1 Introduction

In the digital world, digital or multimedia data security becomes more critical since they are easily transmitted over the network via insecure channels to help recent communication and social networking technologies. A well-secured encryption scheme is essential for multimedia data communication to protect and stop the misuse of multimedia data. In information communication, the digital image is an essential carrier of information. The encryption algorithms using chaotic systems are more effective and secure than traditional encryption algorithms due to some important features of chaotic systems like sensitivity to initial conditions, simple analytic description, ergodicity, and high complex behavior, which are more favorable to data security. Image encryption algorithms based on chaotic systems have been investigated [16, 17, 25, 26, 34, 40,41,42,43] with an experimental analysis and their outcomes have been reported. The key space size plays a more vital role in all encryption algorithms since the security level depends on key space size. If the size of the key space is very large, then the hackers should not be able to hack the keys easily. The existing image encryption algorithms [16, 17, 25, 26, 34, 40,41,42,43] have key space size is nearly equal to 2600. So, it is essential to propose an encryption algorithm with a large key space size.

A strategy for underwater image enhancement has been proposed in [10] by using the methodology of Contrast-Limited Adaptive Histogram Equalization (CLAHE) and Percentile to improve the quality of the image outcome. The object recognition results and their applications using several deep learning methods have been described in [4]. Further, analysis results of various techniques for object recognition have been reported. The major survey of deep learning and its significant application domains in the various field has been presented in [9]. A new scheme for printer attribution [22] has been constructed with the support of utilizing Speeded Up Robust Features and Oriented Fast Rotated and BRIEF feature descriptors. At very first, source camera and source mobile detection evaluation were attempted in [13]. The passive approach has been established to fix the document source printer in [12] and adaptive boosting-bootstrap aggregating methodologies have been proposed to improve the level of classification accuracy.

Fractional calculus [6, 35] can be employed as an important mathematical instrument for modeling of practical systems. The dynamical behaviors of many practical systems have been described by fractional differential equations, such as viscoelastic system [2], kinetic equations [36] and dynamo theory [32]. In recent decades, the study of chaos, control, and synchronization [19, 21] in fractional-order systems has been gaining interest due to their applications in cryptography. In particular, fractional-order dynamical systems have been applied to develop an algorithm for encryption-decryption of multimedia data; for instance, fractional-order hyper-chaotic systems have been utilized for color image encryption algorithm [15, 17, 20, 34], synchronized fractional-order King Cobra chaotic systems have been applied for image encryption technique [31], fuzzy fractional integral sliding mode control based image encryption algorithm has been presented in [3], robust synchronization of mismatched fractional-order dynamical systems have been applied to an audio encryption algorithm in [33], and a video encryption algorithm based on a fractional-order hyperchaotic system has been proposed in [14].

Apart from real variable fractional-order systems, the complex variable fractional-order systems received very much attention because of their existence in rotating fluids, electronic circuits, detuned lasers and many more. In this direction, chaos has been identified in fractional-order complex Lorenz system [29] and fractional-order complex Chen system [28]. The cluster synchronization between complex dynamical networks has been investigated in [7]. In [18], the author achieved the hybrid projective synchronization between two different fractional-order complex systems in the presence of external disturbances and uncertainties. In [39], dual-function projective synchronization has been achieved between fractional-order complex T system and complex Lu system. The modified projective synchronization between fractional-order complex systems has been enquired in [24, 30] and dual-phase, dual anti-phase synchronization in fractional real variables and complex variables with uncertainties have been studied in [38].

All the mentioned synchronization techniques either synchronize the real master and real slave system or the complex master and complex slave system. In [23], P. Li. et al. synchronize classical integer-order real hyper-chaotic and its corresponding complex system through a modulus synchronization scheme. To the author’s best knowledge, the idea of synchronizing complex variable fractional-order chaotic master system and real fractional-order chaotic slave system is not yet been exposed.

Enlightened by the above motivation, we have introduced and analyzed the new fractional-order hyper-chaotic system and its corresponding complex variable fractional-order hyper-chaotic system. We have presented the dynamical analysis of the considered system employing stability of equilibrium points, phase plots, Lyapunov spectrum and bifurcation analysis for the consequences of the fractional-order derivative and parameter values on the system. A novel synchronization scheme has been introduced between the fractional-order hyper-chaotic system and its corresponding complex fractional-order hyper-chaotic system. The non-linear controllers are designed by implementing the Lyapunov stability theory and achieve the desired synchronization. A new modulus synchronization encryption algorithm with a large key space size for digital images is proposed, and the experimental results and analysis validate the desired algorithm. Also, we compare our result of the novel encryption algorithm with the previously published literature and verify the efficacy of the considered scheme. Numerical simulations have been obtained in the shape of plots to ensure the feasibility and efficiency of the desired scheme. Different types of medical images will be considered for executing the proposed scheme and new encryption algorithm will be developed to protect the medical image information in near future.

Then main objectives and findings of the paper are summarize as follows

  • A new fractional-order hyper-chaotic real and its corresponding complex variables system have been constructed.

  • A thorough analysis was done by employing equilibrium stability theory, Lyapunov exponents, bifurcation theory, and phase portraits.

  • We have shown the consequences of the varying dynamics of the proposed real and complex-valued hyper-chaotic system by varying fractional-order derivatives between 0.7 < α < 1 and system parameter values.

  • A new synchronization scheme has been constructed to synchronize our proposed real and complex-valued hyper-chaotic systems.

  • To demonstrate the effectiveness of our proposed synchronization scheme, we developed a new modulus synchronization encryption algorithm with a large key space size for digital images.

  • The proposed encryption algorithm’s experimental analysis and comparison results have been established in both a theoretical and graphical manner.

The rest of the manuscript is arranged as Section 2 shows the fundamental definitions and stability theorems of fractional-order chaotic systems. In Section 3, the dynamical analysis of both the real fractional-order hyper-chaotic and complex fractional-order hyper-chaotic systems have been presented. In Section 4 we describe our novel synchronization scheme and illustrate the results of the proposed scheme. Section 5 represents the application of the modulus synchronization scheme in digital images and the proposed encryption algorithm has been demonstrated experimentally. In Section 6, the experimental analysis and comparison results of the proposed encryption algorithm have been performed and verified. Finally, we conclude our paper in Section 7.

