Next Article in Journal
Cloud Storage Service Architecture Providing the Eventually Consistent Totally Ordered Commit History of Distributed Key-Value Stores for Data Consistency Verification
Next Article in Special Issue
Human Action Recognition of Spatiotemporal Parameters for Skeleton Sequences Using MTLN Feature Learning Framework
Previous Article in Journal
Thyristor Aging-State-Evaluation Method Based on State Information and Tensor Domain Theory
Previous Article in Special Issue
Arm Swing Asymmetry Measurement from 2D Gait Videos
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia

1
College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia
2
RIADI Laboratory, National School of Computer Science, University of Manouba, Manouba 2010, Tunisia
3
Centre for Intelligent Healthcare, Coventry University, Coventry CV1 5FB, UK
4
School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK
5
Department of Computer Science, Saba’a Region University, Mareb, Yemen
6
School of Computing and Digital Technology, Birmingham City University, Birmingham B4 7XG, UK
*
Author to whom correspondence should be addressed.
Submission received: 22 October 2021 / Revised: 30 October 2021 / Accepted: 3 November 2021 / Published: 5 November 2021

Abstract

:
The Kingdom of Saudi Arabia has suffered from COVID-19 disease as part of the global pandemic due to severe acute respiratory syndrome coronavirus 2. The economy of Saudi Arabia also suffered a heavy impact. Several measures were taken to help mitigate its impact and stimulate the economy. In this context, we present a safe and secure WiFi-sensing-based COVID-19 monitoring system exploiting commercially available low-cost wireless devices that can be deployed in different indoor settings within Saudi Arabia. We extracted different activities of daily living and respiratory rates from ubiquitous WiFi signals in terms of channel state information (CSI) and secured them from unauthorized access through permutation and diffusion with multiple substitution boxes using chaos theory. The experiments were performed on healthy participants. We used the variances of the amplitude information of the CSI data and evaluated their security using several security parameters such as the correlation coefficient, mean-squared error (MSE), peak-signal-to-noise ratio (PSNR), entropy, number of pixel change rate (NPCR), and unified average change intensity (UACI). These security metrics, for example, lower correlation and higher entropy, indicate stronger security of the proposed encryption method. Moreover, the NPCR and UACI values were higher than 99% and 30, respectively, which also confirmed the security strength of the encrypted information.

1. Introduction

The COVID-19 pandemic has spread significantly in the past year and has infected more than 118 million people globally since its inception. These numbers are rising exponentially around the world [1,2]. COVID-19 has caused more damage, while having a lower fatality rate when compared to previous diseases, namely “severe acute respiratory syndrome (SARS) and Middle East respiratory syndrome (MERS)” [3]. COVID-19 disease is essentially transmitted through respiratory and contact routes when someone is in proximity [4]. Airborne transmissions are also one of the largest sources, occurring in healthcare sectors, where support treatments or procedures are conducted in close contact. This can also occur when numerous people share the same room for long periods of time.
The Kingdom of Saudi Arabia’s government has taken massive precautionary measures, such as timely interventions, travel restrictions, and closing cinemas, indoor entertainment centers, indoor restaurants and cafes, gyms, and sports centers. These measures have seen preliminary effects in reducing the spread of this pandemic. As of 3 March 2021, the COVID-19 pandemic has caused more than 381,700 cases and 6550 deaths. According to [5], a survey was conducted on a total of 844 healthcare workers. Three-fourths of the respondents revealed that they are at risk of contracting COVID-19 at work. Of the respondents, 69.1% revealed they would feel threatened if a colleague contracted COVID-19, 69.9% of them that they would have to care for patients infected with COVID-19, while 27.7% that they feel unsafe at work using the standard precautions available.
In hospital and laboratory settings, reverse-transcription polymerase chain reaction (RT-PCR) is the gold standard technique to detect COVID-19 infection [6]. However, this method presents a high false detection rate, and its unavailability on a large scale might slow down the tracking of potential COVID-19 patients. Another method called thoracic computed tomography (CT) is comparatively easy to operate to deliver the diagnosis of potential patients. For instance, the majority of COVID-19 patients have a traditional radiographic imprint on their lungs when a CT scan is performed. Thus, the lung CT is a widely used method to clinically diagnose the disease [7]. We must consider the demand for high-throughput screening for examining the chest using computed tomography and the amount of work that has been done by radiologists, especially the COVID-19 patients in a hospital environment.
In order to avoid contact with potential COVID-19 patients, noncontact and noninvasive monitoring of vital signs such as the respiratory rate is of utmost importance. Noncontact offers seamless monitoring of patients by altering daily routine activities [8]. Recently, noncontact techniques such as radio frequency (RF) that exploit ubiquitous WiFi have shown the ability to monitor the daily routine activities of COVID-19 patients and their respiratory rate [9]. In addition, the existing WiFi network system accesses control methods, essentially using a static password, and the media access control address is prone to attacks by malicious users. Such attackers can gain access to WiFi signals and monitor the respiratory rate of a particular COVID-19 patient and raise a false alarm [10]. The primary reason the proposed noncontact wireless sensing system exploits low-cost ubiquitous wireless devices is that it leverages the existing WiFi signals available almost everywhere, for instance in homes, care-homes, hospitals, hotels, and so on. The system does not need any contact with the person and monitors various COVID-19 symptoms, specifically the breathing rate, by exploiting the change in the wireless medium using the variances of the amplitude information. This system can also exploit the small receiving antenna present in a mobile phone. When the mobile phone is connected to a WiFi router, the system would be able to collect breathing information using the mobile phone as well. Hence, the proposed method can help mitigate the ongoing spread of COVID–19 and can continuously and seamlessly monitor the specific patients. In the literature [11,12,13,14,15,16], COVID-19 monitoring/prediction methods are available; however, these methods [11,12,13,14,15,16,17] are mainly focused on classification without any encryption. The method outlined in [11,12,13,14,15,16] mainly uses AI- and ML-based techniques. A number of ML techniques are used for other applications, and details can be found in [18,19]. Our proposed method uses a noninvasive detection of COVID-19 along with the patients’ privacy using the CSI. Moreover, in this work, images were secured through a lightweight chaos-based encryption method.
In this paper, we present a noncontact safe and secure WiFi sensing-based COVID-19 patient monitoring technique using low-cost ubiquitous small wireless devices such as commercially available WiFi routers, network interface cards, and traditional dipole antennas. We monitored the activities of daily living along with the respiratory rate. This system exploits RF signals by examining the variances in the amplitude information of the channel state information (CSI). Specifically, to preserve privacy, we present a novel algorithm. We used one transmitter antenna and one receiving antenna to continuously record the CSI data from a WiFi router for monitoring purposes. The main contributions of this paper are as follows:
  • We present a novel noncontact safe and secure channel state information-based WiFi sensing system for monitoring the activities of daily living (ADLs) and the respiratory rate of COVID-19 patients. This system does not need a dedicated device and exploits radio frequency signals available almost everywhere;
  • This system can efficiently monitor large-scale body movements along with tiny chest movements. It primarily exploits various parameters extracted from WiFi signals, such as the variances of the amplitude and phase information, time–frequency spectrograms, and 3D signatures containing time–frequency–amplitude information;
  • WiFi technology is highly susceptible to being accessed by unwanted users; therefore, we propose a novel privacy-preserving algorithm for securing the CSI data containing vital signatures such as ADLs and respiratory rates to counter the false alarms generated. Every now and then, unauthorized users can gain access to the WiFi signal, generating a false alert to the caregiver or nurse;
  • In this work, we encrypted spectrograms with lightweight chaos-based maps. The security of the proposed scheme was tested and proven against a number of security parameters.
One of the natural questions that arises is why researchers are deploying chaos in image encryption schemes. The behavior of chaotic signals is highly unpredictable and random-like, which can be used in the design of cryptographic algorithms [20,21,22]. Inherently, chaos exhibits complex properties in a very simple mathematical formula. That is one of major reasons why many cryptographic designers prefer chaos instead of complex formulae with complex properties [23].

