Next Article in Journal
On the Analysis of Wealth Distribution in the Context of Infectious Diseases
Previous Article in Journal
Relative Belief Inferences from Decision Theory
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhancing Security of Telemedicine Data: A Multi-Scroll Chaotic System for ECG Signal Encryption and RF Transmission

by
José Ricardo Cárdenas-Valdez
1,
Ramón Ramírez-Villalobos
1,
Catherine Ramirez-Ubieta
1 and
Everardo Inzunza-Gonzalez
2,*
1
Instituto Tecnológico de Tijuana, Tecnológico Nacional de México, Tijuana 22435, Baja California, Mexico
2
Facultad de Ingeniería Arquitectura y Diseño, Universidad Autónoma de Baja California, Carret. Tijuana-Ensenada No. 3917, Ensenada 22860, Baja California, Mexico
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(9), 787; https://doi.org/10.3390/e26090787
Submission received: 24 July 2024 / Revised: 8 September 2024 / Accepted: 11 September 2024 / Published: 14 September 2024

Abstract

:
Protecting sensitive patient data, such as electrocardiogram (ECG) signals, during RF wireless transmission is essential due to the increasing demand for secure telemedicine communications. This paper presents an innovative chaotic-based encryption system designed to enhance the security and integrity of telemedicine data transmission. The proposed system utilizes a multi-scroll chaotic system for ECG signal encryption based on master–slave synchronization. The ECG signal is encrypted by a master system and securely transmitted to a remote location, where it is decrypted by a slave system using an extended state observer. Synchronization between the master and slave is achieved through the Lyapunov criteria, which ensures system stability. The system also supports Orthogonal Frequency Division Multiplexing (OFDM) and adaptive n-quadrature amplitude modulation (n-QAM) schemes to optimize signal discretization. Experimental validations with a custom transceiver scheme confirmed the system’s effectiveness in preventing channel overlap during 2.5 GHz transmissions. Additionally, a commercial RF Power Amplifier (RF-PA) for LTE applications and a development board were integrated to monitor transmission quality. The proposed encryption system ensures robust and efficient RF transmission of ECG data, addressing critical challenges in the wireless communication of sensitive medical information. This approach demonstrates the potential for broader applications in modern telemedicine environments, providing a reliable and efficient solution for the secure transmission of healthcare data.

1. Introduction

Cardiovascular disease (CVD) is the leading cause of death worldwide, and it is particularly associated with systolic and diastolic myocardial dysfunction, which is generally associated with atherosclerosis [1,2]. The post-pandemic effect of COVID-19, involving cardiac complications in patients who have recovered from the coronavirus, is also a factor [3,4]. Coronary heart disease, heart failure, arrhythmia, heart valve issues, and high blood pressure are among the various types of CVD [5]. Therefore, the medical and scientific community has become more engaged with the study, acquisition, and management of electrocardiogram (ECG) data [6]. Telemedicine is a wireless and remote information processing system that provides health services. Its applications are diverse and vary from the sensing of patients with diagnosed diabetes, the measurement of heart pressure, remote consultations, and the transmission of ECG and electromyography (EMG) signals for analysis and diagnosis; special initiatives have been conducted to classify and explore ECG signals and detect arrhythmias using clinical wearable atrial fibrillation (AF) recordings [7]. Additionally, studies have been carried out on different stages of sleep, analyzing RR intervals (time intervals between consecutive R-waves in the ECG signal) affected by cardiovascular arrhythmias, although they indicated only modest increases after including entropy measures [8]. This situation increased exponentially with the lack of specialists in urban areas as a direct consequence of the post-pandemic era. In Ref. [9], a multi-scale distribution entropy method is proposed to analyze the complexity of short-term heart rate variability from ECG signals, which was validated through comprehensive comparisons with traditional methods to demonstrate enhanced stability and reliability. As a result, developing algorithms for biomedical signal processing became essential.
The adoption of telemedicine systems to facilitate communication between patients and doctors to reduce the risk of infection was drastically accelerated by the COVID-19 disease [10]. At present, telemedicine is regarded by numerous researchers as a field that bridges the gap between technology and medicine; security measures must be implemented in combination with data transmission algorithms to ensure the confidentiality and integrity of patient information [11]. Furthermore, it is distinguished by a novel paradigm of E-healthcare centered around remote services [12,13]. The security of biomedical information (healthcare data) management is a current challenge in IoMT networks [14], featuring the measurement of body parameters [15,16,17], biosensors and medical images [18,19] from any Healthcare Internet of Things (H-IoT) device connected to the Internet; wireless information management systems must have adequate performance. For instance, in Ref. [20], a biometric key generation algorithm is developed for the ECG feature, and additional works show the detection of atrial fibrillation to demonstrate undiagnosed arrhythmias and prevention methods [21]. On the other hand, an encryption approach was proposed in Ref. [22] to protect ECG bundles for time-critical telecardiology applications. With the development of 5G worldwide and the need for high transmission rates and low energy consumption applications, radio-frequency (RF) transmission systems require adaptive digital modulation schemes before the digital multiplexing process. A variety of factors condition the current advancement of 5G technology. Therefore, the necessity for systems that retain complete control over channel impairments, bandwidth, power management, and bit recovery is of crucial significance, in particular, OFDM-type multiplexes with reduced bandwidths between carrier frequencies [23,24,25].
On the other hand, a dynamical system is considered chaotic when its evolution is sensitive to its initial conditions. This implies that even small initial conditions variations can yield widely diverging outcomes for such dynamical systems [26]. In this context, chaotic systems provide specific attributes that make them suitable for use as encryption systems. Data transmission security is a crucial metric for evaluating communication scheme performance. A chaotic synchronization system can enhance the reliability of secure communication schemes by providing specific properties [27]. In this particular instance, synchronization refers to the process by which two systems converge to the same dynamic. The master–slave strategy is the most commonly employed method of achieving the previously mentioned objective. In this scenario, the system exhibiting chaotic dynamics is referred to as the master system, while the system that is forced to track the dynamics of the master system is known as the slave [28].
Recently, extensive research has been conducted on master–slave synchronization within this framework to enhance the security of ECG signal transmission in telemedicine. For instance, in Ref. [29], the authors propose a novel encryption technique that utilizes signals generated in a chaotic system to encrypt information. The encrypted data can then be decrypted using a synchronization strategy incorporating the signals and a PD controller. The Lü system, a variant of the Lorenz oscillator, is employed. It consists of two chaotic systems arranged in a master–slave configuration that requires a PD controller synchronization. On the other hand, in Ref. [17], a secure communication system has been implemented using two embedded Chen chaotic systems, which are referred to as the master and slave systems, respectively. The ECG signal is encrypted using a master chaotic system. The original data are decrypted by using the slave system. To simplify the calculation of synchronization control design, the Takagi–Sugeno fuzzy method was employed to transform the master and slave components into a fuzzy format. A disturbance observer was developed to estimate the undesired signal present on public channels and the variations in parameters on both the master and slave sides. In addition, an adaptive sliding mode control was developed in combination with the disturbance observer to achieve synchronization between the master and slave systems. Both references demonstrate that synchronization errors are not exactly zero but remain close to zero. Nevertheless, this is important to the development of robust applications in chaotic systems [30,31]. In furtherance of the perspective on feedback methods discussed in the references given above, the synchronization problem is also closely related to the observer problem from control theory [32].
This paper aims to enhance the security and integrity of ECG data during RF wireless transmission for telemedicine applications by implementing a chaotic encryption strategy that relies on master–slave synchronization. This approach combines a multi-scroll chaotic system as the master system, with an extended state observer (ESO) acting as a slave system to estimate all states of the master, as well as the nonlinearity that generates the multi-scroll attractor. The ESO is a highly effective method that can estimate both the state vector and uncertainties in dynamical systems simultaneously [33]. In this proposal, the nonlinear term is seen as an uncertainty. Thus, in an encryption scheme, the user can modify the nonlinear term as desired, while the ESO can estimate the nonlinearity without knowing this adjustment. This feature enhances the reliability of the chaotic synchronization strategy by providing robustness. The Lyapunov stability analysis provides sufficient criteria to guarantee the boundedness of error synchronization dynamics. The proposed system supports OFDM and adaptive n-QAM schemes to optimize signal discretization. Experimentally validated, this approach prevents channel overlap during 2.5 GHz transmissions, ensuring robust and efficient data transmission in modern telemedicine environments.
The structure of this article is organized as follows: Section 2 describes the synchronization design and dynamic chaos-based random key generator algorithm and decryption stage. The processing data, n-QAM algorithm, and RF transmission algorithms are all detailed in Section 2.2. Section 3 describes the main results obtained and the spectral and performance evaluations. Finally, Section 4 shows the conclusions obtained and future work.

