Please use this identifier to cite or link to this item:
標題: 以混沌心電訊號為基礎之資訊安全傳輸
Secure Information Transmission Based on Chaotic ECG Signals
作者: 陳鏡崑
Chen, Ching-Kun
關鍵字: Communication Security
Chaotic Encryption/Decryption
Chaos Synchronization
出版社: 電機工程學系所
引用: Bibliography [1] A. C. Weave and M. W. Condry, “Distributing internet services to the network's edge,” IEEE Transactions on Industrial Electronics, vol. 50, no.3 ,pp. 404-411, 2003. [2] T. H. Chen and C. S. Wu, “Compression-unimpaired batch-image encryption combining vector quantization and index compression,” Information Sciences, vol. 180, no. 9, pp. 1690-1701, 2010. [3] T. H. Chen, G. Horng, and W. B. Lee, “A publicly verifiable copyright-proving scheme resistant malicious attacks,” IEEE Transactions on Industrial Electronics, vol. 52, no. 1, pp. 327-334, 2005. [4] Y. Lee, H. Kim, and Y. Park, “A new data hiding scheme for binary image authentication with small image distortion,” Information Sciences, vol. 179, no. 22, pp. 3866-3884, 2009. [5] M. Salleh, S. Ibrahim, and I. F. Isnin, “Image encryption algorithm based on chaotic mapping,” Journal Teknologi, vol. 39, pp. 1-12, 2003. [6] M. Usama and M. K. Khan, “Classical and chaotic encryption techniques for the security of satellite image,” in Proceedings of International Conference on Biometrics and Security Technologies, Islamabad, 2008, pp. 1-6. [7] C. Alexopulos, N. G. Bourbakis, and N. Ioannou, “Image encryption method using a class of fractals,” Journal of Electronic Imaging, vol. 4, no. 3, pp. 251-259, 1995. [8] L. Kocarev and G. Jakimoski, “Logistic map as a block encryption algorithm,” Physics Letters A, vol. 289, pp. 199-206, 2001. [9] R. Brown and L. O. Chua, “Clarifying chaos: examples and counterexamples,” International Journal of Bifurcation and Chaos, vol. 6, no. 2, pp. 219-242, 1996. [10] J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic map,” International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259-1284, 1996. [11] S. Behnia, A. Akhshani, and H. Mahmodi, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons, and Fractals, vol. 35, no. 2, pp. 446-471, 2008. [12] C. K. Chen, C. L. Lin, and Y. M. Chiu, “Data encryption using ECG signals with chaotic Henon map.” in Proceedings of International Conference on Information Science and Applications, Seoul, 2010, pp. 1-5. [13] C. K. Chen and C. L. Lin, “Text encryption using ECG signals with chaotic logistic map.” in Proceedings of International Conference on Industrial Electronics and Applications, Taichung, 2010, pp. 1741-1746. [14] A. Kanso, H. Yahyaoui, and M. Almulla, “Keyed hash function based on a chaotic map,” Information Sciences, vol. 186, no. 1, pp. 249-264, 2012. [15] Luiz P.L de Oliveira and M. Sobottka, “Cryptography with chaotic mixing,” Chaos, Solitons & Fractals, vol. 35, no. 3, pp. 408-419, 2008. [16] E. Solak and C. Cokal, “Algebraic break of image ciphers based on discretized chaotic map lattices,” Information Sciences, vol. 181, no. 1, pp. 227-233, 2011. [17] Z. L. Zhu, W. Zhang, K. W. Wong, and H. Yu, “A chaos-based symmetric image encryption scheme using a bit-level permutation,” Information Sciences, vol. 181, no. 6, pp. 1171-1186, 2011. [18] C. K. Chen, C. L. Lin, C. T. Chiang, and S. L. Lin, “Information encryption using ECG signals with chaotic functions,” Information Sciences, vol. 193, pp. 125-140, 2012. [19] C. K. Chen, C. L. Lin, C. T. Chiang, and S. L. Lin, “Personalized Information Encryption Using ECG Signals with Chaotic Functions and Secure Transmissions via Synchronized Circuits,” IEEE Transactions on System, Man ,and Cybernetics, Part B,‏ 2012, submitted. [20] G. Jakimoski and L. Kocarev, “Chaos and cryptography: block encryption ciphers based on chaotic maps,” IEEE