Skip to main content
Springer Nature - PMC COVID-19 Collection logoLink to Springer Nature - PMC COVID-19 Collection
. 2022 Jul 4;46(4):913–923. doi: 10.1007/s40998-022-00517-1

Transmission and Decryption of the Audio Signal Masked with ECG by FDM Method

I Parlar 1,, M N Almali 1, O Atan 1, A C Cabuker 1, O Silahtar 1
PMCID: PMC9250995

Abstract

Today, the use of these methods as hybrids has provided the motivation to be a solution to important problems, since the existing methods are insufficient at some points in ensuring the security of personal data. In data security, the inability to decrypt and decrypt the signal to be encrypted retrospectively has always been the subject of research in terms of privacy. At this point, it was preferred to use the electrocardiography (ECG) signal, which is a signal that shows the vital signs of the human body and is also difficult to copy. In the study, firstly, the emulator circuit was obtained by using the mathematical model of the ECG signal. With this obtained signal, the audio signals are masked. The audio signal masked on the transmitter side and the signals providing synchronization were transmitted to the receiver side over a single channel using the frequency division multiplexing (FDM) method. Then, the sliding mode control (SMC) method was chosen for the synchronization of the ECG emulator circuits on the receiver and transmitter side. Histogram, spectral, mean square error (MSE), peak signal to noise ratio (PSNR), key space and key sensitivity, NSCR (number of sample change rate), UACI (unified average changing intensity) and PESQ (perceptual evaluation of speech quality) analyses were used to check the accuracy of the system. These analyses showed that the ECG encoding method has faster unit change, reduces synchronization time, minimizes losses and improves the security of the masked signal compared to other methods sent from two channels. Finally, use of an arrhythmia ECG signal for the synchronization signal on both the transmitter and receiver sides, the synchronization of this signal with the SMC method and the testing of a live audio recording in addition to the conversation, distinguishes the study from other existing studies and reveals its originality.

Keywords: ECG emulator, FDM method, Sliding mode control, Security analytics, Spectral entropy, Encryption

Introduction

Some chaotic signals that can cause security problems, especially in the transmission channel, ECG signals with sudden amplitude changes, non-repeating, periodic and non-continuous chaotic behavior have been one of the biggest reasons for preference. In addition, when these signals are displayed in real time, they create a kind of chaotic signal behavior because they do not repeat themselves, especially in people with arrhythmia. During the human body, the heart rate can change instantaneously due to the increase and decrease in sleep or movements during exertion (Cilhoroz et al. 2021; Felber et al. 2008). These are important factors that can cause arrhythmia as well as increase the uniqueness of the signal (Chen et al. 2012; Chua 1992; Chua et al. 1993; Ebrahimi et al. 2020; Huang et al. 2016; Lorenz 1963; Quiroz-Juárez et al. 2019; Sprott 2000). Therefore, one of our biggest motivations has been that the chaotic signals available in encrypted communication systems do not have fast amplitude changes to encrypt the data signal. Following this motivation, firstly, the emulator circuit was obtained by using the mathematical model of the ECG signal in this study. With this obtained signal, both masking and decoding of the audio signals were performed (Amr et al. 2019; Kakade et al. 2014; Li et al. 2020; Naskar et al. 2019). Since the ECG signal cannot be used simultaneously on both receiver and transmitter side in real time, the emulator circuit is preferred. It is ensured that these identical emulator circuits are located on the transmitter and receiver sides of the communication in the same way.

The emulator circuit acts as a chaotic oscillator that encodes and decodes audio signals. In order for the ECG emulator used throughout the system to work without delay on the receiver and transmitter side, synchronization of both emulators was provided by the SMC method (Xia et al. 2011). In addition, providing communication over a single channel using the FDM method has provided an advantage over existing two-channel communication systems. A guard band was created by calculating the frequency band gaps for each channel so that the audio signals do not overlap. These signals, which are intended to be transmitted to the receiver side, are precisely separated from each other with the help of analog filters. Assuming that the noise during acquisition of ECG signals is natural and that the variability of electrocardiograms depends on many factors (emotional state, diet, whether the person is making a physical exertion or resting, etc.), it is impossible to obtain an ECG signal the same way on both the transmitter and receiver side. The crucial aspects of transmitting the arrhythmia ECG masked audio signal with the FDM method can be described as follows:

  • In the simulation, improvement of the FDM performance during encoding of both a conversation and a live recording with the proposed method.

  • The presence of identical and arrhythmia ECG emulators on the receiver and transmitter side in chaotic communication has created an important advantage. In this way, it is aimed to contribute to the improvement of the overall performance of the system.

