 Research
 Open access
 Published:
Chainstructure timedelay reservoir computing for synchronizing chaotic signal and an application to secure communication
EURASIP Journal on Advances in Signal Processing volume 2022, Article number: 68 (2022)
Abstract
In this work, a chainstructure timedelay reservoir (CSTDR) computing, as a new kind of machine learningbased recurrent neural network, is proposed for synchronizing chaotic signals. Compared with the single timedelay reservoir, our proposed CSTDR computing shows excellent performance in synchronizing chaotic signal achieving an order of magnitude higher accuracy. Noise consideration and optimal parameter setting of the model are discussed. Taking the CSTDR computing as the core, a novel scheme of secure communication is further designed, in which the “smart” receiver is different from the traditional in that it can synchronize to the chaotic signal used for encryption in an adaptive manner. The scheme can solve the issues such as design constrains for identical dynamical systems and couplings between transmitter and receiver in conventional settings. To further manifest the practical significance of the scheme, the digital implementation using fieldprogrammable gate array is conducted and tested experimentally with realworld examples including image and video transmission. The work sheds light on developing machine learningbased signal processing and communication applications.
1 Introduction
Reservoir computing (RC), also known as echo state network (ESN), has been attracting widely interests [1,2,3,4,5]. Compared with the conventional recurrent neural network (RNN), the RC is characterized by its simplicity that only the output connection weights need to be trained by a linear regression algorithm. Apart from applications such as spoken digit recognition [6], noisy image recognition [7] and fault diagnosis [8], the RC is also performed as a powerful paradigm for multivariate time series prediction [9,10,11,12]. For example, Lu et al. [13] used RC to deduce the timevarying state of a dynamical system from a limited number of concurrent system state measurements. Rafayelyan et al. [14] proposed an optical scheme performing RC over very large networks for realizing spatiotemporal chaotic systems prediction. In order to cope with more complicated tasks relating to time series prediction, various improved RC models in terms of structure modification have been proposed. These include doublereservoir in parallel RC (DRESN) [15], broadESN [16], hierarchical delaymemory echo state network (HDESN) [17], integer echo state networks (intESN) [5], etc. Particularly, it is worth to mention that L. Appeltant et al. introduced an architecture of RC that only used a single dynamical node with delay feedback–timedelay reservoir (TDR), which can be seen a special class of RC characterized by resourceefficient implementation[18].
Very recently, researchers from the field of nonlinear dynamics used the RC based on conventional structure for realizing chaos synchronization [13, 19, 20]. Different from the tasks of pure time series predication, realizing stable and complete synchronization between the RC and practical dynamical systems is challenging. On the one hand, the sensitivity to initial values and parameters mismatch regarding to chaotic systems impose a negative impact on maintaining synchronization. On the other hand, general RC models have limitations in extracting the valuable evolution patterns from previous time series because of a shortterm memory. RC models that can be used for achieving high quality of chaos synchronization need to be explored in depth covering aspects of network structure, training mechanism and hardware realization.
It is well known that the chaos synchronization plays a vital role for realizing secure communication [21,22,23,24]. In conventional scheme of chaosbased secure communication, the receiver is somehow demanded to equip a chaotic system (responser) identical to the one (driver) used for encryption in the transmitter, or a very complicated coupling between the driver and responser (in the case that driver and responser use different types of dynamical systems) needs to be welldesigned [25, 26]. In addition, for the sake of security [27, 28], the chaotic system used for encryption in the transmitter needs to be changed, and if so the receiver has to do the same, which may undesirably involve the replacement and resetting of the hardware. Solving the abovementioned issues is significant for developing advanced secure communications based on chaos synchronization.