2. Proposed Scheme and RF Transmission Algorithm

2.1. Chaos Synchronization Design

The present research focused on utilizing a chaotic system to encrypt ECG signals, thus enhancing security in telemedicine data transmission. This proposal is based on the master–slave scheme. Firstly, as a master system, consider the following general form of a multi-scroll chaotic system, which can be described as follows:
x ˙ 1 m = x 2 m ,
x ˙ 2 m = x 3 m ,
                                                                     x ˙ 3 m = a 1 x 1 m a 2 x 2 m a 3 x 3 m + f ( x 1 m , x 2 m , x 3 m ) ,
where { a 1 , a 2 , a 3 } R , and f ( · ) is a nonlinear function that generates 1-directional multi-scroll chaotic attractors, and it may be defined by several topologies (e.g., hyperbolic functions, piecewise linear function (PWL), special form of a sine function (SFSF)) [34].
Further, we consider the nonlinear function f ( · ) as an additional state, i.e., x ˙ 4 m = φ ( t ) . Consequently, system (1) can be represented by the following extended state system:
x ˙ 1 m = x 2 m ,
x ˙ 2 m = x 3 m ,
                                               x ˙ 3 m = a 1 x 1 m a 2 x 2 m a 3 x 3 m + x 4 m ,
   x ˙ 4 m = φ ( t ) .
Secondly, the slave system is described by the following ESO:   
           x ˙ 1 s = x 2 s + l 1 ( y x 1 s )
           x ˙ 2 s = x 3 s + l 2 ( y x 1 s )
                                                     x ˙ 3 s = a 1 x 1 s a 2 x 2 s a 3 x 3 s + x 4 s + l 3 ( y x 1 s )
x ˙ 4 s = l 4 ( y x 1 s )
where y = x 1 m denotes the measurable output of (1), and l i ( i = 1 , 2 , 3 , 4 . ) represents the observer gains. In this approach, the estimation of all states, including the function f ( · ) , is performed via the ESO.
To address the synchronization problem between (1) and (3), we define the error state as e i ( t ) = x i m x i s , ( i = 1 , 2 , 3 , 4 ) . Thus, the error dynamic system is described as follows:
e ˙ 1 = l 1 e 1 + e 2 ,
e ˙ 2 = l 2 e 1 + e 3 ,
                                     e ˙ 3 = ( a 1 + l 3 ) e 1 a 2 e 2 a 3 e 3 + e 4 ,
e ˙ 4 = φ ( t ) l 4 e 1 .
The main objective is to present a design technique that can deal with variations in the nonlinear function f ( x 1 m , x 2 m , x 3 m ) in system (1) and solve the problem of chaotic synchronization. Here, we analyze the stability of system (4) through Lyapunov criteria. First, let us define the vector error state e [ e 1 , , e 4 ] T . Therefore, the error dynamic (4) can be expressed as follows:
e ˙ = A e e + B φ ( t ) ,
with
A e l 1 1 0 0 l 2 0 1 0 a 1 l 3 a 2 a 3 1 l 4 0 0 0 , B 0 0 0 1 .
Here, we can select the values of observer gains l i such that all eigenvalues of matrix A e have a negative real component. Meanwhile, the following is now considered to hold from this point forward:
(A1) 
The solutions of system (1) remain uniformly bounded for all time t [ 0 , ) .
(A2) 
The scalar function φ ( t ) in (5) is an unknown function with a priori known upper bound, denoted as φ + > 0 , such that
| φ ( t ) | φ + .
Now, for the stability analysis of system (5), consider a Lyapunov function defined as V ( e ) = e T P e . Here, P R 4 × 4 is a positive definite and symmetric matrix. The time derivative of V ˙ ( e ) along the trajectories of (5) yields the following:
V ˙ ( e ) = e T P A e + A e T P e + 2 e T P B φ ( t ) .
If we choose a solution P that satisfies the following Lyapunov equation,
P A e + A e T P = Q ,
for any positive definite matrix Q, subsequently, V ˙ ( e ) can be stated as follows:
V ˙ ( e ) = e T Q e + 2 e T P B φ ( t ) .
Then, based on Assumption (A2), the function V ˙ ( e ) is reformulated as follows:
V ˙ ( e ) ( λ min { Q } e 2 φ + λ max { P } ) e .
Here, V ˙ ( e ) is a negative definite function for all e ( t ) outside the set
B = e : e > 2 φ + λ max { P } λ min { Q } .
Thus, the trajectories of the error state dynamic (5) are uniformly bounded. As a result, the solution of the slave system (3) will be bounded around the solutions of the master system (1).
The proposed algorithm has an important benefit in that it does not require knowledge of function f ( x 1 , x 2 , x 3 ) of the master system (1). This feature makes it especially desirable for synchronizing chaotic systems. In addition, similar to the instance of Refs. [35,36], the observer gains may be chosen such that they minimize the estimation error.
Example. To illustrate the effectiveness of the proposed scheme, let us consider the following multi-scroll chaotic system introduced in Ref. [37] as the master system:
x ˙ 1 m = 10 x 2 m ,
x ˙ 2 m = 10 x 3 m ,
                                          x ˙ 3 m = 10 a x 2 m c x 3 m d 1 f ( x 1 m ) .
with
f ( x 1 m ) = + sin ( 2 π b x 1 m ) , k n b > x 1 m , sin ( 2 π b x 1 m ) , k n b x 1 m k p b , + sin ( 2 π b x 1 m ) , k p b < x 1 m ,
where { a , b , c , d 1 } R and { k n , k p } N + . In system (13), the scroll numbers and the size of the attractor can be arbitrarily modified by a tuning of the parameters in function f ( x 1 m ) . The system (13) has the following characteristics:
(i)
It can present a chaotic, cyclical or stable dynamic.
(ii)
By tuning the parameters k n and k p , generating a chaotic attractor with several scrolls is possible. The number of scrolls can be distributed on the right and left side of the phase plane ( x 1 m , x 2 m ) .
For study purposes, we only concentrated on the chaotic behavior of system (13). Now, the nonlinear function (14) is considered as an additional state of (13). Thus, the master system can be described as the following extended state system:
x ˙ 1 m = 10 x 2 m ,
x ˙ 2 m = 10 x 3 m ,
                                x ˙ 3 m = 10 ( a x 2 m c x 3 m + x 4 m ) ,
x ˙ 4 m = 10 φ ( t ) ,
y = x 1 m ,
where φ ( t ) is an unknown and bounded function. Meanwhile, the slave system is designed as follows:
x ˙ 1 s = 10 x 2 s + l 1 ( y x 1 s ) ,
x ˙ 2 s = 10 x 3 s + l 2 ( y x 1 s ) ,
                            x ˙ 3 s = 10 a x 2 s c x 3 s + x 4 s + l 3 ( y x 1 s ) ,
     x ˙ 4 s = 10 φ ( t ) + l 4 ( y x 1 s ) .
In the simulation, the implicit Euler method (with a step size h = 1 × 10 3 ) is used to solve the system (13) and its corresponding slave system (16). The parameter values for the master system are a = 0.3 , b = 0.25 , c = 0.3 , d = 0.35 , k n = 3 , k p = 2 , and the observer gains l i were tuned using the pole placement approach with l 1 = 2 5 ω 0 c , l 2 = 3 50 ω 0 2 c l 1 , l 3 = 2 500 ω 0 3 a c l 2 , l 4 = 1 10000 ω 0 4 for ω 0 = 50 rad/sec. The initial conditions of the master system (13) and the slave system (16) are set as
             x 1 m ( 0 ) , x 2 m ( 0 ) , x 3 m ( 0 ) T = 0.1 R 3 ,
x 1 s ( 0 ) , x 2 s ( 0 ) , x 3 s ( 0 ) , x 4 s ( 0 ) T = 0.5 R 4 .
The largest Lyapunov exponent, denoted as λ L E , is equal to 0.1092 for the set of parameter values. A positive value of λ L E indicates that the system described by (13) exhibits chaotic behavior.
The simulation results are illustrated in Figure 1 and Figure 2. The trajectories of the slave system converge toward the chaotic attractor of the master system (see Figure 1). In addition, as depicted in Figure 2, the error states converge to zero and remain around its vicinity.

