Open access peer-reviewed chapter

Implementation of a Multimaps Chaos-Based Encryption Software for EEG Signals

Written By

Chin-Feng Lin and Che-Wei Liu

Submitted: 01 October 2016 Reviewed: 03 February 2017 Published: 19 July 2017

DOI: 10.5772/67721

From the Edited Volume

Advances in Security in Computing and Communications

Edited by Jaydip Sen

Chapter metrics overview

1,511 Chapter Downloads

View Full Metrics

Abstract

In the chapter, we adopted a chaos logic map and a quadratic map to develop the chaos-based multi-maps EEG encryption software. The encryption performances of the chaos-based software were studied. The percent root-mean-square difference (PRD) is used to estimate the accuracy of a correctly decrypted EEG signal with respect to the original EEG signal. Pearson correlation coefficient (PCC) is used to estimate the correlation between the original EEG signal and an incorrectly decrypted EEG signal. The seven encryption aspects were testing, the average PRD value of the original and correctly decrypted EEG signals for the chaos-based multi-maps software is 2.59 x 10-11, and the average encryption time is 113.2857 ms. The five error decryption aspects were testing, the average PCC value of the original and error decrypted EEG signals for the chaos-based multi-maps software is 0.0026, and the average error decryption time is 113.4000 ms. These results indicate that the chaos-based multimaps EEG encryption software can be applied to clinical EEG diagnosis.

Keywords

  • EEG encryption software
  • multiple chaotic maps
  • logic map
  • quadratic map

1. Introduction

Chaos-based encryption is an important research topic in the field of multimedia information communication and storage [18]. Compared to the advanced encryption standard (AES), data encryption standard (DES), and the Rivest, Shamir, & Adleman (RSA) algorithm, chaos-based cryptography can exhibit higher levels of security and strong anti-attack ability [7, 8]. The use of chaos-based encryption schemes has expanded steadily over the last few years. Sankpal and Vijaya [9] provided the insights on chaos-based image encryption. Chaotic encryption mechanisms with infinite precision and unpredictability are sensitive to initial conditions and chaotic parameters. Complex chaotic maps have higher levels of security. Chaos-based multimedia encryption can be used in an open access network, and the internet. Zhou et al. [10] proposed a cascade chaotic system using two one-dimension (1-D) chaotic maps in series. The 1-D chaotic maps included logistic, tent, and sine maps. Compared to the use of one 1-D chaotic map, the simulation results showed that the proposed cascade chaotic system had higher robustness and randomness, more unpredictable parameters, and improved chaotic properties and chaotic performance.

Babu and Ilango [11] integrated chaos-based look-up tables using a higher-dimensional Arnold’s cat map (ACM) to achieve high encryption sensitivity with respect to the secret key space for audio encryption. The coefficients of the original and encrypted audio signals were employed to evaluate encryption robustness. Mostaghim and Boostani [12] proposed a chaotic visual cryptography (CVC) algorithm to increase steganography in security applications. The key space, key sensitivity, and correlation coefficient of the proposed CVC encryption method were demonstrated. Munir [13] proposed a chaos-based image encryption method using discrete cosine transform (DCT) in the frequency domain. The size of the encrypted image block was 8 × 8. The ACM was used to permute the encrypted image block and achieve visual image encryption. The 2D Henon chaotic map and skew tent map play a significant role in the design of permutation and diffusion image encryption mechanisms [14]. The Henon chaotic map generates two different chaotic addresses to permute the row and column of encrypted values in the shuffling process. Furthermore, the unimodal skew tent map was used to scramble the pixel values of the encrypted image using exclusive or (XOR) operations in the diffusion process. Liu et al. [15] proposed a pseudorandom bit generator (PRBG) using parameter-varying logistic map. The change mechanism of the parameters was designed, and the proposed PRBG displayed non-stationary behavior. The parameter-varying logistic map disrupted the phase space of the chaotic system, and could overcome phase space reconstruction to withstand attacks.

