial Intelligence Techniques for Diagnosis of Schizophrenia Based on Magnetic Resonance Imaging Modalities: Methods, Challenges, and Future Works. arXiv 2021 Artificial intelligence within the interplay between natural and artificial computation: Advances in data science, trends and applications Applications of Deep Learning Techniques for Automated Multiple Sclerosis Detection Using Magnetic Resonance Imaging: A Review. arXiv 2021 Deep neural network with generative adversarial networks pre-training for brain tumor classification based on MR images Hyperspectral imaging for glioblastoma surgery: Improving tumor identification using a deep spectral-spatial approach COVID-19 Detection from Chest X-ray Images Using Feature Fusion and Deep Learning A hierarchical classification method for breast tumor detection. Iran Breast cancer detection using infrared thermal imaging and a deep learning model Automated detection and forecasting of covid-19 using deep learning techniques: A review Uncertainty-aware semi-supervised method using large unlabelled and limited labeled COVID-19 data Time Series Forecasting of New Cases and New Deaths Rate for COVID-19 using Deep Learning Methods. arXiv 2021 Automatic Diagnosis of COVID-19 from CT Images using CycleGAN and Transfer Learning. arXiv 2021 Convolution Neural Network combined with Autoencoder approach to detect survival chance of COVID 19 patients. arXiv 2021 Coronary Artery Disease Detection Using Artificial Intelligence Techniques: A Survey of Trends, Geographical Differences and Diagnostic Features Using a fuzzy controller optimized by a genetic algorithm to regulate blood glucose level in type 1 diabetes Stability analysis of dynamic nonlinear interval type-2 TSK fuzzy control systems based on describing function Performance of optimal hierarchical type 2 fuzzy controller for load-frequency system with production rate limitation and governor dead band A piecewise type-2 fuzzy regression model Automatic road extraction based on neuro-fuzzy algorithm Nephropathy forecasting in diabetic patients using a GA-based type-2 fuzzy regression model The authors declare no conflict of interest.Sensors 2021, 21, 3925