2.2. Chaotic Encryption and n-QAM

Algorithm 1 performs the chaotic encryption by executing an additive combination of the biomedical signal ( E C G ) with the chaotic signal ( c S ) from the master system (13) [38,39]. The purpose of this additive combination is to mask the original ECG data by allowing the chaotic signal to dominate, making the original signal unrecognizable and thus encrypted. In this stage, the encryption process itself does not add complexity; it arises during the modulation stage.
Algorithm 1 Modulation and Encryption of ECG Signal
Input Biomedical signal E C G , Chaotic signal c S , Modulation order M
Output Modulated signal m S
  1:
procedure Preprocess_Encrypt_Signal
  2:
    def  M = n - Q A M
  3:
     eS E C G + c S                                                                                                             ▹ ECG signal combined with chaotic signal
  4:
     sN [ ]                                                                         ▹ Initialize the normalized signal array according to the n-QAM order
  5:
    for each e S i in eS  do
  6:
         s N e S i m i n ( eS ) m a x ( eS ) m i n ( eS )
  7:
    end for
  8:
    return sN
  9:
     sD [ ]                                                                                                                                ▹ Initialize the discretized signal array
10:
   for each s N i in sN  do
11:
         sD floor ( s N i · ( M 1 ) 2 )                                                                       ▹ Signal rounding and conversion to complex signal
12:
    end for
13:
    return  s D
14:
    ECG_ds ← {real(sD), imag(sD)}                                                                                                    ▹ Decomposition of the signal
15:
     mS n - QAM ( ECG _ ds , M )                                                ▹ Modulation of the encrypted signal based on the n-QAM order
16:
    return  mS
17:
end procedure
Before modulation, each value of the encrypted signal is normalized by subtracting its minimum value and dividing by the difference between the maximum and minimum values, yielding the normalized signal ( s N ). The proposed Algorithm 1 continues determining the discrete value for each normalized value that falls within the range of values of the modulation order M. The n-QAM technique then modulates the signal using two channels: I (in-phase) and Q (quadrature). The “n” represents the number of symbols corresponding to specific amplitude and phase combinations. The process begins with digitizing the normalized signal ( s N ) into a serial bit-stream, which is then split into phase shift and amplitude change stages. This creates a new signal ( s D ) with a 2.45 GHz carrier frequency. The transmitted signal is complex due to these variations, as each transmitted symbol is represented by a vector sent by RF and is graphed as an n-QAM constellation; this is depicted in the complex variable E C G _ d s . The final output of the proposed algorithm is a complex modulated signal ( m S ) prepared for secure transmission.

2.3. RF Transmission Algorithm

The procedure for RF transmission is outlined in Algorithm 2. Implementing a long-term evolution (LTE) System Toolbox, the algorithm replicates an LTE signal that satisfies the requirements of a realistic signal transmission environment. The process starts by setting the configuration parameters for the transmission based on the needs of the transmitting signal. These parameters are the type of configuration, sampling rate, bandwidth and filter. Using these parameters, the proposed algorithm generates the reference measurement channel (RMC) waveforms. The algorithm also implements a root-raised cosine type filter ( E C G T X ) before transmitting the signal to reduce inter-symbol interference, improving the quality and reliability of the signal. The AD9361 transceiver is initiated by setting up the input ( i n p u t T X ) and output ( o u t p u t R X ) channels of the card once the signal is prepared. Finally, the proposed algorithm transmits the encrypted signal on the 2.45 GHz frequency and receives it on the RX1 channel ( E C G R X ). As an overview, the transmission methodology is described as follows:
  • Declare the specific parameters for LTE signal configuration.
  • Generate the RMC waveform following the established parameters.
  • Implement a root-raised cosine filter and signal strength adjustment.
  • Define transmission and reception parameters for the AD9361.
  • Transmit the generated signal through the set transmitter.
  • Use of the configured receiver to capture the transmitted signal.
Algorithm 2 Generation and Transmission of LTE Signal
Input Modulated signal m S
Output Received signal E C G R X
  1:
procedure Generate_Transmit_LTE_Signal
  2:
    LTE Parameters Configuration
  3:
    Set LTE configuration parameters
  4:
    Generate RMC signal with specified parameters state
  5:
    Transmission
  6:
     E C G T X filter_design( m S , rolloff, span)
  7:
    inputTX ← {real( E C G T X ), imag( E C G T X )}
  8:
    AD9361_TX(inputTX) ▹ Setup AD9361 for signal transmission.
  9:
    AD9361_RX(outputRX)    ▹ Setup AD9361 for signal reception.
10:
   Signal transmission
11:
    E C G R X AD9361_RX(outputRX) ▹ Reception on channel RX1
12:
    return  E C G R X
13:
end procedure

