SECURED EEG DISTRIBUTION IN TELEMEDICINE USING ENCRYPTION MECHANISM

Similar documents
A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Design and Implementation of Data Scrambler & Descrambler System Using VHDL

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

Attacking of Stream Cipher Systems Using a Genetic Algorithm

Steganographic Technique for Hiding Secret Audio in an Image

DesignandImplementationofDataScramblerDescramblerSystemusingVHDL

New Address Shift Linear Feedback Shift Register Generator

Pseudorandom bit Generators for Secure Broadcasting Systems

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

Research Article Design and Analysis of a High Secure Video Encryption Algorithm with Integrated Compression and Denoising Block

Research Article. ISSN (Print) *Corresponding author Shireen Fathima

21.1. Unit 21. Hardware Acceleration

LFSR stream cipher RC4. Stream cipher. Stream Cipher

MATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM

Error Resilience for Compressed Sensing with Multiple-Channel Transmission

Study of White Gaussian Noise with Varying Signal to Noise Ratio in Speech Signal using Wavelet

How to Predict the Output of a Hardware Random Number Generator

A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique

A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MEDICAL IMAGING

TERRESTRIAL broadcasting of digital television (DTV)

Sequences and Cryptography

Comparative Analysis of Stein s. and Euclid s Algorithm with BIST for GCD Computations. 1. Introduction

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

DICOM medical image watermarking of ECG signals using EZW algorithm. A. Kannammal* and S. Subha Rani

LFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM

Stream Ciphers. Debdeep Mukhopadhyay

DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS

Metastability Analysis of Synchronizer

Guidance For Scrambling Data Signals For EMC Compliance

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Design of Fault Coverage Test Pattern Generator Using LFSR

WG Stream Cipher based Encryption Algorithm

Analysis of Different Pseudo Noise Sequences

Multiple Image Secret Sharing based on Linear System

Time Domain Simulations

A New Proposed Design of a Stream Cipher Algorithm: Modified Grain - 128

PA Substitution Cipher

An Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions

CHAPTER 8 CONCLUSION AND FUTURE SCOPE

Digital holographic security system based on multiple biometrics

Permutation based speech scrambling for next generation mobile communication

Synthesis Techniques for Pseudo-Random Built-In Self-Test Based on the LFSR

On Properties of PN Sequences Generated by LFSR a Generalized Study and Simulation Modeling

Implementation of a turbo codes test bed in the Simulink environment

LFSR Counter Implementation in CMOS VLSI

SDR Implementation of Convolutional Encoder and Viterbi Decoder

Optimization of Multi-Channel BCH Error Decoding for Common Cases. Russell Dill Master's Thesis Defense April 20, 2015

Design for Test. Design for test (DFT) refers to those design techniques that make test generation and test application cost-effective.

CHAPTER 2 SUBCHANNEL POWER CONTROL THROUGH WEIGHTING COEFFICIENT METHOD

COMPRESSION OF DICOM IMAGES BASED ON WAVELETS AND SPIHT FOR TELEMEDICINE APPLICATIONS

Performance Evaluation of Stream Ciphers on Large Databases

Video Encryption Based on Chaotic Systems in the Compression Domain

Skip Length and Inter-Starvation Distance as a Combined Metric to Assess the Quality of Transmitted Video

V.Sorge/E.Ritter, Handout 5

DESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA GENERATOR

Joint Optimization of Source-Channel Video Coding Using the H.264/AVC encoder and FEC Codes. Digital Signal and Image Processing Lab

Segmented Leap-Ahead LFSR Architecture for Uniform Random Number Generator

Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling

MULTI-STATE VIDEO CODING WITH SIDE INFORMATION. Sila Ekmekci Flierl, Thomas Sikora

Key-based scrambling for secure image communication

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ISCAS.2005.

Multichannel Satellite Image Resolution Enhancement Using Dual-Tree Complex Wavelet Transform and NLM Filtering

Statistical analysis of the LFSR generators in the NIST STS test suite

NON-BREAKABLE DATA ENCRYPTION WITH CLASSICAL INFORMATION

VLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits

Technical report on validation of error models for n.

2D ELEMENTARY CELLULAR AUTOMATA WITH FOUR NEIGHBORS

VLSI System Testing. BIST Motivation

Reducing DDR Latency for Embedded Image Steganography

ELEC 310 Digital Signal Processing

Audio Compression Technology for Voice Transmission

1 Introduction to PSQM

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

Review paper on study of various Interleavers and their significance

Optimum Composite Field S-Boxes Aimed at AES

Construction of Cable Digital TV Head-end. Yang Zhang

ECG Denoising Using Singular Value Decomposition

Testing of Cryptographic Hardware

Keywords Xilinx ISE, LUT, FIR System, SDR, Spectrum- Sensing, FPGA, Memory- optimization, A-OMS LUT.

