Noninvasive Detection of Respiratory Disorder Due to COVID-19 at the Early Stages in Saudi Arabia

: The Kingdom of Saudi Arabia has suffered from COVID-19 disease as part of the global pandemic due to severe acute respiratory syndrome coronavirus 2. The economy of Saudi Arabia also suffered a heavy impact. Several measures were taken to help mitigate its impact and stimulate the economy. In this context, we present a safe and secure WiFi-sensing-based COVID-19 monitoring system exploiting commercially available low-cost wireless devices that can be deployed in different indoor settings within Saudi Arabia. We extracted different activities of daily living and respiratory rates from ubiquitous WiFi signals in terms of channel state information (CSI) and secured them from unauthorized access through permutation and diffusion with multiple substitution boxes using chaos theory. The experiments were performed on healthy participants. We used the variances of the amplitude information of the CSI data and evaluated their security using several security parameters such as the correlation coefﬁcient, mean-squared error (MSE), peak-signal-to-noise ratio (PSNR), entropy, number of pixel change rate (NPCR), and uniﬁed average change intensity (UACI). These security metrics, for example, lower correlation and higher entropy, indicate stronger security of the proposed encryption method. Moreover, the NPCR and UACI values were higher than 99% and 30, respectively, which also conﬁrmed the security strength of the encrypted information.


Introduction
The COVID-19 pandemic has spread significantly in the past year and has infected more than 118 million people globally since its inception. These numbers are rising exponentially around the world [1,2]. COVID-19 has caused more damage, while having a lower fatality rate when compared to previous diseases, namely "severe acute respiratory syndrome (SARS) and Middle East respiratory syndrome (MERS)" [3]. COVID-19 disease is essentially transmitted through respiratory and contact routes when someone is in proximity [4]. Airborne transmissions are also one of the largest sources, occurring in healthcare sectors, where support treatments or procedures are conducted in close contact. This can also occur when numerous people share the same room for long periods of time.
The Kingdom of Saudi Arabia's government has taken massive precautionary measures, such as timely interventions, travel restrictions, and closing cinemas, indoor entertainment centers, indoor restaurants and cafes, gyms, and sports centers. These measures have seen preliminary effects in reducing the spread of this pandemic. As of 3 March 2021, 2 of 24 the COVID-19 pandemic has caused more than 381,700 cases and 6550 deaths. According to [5], a survey was conducted on a total of 844 healthcare workers. Three-fourths of the respondents revealed that they are at risk of contracting COVID-19 at work. Of the respondents, 69.1% revealed they would feel threatened if a colleague contracted COVID- 19,69.9% of them that they would have to care for patients infected with COVID-19, while 27.7% that they feel unsafe at work using the standard precautions available.
In hospital and laboratory settings, reverse-transcription polymerase chain reaction (RT-PCR) is the gold standard technique to detect COVID-19 infection [6]. However, this method presents a high false detection rate, and its unavailability on a large scale might slow down the tracking of potential COVID-19 patients. Another method called thoracic computed tomography (CT) is comparatively easy to operate to deliver the diagnosis of potential patients. For instance, the majority of COVID-19 patients have a traditional radiographic imprint on their lungs when a CT scan is performed. Thus, the lung CT is a widely used method to clinically diagnose the disease [7]. We must consider the demand for high-throughput screening for examining the chest using computed tomography and the amount of work that has been done by radiologists, especially the COVID-19 patients in a hospital environment.
In order to avoid contact with potential COVID-19 patients, noncontact and noninvasive monitoring of vital signs such as the respiratory rate is of utmost importance. Noncontact offers seamless monitoring of patients by altering daily routine activities [8].