2. Related Works

Several studies have used sensor systems for identifying and detecting respiratory disorders. Noncontact sensing of body movements has attracted great attention from researchers, especially noninvasive techniques for measuring vital signatures such as the respiratory and heart rates. Wireless techniques constitute an efficient technique for detecting physiological signs and movements [24,25,26,27,28]. For instance, Dou and Huan [29] suggested a breathing sensing system based on the Doppler spectral energy extracted from the CSI to monitor the chest displacement induced by respiration. The authors proposed two phases: fitting to obtain the CSI with the Doppler shift and decomposition to obtain the channel impulse response. Moreover, they conducted a time–frequency analysis to accumulate the Doppler spectral energy. Khan et al. [30] conducted a systematic review of noncontact sensing related to COVID-19. The main idea was to suggest a solution for the early diagnosis of this disease based on common early symptoms such as coughing and shortness of breath. The authors identified existing methods for noncontact health monitoring and presented several steps discussed in noncontact sensing platforms such as data collection, data processing, feature extraction, and classification algorithms. Costanzo [31] developed a software-defined radar based on Doppler elaboration features to measure the noncontact monitoring of human respiration signals. The author proposed to monitor low-frequency oscillations typical of human breath using compact, low-cost, and flexible radar solutions. Van et al. [32] developed a continuous wave radar sensor system for self-identifying of respiratory disorders. Their proposed system was developed based on neural networks that can identify if a patient has a low, normal, or high breathing rate. Besides, the model has been improved to detect the patients who are suffering from breathing disorders. Sharma et al. [33] used a wearable radio frequency (RF) sensor as a noninvasive method for monitoring respiration dynamics. The method was used to estimate the breathing rate and lung volume. The obtained respiratory parameters were compared with the traditional chest belts’ data for different simulated respiratory cases, which included fast and slow, shallow breathing. Kristiani et al. [34] designed a monitor for respiration and heart rates. The proposed device used a flex sensor to detect the respiration rate. The findings of these sensors were published to the Internet using the IoT based on the ThingSpeak application. Khan et al. [35] provided a solution to remotely monitoring vital signs such as breathing related to COVID-19 patients. The authors used software-defined radio (SDR) technology and artificial intelligence. The fine-grained wireless channel state information was extracted using the channel frequency response and multicarrier orthogonal frequency division multiplexing technique. The validation was conducted using a simulation of the channels to provide a better understanding of the channel frequency response. The technique used in Khan et al.’s paper allows sensing human body movements to diagnose breathing abnormalities in a noncontact manner.
In this paper, the core idea is to detect the lung functionality of patients with COVID-19 based on detecting abnormal breathing rates due to lung disorders. As mentioned above, numerous noninvasive applications of sensors and WiFi-signal-based human activity recognition systems have been proposed, as this provides a low-cost and device-free solution. The main feature of these systems is to analyze the change in received signal characteristics by the nearby WiFi systems, which can provide information about human activity. However, the received signal is greatly affected by multipath propagation and is highly susceptible to noise. Furthermore, the security protocol used to protect the vast majority of WiFi networks can be easily broken, potentially exposing the wireless connection to malicious eavesdroppers and attacks. Patients’ data are an attractive target for cybercrime for two fundamental reasons: they are a rich source of valuable data, and their defenses are weak.
To summarize, there is a need for noncontact, safe, and secure WiFi sensing to monitor the ADLs and respiratory rate of COVID-19 patients using low-cost small wireless devices.

3. WiFi Sensing System Model

The noncontact wireless sensing techniques can be divided into two large categories, the received signal strength indicator (RSII) and channel state information. These two methods can be applied to a large number of applications including cardiac activity monitoring, breathing rate detection, fall detection, and so on. The RSSI measurements only deliver the averaged-out radio frequency signal power level and are extremely inconsistent and inadequate for monitoring the activities of daily living and respiratory rate of COVID-19 patients [36]. The research work in [37] demonstrated the activities of daily living of an individual leveraging RSSI measurements using a smartphone sensor and evaluated the performance in terms of percentage accuracy. On the contrary, the channel state information obtained using small wireless devices, such as a WiFi router and network interface card, presented a granular resolution using 30 subcarriers.
The single subcarrier was used to extract breathing information. All of the 30 subcarriers presented nearly similar information, and that is why one subcarrier was used for analysis purposes.
WiFi sensing essentially exploits the received signal strength (amplitude information) indicators and channel state information (amplitude and phase information), which can be used in a large number of applications, specifically for detecting the activities of daily living and tiny chest and cardiac movements with varying frequencies. The RSSI data are the averaged-out signal received by a commercial network interface card, while the CSI data describe the overarching physical wireless medium in terms of various frequency channels [8,38]. The RSSI data are highly susceptible to random noise and unstable each time the data are received. The WiFi sensing-based CSI data are highly stable in the presence of external noise.
Assume that any RF signal transmitted by a WiFi router can be mathematically expressed as: x ( t ) = e j 2 π f ¯ t . The signal received by a network interface card at the received side can be written as follows:
y ( t ) = i = 1 L α i ( f ¯ , t ) e j 2 π f ¯ t τ i ( f ¯ , t )
Here, L is the total number of paths, including line-of-sight (LOS) propagation and non-line-of-sight (NLOS) propagation. Here, α i ( f ¯ , t ) and τ i ( f ¯ , t ) indicate the attenuation caused due to multipath propagation and delay caused at time internal t as the RF signal travels from the WiFi router to the receiving antenna through path i, respectively. Considering α i ( f ¯ , t ) and τ i ( f ¯ , t ) do not rely on operating frequency f ¯ , by applying the superposition theorem on the RF signal received through the LOS and NLOS, any input RF signal will induce the following output signal:
y ( t ) = i = 1 L α i ( t ) x t τ i ( t )
The above superposition assumption is adequate as the WiFi frequency bandwidth is narrow when compared to its operating frequency (i.e., 2.45 GHz). To simplify the notation, eliminate the term t found in α i and τ i . The channel impulse response (time domain representation) of the physical wireless medium can be extracted from Equation (2) as follows:
h ( t ) = i = 1 L α i δ t τ i
While its frequency response or channel state information can be mathematically expressed as:
H ( f ¯ ) = i = 1 L α i e j 2 π f ¯ τ i
The Intel 5300 network interface card used for data collection embedded within a computer collects a group of 30 frequency subcarriers that essentially measure the channel state information [39], which can be extracted from Equation (3) as:
H f , k = i = 1 L α i e j 2 π f + f c τ i
Here, H indicates the matrix comprising raw CSI data (amplitude and phase information), f is the baseband frequency of different frequency subcarriers, k is the total number of subcarriers (30 in this case), and fc is the central frequency (2.45 GHz). When we record CSI data using the commercial Intel 5300 network interface card, there are numerous challenges presented by the device. First and foremost are the latency and time taken when a single CSI packet is received [40]. The CSI can be measured through received RF signal energy or increasing the sliding window by setting the receiving data. Irrespective of the method adopted, each time the WiFi router is connected to the network interface card, a random packet delay is experienced, which is induced due to the baseband frequency channels that bring random noise into the CSI data. The second reason is the phase difference between the transmitted and received signal. This particular phase difference is produced when the WiFi router is switched on and an initial random noise is transmitted along with an actual data signal. The noise is then picked up into the CSI data at the receiving side. The CSI data obtained by the network interface card can be mathematically expressed as:
H f , k = e j 2 π f τ p d d + τ p l l + f c f o t k i = 1 L α i e j 2 π f + f c τ i + N
Here, τ p d d represents the offset or error generated, the volume of which is higher than the actual value of τ i , τ p l l is caused by the random noise in a wireless medium, f cfo indicates the value of residual CFO , t k , expressing the time taken from transmission to reception, and N is the ( AWGN ) . We used Equation (6) to extract the CSI data for different activities’ recognition and the breathing rate of COVID-19 patients.