2 Preliminaries

In this section, first we provide few elementary definitions of fractional differential calculus and then present some fundamental stability theorems. The integro-differential operator denoted as \({{~}_{t_{0}} D^{\alpha }_{t}}\) is a generalization of integration-differentiation operator of fractional calculus theory defined by

$$ {{~}_{t_{0}} D^{\alpha}_{t}}=\left\{ \begin{array}{ll} \frac{d^{\alpha}}{dt^{\alpha}} : \alpha>0\\ 1 : \alpha=0\\ {\int}_{t_{0}}^{t}(d\tau)^{-\alpha} : \alpha<0 \end{array}\right. $$

where α fractional-order derivative, ‘t0’ is the fixed lower limit and ‘t’ is the moving upper limit.

The αth order Riemann Liouville’s derivative is defined as

$$ {~}_{t_{0}} D^{\alpha}_{t} f(t)=\frac{d^{n}}{dt^{n}} \left[\frac{1}{\Gamma(n-\alpha)}{\int}_{t_{0}}^{t}\frac{f(\tau)}{(t-\tau)^{\alpha-n+1}}d\tau \right] , ,t>t_{0} $$

where \(n-1< \alpha < n, n\in \mathbb {N}, {\Gamma }(\alpha )\) is the Gamma function.

The definition of Caputo’s αth order derivative is presented as

$$ {~}_{t_{0}} D^{\alpha}_{t} f(t)=\frac{1}{\Gamma(n-\alpha)}{\int}_{t_{0}}^{t}\frac{f^{(n)}(\tau)}{(t-\tau)^{\alpha-n+1}}d\tau, ,t>t_{0} $$

The Gr\(\ddot {u}\)nwald Letnikov’s αth order derivative is given as

$$ {~}_{t_{0}} D^{\alpha}_{t} f(t)\mid_{t=kh}={lim}_{h\rightarrow 0} \frac{1}{h^{\alpha}}\sum\limits_{j=0}^{\lfloor{\frac{t-c}{h}}\rfloor} \omega_{j}^{\alpha} f(kh-jh) $$

where h represents the sample time. ⌊.⌋ is the floor function and \(\omega _{j}^{\alpha }\) is given by

$$ \omega_{j}^{\alpha}= \frac{(-1)^{j} {\Gamma}(\alpha+1)}{\Gamma(j+1){\Gamma}(\alpha-j+1)}, j=0,1,2,...,k. $$

Since the initial conditions of a fractional-order system take the same form as for the integer order system in the Caputo’s fractional derivative, therefore we have used the Caputo’s definition in the rest of the paper. Further, \(_{t_{0}} D^{\alpha }_{t}\) is read as Dα for easiness of the notation in the rest of the content.

Theorem 1

[11] Consider the autonomous system

$$ D^{\alpha}u(t)=Au(t), u(0)=u_{0} $$

where 0 < α ≤ 1, \( u\in \mathbb {R}^{n} \), then this system is asymptotically stable if and only if

$$ \mid arg(eig(A))\mid > \frac{\alpha \pi}{2} $$

Also the system is stable if and only if \( \mid arg(eig(A))\mid \geq \frac {\alpha \pi }{2} \) and the eigenvalues which satisfies \( \mid arg(eig(A))\mid = \frac {\alpha \pi }{2} \) have geometric multiplicity one.

Lemma 1

[1] ∀ H(t) \(\in \mathbb {R}^{n}\), ∀q ∈ (0,1] and ∀t > 0

$$ \frac{1}{2}D^{q}(H^{T}(t)H(t))\leq H^{T}(t)D^{q}(H(t)) $$

3 The new fractional-order hyper-chaotic system and its corresponding complex system

In this section,we analyze a new fractional-order hyper-chaotic system. In [27], classical integer-order model is introduced with three quadratic non-linearities and analyzed which is given in the following form

$$ \begin{array}{@{}rcl@{}} \dot{x}&=& a(y-x)+yz \\ \dot{y}&=& by-xz+w \\ \dot{z}&=& -cz+xy \\ \dot{w}&=& -d(x+y) \end{array} $$
(1)

where \((x,y,z,w)^{T}\in \mathbb {R}^{n}\) are state variables and a,b and c are constant parameters.

In this paper, we study fractional version of the system (1) and its complex system. Then, new fractional-order system is presented as

$$ \begin{array}{@{}rcl@{}} D^{\alpha}{\omega_{1}}&=& a(\omega_{2}-\omega_{1})+\omega_{2}\omega_{3}\\ D^{\alpha}{\omega_{2}}&=& b\omega_{2}-\omega_{1}\omega_{3}+\omega_{4}\\ D^{\alpha}{\omega_{3}}&=& -c\omega_{3}+\omega_{1}\omega_{2} \\ D^{\alpha}{\omega_{4}}&=& -d(\omega_{1}+\omega_{2}) \end{array} $$
(2)

where Dα denotes the Caputo’s Derivative. \((\omega _{1},\omega _{2},\omega _{3},\omega _{4})^{T}\in \mathbb {R}^{n}\) are state variables and a,b,c and d are constant parameters.

The corresponding complex fractional-order hyper-chaotic system is

$$ \begin{array}{@{}rcl@{}} D^{\alpha}{\mu_{1}^{\prime}}&=& a(\mu_{2}^{\prime}-\mu_{1}^{\prime})+\mu_{2}^{\prime}\mu_{3}^{\prime} \\ D^{\alpha}{\mu_{2}^{\prime}}&=& b\mu_{2}^{\prime}-\mu_{1}^{\prime}\mu_{3}^{\prime}+\mu_{4}^{\prime}\\ D^{\alpha}{\mu_{3}^{\prime}}&=& -c\mu_{3}^{\prime}+1/2(\bar{\mu}_{1}^{\prime}\mu_{2}^{\prime}+\mu_{1}^{\prime}\bar{\mu}_{2}^{\prime}) \\ D^{\alpha}{\mu_{4}^{\prime}}&=& -d(\mu_{1}^{\prime}+\mu_{2}^{\prime}) \end{array} $$
(3)

where \(\mu _{1}^{\prime }=\mu _{1}+j\mu _{2}\), \(\mu _{2}^{\prime }=\mu _{2}+j\mu _{4}\) and \(\mu _{4}^{\prime }=\mu _{6}+j\mu _{7}\) are complex state variables and \(\mu _{3}^{\prime }=\mu _{5}\) is real state variable. Also \(j=\sqrt {-1}\) and over bar denotes the conjugate of complex variable.

