scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A chaos‐based encryption technique to protect ECG packets for time critical telecardiology applications

01 May 2011-Security and Communication Networks (Wiley)-Vol. 4, Iss: 5, pp 515-524
TL;DR: End-to-end security can be applied to wireless tele-cardiology application, with minimal processing, and with multi-scroll chaos implementation, CVD patients remain completely unidentified, upholding patients’ privacy and preventing spoof attacks.
Abstract: Electrocardiography (ECG) signal is popularly used for diagnosing cardiovascular diseases (CVDs). However, in recent times ECG is being used for identifying person. As ECG signals contain sensitive private health information along with details for person identification, it needs to be encrypted before transmission through public media. Moreover, this encryption must be applied with minimal delay for authenticating CVD patients, as time is critical for saving CVD affected patient’s life. Within this paper, we propose the usage of multi-scroll chaos to encrypt ECG packets. ECG packets are being encrypted by the mobile phones using the chaos key by patients’ subscribed in tele-cardiology applications. On the other hand, doctors and hospital attendants receive the encrypted ECG packets, which can be decrypted using the same chaos key. Using the techniques described in this paper, end-to-end security can be applied to wireless tele-cardiology application, with minimal processing. Our experimentation with 12 ECG segments shows that with multi-scroll chaos implementation, CVD patients remain completely unidentified, upholding patients’ privacy and preventing spoof attacks. Most importantly, the proposed method is 18 times faster than permutation-based ECG encoding, 25 times faster than wavelet-based ECG annonymization techniques and 31 times faster than noise-based ECG obfuscation techniques, establishing the proposed technique as the fastest ECG encryption system according to the literature. Copyright © 2010 John Wiley & Sons, Ltd.
Citations
More filters
Journal ArticleDOI
TL;DR: A deep review and discussion of 93 state-of-the-art publications on their proposed methods, signal datasets, and publicly available ECG collections is conducted to present the fundamentals and the evolution of ECG biometrics, describe the current state of the art, and draw conclusions on prior art approaches and current challenges.
Abstract: Face and fingerprint are, currently, the most thoroughly explored biometric traits, promising reliable recognition in diverse applications. Commercial products using these traits for biometric identification or authentication are increasingly widespread, from smartphones to border control. However, increasingly smart techniques to counterfeit such traits raise the need for traits that are less vulnerable to stealthy trait measurement or spoofing attacks. This has sparked interest on the electrocardiogram (ECG), most commonly associated with medical diagnosis, whose hidden nature and inherent liveness information make it highly resistant to attacks. In the last years, the topic of ECG-based biometrics has quickly evolved toward the commercial applications, mainly by addressing the reduced acceptability and comfort by proposing new off-the-person, wearable, and seamless acquisition settings. Furthermore, researchers have recently started to address the issues of spoofing prevention and data security in ECG biometrics, as well as the potential of deep learning methodologies to enhance the recognition accuracy and robustness. In this paper, we conduct a deep review and discussion of 93 state-of-the-art publications on their proposed methods, signal datasets, and publicly available ECG collections. The extracted knowledge is used to present the fundamentals and the evolution of ECG biometrics, describe the current state of the art, and draw conclusions on prior art approaches and current challenges. With this paper, we aim to delve into the current opportunities as well as inspire and guide future research in ECG biometrics.

131 citations


Cites methods from "A chaos‐based encryption technique ..."

  • ...[158] were among the first to address this topic, by developing an ECG encryption technique based on chaos theory, to ensure patient privacy in time-critical telecardiology....

    [...]

Proceedings ArticleDOI
08 Jul 2014
TL;DR: This paper proposes an efficient scheme for image data, which has much more volume than text data, and evaluates the scheme in real networks (including Amazon EC2), and experimental results show that it achieves privacy but only uses 1/585.8~1/398.6 the time of the AES algorithm.
Abstract: Nowadays the amount of data is being produced exponentially with the rapid development of electronic technology and communication, which makes it hard to cost-effectively store and manage these big data. Cloud computing, a new business model, is considered as one of most attractive solutions for big data, and provides the advantage of reduced cost through sharing of computing and storage resources. However, the growing concerns in term of the privacy of data stored in public cloud have slowed down the adoption of cloud computing for big data because sensitive information may be contained among the big data or the data owner themselves do not want any other people to scan their data. Since the data volume is huge and mobile devices are widely used, the traditional cryptographic approach are not suitable for big data. In this paper, we propose an efficient scheme for image data, which has much more volume than text data. We evaluate our scheme in real networks (including Amazon EC2), and our experimental results on image show that: (1) our scheme achieves privacy but only use 1/585.8~1/398.6 the time of the AES algorithm; (2) the delay of our hybrid-cloud-based scheme is only 3%~5% more than that of the traditional public-cloud-only approach.