4. WiFi Sensing-Based CSI Data for ADLs and Respiratory Rate

This section focuses on the CSI data obtained for various human activities such as walking at a normal pace, walking while carrying an object, sitting down in a chair, standing up from a chair, lying on a bed, and measuring the respiratory rate. We collected the data using WiFi sensing at Xidian University China, involving healthy participants. The data were previously collected for a range of applications; however, due to the ongoing pandemic, we argue that this system is applicable for monitoring COVID-19 patients since no device needs to interact with the sensing system. The data acquisition was performed in an indoor environment, generating time–frequency signatures [41,42] against each activity and respiratory rate and data analysis, and securing it using the chaos-based method, as given in Figure 1.
The raw variations of the amplitude information of the CSI data for different activities of daily living are presented in Figure 2.
Figure 3 shows the time history of all activities for 30 subcarriers when amplitude CSI is considered in terms of the power level (dB). The 3D waveform in Figure 3 indicates the variances of amplitude information against the total number of subcarriers and time history. It can be seen that each body movement produced a unique CSI signature, which distinguishes each activity. We can further analyze single or multiple subcarriers against time to examine individual activity and transition from one ADL to another. The respiratory rate obtained using WiFi sensing is shown in Figure 4. A wearable breathing sensor was put on the subject’s body, and data were recorded when the person was within WiFi range. Simultaneously, data were also recorded using a network interface card. A sample of data collected using WiFi sensing is shown in Figure 4a,c,d, and it was compared with the one obtained using the wearable sensor, as in Figure 4b. The data in Figure 4a are the raw variance of the amplitude CSI extracted directly from commodity devices with an applied filter or removing random noise. Figure 4c is the phase information of the CSI data for a person’s respiratory rate, while Figure 4d is the final respiratory rate obtained after applying a filtering process using the parameters discussed above. There was a close synergy between the respiratory rate obtained using a wearable sensor with that of the WiFi.

5. Extracting the Time–Frequency Spectrogram from WiFi Signals

In order to reliably and accurately extract the human activities and respiratory rates of COVID-19 patients, we applied time–frequency spectrograms using the short-time Fourier transform (STFT) [43] to images to encrypt the important data of particular patients. We used CWT to extract the scalograms, as it presents granular information as compared to the STFT. This method brings together advanced signal processing algorithms and spectrograms to obtain signal components for activity recognition and respiratory rate monitoring. Figure 5 shows the system architecture of using the channel state information for monitoring COVID-19 patients.
The WiFi sensing-based channel state information comprises four main steps: (a) extracting raw variances of amplitude information, (b) eliminating the outliers using the Hampel algorithm, applying a bandpass filter having a cutoff frequency from 0.2 GHz to 0.4 GHz to remove random noises recorded through a commodity device, (c) applying principal component analysis (PCA) to obtain different activities of daily living and the corresponding respiratory rate, (d) estimating the abnormal respiratory rate both in the time domain and the frequency domain as experienced by the COVID-19 patients. The 3D waveform in Figure 3 indicates the variances of the amplitude information against the total number of subcarriers and time history.
CSI signal processing consists of the following steps: (1) obtaining the CSI signal magnitude; (2) removing outliers by the Hampel identifier (Liu, Cao, Tang, Wen, and Wi-sleep, 2014) and using a bandpass filter with cutoff frequencies of 0.2 Hz and 0.4 Hz to suppress the noises; (3) exploiting PCA to obtain the breathing rate frequency contribution, then using a short-time Fourier transform to obtain the time–frequency spectrogram to extract the instantaneous frequency of the respiration rate (RR); (4) estimating the abnormal respiratory rate contributions in both the time and frequency domains to monitor the COVID-19 patients.
The proposed system works as follows, as indicated in Figure 5: The first step is to collect data using WiFi sensing; the raw data are then processed using advanced signal processing algorithm, and random noise is remove, such as external noise and outliers. Using principle component analysis, initially, large-scale body movements such as the activities of daily living are extracted to examine the physical activities of a monitored COVID-19 patient. Then using the STFT, the respiratory rate is extracted for detection purposes.
The initial stage of channel state information raw data processing is to eliminate the interference that occurs due to noise. Different activities and a sudden change in respiratory rate can be experienced by COVID-19 patients due to an external movement such as an operational ceiling fan. We applied the Hampel filtering algorithm to mitigate the impact of a sudden change in amplitude information. The outlier noise is then replaced by the average value of neighboring values, before and after the eliminated value. The Hampel filter algorithm also has the potential to eliminate the invalid or empty channel state information packets retrieved by the network interface card. After completing the elimination of noisy signals from raw CSI data, the bandpass filter is also used to only pass on the values of signals that are required to extract a particular respiratory rate. The COVID-19 patient respiratory rate is essentially the subtle chest movement from which the application of a bandpass filter can efficiently and reliably remove high-frequency noise from CSI data. We used a bandpass filter in the frequency range of 0.2 Hz to 0.4 Hz, which is the traditional frequency range of the human breathing rate.
As mentioned earlier, the raw channel state information carries multiple frequency subcarriers (30 in this case), and human activities can be found at a lower frequency range since these are large-scale body movements. However, due to the high-low wavelength of higher frequencies, the range resolution also increases; hence, the high dimensions of CSI matrices carry the breathing rate of COVID-19 patients. To extract the breathing rate, we used PCA methods, which are essentially the space projection of the data. In this context, the expression used for human activities’ recognition and the respiratory rate of subjects can be written as f(t), which is defined as summing up all values of RF signal oscillations.
f ( t ) = k = 1 K α k ( t ) s k 2 π N k φ k ( t ) + σ ( t ) r ( t )
Here, the value of α k ( t ) indicates the variation in amplitude CSI in terms of power level in dB, N k φ k ( t ) is the random phase offset of the CSI data derived from the intermediate frequency value (IF), which is mathematically expressed as s k ( t ) 1 k K and shows 2 π as the periodic RF signal having a zero mean function along unity function as in L 2 ( [ 0 , 2 π ] ) , σ shows the slow moving average value of the smooth function, while r ( t ) is the external noise picked up by the low-cost network interface card.
In order to remove the intermediate frequency values from COVID-19 patients using time–frequency analysis, we used the STFT on raw amplitude information of the CSI data against time history. The STFT along with its parameters used in this work can be mathematically expressed as follows [44,45]:
V f ( h ) ( t , ξ ) = f ( τ ) h ( τ t ) e i 2 π ξ ( τ t ) d τ
In Equation (8), the value of h is the time window function of the CSI data obtained using WiFi sensing and t denotes the total time taken to record the data over a period of time. The value ξ describes the operating frequency (i.e., 2.45 GHz). This equation expresses that the moving time window and STFT, when applied on the CSI data considering the amplitude information, give us the spectrograms that are expressed in terms of time vs. frequency, as shown in Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10. These figures indicate when a person was walking back and forth within WiFi range in an indoor environment.