2.4. Signal Post-Processing and Demodulation

Signal post-processing ensures the data are aligned at the correct position in the complex plane and the data are demodulated. This procedure is detailed in Algorithm 3, which initiates with synchronizing the transmitted and received signals ( R X _ s y n ) to guarantee that both signals are in time sync. The algorithm proceeds by rotating the polar shape of the signal that has already been synchronized. R X _ r o t displays the formula for constellation rotation. The value θ is variable and is defined based on a visual assessment of the received constellation angles. Therefore, the value of θ is adjusted as needed in real time. The original signal’s characteristics are recovered by de-filtering the signal ( R X _ f ) before signal demodulation. The signal is recovered into its digital data using the n-QAM function ( d e m o d S ), which is then concatenated into a single variable ( E C G _ c o m p l e x ). The subsequent steps are equivalent to the inversion of the discretization and normalization procedure, in which each value of the encrypted signal is restored to its original state in time. In summary, the procedure involves the following steps:
  • Align the transmitted and received signals.
  • Rotate the synchronized signal’s polar shape by modifying θ .
  • De-filter the signal.
  • Demodulate the signal.
  • Concatenate the demodulated signal into a single variable.
  • Reverse the discretization and normalization process to return each encrypted signal value to its original state.
Algorithm 3 Post-processing of received signal.
Input Received signal E C G R X , Transmitted signal E C G T X , n-QAM order M
Output Encrypted signal E C G _ e n c r y p t
  1:
procedure Process_Received_Signal
  2:
     R X _ s y n synchronize ( E C G R X , E C G T X )
  3:
     R X _ r o t R X _ s y n · exp ( i · θ )           ▹ Rotation in the complex plane
  4:
     R X _ f filter _ design ( R X _ r o t )
  5:
     demodS qamdemod ( R X _ f , M )
  6:
    ECG_complex ←{real( d e m o d S ), imag( d e m o d S )}
  7:
     ECG _ d [ ]
  8:
    for each E C G _ c o m p l e x i in ECG _ complex  do
  9:
         E C G _ d ECG _ complex i ( M 1 ) 2
10:
   end for
11:
   return  E C G _ d
12:
    ECG _ encrypt [ ]
13:
   for each E C G _ d i in ECG _ d  do
14:
        E C G _ e n c r y p t E C G _ d i · ( max min ) + min
15:
   end for
16:
   return  E C G _ e n c r y p t
17:
end procedure

2.5. Signal Decryption

Algorithm 4 is implemented during the final stage of the signal decryption process. The parameters of the master system are established, and the profits of the observer are initialized. The proposed algorithm then iterates over the synchronization signal ( x 1 ) duration, using the Euler method to approximate the state variables continuously. These variables estimate the chaotic components of the signal. The decrypted ECG signal ( E C G _ d e c ) is obtained by subtracting the approximated chaotic signal ( x 3 s ) from the encrypted signal ( E C G _ e n c r y p t ) that was received. The synchronization of the original and estimated signals emphasizes the observer’s accuracy. In summary, the algorithm is defined by the subsequent stages:
  • Establish the parameters of the master system and the gains of the observer.
  • Approximate the observer variables using the Euler method, defining the time step and initial variables.
  • Subtract the observer’s estimated signal from the encrypted signal to decrypt the ECG signal.
Algorithm 4 Decryption of ECG Signal
Input Encrypted signal E C G _ e n c r y p t , synchronization signal
Output Decrypted ECG signal E C G _ d e c
  1:
procedure Observer Synchronization Process
  2:
    Initialize parameters
  3:
    Initialize observer gains
  4:
     N Length of d S
  5:
    Initialize states
  6:
     d t Defined time step
  7:
    for  i 1 to N 1  do
  8:
         x 1 s [ i + 1 ] x 1 s [ i ] + h · ( x 2 s [ i ] + l 1 · ( x 1 [ i ] x 1 s [ i ] ) )
  9:
         x 2 s [ i + 1 ] x 2 s [ i ] + h · ( x 3 s [ i ] + l 2 · ( x 1 [ i ] x 1 s [ i ] ) )
10:
         x 3 s [ i + 1 ] x 3 s [ i ] + h · ( a 1 · x 1 s [ i ] a 2 · x 2 s [ i ] a 3 · x 3 s [ i ] + x 4 s [ i ] + l 3 · ( x 1 [ i ] x 1 s [ i ] ) )
11:
         x 4 s [ i + 1 ] x 4 s [ i ] + h · 4 · ( x 1 [ i ] x 1 s [ i ] )
12:
   end for
13:
    E C G _ d e c E C G _ e n c r y p t x 3 s
14:
   return  E C G _ d e c
15:
end procedure
An n-QAM algorithm was developed as an essential part of the transmission algorithm for the processing of ECG data. The system is adaptive for variable n-QAM resolution with the input stream consisting of x = [ x 1 , . . . , x N ] for the I-Channel, y = [ y 1 , . . . , y N ] for the Q-Channel, and a 2.45 GHz local oscillator that integrates the in-phase and quadrature components. The resulting signal vector s ( b ) = [ ( x 1 , y 1 ) , . . . ( x N , y N ) ] is composed of K bits of binary symbols. Figure 3 depicts the developed architecture of n-QAM:
The AD9361 transceiver sends the time-domain structure of the symbol packaging stage, which is based on K symbols modulated in the final waveform s ( t ) = [ s 1 ( t ) , . . . , s N ( t ) ] , to the transmission chain outside the transceiver. This chain comprises a bandpass filtering stage, the power amplifier under test, and the return signal obtained through the directional coupler and spectral analysis [23].
The following equation can be used to express the general QAM equation.
s ( t ) = I ( t ) sin ( 2 π f c t ) + Q ( t ) sin ( 2 π f c t 90 ) ,
where the carrier frequency is denoted by f c , and a coherent demodulator at the receiver multiplies the received signal with a cosine and sine signal to produce the received estimates of I ( t ) and Q ( t ) . By employing conventional trigonometric identities, this can be expressed as Equation (19):
s ( t ) = 1 2 I ( t ) + 1 2 I ( t ) cos ( 4 π f c t ) Q ( t ) sin ( 4 π f c t ) ,
The representation of digital transmission denoted by the n-QAM constellation is represented as follows
A signal which is represented in an n-QAM constellation can be expressed as follows:
Q A M ( t ) = s ( t ) + n ( t ) ,
where n ( t ) represents the additive white Gaussian noise (AWGN), while s ( t ) denotes the signal modulated under an n-QAM scheme mainly determined by the n scheme under the transmission, which can be defined as
s k ( t ) = a j g ( t n T B ) sin ( 2 π f c t ) + b j g ( t n T B ) sin ( 2 π f c t + 90 ) ,
where a j and b j represent the in-phase and quadrature, respectively. The function g ( · ) is the base-band tone, and T B represents the symbol time duration.