In this work, we focus on realizing chaos synchronization and propose a new kind of TDRbased machine learning paradigm, i.e., chainstructure timedelay reservoir (CSTDR) computing. The model can synchronize to chaotic systems with high accuracy in an adaptive manner. Based on the CSTDR, a novel secure communication scheme is designed, in which the receiver is endowed with the ability for decoding encrypted signal generated by any dynamical systems in the transmitter. There is no complicated coupling needed to be designed, while instead the chaos synchronization between transmitter and receiver can be achieved by training. Numerically, the image transmission encrypted by Lorenz chaotic system is simulated. Moreover, the electronic realization of the proposed CSTDR and secure communication scheme based on FPGA is implemented. The practical application of video transmitting employing this communication scheme is experimentally conducted, proving the effectiveness and feasibility of our scheme. The work sheds light on developing smart secure communications applicationsbased reservoir computing. Moreover, academically, the CSTDR would attract attention for digging intrinsic properties of state dynamics of layered TDRs, for example, how the dynamical properties of CSTDR are related to its memory capacity (MC) and how that can be used for optimization. The continuous study in academic would further make CSTDR more mature and facilitate to develop better bespoke systems for applications in industry.
The contributions of this paper are listed as follows:

1.
A chainstructure timedelay reservoir (CSTDR) computing is for the first time proposed. It can be used for achieving stable and complete synchronization with oneorder higher accuracy than traditional TDR computing.

2.
A novel scheme of secure communication based on CSTDR is designed, solving practical design constrains and shedding light on developing machine learningbased secure communication.

3.
The electronic implementation of the CSTDRbased secure communication using FPGA is present. Taking the video transmission as example, the feasibility of the idea is verified, laying a foundation for practical application of CSTDR in the field of secure communication.
2 The regular timedelay reservoir (TDR) computing and its performance in chaos synchronization
The standard structure of a traditional RC is shown in Fig. 1a. It consists of an input layer, a hidden recurrent layer (reservoir) and an output layer. In the hidden recurrent layer, there are N sparsely connected neurons. In order to reduce the usually required large number of elements in traditional reservoir, a novel architecture that utilizes a nonlinear node with delayed feedback (TDR) for replacing the traditional reservoir is introduced [18]. The basic structure of TDR computing thus includes an input layer, an output layer and a link layer with N virtual nodes as shown in Fig. 1b. The virtual nodes are obtained by dividing the delay loop into N intervals and using time multiplexing. The weights of the output layer can be adjusted to make the TDR computing output desired signals. The training of the readout follows the standard procedure for RC.
The nonlinear Mackey–Glass oscillator because of its easy implementation by electronic circuit is widely chosen for being the dynamical system to generate virtual nodes, which can be written as:
where the \(\eta\) is intensity of feedback and \(\gamma\) is input scale. The J is a temporal input stream derived by multiplying the input state at any input time \(t_0\) with a Mask. The Mask is an Ndimensional vector of random numbers in the range [0,1]. The \(X(t\tau )\) denotes the state of the node at \(t_0\tau\) time. The exponent p can be used to tune the nonlinearity. In each \(\tau\) period, there are \(N \theta\) (\(\theta =\tau /N\)). During one \(\tau\) time, the state of each node is updated once.