Awad et al. [16] investigated chaos-based encryption and transformation approaches using fuzzy keyword search for a mobile cloud storage system. The comprehensive tests showed that the proposed technology obtained a significantly more efficient solution to the searchable encryption problem compared to existing solutions. Huang et al. [17] developed an image cryptosystem using permutation architecture with block and stream ciphers. Ricardo and Alejandro [18] modified a 32-bit chaotic Bernoulli map PRBG using an 8-bit microcontroller. The multiplication, accommodation, addition, and shifting operations were integrated. Jolfaei et al. [19] indicated that permutation-only image ciphers have been used to protect multimedia information in recent years. In the permutation-only image encryption algorithm, the multimedia information is scrambled using a permutation mapping matrix generated by a PRBG. In previous studies [2023], a chaos-based visual encryption mechanism, 2D chaos-based visual encryption scheme, C# based chaotic single map encryption system, and chaotic visual cryptosystem using empirical mode decomposition algorithm for clinical electroencephalogram (EEG) signals have been proposed. In the chapter, chaotic multimaps of one-channel clinical EEG encryption software were developed to enhance the encryption robustness. The rest of this paper is organized as follows. The encryption algorithm focusing on the encryption software is investigated in Section 2. Section 3 provides implementation and experimental results of chaotic multimaps of visual clinical EEG encryption software. The conclusion and future work are presented in Section 4.

Advertisement

2. Encryption algorithm

The encryption algorithm consists of two main components: chaotic permutation address index approach (CPAIA) and chaotic clinical EEG signal generator approach (CCESGA) for the proposed encryption software. The encryption parameters are inputted to CPAIA, and the chaotic permutation address index sequence is generated. The chaotic permutation address index sequence is integrated to CCESGA, and the chaos-based encryption clinical EEG signal is generated. The proposed CPAIA is shown in Figure 1. The CPAIA algorithm proceeds as follows:

Figure 1.

The proposed chaotic permutation address index approach.

Step 1: Input the encryption parameters, SPFrFLFnFδF, into the CPAIA.

   SPF: The initial value of the chaotic logic map.

   rF: The bifurcation parameter of the chaotic logic map.

   LF: The length of encryption clinical EEG signal.

   nF: The level of parameter 1 of security.

   δF: The level of parameter 2 of security.

   The chaotic logic map was adopted in CPAIA, described as following.

   xn + 1 = rFxn(1 − xn)…………………………………………………………….(1)

   xo = SPF

Step 2: Discard the first nF chaotic logic map values; the chaotic logic map sequence is xnF+1xnF+2xmxm+1.

Step 3: If xm < δF, discard xm, m ∈ {nF + 1, nF + 2, ⋯}

   else

   xp=xminitinalp=0

Step 4:

   Zp=1xpmodLFGr=Zpr=p=0…………………………(2)

Step 5: If ZpGG=G0G1Gr1

   Gr=Zpr=p0……………………………………………..................(3)

   else discard Zp.

Step 6: If r=LFLM=G0,G1,,GLF1

   LM is the chaotic permutation address index sequence.

   else

   m = m + 1;

   p = p + 1;

   r = r + 1; and go to Step 3.

The proposed CCESGA is shown in Figure 2. The CCESGA algorithm proceeds as follows:

Figure 2.

The proposed chaotic clinical EEG signal generator approach.

Step 1: Input the encryption parameters, SPGrGLF, into the CCESGA.

   SPG: The initial value of the chaotic quadratic map.

   rF: The bifurcation parameter of the quadratic logic map.

   LF: The length of encryption clinical EEG signal.

   The chaotic quadratic map was adopted in CCESGA, and described as follows:

   qn+1=1rGqn2………………………………………………… ………….(4)

   qo = SPG

   The generation the chaotic quadratic map sequence was Q,

   Q=q0q1qLF1

Step 2: Input the chaotic permutation address index sequence, LM.

Step 3: Generate the chaos-based encryption sequence, E.

