You are on page 1of 12

International Journal of Electronics,

Communication & Instrumentation Engineering


Research and Development (IJECIERD)
ISSN(P): 2249-684X; ISSN(E): 2249-7951
Vol. 4, Issue 4, Aug 2014, 1-12
TJPRC Pvt. Ltd.

ECG KEY GEN USING RSA ENCRYPTION TECHNIQUE AND TRANSMISSION BY


OFDM SYSTEM OVER RAYLEIGH FADING CHANNEL
J. MOHANA1 & V. THULASIBAI2
1

Department of ECE, Saveetha School of Engineering, Saveetha University, Thiruvallur, Tamil Nadu, India
2

Dean/R&D, Prathyusha Institute of Technology and Management, Thiruvallur, Tamil Nadu, India

ABSTRACT
In this paper, present an efficient technique by ECG signal to generate 128 bit key from the peak value of QSR
ECG value by the RSA Encryption algorithm. The 128-bit key generator using electrocardiogram (ECG) signals comprises
two independent stages, namely, enrollment and verification-generation. This work is based on the uniqueness and
quasi- stationary behavior of ECG signals with respect to an individual. The performance degradation over Rayleigh
Fading channels is determined by the deep fades of the received signal power. RSA implements a public-key cryptosystem,
as well as digital signatures. The Encrypted data will be transmitting over Rayleigh fading channel by OFDM system. Then
the original data decrypted by the same technique with low SNR margin and Bit Error Rate (BER) rate. The BER
performance of OFDM systems communicating over Rayleigh fading channels has been extensively studied and slow loss.

KEYWORDS: Electrocardiogram (ECG), OFDM System, Rayleigh Fading


INTRODUCTION
Electrocardiogram (ECG) is produced through a nerve impulse stimulus to a heart. Due to this impulse current is
generated on the surface of the body which later develops a potential drop. A single impulse may cause a potential of
nearly V to mV. The produced potential amplitude is very low which has to be amplified many times. Orthogonal
Frequency Division Multiplexing (OFDM) is considered in most of the works for communicating messages over frequency
selective fading channels. The primary benefit of the OFDM technique compared to a single carrier modulation is that it
facilitates the use of high data rates with a relatively low complexity receiver, which requires only a Fast Fourier
Transform (FFT) processor. Hence Fourier series can be used for representing ECG signal.
Interest in the application of Wireless Body Area Network (WBAN) is increasing rapidly. A WBAN includes a
patient observing structure that delivers flexibility and freedom of movement to patients. However, there are serious
performance and reliability issues in WBANs that must be addressed. The commonly used network topology in WBAN for
such flexible trainings is the star configuration as shown in Figure This is because nodes usually are sensor nodes and do
not need to communicate with each other. Therefore, the star topology is used and each sensor node communicates with
the central node using a hub. This raises reliability questions as the hub or the central node may fail leading to total system
failure. Even the communication links may perform poorly or fail. Since data fusion is used in almost all applications, even
the failure of any of the sensors or the communication links would result in system failure. Ylisaukko-oja et al. (2004)
presented the implementation and practical use of a bland five-point acceleration sensing WBAN with portable device data
sorting abilities shown in Figure 5. They used TDMA based MAC protocol and RS232 for serial communications with
external devices. They reported good communications performance in laboratory conditions but weaker field test

www.tjprc.org

editor@tjprc.org

J. Mohana & V. Thulasibai

performance. Their tests indicated significant losses in communication. Under laboratory conditions, they lost the remote
slots from 0.31% to3.09% in various parts of the test while in the field tests; they lost central data up to 3.84% and lost
remote slots from 13.66% to 52.51%. This indicates a high degree of reliability problems especially in communications.

