Skip to main content

Advertisement

Log in

A chaos-based visual encryption mechanism for clinical EEG signals

  • Original Article
  • Published:
Medical & Biological Engineering & Computing Aims and scope Submit manuscript

Abstract

In this study, we have developed a chaos-based visual encryption mechanism that can be applied for clinical electroencephalography (EEG) signals. In comparison with other types of random sequences, chaos sequences were mainly used to increase unpredictability. We used a 1D chaotic scrambler and a permutation scheme to achieve EEG visual encryption. One approach of realizing the visual encryption mechanism is to scramble the signal values of the input EEG signal by multiplying a 1D chaotic signal to randomize the EEG signal values. We then applied a chaotic address scanning order encryption to the randomized reference values. Simulation results show that when the correct deciphering parameters are entered, the signal is completely recovered, and the percent root-mean-square difference (PRD) values for control and alcoholic clinical EEG signals are 4.33 × 10−15 and 4.11 × 10−15%, respectively. As long as there is an input parameter error, with an initial point error of 0.00000001% as an example, thereby making these clinical EEG signals unrecoverable.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circuits Syst I Fundam Theory Appl 48(12):1498–1509. doi:10.1109/TCSI.2001.972857

    Article  MATH  MathSciNet  Google Scholar 

  2. Friedrich J (1997) Image encryption based on chaotic maps. In: IEEE international conference on computational cybernetics and simulation, pp 1105–1110

  3. Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits System Magazine 6–21

  4. Li S, Zheng X (2002) On the security of an image encryption method. In: IEEE international conference on image processing, pp 925–928

  5. Li Y, Liang L, Su Z, Jiang J (2005) A new video encryption algorithm for H.264. IEEE ICICS 1121–1124

  6. Lin CF Chung CH, Chen ZL, Song CJ, Wang ZX (2008) A chaos-based unequal encryption mechanism in wireless telemedicine with error decryption. WSEAS Trans Syst 49–55

  7. Lin CF, Chung CS (2006) A chaos base visual encryption mechanism in ECG medical signal. In: World congress on medical physics and biomedical engineering, pp 2250–2253

  8. Lin CF, Chung CH (2008) A chaos-based visual encryption mechanism in integrated ECG/EEG medical signals. In: IEEE the 10th international conference on advanced communication technique, pp 1903–1907

  9. Lin CF, Chang WT, Lee HW, Hung SI (2006) Downlink power control in multi-code CDMA mobile medicine system. Med Biol Eng Comput 44:437–444. doi:10.1007/s11517-006-0058-9

    Article  Google Scholar 

  10. Lin CF, Chang WT, Li CY (2007) A chaos-based visual encryption mechanism in JPEG2000 medical images. J Med Biol Eng 27(3):144–149

    Article  Google Scholar 

  11. Lin CF, Chen JY, Shiu RH, Chang SH (2008) A Ka band WCDMA-based LEO transport architecture in mobile telemedicine, appear in telemedicine in the 21st century. Nova Science Publishers Inc., USA

    Google Scholar 

  12. Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia XIII(1):29–41. doi:10.1080/0161-118991863745

    Article  MathSciNet  Google Scholar 

  13. Miaou SG, Chen ST, Lin CL (2002) An integration design of compression and encryption for biomedical signals. J Med Biol Eng 22(4):183–192

    Google Scholar 

  14. Naor M, Shamir A (1994) Visual cryptography. Eurocrypt pp 1–12

  15. Tao R, Lang J, Wang Y (2008) Optical image encryption based on the multiple-parameter fractional transform. Opt Lett 33(6):581–583. doi:10.1364/OL.33.000581

    Article  Google Scholar 

  16. Wheeler DD (1989) Problems with chaotic cryptosystems. Cryptologia XIII(3):243–250. doi:10.1080/0161-118991863934

    Article  Google Scholar 

  17. Yan M, Bourbakis N, Li S (2004) Data, image, video encryption. IEEE Potential pp 28–34

  18. Yen JC, Guo JI (2000) Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation. IEE Proc Vis Image Signal Process 147(2):167–175. doi:10.1049/ip-vis:20000208

    Article  Google Scholar 

  19. Yuan S, Zhou X, Li DH, Zhou DF (2007) Simultaneous transmission for an encrypted image and a double random phase encryption key. Appl Opt 46(18):3747–3753. doi:10.1364/AO.46.003747

    Article  Google Scholar 

Download references

Acknowledgment

The authors acknowledge the support of The Teacher Research Project of National Taiwan Ocean University 95b60202 and the valuable comments of the reviewers.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Feng Lin.

Appendices

Appendix 1

The encryption process shown in Fig. 1 is given as follows:

  • Step 1: Select a chaotic logistic map type CMT F of F CIA, the starting point SP F of CMT F , the length L F for an encrypted clinical EEG signal, and the parameters n F and δ F for the security level.

  • Step 2: Generate a chaotic sequence with length n F .

    $$ x_{n + 1} = {\text{CMT}}\left( {x_{n} } \right); \quad x_{0} = {\text{SP}}_{F}; \quad n = \left\{ { 1, 2, \ldots , n_{F} } \right\} $$
    (4)
  • Step 3: Discard the previous n F chaotic sequence.

  • Step 4: Generate a chaotic sequence

    $$ x_{n} = {\text {CMT}}(x_{{n_{F} + 1}} ); \quad n = \left\{ {n_{F} + 1, \ldots } \right\} $$
  • Step 5: If x n  > δ F ; discard x n ; and go to step 4. else; go to step 6; end.

  • Step 6:

    $$ m_{k} = \left\lceil {\frac{1}{{x_{n} }}} \right\rceil $$
    (5)

    \( if\,m_{k} \notin \{ m_{1} , \ldots ,m_{k - 1} \}; M = \{ m_{1} , \ldots ,m_{k - 1} ,m_{k} \} ; \) go to step 7. else; go to step 4; end.

  • Step 7: If k = L F

    $$ M = \{ m_{1} ,m_{2} , \ldots ,m_{{L_{F} }} \}; \quad m_{C}^{*} = \max \{ m_{1} ,m_{2} , \ldots ,m_{{L_{F} }} \} $$
    (6)

    else; go to step 4; end.

  • Step 8: Deliver \( m_{C}^{*} \) to the chaotic candidate point generator process G CCS.

  • Step 9: Deliver a chaotic logistic map type CMT G of G CCS, which is the starting point SP G of CMT G .

  • Step 10: Generate a chaotic sequence with length \( m_{C}^{*} \).

    $$ g_{n + 1} = {\text {CMT}}_{G} (g_{n} ); \quad g_{0} = {\text {SP}}_{G} ; \quad n = \{ 1,2, \ldots ,m_{C}^{*} \}; \quad G = \{ g_{1} , \ldots ,g_{{m_{C}^{*} }} \} $$
    (7)
  • Step 11: Deliver M to the chaotic candidate point generator process G CCS.

  • Step 12: Generate encrypted chaotic signal CE.

    $$ M = \{ m_{1} ,m_{2} , \ldots ,m_{{L_{F} }} \}; \quad G = \{ g_{1} , \ldots ,g_{{m_{C}^{*} }} \}; \quad {\text {CE}} = \{ g_{{m_{1} }} ,g_{m2} , \ldots ,g_{{m_{{L_{F} }} }} \} $$
    (8)
  • Step 13: Deliver EEG medical signal EEGS with length L F to G CCS

    $$ {\text {EEGS}} = \{ {\text {eeg}}_{1} , \ldots ,{\text {eeg}}_{{L_{F} }} \} $$
  • Step 14: Generate encrypted clinical EEG signal GEEG.

    $$ \begin{array}{l} {EEGS = \left\{ {eeg_{1} , \ldots ,eeg_{{L_{F} }} } \right\}; \quad CE = \left\{ {g_{{m_{1} }} ,g_{{m_{2} }} , \ldots ,g_{{m_{{L_{F} }} }} } \right\}} \hfill \\ {GEEG = EEGS \cdot CE = \left\{ {eeg_{1} \cdot g_{{m_{1} }} ,eeg_{2} \cdot g_{{m_{2} }} , \ldots ,eeg_{{L_{F} }} \cdot g_{{m_{{L_{F} }} }} } \right\}} \hfill \\ { = \left\{ {geeg_{1} , \ldots ,geeg_{{L_{F} }} } \right\}} \hfill \\ \end{array} $$
    (9)

Appendix 2

The chaotic scanning encryption mechanism S csem that we developed is given as follows:

  • Steps 1–5 are the same as those given in Appendix 1.

  • Step 6:

    $$ m_{k} = \left\lceil {\frac{1}{{x_{n} }}} \right\rceil $$
    (10)

    \( if\,m_{k} \le L_{F} ;m_{k} \notin \{ m_{1} , \ldots ,m_{k - 1} \} ;M = \{ m_{1} , \ldots ,m_{k - 1} ,m_{k} \} ; \) go to step 7. else; go to step 4; end.

  • Step 7: If k = L F \( M = \{ m_{1} ,m_{2} , \ldots ,m_{{L_{F} }} \} ; \) else; go to step 4; end.

  • Step 8: Deliver M to the output encrypted signal process.

  • Step 9: Deliver the encrypted clinical EEG signal GEEG to output encrypted signal process.

  • Step 10: Generate chaotic scanning of the encrypted clinical EEG signal SGEEG.

    $$ \begin{array}{l} {GEEG = \left\{ {geeg_{1} , \ldots ,geeg_{{L_{F} }} } \right\}; \quad M = \left\{ {m_{1} ,m_{2} , \ldots ,m_{{L_{F} }} } \right\}} \hfill \\ {SGEEG = \left\{ {geeg_{{m_{1} }} ,geeg_{{m_{2} }} , \ldots ,geeg_{{m_{{L_{F} }} }} } \right\} = \left\{ {sgeeg_{1} ,sgeeg_{2} , \ldots ,sgeeg_{{L_{F} }} } \right\}} \hfill \\ \end{array} $$
    (11)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lin, CF., Chung, CH. & Lin, JH. A chaos-based visual encryption mechanism for clinical EEG signals. Med Biol Eng Comput 47, 757–762 (2009). https://doi.org/10.1007/s11517-009-0458-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11517-009-0458-8

Keywords

Navigation