2.6. Summarize

In summary, the design procedure for chaotic encryption and transmission can be summarized as follows:
Step 1:
Construct the master–slave system stated in Equations (1) and (3).
Step 2:
Apply any pole assignment technique to compute the values of observer gains l i , ( i = 1 , 2 , 3 , 4 ) to ensure that all eigenvalues of matrix A e have a negative real part, i.e., ( λ i { A e } ) < 0 .
Step 3:
Combine the ECG signal with the chaotic signal to generate the encrypted ECG signal. Subsequently, the signal is pre-processed for modulation using n-QAM.
Step 4:
Set the configuration parameters and generate the RMC waveform for LTE transmission. Subsequently, transmit the encrypted ECG signal.
Step 5:
The encrypted ECG signal is post-processed through an n-QAM demodulation process and filtering stage.
Step 6:
Set the configuration parameters for decryption. Subsequently, the decryption of the ECG signal is carried out; i.e., the ECG signal is reconstructed by subtracting the chaotic encryption signal from the encrypted signal.
An overall diagram of the proposed chaotic encryption and transmission scheme is presented in Figure 4.

3. Experimental Results

A block diagram of the experimental RF system is depicted in Figure 5. Part A proposes using a PC/Host that runs MATLAB version R2024a and is connected to a Cyclone V FPGA SoC development kit manufactured by Intel Corporation (Altera), (Santa Clara, CA, USA) via Ethernet. For the transmission process of the encrypted E C G T X signal, one of the channels of the dual-band transceiver is used that contains the biological ECG information of interest added to the chaotic information. In this work, the synchronization channel x 1 s is carried out in the Host. In the simulation, the decryption key is not sent through the same wireless medium operating in the same 2.45 GHz RF band. If the transmitted synchronization signal is intercepted, the purpose of guaranteeing the privacy of the information would be lost. It is essential to send by an alternative path or, even better, an embedded system located in the specialist doctor to contain the encryption key as a further implementation stage. Finally, the PC/Host regulates and configures the transmission and reception of signals by utilizing MATLAB to store the data in the FPGA’s DDR memories. Part B of the diagram corresponds to the analog proposal in which the signal transmitted by the AD9361 transceiver is subjected to the ZFBP-2400-S+ bandpass filter amplified by a ZV60-V63+ power amplifier. Lastly, a ZV60-63-S+ directional coupler is employed to divide the amplified signal, enabling the spectrum analyzer to analyze a portion of it while the remaining portion continues its transmission path. The amplifier operates on the energy supplied by the DC power supply. The feedback path enables real-time adjustments and corrections based on the analysis of the transmitted signal by allowing a portion of the amplified signal to return to the FPGA SoC-Kit.
The experimental design considers the collection of real-world biological data. The implemented transmission must be located in the linear region of the power amplifier. The RF-PA under broadband test with high dynamic range for LTE applications has an output power of 1 dB compression of 17.8 dBm, which sends it to saturation levels, so the transmission developed is below this power threshold. Thus, implementing the model and the experimental results are appropriate for the proposed system depicted in Figure 6, which employs a software-defined radio (SDR) transceiver base. The SDR platform includes a system-on-chip (SoC) device and a software and hardware interface for developing the SDR system. For the in-phase (I) and quadrature (Q) signals, the RF conversion system uses direct conversion with 2 × 2 channels. The testbed configuration includes the following components: a ZFBP-2400-S+ bandpass filter with a bandwidth of 2400 MHz ± 100 MHz and an insertion loss of approximately 2 dB; a ZX60-V63+ power amplifier (with a 5 V bias) offering a gain of approximately 20 dB when operated at a frequency of 2.45 GHz; and a ZHDC-16-63-S+ coupler with a high directivity of 32 dB typ. and a return loss of approximately 23 dB. An attenuator with a 20 dB is installed at the input to protect the spectrum analyzer. A 3 dB attenuator is also positioned at the input of the RX channel of the transceiver board to protect the receiving signal below the power threshold.
The developed platform contains the following measurement equipment, an FPGA embedded system and an RF transceiver: SIGLENT SSA 3032X Spectrum Analyzer, SIGLENT’s headquarters is in Shenzhen, China. The power supply GW INSTEK GPS-3303 is manufactured by Good Will Instrument Co., whose headquarters are in Taipei, Taiwan. Cyclone V FPGA SoC-Kit is manufactured by Intel Corporation (formerly Altera), headquartered in Santa Clara, CA, USA. AD9361 RF Agile Transceiver manufactured by Terasic located in Hsinchu, Taiwan.
In relation to the analog devices for signal and power management, the following devices were used: Mini-Circuits ZFBP-2400-S+ Bandpass Filter: Mini-Circuits is based in Brooklyn, New York, USA. Mini-Circuits ZX60-V63+ Power Amplifiers: Mini-Circuits, Brooklyn, New York, NY, USA. Mini-Circuits ZHDC-16-63-S+ Coupler: Mini-Circuits in Brooklyn, New York, NY, USA.