  • Use of an arrhythmia ECG signal for the synchronization signal on both the transmitter and receiver sides, the synchronization of this signal with the SMC method and the testing of a live audio recording in addition to the conversation, distinguishes the study from other existing studies and reveals its originality.

  • Compared to the chaotic signals used in classical coding, ECG is faster in coding due to its dynamic movement in case of arrhythmia. It also increases the corruption of data to be encrypted and makes it difficult for unauthorized persons to access the data.

  • ECG arrhythmia, which can occur in different types, further increases the analysis of data by unauthorized persons (İzci et al. 2020; Karataş 2021).

  • Performing various security analyses and tests reveals the efficiency and performance of this study.

The remainder of the paper is arranged into several sections. Section 2 delineates the ECG system design and FDM method in detail. Section 3 explains the configuration and description of the proposed masking scheme and also theoretical analysis and system of synchronization. The proposed masking scheme is comprehensively explained to investigate the safety and quality of the masking in Sect. 4. Section 5 draws the main conclusions and future scope of the paper.

Methodology

ECG System Design

If the nonlinear variants x1-x6 f the discretized (Barrio–Varea–Aragon–Maini) BVAM model are associated with natural pacemakers, the action potentials of the (sinoatrial) SA node, (atrioventricular) AV node and His–Purkinje complex are represented by coupled three oscillators. From the numerical integration of the ECG general system, it was seen that the variables x1, x5 and x2, x6 respectively, are not independent from each other due to symmetry. Thus, the system has become even smaller. The resulting equivalent system of equations is expressed as x2 = x6, which gives the result x1 = x5.

Here, β,C and H are parameters of the system. Finally, the system has become simpler by being reduced to a four-component (ordinary differential equations) ODE systems that are viewed as below (Quiroz-Juárez et al. 2019):

x˙1=x1-x2-Cx1x2-x1x22x˙2=Hx1-3x2+Cx1x2+x1x22+βx4-x2x˙3=x3-x4-Cx3x4-x3x42x˙4=Hx3-3x4+Cx3x4+x3x42+2βx2-x4 1

Since the ECG signal is a composite of waves of different amplitudes from different parts of the heart, the ECG signal is thought to be a linear mix of electrical activations of the main pacemakers of different strengths. In this way, signals very similar to ECG signals can be produced with variables xi. Also,αi coefficient shows the behavior of ECG emulator system. Control parameters of arrhythmia ECG emulator for H=2.7126,C=1.35 and β=4. These specified values constitute limits approach of the arrhythmia ECG signal. Otherwise, the ECG signal without arrhythmia reduces the performance of the system. Signals that closely resemble ECG signals can be generated by an adequate linear combination of the variables xi on depend time (t) (Gois et al. 2009):

ECGt=α1x1+α2x2+α3x3+α4x4 2

This chaotic emulator provides an advantage in encryption operations as it has faster output responses than the Sprott chaotic (Gupta et al. 2019).

Frequency Division Multiplexing Method

Frequency division multiplexing method enables the transmission of signals over a single channel in the communication to be made with the receiver and transmitter. On the basis of frequency division multiplexing, it is based on placing the signals on the frequency band without overlapping each other by performing double sideband amplitude modulation. The signals placed in the frequency band are separated by high-grade filters on the receiver side and returned to their original state (Rao 2018; Wu 2010; Rajabpour-Moghaddam et al. 2014).

In the study, masked audio signal and synchronization signals x1,x2,x3,x4 were transmitted from a single channel using different carrier signals for synchronization of ECG emulator circuits. In double sideband amplitude modulation, x1-2.5kHz,x2-7.5kHz,x3-12.5kHz,x4-17.5kHz, the masked audio signal is modulated with 35kH carrier signals. The mathematical expression of double sideband amplitude modulation is as follows:

mtct=Vm.cosWmtVc.cosWct=VmVc/2cosWm+Wc+cosWm-Wc 3

Configuration and Description of the Proposed Masking Scheme

The general purpose of this system is to communicate between the receiver and the transmitter over a single channel for reduces noise with 8th-order Chebyshev type II filter.

On the transmitter side; the ECG signal (x1) received from the master ECG emulator circuit is received as a chaotic response. The frequency modulator then generates a unique key for the system based on the chaotic movement of the ECG signal. Encryption is performed by adding the generated key to the audio. The encrypted audio signal and x1,x2,x3 and x4, which will provide synchronization, are transmitted over the same channel by frequency division multiplexing method. The frequency division multiplexing method allows signals to be transmitted with the help of amplitude modulation. Signals are transmitted using carrier signals with specific frequencies.