Then the real version of system (3) is obtained as

$$ \begin{array}{@{}rcl@{}} D^{\alpha}{\mu_{1}}&=& a(\mu_{3}-\mu_{1})+\mu_{3}\mu_{5} \\ D^{\alpha}{\mu_{2}}&=& a(\mu_{4}-\mu_{2})+\mu_{4}\mu_{5} \\ D^{\alpha}{\mu_{3}}&=& b\mu_{3}-\mu_{1}\mu_{5}+\mu_{6} \\ D^{\alpha}{\mu_{4}}&=& b\mu_{4}-\mu_{2}\mu_{5}+\mu_{7} \\ D^{\alpha}{\mu_{5}}&=& -c\mu_{5}+\mu_{1}\mu_{3}+\mu_{2}\mu_{4} \\ D^{\alpha}{\mu_{6}}&=& -d(\mu_{1}+\mu_{3}) \\ D^{\alpha}{\mu_{7}}&=& -d(\mu_{2}+\mu_{4}) \end{array} $$
(4)

Now, we describe the complete dynamical analysis of system (2) and system (4).

3.1 Symmetry

  1. (A)

    We have found that the new fractional-order hyper-chaotic system (2) is invariant under the transformation (ω1,ω2,ω3,ω4) = (−ω1,−ω2,ω3,−ω4), which shows that the new system has rotational symmetry about ω3-axis.

  2. (B)

    The complex system (4) is symmetric about the μ5 axis for the transformation (μ1,μ2,μ3,μ4,μ5,μ6,μ7) = (−μ1,−μ2,μ3,−μ4,μ5,−μ6,−μ7).

3.2 Dissipative

  1. (A)

    The divergence (△ .H) of proposed system (2) is given as

    $$ \bigtriangleup .H=\frac{\partial {\dot{\omega_{1}}}}{\partial{\omega_{1}}}+\frac{\partial {\dot{\omega_{2}}}}{\partial{\omega_{2}}}+\frac{\partial {\dot{\omega_{3}}}}{\partial{\omega_{3}}}= (-a+b-c) $$
    (5)

    If △ .H < 0, then the divergence is dissipative and vice-versa.

    Therefore, for (−a + bc) < 0, the system (2) is dissipative.

  2. (B)

    The divergence (△ .H) of the system (4) is given as

    $$ \bigtriangleup .H=\frac{\partial {\dot{\mu_{1}}}}{\partial{\mu_{1}}}+\frac{\partial {\dot{\mu_{2}}}}{\partial{\mu_{2}}}+\frac{\partial {\dot{\mu_{3}}}}{\partial{\mu_{3}}}+\frac{\partial {\dot{\mu_{4}}}}{\partial{\mu_{4}}}+\frac{\partial {\dot{\mu_{5}}}}{\partial{\mu_{5}}}+\frac{\partial {\dot{\mu_{6}}}}{\partial{\mu_{6}}}+\frac{\partial {\dot{\mu_{7}}}}{\partial{\mu_{7}}}= (-2a+2b-c) $$
    (6)

    Therefore, for (− 2a + 2bc) < 0, the system (4) is dissipative.

    Hence, the trajectories of system (2) and (4) finally emerge to chaotic attractor.

3.3 Equilibrium points stability

  1. (A)

    To find the equilibrium points of system (2), we have to solve the following equations

    $$ \begin{array}{@{}rcl@{}} a(\omega_{2}-\omega_{1})+\omega_{2}\omega_{3} &=& 0\\ b\omega_{2}-\omega_{1}\omega_{3}+\omega_{4} &=& 0\\ -c\omega_{3}+\omega_{1}\omega_{2} &=& 0\\ -d(\omega_{1}+\omega_{2}) &=& 0 \end{array} $$
    (7)

    From (7), we get three equilibrium points at parameter values a = 30,b = 15,c = 3 & d = 2, represented as \(E_{0}=(\omega _{1}\rightarrow 0,\omega _{2}\rightarrow 0,\omega _{3}\rightarrow 0,\omega _{4}\rightarrow 0)\) \(E_{1}=(\omega _{1}\rightarrow 13.4164,\omega _{2}\rightarrow -13.4164,\omega _{3}\rightarrow -60,\omega _{4} \rightarrow -603.738)\)\(E_{2}=(\omega _{1}\rightarrow -13.4164,\omega _{2}\rightarrow 13.4164,\omega _{3}\rightarrow -60,\omega _{4} \rightarrow 603.738)\) The Jacobian matrix of system (2) is obtained as

    $$ J=\begin{bmatrix} -a & a+\omega_{3} & \omega_{2} & 0\\ -\omega_{3}& b & -\omega_{1} & 1\\ \omega_{2} & \omega_{1} & -c & 0\\ -d & -d & 0 & 0 \\ \end{bmatrix} $$
    (8)

    Then, the Characteristic Polynomial of (8) at equilibrium point E0 is simplified as

    $$ (\lambda+c)(\lambda^{3}-(a-b)\lambda^{2}-(d-ab)\lambda- 2ad=0 $$
    (9)

    The eigenvalues of above equation at parameter values a = 30,b = 15,c = 3 & d = 2 are λ = (− 3,0.270348,14.7739,− 30.0443).

    Then by using results of [8, 37] and from Theorem 1, the equilibrium point E0 is saddle point and unstable.

    Since the characteristic polynomial of (8) at equilibrium point E1 and E2 are same, then the eigenvalues of (8) at E1 and E2 at parameter values a = 30,b = 15,c = 3 & d = 2 are λ = (0.0254,− 19.8140,0.8943 + j37.8431,0.8943 + j37.8431). Then by using results of [8, 37] and from Theorem 1, the equilibrium point E1 and E2 are saddle focus and unstable.

  2. (B)

    The equilibrium point of system (4) can be found by solving the equation, μi = 0, i = 1 to 7, i.e.,

    $$ \begin{array}{@{}rcl@{}} a(\mu_{3}-\mu_{1})+\mu_{3}\mu_{5}=0 \\ a(\mu_{4}-\mu_{2})+\mu_{4}\mu_{5}=0 \\ b\mu_{3}-\mu_{1}\mu_{5}+\mu_{6}=0 \\ b\mu_{4}-\mu_{2}\mu_{5}+\mu_{7}=0 \\ -c\mu_{5}+\mu_{1}\mu_{3}+\mu_{2}\mu_{4}=0 \\ -d(\mu_{1}+\mu_{3})=0 \\ -d(\mu_{2}+\mu_{4})=0 \end{array} $$
    (10)

    Then the system (10) has one isolated equilibrium point (0,0,0,0,0,0) as well as a whole circle of equilibria in (μ1,μ4) space given as

    $$ \begin{array}{@{}rcl@{}} \mu_{1}^{2}+{\mu_{4}^{2}}=2ac \end{array} $$
    (11)

    This equation represents a circle with centre (0,0) and radius \(r=\sqrt {2ac}\).