Figure 1: Shows the Main Block Diagram of the System ECG Signal

ECG SIGNAL
ECG is used for the demonstration of the electrical motion of the heart muscle as it varies with time. It is
reproduced on broadsheet for comfortable study. Similar to other muscles, cardiac muscle contracts in reaction to electrical
depolarization of the muscle cells. All the electrical activity is summed, amplified and documented for producing the
information known as ECG. Here the ECG signal converts as a text format for clear data representation. To read the text
data into matlab from a file the modest however easy procedure is to read the entire contents of the file in a single step by
using the load command. The file containing the data is to be ordered into a rectangular array which is the requirement of
the load command. Column titles are not allowed. One valuable method of the load command is load name.ext,
MATLAB statements will load this data into the matrix ``data (:, 1) and then copy it into two vectors, x and y.
x=data (:, 1); y=data (:, 2); [r c]=size(y); plot(x, y)
There is no need to copy the data into x and y. When the ''x'' data is required it is referred as my_xy (:, 1).
Duplication the data into ''x'' and ''y'' creates the code easier to read and is more likeably interesting. This process of
duplicating the data will not affect MATLAB's memory for most uncertain data sets.

Figure 2: Normal Intervals

Impact Factor (JCC): 4.9467

Index Copernicus Value (ICV): 3.0

ECG Key Gen Using RSA Encryption Technique and Transmission by OFDM System Over Rayleigh Fading Channel

The time taken several phases of electrical depolarization can be calculated by recording an ECG on normal
paper. There is a standard usual range for such intervals: Due to greater muscle mass in the ventricles the depolarization
of the ventricles is responsible for the largest part of the ECG signal and this largest part is well-known as the QRS
complex.
The Q wave is the first primary down or negative deflection. The R wave is the subsequent upward deflection if
it crosses the isoelectric line and develops positive The S wave is formerly the following deflection downwards, provided
it crosses the isoelectric line to convert into negative before returning to the isoelectric baseline
PR Interval: Recorded as of the start of the P wave to the initial deflection of the QRS complex. Usual range
120 200 ms.
QRS Duration: Recorded after initial deflection of QRS complex to the completion of QRS complex at
isoelectric line. Usual range up to 120 ms.
QT Interval: Recorded after initial deflection of QRS complex to end of T wave at isoelectric line Usual range
up to 440 ms yet differs with heart rate and it is to some extent lengthier in females.

QRS DETECTION METHOD


Pan-Tompkins algorithm is the mostly used for QRS wave detection. Three graphical deflections perceived on a
usual electrocardiogram (ECG) is combined and given the term QRS wave. The QRS wave is the dominant and apparent
portion of the deflections traced. It is the depolarization of the right and left ventricles of the human heart. In adults, it
usually persists 0.06 - 0.10 s, in children and during physical activity it is short. To reduce the noise, the wave is send
through a band pass filter poised of cascaded high-pass and low-pass integer filters. Following processes are Derivative
Filter differentiation, squaring, and moving integration of the signal.

PAN TOMPKINS ALGORITHM


Band Pass Filter
The band pass filter is designed by connecting low pass filter and high pass filter in cascade. The low pass filter is
used in the circuit to suppress the high frequency noise [9]. A digital filter with integer coefficients is utilized for design
purpose which permits real time processing speeds. Speed is high since floating point processing is not required. The
merits of designed band pass filter for the QRS detection algorithm is that it diminishes the ECG signal noise by matching
the spectrum of average QRS complex, eliminates the noise owing to muscle artifacts. It also includes wandering of
baseline and elimination of T wave interference. The pass band range includes around 5 to 15 Hz range due to which the
energy of QRS is maximized. The filter is an integer filter

Figure 3: Block Diagram Showing QRS Detection Using Pan Tompkins Algorithm Process
The second order low pass filter has the transfer function of as shown in equation (1).
H (z) = (1- z-6)2/ (1- z-1)2
www.tjprc.org

(1)
editor@tjprc.org

J. Mohana & V. Thulasibai

The cut- off frequency of the filter is 11 Hz, delay is 5 samples and the gain is 36 [9]. The difference equation of
the filter is as shown in equation (2).
y(nT)=2y(nT-T)-y(nT-2T)+x(nT)2x(nT6T)+x(nT12T)

(2)

The high pass filter is implemented by subtracting a first order low pass filter from an all pass filter with delay [9].
The transfer function of the low pass filter is as shown in equation (3).
H(low)(z)=Y(z)/X(z)=(1z-32)/(1z-1)

(3)

The transfer function of the high pass filter is as shown in equation (4).
H(hp)(z)=P(z)/X(z)=z^-16-[(1-z^-32)/(1-z^-1)]

(4)

The low cut off frequency of the filter is about 5 Hz and delay is 80 ms.

Figure 4: Shows the Low Pass Filter

Figure 5: Shows the High Pass Filter


Derivative Filter
The signal received from the band pass filter is differentiated to get the data about the slope of the QRS wave.
A five point derivative is applied with the transfer function. the signal established the differentiation operation in frequency
Impact Factor (JCC): 4.9467

Index Copernicus Value (ICV): 3.0

ECG Key Gen Using RSA Encryption Technique and Transmission by OFDM System Over Rayleigh Fading Channel

domain. We also have derived the expression in the frequency domain for the operation of integration. This is because if
we accomplish the derivative operation by multiplying by i2f, then to undo the derivative (integrate) all we have to do is
divide by i2f. That is, the frequency domain expression for the indefinite integral s(t) dt is simply 1/(i2f) x S(f). The
transfer function for integration in the frequency domain is 1/(i2f).

Figure 6: Shows the Derivative Wave Form


Squaring
Now, the signal is to be squared. This is the non linear processing of the signal. It is done to get all positive
values so that later these values can be processed to get the corresponding squared waves. Also this processing emphasizes
the higher frequencies of the ECG signal which are due to the presence of the QRS complexes [9]. Point by point squaring
of the signal obtained from the differentiator is implemented by equation (9).
y (nT)= [x(nT)]2

(9)

Figure 7: Shows the Squaring

Moving Integrator
The R wave slope alone is not enough to identify QRS complexes in an ECG. There are numerous lengthy period
and huge amplitude QRS waves in the ECG which is irregular. Single slope of R wave cannot identify these waves [9].
Hence a moving window integrator is used to identify these waves. The difference equation for this moving window.
www.tjprc.org

editor@tjprc.org

J. Mohana & V. Thulasibai

Figure 8: Shows the Integrated

Figure 9: Shows the QRS Detection Wave

HAMMING DISTANCE
The analysis performed using the wavelet symlet8 allows to obtain the best complement Hamming distance value
at the selected security factor. To compute the complement Hamming distance of the sample. To compare the computed
complement Hamming distance of the previous step with the complement Hamming distance of each ECG sample stored
into the centralized database. To maintain the matched sample from the centralized database whether a match took place.
The minimum complement Hamming distance that considers a match must be between 28 and 34 when the ECG sample is
77 samples length. The values for a 120 samples length must be between 46 and 52.

Figure 10: Shows the Hamming Distance

Impact Factor (JCC): 4.9467

Index Copernicus Value (ICV): 3.0

ECG Key Gen Using RSA Encryption Technique and Transmission by OFDM System Over Rayleigh Fading Channel

The minimum complement Hamming distance for other input vectors length can be computed by extrapolation.
The sample used in the verification stage can be discarded as well. To extract the coefficients that match (complement
Hamming distance coefficients) from both samples to create the basis vector for the next step.
To compute and release the 128-bit key, Hamming distance is an easy-to-define metric; it is used to search the
state space for design flaws. In digital communication Hamming distance was at first designed for recognition and
rectification of errors. Hamming distance is used to calculate the number of bits that are different between two bit vectors.
Now 128 bit key generated 128-bit K -DE2EA259FF3FF8D37ECFA1DFBCC6A3B1

RSA ALGORITHM
To avoid the reputed complexity of factoring large integers the factoring problem, RSA an algorithm for
public-key cryptography was described. RSA is for Ron Rivest, Adi Shamir and Leonard Adleman, who took the initiation
to describe the algorithm in 1977. Also an English mathematician, Clifford Cocks have described a corresponding structure
in 1973, however it wasn't declassified until 1997.
In RSA the product of two large prime numbers is created and then published with a supplementary value, as
their public key. The secrecy of prime factors is maintained. The public key can be used to encrypt a message. However
with presently available structure, if the public key is very huge, only somebody aware of the prime factors can possibly
decode the information.
RSA comprises of public key and a private key. The public key is well-known by everybody and is utilised for
encrypting information. By means of the private key, the information encrypted with the public key can be decrypted in a
sensible quantity of time. The subsequent ways are followed for generating the keys for the RSA algorithm.
Encryption
Aabha communicates the public key (m, f) to Ali and maintains the private key secret. Later Ali desires to mail
message M to Aabha. Ali initially converts M into an integer m, such that 0 m < n by by means of an agreed-upon
reversible protocol recognized as a padding scheme. Ali next calculates the cipher text c equivalent to

The above process is made rapidly by the technique of exponentiation by squaring. Ali then transmits c to Aabha.
The encryption process run by separate function as rsaen.m file. The equation is in the matlab form of
c=m. ^e* (mod (3, n));
Decryption
Aabha can recuperate m from c by by means of the private key exponent d via computing

Given m, the original message M can be recovered by reversing the padding scheme. The encryption presses run
by separate function as rsade.m file the equation is in the matlab form of
Msg= [c1'.^key(2) /(mod (3, key1)];

www.tjprc.org

editor@tjprc.org

J. Mohana & V. Thulasibai

OFDM COMMUNICATION METHOD


Orthogonal Frequency Division Multiplexing (OFDM) is a recent digital modulation technique where
transmission of data stream takes place on numerous carriers instead of using only one carrier. The common idea was
introduced in 1971, but it is only in the previous decade, with the growth of Digital Signal Processors (DSP) that
applications become visible.
OFDM is mainly used on wideband transmissions. Well see that OFDM is well suited for transmissions in
frequency selective channels. Such a situation is met for example in multipath environments.

Figure 11: OFDM Transmission System


Inverse Fourier Transform
The avalable Spectrum is utilised efficiently in OFDM by spacing the channels much closer together. The carriers
are made orthogonal to one another, It avoids the interference between the closely spaced carriers. The orthogonality of the
carriers should be maintained to perform OFDM successfully. This is done by selecting the spectrum needed and
converting it back to its time domain signal using an Inverse Fourier Transform. Inverse Fast Fourier Transform is used in
many applications, since it performs the transformation efficiently. It also delivers a easy way of assuring that the carrier
signals produced are orthogonal. So, it is written as:
x

[l ] =

1
N

N 1

k = 0

[k ]exp

j2 l
N

For l = 0, 1, , N-1
Channel and Receiver Parts
Let us consider the problem of transmitting the signal
without additional noise. If we call

~
xn [m] over the time-varying linear channel c(t , )

c[m] the sampling version of the Channel, then the output obtained by the channel is:
~
y n [m ] =

N + L 1

~x [l ]c[m l ]
l =0

m = 0, 1, , N+L-1

Impact Factor (JCC): 4.9467

Index Copernicus Value (ICV): 3.0

ECG Key Gen Using RSA Encryption Technique and Transmission by OFDM System Over Rayleigh Fading Channel

Figure 12: Shows the OFDM QAM Transmission with Raleigh Channel Model
The receiver basically does the reverse operation to the transmitter. The signal got is

~
y n [m]

that containss

N+L-1 samples, before the demodulation, The L last samples of the received signal is lost and then the guard period is
removed to utilise correctly the Fourier Transform properties. The demodulation process is a fundamental FFT according
to the IFFT used for modulation. Hence, there is a need to find out N samples (one per carrier) at the modulator input. An
FFT to the signal

~
y n [m] is applied.
N 1
l
~

Yn [k ] = ~
y n [l ]exp 2jk
N

l =0

N 1 N + L 1
l

Yn [k ] = ~
x n [m]c[l m] exp 2jk
N

l =0 m = 0

N + L1
N 1
l
~

Yn [k ] = ~
x n [m] c[l m]exp 2jk
N

m=0
l =0

N+L1~
m
~

Yn [k] = xn [m]exp 2jk (c[k])


N

m=0
The initial term of the multiplication above appeares like a Fourier Transform expression. If summation index is
restricted from m = 0 to m = N-1. It is equivalent to drop the L last samples of the signal

~
yn [m] . So the signal produced

by the demodulator is:

N 1 ~
m
~

Yn [k ] = x n [m]exp 2jk (c[k ])


N

m =0

~
Yn [k ] = ( xn [k ])(c[k ])
~
Yn [k ] = X n [k ]C [k ]
To receive the transmitted signal a simple division by the Channel frequency response is done. The modulation
does not require any equalization. The data samples are later combined back to the same size as the original data.
www.tjprc.org

editor@tjprc.org

10

J. Mohana & V. Thulasibai

Bit-Rate
The modulation system used on all the carriers is QPSK. The carriers are separated by a gap of around 1/Ts,
where Ts is symbol period. The maximum bit rate available is 2bit/s/Hz of the bandwidth. This figure is decreased by the
inefficiency (signal redundancy) of the guard interval, the null symbol and the error coding. The same decryption processes
will be done at the next step in which the process explained previously. Finally the transmitted 128 bit key data received by
the decryption process.

Figure 13: Shows the BER-Rate

CONCLUSIONS
In this paper, we have presented the 128 bit key generator based on ECG signal by the RSA encryption algorithm.
The values are encrypted and decrypted over Rayleigh fading channel by OFDM and bit error rate is reduced and the
simulation is obtained.

Xn[0]

xn[0]

Xn[1]

xn[1]
IFFT

Xn[N 1]

xn[N 1]

REFERENCES
1.

Pallavi Bhatnagar1, Jaikaran Singh2, Mukesh Tiwari3, performance of mimo- ofdm system for rayleigh fading
channel, International journal of science and technology, Volume 1 No 3 May 2011.

2.

Mukesh Kumar Mishra, 2Neetu Sood and 3Ajay K Sharma, efficient ber analysis of ofdm system over
nakagami-m fading channel, International journal of advanced science and technology, Vol. 37, December, 2011

3.

Mohammed Safiqul Islam, Gouri Rani Barai, Atiq Mahmood, Performance analysis of different modulation
schemes using OFDM techniques in Rayleigh fading channel, international journal of fundamental physical
sciences, IJFPS, Vol.1, No.1, pp. 22-27, March, 2011.

Impact Factor (JCC): 4.9467

Index Copernicus Value (ICV): 3.0

11

ECG Key Gen Using RSA Encryption Technique and Transmission by OFDM System Over Rayleigh Fading Channel

4.

Chi-Min Li, Guo-Wei Li, and Han-Yi Liu, performance comparison of the stbc-ofdm decoders in a fast fading
channel, Journal of Marine Science and Technology, Vol. 20, No. 5, pp. 534-540 (2012).

5.

Md. Golam Rashed 1, M. Hasnat Kabir2, Md. Selim Reza3, Md. Matiqul Islam, Rifat Ara Shams2, Saleh Masum
2, Sheikh Enayet Ullah2, Transmission of Voice Signal: BER Performance Analysis of Different FEC Schemes
Based OFDM System over Various Channels, International Journal of Advanced Science and Technology Vol.
34, September, 2011.

6.

Dr. Amandeep Singh Sappal, Parneet Kaur, ber performance of ofdm system with 16-qam and varying length of
guard interval , International Journal of Electronics and Electrical Engineering, Volume 2 Issue 3 (March 2012).

7.

R. Uma Mahesh and A. K. Chaturvedi, Senior Member, IEEE, closed form ber expressions for bpsk ofdm
systems with frequency offset, IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 8, AUGUST 2010.

8.

1Harjit Singh, 2Anu Sheetal, 3Jaswinder Singh, Performance Analysis of OFDM for DVB systems over
Rayleigh Fading Channel using Jakes Model, In t e r n a t I o n a l Jo u r n a l o f el e c t r o n I c s & co m m u n I
c a t I o n te c h n o l o g y, Vo l. 2, Is s u E 2, Ju n E 2011.

9.

Xiaodong Cai and Georgios B. Giannakis, Low-Complexity ICI Suppression for OFDM Over Time- and
Frequency-Selective Rayleigh Fading Channels, IEEE 2002.

10. Sanjay Kumar Khadagade, N.K. Mittal, Comparison of BER of OFDM System using QPSK and 16QAM over
Multipath Rayleigh Fading Channel using Pilot-Based Channel Estimation , International Journal of
Engineering and Advanced Technology (IJEAT), Volume-2, Issue-3, February 2013.
11. P. SunilKumar*, Dr. M.G. Sumit hra** & M. Sarumathi***, Performance Analysis of Rayleigh Fading
Channels in MIMO-OFDM Systems using BPSK and QPSK Modulation Schemes, The SIJ Transactions on
Computer Networks & Communication Engineering, Vol. 1, No. 1, March-April 2013.
12. Vineetha Mathai, K. Martin Sagayam, Comparison And Analysis Of Channel Estimation Algorithms In ofdm
systems, international journal of scientific & technology research volume 2, issue 3, march 2013.
13. Tao Cui, Chintha Tellambura, Member, IEEE, Blind Receiver Design for OFDM Systems Over Doubly Selective
Channels, IEEE transactions on communications, vol. 55, no. 5, may 2007.
14. Chi-Hsiao Yih, Effects of Channel Estimation Error on the BER Performance of OFDM Systems in Multipath
Rayleigh Fading Channels, Effects of Channel Estimation Error on the BER Performance of OFDM Systems in
Multipath Rayleigh Fading Channels2007 IEEE.
15. Suchita Varade, Kishore Kulat, BER Comparison of Rayleigh Fading, Rician Fading and AWGN Channel using
Chaotic Communication based MIMO-OFDM System, International Journal of Soft Computing and Engineering
(IJSCE) Volume-1, Issue-6, January 2012.
16. Atul Gautam 1, Manisha Sharma2, Capacity Enhancement of MIMO-OFDM System inRayleigh Fading
Channel, IOSR Journal of Electronics and Communication Engineering, Volume 6, Issue 1 (May. - Jun. 2013)

www.tjprc.org

editor@tjprc.org

12

J. Mohana & V. Thulasibai

17. Yun Hee Kim, Iickho Song, Hong Gil Kim, Taejoo Chang, and Hyung Myung Kim, Member, IEEE,
Performance Analysis of a Coded OFDM System in Time-Varying Multipath Rayleigh Fading Channels, IEEE
TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 48, NO. 5, SEPTEMBER 1999.
18. C. SAJEEV*, G. JAI ARUL JOSE, Elliptic Curve Cryptography Enabled Security for Wireless
Communication, International Journal on Computer Science and Engineering Vol. 02, No. 06, 2010.
19. Sai Krishna Borra 1; Suman Krishna Chaparala 2, Performance Evaluation of OFDM System with Rayleigh,
Rician and AWGN Channels, International Journal of Emerging Technology and Advanced Engineering,
Volume 3, Issue 3, March 2013).
20. Tushar Kanti Roy and Monir Morshed, High Power Amplifier Effects Analysis for OFDM System,
International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 5, May 2013.
21. Ye (Geoffrey) Li, Leonard J. Cimini, Jr., Nelson R. Sollenberger, Members IEEE, Robust Channel Estimation
for OFDM Systems with Rapid Dispersive Fading Channels, IEEE transactions on communications, vol. 46, no.
7, july 1998.
22. md. noor -a- rahim1, sheikh md. rabiul islam2, md. nashid anjum 3, performance analysis of ls estimated ofdm
system over rayleigh fading channel, daffodil international university journal of science and technology, volume
8, issue 1, january 2013.

Impact Factor (JCC): 4.9467

Index Copernicus Value (ICV): 3.0

You might also like