The Lorenz system was first proposed in 1963 by Lorenz [29], and it becomes one of the most famous nonlinear model for studding chaos. Here, we first study the realization of chaos synchronization between a TDR computing and Lorenz system. The model of Lorenz system is expressed as:
where \(\sigma =10\), \(\gamma =28\) and \(\beta =8/3\) and in such a parameter setting the system works in chaotic state. Equation 2 can be solved numerically to get a threedimensional Lorenz chaotic sequence L(t) (\(L_x(t)\), \(L_y(t)\) and \(L_z(t)\)). In the training phase, we take a part of the \(L_x(t)\) and \(L_z(t)\) as the input signal and target signal (the rest part of L(t) is used for testing), respectively, which is different with the traditional training that the dimension of target signal is chosen as same as the input. Before training, the signals can be scaled to [0, 1] through the following procedure:
Assuming that the length of \(L_x(t)\) is M, the J (\(N \times M\)) can be derived by multiplying the Mask (\(N \times 1\)) and \(L_x\) (\(1 \times M\)) expressed by:
The J is then input into the Mackey–Glass oscillator for evolution, and the dynamical state x (\(N \times M\)) can be stored. After discarding the initial 100 points, the ridge regression can be used to calculate w (\(1 \times N\)), and thereby to make the output of the TDR as close as \(L_z\)(\(1 \times M\)), in which the ridge regression [30] is given by :
where \(\lambda\) is a parameter with a size of \(1 \times 10^{6}\) for avoiding over fitting, and II is an identity matrix. The calculated w is then needed to be deployed to the output layer of the TDR. The training phase is done. Next, if we let the output value of the TDR feeding back into the input layer, the TDR computing can automatically generate values close to actual \(L_z(t)\) but only for a few time steps. However, if we expect a long and stable output values that synchronize to actual \(L_z(t)\), the signal \(L_x\) should be kept for inputting. During the synchronization, as the sequence \(L_x\) flowing into the TDR, the output value \(U_z\) is given by:
To investigate the performance of a TDR computing for achieving chaos synchronization in Lorenz system, we study the cases (L(t) as the dataset): the x time series as input signal, y and z as target (to synchronize with) signals; y as input signal, x and z as target (to synchronize with) signals; and z time series as input signal, x and y as target (to synchronize with) signals. The results are summarized in Table 1.
In Table 1, the minimum normalized mean square error (NMSE) [31] is used to evaluate the discrepancy of the achieved synchronization, which is defined as :
where the G(t) represents the actual signal. It can be seen from Table 1 that the NMSE can reach a relatively smaller value when the x and ydimension is taken as input signal. For the case of z time series as input, the NMSE gets larger. The reason for this desynchrony is attributed to the inherent dynamics of the Lorenz system [32]. There is one positive conditional Lyapunov exponent for z driving, which leads the desynchrony in subsystem (x, y).
Similarly, the performance of the TDR for achieving synchronization in Rossler system is also studied. The Rossler system is seen as another famous nonlinear dynamical system for having chaos [33], which is given by:
where \(\omega =1, \alpha =0.2, \beta =0.2, \gamma =5.7\) are adopted for generating chaotic time series. Again, we calculated the NMSE of this model considering different cases, and the results are summarized in Table 2. It is overall satisfactory with somehow the NMSE can reach as low as \(10^{3}\), except for the zdimension as input signal. Similar situation as the Lorenz system.
3 Method: the proposed chainstructure timedelay reservoir (CSTDR) computing and its performance in chaos synchronization
As shown in Fig. 2, a chainstructure timedelay reservoir (CSTDR) computing which has a few TDRs in series connection is proposed. There is an additional output layer designed for connecting the virtual nodes in all TDRs, which is different from the general DeepESN schemes. It should be noted that the TDR adopted in the proposed CSTDR could be more or less depending on practical need. For the task of synchronizing chaotic signals, we have calculated the performance of CSTDR in the following discussion section. In this work, there are four TDRs with each having 12 virtual nodes generated by Mackey–Glass oscillator used in the CSTDR model.
Taking the CSTDR computing with four reservoirs (both reservoirs are generated by Mackey–Glass oscillator) as example, the training procedure includes the following steps:
① Train the first TDR as same as the standard method for traditional RC. The specific training process for the first TDR can be expressed as:
where \(i=1\) represents the first TDR. The xdimension of training set \(T_x(t)\) is input to the first TDR and multiplied by the Mask, i.e., Eq. 9a. Dynamical states \(X_i\) are generated by Eq. 9b, in which the parameters are taken the same as described in last section. Equation 9c. is the standard linear regression algorithm for calculating the output layer weight: \(W_i\) (i=1). Last, the output of the first TDR: \(U_{x1}\) can be derived by using Eq. 9d.
② Take the output of first TDR as input for the second TDR, and train it as same as the first TDR, outputting \(U_{x2}\).