    Let μ1 = μ3 = rcos𝜃 and μ2 = μ4 = rsin𝜃, where 𝜃 ∈ [0,2π], then we get the non-isolated fixed points as

    $$ E_{\theta}=(r cos \theta, r sin \theta,r cos \theta, r sin \theta,-2a,(b-2a)r cos \theta,(2a-b)r sin \theta) $$
    (12)

    To examine the stability of trivial equilibrium point (0,0,0,0,0,0) the characteristic polynomial at this equilibrium is

    $$ \lambda^{2}(\lambda+c)(\lambda^{2}+(a-b)\lambda^{2}-ab+d)^{2}=0 $$
    (13)

    So, this fixed point is stable if c > 0 and d > ab. Otherwise it is unstable.

3.4 Lyapunov exponents & dimensions

  1. (A)

    To find out the Lyapunov exponents, the system (2) can be written in vector form as follows-

    $$ \dot{\omega}(t)=L(\omega(t)) $$
    (14)

    where ω(t) = [ω1(t),ω2(t),...,ω4(t)], L = [l1,l2,l3,l4]t and [...]t represent the transpose.

    The trajectory ω(t) for small deviation δ can be represented as

    $$ \delta\dot{\omega}(t)=H(\omega(t),\delta\omega(t)) $$
    (15)

    where \(H=\frac {\partial {L}}{\partial {\omega }} \) represents the following Jacobian matrix-

    $$ H=\begin{bmatrix} -a & a+ \omega_{3} & \omega_{2} & 0\\ - \omega_{3}& b & - \omega_{1} & 1\\ \omega_{2} & \omega_{1} & -c & 0\\ -d & -d & 0 & 0\\ \end{bmatrix} $$
    (16)

    Then, the Lyapunov exponents Li of the system are defined as

    $$ L_{i}=\lim_{t\rightarrow \infty} \frac{1}{t}{\sum}_{i=0}^{t-1} log\frac{\parallel \delta \omega_{i}(t)\parallel}{\parallel \delta \omega_{i}(0)\parallel} $$
    (17)

    For the parameter values a = 30,b = 15,c = 3,d = 2 and fractional-order α = 0.985, the Lyapunov exponents are obtained as L1 = 1.4873,L2 = 0.1086,L3 ≈ 0,L4 = − 20.695. Figure 1(a) shows the Lyapunov exponent spectrum for real fractional-order hyper-chaotic system (2).

    Fig. 1
    figure 1

    Lyapunov Exponents for order α = 0.95: (a) Real fractional-order hyper-chaotic system (2) (b) Complex fractional-order hyper-chaotic system (4)

    Therefore our new fractional-order system is hyper-chaotic because it has two positive Lyapunov exponents L1,L2.

    Using the theoretical analysis and numerical simulations, the Lyapunov dimension(or Kaplan-Yorke dimension) can be find out by the following method

    $$ LD_{KY}=m+\frac{1}{\mid L_{m+1} \mid}\sum\limits_{i=1}^{m} L_{i} $$
    (18)

    where m is the largest integer satisfying \({\sum }_{i=1}^{m} L_{i} \geq 0\) and \({\sum }_{i=1}^{m+1} L_{i} < 0\). Therefore, the Lyapunov dimension for real hyper-chaotic system is LDKY = 3.07525, which is a fractional dimension.

  2. (B)

    Similarly from the above case, the Lyapunov exponents for complex system are calculated as L1 = 3.3828,L2 = 2.7239,L3 = 0.2600,L4 = − 2.450,L5 = − 4.1744,L6 = − 15.5966,L7 = − 19.235. Figure 1(b) shows the Lyapunov exponent spectrum for complex fractional-order hyper-chaotic system (4).

    Therefore, system (4) is hyper-chaotic because it has at least two positive Lyapunov exponents. Also, the Kaplan-Yorke dimension for a complex hyper-chaotic system (4) is calculated as LDKY = 4.9382, which is a fractional dimension.

3.5 Dynamics of the systems for varying fractional-order and bifurcation analysiss

Recently, it has been discovered that the fractional-order derivative behaves like a controlling parameter and extends a threshold value of derivative order; chaos is either created or exterminated. So, the dynamics for varying fractional-order α ∈ (0.8,1) can be described for both real and corresponding complex hyper-chaotic systems. Also, we have shown the bifurcation analysis for fixed derivative order α = 0.95, the parameter c = 3, d = 2 and varying the parameter values of a and b for both real and corresponding complex hyper-chaotic systems as follows

  1. (A)

    For real hyper-chaotic system (2) simulations, we set the rest of the parameters as a = 30,b = 15,c = 3 & d = 2 and alter the derivative order α.

    From Fig. 2(a), we see that for α < 0.86, the system is not hyper-chaotic because it has only one positive Lyapunov exponent, but after α > 0.86, the real system is hyper-chaotic because of the presence of two positive Lyapunov exponents. Also, it is more clear from the Fig. 2(b) that the bifurcation diagram for varying order shows that the real system is hyper-chaotic for the value α > 0.86.

    Bifurcation Analysis for varying parameter values a, b and fix α = 0.95, c = 3 and d = 2 can be illustrated in the Fig. 3.

    From Fig. 3, we see that for a specific interval of parameters a and b, the system shows hyper-chaotic behavior, and after a verge value, chaos is demolished.

  2. (B)

    Similarly, for complex hyper-chaotic system simulations, we set the parameters as a = 30,b = 15,c = 3 & d = 2 and alter the derivative order α.

Fig. 2
figure 2

(a) Lyapunov exponents (b) Bifurcation diagram of system (2) for α ∈ (0.8,1)

Fig. 3
figure 3

Bifurcation diagram of system (2) for (a) parameter a ∈ (10,50) (b) parameter b ∈ (10,50)

From Fig. 4(a), we see that for α < 0.86 the system has only one positive lyapunov exponents but after α > 0.86 it has two positive lyapunove exponents which shows that corresponding fractional-order complex system is hyper-chaotic. Also, from the Fig. 4(b), the bifurcation diagram for varying order clearly represents that the complex system is hyper-chaotic for the value α > 0.86.

