Analysis of human electrocardiogram for biometric recognition
EURASIP Journal on Advances in Signal Processing
ECG Based Recognition Using Second Order Statistics
CNSR '08 Proceedings of the Communication Networks and Services Research Conference
A new data hiding scheme for binary image authentication with small image distortion
Information Sciences: an International Journal
Compression-unimpaired batch-image encryption combining vector quantization and index compression
Information Sciences: an International Journal
Pattern Recognition
Algebraic break of image ciphers based on discretized chaotic map lattices
Information Sciences: an International Journal
A chaos-based symmetric image encryption scheme using a bit-level permutation
Information Sciences: an International Journal
Keyed hash function based on a chaotic map
Information Sciences: an International Journal
Keyed hash function based on a dynamic lookup table of functions
Information Sciences: an International Journal
Local Shannon entropy measure with statistical tests for image randomness
Information Sciences: an International Journal
A new 1D chaotic system for image encryption
Signal Processing
Hi-index | 0.07 |
The development of efficient data encryption to ensure high security of information transmission has long been a popular research subject. Because electrocardiogram (ECG) signals vary from person to person, and can be used as a new tool for biometric recognition. This study introduces an individual feature of ECG with chaotic Henon and logistic maps for personalized cryptography. This study also develops an encryption algorithm based on the chaos theory to generate initial keys for chaotic logistic and Henon maps. The proposed personalized encryption system uses a convenient handheld device to collect ECG signals from the user. High quality randomness in ECG signals results in a widely expanded key space, making it an ideal key generator for personalized data encryption. The experiments reported in this study demonstrate the use of this approach in encrypting texts and images, and applied of the proposed approach to secure communications.