86 citations

Book ChapterDOI
13 Nov 2013
TL;DR: This paper proposes a cancelable template by utilizing some nice properties of Delaunay triangle-based local structures, e.g., excellent local structural stability, to achieve satisfactory performance and demonstrates the validity of the proposed scheme.
Abstract: Security of biometric templates in a fingerprint authentication system is highly critical because the number of fingers of a person is limited and the raw fingerprints cannot be reset or replaced. A cancelable template is an efficient and powerful means to provide template protection. However, in most cancelable fingerprint templates, the many-to-one based non-invertible transformation acts on each single minutia, which may greatly decrease the discriminative capability of its feature representation, and more importantly, single minutia is more sensitive than a local structure to the non-linear distortion present in a fingerprint image. In this paper, we propose a cancelable template by utilizing some nice properties of Delaunay triangle-based local structures, e.g., excellent local structural stability, to achieve satisfactory performance. The non-invertible transformation is applied to each Delaunay triangle-based local structure rather than to each individual minutia so as to mitigate the influence of non-linear distortion and retain the discriminative power of the feature data after the many-to-one mapping. Experimental results on the publicly available databases demonstrate the validity of the proposed scheme.

65 citations


Cites background from "A chaos‐based encryption technique ..."

  • ...We are also interested in investigating cancelable template design for other biometrics such as ECG [21], and keystroke dynamics [22]....

    [...]

Journal ArticleDOI
TL;DR: This work proposes a novel symmetric encryption algorithm based on logistic map with double chaotic layer encryption (DCLE) in diffusion process and just one round of confusion-diffusion for the confidentiality and privacy of clinical information such as electrocardiograms, electroencephalograms, and blood pressure for applications in telemedicine.
Abstract: Recently, telemedicine offers medical services remotely via telecommunications systems and physiological monitoring devices. This scheme provides healthcare delivery services between physicians and patients conveniently, since some patients can not attend the hospital due to any reason. However, transmission of information over an insecure channel such as internet or private data storing generates a security problem. Therefore, authentication, confidentiality, and privacy are important challenges in telemedicine, where only authorized users should have access to medical or clinical records. On the other hand, chaotic systems have been implemented efficiently in cryptographic systems to provide confidential and privacy. In this work, we propose a novel symmetric encryption algorithm based on logistic map with double chaotic layer encryption (DCLE) in diffusion process and just one round of confusion-diffusion for the confidentiality and privacy of clinical information such as electrocardiograms (ECG), electroencephalograms (EEG), and blood pressure (BP) for applications in telemedicine. The clinical signals are acquired from PhysioBank data base for encryption proposes and analysis. In contrast with recent schemes in literature, we present a secure cryptographic algorithm based on chaos validated with the most complete security analysis until this time. In addition, the cryptograms are validated with the most complete pseudorandomness tests based on National Institute of Standards and Technology (NIST) 800-22 suite. All results are at MATLAB simulations and all them show the effectiveness, security, robustness, and the potential use of the proposed scheme in telemedicine.

50 citations


Cites methods from "A chaos‐based encryption technique ..."

  • ...The chaos key is XORed with the ECG packet to produce the encrypted ECG packet [43]....

    [...]

Journal ArticleDOI
06 Jul 2018-Symmetry
TL;DR: Wang et al. as mentioned in this paper proposed an improved image encryption scheme using secure hash algorithm SHA-512 for one-time keys and a 4D hyperchaotic system to subdue the security insufficiencies of the algorithm under study.
Abstract: The issues of identity authentication and privacy protection of individuals in body area network (BAN) systems have raised much concern in past few years. To address the challenges of privacy protection in wireless BAN, an image encryption algorithm has been proposed recently by Wang et al. The encryption algorithm utilized two 1D chaotic maps to generate sub-chaotic matrices which are combined to perform encryption. The algorithm has good statistical encryption performance. However, a cautious inquiry finds that it has some underlying security defects. This paper evaluates the security of the Wang et al. encryption algorithm to show that it is totally breakable under proposed cryptanalysis and hence infeasible for privacy protection in BAN. It has been shown that the plain-image data can be recovered without any prior knowledge of secret key and plain-text. Furthermore, this paper also suggests an improved encryption scheme using secure hash algorithm SHA-512 for one-time keys and a 4D hyperchaotic system to subdue the security insufficiencies of the algorithm under study. The simulation results and analysis demonstrate that the improved image encryption scheme has excellent encryption quality, plain-image sensitivity, and resistance to possible cryptanalytic attacks.