Fig. 4
figure 4

(a) Lyapunov exponents (b) Bifurcation diagram of system (4) for α ∈ (0.8,1)

Also, Fig. 5 shows the bifurcation analysis for varying parameter values a and b and fix derivative order α = 0.95, parameter c = 3 and d = 2.

Fig. 5
figure 5

Bifurcation diagram of system (4) for (a) parameter a ∈ (10,40) (b) parameter b ∈ (10,28)

Therefore, we say that the parameter values a and b for a definite interval show hyper-chaotic behavior and after a verge value, chaos demolished.

3.6 Hyper-chaotic attractors

  1. (A)

    For the parameter values a = 30,b = 15,c = 3 & d = 2, initial condition (ω1(0), ω2(0),ω3(0),ω4(0)) = (1,2,− 0.1,0.1) and α = 0.95 the real system (2) exhibits the hyper-chaotic behavior. The hyper-chaotic attractors displayed in Fig. 6

  1. (B)

    For the parameter values a = 30,b = 15,c = 3 & d = 2, initial condition (μ1(0),μ2(0),μ3(0),μ4(0),μ5(0),μ6(0),μ7(0)) = (1,1,2,3,− 0.1,0.1,0.1) and α = 0.95 the complex system (4) is hyper-chaotic. The hyper-chaotic attractors shown in Fig. 7.

    Fig. 6
    figure 6

    Hyper-chaotic attractors for fractional-order real system (2)

    Fig. 7
    figure 7

    Hyper-chaotic attractors for fractional-order complex system (4)

4 Modulus synchronization scheme

This section discusses the novel synchronization scheme to synchronize real fractional-order hyper-chaotic system and their corresponding complex system.

Consider the master system and slave system in the following form

$$ \begin{array}{@{}rcl@{}} D^{\alpha} U(t)&=& f(U(t)) \end{array} $$
(19)
$$ \begin{array}{@{}rcl@{}} D^{\alpha} W(t)&=& BW(t)+g_{0}(W(t))+C \end{array} $$
(20)

where U(t) = (u1,u2,...,un)T denotes the state vector of master system. Note that u is considered as \(u=({u_{1}^{r}},{u_{2}^{r}},...,{u_{n}^{r}})^{T}\), \(u=({u_{1}^{i}},{u_{2}^{i}},...,{u_{n}^{i}})^{T}\) and \(j=\sqrt {-1}\). W(t) = (w1,w2,...,wn)T are the real state vector of slave system. \( A, B\in \mathbb {R}^{N\times N}\) are constant matrix, f,g are n × 1 continuous vector function respectively. C = (C1,C2,...,Cn)T are non-linear controllers which will be designed later. Now, to synchronize complex master system and real slave system, here we define the error system of Modulus synchronization as

$$ e(t)=W(t)-|U(t)| $$
(21)

where |.| denotes the complex modulus of master system.

Definition 1

The synchronization between complex master system and real slave system can be achieved by the following scheme

$$ \lim \| e(t)\|=\lim \| W(t)-| U(t)|\|=0 $$
(22)

where ∥.∥ denotes Euclidean norm and |.| denotes the modulus of complex variable.

Remark 1

If (ur,ui) = |0,0|, the error can be rewritten as

$$ \begin{array}{@{}rcl@{}} \lim \| e(t)\| &=& \lim \| W(t)-| U(t)|\| \\ &=& \lim \| W-\sqrt{(u^{r})^{2}+(u^{i})^{2}}\|=0 \end{array} $$

Remark 2

If ur≠ 0 and ui≠ 0, then (22) can be written as

$$ \begin{array}{@{}rcl@{}} \lim \| e(t)\| &=& \lim \| W-\sqrt{(u^{r})^{2}} \| \\ &=& \lim\| W-\vert u^{r}|\|=0 \end{array} $$
(23)

The (23) implies that the synchronization between the complex master system and a real slave system can be turned into an absolute value synchronization problem of real system.

From (22), the error dynamical system can be written as

$$ \begin{array}{@{}rcl@{}} D^{\alpha} e &=& D^{q} W-D^{q}(\sqrt{(u^{r})^{2}+(u^{i})^{2}}) \\ D^{\alpha} e &=& BW(t)+g(V(t))+C-D^{q}(\sqrt{(u^{r})^{2}+(u^{i})^{2}}) \end{array} $$
(24)

The error system can be described as

$$ \begin{array}{@{}rcl@{}} D^{\alpha} e &=& (B-P)e(t) +PW(t)+(B-P)\sqrt{(u^{r})^{2}+(u^{i})^{2}}+g(W(t)) \\ &&-D^{\alpha} \sqrt{(u^{r})^{2}+(u^{i})^{2}} \end{array} $$
(25)

where \(P\in \mathbb {R}^{N\times N}\) is a constant control matrix to be chosen.

Theorem 2

If we select the control matrix \(P\in \mathbb {R}^{N\times N}\) such that (BP) is a negative definite matrix, then the complex master system and real slave system are globally synchronized with respect to complex modulus function under the following controllers.

$$ C=-PV(t)-(B-P)\sqrt{(u^{r})^{2}+(u^{i})^{2}}-g(W(t))+D^{\alpha} \sqrt{(u^{r})^{2}+(u^{i})^{2}} $$
(26)

Proof

Using (25) and (26), we get

$$ D^{\alpha} e(t)=(B-P)e(t) $$
(27)

Consider the Lyapunov function as

$$ V(e(t))=\frac{1}{2}e^{T}(t)e(t) $$

We obtain,

$$ D^{\alpha} V(e(t))=D^{q}\left( \frac{1}{2}e^{T}(t)e(t)\right) $$

By using Lemma 1, we get

$$ \begin{array}{@{}rcl@{}} D^{\alpha} V(e(t))\leqslant e^{T}(t)D^{q} e(t) =e^{T}(t)(B-P)e(t) =e^{T}(t)Le(t)<0 \end{array} $$

Thus from the stability theory of Lyapunov, the error system is globally asymptotically stable. Therefore complex master system and real slave system are globally synchronized. □

