2012
DOI: 10.1016/j.ins.2012.01.016
|View full text |Cite
|
Sign up to set email alerts
|

Personalized information encryption using ECG signals with chaotic functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
25
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(25 citation statements)
references
References 29 publications
0
25
0
Order By: Relevance
“…In [10], a personalized information encryption scheme using ECG signals with chaotic functions was proposed. In this scheme, the Lyapunov exponent of an ECG signal is used as the initial states of two pseudorandom number generators composed of a logistic map and a Henon map, respectively.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In [10], a personalized information encryption scheme using ECG signals with chaotic functions was proposed. In this scheme, the Lyapunov exponent of an ECG signal is used as the initial states of two pseudorandom number generators composed of a logistic map and a Henon map, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, dynamics of any chaotic map in the digital domain are degenerated and may seriously influence the security of the supporting encryption function [12,13]. The paper [10] skipped the problem and did not provide any information on the concrete functions used for diffusion and confusion, which violates some basic design principles summarized in [4]. To improve the scheme proposed in [10], Ye and Huang proposed an image encryption algorithm based on autoblocking and electrocardiography (IEAE) in [14].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The permutation and substitution processes can be used in spatial based image encryption algorithms like Data Encryption Standard (DES) [15], Advanced Encryption Standard (AES) [23], Rivest, Shamir and Adleman (RSA) [24], P-Fibonacci transform [25], wave transmission [26], elliptic curve ElGamal [27], gray code [28], random grids [29], Latin squares [30] and chaotic mapping [31].…”
Section: Related Workmentioning
confidence: 99%
“…Chen et al [31] developed an encryption method based on Henon chaotic function and Logistic map for encrypting image and the secret key respectively.…”
Section: Related Workmentioning
confidence: 99%