{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:01:13Z","timestamp":1747224073371,"version":"3.40.5"},"reference-count":37,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p>Secured transmission of electrophysiological signals is one of the crucial requirements in telemedicine, telemonitoring, cardiovascular disease diagnosis (CVD) and telecardiology applications. The chaotic systems have good potential in secured transmission of ECG\/EEG signals due to their inherent characteristics relevant to cryptography. This article introduces a new cryptosystem for clinical signals such as electrocardiograms (ECG) and electroencephalograms (EEG) based on hyperchaotic DNA confusion and diffusion transform (HC-DNA-CDT). The algorithm uses a hyperchaotic system with cubic nonlinearity and deoxyribonucleic acid (DNA) encoding rules. The performance of the cryptosystem is evaluated for different clinical signals using different encryption\/decryption quality metrics. Simulation and comparison results show that the cryptosystem yield good encryption results and is able to resist various cryptographic attacks. The proposed algorithm can also be used in picture archiving and communication systems (PACS) to provide an efficient sharing of medical image over the networks.<\/jats:p>","DOI":"10.4018\/ijdcf.2019070103","type":"journal-article","created":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T12:56:26Z","timestamp":1556024186000},"page":"43-64","source":"Crossref","is-referenced-by-count":4,"title":["Secured Transmission of Clinical Signals Using Hyperchaotic DNA Confusion and Diffusion Transform"],"prefix":"10.4018","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6793-1182","authenticated-orcid":true,"given":"S. J.","family":"Sheela","sequence":"first","affiliation":[{"name":"Siddaganga Institute of Technology, Tumakuru, India"}]},{"given":"K. V.","family":"Suresh","sequence":"additional","affiliation":[{"name":"Siddaganga Institute of Technology, Tumakuru, India"}]},{"given":"Deepaknath","family":"Tandur","sequence":"additional","affiliation":[{"name":"ABB, Bengaluru, India"}]}],"member":"2432","reference":[{"key":"IJDCF.2019070103-0","first-page":"191","article-title":"Health insurance portability and accountability act of 1996.","volume":"104","author":"A.Act","year":"1996","journal-title":"Public Law"},{"key":"IJDCF.2019070103-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.09.006"},{"key":"IJDCF.2019070103-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.06.032"},{"key":"IJDCF.2019070103-3","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-006-7405-0"},{"key":"IJDCF.2019070103-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2009.02.030"},{"key":"IJDCF.2019070103-5","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"IJDCF.2019070103-6","doi-asserted-by":"publisher","DOI":"10.1016\/S0303-2647(00)00091-5"},{"key":"IJDCF.2019070103-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.11.018"},{"key":"IJDCF.2019070103-8","doi-asserted-by":"publisher","DOI":"10.1109\/7384.963463"},{"key":"IJDCF.2019070103-9","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0414-0"},{"key":"IJDCF.2019070103-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.03.019"},{"key":"IJDCF.2019070103-11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2691-5"},{"key":"IJDCF.2019070103-12","doi-asserted-by":"publisher","DOI":"10.1142\/S021812740401151X"},{"key":"IJDCF.2019070103-13","unstructured":"Moody, G. B., & Mark, R. G. (2006), Physiobank: Physiologic Signal Archives for Biomedical Research. Retrieved from http:\/\/physionet.org\/physiobank\/"},{"key":"IJDCF.2019070103-14","doi-asserted-by":"publisher","DOI":"10.1007\/s10772-011-9103-7"},{"key":"IJDCF.2019070103-15","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0698-3"},{"key":"IJDCF.2019070103-16","article-title":"Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database.","author":"Y.Niu","year":"2017","journal-title":"Computational Intelligence and Neuroscience"},{"key":"IJDCF.2019070103-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.02.021"},{"key":"IJDCF.2019070103-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.12.048"},{"key":"IJDCF.2019070103-19","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0433-5"},{"journal-title":"Applied cryptography: protocols, algorithms, and source code in C","year":"2007","author":"B.Schneier","key":"IJDCF.2019070103-20"},{"key":"IJDCF.2019070103-21","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"IJDCF.2019070103-22","doi-asserted-by":"crossref","unstructured":"Sheela, S. J., Suresh, K. V., & Tandur, D. (2017), A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding. Journal of Computer Networks and Communications","DOI":"10.1155\/2017\/2721910"},{"key":"IJDCF.2019070103-23","doi-asserted-by":"publisher","DOI":"10.1002\/sec.226"},{"key":"IJDCF.2019070103-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.06.018"},{"key":"IJDCF.2019070103-25","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-010-9821-4"},{"key":"IJDCF.2019070103-26","doi-asserted-by":"publisher","DOI":"10.1038\/171737a0"},{"key":"IJDCF.2019070103-27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.08.017"},{"key":"IJDCF.2019070103-28","unstructured":"World Health Organization. (1998). A Health Telematics Policy in Support of WHO'S Health-For-All Strategy for Global Development."},{"key":"IJDCF.2019070103-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.10.002"},{"key":"IJDCF.2019070103-30","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/23\/3\/030503"},{"key":"IJDCF.2019070103-31","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.09.007"},{"key":"IJDCF.2019070103-32","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0409-z"},{"key":"IJDCF.2019070103-33","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3454-7"},{"key":"IJDCF.2019070103-34","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2010.06.005"},{"key":"IJDCF.2019070103-35","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2010.1170"},{"key":"IJDCF.2019070103-36","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2009.02.011"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=227639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T21:56:00Z","timestamp":1651787760000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2019070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":37,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2019070103","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"type":"print","value":"1941-6210"},{"type":"electronic","value":"1941-6229"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}