On the receiver side; the received signals are separated by analog filters according to their frequency. Signals separated on the receiver side enter a controller, ensuring the synchronization of the emulator circuits on the receiver and transmitter side, and the password on the audio is removed.

In order to remove unauthorized users’ access to data in the communication channel, the masked signal c was obtained by masking the message signal m, the chaotic signal together with the k switch. Mathematical expression of c masking signal is as follows:

c=fm,k 4

The masked signal obtained from the frequency division multiplexing channel was decoded after synchronization with the SMC. It is seen that m˙ given in Eq. (5) is approximately equal to the message signal given in Eq. (4).

m˙=fc,k 5

The detailed step-by-step description of the proposed masking scheme encryption is given in the flowchart shown in Fig. 1.

Fig. 1.

Fig. 1

Flowchart of the proposed masking scheme

In the proposed encryption diagram in Fig. 1, the ECG signal, which has chaotic dynamics from the ECG master circuit, produces an analog key in frequency modulation since it has a fast heart arrhythmia feature. The audio signal is encrypted with this generated analog key. As in chaotic communication, the oscillators (ECG) on the receiver and transmitter side must be synchronized in real time in order to perform the decoding process. Therefore, it is necessary to send signals to ensure synchronization from the ECG master circuit. In order to send these signals over the same channel, frequency division multiplexing method was used. On the receiver side, the signals transmitted with certain carrier frequencies are separated with the help of analog filters. Then, the synchronization between the two ECG circuits was ensured and the original data was reached by removing the analog switch from the ECG slave circuit from the signal. The synchronization of the proposed system was carried out with sliding mode modulation.

Synchronization with Sliding Mode Control

There are many SMC applicable in the field of hyperchaotic communication in the literature (Al-sawalha et al. s; Azar et al. 2018; Rajagopal et al. 2017). In this section, synchronization of identical hyperchaotic systems is performed using sliding mode control and Lyapunov stability theory (Hahn 1967). Let the hyperchaotic system be formulated as follows:

x˙=Ax+fx,t 6

where xRn the state of the system, ARnxRn is the matrix of the system parameters, and f:RnRn is the nonlinearity function of the system. This system is chosen as master or drive system. Also slave or response system is described as follows in Eq. (7). The general structure of the frequency division multiplexing-based ECG chaotic masking system is shown in Fig. 2.

y˙=Ay+gy,t+Δgy,t+dt+u 7

Fig. 2.

Fig. 2

Chaotic masking system scheme for audio transmission

Δgy,t is the uncertain term which represents un-modeled dynamics or variations and dt is external bounded disturbance. In this study, Δgy,t+dt=0 is assumed. Also uRn is the control input, g:RnRn is the nonlinear part of the slave system, and yRn is the state of the system. The nominal form in Eqs. (6) and (7) can be obtained from Eq. (1). Additionally main subject of this section is synchronization of two identical systems in Eqs. (6) and (7) for different initial conditions. Control input in Eq. (7) is designed to provide for the following condition: limtet0 where et=e1t,e2t,e3t,e4tT such that eit=yi-xi for i1,2,3,4. In (Hahn 1967; Nagamalai et al. 2011; Meghanathan et al. 2012), the error dynamics and control parameters are obtained as;

e˙=Ae+ηx,y+u 8

where ηx,y=gy,t-f(x,t). Then, the control input u is defined as (Vaidyanathan et al. 2011);

ut=-ηx,y+Bv(t) 9

where B is a constant gain vector selected such that (A,B) is controllable. Substituting Eq. (9) into (8), the error dynamics are obtained as;

e˙=Ae+Bv 10

which is a linear time-invariant control system with single input v. Sliding surface is chosen as;

s=Ce=c1e1+c2e2+c3e3+c4e4 11

where C=[c1,c2,c3,c4] is a constant vector. Equation (10) satisfies the following conditions when in sliding surface (s).

se=0ands˙e=0 12

Using Eqs. (10) and (11), (12) is rewritten as;

s˙e=CAe+Bv=0 13

Solving Eq. (13), the equivalent control law is obtained as follows;

veqt=-CB-1CAe(t) 14

where C and B matrices must be chosen such that CB0. Using Eqs. (14), (15) is rewritten as;

e˙=[I-BCB-1C]Ae 15

where C and B are chosen such that the system matrix I-BCB-1C satisfies Hurwitz condition. Thus, Eq. (15) is globally asymptotically stable. The constant plus proportional rate reaching law is used to design sliding mode controller as follows, where sgn(.) denotes the sign function and constants q>0,k>0 are chosen.

s˙=-q.sgns-ks 16

Finally, control input v(t) is obtained as shown.