4.1 Illustration

We consider the complex fractional-order hyper-chaotic system (4) as master system given as follows

$$ \begin{array}{@{}rcl@{}} D^{\alpha}{\mu_{1}} &=& a(\mu_{3}-\mu_{1})+\mu_{3}\mu_{5} \\ D^{\alpha}{\mu_{2}} &=& a(\mu_{4}-\mu_{2})+\mu_{4}\mu_{5} \\ D^{\alpha}{\mu_{3}} &=& b\mu_{3}-\mu_{1}\mu_{5}+\mu_{6} \\ D^{\alpha}{\mu_{4}} &=& b\mu_{4}-\mu_{2}\mu_{5}+\mu_{7} \\ D^{\alpha}{\mu_{5}} &=& -c\mu_{5}+\mu_{1}\mu_{3}+\mu_{2}\mu_{4} \\ D^{\alpha}{\mu_{6}} &=& -d(\mu_{1}+\mu_{3}) \\ D^{\alpha}{\mu_{7}} &=& -d(\mu_{2}+\mu_{4}) \end{array} $$
(28)

Consider the controlled real fractional-order hyper-chaotic system (2) as slave system which is written as

$$ D^{\alpha} W=BW(t)+g_{0}(W(t))+C $$
(29)

where W(t) = (ω1(t),ω2(t),ω3(t),ω4(t))T,

$$ B=\begin{bmatrix} -a & a & 0 &0 \\ 0 & -b & 0 & 1 \\ 0 & 0 & -c & 0 \\ -d & -d & 0 & 0\\ \end{bmatrix}, g_{0}(W(t))=\begin{bmatrix} \omega_{2}\omega_{3}\\ -\omega_{1} \omega_{3}\\ \omega_{1} \omega_{2}\\ 0\\ \end{bmatrix} $$
(30)

and C = (C1,C2,C3,C4) represents a controller.

The error term for modulus synchronization synchronization is defined as

$$ \begin{array}{@{}rcl@{}} e_{1} &=& \omega_{1}-\sqrt{{\mu_{1}^{2}}+{\mu_{2}^{2}}} \\ e_{2} &=& \omega_{2}-\sqrt{{\mu_{3}^{2}}+{\mu_{4}^{2}}} \\ e_{3} &=& \omega_{3}-\mu_{5} \\ e_{4} &=& \omega_{4}-\sqrt{{\mu_{6}^{2}}+{\mu_{7}^{2}}} \end{array} $$
(31)

To achieve modulus synchronization between systems (28) and (29), the control matrix P is chosen as

$$ \begin{bmatrix} 0 & 0 & 0 & 0\\ 0 & 16 & 0 & 0\\ 0 & 0 & 0 & 0\\ -2 & -2 & 0 & 1\\ \end{bmatrix} $$
(32)

The control vector C = (C1,C2,C3,C4) can be determined as

$$ \begin{array}{@{}rcl@{}} C_{1} &=& 35 \sqrt{{\mu_{1}^{2}}+{\mu_{2}^{2}}}-35\sqrt{{\mu_{1}^{2}}+{\mu_{2}^{2}}}-\omega_{2} \omega_{3}+D^{\alpha}\left( \sqrt{{\mu_{1}^{2}}+{\mu_{2}^{2}}}\right) \\ C_{2} &=& -16 \omega_{2}+\sqrt{{\mu_{3}^{2}}+{\mu_{4}^{2}}}+\omega_{1} \omega_{3}+D^{\alpha}\left( \sqrt{{\mu_{3}^{2}}+{\mu_{4}^{2}}}\right) \\ C_{3} &=& 3 \mu_{5}-\omega_{1} \omega_{2}+D^{\alpha}(\mu_{5}) \\ C_{4} &=& 2 \omega_{1}-2 \omega_{2}-\omega_{4}+D^{\alpha}\left( \sqrt{{\mu_{6}^{2}}+{\mu_{7}^{2}}}\right) \end{array} $$
(33)

The error function can be obtained as

$$ \begin{bmatrix} D^{\alpha} e_{1}\\ D^{\alpha} e_{2}\\ D^{\alpha} e_{3}\\ D^{\alpha} e_{4}\\ \end{bmatrix} =(B-P)* \begin{bmatrix} e_{1}\\ e_{2}\\ e_{3}\\ e_{4}\\ \end{bmatrix} $$
(34)

where

$$ (B-P)= \begin{bmatrix} -30 & 30 & 0 &0 \\ 0 & -1 & 0 & 1 \\ 0 & 0 & -3 & 0\\ 0 & 0 & 0 & -1 \\ \end{bmatrix} $$
(35)

Therefore, it is clear that (BP) is negative definite matrix. According to Theorem 2, the systems (28) and (29) are globally modulus synchronized with the parameter value are taken as a = 30,b = 15,c = 3 & d = 2 at fractional-order α = 0.95. Figure 8 displays the synchronization error achieved at time t = 4 units (approx.)

Fig. 8
figure 8

Synchronization error for fractional-order complex system and real system

5 Application of the proposed synchronization scheme

This section applies the synchronized complex and real fractional-order hyper-chaotic systems to develop a new algorithm for digital image encryption and decryption technique. The proposed algorithm has three phases: 1. The key generation phase 2. Encryption phase, and 3. Decryption phase. Before going to construct the algorithm, the following assumptions are needed.

Consider the fractional-order complex system (28) as the sender system and the controlled real fractional-order system (29) as the receiver system. The sender and receiver agree on parameters (t0,t1,α,g,p). Figure 8 shows that the modulus synchronization error e(t) between the systems (28) and (29) tends to zero after t ≥ 4 at α = 0.95. So, we fix the parameter values t0 = 4, t1 > t0 and α = 0.95. Further, g is any positive integer less than p where p = 256 since the range of intensity values of an image from 0 to 255.

5.1 Modulus synchronization encryption algorithm

1. Key generation phase:

  1. 1.

    The sender chooses a number t2 > t0 and solves the system (28) at time t2. Then computes the private \(K_{S_{A}}\) and public key \(K_{S_{B}}\) by

    $$ K_{S_{A}}\equiv floor\left( \prod\limits_{i=1}^{7} \mu_{i} (t_{2})\right) * 10^{4} \ (mod\ p) $$
    $$ K_{S_{B}}\equiv g^{K_{S_{A}}} \ (mod\ p) $$
  2. 2.

    The sender kept secret their private key \(K_{S_{A}}\) and publish the public key \(K_{S_{B}}\).