WYNER-ZIV VIDEO CODING WITH LOW ENCODER COMPLEXITY

Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography

Fully Pipelined High Speed SB and MC of AES Based on FPGA

[Krishna*, 4.(12): December, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Institute of Southern Punjab, Multan

Reduction of Noise from Speech Signal using Haar and Biorthogonal Wavelet

Design and Implementation of Partial Reconfigurable Fir Filter Using Distributed Arithmetic Architecture

116 Facta Universitatis ser.: Elect. and Energ. vol. 11, No.1 è1998è to use any kind of encrypted information or with not very pleased attitude of loc

Robust Joint Source-Channel Coding for Image Transmission Over Wireless Channels

Welch Gong (Wg) 128 Bit Stream Cipher For Encryption and Decryption Algorithm

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory.

Design of Polar List Decoder using 2-Bit SC Decoding Algorithm V Priya 1 M Parimaladevi 2

EMBEDDED ZEROTREE WAVELET CODING WITH JOINT HUFFMAN AND ARITHMETIC CODING

VLSI Test Technology and Reliability (ET4076)

Transcription:

SECURED EEG DISTRIBUTION IN TELEMEDICINE USING ENCRYPTION MECHANISM Ankita Varshney 1, Mukul Varshney 2, Jitendra Varshney 3 1 Department of Software Engineering, 3 Department Of Computer Science and Engineering Greater Noida Institute of Engineering & Technology Greater Noida,India, SSLD Varshney Girls Engineering College Aligarh India 1 ankitavarshney04@gmail.com, 3 jitendra.v.varshney@gmail.com 2 Department of Computer Science and Engineering, Sharda University, India 2 mukul.varshney@sharda.ac.in ABSTRACT: Telemedicine changes the way patients are treated, from the traditional methods of a person care to remote care; telemedicine may also improve healthcare access to areas where it was essentially not available in the past. Telemedicine allows for a virtual communication, using real time audiovisual information transmitted over, between a patient and a physician at two different sites. Use of this technology has the potential to reduce the cost of providing healthcare. Telemedicine totally depends on public network. Telemedicine technology uses wireless network for the transmission of medical information or data. So there is a need to provide security of the patient valuable data so that unauthorized user can not access and modify the data. To provide the privacy or security to the information the various encryption techniques have been developed. In this paper the two encryption techniques LFSR - based and chaos-based encryption techniques are discussed. Our techniques provide all QOS features like key sensitivity, encryption decryption time, network latency etc. those are essential for the quality of medical data in telemedicine system. KEYWORDS: Telemedicine, Secure EEG, Chaos & LFSR (Linear feedback shift register) I. INTRODUCTION Telemedicine is a confluence of Communication Technology, Information Technology, Biomedical Engineering and Medical Science. Telemedicine is an effective solution for providing healthcare in the form of improved access and reduced cost to the rural patients. Telemedicine can enable ordinary doctors to perform extra-ordinary tasks. Telemedicine enable patients to communicate through video conferencing, audio, images and data. The presence of a network has prompted new problems with security and privacy[1].the main requirement in order to communicate with images and video is a secured and reliable means. Present Situation demands highly secured details of patients. EEG signal is supposed to contain sensitive health information of the patient. Due to the advancement in the technologies, securities of the data have become a critical issue. New approaches in encryption techniques are required to be developed for effective data encryption and multimedia applications. For future internet applications on wireless networks, besides source coding and channel coding techniques, cryptographic coding techniques for multimedia applications need to be developed. Therefore in this paper, we proposed two encryption techniques, First is LFSR based security technique and second is chaos based security technique. Key is used for encrypting 30

the data in cryptography. So we are generating the key based on the concept of Gold sequence generator. The Gold Sequence Generator is a well known sequence generator that generates the key with the help of numbers. This gold sequence will be used as a key for encrypting the 16-channel data of EEG signal i.e. medical signal. Our proposed technique will increase the speed for encryption and also provide good security against unauthorized access. This remote tele-consultation and treatment is much more valuable in case of post operation (Post Surgery) follow up since the patient is not required to travel unnecessarily and hence saving money and time. In this way, the systematic application of Information and Communication Technologies to the practice of healthcare rapidly expands the outreach of the healthcare system. II. BACKGROUND PSEUDORANDOM SEQUENCE GENERATORS (I) LFSR-based number Generator: Linear feedback shift register (LFSR) is a shift register whose input bit is a linear function of its previous state. It is one of the most important technique that provide numbers. Feedback shift register sequences have been widely used as synchronization codes, masking or Scrambling codes, and for white noise signals in communication systems. We are using the XOR function with the single bit of feedback registers. In short, an LFSR takes a series of bits from a long shift register, XORs them together to come up with a resultant bit, shifts the register along one bit, and then sticks the new bit back into the beginning of the register. Tapping technique provides the highly secure random numbers. If the positions of the bits (the taps ) are chosen carefully, this produces a maximal-length string of bits which is as damn near random as makes no odds to anyone other than mathematicians and cryptographers [4]. LFSR technique is highly supportable to all types of hardware. LFSR can produce sequences of large period and it can also be used for sequences with good statistical properties. (ii) Chaos-based random number Generator: Chaos-based cryptosystems are secure communication schemes designed for noisy channels. Chaos technique can provide high level of security due to the excellent unpredictability of chaotic sequence. Chaos synchronization is a technique developed since 1990s. Roughly speaking, it means that two chaotic systems can synchronize with each other under the driving of one or more scalar signals, which are generally sent from one system to another. Chaos is a pseudo-random process produced in nonlinear dynamical systems. It is non-periodic in nature, nonconvergent and extremely sensitive to the initial condition. There exists relationship between the chaos and cryptography [7-8] such as Ergodicity and confusion, Sensitivity to initial condition and diffusion with a small change in the secret key or plain text, Mixing property and diffusion, Deterministic dynamics and deterministic pseudo-randomness, Structure complexity and Algorithm complexity. there are two basic approaches to the design of chaos-based cryptosystems: analog and digital. The first one is generally based on chaos synchronization, and the associated chaotic systems are implemented in analog form. The second one is independent of chaos synchronization and the chaotic systems are completely implemented in digital form. Recall that traditional cryptographic schemes mainly rely on complicated algebraic operations. Interestingly, chaotic systems exhibit attractive complex dynamics but exist in a relatively simple form. In this sense, it is feasible to employ chaos theory in cryptographic aspect. Over the past decades, the field of chaos-based cryptography has become more and more popular in the research literature. One dimensional and two dimensional chaotic maps have been used for generation. The simplest class of chaotic dynamic system is one-dimensional chaotic map which is a difference equation of the form where the state variable x and the system parameter λ are scalars, i.e., x, λ є R, and ƒ is a mapping function defined in the real domain R R. As for an introductory purpose from here on, only one- and two-dimensional chaotic maps are briefly discussed. One Dimensional chaotic maps those are widely used are tent map and logistic map. We are using logistic map in our proposed technique. logistic map which is originally proposed to describe population growth model [9]. The map is quadratic and thus nonlinear with the following expression: Where b is the control parameter governing the chaotic behavior. To ensure xn in the range [0,1], parameter b has to be in the range [0,4]. Figure 1. shows the trajectory of the map 31

with b = 3.999. Both the tent and the logistic maps exhibit a maximum at xn = ½. In the next section, the logistic map is explicitly chosen as a typical study case of chaotic behavior. Fig2.Graphical View of LFSR Based Technique The basic idea of generating the gold sequence is that the random sequence generated by Generator1 and random sequence generated by Geneator 2 are EXORed together. After this gold sequence/number EXORed with the transform EEG signal to get the encrypted EEG signal. Transform EEG signal contain the approximate values of original signal on which we will apply encryption this may result in decreases both encryption and decryption time. (ii) haos-based Security Technique Fig1: The Acknowledgement mechanism works like a chain III. PROPOSED TECHNIQUES (i) LFSR-based Security Technique: This technique is carried out on 16-channel/reference electrodes of EEG signal. The two LFSR number generators with different parameter will be used to generate the gold sequence which is used as key for encryption/decryption process. Original Transforma tion Selection of coefficient This technique is carried out on 16-channel/reference Electrodes of EEG signal. The two chaos number generators with different parameter will be used to generate the gold sequence which is used as key for encryption/decryption process. The basic idea of generating the gold sequence is that the random sequence generated by Generator1 and random sequence generated by Generator 2 are EXORed together. After this gold sequence/number EXORed with the transform EEG signal to get the encrypted EEG signal. Transform EEG signal contain the approximate values of original signal on which we will apply encryption this may result in decreases both encryption and decryption time. But still chaos-based technique in transform domain will required the more time than LFSR-based technique due to computational complexity. Original Transformati on Selection of coefficient Encrypted Inverse Transformation Encrypted Inverse Transformation 16 bits LFSR based number Generator 1 X0, k Chaos based number Generator 1 Gold Sequence Generator Gold Sequence Generator 16 bits LFSR based Number Generator 2 X0, k Chaos based number Generator 2 32

(i) Fig3. Graphical View of Chaos-based technique IV.PERFORMANCE MEASURES Time Analysis (Encryption-Decryption Time) Encryption time is required to encrypt the EEG signal at sender end and decryption time is required to decrypt the EEG signal at the receiving end. (ii) Key Sensitivity An efficient encryption algorithm should be key sensitive. Key sensitivity means a small change in secret key during decryption process results into completely different decrypted image. (iii) MSE(Mean Squared Error) MSE measures the average of the squares of the errors. The error is the amount by which the valued implied by the estimator differs from the quantity to be estimated. (iv) PSNR(Peak signal to noise ratio) It is the ratio between the maximum possible power of a signal and the power of corrupting noise that effects on the value of its representation. is the original data & the noise is the error. PSNR is expressed in terms of decibel scale. Values over 40db in PSNR are acceptable in terms of degradation. (v) NIST TEST NIST of the United states is statistical package [12] used for testing the randomness of binary sequences produced by either hardware or software based number generators. The NIST 800-22 test suite consists of a set of 16 tests focusing on a variety of different types of non-randomness that could exist in a sequence. Some tests may be decomposed into a variety of sub-tests. Therefore total 189 items exist in the test suite. For each type of test, after complex statistical analysis provided by the NIST 800-22 suite was performed, a percentage called P-value can be derived from the test data. The test whose P-value falls in the confidence interval succeed[12]. V.CONCLUSION / FUTURE WORK In this paper, Twe are proposing two techniques one as a LFSR based and other as chaos based for providing security for medical signals i.e. EEG data. If we send these data to other places then nobody can access or modify these data. We have studied a lot about the telemedicine networks and all other techniques those have been developed. These existing techniques are not good enough in the area of speed and security. So, K we are trying to simulate our proposed techniques that can provide higher security and also good in encryption decryption speed.we will analyze them on the basis of quality of service parameters and also analyze on the basis of NIST test to find out the randomness of our chaotic sequence bits. Telemedicine and Cryptography is an emerging field, which is capturing the imagination of all the researchers worldwide. Thus the scope M of enhancements and improvements is enormous. We will try to simulate these techniques via using some simulator like MATLAB and analyze the performance on the basis of quality of service parameters. For these techniques we can create an interactive GUI so that they can be used for commercial purpose. We can use other 1D and 2D chaotic equation[5] for generating the P numbers for better results. VI.REFERENCES [1] K.V.R. Ravi, R. Palaniappan, C. Eswaran and S. Phon- Amnuaisuk. Data encryption using event-related brain signals International Conference on Computational Intelligence and Multimedia Applications 2007. [2] http://www.garykessler.net/library/crypto.html. [3]http://en.wikipedia.org/wiki/Symmetric-key_algorithm. [4]http://www.cs.cornell.edu/courses/cs513/2007fa/TL04.asy mmetric.html. [5] Chin-Feng Lin and Cheng-Hsing Chung. A Fast Chaosbased Visual Encryption Mechanism for Integrated ECG/EEG Medical s with Transmission Error. 12 th WSEAS International Conference on SYSTEMS, Heraklion, Greece, July 22-24, 2008. [6] Lala krikor, sami baba at al, Image Encryption Using DCT and Stream Cipher, European Journal of Scientific Research ISSN 1450-216X Vol.32 No.1 (2009), pp.47-57. 33

[7] Gr undlingh, W. & van Vuuren, J. H. (Using Genetic Algorithms to Break a Simple Cryptographic Cipher. Retrieved March 31, 2003 from http://dip.sun.ac.za/ vuuren/abstracts/abstr genetic.htm [8] R. Brown, L. O. Chua, Clarifying chaos: Examples and counterexamples, Int. J. Bifurcation and Chaos 6 (2) (1996) 219 249. [9] Ismet Ozturk, Ibrahim Sogukpinar, Analysis and Comparison of Image Encryption Algorithms, World Academy of Science, Engineering and Technology 3 2005. [10]http://en.wikipedia.org/wiki/Linear_feedback_shift_regist er. [11] G. Alvarez, F. Montoya, M. Romera, G. Pastor, Cryptanalysis of a chaotic secure communication system, Phys. Lett. A 306 (4) (2003) 200 205. [12]Rashidah Kadir, Mohd Aizaini Maarof, A Comparative Statistical Analysis of Pseudorandom Bit Sequences, 2009 Fifth International Conference on Information Assurance and Security. 34