Beruflich Dokumente
Kultur Dokumente
Wte adopts high speed and robust advanced wireless A ID chaotic integrated ECG/EEG medical signal
communication system to achieve ubiquitous emergent scrambler have been developed to achieve secure medical
or health-monitoring medical services at any time and communication as shown in Fig. 1. The basic concept ofthe ID
any where [1][2]. Transmission information is confidential chaotic medical signal scrambler is to generate a 1D random
information for patients. Encryption is an essential mechanism value based on chaotic theory. That is, the original integrated
to keep confidential. The current method to do this is to encrypt ECG/EEG medical signal is multiplied by a ID chaotic random
the names of patients, instead of encrypt transmission medical signal to achieve visual encryption effect. Thus, the original
signal. This method of encryption has the advantage of a fast integrated ECG/EEG medical signal will not show a patient's
encryption speed and low complication. However, its medical information. This makes the integrated ECG/EEG
robustness is not strong enough. In order to increase robustness signal unreadable. The procedure to generate the ID chaotic
for encryption, we apply a chaos-based unequal encryption random values is described in the following. First, generate the
mechanism to wireless telemedicine. Chaos theory with index address that is required for each chaotic candidate random
excellent unpredictability is suitably used in encryption system value by using chaotic index address assignment process
[3-5]. It is a new and interesting research topics for real time denoted as FCL4. Use a chaotic candidate point generator
encryption, such as audio and video signals [6, 7, 10, 11, 12, 14]. denoted as Gc, to generate the corresponding random value. In
The performance of chaos-based visual encryption mechanism other words, generate a sequence of chaotic numbers with a
that apply in JPEG2000 X-ray and electrocardiogram (ECG) finite length based on a chaotic candidate point generator Gccs.
medical signals, has been scrupulously studied in our earlier
work [10-15]. In this paper, we further consider a chaos-based Then, find out the corresponding value in the sequence based on
visual the address value generated by the chaotic index address
assignment process FCL as the random value and use these
chaotic random values to scramble the original integrated
ECG/EEG signal. The
w~~~~~-
w t F E dthese 1-i lcl
dis'ai
* I4 pl:l~~~~1)iiltS
LF
Iimiti al point foir i9 e 1 and
...................................... ...,.............................
.. ............. ..... ...
g g. m, g . chaotic signal
encryption procedure can be described as E(P,K)=C, where P is If m E {mk J < k < j- }, then discard this point and go
the original signal, E is the encryption algorithm, K is the to step 2; Otherwise do the following step.
encryption key, and C is the scrambled signal. Our chaotic index Step 5: If j > LF, terminate the procedure and output m
address assignment process, F is described in the following:
1 < j < LF.
Step 0: Select chaotic logistic map type CMTF of FCL. There In addition, a procedure for chaotic candidate point
are many kinds of chaotic logistic map type described generator GCC is described as follows:
in [8]. Step 0: Select chaotic logistic map type CMTG of GCCS
Step 1: Input SPF,LF,nF,6F where SPF is the starting point Step 1: inputs SPG, where is the starting point of GCCS
of F , LF is the length of in the input integrated Step 2: Generate a sequence of chaotic numbers with a
ECG/EEG medical signal, nF is the number of finite length of mc by performing the iterative
discarded initial chaotic index points and 3F is the
algorithm x = cMATG(xn _),(3) xO = SPG XO = SPCCS]C%
level of security.
< n <mc
Step 2: (a) If F > 1, then terminate the procedure;
otherwise do the following steps Step 3: Output x, < n < mc
(b) Set x0 = SPF. Thus, the procedure for ID chaotic ECG signal scrambler is
(c) Generate nF chaotic points: summarized as follows:
Xn = CMTF (Xn-1 ) ( 1) Step 1: [Generate chaotic index address sequence]
and then discard those points (a)1 < j < LF, m EN FCIA {ml,...*, mL ->N (3)
Step 3: (a) x" + = CMTF (X,f ) (b) mc = maximum index address=
(b) If x > 'F then discard this point and go to step 2; maxm
otherwise do the following step. 1<j<LF
Step 2: [ Generate chaotic candidate points in stage 1]
(c)m (2) Generate a chaotic candidate point sequence with a finite
n+ 1
where the initial value for index j is 1, length of mC by performing GCC : Xn , 1 < n < m-
andj j+1; Step 3 [Generate chaotic random scramble signal]
Step 4:Compare m1 with previous mk, 1 < k <j 1] G(i) = xm (4)
1 <li<LF, xm = Gccs :x n =m
I<mk <j -]
If mi C mk J < k < j-1, then discard this point and go to
step 2. Otherwise do the following step.
Step 5: If j > LF, terminate the procedure and then output mi, Where Xori (i) is original ECG or EEG medical signal and
I<1 < LF. Otherwise do the following steps. Xrec (i) is the decrypted received ECG or EEG medical signal.
(a) n*-n+l Fig.5 and Fig.6 show the decrypted received image for an
(b) j<ej+l attacker who has chaotic keys with 0.00000001% error in their
(c) go to step2 starting points, respectively. These signals will not be recovered
back and are not suitable for medicine.
IV. Simulation Results
100 200 300 400 500 600 700 800 900 1000
0--PS)