  3. 3.

    The receiver chooses a number t3 > t0 and solves the system (29) at time t3. Then computes the private \(K_{R_{A}}\) and public key \(K_{R_{B}}\) by

    $$ K_{R_{A}}\equiv floor\left( \prod\limits_{i=1}^{4} w_{i} (t_{3})\right) * 10^{4} \ (mod\ p) $$
    $$ K_{R_{B}}\equiv g^{K_{R_{A}}} \ (mod\ p) $$
  4. 4.

    The receiver kept secret their private key \(K_{R_{A}}\) and publish the public key \(K_{R_{B}}\).

2. Encryption phase:

  1. 5.

    The sender wants to send a digital image I with size m × n secretly via insecure channel.

  2. 6.

    Sender randomly chooses an integer k and calculates Tgk (mod p) and \(s\equiv k+K_{S_{A}} \ (mod\ p) \)

  3. 7.

    The sender computes an encrypted image E or cipher image of I by

    $$ E\equiv I*\left( K_{R_{B}}^{s} \right)^{-1}* \left( \prod\limits_{i} \phi_{i}(t_{1}) \right)\ (mod\ p) $$

    where \(\phi _{1}(t_{1})=floor\left (\sqrt {{\mu _{1}^{2}}(t_{1})+{\mu _{2}^{2}}(t_{1})}\right )\), \(\phi _{2}(t_{1})=floor\left (\sqrt {{\mu _{3}^{2}}(t_{1})+{\mu _{4}^{2}}(t_{1})}\right )\), ϕ3(t1) = floor(μ5(t1)) and \(\phi _{4}(t_{1})=floor\left (\sqrt {{\mu _{6}^{2}}(t_{1})+{\mu _{7}^{2}}(t_{1})}\right )\).

  4. 8.

    Further, sender sends (T,s,E) to receiver.

3. Decryption phase:

  1. 9.

    The receiver receives (T,s,E) from the sender and recovers an original image I or decrypted image D by computing

    $$ I\equiv D\equiv E*(T*K_{S_{B}})^{K_{R_{A}}}*\left( \prod\limits_{i} \psi_{i}(t_{1}) \right)^{-1}\ (mod\ p) $$

    where ψi(t1) = floor(wi(t1)),i = 1,2,3,4.

  2. 10.

    The validity of the recovered image must be verified by computing \( g^{s} \equiv T*K_{S_{B}}\ (mod\ p)\).

For,

$$ \begin{array}{@{}rcl@{}} E*\!(T*K_{S_{B}})^{K_{R_{A}}}*\!\left( \prod\limits_{i} \psi_{i}(t_{1}) \right)^{-1} && \equiv E*(g^{k}*g^{K_{S_{A}}})^{K_{R_{A}}}*\left( \prod\limits_{i} \psi_{i}(t_{1}) \right)^{-1}\ (mod\ p)\\ && \equiv E*\left( g^{kK_{R_{A}}+K_{S_{A}}K_{R_{A}}}\right)*\left( \prod\limits_{i} \psi_{i}(t_{1}) \right)\ (mod\ p)\\ && \equiv I*(K_{R_{B}}^{s})^{-1}* \!\left( \prod\limits_{i} \phi_{i}(t_{1}) \!\right)*\left( g^{kK_{R_{A}}+K_{S_{A}}K_{R_{A}}}\right)*\\ &&\quad \left( \prod\limits_{i} \psi_{i}(t_{1}) \right)^{-1}\ (mod\ p)\\ && \equiv I* \left( K_{R_{B}}^{k+K_{S_{A}}}\right)^{-1}*\left( g^{kK_{R_{A}}+K_{S_{A}}K_{R_{A}}}\right)* \\ &&\quad \left( \prod\limits_{i} \phi_{i}(t_{1}) \right)* \left( \prod\limits_{i} \psi_{i}(t_{1}) \right)^{-1} (mod\ p)\\ && \equiv I* \left( (g^{K_{R_{A}}})^{k+K_{S_{A}}}\right)^{-1}*\left( g^{kK_{R_{A}}+K_{S_{A}}K_{R_{A}}}\right)*\\ &&\quad \left( \prod\limits_{i} \phi_{i}(t_{1}) \right)* \left( \prod\limits_{i} \psi_{i}(t_{1}) \right)^{-1} (mod\ p)\\ && \equiv I* \left( g^{kK_{R_{A}}+K_{S_{A}}K_{R_{A}}}\right)^{-1}*\left( g^{kK_{R_{A}}+K_{S_{A}}K_{R_{A}}}\right)* \\ &&\quad \left( \prod\limits_{i} \phi_{i}(t_{1}) \right)* \left( \prod\limits_{i} \psi_{i}(t_{1}) \right)^{-1} (mod\ p)\\ && \equiv I\ (mod\ p). \end{array} $$

5.2 Demonstration of the proposed algorithm

In this subsection, the performance of the proposed algorithm to be demonstrated experimentally.

Assume that t1 = 15,t2 = 10,t3 = 21,g = 89 and k = 39.

At t1 = 15, μ1(t1) = 2.1639,μ2(t1) = 3.0154,μ3(t1) = 1.2083,μ4(t1) = 1.6837,μ5(t1) = 10.5402,μ6(t1) = − 4.3571,μ7(t1) = − 6.0712 and w1(t1) = 3.7115,w2(t1) = 2.0724,w3(t1) = 10.5402,w4(t1) = 7.4729.

At t2 = 10, μ1(t2) = 1.2001,μ2(t2) = 1.6754,μ3(t2) = 1.0237,μ4(t2) = 1.4288,μ5(t2) = 8.0642,μ6(t2) = − 0.9404,μ7(t2) = − 1.3187.

At t3 = 21, w1(t3) = 0.4303,w2(t3) = 0.8397,w3(t3) = 10.8281,w4(t3) = 4.3734.

The private and public keys of sender are

$$ \begin{array}{@{}rcl@{}} K_{S_{A}} && \equiv floor\left( \prod\limits_{i=1}^{7} \mu_{i} (t_{2})\right) * 10^{4} \equiv 208 \ (mod\ 256) \\ K_{S_{B}} && \equiv g^{K_{S_{A}}}\equiv 129 \ (mod\ 256) \end{array} $$

The private and public keys of receiver are

$$ \begin{array}{@{}rcl@{}} K_{R_{A}} && \equiv floor\left( \prod\limits_{i=1}^{4} w_{i} (t_{3})\right) * 10^{4} \equiv 16 \ (mod\ 256) \\ K_{R_{B}} && \equiv g^{K_{R_{A}}}\equiv 129 \ (mod\ 256) \end{array} $$

The sender calculates Tgk ≡ 169 (mod 256), \(s\equiv k+K_{S_{A}}\equiv 247\ (mod\ 256) \) and computes the encrypted image E of an original image I by \(E\equiv I*(K_{R_{B}}^{s})^{-1}* \left (\prod \limits _{i} \phi _{i}(t_{1}) \right )\ (mod\ 256) \). Then sends (T,s,E) to receiver. Finally, receiver recovers an original image I by computing \(I\equiv D\equiv E*(T*K_{S_{B}})^{K_{R_{A}}}*\left (\prod \limits _{i} \psi _{i}(t_{1}) \right )^{-1}\ (mod\ 256)\)

For experiment, we take Coronavirus, Lena, Baboon, Zinnia flowers, Fractal and Autumn leaves images as an original images I and their corresponding encrypted and decrypted images are shown in Fig. 9.

Fig. 9
figure 9

Left to right from the top: The original, encrypted and decrypted images of Coronavirus, Lena, Baboon, Zinnia flowers, Fractal and Autumn leaves respectively

6 Experimental analysis and comparison results

In this section, the security and performance of the proposed algorithm are analyzed by different security measures.

6.1 Key space analysis

The key space is the total number of different secret keys that can be used in the cryptosystem. A good encryption scheme should have a large key space to resist the brute-force attack. In the proposed image encryption algorithm, the secret keys are the parameters (a,b,c,d) and initial values μi(0),i = 1,2,⋯,7, wi(0),i = 1,2,3,4 of the complex and real fractional-order system, the fractional-order α and the time parameters (t0,t1,t2,t3). If the computation precision is 10− 14, then the estimated key space of the proposed algorithm is 10266 ≈ 2880. The estimated key space is 8 times greater than the key space size 2100 to provide the high level security and to resist all varieties of brute-force attacks. The comparison of key space result between the proposed encryption algorithm and the recent existing schemes is given in Table 1.

Table 1 Comparison results of key space

6.2 Information entropy analysis

It is an important analysis to measure the randomness and the unpredictability of an information in the image and the value of the entropy is measured by the following formula

$$ H(s)=-\sum\limits_{i=0}^{2^{N}-1}P(s_{i})\log_{2}P(s_{i}), $$
(36)

where s is the source of information and P(si) is the probability of symbol si, sis. Theoretically, the maximum entropy value is 8 for a random image with 256 gray levels. A good encryption scheme should produce the entropy value of encrypted image very close to 8 [5, 44]. For the proposed algorithm, the entropy values of encrypted images are listed in Table 2. It is very clear that the entropies of encrypted images are close to 8 and proves that the unpredictability of information is very high. Hence, the proposed encryption algorithm is secure against the entropy analysis and possess good randomness. Further, the comparison result with some existing algorithms is given in Table 3.

Table 2 Information entropy of encrypted images
Table 3 Comparison of information entropy of encrypted images

6.3 Histogram analysis

The histogram reflects the pixel distribution of an image at each intensity level. Figure 10 displays the histograms of the color components of original and encrypted Coronavirus image. It shows that the histogram of encrypted image is entirely different from the original image and it is uniform. Hence, no statistical information about the original image can be observed from the encrypted image.

Fig. 10
figure 10

Histograms of Red, Green and Blue color components of (a) Coronavirus image and (b) Encrypted Coronavirus image respectively

6.4 Correlation analysis

The efficiency of an encryption algorithm is measured by the correlation of encrypted images. In the good encryption scheme, the correlation coefficient of the encrypted image is close to 0 [5, 44]. That is, the adjacent pixels are entirely uncorrelated to each other. The correlation coefficient between two adjacent pixels in a digital image is calculated by

$$ r_{xy}=\frac{cov(x,y)}{\sqrt{D(x)}\sqrt{D(y)}}, $$
(37)

where \(cov(x,y)=\frac {1}{N}\sum \limits _{i=1}^{n} (x_{i}-E(x))(y_{i}-E(y))\), \(E(x)=\frac {1}{N}\sum \limits _{i=1}^{n} (x_{i})\) and \(D(x)=\frac {1}{N}\sum \limits _{i=1}^{n} (x_{i}-E(x))^{2}\). In the proposed algorithm, the correlation coefficients of two adjacent pixels (2000 pixel pairs are randomly selected) are examined and tabulated in Table 4 for original images and encrypted images in horizontal, vertical, and diagonal directions, respectively. The correlation distribution of the Coronavirus image and their corresponding encrypted image are depicted in Fig. 11. Table 4 shows that the calculated value of correlation coefficients of encrypted images are close to 0 in three different directions, which means the proposed encryption algorithm is secure well and robust against correlation attacks. Further, the effectiveness of the proposed algorithm is satisfactory when compared with other existing encryption algorithms presented in Table 5.

Table 4 Correlation coefficients of two adjacent pixels in original and encrypted images
Fig. 11
figure 11

Correlation distributions between two adjacent pixels: (a) Horizontal, (b) Vertical (c) Diagonal directions in Coronavirus image and (a1) Horizontal, (b1) Vertical (c1) Diagonal directions in encrypted Coronavirus image respectively

Table 5 Comparison of correlation coefficients of two adjacent pixels in different directions

Remark 3

The results of experiments and their corresponding security analysis show that the security of the proposed modulus synchronization encryption algorithm is very high, has a huge key space size, and is secure against different attacks.

7 Conclusions

This paper investigates the dynamical behaviors of the proposed fractional-order real and complex hyper-chaotic systems. The modulus synchronization scheme has been suggested for fractional-order hyper-chaotic complex and real systems by using non-linear controllers. Necessary and sufficient conditions are derived from achieving the proposed synchronization and verified by numerical simulations. A novel modulus synchronization encryption algorithm with a large key space for digital images has been proposed and demonstrated numerically. Several tests have carried out the security and performance analysis of the proposed algorithm. The obtained results prove that the proposed image encryption algorithm has better performance than existing algorithms. Experimental results show that the proposed encryption algorithm is suitable to protect the security of digital image information. In future work, a novel encryption algorithm with higher level security will be constructed based on fractional order dynamical systems to protect the medical image information over the internet.