Recently, noncontact techniques such as radio frequency (RF) that exploit ubiquitous WiFi have shown the ability to monitor the daily routine activities of COVID-19 patients and their respiratory rate [9]. In addition, the existing WiFi network system accesses control methods, essentially using a static password, and the media access control address is prone to attacks by malicious users. Such attackers can gain access to WiFi signals and monitor the respiratory rate of a particular COVID-19 patient and raise a false alarm [10]. The primary reason the proposed noncontact wireless sensing system exploits low-cost ubiquitous wireless devices is that it leverages the existing WiFi signals available almost everywhere, for instance in homes, care-homes, hospitals, hotels, and so on. The system does not need any contact with the person and monitors various COVID-19 symptoms, specifically the breathing rate, by exploiting the change in the wireless medium using the variances of the amplitude information. This system can also exploit the small receiving antenna present in a mobile phone. When the mobile phone is connected to a WiFi router, the system would be able to collect breathing information using the mobile phone as well. Hence, the proposed method can help mitigate the ongoing spread of COVID-19 and can continuously and seamlessly monitor the specific patients. In the literature [11][12][13][14][15][16], COVID-19 monitoring/prediction methods are available; however, these methods [11][12][13][14][15][16][17] are mainly focused on classification without any encryption. The method outlined in [11][12][13][14][15][16] mainly uses AIand ML-based techniques. A number of ML techniques are used for other applications, and details can be found in [18,19]. Our proposed method uses a noninvasive detection of COVID-19 along with the patients' privacy using the CSI. Moreover, in this work, images were secured through a lightweight chaos-based encryption method.
In this paper, we present a noncontact safe and secure WiFi sensing-based COVID-19 patient monitoring technique using low-cost ubiquitous small wireless devices such as commercially available WiFi routers, network interface cards, and traditional dipole antennas. We monitored the activities of daily living along with the respiratory rate. This system exploits RF signals by examining the variances in the amplitude information of the channel state information (CSI). Specifically, to preserve privacy, we present a novel algorithm. We used one transmitter antenna and one receiving antenna to continuously record the CSI data from a WiFi router for monitoring purposes. The main contributions of this paper are as follows: We present a novel noncontact safe and secure channel state information-based WiFi sensing system for monitoring the activities of daily living (ADLs) and the respiratory rate of COVID-19 patients. This system does not need a dedicated device and exploits radio frequency signals available almost everywhere; 2.
This system can efficiently monitor large-scale body movements along with tiny chest movements. It primarily exploits various parameters extracted from WiFi signals, such as the variances of the amplitude and phase information, time-frequency spectrograms, and 3D signatures containing time-frequency-amplitude information; 3.
WiFi technology is highly susceptible to being accessed by unwanted users; therefore, we propose a novel privacy-preserving algorithm for securing the CSI data containing vital signatures such as ADLs and respiratory rates to counter the false alarms generated. Every now and then, unauthorized users can gain access to the WiFi signal, generating a false alert to the caregiver or nurse; 4.
In this work, we encrypted spectrograms with lightweight chaos-based maps. The security of the proposed scheme was tested and proven against a number of security parameters.
One of the natural questions that arises is why researchers are deploying chaos in image encryption schemes. The behavior of chaotic signals is highly unpredictable and random-like, which can be used in the design of cryptographic algorithms [20][21][22]. Inherently, chaos exhibits complex properties in a very simple mathematical formula. That is one of major reasons why many cryptographic designers prefer chaos instead of complex formulae with complex properties [23].

