Skip to main content
Top
Published in: Journal of Medical Systems 5/2014

01-05-2014 | Education & Training

Chaos Based Encryption System for Encrypting Electroencephalogram Signals

Authors: Chin-Feng Lin, Shun-Han Shih, Jin-De Zhu

Published in: Journal of Medical Systems | Issue 5/2014

Login to get access

Abstract

In the paper, we use the Microsoft Visual Studio Development Kit and C# programming language to implement a chaos-based electroencephalogram (EEG) encryption system involving three encryption levels. A chaos logic map, initial value, and bifurcation parameter for the map were used to generate Level I chaos-based EEG encryption bit streams. Two encryption-level parameters were added to these elements to generate Level II chaos-based EEG encryption bit streams. An additional chaotic map and chaotic address index assignment process was used to implement the Level III chaos-based EEG encryption system. Eight 16-channel EEG Vue signals were tested using the encryption system. The encryption was the most rapid and robust in the Level III system. The test yielded superior encryption results, and when the correct deciphering parameter was applied, the EEG signals were completely recovered. However, an input parameter error (e.g., a 0.00001 % initial point error) causes chaotic encryption bit streams, preventing the recovery of 16-channel EEG Vue signals.
Literature
1.
go back to reference Hao, X., Wang, J., Yang, Q., et al., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37:9919, 2013.CrossRef Hao, X., Wang, J., Yang, Q., et al., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37:9919, 2013.CrossRef
2.
go back to reference Yau, W. C., and Phan, R. C. W., Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med. Syst 37:9993, 2013.CrossRef Yau, W. C., and Phan, R. C. W., Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med. Syst 37:9993, 2013.CrossRef
3.
go back to reference Jiang, Q., Ma, J., Lu, X., et al., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med. Syst 38:12, 2014.CrossRef Jiang, Q., Ma, J., Lu, X., et al., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med. Syst 38:12, 2014.CrossRef
4.
go back to reference Lee, T. F., An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med. Syst 37:9985, 2013.CrossRef Lee, T. F., An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med. Syst 37:9985, 2013.CrossRef
5.
go back to reference Lee, C. C., Hsu, C. W., Lai, Y. M., et al., An enhanced mobile-healthcare emergency system based on extended chaotic maps. J Med. Syst 37:9973, 2013.CrossRef Lee, C. C., Hsu, C. W., Lai, Y. M., et al., An enhanced mobile-healthcare emergency system based on extended chaotic maps. J Med. Syst 37:9973, 2013.CrossRef
6.
go back to reference Brinkmann, B. H., Bower, M. R., Stengel, K. A., et al., Large-scale electrophysiology: Acquisition, compression, encryption, and storage of big data. J. Neurosci. Methods 180:185–192, 2009.CrossRef Brinkmann, B. H., Bower, M. R., Stengel, K. A., et al., Large-scale electrophysiology: Acquisition, compression, encryption, and storage of big data. J. Neurosci. Methods 180:185–192, 2009.CrossRef
7.
go back to reference Ahmad, M., Sohail, S. S., Farooq, O., et al., Chaos-based encryption of biomedical EEG signals using random quantization technique. Proc. 4th Int. Conf. Biomed. Eng. Informa 3:1471–1475, 2011. Ahmad, M., Sohail, S. S., Farooq, O., et al., Chaos-based encryption of biomedical EEG signals using random quantization technique. Proc. 4th Int. Conf. Biomed. Eng. Informa 3:1471–1475, 2011.
8.
go back to reference Parveen, S., Parashar, S., and Izharuddin, Technique for providing security in medical signals. Proc. Int. Conf. Multimed. Sig. Process Commun. Technol. 68–71, 2011. Parveen, S., Parashar, S., and Izharuddin, Technique for providing security in medical signals. Proc. Int. Conf. Multimed. Sig. Process Commun. Technol. 68–71, 2011.
9.
go back to reference Yang, M. Bourbakis, N, and Li, S., Data, image, video encryption. IEEE Potentials 23:28–34, 2004. Yang, M. Bourbakis, N, and Li, S., Data, image, video encryption. IEEE Potentials 23:28–34, 2004.
10.
go back to reference Ou, C. M., Design of block ciphers by simple chaotic functions. IEEE Comput. Intell. Mag 3:54–59, 2009.CrossRef Ou, C. M., Design of block ciphers by simple chaotic functions. IEEE Comput. Intell. Mag 3:54–59, 2009.CrossRef
11.
go back to reference Kocarev, L., Chaos-based cryptography: A brief overview. IEEE Circ. Syst. Mag 1:6–21, 2001.CrossRef Kocarev, L., Chaos-based cryptography: A brief overview. IEEE Circ. Syst. Mag 1:6–21, 2001.CrossRef
12.
go back to reference Ford, J., What is chaos, that we should be mindful of it? In: Paul, D. (Ed.), The New Physics. Cambridge University Press, Cambridge, pp. 348–372, 1992. Ford, J., What is chaos, that we should be mindful of it? In: Paul, D. (Ed.), The New Physics. Cambridge University Press, Cambridge, pp. 348–372, 1992.
13.
go back to reference Kotulski, Z., and Szczepanski, J., Discrete chaotic cryptography. Ann. Phys. 6:381–394, 1997.CrossRefMATH Kotulski, Z., and Szczepanski, J., Discrete chaotic cryptography. Ann. Phys. 6:381–394, 1997.CrossRefMATH
15.
16.
go back to reference Marco, G., Kristina, K., and Wolfgang, S., Discrete-time chaotic encryption systems–Part I: Statistical design approach. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:963–970, 1997.CrossRef Marco, G., Kristina, K., and Wolfgang, S., Discrete-time chaotic encryption systems–Part I: Statistical design approach. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:963–970, 1997.CrossRef
17.
go back to reference Frank, D., and Kristina, W. S., Discrete-time chaotic encryption systems–Part III: Cryptographical analysis. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 45:983–988, 1998.CrossRef Frank, D., and Kristina, W. S., Discrete-time chaotic encryption systems–Part III: Cryptographical analysis. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 45:983–988, 1998.CrossRef
18.
go back to reference Yang, T., Wu, W., and Chua, L. O., Cryptography based on chaotic systems. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:469–472, 1997.CrossRefMATH Yang, T., Wu, W., and Chua, L. O., Cryptography based on chaotic systems. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:469–472, 1997.CrossRefMATH
19.
go back to reference Zhou, H., and Ling, X. T., Problems with the chaotic inverse system encryption approach. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:268–271, 1997.CrossRef Zhou, H., and Ling, X. T., Problems with the chaotic inverse system encryption approach. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 44:268–271, 1997.CrossRef
20.
go back to reference Murali, K., Yu, H., Varadan, V., et al., Secure communication using a chaos based signal encryptionscheme. IEEE Trans. Comsumer Electron 47:709–714, 2001.CrossRef Murali, K., Yu, H., Varadan, V., et al., Secure communication using a chaos based signal encryptionscheme. IEEE Trans. Comsumer Electron 47:709–714, 2001.CrossRef
21.
go back to reference Jakimoski, G., and Kocarev, L., Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 48:163–169, 2001.CrossRefMATHMathSciNet Jakimoski, G., and Kocarev, L., Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 48:163–169, 2001.CrossRefMATHMathSciNet
23.
go back to reference Masuda, N., and Aihara, K., Cryptosystems with discretized chaotic maps. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 49:28–40, 2002.CrossRefMathSciNet Masuda, N., and Aihara, K., Cryptosystems with discretized chaotic maps. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 49:28–40, 2002.CrossRefMathSciNet
25.
26.
go back to reference Liao, X., Pen, J., and Chen, G., A digital secure image communication scheme based on the chaotic Chebyshev map. Int. J. Commun. Syst 17:437–445, 2004.CrossRef Liao, X., Pen, J., and Chen, G., A digital secure image communication scheme based on the chaotic Chebyshev map. Int. J. Commun. Syst 17:437–445, 2004.CrossRef
27.
go back to reference Yen, J. C., and Guo, J. I., Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation. IEE Proc. Vis. Image Signal Proc 147:167–175, 2000.CrossRef Yen, J. C., and Guo, J. I., Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation. IEE Proc. Vis. Image Signal Proc 147:167–175, 2000.CrossRef
28.
go back to reference Masuda, N., Jakimoski, G., Aihara, A., et al., Chaotic block ciphers: From theory to practical algorithms. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 53:1341–1352, 2006.CrossRefMathSciNet Masuda, N., Jakimoski, G., Aihara, A., et al., Chaotic block ciphers: From theory to practical algorithms. IEEE Trans. Circ. Syst. I: Fundam. Theory Appl. 53:1341–1352, 2006.CrossRefMathSciNet
29.
go back to reference Lin, C. F., Chang, W. T., and Li, C. Y., A chaos-based visual encryption mechanism in JPEG2000 medical images. J. Med. Biol. Eng. 27:144–149, 2007. Lin, C. F., Chang, W. T., and Li, C. Y., A chaos-based visual encryption mechanism in JPEG2000 medical images. J. Med. Biol. Eng. 27:144–149, 2007.
30.
go back to reference Lin, C. F., Chung, C. H., Chen, Z. L., et al., A chaos-based unequal encryption mechanism in wireless telemedicine with error decryption. WSEAS Trans. Syst 2:49–55, 2008.MathSciNet Lin, C. F., Chung, C. H., Chen, Z. L., et al., A chaos-based unequal encryption mechanism in wireless telemedicine with error decryption. WSEAS Trans. Syst 2:49–55, 2008.MathSciNet
31.
go back to reference Lin, C. F., Mobile telemedicine–A survey study. J Med. Syst 36:511–520, 2012.CrossRef Lin, C. F., Mobile telemedicine–A survey study. J Med. Syst 36:511–520, 2012.CrossRef
32.
go back to reference Lin, C. F., Chung, C. H., and Lin, J. H., A chaos-based visual encryption mechanism for clinic EEG signals. Med. Biol. Eng. Comput 47:757–762, 2009.CrossRef Lin, C. F., Chung, C. H., and Lin, J. H., A chaos-based visual encryption mechanism for clinic EEG signals. Med. Biol. Eng. Comput 47:757–762, 2009.CrossRef
33.
go back to reference Lin, C. F., and Wang, B. S. H., A 2D chaos-based visual encryption scheme for clinical EEG signals. J. Mar. Sci. Technol. Taiwan 19:666–672, 2011. Lin, C. F., and Wang, B. S. H., A 2D chaos-based visual encryption scheme for clinical EEG signals. J. Mar. Sci. Technol. Taiwan 19:666–672, 2011.
34.
go back to reference Lin, C. F., Chaos-based 2D visual encryption mechanism for ECG medical signals. In: Thomas, S. C. (Ed.), Horizons in Computer Science Research, vol. 4. Nova, USA, pp. 205–217, 2012. Lin, C. F., Chaos-based 2D visual encryption mechanism for ECG medical signals. In: Thomas, S. C. (Ed.), Horizons in Computer Science Research, vol. 4. Nova, USA, pp. 205–217, 2012.
35.
go back to reference Lin, C.F., Shih, S.H., and Zhu, J.D., Implementation of an offline chaos-based EEG encryption software. Proc. IEEE 14th Int. Conf. Adv. Commun. Tech. 430–433, 2012. Lin, C.F., Shih, S.H., and Zhu, J.D., Implementation of an offline chaos-based EEG encryption software. Proc. IEEE 14th Int. Conf. Adv. Commun. Tech. 430–433, 2012.
36.
go back to reference Lin, C.F., Shih, S.H., Zhu, J.D., et al., C# based EEG encryption system using chaos algorithm. Proc. 1st Int. Conf. Compl. Syst. Chaos (COSC’13). 59–62, 2013. Lin, C.F., Shih, S.H., Zhu, J.D., et al., C# based EEG encryption system using chaos algorithm. Proc. 1st Int. Conf. Compl. Syst. Chaos (COSC’13). 59–62, 2013.
Metadata
Title
Chaos Based Encryption System for Encrypting Electroencephalogram Signals
Authors
Chin-Feng Lin
Shun-Han Shih
Jin-De Zhu
Publication date
01-05-2014
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 5/2014
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-014-0049-6

Other articles of this Issue 5/2014

Journal of Medical Systems 5/2014 Go to the issue