6. Encrypted-WiFi-Based Time–Frequency Spectrograms

The spectrogram shown in Figure 6, Figure 7, Figure 8 and Figure 9 contains sensitive personal information, and an attacker could possibly hack this information and send false alarms. In this section, an encryption scheme is presented to a secure spectrogram obtained from WiFi data. The proposed encryption scheme contains both confusion and diffusion steps. A general mathematical notation is written as:
C = α ψ ( β ω ( I , K τ ) , K σ ) ,
where C and I are ciphertext and plaintext images, α and β are functions of the confusion and diffusion processes, K τ and K σ are the confusion and diffusion secret keys, and ψ and ω show the number of rounds for confusion and diffusion in total encryption, respectively. In the literature, one-dimensional maps such as logistic, tent, and sine maps have been applied in confusion and diffusion processes to obtain a ciphertext image. Mathematically, a logistic map is written as [46]:
x n + 1 = f 1 ( x n , r ) = μ x n ( 1 x n ) ,
where x 0 ( 0 , 1 ) and μ ( 0 , 4 ) are the initial conditions. A tent map is written as:
y n + 1 = f 2 ( y n , λ ) = λ y n 2 , if y n < 0.5 λ ( 1 y n ) 2 , if y n 0.5
where y 0 ( 0 , 1 ) and λ ( 0 , 4 ) are the initial conditions. Mathematically, a sine map is:
z n + 1 = f 3 ( z n , ξ ) = ξ s i n ( π z n ) 4 ,
where z 0 ( 0 , 1 ) and ξ ( 0 , 4 ) are the initial conditions.
However, due to a lower chaotic range and several other disadvantages, one-dimensional maps such as logistic, tent, and sine maps have serious security flaws. For example, the bifurcation diagram of a logistic map shown in Figure 11 highlights that the logistic map has a lower chaotic range of (3.57, 4). Therefore, instead of using a traditional logistic map, hybrid maps were proposed in [47]. In this research, we also used hybrid maps (logistic-tent, logistic-sine, and tent-sine maps) due to the larger key space and initial condition sensitivity. The detailed encryption steps are given below.

6.1. Encryption Steps

This section presents the proposed encryption scheme for a spectrogram. Without loss of generality, consider the size of the spectrogram as M × N . Split the corresponding plaintext spectrogram into red, green, and blue channels. The encryption steps are as follows:
  • Step 1: Apply the Secure Hash Algorithm (SHA 3) on the plaintext channel to obtain hash H.
    H = h 1 , h 2 , h 128 ;
  • Step 2: Convert hash values H into binary bit representation form B;
    B = b 1 , b 2 , b 512 ;
  • Step 3: Generate initial conditions for a logistic-tent map, logistic-sine map, and tent-sine map, respectively. Mathematically, a logistic-tent map is written as:
    q n + 1 = g 1 ( q n , μ ) = ( μ q n ( 1 q n ) + ( 4 μ ) q n 2 ) m o d ( 1 ) , if q n < 0.5 ( μ q n ( 1 q n ) + ( 4 μ ) ( 1 q n ) 2 ) m o d ( 1 ) , if q n 0.5
    where mod is the modulus operation and q 0 ( 0 , 1 ) and μ ( 0 , 4 ) are the initial conditions. Now, calculate q 0 and μ using the binary bits obtained from Step 2.
    q 0 = b 1 × 2 0 + b 2 × 2 1 + + b 48 × 2 47 2 48 .
    μ = b 49 × 2 0 + b 50 × 2 1 + + b 96 × 2 47 2 48 .
The logistic-sine map is written as:
r n + 1 = g 2 ( r n , μ ) = ( μ r n ( 1 r n ) + ( 4 μ ) s i n ( π r n ) 4 ) m o d ( 1 ) ,
where r 0 ( 0 , 1 ) and μ ( 0 , 4 ) are the initial conditions. Calculate initial condition r 0 :
r 0 = b 97 × 2 0 + b 98 × 2 1 + + b 144 × 2 47 2 48 .
The tent-sine map is written as:
s n + 1 = g 3 ( s n , μ ) = ( μ s n 2 + ( 4 μ ) s i n ( π s n ) 4 ) m o d ( 1 ) , if s n < 0.5 ( μ ( 1 s n ) 2 + ( 4 μ ) s i n ( π s n ) 4 ) m o d ( 1 ) , if s n 0.5
where s 0 ( 0 , 1 ) and μ ( 0 , 4 ) are the initial conditions. Calculate s 0 as:
s 0 = b 145 × 2 0 + b 146 × 2 1 + + b 192 × 2 47 2 48 ;
  • Step 4: Iterate a logistic-tent map and logistic-sine map σ + M and σ + N times, respectively, where σ is 30, so that the transient effect is avoided. Save the last M values in Q = [ q 1 , , q 2 , , q M ] and the last N values in R = [ r 1 , , r 2 , , r N ]. Iterate a tent-sine map using σ + N times, and save the last N values in S. Apply a rowwise permutation, columnwise permutation, rowwise circular-shift downward using the P, Q, R, and S row matrices to obtain a permuted image P ϕ . The detailed permutation steps are explained below in the Algorithm 1.
  • Step 5: For diffusion, P ϕ is passed through one of the substitution boxes (S-Boxes) shown in Table 1, Table 2 and Table 3. P ϕ is replaced with a single S-box using an intertwining map. The intertwining map is written as:
    u n + 1 = ( λ × α × v n × ( 1 x n ) + w n ) m o d ( 1 ) , v n + 1 = ( λ × β × v n + w n × 1 1 + ( u n + 1 ) 2 ) m o d ( 1 ) , w n + 1 = ( λ × ( u n + 1 + v n + 1 + γ ) × s i n ( w n ) m o d ( 1 ) .
    where u 0 , v 0 , and w 0 are the initial conditions calculated as:
    u 0 = b 193 × 2 0 + b 2 × 2 1 + + b 240 × 2 47 2 48 .
    v 0 = b 241 × 2 0 + b 2 × 2 1 + + b 288 × 2 47 2 48 .
    w 0 = b 241 × 2 0 + b 2 × 2 1 + + b 288 × 2 47 2 48 .
    0 λ 3.999 , | α | > 33.5 , | β | > 37.9 , and | γ | > 35.7 . Iterate the intertwining map M × N times. Retain the last three values of W for the S-Box selection. Apply the step below:
    Ω = mod(floor( 10 15 × w n , 2).
For Ω = 0 , Ω = 1 , and Ω = 2 , S-Box1, S-Box2, and S-Box3 are selected, respectively. The selected S-Box is applied on P ϕ to obtain P θ ;
  • Step 6: Finally, perform an XOR operation on P θ using the values obtained from V.
    ζ = mod(floor( 10 15 × v n , 256)
    ζ = P θ ζ ;
  • Step 7: Repeat Steps 1 to 6 for each, and then, combine all three channels to obtain the resultant ciphertext C.
Algorithm 1 Permutation steps
Input: Plaintext image P, Q, R, S
Output: Shuffled image P ϕ
% Firstly, sort Q values from low to high
  • S o r t e d Q = Sort(Q)
  • for i = 1 : M do
  •     for  j = 1 : M  do
  •         if  S o r t e d Q ( i ) ==Q(j) then
  •             R a n d r o w ( i ) = j
  •         end if
  •     end for
  • end for
  • %Shuffle corresponding rows using random values obtained in R a n d r o w .
  • P 1 = Sortrows( R a n d r o w , P)
  • % Next, sort R values from low to high
  • S o r t e d R = Sort(R)
  • for i=1:N do
  •     for j=1:N do
  •         if  S o r t e d R ( i ) ==R(j) then
  •             R a n d c o l u m n ( i ) = j
  •         end if
  •     end for
  • end for
  • % Shuffle corresponding columns using random values obtained in R a n d c o l u m n .
  • P2 = Sortrows( R a n d r o w , P 1 )
  • % Finally, use S, floor, multiplication, and the modulo operation to perform circular-shift downward.
  • P 3 = Floor( Q 10 14 )
  • P 4 = Modulus( P 3 , N)
  • % The columns of P 2 are circular-shifted downward P 4 ( i ) times, where i = 1 , 2, …N.
  • P ϕ = circshiftdown ( P ( i ) , P 4 ( i ) )

