A EEG signal encryption technique based on nested logistic map

Publish Year: 1396
نوع سند: مقاله کنفرانسی
زبان: English
View: 705

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

MAEMT02_092

تاریخ نمایه سازی: 11 مرداد 1396

Abstract:

Electroencephalogram (EEG) is one of the biosignals which should be transferred through internet in the district of telemedicine. Moreover, it is inevitable to store EEG information in patient’s digital dossier, due to the possible unauthorized accesses, therefore it is indispensable to protect the signal through encrypting with different encryption methods. Chaos theory is marked as a high quality encrypting method, because it is regulated and unpredictable compared with random sequences. An encryption method is based on the chaos theory which is proposed in this paper to maintain the patient s EEG data, ideally. We use Nested Logistic map which is so fast and difficult to unauthorized decoding. The proposed method is examined by autocorrelation criteria, power spectral density and the percentage of the remaining deviations. Simulation results, show that the method is safe enough and very convenient to preserve information of EEG signals with high sensitivity.

Authors

Sobhan Sheykhivand

Department of Biomedical Engineering, University of Tabriz, Tabriz, Iran

Ali Naderi Saatlo

Department of Electrical-Electronics Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • N.Lasierra, A. Alesanco, C. Campos, E. Caudevilla, J. Fernandez, and ...
  • M.Harvard Ahmad , O. Farooq, S. Datta , SH. Saquib ...
  • M. Yan, N. Bourbakis and S. Li, : Data, image, ...
  • R.Matthews, "On the derivation of a 4Chaotic? encryption algorithm" Cryptologia ...
  • Wheeler, D.Daniel , "Problems with chaotic cryptosystems " Cryptologia 13, ...
  • L. Kocarev, ،0 Chaos -Based Cryptography: A Brief Overview, ? ...
  • Yang, Ming, N. Bourbakis, and Sh. Li. _ D ata-imag ...
  • Li, Yuan, L. Liang, Zh. Su, and J. Jiang. "A ...
  • Sufi, Fahim, and I. Khalil. "Enforcing secured ecg transmission for ...
  • "19-20April, 2017, Islamic Azad Univers ity-Urmia Branch, Urmia, Iran" ...
  • Sufi, Fahim, and I. Khalil. "A new feature detection mechanism ...
  • F.Daschselt , W.Schwarz , *Chaos and cryptography, _ proceeding of ...
  • Fridrich, Jiri. "Image encryption based on chaotic maps" In Systems, ...
  • Kocarev, Ljupco. "Chaos-based cryptography: a brief overview" Circuits and Systems ...
  • Li, Shujun, and X. Zhen, "On the security of an ...
  • Li, Shujun, and X. Zhen. "On the security of an ...
  • Yang, Ming, N. Bourbakis, and Sh. Li. _ D ata-image ...
  • M.Naor , A.Shamir , *Visual cryptography proceeding of Eurocrypt pp ...
  • Lin, Chin-Feng, Ch.H. Chung, Zh.L. Chen, Ch.J. Song, and Zh.X. ...
  • Lin, Chin-Feng, and Ch.S. Chung. "A chaos base visual encryption ...
  • Lin, Chin-Feng, and Ch.H. Chung. "A chaos-based visual encryption mechanism ...
  • Lin, Chin Feng, W. Th Chang, and Ch. Yi Li. ...
  • Grigoras, Victor, and C. Grigoras. "Chaos encryption method based on ...
  • Ravi, K. V. R., R. Palaniappan, C. Eswaran, and S. ...
  • Palaniappan, Ramaswamy. "Utilizing gamma band to improve mental task based ...
  • Uludag, Umut, Sh. Pankanti, S. Prabhakar, and A. K. Jain. ...
  • Hao, Feng, R. Anderson, and J. Daugman. "Combining cryptography with ...
  • Lin, Chin-Feng, Ch.H Chung, Zh.L Chen, Ch-J Song, and Zh-X ...
  • Yang, Ming, N. Bourbakis, and Sh. Li. " D ata-image ...
  • Lin, Chin-Feng, Ch-H Chung, and J-H Lin. "A chaos-based visual ...
  • "19-20April, 2017, Islamic Azad Univers ity-Urmia Branch, Urmia, Iran" ...
  • C.F Lin, B.Sh Wang, _ 2DChaos -b as e dVi ...
  • Parveen, Shaziya, and Sh. Parashar. "Technique for providing security in ...
  • Ch.F Lin , Sh.H Shih and J.D Zhu , _ ...
  • S.Parveen, S.Parashar and Izharuddin. (2011), *Technique for providing security in ...
  • M.Yang _ N.Bourbakis, and S.Li Data, image, video encryption? proceeding ...
  • G.Kenfack , A.Tiedeu , _ Chaos-Based Encryption of ECG Signals: ...
  • L.Kocarev , _ Chaos-based cryptography: A brief overview? proceeding of ...
  • Z.Kotulski and J.Szczepanski , «:Discrete chaotic cryptography proceeding of Ann. ...
  • K.Murali , H.Yu , V.Varadan , _ c _ mmunic ...
  • G.Jakimoski , and L.Kocarev , _ Chaos and cryptography: block ...
  • K.Wong W., ،0 A fast chaotic cryptographic scheme with dynamic ...
  • L.Kocarev , 4Chaos-based cryptography: A brief overview? proceeding of IEEE ...
  • M.Yang _ N.Bourbakis and S.Li, _ GData, image , video ...
  • C.M Ou _ Design of block ciphers by simple chaotic ...
  • F.Dachselt, , W.Schwarz _ _ Chaos and cryptography proceeding of ...
  • M.Naoki , J.Goce , A.Kazuyuki , et al., «4Chaotic block ...
  • C.K Chen , C.L Lin , C.T Chiang , et ...
  • F.Sufi, F.Han, Khalil, I., et al., (2011), _ A chaos-based ...
  • نمایش کامل مراجع