Professional Documents
Culture Documents
Chun-Liang Lin
Yen-Ming Chiu
I.
INTRODUCTION
DESCRIPTION OF METHODS
{ }
Z ( n ) = [ z ( n ), z (n + nT )," , z (n + (d 1)nT ) ]
where
n =T
(1)
4.
2
1.8
Z(n+T)
1.4
1
t s t0
d1 (tk )
0 (tk 1 )
ln d
k =1
(2)
where tk = k .
1.2
1
0.8
0.6
0.4
0.2
0.2
0.4
0.6
0.8
1.2
1.4
1.6
1.8
2.2
Z(n)
B. Lyapunov Exponent
Lyapunov exponents quantify the sensitivity of the system
to initial conditions, which is an important feature of chaotic
systems. Sensitivity to initial conditions means that small
changes in the state of a system will grow at an exponential
rate and eventually dominate the behavior. Lyapunov
exponents are defined as the long time average exponential
rates of divergence of nearby states. If a system has at least one
positive Lyapunov exponent, than the system is chaotic. The
larger the positive exponent, the more chaotic the system
becomes. Lyapunov exponents are, in general, arranged such
that 1 2 " n , where 1 and n correspond to the
most rapidly expanding and contracting principal axes,
respectively. Therefore, 1 may be regarded as an estimator of
the dominant chaotic behavior of a system. Here, the largest
Lyapunov exponent 1 is treated as a measure of the ECG
signal using the wolf algorithm [10]. The process of
determination 1 is listed as follows:
2.
1 =
1.6
1.
3.
C. Henon Map
The Henon map is a 2-D iterated map with chaotic solutions
proposed by M. Henon (1976) as a simplified model of the
Poincare map for the Lorenz model [11]. The Henon map
equation is given the following equation :
2
X n +1 = 1 aX n + bYn
(3)
Yn +1 = X n
where a and b are (positive) bifurcation parameters, and n=
0,1,2,... The parameter b is a measure of the rate of area
contraction, and the Henon map is the most general 2-D
quadratic map with the property that the contraction is
independent of x and y. Bounded solutions exist for the Henon
map over a range of a and b, some yield chaotic solutions.
III. SYSTEM DESIGN AND ENCRYPTION
This section introduces the procedure of the proposed
image encryption system using ECG signals with chaotic
Henon map. Fig. 2 illustrates the flow chart of the image
encryption scheme. The physiological signals of encryption
person are collected and stored form a portable instrument and
a digital signal processing unit under the environment of
LabView. Chaos methods presented in Section is employed
in the image encryption algorithm using the Henon map and
ECG extraction program and wolf algorithm. ECG extraction
program extracts feature from ECG files as an initial keys ( 1 )
for the Henon map, the chaotic function is then used to
generate an unpredictable random orbit. It can be used as a
privacy encryption key serial to replace pixel values and
Henon Map
Plain Image
S (M N )
i=M?
i+1
IV.
EXPERIMENTAL RESULTS
j=N?
Voltage(v)
I (i , j )
j+1
Person 1
2.4
2.4
2.2
2.2
1.8
1.8
1.6
1.6
Z(n+T)
1.4
1.2
1.4
1.2
0.8
0.8
0.6
0.4
0.6
0.4
0.4
10
0.6
0.8
1.2
time(sec)
1.4
1.6
1.8
2.2
2.4
Z(n)
(a)
(b)
Fig. 4. Person 1 (a) ECG signal (b) phase plot
Cipher Image
S ( M N )
Person 2
Person 2
1.5
1.5
Z(n+T)
0.5
0.5
0.5
10
1.5
time(sec)
Z(n)
(a)
(b)
Fig. 5. Person 2 (a) ECG signal (b) phase plot
Person 3
Person 3
2.2
2.2
1.8
1.8
1.6
1.6
1.4
1.4
Z(n+T)
TABLE I
PARAMETERS OF HENON MAP FOR ENCRYPTION AND DECRYPTION
Items
Value
Description
n
1500
number of iterations
initial value formed by 1 of the person 1
X0 and Y0
0.0239
a
1.4
system parameter
b
0.3
system parameter
Voltage(v)
Voltage(v)
1.2
1
1.2
1
0.8
0.8
0.6
0.6
0.4
0.2
0.4
time(sec)
10
0.2
0.2
0.4
0.6
0.8
1.2
Z(n)
(a)
(b)
Fig. 6. Person 3 (a) ECG signal (b) phase plot
1.4
1.6
1.8
2.2
TABLE II
AGE, HEIGHT AND WEIGHT OF THREE MALE ADULTS JOINING THE
EXPERIMENT
Person 1
Person 2
Person 3
Age (Yr)
24
24
22
Height (cm)
176
165
165
Weight (kg)
75
61
60
TABLE III
COMPUTED 1 OF ECG SIGNALS FOR DIFFERENT PERSONS
Person 1
0.0239
Person 2
0.0243
Person 3
0.0241
(a)
Filename
cameraman.tif
kids.tif
peppers.png
Items
n
X0 and Y0
a
b
TABLE IV
DIFFERENT KINDS OF IMAGES
Size
Color type
256 256
8 bits grayscale
318 400
8 bits indexed
512 384
24 bits RGB
(c)
3500
3500
3000
3000
2500
2500
2000
2000
TABLE V
PARAMETERS OF HENON MAP FOR DECRYPTION
Value
Description
1500
number of iterations
initial value formed by 1 of the person 2
0.0243
1.4
system parameter
0.3
system parameter
1500
1500
1000
1000
500
500
0
0
50
100
150
200
250
50
(b)
100
150
200
250
(d)
(e)
(f)
Fig. 8. Encryption and decryption for Case 2 (a) original image; (b)
histograms of the original image; (c) encrypted image; (d) histograms of the
encrypted image; (e) incorrect decrypted image; (f) correct decrypted image.
(a)
(c)
( )
( )
1600
1200
1400
1200
1000
1000
800
800
600
600
400
400
200
200
0
0
0
50
100
((b))
150
200
250
50
100
150
200
250
(a)
(d)
()
(e)
5000
4500
3000
4000
2500
3500
3000
2000
2500
1500
2000
1500
1000
1000
500
500
0
0
0
50
100
150
(b)
(e)
(f)
Fig. 7. Encryption and decryption for Case 1 (a) original image. (b)
histograms of original image; (c) encrypted image; (d) histograms of
encrypted image; (e) incorrect decrypted image; (f) correct decrypted image.
200
50
100
150
250
(f)
200
250
3500
V.
3500
3000
3000
2500
2500
2000
2000
1500
1500
1000
1000
500
500
0
0
50
100
150
200
250
50
100
(c)
150
200
250
CONCLUSIONS
(g)
( )
( )
REFERENCES
3500
3500
3000
[1]
3000
2500
2500
2000
2000
1500
1500
1000
1000
500
500
0
0
0
50
100
150
(d)
( )
200
250
50
100
150
200
250
(h)
(i)
(j)
Fig. 9. Encryption and decryption for Case 3 (a) original image; (b)(c)(d) the
histograms of red, green and blue channels of the original image respectively;
(e) encrypted image; (f)(g)(h) histograms of red, green and blue colors of the
encrypted image respectively; (i) incorrect decrypted image; (j) correct
decrypted image.