6.2. Security Analyses

Figure 12 shows the encrypted person walking spectrum using the proposed encryption scheme. Through visual inspection, it is evident that the contents are encrypted and an intruder cannot get any ideas about the original spectrogram. However, a visual inspection alone is not sufficient, and security should be proven through statistical analyses [51]. Figure 13, Figure 14 and Figure 15 show the histograms of the red, green, and blue channels, respectively. It can be seen that these histogram are almost flat, and hence, the encrypted color spectrogram is secure. Furthermore, Table 4, Table 5 and Table 6 show the security of the encrypted spectrogram using a number of security parameters [20,21,52,53,54] for the red, green, and blue channels, respectively. From the security parameters, it is evident that the spectrogram encryption is secure and resistant against many attacks.

7. Conclusions

This paper presented a novel privacy-preserving COVID-19 patient monitoring technique in the context of Saudi Arabia. The use of low-cost wireless devices in conjunction with a novel encryption algorithm, namely chaos-based substitution boxes, made it an end-to-end secure system for continuously monitoring patients. The variances of the amplitude and phase information were used to monitor daily routine activities and detect normal and abnormal breathing rates. A wearable sensor was used as a reference sensor, which indicated strong synergy between wearable and noncontact WiFi sensing. This system can be deployed in any indoor setting where WiFi signals are available, such as in homes, hospitals, care centers, and airports. The proposed encryption scheme can be further strengthened with multichaos maps. In the future, we will change the proposed algorithm with higher-dimensional mapping for a higher key space and higher security. Moreover, the proposed scheme will be tested against ciphertext attack and plaintext attack. The proposed multichaos-based encryption scheme will be compared with other chaos-based algorithms. In addition, we will also deploy this system in actual quarantine, hotel, of hospital environment where actual COVID-19 patients are monitored while in quarantine or being observed. The idea will be to monitor their activities of daily living and examine their respiratory rate to see whether the patients needs a timely intervention. We will also monitor multiple participants in the future, in comparison to a single patient, as in this study. Additionally, in future work, we plan to monitor real COVID-19 patients instead of healthy participants and ask them to mimic different breathing patterns.

Author Contributions

Conceptualization, W.B., S.A.S., J.A., M.D., H.G., A.A., M.A.-S. and F.S.; methodology, W.B., S.A.S., J.A. and M.D.; Software, S.A.S. and J.A.; validation, S.A.S. and J.A.; formal analysis, W.B., S.A.S., J.A. and M.D.; investigation, W.B., M.D., H.G., A.A., M.A.-S. and F.S.; data curation, S.A.S.; writing—original draft, W.B., S.A.S., J.A. and M.D.; writing—review & editing, H.G., A.A., M.A.-S., F.S.; visualization, W.B., S.A.S., J.A., M.D., H.G., A.A., M.A.-S. and F.S.; supervision, W.B., S.A.S. and J.A.; project administration, W.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Deanship of Scientific Research at Taibah University, Saudi Arabia, project number (CSE—3).

Acknowledgments

The authors would like to thank the Deanship of Scientific Research at Taibah University, Saudi Arabia, for funding this research project number (CSE—3).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Taylor, W.; Abbasi, Q.H.; Dashtipour, K.; Ansari, S.; Shah, S.A.; Khalid, A.; Imran, M.A. A Review of the State of the Art in Non-Contact Sensing for COVID-19. Sensors 2020, 20, 5665. [Google Scholar] [CrossRef]
  2. Cao, X. COVID-19: Immunopathology and its implications for therapy. Nat. Rev. Immunol. 2020, 20, 269–270. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Tabik, S.; Gómez-Ríos, A.; Martín-Rodríguez, J.L.; Sevillano-García, I.; Rey-Area, M.; Charte, D.; Guirado, E.; Suárez, J.L.; Luengo, J.; Valero-González, M.A.; et al. COVIDGR Dataset and COVID-SDNet Methodology for Predicting COVID-19 Based on Chest X-Ray Images. IEEE J. Biomed. Health Inform. 2020, 24, 3595–3605. [Google Scholar] [CrossRef]
  4. O’Suilleabhain, P.E.; Matsumoto, J.Y. Time-frequency analysis of tremors. Brain J. Neurol. 1998, 121, 2127–2134. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Abolfotouh, M.A.; Almutairi, A.F.; Ala’a, A.B.; Hussein, M.A. Perception and attitude of healthcare workers in Saudi Arabia with regard to Covid-19 pandemic and potential associated predictors. BMC Infect. Dis. 2020, 20, 1–10. [Google Scholar] [CrossRef]
  6. Dong, D.; Tang, Z.; Wang, S.; Hui, H.; Gong, L.; Lu, Y.; Xue, Z.; Liao, H.; Chen, F.; Yang, F.; et al. The Role of Imaging in the Detection and Management of COVID-19: A Review. IEEE Rev. Biomed. Eng. 2021, 14, 16–29. [Google Scholar] [CrossRef] [PubMed]
  7. Kircher, M.; Elke, G.; Stender, B.; Hernández Mesa, M.; Schuderer, F.; Dössel, O.; Fuld, M.K.; Halaweish, A.F.; Hoffman, E.A.; Weiler, N.; et al. Regional Lung Perfusion Analysis in Experimental ARDS by Electrical Impedance and Computed Tomography. IEEE Trans. Med Imaging 2021, 40, 251–261. [Google Scholar] [CrossRef]
  8. Taylor, W.; Shah, S.A.; Dashtipour, K.; Zahid, A.; Abbasi, Q.H.; Imran, M.A. An intelligent noninvasive real-time human activity recognition system for next-generation healthcare. Sensors 2020, 20, 2653. [Google Scholar] [CrossRef]
  9. Shah, S.A.; Fioranelli, F. RF sensing technologies for assisted daily living in healthcare: A comprehensive review. IEEE Aerosp. Electron. Syst. Mag. 2019, 34, 26–44. [Google Scholar] [CrossRef] [Green Version]
  10. Wang, G.; Zou, Y.; Zhou, Z.; Wu, K.; Ni, L.M. We can hear you with WiFi! IEEE Trans. Mob. Comput. 2016, 15, 2907–2920. [Google Scholar] [CrossRef]
  11. Umair, M.; Khan, M.S.; Ahmed, F.; Baothman, F.; Alqahtani, F.; Alian, M.; Ahmad, J. Detection of COVID-19 Using Transfer Learning and Grad-CAM Visualization on Indigenously Collected X-ray Dataset. Sensors 2021, 21, 5813. [Google Scholar] [CrossRef]
  12. Chowdhury, M.E.; Rahman, T.; Khandakar, A.; Mazhar, R.; Kadir, M.A.; Mahbub, Z.B.; Islam, K.R.; Khan, M.S.; Iqbal, A.; Al Emadi, N.; et al. Can AI help in screening viral and COVID-19 pneumonia? IEEE Access 2020, 8, 132665–132676. [Google Scholar] [CrossRef]
  13. Santosh, K. AI-driven tools for coronavirus outbreak: Need of active learning and cross-population train/test models on multitudinal/multimodal data. J. Med. Syst. 2020, 44, 1–5. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  14. Panwar, H.; Gupta, P.; Siddiqui, M.K.; Morales-Menendez, R.; Singh, V. Application of deep learning for fast detection of COVID-19 in X-Rays using nCOVnet. Chaos Solitons Fractals 2020, 138, 109944. [Google Scholar] [CrossRef] [PubMed]
  15. Fan, D.P.; Zhou, T.; Ji, G.P.; Zhou, Y.; Chen, G.; Fu, H.; Shen, J.; Shao, L. Inf-net: Automatic covid-19 lung infection segmentation from ct images. IEEE Trans. Med. Imaging 2020, 39, 2626–2637. [Google Scholar] [CrossRef] [PubMed]
  16. Wang, X.; Deng, X.; Fu, Q.; Zhou, Q.; Feng, J.; Ma, H.; Liu, W.; Zheng, C. A weakly-supervised framework for COVID-19 classification and lesion localization from chest CT. IEEE Trans. Med. Imaging 2020, 39, 2615–2625. [Google Scholar] [CrossRef]
  17. Atitallah, S.B.; Driss, M.; Boulila, W.; Ghézala, H.B. Randomly Initialized Convolutional Neural Network for the Recognition of COVID-19 using X-ray Images. arxiv 2021, arXiv:2105.08199. [Google Scholar]
  18. Li, H.; Deng, J.; Feng, P.; Pu, C.; Dharshana Arachchige, D.; Cheng, Q. Short-term Nacelle Orientation Forecasting using Bilinear Transformation and ICEEMDAN Framework. Front. Energy Res. 2021, 697. [Google Scholar] [CrossRef]
  19. Aggarwal, A.; Alshehri, M.; Kumar, M.; Alfarraj, O.; Sharma, P.; Pardasani, K.R. Landslide data analysis using various time-series forecasting models. Comput. Electr. Eng. 2020, 88, 106858. [Google Scholar] [CrossRef]
  20. Qayyum, A.; Ahmad, J.; Boulila, W.; Rubaiee, S.; Masood, F.; Khan, F.; Buchanan, W.J. Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access 2020, 8, 140876–140895. [Google Scholar] [CrossRef]
  21. Masood, F.; Boulila, W.; Ahmad, J.; Sankar, S.; Rubaiee, S.; Buchanan, W.J. A novel privacy approach of digital aerial images based on mersenne twister method with DNA genetic encoding and chaos. Remote Sens. 2020, 12, 1893. [Google Scholar] [CrossRef]
  22. Abbasi, S.F.; Ahmad, J.; Khan, J.S.; Khan, M.A.; Sheikh, S.A. Visual meaningful encryption scheme using intertwinning logistic map. In Proceedings of the Science and Information Conference, London, UK, 10–12 July 2018; pp. 764–773. [Google Scholar]
  23. Khan, J.S.; Ahmad, J. Chaos based efficient selective image encryption. Multidimens. Syst. Signal Process. 2019, 30, 943–961. [Google Scholar] [CrossRef]
  24. Schade, M.M.; Bauer, C.E.; Murray, B.R.; Gahan, L.; Doheny, E.P.; Kilroy, H.; Zaffaroni, A.; Montgomery-Downs, H.E. Sleep validity of a noncontact bedside movement and respiration-sensing device. J. Clin. Sleep Med. 2019, 15, 1051–1061. [Google Scholar] [CrossRef] [PubMed]
  25. Uysal, C.; Onat, A.; Filik, T. Non-contact respiratory rate estimation in real-time with modified joint unscented Kalman filter. IEEE Access 2020, 8, 99445–99457. [Google Scholar] [CrossRef]
  26. Lin, J.C. Wireless sensing and monitoring of physiological movements and volume changes. In Proceedings of the 2011 XXXth URSI General Assembly and Scientific Symposium, Istanbul, Turkey, 13–20 August 2011; p. 1. [Google Scholar]
  27. Safaei, M.; Ismail, A.S.; Chizari, H.; Driss, M.; Boulila, W.; Asadi, S.; Safaei, M. Standalone noise and anomaly detection in wireless sensor networks: A novel time-series and adaptive Bayesian-network-based approach. Softw. Pract. Exp. 2020, 50, 428–446. [Google Scholar] [CrossRef]
  28. Islam, S.M.M. Radar-Based Non-Contact Physiological Sensing. In Vision, Sensing and Analytics: Integrative Approaches; Springer: Berlin/Heidelberg, Germany, 2021; pp. 177–212. [Google Scholar]
  29. Dou, C.; Huan, H. Full Respiration Rate Monitoring Exploiting Doppler Information with Commodity WiFi Devices. Sensors 2021, 21, 3505. [Google Scholar] [CrossRef] [PubMed]
  30. Khan, M.B.; Zhang, Z.; Li, L.; Zhao, W.; Hababi, M.A.M.A.; Yang, X.; Abbasi, Q.H. A Systematic Review of Non-Contact Sensing for Developing a Platform to Contain COVID-19. Micromachines 2020, 11, 912. [Google Scholar] [CrossRef]
  31. Costanzo, S. Software-defined doppler radar sensor for human breathing detection. Sensors 2019, 19, 3085. [Google Scholar] [CrossRef] [Green Version]
  32. Van, N.T.P.; Tang, L.; Singh, A.; Minh, N.D.; Mukhopadhyay, S.C.; Hasan, S.F. Self-identification respiratory disorder based on continuous wave radar sensor system. IEEE Access 2019, 7, 40019–40026. [Google Scholar] [CrossRef]
  33. Sharma, P.; Hui, X.; Kan, E.C. A wearable RF sensor for monitoring respiratory patterns. In Proceedings of the 2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Berlin, Germany, 23–27 July 2019; pp. 1217–1223. [Google Scholar]
  34. Kristiani, D.G.; Triwiyanto, T.; Nugraha, P.C.; Irianto, B.G.; Titisari, D. The measuring of vital signs using Internet of Things technology (heart rate and respiration). In Proceedings of the 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), Semarang, Indonesia, 21–22 September 2019; pp. 417–422. [Google Scholar]
  35. Khan, M.B.; Rehman, M.; Mustafa, A.; Shah, R.A.; Yang, X. Intelligent Non-Contact Sensing for Connected Health Using Software Defined Radio Technology. Electronics 2021, 10, 1558. [Google Scholar] [CrossRef]
  36. Yoo, J. Change Detection of RSSI Fingerprint Pattern for Indoor Positioning System. IEEE Sens. J. 2020, 20, 2608–2615. [Google Scholar] [CrossRef]
  37. Boussad, Y.; Mahfoudi, M.N.; Legout, A.; Lizzi, L.; Ferrero, F.; Dabbous, W. Evaluating Smartphone Accuracy for RSSI Measurements. IEEE Trans. Instrum. Meas. 2021, 70, 1–12. [Google Scholar] [CrossRef]
  38. Ashleibta, A.M.; Zahid, A.; Shah, S.A.; Abbasi, Q.H.; Imran, M.A. Flexible and scalable software defined radio based testbed for large scale body movement. Electronics 2020, 9, 1354. [Google Scholar] [CrossRef]
  39. Halperin, D.; Hu, W.; Sheth, A.; Wetherall, D. Tool release: Gathering 802.11 n traces with channel state information. ACM SIGCOMM Comput. Commun. Rev. 2011, 41, 53. [Google Scholar] [CrossRef]
  40. Rastegardoost, N.; Jabbari, B. Minimizing WiFi latency with unlicensed LTE opportunistic white-space utilization. IEEE Trans. Wirel. Commun. 2019, 18, 1914–1926. [Google Scholar] [CrossRef]
  41. Fioranelli, F.; Le Kernec, J.; Shah, S.A. Radar for health care: Recognizing human activities and monitoring vital signs. IEEE Potentials 2019, 38, 16–23. [Google Scholar] [CrossRef] [Green Version]
  42. Tzallas, A.T.; Tsipouras, M.G.; Fotiadis, D.I. Epileptic seizure detection in EEGs using time–frequency analysis. IEEE Trans. Inf. Technol. Biomed. 2009, 13, 703–710. [Google Scholar] [CrossRef] [PubMed]
  43. Zhu, W.; Li, X.; Liu, C.; Xue, F.; Han, Y. An STFT-LSTM System for P-Wave Identification. IEEE Geosci. Remote Sens. Lett. 2020, 17, 519–523. [Google Scholar] [CrossRef]
  44. Huang, J.; Chen, B.; Yao, B.; He, W. ECG Arrhythmia Classification Using STFT-Based Spectrogram and Convolutional Neural Network. IEEE Access 2019, 7, 92871–92880. [Google Scholar] [CrossRef]
  45. Chikkerur, S.; Govindaraju, V.; Cartwright, A.N. Fingerprint image enhancement using STFT analysis. In Proceedings of the International Conference on Pattern Recognition and Image Analysis, Bath, UK, 22–25 August 2005; pp. 20–29. [Google Scholar]
  46. Dridi, F.; El Assad, S.; El Hadj Youssef, W.; Machhout, M.; Lozi, R. The Design and FPGA-Based Implementation of a Stream Cipher Based on a Secure Chaotic Generator. Appl. Sci. 2021, 11, 625. [Google Scholar] [CrossRef]
  47. Zhou, Y.; Bao, L.; Chen, C.P. A new 1D chaotic system for image encryption. Signal Process. 2014, 97, 172–182. [Google Scholar] [CrossRef]
  48. Siddiqui, N.; Naseer, A.; Ehatisham-ul Haq, M. A novel scheme of substitution-box design based on modified Pascal’s triangle and elliptic curve. Wirel. Pers. Commun. 2021, 116, 3015–3030. [Google Scholar] [CrossRef]
  49. Alshammari, B.M.; Guesmi, R.; Guesmi, T.; Alsaif, H.; Alzamil, A. Implementing a Symmetric Lightweight Cryptosystem in Highly Constrained IoT Devices by Using a Chaotic S-Box. Symmetry 2021, 13, 129. [Google Scholar] [CrossRef]
  50. Ahmed, H.A.; Zolkipli, M.F.; Ahmad, M. A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput. Appl. 2019, 31, 7201–7210. [Google Scholar] [CrossRef]
  51. Li, Z.; Peng, C.; Tan, W.; Li, L. An efficient plaintext-related chaotic image encryption scheme based on compressive sensing. Sensors 2021, 21, 758. [Google Scholar] [CrossRef]
  52. Shah, S.A.; Ahmad, J.; Masood, F.; Shah, S.Y.; Pervaiz, H.; Taylor, W.; Imran, M.A.; Abbasi, Q.H. Privacy-Preserving Wandering Behavior Sensing in Dementia Patients Using Modified Logistic and Dynamic Newton Leipnik Maps. IEEE Sens. J. 2020, 21, 3669–3679. [Google Scholar] [CrossRef]
  53. Khan, J.S.; Boulila, W.; Ahmad, J.; Rubaiee, S.; Rehman, A.U.; Alroobaea, R.; Buchanan, W.J. DNA and plaintext dependent chaotic visual selective image encryption. IEEE Access 2020, 8, 159732–159744. [Google Scholar] [CrossRef]
  54. Alkhelaiwi, M.; Boulila, W.; Ahmad, J.; Koubaa, A.; Driss, M. An Efficient Approach Based on Privacy-Preserving Deep Learning for Satellite Image Classification. Remote Sens. 2021, 13, 2221. [Google Scholar] [CrossRef]
Figure 1. Data collection and data analysis using WiFi sensing.
Figure 1. Data collection and data analysis using WiFi sensing.
Electronics 10 02701 g001
Figure 2. CSI-time history of each activity.
Figure 2. CSI-time history of each activity.
Electronics 10 02701 g002
Figure 3. WiFi sensing data for different activities including lying on a bed for respiratory rate measurement.
Figure 3. WiFi sensing data for different activities including lying on a bed for respiratory rate measurement.
Electronics 10 02701 g003
Figure 4. Respiratory-rate measured using WiFi sensing and compared with a wearable sensor.
Figure 4. Respiratory-rate measured using WiFi sensing and compared with a wearable sensor.
Electronics 10 02701 g004
Figure 5. Work low of WiFi sensing for extracting ADLs and respiratory rate.
Figure 5. Work low of WiFi sensing for extracting ADLs and respiratory rate.
Electronics 10 02701 g005
Figure 6. Time–frequency spectrogram for a person walking.
Figure 6. Time–frequency spectrogram for a person walking.
Electronics 10 02701 g006
Figure 7. Time–frequency spectrogram for a person sitting down and standing up.
Figure 7. Time–frequency spectrogram for a person sitting down and standing up.
Electronics 10 02701 g007
Figure 8. Time–frequency spectrogram for a person lying on a bed.
Figure 8. Time–frequency spectrogram for a person lying on a bed.
Electronics 10 02701 g008
Figure 9. Time–frequency spectrogram for a person walking while carrying an object.
Figure 9. Time–frequency spectrogram for a person walking while carrying an object.
Electronics 10 02701 g009
Figure 10. Time–frequency spectrogram for the respiratory rate.
Figure 10. Time–frequency spectrogram for the respiratory rate.
Electronics 10 02701 g010
Figure 11. Bifurcation diagram of a logistic map: chaotic nature for μ ( 3.57 , 4 ) .
Figure 11. Bifurcation diagram of a logistic map: chaotic nature for μ ( 3.57 , 4 ) .
Electronics 10 02701 g011
Figure 12. Ciphertext of the person walking spectrogram.
Figure 12. Ciphertext of the person walking spectrogram.
Electronics 10 02701 g012
Figure 13. Histogram of the ciphertext: red channel.
Figure 13. Histogram of the ciphertext: red channel.
Electronics 10 02701 g013
Figure 14. Histogram of the ciphertext: green channel.
Figure 14. Histogram of the ciphertext: green channel.
Electronics 10 02701 g014
Figure 15. Histogram of the ciphertext: blue channel.
Figure 15. Histogram of the ciphertext: blue channel.
Electronics 10 02701 g015
Table 1. Nasir’s S-Box2 [48].
Table 1. Nasir’s S-Box2 [48].
1451482111206210219512217171114164204170191
15624725499302389421221611010750155142742
1319613190139113842022101941962301181717540
15941161772351471982222201761272124127219100
267515248688379160976188601821789193
10393186101806691102002321482082939228140
217582716124937112136144201661580245225207
13512523382157619928122138197771055149
165490133201531512521291542378711731169243
14153659852424655236184453523412316370
206179692031434713721423128157192173187152165
22138242250213223119240618222431671323341
104782311811489150209146252261891217218229
185723964881066314918352732514213067227
652116811124132441261095617216225319911185
98341341081532444320517425595861154618028
Table 2. Badr’s S-Box [49].
Table 2. Badr’s S-Box [49].
4951881621118411580305812445555228
223160233571165211287110119218820021315464
11921512293178741125312013199541525127
1031190194129235133175601452491501692201879
15712431208952019713523623815818714202144189
21622719324821214317910759996318683210130123
18213225013910481162177152136733721996207215
1722119673538342415325176842047632217
148254140214941381427181146242702392526174
5010516724097391084886225173206448922233
22611352170253023982474011620111746156155
22468161185205195164810211114920324336241237
2282727821891198110471661317743172121246
171106125874193168262925514718042232126127
109902442301599213469114165137191209561189
24562752823461163851001221066196183231141
Table 3. Hussam’s S-Box [50].
Table 3. Hussam’s S-Box [50].
12485103929073251213514880131187206143154
5511611289219194581655915210413821570147119
17695977114841392531366015034505213462
6410032812011819910120144451741263017338
987989310616611517978153224141725622896
1621821641902101101936715683149222825416726
6918657249292042141231772271417579178239238
312510811824942121281371233511169250241
10662072361516237231811972211357521714582
2002818312719823117542123220261155142159163
1582303622019539133102196226684416171160184
209243109221322163714012251205767422591
46203246255018847192208120111223218107185146
172421304011333213243211117189482354113129
10524488992292522717023424586624015719153
124491517725124824231636516824717119180
Table 4. Security analyses of the encrypted spectrogram: red channel.
Table 4. Security analyses of the encrypted spectrogram: red channel.
Security Evaluation ParameterPlaintext SpectrogramEncrypted Spectrogram
C o r r C o f f (H)0.58420.0020
C o r r C o f f (V)−0.0812−0.0027
C o r r C o f f (D)0.62950.0012
M S E NA 9.7076 × 10 3
P S N R (db) NA 30.7917
N A E NA 1.2484
M A E NA 254
N C C NA 1
S C NA 0.2049
A D NA 8.8120
M D NA 255
E n t r o p y 4.19757.9995
N P C R NA99.60%
U A C I NA31.58
C o n t r a s t 0.309410.4793
E n e r g y 0.39380.0156
H o m o g e n e i t y 0.91700.3899
Table 5. Security analyses of the encrypted spectrogram: green channel.
Table 5. Security analyses of the encrypted spectrogram: green channel.
Security Evaluation ParameterPlaintext SpectrogramEncrypted Spectrogram
C o r r C o f f (H)0.7168−0.0043
C o r r C o f f (V)0.3492−0.0013
C o r r C o f f (D)0.75680.0002
M S E NA 1.2631 × 10 4
P S N R (db) NA 32.6558
N A E NA 2.0190
M A E NA 254
N C C NA 1
S C NA 0.1153
A D NA 4.9859
M D NA 255
E n t r o p y 4.58817.9993
N P C R NA99.60%
U A C I NA36.08
C o n t r a s t 0.173910.5599
E n e r g y 0.85820.0156
H o m o g e n e i t y 0.98420.3885
Table 6. Security analyses of the encrypted spectrogram: blue channel.
Table 6. Security analyses of the encrypted spectrogram: blue channel.
Security Evaluation ParameterPlaintext SpectrogramEncrypted Spectrogram
C o r r C o f f (H)0.8595−0.0011
C o r r C o f f (V)0.7318−0.0012
C o r r C o f f (D)0.8727−0.0022
M S E NA 8.9247 × 10 3
P S N R (db) NA 25.7665
N A E NA 0.4231
M A E NA 255
N C C NA 1
S C NA 1.5625
A D NA 66.5487
M D NA 255
E n t r o p y 5.74427.9994
N P C R NA99.59%
U A C I NA30.38
C o n t r a s t 0.132710.4901
E n e r g y 0.56080.0156
H o m o g e n e i t y 0.96450.3893
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Boulila, W.; Shah, S.A.; Ahmad, J.; Driss, M.; Ghandorh, H.; Alsaeedi, A.; Al-Sarem, M.; Saeed, F. Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia. Electronics 2021, 10, 2701. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics10212701

AMA Style

Boulila W, Shah SA, Ahmad J, Driss M, Ghandorh H, Alsaeedi A, Al-Sarem M, Saeed F. Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia. Electronics. 2021; 10(21):2701. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics10212701

Chicago/Turabian Style

Boulila, Wadii, Syed Aziz Shah, Jawad Ahmad, Maha Driss, Hamza Ghandorh, Abdullah Alsaeedi, Mohammed Al-Sarem, and Faisal Saeed. 2021. "Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia" Electronics 10, no. 21: 2701. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics10212701

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop