Abstract
In this study, we have developed a chaos-based visual encryption mechanism that can be applied for clinical electroencephalography (EEG) signals. In comparison with other types of random sequences, chaos sequences were mainly used to increase unpredictability. We used a 1D chaotic scrambler and a permutation scheme to achieve EEG visual encryption. One approach of realizing the visual encryption mechanism is to scramble the signal values of the input EEG signal by multiplying a 1D chaotic signal to randomize the EEG signal values. We then applied a chaotic address scanning order encryption to the randomized reference values. Simulation results show that when the correct deciphering parameters are entered, the signal is completely recovered, and the percent root-mean-square difference (PRD) values for control and alcoholic clinical EEG signals are 4.33 × 10−15 and 4.11 × 10−15%, respectively. As long as there is an input parameter error, with an initial point error of 0.00000001% as an example, thereby making these clinical EEG signals unrecoverable.
Similar content being viewed by others
References
Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circuits Syst I Fundam Theory Appl 48(12):1498–1509. doi:10.1109/TCSI.2001.972857
Friedrich J (1997) Image encryption based on chaotic maps. In: IEEE international conference on computational cybernetics and simulation, pp 1105–1110
Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits System Magazine 6–21
Li S, Zheng X (2002) On the security of an image encryption method. In: IEEE international conference on image processing, pp 925–928
Li Y, Liang L, Su Z, Jiang J (2005) A new video encryption algorithm for H.264. IEEE ICICS 1121–1124
Lin CF Chung CH, Chen ZL, Song CJ, Wang ZX (2008) A chaos-based unequal encryption mechanism in wireless telemedicine with error decryption. WSEAS Trans Syst 49–55
Lin CF, Chung CS (2006) A chaos base visual encryption mechanism in ECG medical signal. In: World congress on medical physics and biomedical engineering, pp 2250–2253
Lin CF, Chung CH (2008) A chaos-based visual encryption mechanism in integrated ECG/EEG medical signals. In: IEEE the 10th international conference on advanced communication technique, pp 1903–1907
Lin CF, Chang WT, Lee HW, Hung SI (2006) Downlink power control in multi-code CDMA mobile medicine system. Med Biol Eng Comput 44:437–444. doi:10.1007/s11517-006-0058-9
Lin CF, Chang WT, Li CY (2007) A chaos-based visual encryption mechanism in JPEG2000 medical images. J Med Biol Eng 27(3):144–149
Lin CF, Chen JY, Shiu RH, Chang SH (2008) A Ka band WCDMA-based LEO transport architecture in mobile telemedicine, appear in telemedicine in the 21st century. Nova Science Publishers Inc., USA
Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia XIII(1):29–41. doi:10.1080/0161-118991863745
Miaou SG, Chen ST, Lin CL (2002) An integration design of compression and encryption for biomedical signals. J Med Biol Eng 22(4):183–192
Naor M, Shamir A (1994) Visual cryptography. Eurocrypt pp 1–12
Tao R, Lang J, Wang Y (2008) Optical image encryption based on the multiple-parameter fractional transform. Opt Lett 33(6):581–583. doi:10.1364/OL.33.000581
Wheeler DD (1989) Problems with chaotic cryptosystems. Cryptologia XIII(3):243–250. doi:10.1080/0161-118991863934
Yan M, Bourbakis N, Li S (2004) Data, image, video encryption. IEEE Potential pp 28–34
Yen JC, Guo JI (2000) Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation. IEE Proc Vis Image Signal Process 147(2):167–175. doi:10.1049/ip-vis:20000208
Yuan S, Zhou X, Li DH, Zhou DF (2007) Simultaneous transmission for an encrypted image and a double random phase encryption key. Appl Opt 46(18):3747–3753. doi:10.1364/AO.46.003747
Acknowledgment
The authors acknowledge the support of The Teacher Research Project of National Taiwan Ocean University 95b60202 and the valuable comments of the reviewers.
Author information
Authors and Affiliations
Corresponding author
Appendices
Appendix 1
The encryption process shown in Fig. 1 is given as follows:
-
Step 1: Select a chaotic logistic map type CMT F of F CIA, the starting point SP F of CMT F , the length L F for an encrypted clinical EEG signal, and the parameters n F and δ F for the security level.
-
Step 2: Generate a chaotic sequence with length n F .
$$ x_{n + 1} = {\text{CMT}}\left( {x_{n} } \right); \quad x_{0} = {\text{SP}}_{F}; \quad n = \left\{ { 1, 2, \ldots , n_{F} } \right\} $$(4) -
Step 3: Discard the previous n F chaotic sequence.
-
Step 4: Generate a chaotic sequence
$$ x_{n} = {\text {CMT}}(x_{{n_{F} + 1}} ); \quad n = \left\{ {n_{F} + 1, \ldots } \right\} $$ -
Step 5: If x n > δ F ; discard x n ; and go to step 4. else; go to step 6; end.
-
Step 6:
$$ m_{k} = \left\lceil {\frac{1}{{x_{n} }}} \right\rceil $$(5)\( if\,m_{k} \notin \{ m_{1} , \ldots ,m_{k - 1} \}; M = \{ m_{1} , \ldots ,m_{k - 1} ,m_{k} \} ; \) go to step 7. else; go to step 4; end.
-
Step 7: If k = L F
$$ M = \{ m_{1} ,m_{2} , \ldots ,m_{{L_{F} }} \}; \quad m_{C}^{*} = \max \{ m_{1} ,m_{2} , \ldots ,m_{{L_{F} }} \} $$(6)else; go to step 4; end.
-
Step 8: Deliver \( m_{C}^{*} \) to the chaotic candidate point generator process G CCS.
-
Step 9: Deliver a chaotic logistic map type CMT G of G CCS, which is the starting point SP G of CMT G .
-
Step 10: Generate a chaotic sequence with length \( m_{C}^{*} \).
$$ g_{n + 1} = {\text {CMT}}_{G} (g_{n} ); \quad g_{0} = {\text {SP}}_{G} ; \quad n = \{ 1,2, \ldots ,m_{C}^{*} \}; \quad G = \{ g_{1} , \ldots ,g_{{m_{C}^{*} }} \} $$(7) -
Step 11: Deliver M to the chaotic candidate point generator process G CCS.
-
Step 12: Generate encrypted chaotic signal CE.
$$ M = \{ m_{1} ,m_{2} , \ldots ,m_{{L_{F} }} \}; \quad G = \{ g_{1} , \ldots ,g_{{m_{C}^{*} }} \}; \quad {\text {CE}} = \{ g_{{m_{1} }} ,g_{m2} , \ldots ,g_{{m_{{L_{F} }} }} \} $$(8) -
Step 13: Deliver EEG medical signal EEGS with length L F to G CCS
$$ {\text {EEGS}} = \{ {\text {eeg}}_{1} , \ldots ,{\text {eeg}}_{{L_{F} }} \} $$ -
Step 14: Generate encrypted clinical EEG signal GEEG.
$$ \begin{array}{l} {EEGS = \left\{ {eeg_{1} , \ldots ,eeg_{{L_{F} }} } \right\}; \quad CE = \left\{ {g_{{m_{1} }} ,g_{{m_{2} }} , \ldots ,g_{{m_{{L_{F} }} }} } \right\}} \hfill \\ {GEEG = EEGS \cdot CE = \left\{ {eeg_{1} \cdot g_{{m_{1} }} ,eeg_{2} \cdot g_{{m_{2} }} , \ldots ,eeg_{{L_{F} }} \cdot g_{{m_{{L_{F} }} }} } \right\}} \hfill \\ { = \left\{ {geeg_{1} , \ldots ,geeg_{{L_{F} }} } \right\}} \hfill \\ \end{array} $$(9)
Appendix 2
The chaotic scanning encryption mechanism S csem that we developed is given as follows:
-
Steps 1–5 are the same as those given in Appendix 1.
-
Step 6:
$$ m_{k} = \left\lceil {\frac{1}{{x_{n} }}} \right\rceil $$(10)\( if\,m_{k} \le L_{F} ;m_{k} \notin \{ m_{1} , \ldots ,m_{k - 1} \} ;M = \{ m_{1} , \ldots ,m_{k - 1} ,m_{k} \} ; \) go to step 7. else; go to step 4; end.
-
Step 7: If k = L F \( M = \{ m_{1} ,m_{2} , \ldots ,m_{{L_{F} }} \} ; \) else; go to step 4; end.
-
Step 8: Deliver M to the output encrypted signal process.
-
Step 9: Deliver the encrypted clinical EEG signal GEEG to output encrypted signal process.
-
Step 10: Generate chaotic scanning of the encrypted clinical EEG signal SGEEG.
$$ \begin{array}{l} {GEEG = \left\{ {geeg_{1} , \ldots ,geeg_{{L_{F} }} } \right\}; \quad M = \left\{ {m_{1} ,m_{2} , \ldots ,m_{{L_{F} }} } \right\}} \hfill \\ {SGEEG = \left\{ {geeg_{{m_{1} }} ,geeg_{{m_{2} }} , \ldots ,geeg_{{m_{{L_{F} }} }} } \right\} = \left\{ {sgeeg_{1} ,sgeeg_{2} , \ldots ,sgeeg_{{L_{F} }} } \right\}} \hfill \\ \end{array} $$(11)
Rights and permissions
About this article
Cite this article
Lin, CF., Chung, CH. & Lin, JH. A chaos-based visual encryption mechanism for clinical EEG signals. Med Biol Eng Comput 47, 757–762 (2009). https://doi.org/10.1007/s11517-009-0458-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11517-009-0458-8