③ Input \(U_{x2}\) into the third TDR and train it as same as the first TDR, outputting \(U_{x3}\).
④ Input \(U_{x3}\) into the fourth TDR. The training procedure for this one can be skipped.
⑤ Use the ridge regression to calculate the weights of the additional output layer \(W_{out}\) (\(1 \times 4N\)) by combining dynamical states in all TDRs, i.e., X (\(4N \times M\)) into consideration, that is:
where \(\lambda\) is a parameter with a size of \(1 \times 10^{6}\) used for avoiding over fitting, and II is an identity matrix.
After training, the output of the additional output layer is G(t), which can be given by:
4 Results and discussion
To verify the proposed model, we first test it with the Lorenz model. Similar to the case using a single TDR in last section, we take a part of \(L_x(t)\) and \(L_z(t)\) as the input and target signal, respectively. The rest of L(t) is used for testing the performance of CDSTDR in realization of chaos synchronization. The preliminary simulation result is given in Fig. 3. It is seen that the output of our proposed CSTDR after training can completely synchronize to the actual signal of zdimension.
To further illustrate the performance of our proposed model CSTDR in realization of chaos synchronization, we also investigate all the cases considered in last section where the traditional (single) TDR computing is used. The CSTDR computing here employs four TDRs with each having 12 virtual nodes generated by Mackey–Glass oscillator. The training and testing data set is generated by Lorenz system and Rossler system with unchanged parameters as same as in last section. The results are given in Tables 1 and 2. It can be seen that the NMSE can reach one order lower compared with the results derived by TDR in executable cases, while in some cases the NMSE is not improved. That is due to the inherent character of the specific dynamical systems as discussed above, which is nothing to do with methods adopted. All the results take the average of ten independent tests to avoid random errors.
In order to confirm the universality of our proposed CSTDR computing in realization of chaos synchronization, the Lorenz system and Rossler system with different parameters setting are also investigated.
Part of simulation results is shown in Fig. 4. The chaotic attractors (\(xz\)) of Lorenz system and the generated by CSTDR computing (xdimension signal as input) are, respectively, plotted, as shown in upper subfigures of Fig. 4a–c. Meanwhile, the output signal of the CSTDR computing (G(t)) and actual signal (\(U_z\)) and their differences with varying time are also presented in the middle and lower subfigures of Fig. 4a–c. All these results confirm that the proposed CSTDR computing can be used for achieving chaos synchronization. Likewise, the Rossler system with different settings is also under investigation, with results shown in Fig. 4d–f. Overall, the proposed CSTDR performs much better than the traditional TDR computing.
To investigate how the key parameters: the number of employed TDR in CSTDR and the number of virtual nodes in each TDR, affect the realization of chaos synchronization, we calculate minimum normalized mean square error (NMSE) between G(t) and \(U_z\) by varying them in [1, 8] and [2, 50], respectively.
The result is shown in Fig. 5. It can be seen that as the number of reservoirs and the number of virtual node increase, the NMSE decreases gradually. Specifically, when the number of reservoirs switches between 1 and 2, the change of NMSE is particularly obvious. It seems to explain that single TDR computing cannot synchronize the chaotic system, while the CSTDR computing can. Meanwhile, along the dimension of number of virtual node, it is shown that when the TDR is in the range of [2, 8], there is a step change of NMSE when the number of virtual nodes changes from 2 to 4. It is also verified that when the number of reservoirs is larger than 8, the change of NMSE is becoming not obvious. Here in this work, we select the number of reservoirs to be 4 and the number of virtual nodes to be 12 as the optimal parameters.
In reality, the input signal is usually disturbed by noise. Here, we test the robustness of our proposed scheme under the impact of white noise. The white noise is added to the chaotic signals L(t) (generated by Lorenz system), and the CSTDR is trained for fitting the \(L_z\). The calculation result is shown in Fig. 6. It is seen that with the increase in signaltonoise ratio (SNR), the NMSE between the actual signal of the Lorenz system and the output of CSTDR computing decreases continuously, and when the SNR exceeds 42dB, the NMSE stabilizes below \(10^{3.3}\). It can be concluded that the system has a certain level of antinoise ability.