Related Works
Several studies have used sensor systems for identifying and detecting respiratory disorders. Noncontact sensing of body movements has attracted great attention from researchers, especially noninvasive techniques for measuring vital signatures such as the respiratory and heart rates. Wireless techniques constitute an efficient technique for detecting physiological signs and movements [24][25][26][27][28]. For instance, Dou and Huan [29] suggested a breathing sensing system based on the Doppler spectral energy extracted from the CSI to monitor the chest displacement induced by respiration. The authors proposed two phases: fitting to obtain the CSI with the Doppler shift and decomposition to obtain the channel impulse response. Moreover, they conducted a time-frequency analysis to accumulate the Doppler spectral energy. Khan et al. [30] conducted a systematic review of noncontact sensing related to COVID-19. The main idea was to suggest a solution for the early diagnosis of this disease based on common early symptoms such as coughing and shortness of breath. The authors identified existing methods for noncontact health monitoring and presented several steps discussed in noncontact sensing platforms such as data collection, data processing, feature extraction, and classification algorithms. Costanzo [31] developed a software-defined radar based on Doppler elaboration features to measure the noncontact monitoring of human respiration signals. The author proposed to monitor low-frequency oscillations typical of human breath using compact, low-cost, and flexible radar solutions. Van et al. [32] developed a continuous wave radar sensor system for self-identifying of respiratory disorders. Their proposed system was developed based on neural networks that can identify if a patient has a low, normal, or high breathing rate. Besides, the model has been improved to detect the patients who are suffering from breathing disorders. Sharma et al. [33] used a wearable radio frequency (RF) sensor as a noninvasive method for monitoring respiration dynamics. The method was used to estimate the breathing rate and lung volume. The obtained respiratory parameters were compared with the traditional chest belts' data for different simulated respiratory cases, which included fast and slow, shallow breathing. Kristiani et al. [34] designed a monitor for respiration and heart rates. The proposed device used a flex sensor to detect the respiration rate. The findings of these sensors were published to the Internet using the IoT based on the ThingSpeak application. Khan et al. [35] provided a solution to remotely monitoring vital signs such as breathing related to COVID-19 patients. The authors used software-defined radio (SDR) technology and artificial intelligence. The fine-grained wireless channel state information was extracted using the channel frequency response and multicarrier orthogonal frequency division multiplexing technique. The validation was conducted using a simulation of the channels to provide a better understanding of the channel frequency response. The technique used in Khan et al.'s paper allows sensing human body movements to diagnose breathing abnormalities in a noncontact manner.
In this paper, the core idea is to detect the lung functionality of patients with COVID-19 based on detecting abnormal breathing rates due to lung disorders. As mentioned above, numerous noninvasive applications of sensors and WiFi-signal-based human activity recognition systems have been proposed, as this provides a low-cost and device-free solution. The main feature of these systems is to analyze the change in received signal characteristics by the nearby WiFi systems, which can provide information about human activity. However, the received signal is greatly affected by multipath propagation and is highly susceptible to noise. Furthermore, the security protocol used to protect the vast majority of WiFi networks can be easily broken, potentially exposing the wireless connection to malicious eavesdroppers and attacks. Patients' data are an attractive target for cybercrime for two fundamental reasons: they are a rich source of valuable data, and their defenses are weak.
To summarize, there is a need for noncontact, safe, and secure WiFi sensing to monitor the ADLs and respiratory rate of COVID-19 patients using low-cost small wireless devices.

WiFi Sensing System Model
The noncontact wireless sensing techniques can be divided into two large categories, the received signal strength indicator (RSII) and channel state information. These two methods can be applied to a large number of applications including cardiac activity monitoring, breathing rate detection, fall detection, and so on. The RSSI measurements only deliver the averaged-out radio frequency signal power level and are extremely inconsistent and inadequate for monitoring the activities of daily living and respiratory rate of COVID-19 patients [36]. The research work in [37] demonstrated the activities of daily living of an individual leveraging RSSI measurements using a smartphone sensor and evaluated the performance in terms of percentage accuracy. On the contrary, the channel state information obtained using small wireless devices, such as a WiFi router and network interface card, presented a granular resolution using 30 subcarriers.
The single subcarrier was used to extract breathing information. All of the 30 subcarriers presented nearly similar information, and that is why one subcarrier was used for analysis purposes.
WiFi sensing essentially exploits the received signal strength (amplitude information) indicators and channel state information (amplitude and phase information), which can be used in a large number of applications, specifically for detecting the activities of daily living and tiny chest and cardiac movements with varying frequencies. The RSSI data are the averaged-out signal received by a commercial network interface card, while the CSI data describe the overarching physical wireless medium in terms of various frequency channels [8,38]. The RSSI data are highly susceptible to random noise and unstable each time the data are received. The WiFi sensing-based CSI data are highly stable in the presence of external noise.
