2019
DOI: 10.1109/access.2019.2912548
|View full text |Cite
|
Sign up to set email alerts
|

Secure EEG Signal Transmission for Remote Health Monitoring Using Optical Chaos

Abstract: For the very first time, we present the use of optical chaos for the secure transmission of electroencephalogram (EEG) signals through optical fiber medium in remote health monitoring systems. In our proposed scheme, a semiconductor laser source is used to generate optical chaos, which hides EEG signal before its transmission over the optical fiber medium. The EEG signals are acquired by using a 14channel Emotiv headset device, which are then processed and rescaled to be compatible with the experimental enviro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…For secure transmission of EEG signal optical chaos has been introduced [8]. To hide EEG signal, author has used source of semiconductor laser to generate optical chaos, at the time of signal transmission and combination of EEG signal and optical chaos has been transmitted over optical fiber medium.…”
Section: Introductionmentioning
confidence: 99%
“…For secure transmission of EEG signal optical chaos has been introduced [8]. To hide EEG signal, author has used source of semiconductor laser to generate optical chaos, at the time of signal transmission and combination of EEG signal and optical chaos has been transmitted over optical fiber medium.…”
Section: Introductionmentioning
confidence: 99%
“…Data encryption is usually done by chaotic or hyper-chaotic methods [ 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 ]. In some researches, chaotic or hyper-chaotic systems are used to encrypt peripheral data [ 38 , 39 , 40 , 41 , 42 , 43 ].…”
Section: Introductionmentioning
confidence: 99%
“…In some researches, chaotic or hyper-chaotic systems are used to encrypt peripheral data [ 38 , 39 , 40 , 41 , 42 , 43 ]. In recent years, researchers have focused on the encryption of medical data using chaotic methods [ 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 ]. Medical data contains important information about patients [ 41 , 44 , 45 , 46 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Data security applications can be made for biomedical signals or biomedical images using chaotic systems or chaotic neural networks [54][55][56][57][58][59][60][61][62][63][64][65][66][67][68]. However, when the literature is examined, it is seen that data security application is carried out for signals such as EEG, EMG, ECG, which are recorded as multi-channel, with a single signal belonging to a single channel every time.…”
Section: Introductionmentioning
confidence: 99%