Transactions on Circuit and Systems-I: Fundamental Theory and Applications, vol. 48, no. 2, pp. 163-169, 2001. [21] AS Al-Fahoum and AM Qasaimeh, “ECG arrhythmia classification using simple reconstructed phase space approach,” Computers in Cardiology vol. 33, pp. 757-760, 2006. [22] Q. Jiao, Y. X. Guo, W. F. Cao, and Z. G. Zhang, “Short time ECG signal analysis based on the reconstruction of phase space,” Chinese Journal of Medical Instrumentation, vol. 32, no. 4, pp. 257-264, 2008. [23] A. Jovic and N. Bogunovic, “Feature extraction for ECG time-series mining based on chaos theory,” In Proceedings of International Conference on Information Technology Interfaces, Cavtat, Croatia, 2007, pp. 63-68. [24] A. Babloyantz and A. Destexhe, “Is the normal heart a periodic oscillator?,” Biological Cybernetics, vol. 58, no. 3, pp. 203-211, 1988. [25] Mohamed I. Owis, Ahmed. H. Abou-Zied, Abou-Baker M. Youssef, and Yasser M. Kadah, Study of features based on nonlinear dynamical modeling in ECG arrhythmia detection and classification, IEEE Transactions on Biomedical Engineering, vol. 49, no. 7, pp. 733-736, 2002. [26] A. Wolf, J. B. Swift, H. L. Swinney, and J. A. Vastano, “Determining Lyapunov exponents from a time series,” Physics Letters D, vol. 16, pp. 285-317, 1985. [27] J. P. Eckmann, S. O. Kamphorst, D. Ruelle, and S. Ciliberto, “Lyapunov exponents from a time series,” Physics Letters A, vol. 34, no. 6, pp. 285-317, 1985. [28] L. Biel, O. Pattrsson, L. Philipson and P. Wide, “ECG analysis: a new approach in human identification,” IEEE Transactions on Instrumentation and Measurement, vol. 50, no. 3, pp. 808-812, 2001. [29] C. C. Chiu, C. M. Chuang, and C. Y. Hsu, “A novel personal identity verification approach using a discrete wavelet transform of the ECG signal,” International Journal of Wavelets, Multi-resolution and Information Process, vol. 7, pp. 341-355, 2009. [30] S. A. Israel, J. M. Irvine, A. Cheng, M. D. Wiederhold, and B. K. Wiederhold, “ECG to identify individuals,” Pattern Recognition, vol. 38, no. 1, pp. 133-142, 2005. [31] S. K. Singla and A. Sharma, “ECG as biometric in the automated world,” International Journal of Computer Science & Communication, vol. 1, no. 2, pp. 281-283, 2010. [32] A. D. C. Chan, M. M. Hamdy, A. Badre, and V. Badee, “Wavelet distance measure for person identification using electrocardiograms,” IEEE Transaction on Instrumentation and Measurement, vol. 57, no. 2, pp. 248-253, 2008. [33] Y. Wang, F. Agrafioti, D. Hatzinakos, and K. N. Plataniotis, “Analysis of human electrocardiogram for biometric recognition,” EURASIP Journal on Advances in Signal Processing, 2008, 11 pages. [34] F. Agrafioti and D. Hatzinakos, “ECG based recognition using second order statistics,” in Proceedings of the Communication Networks and Services Research Conference, Halifax, 2008, pp. 82-87. [35] F. Agrafioti and D. Hatzinakos, "ECG biometric analysis in cardiac I regularity conditions", Signal, Image and Video Processing, vol. 3, no. 4, pp. 329-343, 2009. [36] C. K. Chen, C. L. Lin, and Yen-Ming Chiu, “Individual Identification Based on Chaotic Electrocardiogram Signals,” In Proceedings of IEEE International Conference on Industrial Technology, Beijing, 2011, pp. 1765-1770. [37] C. K. Chen, Y. M. Chiu, C. L. Lin, C. T. Chiang, and S. L. Lin, “Individual identification based on chaotic electrocardiogram signals,” IEEE Transactions on Biomedical Engineering‏, 2011, submitted. [38] Y. M. Chiu, Acquisition and Identification of Chaotic Electrocardiogram Signals, Master's Thesis, NCTU, Taiwan, 2010. [39] C. C. Y. Poon, Y. T. Zhang, and S. D. Bao, “A novel biometric method to secure wireless body area sensor networks for telemedicine and m-Health,” IEEE Communication Magazine, vol. 44, pp. 73-81, 