   E=e0e1eLF1…………………………… ………….(5)

   =QG0QG1QGLF1

=qG0qG1qGLF1

Step 4: Input the clinical EEG signal, eeg.

   eeg=eeg0eeg1eegLF1……………………………………………..(6)

Step 5: Generate the chaos-based encryption clinical EEG signal, eegE.

   eegE = eeg × E…………………………………………………………………....(7)

   =e0qG0e1qG1eLF1qGLF1

   =eegE0eegE1eegELF1

Advertisement

3. Chaotic multimaps visual clinical EEG encryption software

Figure 3 shows the developed chaotic multimaps visual clinical EEG signal encryption software. The software was developed using C# language and Microsoft Visual Studio integrated development environment (IDE). The software includes input, encryption, decryption, storage, and display modules. One-channel clinical EEG signals were inputted in the software through an input module, and were encrypted using an encryption module; these encrypted clinical EEG signals were decrypted using a decryption module. Furthermore, the encryptions and decryptions were stored and displayed using storage and display modules, respectively. The ranges of encryption parameters SPF = x1, rF = R, SPG = x2, rG = α, nF, and δF are 0-1 real numbers (RNs), 3.6-4 RNs, 0-1 RNs, 1.4-2 RNs, 0-100000 integrate number, and 0-0.2 RNs, respectively. Figure 4 displays the original one-channel clinical EEG signal, whose length is 10 s, and sample rate is 256 samples/s.

Figure 3.

The developed chaotic multimaps visual clinical EEG signal encryption software.

Figure 4.

The original one-channel clinical EEG signal.

Figure 5 shows the encrypted chaotic multimaps visual one-channel clinical EEG signal. The medical features of the encrypted EEG signal were visually unrecognizable and could not be applied to clinical EEG diagnosis. The encryption parameters SPF = x1, rF = R, SPG = x2, rG = α, nF, and δF are 0.6, 4, 0.6, 1.4, 100, and 0.05, respectively. The robustness of the developed visual chaotic multimaps encryption software was excellent. Figure 6 shows the correctly decrypted one-channel clinical EEG signal. The percent root difference (PRD) value is adopted to evaluate the difference between the original and correctly decrypted clinical EEG signals and is defined as

PRD=100×i=1LFEEGoriiEEGdeci2i=1LFEEGori2iE8

Figure 5.

The encrypted chaotic multimaps visual one-channel clinical EEG signal.

Figure 6.

The correctly decrypted one-channel clinical EEG signal.

EEGori: amplitudes of original clinical EEG signal.

EEGdec: amplitudes of decrypted clinical EEG signal.

The parameter LF is 2560. The PRD value of the original and correctly decrypted clinical EEG signals is 3.87 × 10−11. Table 1 lists the encryption parameters, PRD values of correct decryption, and encryption time of the proposed chaotic multimaps visual encryption mechanism for a clinical EEG signal. Seven encryption aspects were tested, and the average PRD value of original and correctly decrypted clinical EEG signal is obtained as 2.59 × 10−11 and with the encryption time as 113.2857 ms. From Figure 6 and Table 1, the accuracy of a correctly decrypted EEG signal was excellent, and the correct decryption speed was acceptable. Figure 7 shows the decrypted one-channel clinical EEG signal with error decryption parameters; the encryption parameters SPF = x1, rF = r, SPG = x2, rG = α, nF, and δF are 0.6, 4, 0.6, 1.4, 100, and 0.05, respectively. In addition, the decryption parameters SPF = x1, rF = r, SPG = x2, rG = α, nF, and δF are 0.6, 4, 0.60001, 1.4, 100, and 0.05, respectively. The Pearson correlation coefficient (PCC) was adopted to evaluate the difference between the original and error decryption clinical EEG signals and is defined as

r=i=1LFEEGoriiEEGerrdecii=1LFEEGoriii=1LFEEGerrdeciLFi=1LFEEGori2ii=1LFEEGorii2LF(i=1LFEEGerrdec2ii=1LFEEGerrdeci2LFE9

EncryptionPRDEncryption time (ms)
x1rx2αnFδF
0.640.61.41000.053.8734 × 10−11113
0.6000140.61.41000.051.2630 × 10−11113
0.63.99990.61.41000.051.2362 × 10−11115
0.640.6011.41000.053.3033 × 10−11114
0.640.61.3991000.051.1655 × 10−10113
0.640.61.42000.053.2141 × 10−11113
0.640.61.41000.154.0856 × 10−11112

Table 1.

The encryption parameters, PRD values of correct decryption, and encryption time of the proposed chaotic multimaps visual encryption mechanism for clinical EEG signal.

Figure 7.

The decrypted one-channel clinical EEG signal with error decryption parameters.

EEGori: amplitudes of the original clinical EEG signal.

EEGerrdec: amplitudes of error decrypted clinical EEG signal.

Table 2 lists the decryption parameters, PCC values of error decryption, and error encryption time of the proposed chaotic multimaps visual encryption mechanism for the clinical EEG signal. For this, five error decryption aspects were tested, the average PCC value of original and error decrypted clinical EEG signal was obtained as 0.0026, and the error decryption time was 113.4000 ms. From Figure 7 and Table 2, the original and error decrypted clinical EEG signal was extremely uncorrelated, and the error decryption time was accepted.

Encryption
PCCError decryption time (ms)
xrxnαnFδF
0.6000140.61.41000.050.0020112
0.63.99990.61.41000.050.0061113
0.640.6011.41000.050.0020114
0.640.61.42000.050.0015114
0.640.61.41000.150.0015114

Table 2.

The decryption parameters, PCC values of error decryption, and error encryption time of the proposed chaotic multimaps visual encryption mechanism for clinical EEG signal.

Advertisement

4. Conclusion

This chapter described the proposed chaotic multimaps visual encryption mechanism for one-channel clinical EEG signals. Chaotic logic and chaotic quadratic maps were employed in CPAIA and CCESGA, respectively. The proposed software was implemented using C# language and Microsoft Visual Studio IDE. The PRD and PCC values were used to evaluate the accuracy of the correctly decrypted clinical EEG signals and the robustness of error decryption clinical EEG signals, respectively. The testing results showed that the proposed chaotic multimaps visual encryption software is an excellent encryption software. In the future, the chaotic maps with 2-D, i.e., Henon map, can be adopted to enhance the encryption robustness.

Advertisement

Acknowledgments

The authors acknowledge the support of the NTOU Center for Teaching and Learning, Maritime Telemedicine Teaching and Learning Project, the support of the Union Teaching of the Ministry of Education for Medical Electronics in Taiwan, and the valuable comments of the reviewers.