vt=-CB-1[CkI+Ae+q.sgns] 17

The controller designed above is simulated using MATLAB/Simulink. In the simulation, 4th-order Runge–Kutta method is used with the step size of 0.001s. In order for the MATLAB/Simulink program to provide fast and effective results, the step size interval is selected as 0.001 s by default. Increasing the step size value allows the simulation to be carried out quickly, but makes it difficult to observe how efficiently the controller is working. The time interval determined as the limitations of their approach is the most optimal value. Also initial conditions are chosen as; x0=x10x20x30x40=-0.10.20.10.1 and y0=y10y20y30y40=-0.30.20.001-0.5 then C=11-2-2,B=11-1-2T,q=0.3 and k=0.85 are chosen. Simulation results are obtained as in Fig. 3. The results showed that the master and slave systems are synchronous and the synchronization system is stable.

Fig. 3.

Fig. 3

Synchronization of identical hyperchaotic system

Result Analysis and Performance Evaluation

There are many methods in the literature to investigate the safety and quality of the masking and encryption method applied to the sound signal (Almali et al. 2016; Sheu et al. 2010). Some of the most decisive analyses among these methods were used in this study;

  • Histogram analysis

  • Spectral entropy

  • PSNR tests and MSE values

  • Key space and key sensitivity analysis

  • NSCR and UACI analysis

  • PESQ analysis

In this section, comparisons of masking and decrypting processes applied on the audio signal were done.

In the comparison, it was observed that the audio signals were completely disturbed and the audio signal itself was obtained after the synchronization achieved while decrypting. The original, masked and decrypted form of speech is given in Fig. 4. As can be seen in the deciphering processes in Fig. 5, it was observed that the masking continued until the entire synchronization process. Synchronization takes place in a very short time. Thus, data loss on the receiver side is low.

Fig. 4.

Fig. 4

Original/Masked/Decrypted audio signals

Fig. 5.

Fig. 5

Speech-Original/Masked/Decrypted Histogram Analysis

Histogram Analysis

Histogram analysis enables the determination of the accuracy of the encryption process by starting from the distribution of the data. If the distribution of the data is far from the original data, it is understood that the encryption process is done in a robust way.

The histograms of the original, masked and decoded signals are given in Fig. 5. It has been observed that the distribution of the data in the masked audio signal in the histograms is different from the original signal.

Spectral Entropy

Spectral entropy is used to detect the region and movement of silences and speech activities in sound data. Thus, it turns out whether the data compared belong to the same voice data or not (Toh et al. 2005). In spectral entropy graphics, the entropies of the audio signals decrypted with the original audio signals appear to follow each other locally, in both value and motion. In spectral entropy applications, it is assumed that the speech spectrum is more organized during speech segments than noise segments. Thus, vocal speech regions cause low entropy. Spectral entropy of the signal is shown in Fig. 6.

Fig. 6.

Fig. 6

Spectral entropies of speech

PSNR Tests and MSE Values

The peak signal-to-noise ratio, often abbreviated as PSNR, is used for the ratio between the maximum power of a signal and the interfering noise power that affects the accuracy of its representation.

There is an inverse proportion between PSNR and MSE values. The reason for the high PSNR value between the original and the masked signal is because of the lower MSE than the decrypted signal (Lagmiri et al. 2018). PSNR and MSE test values are indicated in Tables 1, 2, 3. The mean square error calculated for the X and Y vectors is expressed as:

MSE=1ni=1nXi-Yi2 18

Table 1.

PNSR and MSE test of audio signals

Different Cases PSNR MSE
Original/Decrypted 64.7718 0.1472
Original/Masked 23.99 16.09

Table 2.

Key space analysis

Lima et al. (2015) Farsana et al. (2016) Belmeguenai et al. (2017) Kate et al. (2018) Naskar et al. (2019) Ours
Key space size 2256 2477 2512 2512 2256 2512

Table 3.

Key sensitivity analysis

Proposed method Correct key Modified key Figure of modified key Correlation coefficient Number of signal change rate
The control parameter u u u+0.001 Fig. 4 0.00016 100%

PSNR values for the encrypted audio signal (Y) and the original audio signal (X) can be calculated as follows:

PSNR=10log10MAX2MSE 19

where MAX is the maximum values of the given signals.

Key Space and Key Sensitivity Analyzes

The width of the key space plays a critical role for a secure encryption method. (Alvarez et al. 2006). Even small changes in keys used in key sensitivity analysis, encryption and decryption can lead to very different results in encryption and decryption processes. In a secure encryption, it should produce a secure encryption for very small changes in keys. (Atalay et al. 2019; Çavuşoğlu 2016).

NSCR and UACI Analysis

The encryption method used for security against potential attacks is an important parameter. This security measure is calculated with NSCR and UACI tests (Ahmad et al. 2016; Çavuşoğlu 2016; Abdelfatah 2020). During the execution of these tests, two different audio signals must be encrypted with the same key. These mixed audio signals can be found by the equations given below:

NSCR=iDiNsx100%i=1,2,N 20
UACI=1Nsixi-xi65535 21
hereDi=1,xixi0,otherwise 22

The NSCR and UACI analysis values obtained for the encrypted signal of the original signal (xi) and the encrypted signal of the modified signal (xi) are shown in Table 4. The proposed scheme appears to have better resistance to a different attack.

Table 4.

NSCR and UACI analysis of audio signals

Audio file NSCR UACI
Audio-1 100% 37.11%

PESQ Analysis

PESQ is a popular analysis method that automatically evaluates speech quality. It has been determined that the Audio-1 signal used in this study has a moderate performance. In addition, since it does not provide enough data for the Audio-1 file, it is an expected result to obtain a middle level of performance.

Comparative Study

The advantages of the proposed arrhythmia ECG chaotic attractor method compared to other methods are evaluated in this section. The most common security parameters such as correlation, key space and key sensitivity, PSNR, UACI, NSCR and PESQ were used for performance comparison.

The values shown in Table 5 show how low the similarity is between the original audio signal and the encrypted audio signal.

Table 5.

PSNR and correlation coefficient between the original and encrypted audio signals

Audio file Size Duration (Sec.) Correlation coefficient Speed(s/KB) PSNR
Audio-1 1.294 KB 10 0.00016 0.0077 64.7718

Table 6 shows these comparisons against other methods. It has been observed that the proposed method has the lowest correlation coefficient value between the original audio signal and the encrypted audio signal. When PSNR, UACI and NSCR values are examined, it is determined that the proposed method has a stronger encryption.

Table 6.

Comparison with other methods

Method Correlation coefficient Key space PSNR UACI NSCR RMS CF
Lima et al. (2015) 0.0021 2256 33.29% 99.9992% 4.8
Farsana et al. (2016) 0.00023 2447
Belmeguenai et al. (2017) −0.0011 2512 47.98
Kordov et al. (2019) 0.0038 2149 4.39 99.996%
Naskar et al. (2019) 0.000207 2256 99.9989% 0.6 4.8
Ours 0.00016 2512 64.7718 37.11% 100%

Conclusion and Future Scope

In this study, speech pattern (Audio-1) which was taken from Cambridge University publishing Face2Face with mutual dialogues (Redston et al. 2013) is masked with the help of a signal received from a ECG chaotic emulator. The masked audio signal and a second ECG chaotic signal that will synchronize the system are transmitted on a single channel. The FDM method was used to transmit two signals through a single channel. In this method, the signals are placed on the frequency spectrum using DSB-SC amplitude modulation. In addition, shielding tapes have been created to avoid overlapping between the signals. The chaotic behavior of the ECG signal ensured that the audio signal was reliably encoded. As can be seen in histogram analysis, it was observed that there was no similarity between the distribution of the original audio signal and the masked audio signal data and only the amplitude difference occurred between the original audio signal and the decoded audio signal. The reason for this difference is many of filters used on the FDM side (Atan 2020; Bagheri et al. 2009; Gao et al. 2016; Garcia-Hernandez et al. 2013; Sathiyamurthi et al. 2017; Liu et al. 2007). The synchronization time was realized in a very short time such as 0.02 s with SMC.

It has been observed that the ECG emulator circuit performs faster and more secure encryption than the Sprott chaotic oscillator. Spectral entropy was used to track the region and movement of audio signals. In spectral entropy simulations, it has been observed that the original and decrypted audio signals were in the same ranges and follow each other. When spectral entropies of original and masked signals were compared, it was determined that the ranges and movements were different from each other. For the audio signal used in the study, MSE values among the original/decrypted signals are desired to be close to zero, and among the original/masked signals, the value being as far from zero as possible is an expression of the successful decrypted process. In this process, simulation worked 15 s. For these reasons, when all parameters are evaluated in total against various differential attacks, it is seen that the proposed method exhibits a strong behavior. Finally, it was concluded that the proposed system is reliable and successful in encryption. In this way, a theoretical contribution was made to the literature. In addition, the use of a single channel to transmit the masked audio signal and the synchronization signal to the receiving side will provide practical benefits in communication systems.

The next step of this research is to increase data security in future studies on new types of heart arrhythmias caused by diseases such as Covid-19 (Akkus et al. 2021). In addition, by combining existing methods with hybrid methods, it is to ensure the optimum data security in terms of both simulation and application.

Acknowledgements

The authors thank the associate editor and the anonymous reviewers for their constructive comments and useful suggestions.

Authors' Contribution

All the authors made significant contributions to the work. İP was involved in writing—reviewing and editing, MNA helped in supervision, conceptualization, methodology, ÖA contributed to visualization, investigation. ACÇ was involved in writing—original draft preparation, validation, OS helped in writing—original draft preparation, data curation.

Funding

This research did not receive any specific grant from funding agencies in the public, commercial or not-for-profit sectors.

Declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Contributor Information

I. Parlar, Email: ishakparlar@yyu.edu.tr

M. N. Almali, Email: mna1@yyu.edu.tr

O. Atan, Email: oatan@yyu.edu.tr

A. C. Cabuker, Email: alicancabuker@yyu.edu.tr

O. Silahtar, Email: onursilahtar@yyu.edu.tr

References

  1. Abdelfatah RI. Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations. IEEE Access. 2020;8:69894–69907. doi: 10.1109/ACCESS.2020.2987197. [DOI] [Google Scholar]
  2. Ahmad J, Hwang SO. A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl. 2016;75(21):13951–13976. doi: 10.1007/s11042-015-2973-y. [DOI] [Google Scholar]
  3. Akkus O, Bal T, Yagoobi H, Bekler O, Akkus G, Cabalak M. Electrocardiographic findings and cardiac safety of hydroxychloroquine+azithromycin in hospitalized patients with COVID-19. Cukurova Med J. 2021;46(2):691–698. [Google Scholar]
  4. Almali MN, Dikici Z. The simulation of sound signal masking with different chaotic oscillations and its circuit application. Turk J Electr Eng Comput Sci. 2016;24(5):4284–4293. doi: 10.3906/elk-1504-264. [DOI] [Google Scholar]
  5. Al-sawalha MM. Synchronization of different order fractional-order chaotic systems using modify adaptive sliding mode control. Adv Differ Equ. 2020;2020(1):1–1. doi: 10.1186/s13662-020-02876-7. [DOI] [Google Scholar]
  6. Alvarez G, Li S. Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos. 2006;16(8):2129–2151. doi: 10.1142/S0218127406015970. [DOI] [Google Scholar]
  7. Amr S, Hussein HED, Ramadan N, El-Shafai W, El-Hanafy W, El-Samie A, Fathi E. Chaotic encryption of ECG signals with a random Kernel approach. Menoufia J Electr Eng Res. 2019;28:115–121. doi: 10.21608/mjeer.2019.76786. [DOI] [Google Scholar]
  8. Atalay NS, Doğan Ş, Tuncer T, Akbal E. Image encryption methods and algorithms. Dicle Univ Eng Fac J Eng. 2019;10(3):815–831. [Google Scholar]
  9. Atan Ö. Effects of variable-order passive circuit element in Chua circuit. Circ Syst Signal Process. 2020;39:2293–2306. doi: 10.1007/s00034-019-01271-2. [DOI] [Google Scholar]
  10. Azar AT, Serranot FE, Vaidyanathan S (2018) Sliding mode stabilization and synchronization of fractional order complex chaotic and hyperchaotic systems. In: Mathematical Techniques of Fractional Order Systems, pp. 283–317. Elsevier. 10.1016/B978-0-12-813592-1.00010-6
  11. Bagheri A, Moghaddam JJ. Decoupled adaptive neuro-fuzzy (DANF) sliding mode control system for a Lorenz chaotic problem. Expert Syst Appl. 2009;36(3):6062–6068. doi: 10.1016/j.eswa.2008.06.123. [DOI] [Google Scholar]
  12. Belmeguenai A, Ahmida Z, Ouchtati S, Dejmii R. A novel approach based on stream cipher for selective speech encryption. Int J Speech Technol. 2017 doi: 10.1007/s10772-017-9439-8. [DOI] [Google Scholar]
  13. Cavusoglu U (2016) Design and ımplementation of chaos based hybrid symmetric and asymmetric encryption algorithms (doctoral thesis, unpublished). Sakarya University, Institute of Science, Sakarya, Turkey
  14. Chen CK, Lin CL, Chiang CT, Lin SL. Personalized information encryption using ECG signals with chaotic functions. Inf Sci. 2012;193:125–140. doi: 10.1016/j.ins.2012.01.016. [DOI] [Google Scholar]
  15. Chua LO. The genesis of Chua's circuit. Berkeley, CA, USA: Electronics Research Laboratory, College of Engineering, University of California; 1992. [Google Scholar]
  16. Chua LO, Wu CW, Huang A, Zhong GQ. A universal circuit for studying and generating chaos. I. Routes to chaos. IEEE Trans Circ Syst I Fund Theory Appl. 1993;40(10):732–744. doi: 10.1109/81.246149. [DOI] [Google Scholar]
  17. Cilhoroz B, Zaleski A, Taylor B. The ambulatory blood pressure and heart rate variability responses following sudden vigorous physical exertion among firefighters with hypertension. Turk J Sports Med. 2021;56:98–105. doi: 10.47447/tjsm.0492. [DOI] [Google Scholar]
  18. Ebrahimi Z, Loni M, Daneshtalab M, Gharehbaghi A. A review on deep learning methods for ECG arrhythmia classification. Exp Syst Appl: X. 2020;7:100033. doi: 10.1016/j.eswax.2020.100033. [DOI] [Google Scholar]
  19. Farsana F, Gopakumar K (2016) A novel approach for speech encryption: Zaalavsky map as pseudo random number generator. In: 6th International conference on advances in computing & communications, ICACC 2016, 6-8 September 2016, Cochin, India. 10.1016/j.procs.2016.07.302
  20. Felber DD, Ackermann-Liebrich U, Schindler C, Barthélémy JC, Brändli O, Gold DR, Gaspoz JM. Effect of physical activity on heart rate variability in normal weight, overweight and obese subjects: results from the SAPALDIA study. Eur J Appl Physiol. 2008;104(3):557–565. doi: 10.1007/s00421-008-0800-0. [DOI] [PMC free article] [PubMed] [Google Scholar]
  21. Gao F, Lee T, Cao WJ, Lee XJ, Deng YF, Tong HQ. Self-evolution of hyper fractional order chaos driven by a novel approach through genetic programming. Expert Syst Appl. 2016;52:1–15. doi: 10.1016/j.eswa.2015.12.033. [DOI] [Google Scholar]
  22. Garcia-Hernandez JJ, Parra-Michel R, Feregrino-Uribe C, Cumplido R. High payload data-hiding in audio signals based on a modified OFDM approach. Expert Syst Appl. 2013;40(8):3055–3064. doi: 10.1016/j.eswa.2012.12.021. [DOI] [Google Scholar]
  23. Gois SR, Savi MA. An analysis of heart rhythm dynamics using a three-coupled oscillator model. Chaos, Solit Fract. 2009;41(5):2553–2565. doi: 10.1016/j.chaos.2008.09.040. [DOI] [Google Scholar]
  24. Gupta V, Mittal M, Mittal V. R-peak detection based chaos analysis of ECG signal. Analog Integr Circ Sig Process. 2019 doi: 10.1007/s10470-019-01556-1. [DOI] [Google Scholar]
  25. Hahn W, Stab Th. Mot. New York: Springer; 1967. [Google Scholar]
  26. Huang P, Li B, Guo L, Jin Z, & Chen Y (2016) A robust and reusable ecg-based authentication and data encryption scheme for ehealth systems. In: 2016 IEEE global communications conference (GLOBECOM) (pp 1–6). IEEE. 10.1109/GLOCOM.2016.7841541
  27. İzci E, Değirmenci M, Özdemir MA, Akan A (2020) ECG arrhythmia detection with deep learning. In:2020 28th signal processing and communications applications conference (SIU), pp 1–4. 10.1109/SIU49456.2020.9302219
  28. Kakade M, Singh J. Memristors SPICE modeling. Ijetae Com. 2014;4(8):343–346. [Google Scholar]
  29. Karataş F (2021) ECG simulator design FPGA-based with VHDL (Master's thesis, Institute of Science and Technology)
  30. Kate HK, Razmara J, Isazadeh J (2018) A Novel fast and secure approach for voice encryption based on DNA computing. 3D Res (2018) 9:17. 3D Research Center, Kwangwoon University and Springer-Verlag GmbH Germany, part of Springer Nature. 10.1007/s13319-018-0167-x
  31. Kordov K. A novel audio encryption algorithm with permutation-substitution architecture. Electron MDPI. 2019;2019(8):530. doi: 10.3390/electronics8050530. [DOI] [Google Scholar]
  32. Lagmiri SN, Bakhous H (2018) Audio encryption algorithm using hyperchaotic systems of different dimensions. In: CS & IT conference proceedings (Vol. 8, No. 15). CS & IT conference proceedings. 10.5121/csit.2018.81507
  33. Li H, Hua Z, Bao H, Zhu L, Chen M, Bao B. Two-dimensional memristive hyperchaotic maps and application in secure communication. IEEE Trans Industr Electron. 2020 doi: 10.1109/TIE.2020.3022539. [DOI] [Google Scholar]
  34. Lima JB, da Silva NEF. Audio encryption based on the cosine number transform. Multimed Tools Appl. 2015 doi: 10.1007/s11042-015-2755-6. [DOI] [Google Scholar]
  35. Liu Y, Mikhael WB. A blind maximum likelihood carrier frequency offset correction approach for OFDM systems over multipath fading channels. Circ Syst Signal Process. 2007;26(1):43–54. doi: 10.1007/s00034-005-0922-0. [DOI] [Google Scholar]
  36. Lorenz EN. Deterministic nonperiodic flow. J Atmos Sci. 1963;20(2):130–141. doi: 10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2. [DOI] [Google Scholar]
  37. Meghanathan N, Nagamalai D, Chaki N (2012) Advances in computing and information technology. Proceedings of the second international conference on advances in computing and information technology (ACITY), July 13–15, 2012, Chennai, India, vol 1. Springer, Berlin, Heidelberg. 10.1007/978-3-642-31513-8
  38. Nagamalai D, Renault E, Dhanuskodi M (eds) (2011) Advances in digital image processing and information technology: first international conference on digital image processing and pattern recognition, DPPR 2011, Tirunelveli, Tamil Nadu, India, September 23–25, 2011, Proceedings, vol 205. Springer Science & Business Media
  39. Naskar PK, Paul S, Nandy D, Chaudhuri A. DNA encoding and channel shuffling for secured encryption of audio data. Multimed Tools Appl. 2019;2019(78):25019–25042. doi: 10.1007/s11042-019-7696-z. [DOI] [Google Scholar]
  40. Quiroz-Juárez MA, Jiménez-Ramírez O, Vázquez-Medina R, Breña-Medina V, Aragón JL, Barrio RA. Generation of ECG signals from a reaction-diffusion model spatially discretized. Sci Rep. 2019;9(1):1–10. doi: 10.1038/s41598-019-55448-5. [DOI] [PMC free article] [PubMed] [Google Scholar]
  41. Rajabpour-Moghaddam K, Maymandi-Nejad M, Ghomash HK. A 24-channel implantable neural recording based on time and frequency-division multiplexing. Analog Integr Circ Sig Process. 2014;79(3):493–506. doi: 10.1007/s10470-013-0182-z. [DOI] [Google Scholar]
  42. Rajagopal K, Guessas L, Vaidyanathan S, Karthikeyan A, Srinivasan A. Dynamical analysis and FPGA implementation of a novel hyperchaotic system and its synchronization using adaptive sliding mode control and genetically optimized PID control. Math Probl Eng. 2017 doi: 10.1155/2017/7307452. [DOI] [Google Scholar]
  43. Rao RP. Real time audio signal processing through DSB-SC using Simulink. Int J Sci Dev Res (IJSDR) 2018;3:52–55. [Google Scholar]
  44. Redston C, Clementson T, Cunningham G (2013) Face2face Upper ıntermediate teacher's book with DVD. Cambridge University Press
  45. Sathiyamurthi P, Ramakrishnan S. Speech encryption using chaotic shift keying for secured speech communication. EURASIP J Audio, Speech, Music Process. 2017;2017(1):1–11. doi: 10.1186/s13636-017-0118-0. [DOI] [Google Scholar]
  46. Sheu LJ, Chen WC, Chen YC, Weng WT. A two-channel secure communication using fractional chaotic systems. World Acad Sci, Eng Technol. 2010;65:1057–1061. [Google Scholar]
  47. Sprott JC. A new class of chaotic circuit. Phys Lett A. 2000;266(1):19–23. doi: 10.1016/S0375-9601(00)00026-8. [DOI] [Google Scholar]
  48. Toh AM, Togneri R, Nordholm S. Spectral entropy as speech features for speech recognition. Proc PEECS. 2005;1:92. [Google Scholar]
  49. Vaidyanathan S, Sampath S (2011) Global chaos synchronization of hyperchaotic Lorenz systems by sliding mode control. In: International conference on digital ımage processing and ınformation technology, 156-164. 10.1007/978-3-642-24055-3_16
  50. Wu D (2010) Application research on frequency-division multiplexing to chaos secret communication. In: 2010 ınternational conference of ınformation science and management engineering (Vol. 1, pp 139–142). IEEE. . 10.1109/ISME.2010.180
  51. Xia Y, Yang H, Fu M, Shi P. Sliding mode control for linear systems with time-varying input and state delays. Circ Syst Signal Process. 2011;30(3):629–641. doi: 10.1007/s00034-010-9237-x. [DOI] [Google Scholar]

Articles from Iranian Journal of Science and Technology, Transactions of Electrical Engineering are provided here courtesy of Nature Publishing Group

RESOURCES