Decryption and Spectral Validation

In a rural sector, RF transmissions provide the advantage of transmitting information without the requirement of Wi-Fi or Ethernet. In this scenario, a line-of-sight transmission of relevant biological information would suit an embedded system like the Cyclone V FPGA development board. The transmission was devised for a carrier frequency of 2.5 GHz to be interpreted by a specialist. The root mean squared error (RMSE) metric, defined in Equation (22), determines the efficacy of the transmitted signal concerning the received ECG signal.
R M S E = n = 1 N [ x t x ( n ) x r x ( n ) ] 2 ,
where x t x ( n ) is the ECG transmitted signal and x r x ( n ) is the received signal under test.
Figure 7 contains a comparison between an E C G R x signal and an E C G T x signal at a heart rate of 1.11 Hz, with a precision of RMSE of 0.0235, using a 128-QAM modulation scheme.
Figure 8 illustrates an ECG signal of 1.66 Hz. The demonstration was carried out for a medium-resolution 128-QAM scheme that provides adequate precision for interpreting signals by a medical specialist in the field; the system is adaptable to n-QAM variations. The implementations that have been conducted achieved a precision of RMSE of 0.0180 for ECG signals. The predominant frequencies are recovered to diagnose pertinent pathologies from the signals transmitted through the RF transmission chain.
The ECG signal under test is compared to the chaotic system signal implementations in Figure 9 and Figure 10. When the chaotic system is implemented, the transmitted signals are evaluated with the decrypted signals, and a precision that improves an RMSE 0.0559 is obtained. The demodulation process and the elimination of the chaotic signal significantly enhance the accuracy of the resultant ECG. The synchronization matter, which is a result of the chaotic system synchronization error, is resolved by Algorithm 1 through the modulation and encryption of the ECG signal and Algorithm 2 through the generation of the LTE signal that will be transmitted through the AD9361 transceiver.
The error vector measurement (EVM) validation of the encrypted ECG signal under a 128-QAM modulation scheme is illustrated in Figure 11. An accuracy of -27 (db) EVM is achieved in the implementation. Upgrading to a higher-order n-QAM scheme can enhance this measurement. The original signal can be recovered by decompressing the 7-bit symbols. The ECG signal, sent for a future classification and diagnosis procedure, is obtained by subtracting the chaotic signal.
Figure 12 illustrates two comparisons of the correlation between the ideal signal (blue) and the cross-correlation of the received signal in relation to the transmitted signal (brown). The correlation between the recovered and transmitted signals is comparable, as evidenced by the maximum amplitude at the origin. Figure 8 contains four ECG cycles with a population of 1402 samples, which are broken down along Figure 12. The QRS complexes of the recovered and transmitted signals are primarily located in the ranges of 100, 400, 1300, and 2050 sample numbers.
Figure 13 shows the discrete Fourier transform (DFT) of the transmitted and received signals. The signals under test oscillate at a frequency of 1.66 Hz, and with DC components as shown in the origin, the power begins to dissipate right in the range of 8 Hz, which includes the inner frequencies observed in Figure 8 in the Q-T wave at the end of each period of the ECG. Analysis in the frequency domain allows us to analyze and diagnose pathologies and arrhythmias. This mainly takes place in the QRS complex, in addition to others such as short Q-T and long Q-T waves with high frequencies involved.
Figure 14 shows the relationship and trend of values throughout the transmission; the distribution of data by voltage range is shown in a relative equivalent compared to the transmitted signal concerning the 4.5 % of the received data in the negative region. From 0 to 0.1, there is a distribution of 33.5 % of the data; in the voltage ranges of 0.1–0.3, a distribution of 37 % is observed, and in the higher-voltage peaks, it corresponds to 25 % of the total data. This is the result of the 1402 samples that were utilized in the ECG.
The transmission channel of the AD9361 transceiver provides a wide attenuation range that helps the design optimize the signal-to-noise ratio (SNR). In the transmitter stage, a constant called the scale factor is established during programming, which indicates the power level used within the board with these internal power amplifiers. This scale factor operates from 0 to 1.0, where the higher value indicates that you have taken it to saturation; in this implementation, the preamplifier was operated in the linear region of 0.5 to eliminate unwanted effects at the input of the external power amplifier. For LTE applications with bandwidth less than 10 MHz, there is a Tx SNR of 128 dB/hZ; with this level of linearity, there is a bit error rate of 10 4 , which indicates an error of 0.01%. In this condition, the external power amplifier adds nonlinearities to the system. However, the PA is the primary device in a transmission chain.

4. Conclusions

This research demonstrates the effectiveness of chaotic encryption, leveraging inherent randomness and sensitivity to initial conditions to enhance data security. The encryption method relies on synchronizing a master–slave chaotic system, where an ECG signal is encrypted using a master system (multi-scroll chaotic system) and decrypted using a slave system (extended state observer). Lyapunov stability analysis establishes sufficient conditions to ensure error state responses remain uniformly bounded around zero.
The proposed system offers a viable alternative for processing and transmitting ECG signals in telemedicine. It is primarily based on four algorithms: the modulation and encryption of ECG signals, the generation and transmission of LTE signals, the post-processing of received signals, and the decryption of ECG signals.
An FPGA development board was employed to design and integrate an RF transmission platform encompassing digital and power stages. A power amplifier, protected by a directional coupler and designed for base station and LTE applications, enhances power transmission. The experiments utilized the 128-QAM modulation scheme, demonstrating the system’s adaptability to higher schemes up to 1024-QAM.
In this wireless transmission, data at the spectral level and data distribution analysis are compared to guarantee that the correlation of the received signal is ideal so that the health specialist can give an appropriate ECG diagnosis.
The research confirmed the system’s capability to prevent channel overlap during 2.5 GHz transmissions. The 2 GHz band, widely used in North America for RF signal transmission, was employed in the experiments. The precise recovery of signals, including frequencies induced in QRS complexes and QT waves, ensures accuracy for further analysis and classification, showcasing the system’s potential for broader telemedicine applications.
In future work, a classifier system for the self-diagnosis of pathologies can be developed as a means of comparison for the doctor.

Author Contributions

Conceptualization, J.R.C.-V. and R.R.-V.; methodology, C.R.-U. and J.R.C.-V.; software, C.R.-U. and E.I.-G.; validation, J.R.C.-V. and R.R.-V.; formal analysis, C.R.-U. and R.R.-V.; investigation, J.R.C.-V. and R.R.-V.; resources, J.R.C.-V. and R.R.-V.; data curation, C.R.-U. and E.I.-G.; writing—original draft preparation, C.R.-U., J.R.C.-V. and R.R.-V.; writing—review and editing, E.I.-G. and R.R.-V.; visualization, E.I.-G. and J.R.C.-V.; supervision, E.I.-G. and J.R.C.-V.; project administration, J.R.C.-V. and R.R.-V. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Tecnológico Nacional de México (TecNM) research projects, grant numbers: 20133.24-P and 20586.24-P.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ESOextended state observer

References

  1. Arques, S. Human serum albumin in cardiovascular diseases. Eur. J. Intern. Med. 2018, 52, 8–12. [Google Scholar] [CrossRef] [PubMed]
  2. Münzel, T.; Gori, T.; Keaney, J.F.; Maack, C.; Daiber, A. Pathophysiological role of oxidative stress in systolic and diastolic heart failure and its therapeutic implications. Eur. Heart J. 2015, 36, 2555–2564. [Google Scholar] [CrossRef] [PubMed]
  3. Bansal, M. Cardiovascular disease and COVID-19. Diabetes and Metabolic Syndrome. Clin. Res. Rev. 2020, 14, 247–250. [Google Scholar]
  4. Xiong, T.Y.; Redwood, S.; Prendergast, B.; Chen, M. Coronaviruses and the cardiovascular system: Acute and long-term implications. Eur. Heart J. 2020, 41, 1798–1800. [Google Scholar] [CrossRef] [PubMed]
  5. Bajić, D.; Đajić, V.; Milovanović, B. Entropy Analysis of COVID-19 Cardiovascular Signals. Entropy 2021, 23, 87. [Google Scholar] [CrossRef] [PubMed]
  6. Ricotta, J.J.; Pagan, J.; Xenos, M.; Alemu, Y.; Einav, S.; Bluestein, D. Cardiovascular disease management: The need for better diagnostics. Med. Biol. Eng. Comput. 2008, 46, 1059–1068. [Google Scholar] [CrossRef]
  7. Wang, F.; Wang, H.; Fu, R. Real-Time ECG-Based Detection of Fatigue Driving Using Sample Entropy. Entropy 2018, 20, 196. [Google Scholar] [CrossRef]
  8. Yan, C.; Li, P.; Yang, M.; Li, Y.; Li, J.; Zhang, H.; Liu, C. Entropy Analysis of Heart Rate Variability in Different Sleep Stages. Entropy 2022, 24, 379. [Google Scholar] [CrossRef]
  9. Lee, D.-Y.; Choi, Y.-S. Multiscale Distribution Entropy Analysis of Short-Term Heart Rate Variability. Entropy 2018, 24, 12. [Google Scholar] [CrossRef]
  10. Eberly, L.A.; Khatana, S.A.M.; Nathan, A.S.; Snider, C.; Julien, H.M.; Deleener, M.E.; Adusumalli, S. Telemedicine outpatient cardiovascular care during the COVID-19 pandemic: Bridging or opening the digital divide? Circulation 2020, 142, 510–512. [Google Scholar] [CrossRef]
  11. Payán, D.D.; Frehn, J.L.; Garcia, L.; Tierney, A.A.; Rodriguez, H.P. Telemedicine implementation and use in community health centers during COVID-19: Clinic personnel and patient perspectives. SSM-Qual. Res. Health 2022, 2, 100054. [Google Scholar] [CrossRef] [PubMed]
  12. Kumar, S.; Kumar, M.; Budhiraja, R.; Das, M.K.; Singh, S.A. cryptographic model for better information security. J. Inf. Secur. Appl. 2018, 43, 123–138. [Google Scholar] [CrossRef]
  13. Razaq, A.; Maghrabi, L.; Ahmad, M.; Naith, Q. Novel substitution-box generation using group theory for secure medical image encryption in E-healthcare. AIMS Math. 2024, 9, 6207–6237. [Google Scholar] [CrossRef]
  14. Ahmad, M.; Alkanhel, R.; Soliman, N.; Algarni, A.; Abd El-Samie, F.; El-Shafai, W. Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion. Comput. Syst. Sci. Eng. 2023, 47, 2361–2380. [Google Scholar] [CrossRef]
  15. Jati, G.; Rachmasari, A.R.; Jatmiko, W.; Mursanto, P.; Sediono, W. An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm. In Proceedings of the International Workshop on Big Data and Information Security (IWBIS), Jakarta, Indonesia, 23–24 September 2017; pp. 155–160. [Google Scholar]
  16. Mboupda Pone, J.R.; Çiçek, S.; Takougang Kingni, S.; Tiedeu, A.; Kom, M. Passive–active integrators chaotic oscillator with anti-parallel diodes: Analysis and its chaos-based encryption application to protect electrocardiogram signals. Analog Integr. Circuits Signal Process. 2020, 103, 1–15. [Google Scholar] [CrossRef]
  17. Le, M.C.; Nguyen, Q.D.; Huang, S.C. Electrocardiogram Signal Secure Transmission via a Wireless Communication Protocol of Chaotic Systems Base on Adaptive Sliding Mode Control and Disturbance Observer. IEEE Access 2023, 11, 145373–145385. [Google Scholar]
  18. Ben Slimane, N.; Bouallegue, K.; Machhout, M. Designing a multi-scroll chaotic system by operating Logistic map with fractal process. Nonlinear Dyn. 2017, 88, 1655–1675. [Google Scholar] [CrossRef]
  19. Trujillo-Toledo, D.A.; López-Bonilla, O.R.; García-Guerrero, E.E.; Esqueda-Elizondo, J.J.; Cárdenas-Valdez, J.R.; Tamayo-Pérez, U.J.; Aguirre-Castro, O.A.; Inzunza-González, E. Real-time medical image encryption for H-IoT applications using improved sequences from chaotic maps. Integration 2023, 90, 131–145. [Google Scholar] [CrossRef]
  20. Chukwunonyerem, J.; Aibinu, A.M.; Onumanyi, A.J.; Ugweje, O.C.; Onwuka, E.N.; Alenogbena, C.; Ezechi, N. Development of key generation algorithm using ECG biometrics for node security in wireless body area sensor network. Eur. Res. Telemed./Rech. Eur. Télémédecine 2019, 5, 137–144. [Google Scholar] [CrossRef]
  21. Zhao, L.; Liu, C.; Wei, S.; Shen, Q.; Zhou, F.; Li, J. A New Entropy-Based Atrial Fibrillation Detection Method for Scanning Wearable ECG Recordings. Entropy 2018, 20, 904. [Google Scholar] [CrossRef]
  22. Sufi, F.; Han, F.; Khalil, I.; Hu, J. A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. Secur. Commun. Netw. 2011, 4, 515–524. [Google Scholar] [CrossRef]
  23. Chung, H.; Hong, S.; Lim, B.K.; Ma, L.; Byung, K.Y. Performance analysis and multidimensional gray coding scheme for a real-number M-ary QAM. In Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 19–21 October 2016; pp. 954–959. [Google Scholar]
  24. Otsuki, S.; Sampei, S.; Morinaga, N. Square-QAM adaptive modulation/TDMA/TDD systems using modulation level estimation with Walsh function. Electron. Lett. 1995, 31, 169–171. [Google Scholar] [CrossRef]
  25. Singya, P.K.; Shaik, P.; Kumar, N.; Bhatia, V.; Alouini, M.S. A survey on higher-order QAM constellations: Technical challenges, recent advances, and future trends. IEEE Open J. Commun. Soc. 2021, 2, 617–655. [Google Scholar] [CrossRef]
  26. Boccaletti, S.; Kurths, J.; Osipov, G.; Valladares, D.L.; Zhou, C.S. The synchronization of chaotic systems. Phys. Rep. 2002, 366, 1–101. [Google Scholar] [CrossRef]
  27. Li, Q.; Yue, C. Predefined-time modified function projective synchronization for multiscroll chaotic systems via sliding mode control technology. Complexity 2020, 2020, 6590502. [Google Scholar] [CrossRef]
  28. Zambrano-Serrano, E.; Munoz-Pacheco, J.M.; Serrano, F.E.; Sánchez-Gaspariano, L.A.; Volos, C. Experimental verification of the multi-scroll chaotic attractors synchronization in pwl arbitrary-order systems using direct coupling and passivity-based control. Integration 2021, 81, 56–70. [Google Scholar] [CrossRef]
  29. Liao, T.-L.; Chen, H.-C.; Peng, C.-Y.; Hou, Y.-Y. Chaos-Based Secure Communications in Biomedical Information Application. Electronics 2021, 10, 359. [Google Scholar] [CrossRef]
  30. Ren, F.; Wang, X.; Li, Y.; Zeng, Z. Conditional sliding mode control-based fixed-time stabilization of fuzzy uncertain complex system. IEEE Trans. Fuzzy Syst. 2024, 32, 921–933. [Google Scholar] [CrossRef]
  31. Song, X.; Fan, Z.; Lu, S.; Yan, Y.; Yue, B. Predefined-time sliding mode attitude control for liquid-filled spacecraft with large amplitude sloshing. Eur. J. Control 2024, 77, 100970. [Google Scholar] [CrossRef]
  32. Nijmeijer, H.; Mareels, I.M. An observer looks at synchronization. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 1997, 44, 882–890. [Google Scholar] [CrossRef]
  33. Guo, B.Z.; Zhao, Z.L. On the convergence of an extended state observer for nonlinear systems with uncertainty. Syst. Control Lett. 2011, 60, 420–430. [Google Scholar] [CrossRef]
  34. Wang, N.; Li, C.; Bao, H.; Chen, M.; Bao, B. Generating Multi-Scroll Chua’s Attractors via Simplified Piecewise-Linear Chua’s Diode. IEEE Trans. Circuits Syst. I Regul. Papers 2019, 66, 4767–4779. [Google Scholar] [CrossRef]
  35. Naghdi, M.; Sadrnia, M.A. A novel fuzzy extended state observer. ISA Trans. 2020, 102, 1–11. [Google Scholar] [CrossRef]
  36. Taleshian, T.; Ranjbar Noei, A.; Sadati, J.; Malekzadeh, M. Perturbation observer design based on extremum seeking control: An analytical insight. Trans. Inst. Meas. Control 2024, 46, 886–898. [Google Scholar] [CrossRef]
  37. Ding, P.; Feng, X. Generation of Multi-Scroll Chaotic Attractors from a Jerk Circuit with a Special Form of a Sine Function. Electronics 2020, 9, 842. [Google Scholar] [CrossRef]
  38. Murillo-Escobar, M.A.; Cardoza-Avendaño, L.; López-Gutiérrez, R.M.; Cruz-Hernández, C. A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine. J. Med. Syst. 2017, 41, 59. [Google Scholar] [CrossRef]
  39. Murillo-Escobar, D.; Cruz-Hernández, C.; López-Gutiérrez, R.M.; Murillo-Escobar, M.A. Chaotic encryption of real-time ECG signal in embedded system for secure telemedicine. Integration 2023, 89, 261–270. [Google Scholar] [CrossRef]
Figure 1. Chaotic attractor.
Figure 1. Chaotic attractor.
Entropy 26 00787 g001
Figure 2. Error state responses.
Figure 2. Error state responses.
Entropy 26 00787 g002
Figure 3. Architecture of n-QAM scheme.
Figure 3. Architecture of n-QAM scheme.
Entropy 26 00787 g003
Figure 4. Overall diagram scheme.
Figure 4. Overall diagram scheme.
Entropy 26 00787 g004
Figure 5. Block diagram of the transmission testbed proposed. Part A: Signal transmission and control. Part B: Signal path and measurement.
Figure 5. Block diagram of the transmission testbed proposed. Part A: Signal transmission and control. Part B: Signal path and measurement.
Entropy 26 00787 g005
Figure 6. Photo of the experimental testbed. Equipment pertinent to the setup: (A) Altera Cyclone V FPGA SoC-Kit. (B) AD9361 RF Agile Transceiver operating at a center frequency of 2.45 GHz. (C) Mini-circuits ZFBP-2400-S+ bandpass filter. (D) Mini-circuits for power amplifiers ZX60-V63+. (E) Coupler mini-circuits ZHDC-16-63-S+. (F) SIGLENT SSA 3032X Spectrum Analyzer. (G) GW INSTEK GPS-3303 Power Supply. (H) Display HOST PC-MATLAB R2024a.
Figure 6. Photo of the experimental testbed. Equipment pertinent to the setup: (A) Altera Cyclone V FPGA SoC-Kit. (B) AD9361 RF Agile Transceiver operating at a center frequency of 2.45 GHz. (C) Mini-circuits ZFBP-2400-S+ bandpass filter. (D) Mini-circuits for power amplifiers ZX60-V63+. (E) Coupler mini-circuits ZHDC-16-63-S+. (F) SIGLENT SSA 3032X Spectrum Analyzer. (G) GW INSTEK GPS-3303 Power Supply. (H) Display HOST PC-MATLAB R2024a.
Entropy 26 00787 g006
Figure 7. A 128-QAM with a power amplifier using a scale factor of 0.05.
Figure 7. A 128-QAM with a power amplifier using a scale factor of 0.05.
Entropy 26 00787 g007
Figure 8. An ECG signal decrypted under a 128-QAM scheme.
Figure 8. An ECG signal decrypted under a 128-QAM scheme.
Entropy 26 00787 g008
Figure 9. ECG signal encrypted under the 128-QAM modulation scheme.
Figure 9. ECG signal encrypted under the 128-QAM modulation scheme.
Entropy 26 00787 g009
Figure 10. ECG signal with tachycardia encrypted under the 128-QAM modulation scheme.
Figure 10. ECG signal with tachycardia encrypted under the 128-QAM modulation scheme.
Entropy 26 00787 g010
Figure 11. 128-QAM constellation of an encrypted ECG signal.
Figure 11. 128-QAM constellation of an encrypted ECG signal.
Entropy 26 00787 g011
Figure 12. Cross-correlation of ideal received signal and transmitted–received ECG signal.
Figure 12. Cross-correlation of ideal received signal and transmitted–received ECG signal.
Entropy 26 00787 g012
Figure 13. Discrete Fourier transform of transmitted and received ECG signal.
Figure 13. Discrete Fourier transform of transmitted and received ECG signal.
Entropy 26 00787 g013
Figure 14. Histogram of transmitted and received ECG signal.
Figure 14. Histogram of transmitted and received ECG signal.
Entropy 26 00787 g014
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cárdenas-Valdez, J.R.; Ramírez-Villalobos, R.; Ramirez-Ubieta, C.; Inzunza-Gonzalez, E. Enhancing Security of Telemedicine Data: A Multi-Scroll Chaotic System for ECG Signal Encryption and RF Transmission. Entropy 2024, 26, 787. https://doi.org/10.3390/e26090787

AMA Style

Cárdenas-Valdez JR, Ramírez-Villalobos R, Ramirez-Ubieta C, Inzunza-Gonzalez E. Enhancing Security of Telemedicine Data: A Multi-Scroll Chaotic System for ECG Signal Encryption and RF Transmission. Entropy. 2024; 26(9):787. https://doi.org/10.3390/e26090787

Chicago/Turabian Style

Cárdenas-Valdez, José Ricardo, Ramón Ramírez-Villalobos, Catherine Ramirez-Ubieta, and Everardo Inzunza-Gonzalez. 2024. "Enhancing Security of Telemedicine Data: A Multi-Scroll Chaotic System for ECG Signal Encryption and RF Transmission" Entropy 26, no. 9: 787. https://doi.org/10.3390/e26090787

APA Style

Cárdenas-Valdez, J. R., Ramírez-Villalobos, R., Ramirez-Ubieta, C., & Inzunza-Gonzalez, E. (2024). Enhancing Security of Telemedicine Data: A Multi-Scroll Chaotic System for ECG Signal Encryption and RF Transmission. Entropy, 26(9), 787. https://doi.org/10.3390/e26090787

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop