Advancing Biomedical Signal Security: Real-Time ECG Monitoring with Chaotic Encryption
- URL: http://arxiv.org/abs/2411.01310v1
- Date: Sat, 02 Nov 2024 17:08:14 GMT
- Title: Advancing Biomedical Signal Security: Real-Time ECG Monitoring with Chaotic Encryption
- Authors: Beyazit Bestami Yuksel, Ayse Yilmazer Metin,
- Abstract summary: We develop a real time ECG monitoring system that integrates chaotic encryption to protect the integrity and confidentiality of ECG signals.
Results demonstrate that chaotic encryption is effective in enhancing data security.
System's real time disease detection model, based on deep learning, operates seamlessly with encrypted data, providing accurate diagnosis without compromising security.
- Score: 0.0
- License:
- Abstract: The real time analysis and secure transmission of electrocardiogram (ECG) signals are critical for ensuring both effective medical diagnosis and patient data privacy. In this study, we developed a real time ECG monitoring system that integrates chaotic encryption to protect the integrity and confidentiality of ECG signals during acquisition, transmission, and storage. By leveraging the logistic map as the chaotic function for encryption, our system offers a highly secure framework that dynamically encrypts ECG signals without adding significant latency. To validate the system's reliability, we applied a series of security tests. The results demonstrate that chaotic encryption is effective in enhancing data security, as evidenced by high entropy values and strong key sensitivity, ensuring protection against common cryptographic attacks. Additionally, the system's real time disease detection model, based on deep learning, operates seamlessly with encrypted data, providing accurate diagnosis without compromising security. Our findings indicate that chaotic encryption, paired with real time analysis, is a powerful method for protecting sensitive medical data, making this approach particularly relevant for telemedicine and remote patient monitoring applications. The success of this system highlights its potential for broader application to other biomedical signals, providing a secure infrastructure for the future of digital health.
Related papers
- Application of $α$-order Information Metrics for Secure Communication in Quantum Physical Layer Design [45.41082277680607]
We study the $alpha$-order information-theoretic metrics based on R'enyi entropy.
We apply our framework to a practical scenario involving BPSK modulation over a lossy bosonic channel.
arXiv Detail & Related papers (2025-02-07T03:44:11Z) - Synthetic Time Series Data Generation for Healthcare Applications: A PCG Case Study [43.28613210217385]
We employ and compare three state-of-the-art generative models to generate PCG data.
Our results demonstrate that the generated PCG data closely resembles the original datasets.
In our future work, we plan to incorporate this method into a data augmentation pipeline to synthesize abnormal PCG signals with heart murmurs.
arXiv Detail & Related papers (2024-12-17T18:07:40Z) - Encryption-Aware Anomaly Detection in Power Grid Communication Networks [0.0]
The shift to smart grids has made electrical power systems more vulnerable to sophisticated cyber threats.
Our research focuses on the low-level communication layers of encrypted power grid systems to identify irregular patterns using statistics and machine learning.
arXiv Detail & Related papers (2024-12-06T09:58:56Z) - ViT Enhanced Privacy-Preserving Secure Medical Data Sharing and Classification [8.140412831443454]
This research introduces a secure framework consisting of a learnable encryption method based on the block-pixel operation to encrypt the data and subsequently integrate it with the Vision Transformer (ViT)
The proposed framework ensures data privacy and security by creating unique scrambling patterns per key, providing robust performance against leading bit attacks and minimum difference attacks.
arXiv Detail & Related papers (2024-11-08T16:33:20Z) - ECG-PPS: Privacy Preserving Disease Diagnosis and Monitoring System for Real-Time ECG Signal [0.0]
This study introduces the development of a state of the art, real time ECG monitoring and analysis system.
At its core, the system uses a three ECG connected through a serial port to capture, display, and record real time ECG data.
The system performs statistical operations on the ECG data stored in the cloud without decrypting it, using Fully Homomorphic Encryption (FHE)
arXiv Detail & Related papers (2024-11-02T17:03:25Z) - The Rlign Algorithm for Enhanced Electrocardiogram Analysis through R-Peak Alignment for Explainable Classification and Clustering [34.88496713576635]
We aim to reintroduce shallow learning techniques, including support vector machines and principal components analysis, into ECG signal processing.
To this end, we developed and evaluated a transformation that effectively restructures ECG signals into a fully structured format.
Our approach demonstrates a significant advantage for shallow machine learning methods over CNNs, especially when dealing with limited training data.
arXiv Detail & Related papers (2024-07-22T11:34:47Z) - A Security Assessment tool for Quantum Threat Analysis [34.94301200620856]
The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption.
A sufficiently powerful quantum computer could potentially exploit vulnerabilities in these algorithms, rendering data in insecure transit.
This work developed a quantum assessment tool for organizations, providing tailored recommendations for transitioning their security protocols into a post-quantum world.
arXiv Detail & Related papers (2024-07-18T13:58:34Z) - A high throughput Intrusion Detection System (IDS) to enhance the security of data transmission among research centers [39.65647745132031]
This paper presents a packet sniffer that was designed using a commercial FPGA development board.
The system can support a data throughput of 10 Gbit/s with preliminary results showing that the speed of data transmission can be reliably extended to 100 Gbit/s.
It is particularly suited for the security of universities and research centers, where point-to-point network connections are dominant.
arXiv Detail & Related papers (2023-11-10T14:30:00Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption [2.4996518152484413]
This paper proposes a robust image encryption algorithm tailored for Industrial IoT (IIoT) and Cyber-Physical Systems (CPS)
The algorithm combines Rule-30 cellular automata with chaotic scrambling and substitution.
Results indicate that our algorithm achieves close-to-ideal values, with an entropy of 7.99 and a correlation of 0.002.
arXiv Detail & Related papers (2023-09-20T17:22:01Z) - Information Theoretic Key Agreement Protocol based on ECG signals [7.417312533172291]
Wireless body area networks (WBANs) are becoming increasingly popular as they allow individuals to monitor their vitals remotely from the hospital.
With the spread of the SARS-CoV-2 pandemic, the availability of portable pulse-oximeters and wearable heart rate detectors has boomed in the market.
In 2020 we assisted to an unprecedented increase of healthcare breaches, revealing the extreme vulnerability of the current generation of WBANs.
arXiv Detail & Related papers (2021-05-14T18:58:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.