5 Secure communication scheme based on CSTDR computing
The proposed secure communication scheme is shown in Fig. 7, which mainly consists of two parts: transmitter and receiver. The overall idea is that the receiver in the proposed scheme can be trained, and then to synchronize the chaotic signal used for encryption in the transmitter based on RC [32]. With synchronization that we express in previous section, the hidden message can be decoded by subtraction.
In the transmitter, the signal h(t) to be sent is encrypted by one vector of chaotic signal L(t) (zvector: \(L_z(t)\) in our case) which is generated by a threedimensional chaotic system. The S(t) represents the signal after encryption. During the working process with the scheme, the chaotic signal L(t) generated by a chaotic system in the transmitter needs to be divided into two time continuous parts, i.e., T(t), U(t). The zvector of U(t) (\(U_z(t)\)) is used to encrypt the signal h(t). The T(t) is deliberately left for training the receiver.
In the training phase (indicated by the yellow letter), the CSTDR computing of receiver learns the received training set T(t). The \(T_x(t)\) is input into the CSTDR computing, and training follows the method we proposed in previous section with target at \(T_z(t)\). After training, it is believed that the receiver has learned the chaotic signal used for encryption in the transmitter.
In the synchronizing phase (indicated by the blue letter), the transmitter only needs to send the scalar signal \(U_x(t)\), the xvector of signal U(t), to the receiver to drive the CSTDR, and the receiver can synchronize and generate a desired signal: G(t), which is supposed to be synchronized with zvector of U(t), i.e., \(U_z(t)\). Finally, we can decrypt the encrypted information S(t) with signal G(t) to receive the signal h(t).
To compare with the conventional scheme of secure communication shown in Fig. 7, our proposed method is designed based on a totally different idea, which has the following merits. First, the receiver in our scheme does not need equip a fixed dynamical system which is normally supposed to be as same type as the one in the transmitter. It can synchronize to the chaotic signal generated by any dynamical systems for encrypting in an adaptive manner. A complicated coupling between transmitter and receiver such that in conventional scheme is saved. Second, our proposed method can better adapt to the changes occurring in the chaotic system employed in transmitter. Normally, in traditional technique once the encrypting chaotic system is changed, the design of coupling and dynamical system in receiver has to be changed accordingly, which could involve hardware replacement and security reduced, while the proposed here can update itself intime just by learning a limited length of chaotic signal. Therefore, the security is enhanced and the cost is reduced. In terms of cost, though the CSTDR looks more complicated than a single TDR, its practical realization actually can use only one TDR. In the following hardware implementation of CSTDRbased secure communication, only one TDR is made by FPGA, the CSTDR computing can be conducted by multiplexing the same one. The cost increased is more about the algorithm part.
6 Numerical simulation and hardware implementation of the CSTDRbased communication scheme
6.1 Numerical results: image transmission using CSTDRbased communication scheme
In order to verify the effectiveness of the proposed scheme, the secure communication of image is numerically simulated. Taking the image shown in Fig. 8a whose standard size is \(300\times 300\times 3\) as an example, the image is firstly arranged into an onedimensional vector signal h(t). The signal h(t), as an useful signal waiting to be transmitted, needs to be encrypted. It is modulated to encrypted signal. The encryption equation can be adopted as follows:
where the \(U_z(t)\) is one vector the chaotic signal U(t) and S(t) is onedimensional vector after encryption. In order to increase the security performance, the absolute value of \(K_1/K_2\) is taken as large as possible. \(K_1=1.3\) and \(K_2=0.3\) are chosen in the study.
According to our scheme proposed above, the G(t) can be derived based on the transmitted S(t). The h(t) can be demodulated by using the following decryption equation:
Finally, the h(t) can be transformed into original image through the inverse process of sorting the data positions, as shown in Fig. 8c.
In this example, the Lorenz chaotic system is used, and we select xvector of U(t) as the driving signal and zvector of U(t) as the encryption signal. Specifically, the first 6100 data points are taken for training set L(t). The rest of the data are used as encrypted data set U(t). In receiver, four TDRs with additional output layer are used to synchronize the chaotic system. And in each TDR, 12 virtual nodes are generated.
6.2 Experimental result: practical video transmission using CSTDRbased communication scheme
According to the proposed scheme shown in Fig. 7b, the Xilinx xc7z020 Soc, as a popular chip which combines the advantage of the ARM core and FPGA, is used for hardware implementation.
The design diagram of transmitter and receiver is presented in Fig. 9a, b, respectively. In Fig. 9a, it consists of HDMI module, OV5640 module and Mul module. They are designed for video output, camera information processing and accelerating. In Fig. 9b, there are modules of CSTDR, HDMI and Mul, and the core of the receiver part is the CSTDR module. Limited by the onboard resources of Xilinx xc7z020 Soc, we use the HighLevel Synthesis [34] to build a single TDR model and use it for timedivision multiplexing to form the CSTDR computing. The accuracy of calculations is doubleprecision floatingpoint.
The working process diagram of the CSTDRbased communication scheme is shown in Fig. 10a. It is seen that both the transmitter and receiver start from flash, and first all the modules need to be initialized. Then, the transmitter generates a chaotic sequences as training threedimensional data set T(t), in which the \(T_x\) and \(T_z\) need to be sent to the receiver through Ethernet. After receiving, the receiver starts to train the CSTDR computing based on the training algorithm given in Sect. 3. Once the training is completed, all the weights affiliating to output layer in each TDR and additional output layer of CSTDR can be deployed. The rest working procedure including synchronization and decryption is as same as described above. The flowchart of data stream in the whole CSTDRbased communication process is shown in Fig. 10b.
Based on the FPGA design in Fig. 9a, b, the hardware realization is accomplished and given in Fig. 11a. An example of video transmission in the real world is experimentally conducted. The results are presented in Fig. 11b, c. In Fig. 11b, it can be seen that the video is encrypted. The receiver can decrypt the video with a high quality as shown in Fig. 11c.
It is worth to mention that for uncompressed video transmission based on our proposed scheme the reusing encryption data set should be taken in consideration. The resolution of image in video is normally about \(640\times 480\), i.e., the size of a frame is 921,600 bytes. Assuming 30 frames per second are transmitting, it needs at least an encryption data sequence of length 27,648,000 per second. Therefore, it is unrealistic to transfer uncompressed video without processing. One solution to this issue is to adopt reusing encryption data. Utilizing the method, the CSTDRbased communication can reach the maximum speed of 13.9 Mb/s.
7 Conclusion
In this work, a chainstructure timedelay reservoir (CSTDR) computing is proposed to realize the chaos synchronization in nonlinear dynamical systems. An order higher accuracy of complete synchronization than traditional TDR can be achieved. Based on the CSTDR computing, a novel scheme of secure communication is further put forward. Numerical simulation and digital implementation are both conducted for proving the feasibility of the scheme. By using ZYNQ 7020 Soc, the communication scheme is experimentally realized by hardware, which provides a more practical model on how to utilize our paradigm in reality. The work not only provides a deep RC models based on TDR but also extends the machine learning approach into practical applications, shedding light on the exploration of the intrinsic dynamics of deep TDRs and bespoke systems.
Abbreviations
 CSTDR:

Chainstructure timedelay reservoir
 TDR:

Timedelay reservoir
 FPGA:

Fieldprogrammable gate array
 RC:

Reservoir computing
 RNN:

Recurrent neural network
 DRESN:

Doublereservoir in parallel RC
 HDESN:

Hierarchical delaymemory echo state network
 intESN:

Integer echo state networks
 NMSE:

Normalized mean square error
 BroadESN:

Broad echo state network
References
M. Freiberger, S. Sackesyn, C. Ma, A. Katumba, P. Bienstman, J. Dambre, Improving time series recognition and prediction with networks and ensembles of passive photonic reservoirs. IEEE J. Sel. Top. Quantum Electron. 26(1), 1–11 (2020)
L. Gao, X. Deng, W. Yang, Smart city infrastructure protection: realtime threat detection employing online reservoir computing architecture. Neural Comput. Appl. 34, 833–842 (2021)
X. Zhu, X. Qiang, M. Tang, H. Li, F. Liu, A hybrid machine learning and computing model for forecasting displacement of multifactorinduced landslides. Neural Comput. Appl. 30, 3825–3835 (2018)
D. Patel, D. Canaday, M. Girvan, A. Pomerance, E. Ott, Using machine learning to predict statistical properties of nonstationary dynamical processes: system climate,regime transitions, and the effect of stochasticity. Chaos Interdiscip. J. Nonlinear Sci. 31(3), 033149 (2021)
D. Kleyko, E.P. Frady, M. Kheffache, E. Osipov, Integer echo state networks: efficient reservoir computing for digital hardware. IEEE Trans. Neural Netw. Learn. Syst. 1–14 (2020)
Q. An, K. Bai, L. Liu, F. Shen, Y. Yi, A unified information perceptron using deep reservoir computing. Comput. Electr. Eng. 85, 106705 (2020)
A. Jalalvand, K. Demuynck, W. De Neve, J.P. Martens, On the application of reservoir computing networks for noisy image recognition. Neurocomputing 277, 237–248 (2018)
J. Long, S. Zhang, C. Li, Evolving deep echo state networks for intelligent fault diagnosis. IEEE Trans. Ind. Inf. 16(7), 4928–4937 (2020)
N.A.K. Doan, W. Polifke, L. Magri, Physicsinformed echo state networks. J. Comput. Sci. 47, 101237 (2020)
Y.C. Bo, P. Wang, X. Zhang, An asynchronously deep reservoir computing for predicting chaotic time series. Appl. Soft Comput. 95, 106530 (2020)
H. Jaeger, H. Haas, Harnessing nonlinearity: predicting chaotic systems and saving energy in wireless communication. Science 304(5667), 78–80 (2004)
M.C. Soriano, S. Ortín, L. Keuninckx, L. Appeltant, J. Danckaert, L. Pesquera, G. van der Sande, Delaybased reservoir computing: noise effects in a combined analog and digital implementation. IEEE Trans. Neural Netw. Learn. Syst. 26(2), 388–393 (2015)
Z. Lu, J. Pathak, B. Hunt, M. Girvan, R. Brockett, E. Ott, Reservoir observers: modelfree inference of unmeasured variables in chaotic systems. Chaos Interdiscip. J. Nonlinear Sci. 27(4), 041102 (2017)
M. Rafayelyan, J. Dong, Y. Tan, F. Krzakala, S. Gigan, Largescale optical reservoir computing for spatiotemporal chaotic systems prediction. Phys. Rev. X 10, 041037 (2020)
S. Zhong, X. Xie, L. Lin, F. Wang, Genetic algorithm optimized doublereservoir echo state network for multiregime time series prediction. Neurocomputing 238, 191–204 (2017)
X. Yao, Z. Wang, Broad echo state network for multivariate time series prediction. J. Frankl. Inst. 356(9), 4888–4906 (2019)
X. Na, W. Ren, X. Xinghan, Hierarchical delaymemory echo state network: a model designed for multistep chaotic time series prediction. Eng. Appl. Artif. Intell. 102, 104229 (2021)
L. Appeltant, M.C. Soriano, G. Van der Sande, J. Danckaert, S. Massar, J. Dambre, B. Schrauwen, C.R. Mirasso, I. Fischer, Information processing using a single dynamical node as complex system. Nat. Commun. 2, 468 (2011)
T. Weng, J. Song, H. Yang, G. Changgui, J. Zhang, M. Small, Synchronization of reservoir computers with applications to communications. Physica A 544, 123453 (2020)
H. Fan, L.W. Kong, Y.C. Lai, X. Wang, Anticipating synchronization with machine learning. Phys. Rev. Res. 3(2), 023237 (2021)
A.J. Lawrance, T. Papamarkou, A. Uchida, Synchronized laser chaos communication: statistical investigation of an experimental system. IEEE J. Quantum Electron. 53(2), 1–10 (2017)
Z. He, K. Li, L. Yang, Y. Shi, A robust digital secure communication scheme based on sporadic coupling chaos synchronization. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 47(3), 397–403 (2000)
A. Tian, F. Chengbiao, H.T. Yau, S. XiaoYi, H. Xiong, A new methodology of soil salinization degree classification by probability neural network model based on centroid of fractional lorenz chaos selfsynchronization error dynamics. IEEE Trans. Geosci. Remote Sens. 58(2), 799–810 (2020)
L. Jin, Y. Zhang, L. Li, Onetomany chaotic synchronization with application in wireless sensor network. IEEE Commun. Lett. 17(9), 1782–1785 (2013)
S. Chen, Yu. Simin, J. Lü, G. Chen, J. He, Design and FPGAbased realization of a chaotic secure video communication system. IEEE Trans. Circuits Syst. Video Technol. 28(9), 2359–2371 (2018)
I. Grosu, E. Padmanaban, P.K. Roy, S.K. Dana, Designing coupling for synchronization and amplification of chaos. Phys. Rev. Lett. 100, 234102 (2008)
N. Jiang, A. Zhao, C. Xue, J. Tang, K. Qiu, Physical secure optical communication based on private chaotic spectral phase encryption/decryption. Opt. Lett. 44(7), 1536–1539 (2019)
L. Zhou, F. Tan, X. Li, L. Zhou, A fixedtime synchronizationbased secure communication scheme for twolayer hybrid coupled networks. Neurocomputing 433, 131–141 (2021)
E. Lorenz, Deterministic nonperiodic flow. J. Atmos. Sci. 20, 130–141 (1963)
R. Zhang, X. Li, W. Tong, Y. Zhao, Data clustering via uncorrelated ridge regression. IEEE Trans. Neural Netw. Learn. Syst. 32(1), 450–456 (2021)
P. Händel, Understanding normalized mean squared error in power amplifier linearization. IEEE Microw. Wirel. Compon. Lett. 28(11), 1047–1049 (2018)
T. Weng, H. Yang, G. Changgui, J. Zhang, M. Small, Synchronization of chaotic systems and their machinelearning models. Phys. Rev. E 99, 042203 (2019)
O.E. Rössler, An equation for continuous chaos. Phys. Lett. A 57(5), 397–398 (1976)
Xilinx. Vivado highlevel synthesis. https://www.xilinx.com/products/designtools/vivado/integration/esldesign.html. Accessed 20 July 2020
Acknowledgements
Not applicable.
Funding
The authors acknowledge the support from China Postdoctoral Science Foundation (No. 2019T120447).
Author information
Authors and Affiliations
Contributions
L. J and Z. L conceived the idea, prepared the manuscript, conducted numerical and experimental validations together. L. J and Z. L contributed equally to this manuscript. All authors took part in discussing the results. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Ethics approval and consent to participate
We declare that the studies in this work do not involve any human participants, human data, human tissue and animal.
Consent for publication
We declare that the manuscript does not contain any individual person’s data in any form (including individual details, images or videos).
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Jin, L., Liu, Z. & Li, L. Chainstructure timedelay reservoir computing for synchronizing chaotic signal and an application to secure communication. EURASIP J. Adv. Signal Process. 2022, 68 (2022). https://doi.org/10.1186/s13634022008930
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13634022008930