Skip to main content

Advertisement

Log in

Biosignal encryption algorithm based on Ushio chaotic map for e-health

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In last years, chaos-based encryption algorithms have been proposed in the literature to provide information confidentiality in digital images, biometric systems, telemedicine, multiuser networks, among others. In e-health, the confidentiality of biomedical signals is required to avoid illegal activities such as identity theft, wrong medical prescription, fraud or extortion against patients or the healthcare entities. On the other hand, improve the randomness of the chaotic map can increase the randomness of the cryptograms and thus, increase the security of the whole cryptosystem. In this paper, we first propose to improve the randomness of five selected chaotic maps by using trigonometric (sine, cosine and tangent) and the exponential function combined with module one operation. Then, we use the monobit test of NIST 800-22 suite to determine the level of achieved randomness. Finally, we use the selected chaotic map in an encryption algorithm for clinical signals based on improved sequences of two Ushio maps and just one round of confusion-diffusion process. In experimental results, we use electrocardiogram (ECG), electroencephalogram (EEG), and blood pressure signals from PhysioBank ATM data base at different sampling frequency and records of 10 seconds. Based on the simulation results in MATLAB, the main findings are (1) the 2D Ushio map with exponential function and module one achieves the best randomness with 0.9760 in P_value; (2) the encryption scheme presents high robustness against known attacks such extreme sensitivity to plain biosignal and the 128-bit secret key, correlation between plain biosignal and cryptogram close to 0, autocorrelation of cryptogram close to 0, floating frequency of 82.4%, uniform histograms in cryptograms, robustness against noise and occlusion attacks, and high speed of encryption; (3) the cryptosystem can be implemented in (low-cost) limited processing systems such as microcontrollers for wireless body area networks (WBAN) applications in e-health; (4) the propose encryption approach can be used to transmit medical signals securely in e-health for monitoring or diagnosis of diseases.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

Data Availability

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Algarni AD, Soliman NF, Abdallah HA, et al. (2021) Encryption of ECG signals for telemedicine applications. Multimed Tools Appl 80:10679–10703. https://doi.org/10.1007/s11042-020-09369-5

    Article  Google Scholar 

  2. Al-Zubaidie M, Zhang Z, Zhang J (2019) RAMHU: a new robust lightweight scheme for mutual users authentication in healthcare applications. Secur Commun Netw 2019:1–26. https://doi.org/10.1155/2019/3263902

    Article  Google Scholar 

  3. Belazi A, Kharbech S, Aslam MN, Talha M, Xiang W, Iliyasu AM, El-Latif AAA (2022) Improved Sine-Tangent chaotic map with application in medical images encryption. J Inf Secur Appl 66:1–24. https://doi.org/10.1016/j.jisa.2022.103131

    Article  Google Scholar 

  4. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption based on 3D chaotic cat maps. Chaos Soliton Fract 21:749–761. https://doi.org/10.1016/j.chaos.2003.12.022

    Article  MathSciNet  MATH  Google Scholar 

  5. Hénon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50:69–77. https://doi.org/10.1007/BF01608556

    Article  MathSciNet  MATH  Google Scholar 

  6. Huang L, Li W, Xiong X, Rong Y u, et al. (2022) Designing a double-way spread permutation framework utilizing chaos and S-box for symmetric image encryption. Opt Commun 517:1–14. https://doi.org/10.1016/j.optcom.2022.128365

    Article  Google Scholar 

  7. Jiang Q, Ma J, Yang C et al (2017) Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput Electr Eng 63:182–195. https://doi.org/10.1016/j.compeleceng.2017.03.016

    Article  Google Scholar 

  8. Ke G, Wang W, Zhou S, Zhang S (2019) Encryption of medical image with most significant bit and high capacity in piecewise linear chaos graphics. Measurement 135:385–391. https://doi.org/10.1016/j.measurement.2018.11.074

    Article  Google Scholar 

  9. Kenfack G, Tiedeu A (2014) Chaos-based encryption of ECG signals: experimental results. J Biomed Eng 7:368–379. https://doi.org/10.4236/jbise.2014.76039

    Article  Google Scholar 

  10. Kiryanov A, Wilson M, Aboites V, Barmenkov Y (2014) Bidimensional dynamic maps in optical resonators. Revista Mexicana de Física 60:13–23. https://www.redalyc.org/articulo.oa?id=57048160002. Accessed Nov 2021

    MathSciNet  Google Scholar 

  11. Kocarev L, Lian S (2011) Chaos-Based Cryptography. Theory, algorithms and applications. Springer, Berlin. https://doi.org/10.1007/978-3-642-20542-2

    Book  MATH  Google Scholar 

  12. Kumar KBS, Sujatha BR (2022) FPGA Design of an efficient EEG signal transmission through 5G wireless network using optimized pilot based channel estimation: a telemedicine application. Wireless Pers Commun 123:3597–3621. https://doi.org/10.1007/s11277-021-09305-2

    Article  Google Scholar 

  13. Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21–27. https://doi.org/10.1016/j.jvcir.2014.12.007https://doi.org/10.1016/j.jvcir.2014.12.007

    Article  Google Scholar 

  14. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76:20739–20753. https://doi.org/10.1007/s11042-016-3971-4

    Article  Google Scholar 

  15. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156. https://doi.org/10.1016/j.image.2017.07.006

    Article  Google Scholar 

  16. Lin CF, Shih SH, Zhu JD (2014) Chaos based encryption system for encrypting electroencephalogram signals. J Med Syst 38:1–10. https://doi.org/10.1007/s10916-014-0049-6

    Article  Google Scholar 

  17. Lin CF, Chang CY (2012) Implementation of a chaos-based encryption software for electroencephalogram signals. In: Jin D, Lin S (eds) Advances in electronic commerce, web application and communication. Advances in Intelligent and Soft Computing, vol 148. Springer, Berlin, DOI https://doi.org/10.1007/978-3-642-28655-1_23

  18. Lin CF, Chung CH, Lin JH (2009) A chaos-based visual encryption mechanism for clinical EEG signals. Med Biol Eng Comput 47:757–762. https://doi.org/10.1007/s11517-009-0458-8

    Article  Google Scholar 

  19. Lorenz EN (1993) The essence of chaos. University of Washington Press. Seattle. https://uwapress.uw.edu/book/9780295975146/the-essence-of-chaos/. Accessed Jan 2022

  20. May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261:459–467. https://doi.org/10.1038/261459a0

    Article  MATH  Google Scholar 

  21. Méndez-Ramírez R, Arellano-Delgado A, Cruz-Hernández C, Abundiz-Perez F, Martinez-Clark R (2018) Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation. Frontiers Inf Technol Electronic Eng 19:165–179. https://doi.org/10.1631/FITEE.1601346

    Article  Google Scholar 

  22. Michel-Macarty JA, Murillo-Escobar MA, López-Gutiérrez RM, Cruz-Hernández C, Cardoza-Avendaño L (2018) Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine. Comput Meth Prog Bio 162:165–175. https://doi.org/10.1016/j.cmpb.2018.05.021

    Article  Google Scholar 

  23. Murillo-Escobar MA, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez RM, Acosta Del Campo OR (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119–131. https://doi.org/10.1016/j.sigpro.2014.10.033

    Article  Google Scholar 

  24. Murillo-Escobar MA, Cruz-Hernández C, Cardoza-Avendaño L, Murillo-Escobar D, López-Gutiérrez RM (2022) Multibiosignal chaotic encryption scheme based on spread spectrum and global diffusion process for e-health. Biomed Signal Process Control 78:1–20. https://doi.org/10.1016/j.bspc.2022.104001

    Article  Google Scholar 

  25. Murillo-Escobar MA, Cardoza-Avendaño L, López-Gutiérrez RM, Cruz-Hernández C (2017) A double chaotic layer encryption algorithm for clinical signals in telemedicine. J Med Syst 41:1–17. https://doi.org/10.1007/s10916-017-0698-3

    Article  Google Scholar 

  26. Pandey A, Singh B, Saini BS, Sood N (2019) A novel fused coupled chaotic map based confidential data embedding-then-encryption of electrocardiogram signal. Biocybern Biomed Eng 32:282–300. https://doi.org/10.1016/j.bbe.2018.11.012

    Article  Google Scholar 

  27. Physionet.org (2016) PhysioBank ATM. Online, available on: https://physionet.org/cgi-bin/atm/ATM Accessed May 2022

  28. Raeiatibanadkooki M, Quchani SR, KhalilZade M, Bahaadinbeigy K (2016) Compression and encryption of ECG signal using wavelet and chaotically huffman code in telemedicine application. J Med Syst 40:1–8. https://doi.org/10.1007/s10916-016-0433-5

    Article  Google Scholar 

  29. Rukhin A, Soto J, Nechvatal J et al (2010) Statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Spec Publ 800-22:1–131. http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151222. Accessed Sept 2021

    Google Scholar 

  30. Sajedi H, Yaghobi SR (2020) Information hiding methods for E-Healthcare. Smart Health 15:1–11. https://doi.org/10.1016/j.smhl.2019.100104

    Article  Google Scholar 

  31. Soni M, Singh DK (2022) Privacy-preserving secure and low-cost medical data communication scheme for smart healthcare. Comput Commun 194:292–300. https://doi.org/10.1016/j.comcom.2022.07.046

    Article  Google Scholar 

  32. SS Şen, Cicioğlu M, Çalhan A (2021) IoT-based GPS assisted surveillance system with inter-WBAN geographic routing for pandemic situations. J Biomed Inform 116:103731. https://doi.org/10.1016/j.jbi.2021.103731

    Article  Google Scholar 

  33. Susanto A (2016) Stream cipher algorithm with Ikeda map trajectories. International Conference on Data and Software Engineering (ICoDSE) Denpasar. Indonesia 1–6. https://doi.org/10.1109/ICODSE.2016.7936160

  34. Ushio T (1995) Chaotic synchronization and controlling chaos based on contraction mapping. Phys Lett A 198:14–22. https://doi.org/10.1016/0375-9601(94)01015-M

    Article  MathSciNet  MATH  Google Scholar 

  35. Wang J, Han K, Fan S, et al. (2020) A logistic mapping-based encryption scheme for Wireless Body Area Networks. Future Gener Comp Sy 110:57–67. https://doi.org/10.1016/j.future.2020.04.002

    Article  Google Scholar 

  36. Wolf A (2014). In: Holden A.V. (ed) Quantifying chaos with Lyapunov exponents. Chaos. Princeton University Press, Princeton

Download references

Acknowledgements

This work was supported by the CONACYT, Mexico under Research Grant 166654 (A1-S-31628).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rosa Martha López-Gutiérrez.

Ethics declarations

Conflict of Interests

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Murillo-Escobar, M.Á., Quintana-Ibarra, J.A., Cruz-Hernández, C. et al. Biosignal encryption algorithm based on Ushio chaotic map for e-health. Multimed Tools Appl 82, 23373–23399 (2023). https://doi.org/10.1007/s11042-022-14092-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-14092-4

Keywords