Chaos based encryption system for encrypting electroencephalogram signals.

J Med Syst

Department of Electrical Engineering, National Taiwan Ocean University, Keelung, Taiwan, Republic of China,

Published: May 2014

In the paper, we use the Microsoft Visual Studio Development Kit and C# programming language to implement a chaos-based electroencephalogram (EEG) encryption system involving three encryption levels. A chaos logic map, initial value, and bifurcation parameter for the map were used to generate Level I chaos-based EEG encryption bit streams. Two encryption-level parameters were added to these elements to generate Level II chaos-based EEG encryption bit streams. An additional chaotic map and chaotic address index assignment process was used to implement the Level III chaos-based EEG encryption system. Eight 16-channel EEG Vue signals were tested using the encryption system. The encryption was the most rapid and robust in the Level III system. The test yielded superior encryption results, and when the correct deciphering parameter was applied, the EEG signals were completely recovered. However, an input parameter error (e.g., a 0.00001 % initial point error) causes chaotic encryption bit streams, preventing the recovery of 16-channel EEG Vue signals.

Download full-text PDF

Source
http://dx.doi.org/10.1007/s10916-014-0049-6DOI Listing

Publication Analysis

Top Keywords

encryption system
16
eeg encryption
16
chaos-based eeg
12
encryption bit
12
bit streams
12
encryption
10
generate level
8
level chaos-based
8
level iii
8
16-channel eeg
8

Similar Publications

Design and synthesis of a new highly efficient adjustable Ln-MOF for fluorescence sensing and information encryption.

Spectrochim Acta A Mol Biomol Spectrosc

December 2024

School of Chemistry and Chemical Engineering, Shaanxi Key Laboratory of Chemical Reaction Engineering, Laboratory of New Energy & New Function Materials, Yanan University, Yan'an 716000, China.

Elemental analysis, infrared spectroscopy, and X-ray single crystal diffraction indicated that a novel metal-organic framework (Tb-MOF) designated as 0.5n[Hbpy]·[Tb(dpa)(HO)]·4nHO was synthesized successfully, (where Hdpa = 5-(3, 4-dicarboxy- phenoxy) isophenic acid, bpy = protonated 4,4'-bipyridine). Tb-MOF adopts a 3D network structure based on Tb ions and the (dpa) ligand through µ: η, η, η, η binding modes.

View Article and Find Full Text PDF

The complete manipulation of Jones matrix phase-channels using metasurfaces brings forth unparalleled possibilities across diverse wavefront modulation applications. Traditionally, achieving independent control over all four phase-channels usually involves the introduction of chirality with multilayer or three-dimensional metasurfaces. Here, we present a general chirality-free method that relies on polarization base transformation with a planar minimalist metasurface, effectively decoupling the four Jones matrix phase-channels, thereby unleashing the fundamental boundaries imposed by conventional linear or circular polarization bases.

View Article and Find Full Text PDF

Vehicle-to-everything (V2X) communication has many benefits. It improves fuel efficiency, road safety, and traffic management. But it raises privacy and security concerns.

View Article and Find Full Text PDF

With the development of smart buildings, the risks of cyber-attacks against them have also increased. One of the popular and evolving protocols used for communication between devices in smart buildings, especially HVAC systems, is the BACnet protocol. Machine learning algorithms and neural networks require datasets of normal traffic and real attacks to develop intrusion detection (IDS) and prevention (IPS) systems that can detect anomalies and prevent attacks.

View Article and Find Full Text PDF

Vehicular Ad-hoc Networks (VANETs) are growing into more desirable targets for malicious individuals due to the quick rise in the number of automated vehicles around the roadside. Secure data transfer is necessary for VANETs to preserve the integrity of the entire network. Federated learning (FL) is often suggested as a safe technique for exchanging data among VANETs, however, its capacity to protect private information is constrained.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!