41 citations

References
More filters
Journal ArticleDOI
TL;DR: It is suggested that every minute of delay in primary angioplasty for STEMI affects 1-year mortality, even after adjustment for baseline characteristics, and all efforts should be made to shorten the total ischemic time.
Abstract: Background— Although the relationship between mortality and time delay to treatment has been demonstrated in patients with acute ST-segment elevation myocardial infarction (STEMI) treated by thrombolysis, the impact of time delay on prognosis in patients undergoing primary angioplasty has yet to be clarified. The aim of this report was to address the relationship between time to treatment and mortality as a continuous function and to estimate the risk of mortality for each 30-minute delay. Methods and Results— The study population consisted of 1791 patients with STEMI treated by primary angioplasty. The relationship between ischemic time and 1-year mortality was assessed as a continuous function and plotted with a quadratic regression model. The Cox proportional hazards regression model was used to calculate relative risks (for each 30 minutes of delay), adjusted for baseline characteristics related to ischemic time. Variables related to time to treatment were age >70 years (P<0.0001), female gender (P=0....

1,410 citations

Journal ArticleDOI
TL;DR: Experiments show that it is possible to identify a person by features extracted from one lead only, and only three electrodes have to be attached on the person to be identified.
Abstract: A new approach in human identification is investigated. For this purpose, a standard 12-lead electrocardiogram (ECG) recorded during rest is used. Selected features extracted from the ECG are used to identify a person in a predetermined group. Multivariate analysis is used for the identification task. Experiments show that it is possible to identify a person by features extracted from one lead only. Hence, only three electrodes have to be attached on the person to be identified. This makes the method applicable without too much effort.

861 citations

Book
30 Sep 2006
TL;DR: The ECG and Its Contaminants, Visualization Methods, Knowledge Management and Emerging Methods, and Supervised and Unsupervised Classification.
Abstract: This cutting-edge resource provides you with a practical and theoretical understanding of state-of-the-art techniques for electrocardiogram (ECG) data analysis. Placing an emphasis on the fundamentals of signal etiology, acquisition, data selection, and testing, this comprehensive volume presents guidelines to help you design, implement, and evaluate algorithms used for the analysis of ECG and related data. Additionally, explanations of open source software and related databases for signal processing are given. The book focuses on the modeling, classification, and interpretation of features derived from advanced signal processing and artificial intelligence techniques. Key topics covered include physiological origin, hardware acquisition and filtering, time-frequency quantification of the ECG and derived signals (including heart rate variability and respiration), analysis of noise and artifact, models for ECG and RR interval processes, linear and nonlinear filtering techniques, and adaptive algorithms such as neural networks. Much of the book is devoted to deriving robust, clinically meaningful parameters such as the QRS axis, QT-interval, the ST-level, and T-wave alternan metrics. Methods for applying these metrics to clinical classification are also discussed, together with supervised and unsupervised classification techniques. Including over 190 illustrations, the book offers you a solid grounding in the relevant basics of physiology, data acquisition and database design, and addresses the practical issues of improving existing data analysis methods and developing new applications.

799 citations


"A chaos‐based encryption technique ..." refers background in this paper

  • ..., P wave, QRS complex and T wave), as the features waves are mainly responsible for biometric identification [7,8,11--15] as well as cardiovascular diagnosis [16]....

    [...]

Journal ArticleDOI
TL;DR: The tests show that the extracted features are independent of sensor location, invariant to the individual's state of anxiety, and unique to an individual.

652 citations


"A chaos‐based encryption technique ..." refers background in this paper

  • ...Earlier ECG biometrics were also based on some of these features [7,8]....

    [...]

Journal ArticleDOI
TL;DR: The use of this conduit in the security mechanism of BASN is explored by a biometrics approach that uses an intrinsic characteristic of the human body as the authentication identity or the means of securing the distribution of a cipher key to secure inter-BASN communications.
Abstract: The development of the wireless body area sensor network (BASN) is imperative for modern telemedicine and m-health, but security remains a formidable challenge yet to be resolved. As nodes of BASN are expected to be interconnected on or in the human body, the body itself can form an inherently secure communication pathway that is unavailable to all other kinds of wireless networks. This article explores the use of this conduit in the security mechanism of BASN; that is, by a biometrics approach that uses an intrinsic characteristic of the human body as the authentication identity or the means of securing the distribution of a cipher key to secure inter-BASN communications. The method was tested on 99 subjects with 838 segments of simultaneous recordings of electrocardiogram and photoplethysmogram. By using the interpulse interval (IPI) as the biometric trait, the system achieved a minimum half total error rate of 2.58 percent when the IPIs measured from signals, which were sampled at 1000 Hz, were coded into 128-bit binary sequences. The study opens up a few key issues for future investigation, including compensation schemes for the asynchrony of different channels, coding schemes, and other suitable biometric traits.

581 citations