References

  1. 1. Kotulski Z, Szczepanski J. Discrete chaotic cryptography. Ann. Physik. 1997; 6:381–394. DOI: 10.1002/andp.19975090504.
  2. 2. Yang T, Wu W, Chua LO. Cryptography based on chaotic systems. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications. 1997; 44:469–472. DOI: 10.1109/81.572346.
  3. 3. Baptista MS. Cryptography with chaos. Physics Letters A. 1998; 240:50–54. DOI: 10.1016/S0375-9601(98)00086-3.
  4. 4. Kocarev L. Chaos-based cryptography: a brief overview. IEEE Circuits and System Magazine. 2001; 1:6–21. DOI: 10.1109/7384.963463.
  5. 5. Dachselt F, Schwarz W. Chaos and cryptography. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications. 2001; 48:1498–1509. DOI: 10.1109/TCSI.2001.972857.
  6. 6. Jakimoski G, Kocarev L. Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications. 2001; 48:163–169. DOI: 10.1109/81.904880.
  7. 7. Yan M, Bourbakis N, Li S. Data, image, video encryption. IEEE Potentials. 2004; 23:28–34. DOI: 10.1109/MP.2004.1341784.
  8. 8. Ou CM. Design of block ciphers by simple chaotic functions. IEEE Computational Intelligence Magazine. 2009; 3:54–59. DOI: 10.1109/MCI.2008.919074.
  9. 9. Sankpal PR, Vijaya PA. Image encryption using chaotic maps: a survey. Proceeding of 2014 Fifth International Conference on Signals and Image Processing. 2013; 102–107. DOI: 10.1109/ICSIP.2014.80.
  10. 10. Zhou Y, Hua Z, Pun CM, Chen CL. Cascade chaotic system with applications. IEEE Transactions on Cybernetics. 2015; 45(9):2001–2012. DOI: 10.1109/TCYB.2014.2363168.
  11. 11. Babu SG, Ilango P. Higher dimensional chaos for Audio encryption. Proceeding of Computational Intelligence in Cyber Security (CICS). 2013; pp. 52–58. DOI: 10.1109/CICYBS.2013.6597206.
  12. 12. Mostaghim M, Boostani R. CVC: chaotic visual cryptography to enhance steganography. Proceeding of Information Security and Cryptology. 2014; pp. 44–48. DOI: 10.1109/ISCISC.2014.6994020.
  13. 13. Munir R. A block-based image encryption algorithm in frequency domain using chaotic permutation. Proceeding of Telecommunication Systems Services and Applications. 2014; DOI: 10.1109/TSSA.2014.7065906.
  14. 14. Khan J, Ahmad J, Hwang SO. An efficient image encryption scheme based on: Henon map, skew tent map and S-Box. Proceeding of Modeling, Simulation, and Applied Optimization. 2015; DOI: 10.1109/ICMSAO.2015.7152261.
  15. 15. Liu L, Miao S, Hu H, Deng Y. Pseudorandom bit generator based on non-stationary logistic maps. IET Information Security. 2016; 10(2):87–94. DOI: 10.1049/iet-ifs.2014.0192.
  16. 16. Awad A, Matthews A, Qiao Y, Lee B. Chaotic searchable encryption for mobile cloud storage. IEEE Transactions on Cloud Computing. IEEE Early Access Articles. pp. 1–14. DOI: 10.1109/TCC.2015.2511747.
  17. 17. Huang C, Cheng H, Song Y, Ding Q. Permutation of image encryption system based on block cipher and stream cipher encryption algorithm. Proceeding of Third International Conference on Robot, Vision and Signal Processing. 2015; pp. 163–166. DOI: 10.1109/RVSP.2015.46.
  18. 18. Ricardo FM, Alejandro DM. Algorithm for implementing 32-bits represented Bernoulli map using an 8-bits microcontroller. Proceeding of International Engineering Summit. 2016. DOI: 10.1109/IESummit.2016.7459773.
  19. 19. Jolfaei A, Wu XW, Muthukkumarasamy V. On the security of permutation-only image encryption schemes. IEEE Transactions on Information Forensics and Security. 2016; 11(2):235–246. DOI: 10.1109/TIFS.2015.2489178.
  20. 20. Lin CF, Chung CH, Lin JH. A chaos-based visual encryption mechanism for clinical EEG signals. Medical & Biological Engineering & Computing. 2009; 47(7):757–762. DOI: 10.1007/s11517-009-0458-8.
  21. 21. Lin CF, Wang BSH. A 2D chaos-based visual encryption scheme for clinical EEG signals. Journal of Marine Science and Technology. 2011; 19(6):666–672. DOI: 10.6119/JMST.
  22. 22. Lin CF, Shih SH, Zhu JD. Chaos based encryption system for encrypting electroencephalogram signals. Journal of Medical Systems. 2014; 38:49. DOI: 10.1007/s10916-014-0049-6.
  23. 23. Lin CF. Chaotic visual cryptosystem using empirical mode decomposition algorithm for clinical EEG signals. Journal of Medical Systems. 2016; 40:52. DOI: 10.1007/s10916-015-0414-0.

Written By

Chin-Feng Lin and Che-Wei Liu

Submitted: 01 October 2016 Reviewed: 03 February 2017 Published: 19 July 2017