Assume that any RF signal transmitted by a WiFi router can be mathematically expressed as: x(t) = e j2πf t . The signal received by a network interface card at the received side can be written as follows: Here, L is the total number of paths, including line-of-sight (LOS) propagation and nonline-of-sight (NLOS) propagation. Here, α i (f , t) and τ i (f , t) indicate the attenuation caused due to multipath propagation and delay caused at time internal t as the RF signal travels from the WiFi router to the receiving antenna through path i, respectively. Considering α i (f , t) and τ i (f , t) do not rely on operating frequencyf , by applying the superposition theorem on the RF signal received through the LOS and NLOS, any input RF signal will induce the following output signal: The above superposition assumption is adequate as the WiFi frequency bandwidth is narrow when compared to its operating frequency (i.e., 2.45 GHz). To simplify the notation, eliminate the term t found in α i and τ i . The channel impulse response (time domain representation) of the physical wireless medium can be extracted from Equation (2) as follows: While its frequency response or channel state information can be mathematically expressed as: The Intel 5300 network interface card used for data collection embedded within a computer collects a group of 30 frequency subcarriers that essentially measure the channel state information [39], which can be extracted from Equation (3) as: Here, H indicates the matrix comprising raw CSI data (amplitude and phase information), f is the baseband frequency of different frequency subcarriers, k is the total number of subcarriers (30 in this case), and fc is the central frequency (2.45 GHz). When we record CSI data using the commercial Intel 5300 network interface card, there are numerous challenges presented by the device. First and foremost are the latency and time taken when a single CSI packet is received [40]. The CSI can be measured through received RF signal energy or increasing the sliding window by setting the receiving data. Irrespective of the method adopted, each time the WiFi router is connected to the network interface card, a random packet delay is experienced, which is induced due to the baseband frequency channels that bring random noise into the CSI data. The second reason is the phase difference between the transmitted and received signal. This particular phase difference is produced when the WiFi router is switched on and an initial random noise is transmitted along with an actual data signal. The noise is then picked up into the CSI data at the receiving side. The CSI data obtained by the network interface card can be mathematically expressed as: Here, τ pdd represents the offset or error generated, the volume of which is higher than the actual value of τ i , τ pll is caused by the random noise in a wireless medium, f c f o indicates the value of residual CFO, t k , expressing the time taken from transmission to reception, and N is the (AWGN). We used Equation (6) to extract the CSI data for different activities' recognition and the breathing rate of COVID-19 patients.

WiFi Sensing-Based CSI Data for ADLs and Respiratory Rate
This section focuses on the CSI data obtained for various human activities such as walking at a normal pace, walking while carrying an object, sitting down in a chair, standing up from a chair, lying on a bed, and measuring the respiratory rate. We collected the data using WiFi sensing at Xidian University China, involving healthy participants. The data were previously collected for a range of applications; however, due to the ongoing pandemic, we argue that this system is applicable for monitoring COVID-19 patients since no device needs to interact with the sensing system. The data acquisition was performed in an indoor environment, generating time-frequency signatures [41,42] against each activity and respiratory rate and data analysis, and securing it using the chaos-based method, as given in Figure 1. The raw variations of the amplitude information of the CSI data for different activities of daily living are presented in Figure 2.  Figure 3 shows the time history of all activities for 30 subcarriers when amplitude CSI is considered in terms of the power level (dB). The 3D waveform in Figure 3 indicates the variances of amplitude information against the total number of subcarriers and time history. It can be seen that each body movement produced a unique CSI signature, which distinguishes each activity. We can further analyze single or multiple subcarriers against time to examine individual activity and transition from one ADL to another. The respiratory rate obtained using WiFi sensing is shown in Figure 4. A wearable breathing sensor was put on the subject's body, and data were recorded when the person was within WiFi range. Simultaneously, data were also recorded using a network interface card. A sample of data collected using WiFi sensing is shown in Figure 4a,c,d, and it was compared with the one obtained using the wearable sensor, as in Figure 4b. The data in Figure 4a are the raw variance of the amplitude CSI extracted directly from commodity devices with an applied filter or removing random noise. Figure 4c is the phase information of the CSI data for a person's respiratory rate, while Figure 4d is the final respiratory rate obtained after applying a filtering process using the parameters discussed above. There was a close synergy between the respiratory rate obtained using a wearable sensor with that of the WiFi.

Extracting the Time-Frequency Spectrogram from WiFi Signals
In order to reliably and accurately extract the human activities and respiratory rates of COVID-19 patients, we applied time-frequency spectrograms using the short-time Fourier transform (STFT) [43] to images to encrypt the important data of particular patients. We used CWT to extract the scalograms, as it presents granular information as compared to the STFT. This method brings together advanced signal processing algorithms and spectrograms to obtain signal components for activity recognition and respiratory rate monitoring. Figure 5 shows the system architecture of using the channel state information for monitoring COVID-19 patients.
The WiFi sensing-based channel state information comprises four main steps: (a) extracting raw variances of amplitude information, (b) eliminating the outliers using the Hampel algorithm, applying a bandpass filter having a cutoff frequency from 0.2 GHz to 0.4 GHz to remove random noises recorded through a commodity device, (c) applying principal component analysis (PCA) to obtain different activities of daily living and the corresponding respiratory rate, (d) estimating the abnormal respiratory rate both in the time domain and the frequency domain as experienced by the COVID-19 patients. The 3D waveform in Figure 3 indicates the variances of the amplitude information against the total number of subcarriers and time history. CSI signal processing consists of the following steps: (1) obtaining the CSI signal magnitude; (2) removing outliers by the Hampel identifier (Liu, Cao, Tang, Wen, and Wi-sleep, 2014) and using a bandpass filter with cutoff frequencies of 0.2 Hz and 0.4 Hz to suppress the noises; (3) exploiting PCA to obtain the breathing rate frequency contribution, then using a short-time Fourier transform to obtain the time-frequency spectrogram to extract the instantaneous frequency of the respiration rate (RR); (4) estimating the abnormal respiratory rate contributions in both the time and frequency domains to monitor the COVID-19 patients.
The proposed system works as follows, as indicated in Figure 5: The first step is to collect data using WiFi sensing; the raw data are then processed using advanced signal processing algorithm, and random noise is remove, such as external noise and outliers. Using principle component analysis, initially, large-scale body movements such as the activities of daily living are extracted to examine the physical activities of a monitored COVID-19 patient. Then using the STFT, the respiratory rate is extracted for detection purposes.
The initial stage of channel state information raw data processing is to eliminate the interference that occurs due to noise. Different activities and a sudden change in respiratory rate can be experienced by COVID-19 patients due to an external movement such as an operational ceiling fan. We applied the Hampel filtering algorithm to mitigate the impact of a sudden change in amplitude information. The outlier noise is then replaced by the average value of neighboring values, before and after the eliminated value. The Hampel filter algorithm also has the potential to eliminate the invalid or empty channel state information packets retrieved by the network interface card. After completing the elimination of noisy signals from raw CSI data, the bandpass filter is also used to only pass on the values of signals that are required to extract a particular respiratory rate. The COVID-19 patient respiratory rate is essentially the subtle chest movement from which the application of a bandpass filter can efficiently and reliably remove high-frequency noise from CSI data. We used a bandpass filter in the frequency range of 0.2 Hz to 0.4 Hz, which is the traditional frequency range of the human breathing rate.
As mentioned earlier, the raw channel state information carries multiple frequency subcarriers (30 in this case), and human activities can be found at a lower frequency range since these are large-scale body movements. However, due to the high-low wavelength of higher frequencies, the range resolution also increases; hence, the high dimensions of CSI matrices carry the breathing rate of COVID-19 patients. To extract the breathing rate, we used PCA methods, which are essentially the space projection of the data. In this context, the expression used for human activities' recognition and the respiratory rate of subjects can be written as f (t), which is defined as summing up all values of RF signal oscillations.
Here, the value of α k (t) indicates the variation in amplitude CSI in terms of power level in dB, N k ϕ k (t) is the random phase offset of the CSI data derived from the intermediate frequency value (IF), which is mathematically expressed as {s k (t)} 1≤k≤K and shows 2π as the periodic RF signal having a zero mean function along unity function as in L 2 ([0, 2π]), σ shows the slow moving average value of the smooth function, while r(t) is the external noise picked up by the low-cost network interface card.
In order to remove the intermediate frequency values from COVID-19 patients using time-frequency analysis, we used the STFT on raw amplitude information of the CSI data against time history. The STFT along with its parameters used in this work can be mathematically expressed as follows [44,45]: In Equation (8), the value of h is the time window function of the CSI data obtained using WiFi sensing and t denotes the total time taken to record the data over a period of time. The value ξ describes the operating frequency (i.e., 2.45 GHz). This equation expresses that the moving time window and STFT, when applied on the CSI data considering the amplitude information, give us the spectrograms that are expressed in terms of time vs. frequency, as shown in Figures 6-10. These figures indicate when a person was walking back and forth within WiFi range in an indoor environment.

Encrypted-WiFi-Based Time-Frequency Spectrograms
The spectrogram shown in Figures 6-9 contains sensitive personal information, and an attacker could possibly hack this information and send false alarms. In this section, an encryption scheme is presented to a secure spectrogram obtained from WiFi data. The proposed encryption scheme contains both confusion and diffusion steps. A general mathematical notation is written as: where C and I are ciphertext and plaintext images, α and β are functions of the confusion and diffusion processes, K τ and K σ are the confusion and diffusion secret keys, and ψ and ω show the number of rounds for confusion and diffusion in total encryption, respectively.
In the literature, one-dimensional maps such as logistic, tent, and sine maps have been applied in confusion and diffusion processes to obtain a ciphertext image. Mathematically, a logistic map is written as [46]: where x 0 ∈ (0, 1) and µ ∈ (0, 4) are the initial conditions. A tent map is written as: , if y n ≥ 0.5 (11) where y 0 ∈ (0, 1) and λ ∈ (0, 4) are the initial conditions. Mathematically, a sine map is: where z 0 ∈ (0, 1) and ξ ∈ (0, 4) are the initial conditions. However, due to a lower chaotic range and several other disadvantages, one-dimensional maps such as logistic, tent, and sine maps have serious security flaws. For example, the bifurcation diagram of a logistic map shown in Figure 11 highlights that the logistic map has a lower chaotic range of (3.57, 4). Therefore, instead of using a traditional logistic map, hybrid maps were proposed in [47]. In this research, we also used hybrid maps (logistic-tent, logistic-sine, and tent-sine maps) due to the larger key space and initial condition sensitivity. The detailed encryption steps are given below. Figure 11. Bifurcation diagram of a logistic map: chaotic nature for µ ∈ (3.57, 4).

Encryption Steps
This section presents the proposed encryption scheme for a spectrogram. Without loss of generality, consider the size of the spectrogram as M × N. Split the corresponding plaintext spectrogram into red, green, and blue channels. The encryption steps are as follows: Step 1: Apply the Secure Hash Algorithm (SHA 3) on the plaintext channel to obtain hash H.
Step 2: Convert hash values H into binary bit representation form B; Step 3: Generate initial conditions for a logistic-tent map, logistic-sine map, and tent-sine map, respectively. Mathematically, a logistic-tent map is written as: where mod is the modulus operation and q 0 ∈ (0, 1) and µ ∈ (0, 4) are the initial conditions. Now, calculate q 0 and µ using the binary bits obtained from Step 2.
The logistic-sine map is written as: where r 0 ∈ (0, 1) and µ ∈ (0, 4) are the initial conditions. Calculate initial condition r 0 : The tent-sine map is written as: where s 0 ∈ (0, 1) and µ ∈ (0, 4) are the initial conditions. Calculate s 0 as: Step 4: Iterate a logistic-tent map and logistic-sine map σ + M and σ + N times, respectively, where σ is 30, so that the transient effect is avoided. Save the last M values in Q = [q 1 , , q 2 , . . . , q M ] and the last N values in R = [r 1 , , r 2 , . . . , r N ]. Iterate a tent-sine map using σ + N times, and save the last N values in S. Apply a rowwise permutation, columnwise permutation, rowwise circular-shift downward using the P, Q, R, and S row matrices to obtain a permuted image P φ . The detailed permutation steps are explained below in the Algorithm 1.
Step 5: For diffusion, P φ is passed through one of the substitution boxes (S-Boxes) shown in Tables 1-3. P φ is replaced with a single S-box using an intertwining map. The intertwining map is written as: where u 0 , v 0 , and w 0 are the initial conditions calculated as: For Ω = 0, Ω = 1, and Ω = 2, S-Box1, S-Box2, and S-Box3 are selected, respectively. The selected S-Box is applied on P φ to obtain P θ ; Step 6: Finally, perform an XOR operation on P θ using the values obtained from V. ζ = mod(floor (10 15 × v n , 256) ζ = P θ ⊕ ζ; Step 7: Repeat Steps 1 to 6 for each, and then, combine all three channels to obtain the resultant ciphertext C.    Figure 12 shows the encrypted person walking spectrum using the proposed encryption scheme. Through visual inspection, it is evident that the contents are encrypted and an intruder cannot get any ideas about the original spectrogram. However, a visual inspection alone is not sufficient, and security should be proven through statistical analyses [51]. Figures 13-15 show the histograms of the red, green, and blue channels, respectively. It can be seen that these histogram are almost flat, and hence, the encrypted color spectrogram is secure. Furthermore, Tables 4-6 show the security of the encrypted spectrogram using a number of security parameters [20,21,[52][53][54] for the red, green, and blue channels, respectively. From the security parameters, it is evident that the spectrogram encryption is secure and resistant against many attacks.      Table 5. Security analyses of the encrypted spectrogram: green channel.

Security Evaluation Parameter Plaintext Spectrogram Encrypted Spectrogram
Corr  Table 6. Security analyses of the encrypted spectrogram: blue channel.

Security Evaluation Parameter Plaintext Spectrogram Encrypted Spectrogram
Corr

Conclusions
This paper presented a novel privacy-preserving COVID-19 patient monitoring technique in the context of Saudi Arabia. The use of low-cost wireless devices in conjunction with a novel encryption algorithm, namely chaos-based substitution boxes, made it an endto-end secure system for continuously monitoring patients. The variances of the amplitude and phase information were used to monitor daily routine activities and detect normal and abnormal breathing rates. A wearable sensor was used as a reference sensor, which indicated strong synergy between wearable and noncontact WiFi sensing. This system can be deployed in any indoor setting where WiFi signals are available, such as in homes, hospitals, care centers, and airports. The proposed encryption scheme can be further strengthened with multichaos maps. In the future, we will change the proposed algorithm with higher-dimensional mapping for a higher key space and higher security. Moreover, the proposed scheme will be tested against ciphertext attack and plaintext attack. The proposed multichaos-based encryption scheme will be compared with other chaos-based algorithms. In addition, we will also deploy this system in actual quarantine, hotel, of hospital environment where actual COVID-19 patients are monitored while in quarantine or being observed. The idea will be to monitor their activities of daily living and examine their respiratory rate to see whether the patients needs a timely intervention. We will also monitor multiple participants in the future, in comparison to a single patient, as in this study. Additionally, in future work, we plan to monitor real COVID-19 patients instead of healthy participants and ask them to mimic different breathing patterns.