2006 [40] F. M. Bui and D. Hatzinakos, “Biometric methods for secure communications in body sensor networks,” EURASIP Journal on Advances in Signal Processing, 2008, 16 pages. [41] T. W. Shen, W. J. Tompkins, and Y. H. Hu, “One-lead ECG for identity verification,” in Proceedings of Joint EMBS/BMES Conference, Texas, 2002, pp. 62-63. [42] F. Sufi, I. Khali, and I. Habib, “Polynomial distance measurement for ECG based biometric authentication,” Security and Communication Networks, vol. 3, no. 4, pp. 303-319, 2010. [43] I. Khalil and F. Sufi, “Legendre polynomials based biometric authentication using QRS complex of ECG,” in Proceedings of International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, NSW , 2008, pp. 297-302. [44] J. L.C. Loong, K. S. Subari, R. Besar, and M. K. Abdullah, “A new approach to ECG biometric systems: a comparative study between LPC and WPD systems,” Word Academy of Science, Engineering and Technology, vol. 68, pp. 759-764, 2010. [45] H. Silva, H. Gamboa, and A. Fred, “One lead ECG based personal identification with feature subspace ensembles,” in Proceedings of International Conference Machine Learning and Data Mining in Pattern Recognition, Leipzig, 2007. [46] S. Z. Fatemian and D. Hatzinakos, “A new ECG feature extractor for biometrics recognition,” in Proceedings of International Conference on Digital Signal Processing, Santorini-Hellas, 2009, pp. 1-6. [47] D. P. Coutinho, A. L. N. Fred, and A. T. Figueiredo, “One-lead ECG-based personal identification using Ziv-Merhav cross parsing,” in Proceedings of International Conference on Pattern Recognition, Istanbul, 2010, pp. 3858-3861. [48] K. M. Cuomo and A. V. Oppenheim, “Circuit implementation of synchronized chaos with application to communications,” Physical Review Letters, vol. 71, no. 1, pp. 65-68, 1993. [49] L. M. Pecora and T. L. Carroll, “Synchronization in chaotic systems,” Physical Review Letters, vol. 64, no. 8, pp. 821-823, 1990. [50] L. M. Pecora and T. L. Carroll, “Driving systems with chaotic signals,” Physical Review Letters, vol. 44, no. 4, pp. 2374-2383, 1991. [51] K. M. Cuomo, A. V. Oppenheim, and S. H. Strogatz, “Synchronization of Lorenz-Based Chaotic Circuits with applications to communications,” IEEE Transactions on Circuit and Systems-II: Analog and Digital Signal Processing, vol. 40, no. 10, pp. 626-633, 1993. [52] G. D. VanWiggeren and R. Roy, “Communication with chaotic lasers,” Nature, Vol. 279, no. 5354, pp. 1198-1200, 1998. [53] K. Y. Lain, T. S Chiang, and C. S. Chiu, “Synthesis of fuzzy model-based designs to synchronization and secure communications for chaotic systems,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 31, no. 1, pp. 66-83, 2001. [54] S. Y. Li and Z. M. Ge, “Fuzzy modeling and synchronization of two totally different chaotic systems via novel fuzzy model,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 41, no. 4, pp. 1015-1026, 2011. [55] C. J. Cheng, T. L. Liao, J. J. Yan, and C. C. Hwang, “Exponential synchronization of a class of neural networks with time-varying delays,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 36, no. 1, pp. 209-215, 2006. [56] J. D. Cao, G. R. Chen, and P. Li, “Global synchronization in an array of delayed neural networks with hybrid coupling,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 38, no. 2, pp. 488-498, 2008. [57] H. G. Zhang, T. D. Ma, G. B. Huang, and Z. L. Wang, “Robust global expential synchronization of uncertain chaotic delayed neural networks via dual-stage impulsive control,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 40, no. 3, pp. 831-844, 2010. [58] A. Khan and P. Singh, “Chaos synchronization and linear feedback control,” International Mathematical Forum, vol. 5, pp. 511-525, 2010. [59] S. C. Tsay, C. K. Huang, D. L. Qiu, and W. T. Chen, “Implementation of bidirectional chaotic communication systems based on Lorenz circuits,” Chaos, Solitons, and Fractals, vol. 20, no. 3, pp. 567-579, 2004. [60] B. Nana, P. Woafo, and S. Domngang, “Chaotic synchronization with experimental application to secure communications,” Communication in Nonlinear Science Numerical Simulation, vol. 14, no. 5, pp. 2266-2276, 2009. [61] I. Pehlivan, Y. Uyaroglu, and M. Yogun, “Chaotic oscillator design and realizations of the Rucklidge attractor and its synchronization and masking simulation,” Scientific Research and Essays, vol. 5, no. 16, pp. 2210-2219, 2010. [62] B. Nana and P. Woafo, “Synchronized states in a ring of four mutually coupled oscillators and experimental application to secure communications,” Communication in Nonlinear Science Numerical Simulation, vol. 16, no. 4, pp. 1725-1733, 2011. [63] B. Anuradha and V. C. Veera Reddy, “ANN for classification of cardiac arrhythmia,” ARPN Journal of Engineering and Applied Sciences vol. 3, no. 3, pp. 1-6, 2008. [64] R. Almeida, S. Gouveia, A. P. Rocha, E. Pueyo, J. P. Martinez, and P. Laguna, “QT variability and HRV interactions in ECG: quantification and reliability,” IEEE Transaction on Biomedical and Engineering, vol. 53, no. 7, pp. 1317-1329, 2006. [65] D. Hang, S. Crozier, and S. Wilson, “A new heart rate variability analsis method by mean of quantifying the variation of nonlinear dynamic patterns,” IEEE Transaction on Biomedical and Engineering, vol. 54, no. 9, pp. 1590-1597, 2007. [66] A. Kikuchi, T. Shimizu, A. Hayashi, T. Horikoshi, N. Unno, S. Kozuma, and Y. Taketani, “Nonlinear analyses of heart rate variability in normal and growth-restricted fetuses,” Early Human Development, vol. 82, no. 4, pp. 217-226, 2006. [67] P. B. Pascolo, A. Marini, R. Carniel, and F. Barazza, “Posture as a chaotic system and an application to the Parkinson's disease,” Chaos, Solitons & Fractals, vol. 24, no. 5, pp. 1343-1346, 2005. [68] S. Lee, T. L. Kang, H. Y. Quan, and X. Tian, “Analysis of HRV based on correlation dimension and largest Lyapunov exponent,” Journal of Biomedical Engineering Research, vol. 28, pp. 188-192, 2009. [69] C. Raab, J. Kurths, A. Schirdewan, and N. Wessel, “Normalized correlation dimension for heart rate variability analysis,” Biomedizinische Technik, vol. 51, no. 4, pp. 229-232, 2006. [70] C. T. Chiang, “Contact Type Pulse Measurement Device,” USA Patent NO. US6945940B1, 2005. [71] M. Banbrook, G. Ushaw, and S. McLaughlin, “How to extract Lyapunov exponents from short and noisy time series,” IEEE Transaction on Signal Processing, vol. 45, no. 5, pp. 1378-1382, 2008. [72] A. N. Kolmogorov, “A new metric invariant of transitive dynamical systems and automorphisms in Lebesgue space,” Doklady Akademii Nauk SSSR, vol. 119, pp. 861-864, 1958. [73] D. J. Farmer, “Information dimension and the probability structure of chaos,” Zeitschrift fur Natureforschung, vol. 37, pp. 1304-1314, 1982. [74] J. P. Eckmann and D. Ruelle, “Ergodic theory of chaos and strange attractors,” Reviews Modern Physics, vol. 57, no. 3, pp. 617-656, 1985. [75] D. S. Broomhead and G. P. King, “Extracting qualitative dynamics from experimental data,” Physica D, vol. 20, no. 2-3, pp. 217-236, 1986. [76] P. Grassberger and I. Procaccia, “Measuring the strangeness of strange attractors,” Physica D, vol. 9, no. 1-2, pp. 189-208, 1983. [77] R. L. Smith, “Estimating dimension in noisy chaotic time-series,” Journal of the Royal Statistical Society, vol. 54, no. 2, pp. 329-351, 1992. [78] P. Frederickson, J. L. Kaplan, E. D. York, and J. A. York, “The Lyapunov dimension of strange attractors,” Journal of Differential Equations, vol. 49, no. 2, pp. 185-207, 1983. [79] J. C. Schouten, F. Taken, and C. M. Van den Bleek, “Maximum-likelihood estimation of the entropy of an attractor,” Physical Review E, vol. 49, no. 1, pp. 126-129, 1994. [80] Y. B. Pesin, “Characteristic Lyapunov exponents and smooth ergodic theory,” Uspekhi Matematicheskikh Nauk, vol. 32, no. 4, pp. 55-71, 1977. [81] R. May, “Simple mathematical models with very complicated dynamics”, Nature, vol. 261, pp. 45-67, 1976. [82] M. Henon, “A two-dimensional mapping with a strange attractor,” Communications in Mathematical Physics, vol. 50, no. 1, pp. 69-77, 1976. [83] E. N. Lorenz, “Deterministic nonperiodic flow,” Journal of Atmospheric Sciences, vol. 20, no. 2, pp. 130-141, 1963. [84] Z. M. Ge and P. C. Tsen, “Chaos synchronization by variable strength linear coupling and Lyapunov function derivative in series form,” Nonlinear Analysis, vol. 69, no. 12, pp. 4604-4613, 2008. [85] J. R. Hampton, The ECG made easy, Churchill-Livingston, 2008. [86] K. Phua, T. H. Dat, J. Chen, and L. Shue, “Human identification using heart sound,” 2nd International Workshop on Multimodal User Authentication, 2006. [87] M. Ding and E.Ott, “Enhancing synchronism of chaotic systems,” Physical Review E, vol. 49, no. 2, pp. 945-948, 1994. [88] H. Fujisaka and T. Yamada, “Stability theory of synchronized motion in coupled-oscillator systems,” Progress of Theoretical Physics, vol. 69, no. 1, pp. 32-47, 1983. [89] J. L. Dialecii and M. G. Krein, Stability of differential equations in Banach space, New York, AMS, 1974. [90] K. T. Alligood, T. D. Sauer, and J. A. Yorke, Chaos: an introduction to dynamical systems, Springer, New York, 1997.
摘要: 心電圖為記錄人體心肌細胞電性改變後,身體體液電位變化以非侵入方式擷取之資訊。醫學ECG信號數據庫中顯示,每個人的ECG信號均極複雜且隨機變化,由於ECG信號的這種特質,因此個人ECG信號很難以人為方式變造複製。最近幾年國内外研究人員對生命循環系统的核心-ECG的非線性特性作了深入研究,研究論文顯示,心電訊號看似複雜,但卻顯現混沌動態特質,也就是ECG雖為非線性動態行為但具有特殊規律性。本論文嘗試以非線性心電訊號為研究對象,提出一種使用混沌心電訊號進行個人資料安全通訊的系統。由於心電訊號在時域上很難看出特徵,因此將心電訊號轉至相平面並利用混沌理論分析心臟動力學的整體特性,作為個人身份辨識的基礎。 混沌系統具有寬頻功率頻譜、軌跡難以估測及近似隨機訊號的特性,因此廣泛被應用於通訊安全的研究。傳統的加密演算法,藉由數學演算法產生適當的參數值,缺點為容易被截取及解密。本研究利用一個輕巧可攜式的心電訊號擷取器,擷取使用者的心電訊號,將所建構完成之混沌心電訊號特徵系統,結合混沌函數與同步電路技術,建構一個嶄新的私人資料安全通訊系統,數值模擬與實際電路的測試結果,證明該方法正確可行。
Electrocardiogram (ECG) signals vary from person to person, making them difficult to be imitated and duplicated. Biometric identification based on ECG is therefore a useful application of this feature. The synchronization of chaotic systems provides a rich mechanism which is noise-like and virtually impossible to guess or predict. Traditional encryption algorithms by mathematic algorithms generate the appropriate parameter values. The weakness is that they are likely to be intercepted and decrypted. This dissertation presents an information encryption/decryption scheme based on ECG signals with chaotic functions and transmission via synchronized circuits. The required ECG signals are acquired by a novel handheld device when two electrodes are simultaneously touched. The measured signals are then used to reconstruct ECG signals and extract the features by a feature extraction program. To implement the proposed secure communication system, a pair of Lorenz-based synchronized circuits are realized by using operational amplifiers, resistors, capacitors and multipliers. The testing results containing numerical simulation and experiments are given to demonstrate that the proposed method is correct and feasible. High quality randomness in ECG signals results in a widely expanded key space, making it an ideal key generator for personalized data encryption. The experiments reported in this dissertation demonstrate possibility of this approach in encrypting texts and images, and consequently in secure communications.
其他識別: U0005-0705201213241500
Appears in Collections:電機工程學系所



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.