scispace - formally typeset
Search or ask a question
Author

K.B. ShivaKumar

Bio: K.B. ShivaKumar is an academic researcher. The author has contributed to research in topics: Steganography & Encryption. The author has an hindex of 2, co-authored 2 publications receiving 6 citations.

Papers
More filters
Proceedings ArticleDOI
01 Oct 2016
TL;DR: The proposed algorithm provides very high security protection for information related to patient and as well as with very less distortion of ECG signal, so that it remains diagnosable even after retrieval of patient related secret information.
Abstract: Point of care testing (POCT) in patients with ischemic heart disease is impelled by the time critical need for quick, specific and accurate results for initiation of therapy instantly. The driving force behind POCT using ECG signals is to provide test immediately and conveniently to cardiac patients. This will intensify the probability of patient, physician and care team receiving the results faster, which facilitate immediate clinical management decisions to be taken. In wireless communication the biomedical data may be susceptible to potential attacks leading to following security challenges. ● To safeguard the privacy and integrity of biomedical data. ● To make sure that only authorized people can have the access to secret information. This paper proposes a five level wavelet decomposition based steganography technique applied to ECG signals along with RSA encryption and scrambling matrix based encoding technique to protect confidential information related to patient hidden inside ECG signals. To assess the efficiency of the proposed algorithm on the patient ECG signal, the two distortion measurement metrics like percentage RMSE difference (PRD) and PSNR(peak signal to noise ratio) have been compared with existing algorithm results and energy of watermarked ECG signal is compared with original ECG for Coiflet, Bioorthogonal and symlet wavelets. It is found that the proposed algorithm provides very high security protection for information related to patient and as well as with very less distortion of ECG signal, so that it remains diagnosable even after retrieval of patient related secret information.

4 citations

Proceedings ArticleDOI
01 Sep 2017
TL;DR: The proposed technique assures hundred percent PSNR, higher embedding capacity and greater level of security, and extensive experimental results are provided to validate the performance of proposed scheme considering both text and image data as payload information.
Abstract: This Paper proposes a Novel frame work for reversible data hiding scheme over an encrypted cover medium. Reversible data hiding techniques are gaining huge importance in recent years due to its excellent feature of enabling zero distortion reconstruction of both cover medium information as well as secret data information, while protecting the confidentiality of the payload image information. We propose an algorithm where in, encrypted cover image is generated by bitwise XOR ing the cover medium information with the key stream. Data hiding in the encrypted domain is achieved through public key modulation scheme. Prior to embedding of secret information, Huffman encoding technique is used to compress the payload information in a lossless fashion. At the receiver end a powerful and most popular support vector machine classifier is used to separate encrypted and non encrypted image blocks using support vectors, which defines the hyper plane. Four of the features selected for categorizing encrypted and non encrypted blocks are •Pixel variation in all four directions •Entropy •Standard deviation •Histogram. This enables simultaneous decoding of secret information as well as cover medium information. Later Huffman decoding technique is applied to retrieve the payload information in a lossless fashion. Hence the proposed technique assures hundred percent PSNR, higher embedding capacity and greater level of security. Extensive experimental results are provided to validate the performance of proposed scheme considering both text and image data as payload information.

2 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The methods can be classified into several categories based on the most prominent idea in the embedding process; hence, a new classification is proposed and provides a scope for summarizing and understanding the most followed approaches in audio steganography.

21 citations

Journal Article
TL;DR: In this article, a reversible data hiding scheme based on histogram modification is proposed, where the binary tree structure is exploited to solve the problem of communicating pairs of peak points and the distribution of pixel differences is used to achieve large hiding capacity while keeping the distortion low.
Abstract: In this letter, we present a reversible data hiding scheme based on histogram modification. We exploit a binary tree structure to solve the problem of communicating pairs of peak points. Distribution of pixel differences is used to achieve large hiding capacity while keeping the distortion low. We also adopt a histogram shifting technique to prevent overflow and underflow. Performance comparisons with other existing schemes are provided to demonstrate the superiority of the proposed scheme.

12 citations

Journal ArticleDOI
Jyotismita Chaki1
TL;DR: The aim of this state-of-art paper is to produce a summary and guidelines for using the broadly used methods, to identify the challenges as well as future research directions of acoustic signal processing.
Abstract: Audio signal processing is the most challenging field in the current era for an analysis of an audio signal. Audio signal classification (ASC) comprises of generating appropriate features from a sound and utilizing these features to distinguish the class the sound is most likely to fit. Based on the application’s classification domain, the characteristics extraction and classification/clustering algorithms used may be quite diverse. The paper provides the survey of the state-of art for understanding ASC’s general research scope, including different types of audio; representation of audio like acoustic, spectrogram; audio feature extraction techniques like physical, perceptual, static, dynamic; audio pattern matching approaches like pattern matching, acoustic phonetic, artificial intelligence; classification, and clustering techniques. The aim of this state-of-art paper is to produce a summary and guidelines for using the broadly used methods, to identify the challenges as well as future research directions of acoustic signal processing.

9 citations

Journal Article
TL;DR: The design of a practical TSN hardware/software platform for a typical U.S. healthcare community scenario to perform real-time healthcare data collections and a medical security scheme with low communication overhead to achieve confidential electrocardiogram data transmission in wireless medium are designed.
Abstract: Recently, a remote-sensing platform based on wireless interconnection of tiny ECG sensors called telecardiology sensor networks (TSN) provided a promising approach to perform low-cost real-time cardiac patient monitoring at any time in community areas (such as elder nursing homes or hospitals). The contribution of this research is the design of a practical TSN hardware/software platform for a typical U.S. healthcare community scenario (such as large nursing homes with many elder patients) to perform real-time healthcare data collections. On the other hand, due to the radio broadcasting nature of MANET, a TSN has the risk of losing the privacy of patients' data. Medical privacy has been highly emphasized by U.S. Department of Health and Human Services. This research also designs a medical security scheme with low communication overhead to achieve confidential electrocardiogram data transmission in wireless medium.

4 citations

Book ChapterDOI
01 Jan 2021
TL;DR: A comprehensive survey of steganographic techniques for ECG can be found in this article, where the authors present a survey of the steganography techniques suitable for usage in ECG.
Abstract: The following paper represents a survey of steganography techniques suitable for usage in ECG. A few steganographic methods have been discussed below, it has been believed that these methods can be exploited to bring out more techniques suitable for ECG. The objective of this paper is to provide a comprehensive survey of existing steganographic techniques for ECG.

3 citations