FPGARealization of Spherical Chaotic Systemwith Application in Image Transmission

+is paper considers a three-dimensional nonlinear dynamical system capable of generating spherical attractors.+emain activity is the realization of a spherical chaotic attractor on Intel and Xilinx FPGA boards, with a focus on implementation of a secure communication system.+e first major contribution is the successful synchronization of two chaotic spherical systems, in VHDL program, in a master-slave topology using Hamiltonian forms. +e synchronization errors show that the two spherical chaotic systems synchronize in a very short time after which the error signals become zero. +e second major contribution is the FPGA realization of a spherical chaotic attractor-based secure communication system, which involves encrypting both grayscale and RGB images with chaos and diffusion key at the transmitting system, sending the encrypted image via the state variables, and reconstructing the encrypted image at the receiving system. +e Intel Stratix III and Xilinx Artix-7 AC701 results are the same as those of MATLAB. +e statistical analyses of the encrypted and received images show that the implemented system is very effective, as it reveals high degree of randomness in the encrypted images with the entropy test, and the obtained correlation coefficient, which is zero, removes relativity between the original and encrypted images. Finally, the transmission system fully recovers the original grayscale and RGB images without loss of information.


Introduction
In the past few decades, dynamical systems based on chaos theory have begun to be implemented in various fields, such as computer science, economics, robotics, physics, medicine, biomedical, and so on, due to their potential applications.
is has prompted researchers into the study of nonlinear dynamical systems [1][2][3]. Typically, a nonlinear system is regarded as a system in which the laws governing the time evolution of its state variables depend on the values of these variables in a manner that deviates from proportionality [4]. Some of the earliest researchers of nonlinear systems are Henri Poincaré, who studied nonlinear dynamics as n-body problem in celestial mechanics, Aleksandr Mikhailovich Lyapunov, who studied the stability of nonlinear dynamical systems, and Balthasar van der Pol, who studied limit cycles in relation with oscillator dynamics. Others are Georg Duffing, who modelled a dynamic chaotic system using second-order nonlinear differential equations, Hendrik Wade Bode, who studied the asymptotic representation of the frequency response, and Edward Norton Lorenz, who gave us the chaos theory and the famous butterfly effect [5].
Nonlinear systems can exhibit limit cycle, fractal, and irregular chaotic behaviors. Others are bifurcation, multistability, and nonlinear divergent behaviors [6,7]. A limit cycle is when the nonlinear system has a nontrivial periodic output; fractal is when there is a self-similar geometric pattern exhibited on the phase plane, and this self-similar geometric pattern is repeated at ever smaller scales to produce irregular shapes and surfaces that cannot be represented by classical geometry; and irregular chaotic behavior is when the nonlinear system is sensitive to its initial condition; a state orbit is dense and consists of dense periodic orbits, but fractal patterns do not exhibit on the phase plane. e qualitative change in the dynamics of the nonlinear system as parameters vary is called bifurcation; the presence of two or more stable states is called multistability, while the nonlinear divergent behavior occurs when some state variables tend to infinity, but the corresponding linear part is strictly stable.
Most real physical systems and phenomena are inherently nonlinear in nature. For example, gravitational and electrostatic attraction, elasticity, bio-mechanics, fluid and plasma mechanics, gas dynamics, chemical reactions, robot, aircraft and spacecraft control, combustion, and biological systems are all governed by nonlinear models. Hence, the nonlinear system is an important subject of interest to engineers, physicists, mathematicians, and scientists. Some engineering and scientific applications of the nonlinear systems can be found in [8][9][10][11][12][13][14][15][16][17].
e mathematical models of the nonlinear systems are represented by nonlinear differential equations. One of the challenges facing the nonlinear systems is the generation of the solutions and their characterization. e evaluation of the behavior of nonlinear systems is important, and it shows the actual nature of the systems. But due to the nonlinearity and complexity of the nonlinear systems, it is very difficult to derive the analytical or closed-loop solutions for the systems. erefore, in solving or simulating the nonlinear systems, researchers rely on approximate or numerical methods, which provide approximate results for the systems [4,18]. e irregular chaotic behavior of the nonlinear systems is one property that has been widely exploited, giving rise to modelling of several nonlinear dynamical systems. As the system dimension for chaos ranges from 1, 2 to multidimensions, several simple and complex chaotic systems have been constructed and more are being developed. For example, Lorenz proposed a 3-D system [19] in 1963, which is recognized as the first chaotic model. e Chen oscillator [20] was proposed as a special case of a generalized Lorenz canonical form. e Rössler systems [21] were proposed as prototype equations with the minimum ingredients for continuous-time chaos. e Rössler systems are well-known for their simplicity because they have single quadratic term. In addition, Rössler also proposed four-dimensional systems [22]. It is hereby noted that new chaotic systems can now be constructed by systematic examination of generic 3-D quadratic autonomous ordinary differential equations through exhaustive computer search [23], analytic method involving chaotification of a nonchaotic system via feedback anti-control developed by Chen [24], Shilnikov analytic criterion [25], or any other proven techniques. Constructed chaotic systems are usually analyzed for chaotic dynamics by phase diagrams, Lyapunov exponents, bifurcation diagrams, fractal dimension, time series, information entropy, and so on [26,27].
Due to the potential in chaos, a notable area that has attracted so many interests from researchers is chaos-based communication systems, which is based on synchronization of chaotic oscillators as a backbone of the communication platform [28][29][30][31]. e synchronization of chaos occurs when a chaotic system (master system) drives another identical or nonidentical chaotic system (slave system), such that the output of the slave system follows the output of the master system, asymptotically. e synchronization between the chaotic master system and the chaotic slave system can be achieved with different methods, such as Pecora and Carroll, Ott-Grebogi-Yorke (OGY), Hamiltonian forms and observer approach, open-plus-close-loop, and so on. Once synchronization is achieved, transmission of information is possible as seen for the first time in [32].
eoretical and numerical implementations of new chaotic oscillators continue to be a subject of interest, and the significance of finding new chaotic oscillators cannot be overemphasized. First, it is important to find new chaotic systems that have high positive Lyapunov exponent, which is beneficial to developing secure physical systems such as communication systems. Second, it is also important to have new chaotic oscillators that possess multistable states, which allow easy control of chaos in various application fields such as laser physics and optics, electrical engineering, and telecommunications. ird, it is beneficial to have several options to choose from while developing real physical systems with chaotic oscillators. Furthermore, researchers have also moved on, over the years, to experimental verifications of chaotic oscillators via electronic implementations for the purpose of creating real-world chaos-based applications. e options for circuit implementation vary with different kinds of potential electronic building blocks. For instance, analog implementation with operational amplifiers (OPAMPs) was a popular choice in most of the earlier circuit implementations, as seen in [33,34] for multiscroll chaotic oscillators and in [35,36] for hyperchaotic oscillators. However, the OPAMP-based implementation has some drawbacks. For example, it is difficult to realize nonlinear resistors and capacitors appropriate for hardware implementation of chaotic attractors [34]. Also, OPAMPs have low slew rate [37]. ese and other obstacles prompted the need for better electronic implementation. e field-programmable gate arrays (FPGAs) have become the most attractive and popular choice for electronic realization of chaotic systems, owing to some advantages inherent in them. For example, FGPAs offer better performance as they can perform parallel processing at a faster rate. FPGAs are reprogrammable, even after the circuit has been designed and implemented.
is important characteristic not only makes FPGAs reusable but also makes them adaptable, extremely cost effective, and perfect choice for prototyping purposes. Furthermore, the design process of the FPGAs, performed by hardware description languages (HDLs), is extremely fast and efficient [38].
ere are many investigations that have been carried out on FPGA realization of chaotic systems and its applications. For example, in [39], a high-speed FPGA-based Lü-Chen chaotic oscillator was designed in VHDL using Heun numerical method and realized on Xilinx Virtex-6 chip. e results of the FPGA-based implementation were found to corroborate the computer-based results from MATLAB. e authors in [40] designed a 3-D chaotic system, applying the Euler method for its discrete-time generation, and implemented a secure color image encryption system based on the chaotic signals. ese were realized on an Altera FPGA DE2-115 board. A novel artificial neural network-based chaotic true random number generator (TRNG) was realized in a Xilinx Virtex-6 in [41]. e numerical solution of the underlying Pehlivan-Uyaroglu chaotic system was obtained using the fifth-order Runge-Kutta algorithm. Furthermore, the investigation in [42] includes the implementation of a new one-parameter chaotic system on Altera Cyclone IV FPGA board. e applied numerical method for solving the dynamical system in VHDL was the forward Euler method. e work was extended to create a secure communication system with the chaotic system and realize it on the FPGA board. A coupled map lattice (CML), which can exhibit extremely complex spatiotemporal chaos, was applied to create a multimedia cryptosystem in [43]. To improve the encryption speed, the cryptosystem was realized in a Xilinx Spartan-3 device. Other related work on FPGA realization of nonlinear dynamical systems and their application in secure communication systems can be found in [44][45][46][47][48][49][50].
In this work, the authors investigate a 3-D nonlinear system proposed in [51], which generates spherical chaotic attractor. e goals of this investigation are to emulate for the first time, to the best of the authors' knowledge [52], on FPGA, the spherical chaotic system and also implement a chaos-based information transmission system. By doing these, the following contributions to the state of the art are hereby emphasized: (1) FPGA realization of the 3-D spherical chaotic system in a design process performed on Intel's Stratix III and Xilinx Artix-7 AC701, using VHDL with a word length of 32-bit. e VHDL implementations on the FPGA boards completely agree with the simulation done in MATLAB. (2) Successful synchronization and FPGA realization of two spherical chaotic systems in a master-slave configuration, using VHDL with a word length of 32bit for the hardware design on Intel's Stratix III and Xilinx Artix-7 AC701. e slave system serves as the observer of states whose state variables approximate the master system. Both the VHDL and MATLAB synchronization results are in complete agreement. (3) e FPGA realization of a spherical chaotic attractorbased secure communication system to successfully encrypt and transmit grayscale and RGB images, using VHDL with a word length of 32-bit for the hardware design on Intel's Stratix III and Xilinx Artix-7 AC701. e encrypted images have no relativity with the original images, and the original images were fully recovered without loss of information. e VHDL implementations on the FPGA boards are in consonance with the MATLAB simulation. e paper is organized as follows. Section 2 contains the theoretical framework, showcasing the 3-D nonlinear chaotic system that generates spherical attractors. Section 3 shows the Hamiltonian form method for synchronizing the spherical systems in a master-slave topology. In Section 4, the results of the FPGA realization of the spherical chaotic attractor, master-slave synchronization, and image encryption and transmission are presented. e discussion of the results obtained is found in Section 5. Lastly, Section 6 contains the conclusions.

Spherical Chaotic System
e authors in [51] proposed a smooth quadratic autonomous chaotic system from an earlier system constructed in [53] based on the Shilnikov criterion [54,55], which is an analytic method for proving chaos in nonlinear dynamical systems [25]. e Shilnikov criterion was proposed in 1965 by a Russian Mathematician, Leonid Pavlovich Shilnikov. L.P. Shilnikov was an originator of the theory of global bifurcations of multidimensional dynamical systems and also one of the founders of the mathematical theory of dynamical chaos and strange attractors. e two theorems in the Shilnikov criterion provide a theoretical foundation for classification of chaos. One theorem is based on the presence of heteroclinic orbit while the other is based on the existence of homoclinic orbit. Let us consider a third-order autonomous system given in the following equation: where the vector field f(x): R 3 ⟶ R 3 is r-times differentiable (k ≥ 1) with a continuous derivative C k . Let x e ∈ R 3 be an equilibrium point of equation (1); then, x e is called a saddle focus if the eigenvalues of the Jacobian J of f(x) evaluated at x e are of the form where α, β, and c are real. (1), let x e be a saddle focus equilibrium point whose eigenvalues satisfy α > |β| > 0, and there exists a homoclinic orbit connected at x e . en, the 3-D autonomous system has horseshoe chaos [54,55].

Theorem 1 (Shilnikov homoclinic theorem). For a 3-D autonomous system in equation
Theorem 2 (Shilnikov heteroclinic theorem). Suppose that two distinct equilibrium points x 1 e and x 2 e of a 3-D autonomous system in equation (1) are saddle foci, whose eigenvalues at these points are α n and β n ± i c n (n � 1, 2), which satisfy the Shilnikov inequality α n > β n > 0, n � 1, 2, under the constraint β 1 β 2 > 0 or α 1 α 2 > 0. Suppose also that there exists a heteroclinic orbit connecting points x 1 e and x 2 e . en, the 3-D autonomous system has horseshoe chaos [54,55]. e spherical chaotic system, proposed in [51] and used in this work, is perturbed by a hyperbolic tangent function as given in the following equation: and e are all real parameters, while x, y, and z are the state variables.
In this work, unless otherwise stated, the values of the system parameters are , and e � 0, while the initial condition, randomly chosen in the basin of attraction of the system, is With the parameter values and the initial condition, the chaotic system in equation (3)

Hamiltonian Forms
e Hamiltonian forms are applied to achieve the synchronization of two spherical attractors of the chaotic oscillator given in equation (3) in a master-slave topology [56].
is synchronization method is chosen because it allows systematic synchronization and simplifies the problem of deciding the nature of the output signal to transmit. Also, it does not require the use of the Lyapunov exponents. Moreover, it does not require that the initial conditions belong to the same basin of attraction. ese are some of the advantages that give Hamiltonian forms an edge over other synchronization methods. erefore, the method can be easily applied to synchronize several chaotic oscillators. e slave system serves as the observer of states whose state variables will approximate the master system.
Mathematically, the master and slave of a dynamical system are expressed in Hamiltonian form as follows: where _ x ∈ R n is the state variable and f: R n ⟶ R n is the nonlinear function. e dynamical system in equation (4) can be written also as Let J(x) � (A − A T /2) and S(x) � (A + A T /2); then, equation (6) can be written in the generalized Hamiltonian canonical form as where H(x) � (1/2)x T Mx denotes a positive smooth energy function definite in R n , M is a constant, symmetric positive definite matrix, and hence, zH/zx � Mx. zH/zx is the column gradient vector of for all x ϵ R n . e vector field J(x)(zH/zx) exhibits the conservative part and S(x) represents the nonconservative part of the system. e master system in the case of the observer design approach, which is a special class of the generalized Hamiltonian forms with destabilizing vector field and output y(t), is given by the following equation: where S is a constant symmetric matrix and C is a constant matrix.
On the other hand, the slave system, which is the dynamical nonlinear state observer, is defined as follows. e estimate of the state vector x is denoted by _ ξ, and the estimated output is denoted by η. erefore, the slave system is where K is the gain of the observer and e y � y − η is the output estimation error. e state estimation error is defined by e � x − ξ. Based on the foregoing mathematical analysis, the master and slave systems of spherical chaotic system (3) are constructed as follows:

Mathematical Problems in Engineering
From equation (8), where H(x) � (1/2)[x 2 + y 2 + z 2 ] and the gradient vector is erefore, the master system is Also, according to equation (9), the slave system is represented by Mathematical Problems in Engineering which, by simplification, becomes e synchronization is considered successful according to the following definition and theorems, created in [57] from the perspective of passivity-based state observer design in the context of generalized Hamiltonian systems including dissipative and destabilizing vector fields.

Definition 1.
e basic condition for the slave to synchronize with the master in Hamiltonian form is when regardless of what the initial conditions x(0) and ξ(0) are [57].

Theorem 3.
e state x of the nonlinear system in equation (8) can be globally, exponentially, and asymptotically estimated by the state ξ of the nonlinear observer in equation (9) if the pair of matrices (C, S) is observable [57].

Theorem 4.
e state x of the nonlinear system in equation (8) can be globally, exponentially, and asymptotically estimated by the state ξ of the nonlinear observer in equation (9) if and only if there exists a constant matrix K such that the symmetric matrix is negative definite [57].

Results
is section contains the results obtained in this investigation in the master-slave synchronization and image encryption and transmission, including the FPGA device resources consumed.
In this investigation, all the activities were first modelled in VHDL using the Quartus II/ModelSim design software version 13.1 and then emulated on FPGA device. A 32-bit word was used in the VHDL programming in order to maintain fidelity to the original implementation of this work in MATLAB version 2016b. at is, 1 bit for the sign, 6 for the integer, and 25 for the fractional part. Moreover, to avoid reducing the diameter of the oscillator, the implementation of the hyperbolic tangent function in the system in equation (3)

Master-Slave Synchronization.
e master-slave synchronization is illustrated in Figure 2, which shows the coupling between the master system in equation (12) and slave system in equation (13). e multiplexer MUX handles the setting of the initial conditions for both the master and slave systems and allows performing the needed iterations of the equations representing the master and slave systems using the fourth-order Runge-Kutta method. e pin Sel controls the number of iterations to perform, while the registers store the outputs of the master and slave systems, and the subtractors compute the synchronization errors e 1 , e 2 , and e 3 . Following eorem 4, the gains of the observer used in the synchronization were k 1 � 2, k 2 � 7, and k 3 � 5. e synchronization is simulated in MATLAB and compared with the VHDL-generated results in ModelSim. Both simulations have the same initial conditions x 0 � (−0.04, −15.8, −1.4) for the master system and y 0 � (−0.12, −12.41, −2.1) for the slave system and a total of 35 × 10 4 samples each. e initial conditions were randomly chosen in the basin of attraction of the chaotic system, out of the many possible values. e master and slave chaotic systems are sensitive to the chosen initial conditions. is was confirmed by computing the Lyapunov exponents, which in each case has one positive value.
In Figure 3 are found the waveforms of the master system (blue) and slave system (magenta) in both MATLAB and ModelSim. e VHDL-generated synchronization errors are presented in Figure 4(b) while the MATLAB implementation is shown in Figure 4(a).
e results of the Hamiltonian forms synchronization in Figures 3 and 4 show that the master system, slave system, and the synchronization errors obtained from MATLAB are the same as the output from VHDL/ModelSim. Specifically, as it is seen in Figure 4, the master and slave signals were synchronized in a very short time after which the error signals e 1 , e 2 , and e 3 became zero. In other words, the master and slave systems became synchronized as soon as the simulation started, around 1,100th iteration, just 0.3% of the total iterations. erefore, it could be concluded that the ratio of the master and the slave states x i and ξ 1 is 1 after a very short time.

Image Encryption and Transmission.
Once the master and slave systems are synchronized, the implementation of a secure communication system for image transmission is achievable. In the present investigation, the images transmitted were grayscale of size 640 × 480 pixels and RGB of size 320 × 240 pixels. e MATLAB-Simulink block diagram of the secure communication system is described in Figure 5. e methodology involved in the image encryption and transmission begins in the master system, which is the transmitter, whereby the original image undergoes a robust encryption with the chaotic master signal X m and diffusion key using the X-OR operator. e transmitter generates a secure, encrypted image IM t and transmits same to the slave system, which is the receiver, to begin the image reconstruction process. e decryption methodology at the receiver is the inverse of the encryption procedure. Because the slave system approximates the master system, the original image is fully reconstructed and recovered in IM r .
For the best results according to the correlation between the original and encrypted images (see Table 1), the obtained waveforms in MATLAB and ModelSim from the original (red), encrypted (blue), and recovered (magenta) images are shown in Figure 6 for grayscale via transmission variable y and Figure 7 for RGB via transmission variable x. In Figures 8 and 9 are found the actual original, encrypted, and recovered grayscale and RGB images obtained from the best results, respectively. e results of the chaotic image transmission system were examined with statistical analysis. e applied statistical tests are information entropy and correlation. e results are presented in Table 1.
As it is expected, a reliable encryption system should be robust enough to generate encrypted image with very high entropy and have correlation between original and encrypted image of zero. erefore, in the statistical analysis results presented in Table 1, it is seen that the entropy is very high (very close to 8) in both grayscale image transmission and RGB image transmission. e higher the information entropy is, the more random the encrypted image is. is shows that the chaos-based encryption system is very effective. Also, the correlation between the original image and encrypted image in both cases is 0.
is shows that the encryption performed effectively removes relativity between the original and encrypted images. Moreover, the correlation between the original image and recovered image is 1, meaning there is no loss of information. In the case of Stratix III, the logic device design software used for the emulation of the activities on Intel's Stratix III board is the Quartus II 13.1 (64-bit) version, while the selected FPGA device in the Stratix III family is EP3SL340H1152C2. e device resources consumed by the FPGA emulation of the 3-D spherical attractor are given in Table 2, while for grayscale and RGB image transmissions, they are presented in Table 3.
On the other hand, for the Artix-7 AC701 board, Xilinx's Vivado version 2019.2 64-bit is used for the HDL design. Vivado device support is limited to 7th generation Xilinx FPGAs onwards, including Artix-7. e specific AC701 device used is XC7A200TFBG676-2. e resources consumed by the implementations of the 3-D spherical attractor as well as the grayscale and RGB image transmissions are presented in Tables 2 and 3, respectively. Furthermore, in the FPGA emulation on Intel's Stratix III of the 3-D spherical oscillator and the grayscale and RGB image transmissions, the amount of dedicated logic registers utilized is less than one percent of the total available (see Tables 2 and  3). Also, the implementations do not use any memory LUTs and block RAMs. Also, it could be seen in Table 3 that the grayscale image transmission utilizes more logic resources than in RGB, as evidenced in the number of utilized LUTs. e overall logic utilization, which is an estimation of how full the device is, for grayscale image transmission is 85% while for the RGB, it is 79%. Bearing in mind that both transmissions used the same design, the difference in logic utilization is attributed to the size of the images, which in the case of grayscale is made up of 640 × 480 � 307,200 words, compared to the RGB of 320 × 240 * 3 � 230,400 words.
Likewise, in the Xilinx's Artix-7 AC701 board, the logic registers used in the three implementations are less than one percent of the total available, no memory LUTs are used, and none of the 365 block RAMs (36 kb each) are utilized (see Tables 2 and 3). e utilization of the LUTs in Artix-7 AC701 for the image transmissions confirms also the result obtained in Stratix III (see Table 3) that the grayscale image transmission consumes more logic resources than in the transmission of RGB image because of the larger size of the grayscale image.

Discussion
In comparing utilization of resources in the Xilinx Artix-7 AC701 with Intel's Stratix III, it is noted that the number of I/ O pins utilized for the implementations are the same: 97 for spherical attractor (see Table 2) and 99 each for the grayscale and RGB image transmissions (see Table 3). However, the Stratix III device consumes lesser LUTs and registers than Artix-7 AC701. e key to this better performance in Stratix III is its fracturable adaptive logic module (ALM), consisting of 8-input combinational logic, two registers, and two adders, which is more flexible and area-efficient than the logic unit of Artix-7 AC701, which consists of a basic 6-input LUT, carry chain, and two registers. On the other hand, the Artix-7 AC701 device has better performance in terms of the digital signal processing (DSP) block utilization. is is because Artix-7 AC701 DSP offers more efficient resource utilization and better speed and circuitry than the Stratix III device. e Artix-7 AC701 device supports clock rates of up to 628 MHz, up to 930 giga multiply-accumulate operations per second (GMACs), and up to 48-bit word lengths of data, compared to Stratix III's 550 MHz, 537 GMACs, and 36-bit word lengths, respectively. Overall, the results demonstrate that the 3-D spherical oscillator can be easily and efficiently implemented on FPGA technologies by providing real-time chaotic signals and attractors. e FPGA implementation of the spherical chaotic oscillator on Stratix III (FPGA 1) and Artix-7 AC701 (FPGA 2) in this work is compared with some of the investigations that have been done relating to FPGA realization of chaotic oscillators [39,[58][59][60], using some of the resource parameters and other parameters, such as the FPGA board, applied numerical algorithm, implementation language, and the fixed-point number format. is is presented in Table 4. e referenced works use the same 32-bit word length as in our implementations. It is noted that the model of the 3-D spherical chaotic oscillator used in this investigation is relatively more complex, with its hyperbolic tangent function and several nonlinear terms, than the referenced works. However, references [39,58,60], which implement less complex Lü-Chen, hyperchaotic Lorenz, and rotated Lorenz chaotic models, utilize more registers (2%, 5%, and 49%, respectively) and more I/O pins (41%, 32%, and 36%, respectively) than both realizations in this work. Also, references [57,59] consumed more LUTs (24% and 101%, respectively) than our realizations on both Stratix III and Artix-7 AC701, while the utilization of the DSPs in reference [57] is higher than that of our implementation on Artix-7   e chaos-based secure communication system implemented in this work has some basic advantages over conventional techniques, such as spread spectrum, least significant bit (LSB), and echo methods. For example, one of the advantages is its simplicity in that the system is implemented by using only one subsystem at each end of the communication link, which are the master and slave subsystems. Despite this simplicity, the chaos-based secure communication system provides all the basic processes required for digital message transmission. On the other hand, the conventional systems require enormous use of various subsystems. Also, the technique involved in the chaos-based communication system does not require different tools for synchronization and the image encryption, as the chaotic states of the oscillator are used for both the synchronization and the encryption. Moreover, the chaotic signals have impulsive-like autocorrelations and low crosscorrelation values. Another edge that the chaos-based secure communication system has is that it is more robust against noises and distortions [61].
Furthermore, the chaos-based image encryption and decryption scheme in this work is faster because it requires only one round to perform each of the operations, unlike the well-known encryption algorithms such as the AES, DES, and IDEA, which have low-level efficiency in encryption and decryption process [62]. e AES, for example, requires 10 rounds of encryption. Also, the chaos-based encryption algorithm has a large key space because of the sensitivity of the chaotic system to the initial values and the parameters, which makes the algorithm more robust against security attacks. In addition, the chaotic states are pseudorandom, and hence the encryption algorithm provides a more randomized image by removing relativity with the original image.

Conclusions
is work was done to further demonstrate the suitability of FPGA for the electronic implementation of a chaotic oscillator. In a first major contribution, it was shown the FPGA realization of a 3-D system generating spherical chaotic attractors. Furthermore, two spherical chaotic systems were synchronized in a master-slave topology and emulated on a FPGA device. e synchronization was successfully achieved by Hamiltonian forms and observer approach. e master and the slave systems synchronized very fast during which the synchronization error becomes zero. Lastly, it was demonstrated also by FPGA emulation the transmission of grayscale and RGB images using the synchronized master and slave systems. e design process of the FPGA was performed using VHDL on Intel's Stratix III and Xilinx's Artix-7 AC701 boards. e VHDL-based results obtained via ModelSim are the same as the MATLAB results. e statistical analyses of the image transmission results show that there is no relativity between the original and encrypted grayscale and RGB images, as the correlation coefficient is 0 in all the transmission variables. Moreover, the correlation between the adjacent pixels examined in horizontal, vertical, and diagonal directions in the encrypted grayscale and RGB images is 0. e original images were completely recovered without loss of information, since the correlation coefficient between the original and recovered grayscale and RGB images is 1. Hence, the implemented transmission system is a secure communication system.

Data Availability
e data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest
e authors declare that there are no conflicts of interest regarding the publication of this paper.