scispace - formally typeset
Search or ask a question
Journal ArticleDOI

ECG Data Encryption Then Compression Using Singular Value Decomposition

01 May 2018-IEEE Journal of Biomedical and Health Informatics (IEEE)-Vol. 22, Iss: 3, pp 707-713
TL;DR: Experimental results prove the first ETC approach for processing ECG data using the singular value decomposition technique to be an effective technique for assuring data security as well as compression performance forECG data.
Abstract: Electrocardiogram (ECG) monitoring systems are widely used in healthcare. ECG data must be compressed for transmission and storage. Furthermore, there is a need to be able to directly process biomedical signals in encrypted domains to ensure the protection of patients’ privacy. Existing encryption-then-compression (ETC) approaches for multimedia using the state-of-the-art encryption techniques inevitably sacrifice the compression efficiency or signal quality. This paper presents the first ETC approach for processing ECG data. The proposed approach not only can protect data privacy but also provide the same quality of the reconstructed signals without sacrificing the compression efficiency relative to unencrypted compressions. Specifically, the singular value decomposition technique is used to compress the data such that the proposed system can provide quality-control compressed data, even though the data has been encrypted. Experimental results prove the proposed system to be an effective technique for assuring data security as well as compression performance for ECG data.
Citations
More filters
Journal ArticleDOI
TL;DR: A novel framework called HealthFog is proposed for integrating ensemble deep learning in Edge computing devices and deployed it for a real-life application of automatic Heart Disease analysis.

387 citations

Journal ArticleDOI
TL;DR: A block scrambling-based encryption scheme is presented to enhance the security of Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to securely transmit the images through an untrusted channel provider, such as social network service providers.
Abstract: A block scrambling-based encryption scheme is presented to enhance the security of Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to securely transmit the images through an untrusted channel provider, such as social network service providers. The proposed scheme enables the use of a smaller block size and a larger number of blocks than the conventional scheme. Images encrypted using the proposed scheme include less color information due to the use of grayscale images even when the original image has three color channels. These features enhance security against various attacks such as jigsaw puzzle solver and brute-force attacks. In an experiment, the security against jigsaw puzzle solver attacks is evaluated. Encrypted images were uploaded to and then downloaded from Facebook and Twitter, and the results demonstrated that the proposed scheme is effective for EtC systems.

153 citations


Cites background or methods from "ECG Data Encryption Then Compressio..."

  • ...formation are used to efficiently compress encrypted images in [3] and [17], respectively....

    [...]

  • ...standards such as JPEG [3], [13]–[17], so they can not be...

    [...]

Posted Content
TL;DR: In this article, a block scrambling-based encryption scheme is presented to enhance the security of Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to securely transmit images through an untrusted channel provider, such as social network service providers.
Abstract: A block scrambling-based encryption scheme is presented to enhance the security of Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to securely transmit images through an untrusted channel provider, such as social network service providers. The proposed scheme enables the use of a smaller block size and a larger number of blocks than the conventional scheme. Images encrypted using the proposed scheme include less color information due to the use of grayscale images even when the original image has three color channels. These features enhance security against various attacks such as jigsaw puzzle solver and brute-force attacks. In an experiment, the security against jigsaw puzzle solver attacks is evaluated. Encrypted images were uploaded to and then downloaded from Facebook and Twitter, and the results demonstrated that the proposed scheme is effective for EtC systems.

118 citations

Journal ArticleDOI
TL;DR: A novel pixel-based image encryption method that maintains important features of original images and is robust against ciphertext-only attacks (COAs) and data augmentation in the encrypted domain is proposed for privacy-preserving DNNs.
Abstract: We present a novel privacy-preserving scheme for deep neural networks (DNNs) that enables us not to only apply images without visual information to DNNs but to also consider the use of independent encryption keys for both training and testing images for the first time. In this paper, a novel pixel-based image encryption method that maintains important features of original images is proposed for privacy-preserving DNNs. For training, a DNN model is trained with images encrypted by using the proposed method with independent encryption keys. For testing, the model enables us to apply both encrypted images and plain images for image classification. Therefore, there is no need to manage keys. In addition, the proposed method allows us to perform data augmentation in the encrypted domain. In an experiment, the proposed method is applied to well-known networks, that is, deep residual networks and densely connected convolutional networks, for image classification. The experimental results demonstrate that the proposed method, under the use of independent encryption keys, can maintain a high classification performance, and it is robust against ciphertext-only attacks (COAs). Moreover, the results confirm that the proposed scheme is able to classify plain images as well as encrypted images, even when data augmentation is carried out in the encrypted domain.

84 citations

Journal ArticleDOI
31 Jan 2019
TL;DR: A novel grayscale-based block scrambling image encryption scheme is presented not only to enhance security, but also to improve the compression performance for Encryption-then-Compression (EtC) systems with JPEG compression, which are used to securely transmit images through an untrusted channel provider.
Abstract: A novel grayscale-based block scrambling image encryption scheme is presented not only to enhance security, but also to improve the compression performance for Encryption-then-Compression (EtC) systems with JPEG compression, which are used to securely transmit images through an untrusted channel provider. The proposed scheme enables the use of a smaller block size and a larger number of blocks than the color-based image encryption scheme. Images encrypted using the proposed scheme include less color information due to the use of grayscale images even when the original image has three color channels. These features enhance security against various attacks, such as jigsaw puzzle solver and brute-force attacks. Moreover, generating the grayscale-based images from a full-color image in YCbCr color space allows the use of color sub-sampling operation, which can provide the higher compression performance than the conventional grayscale-based encryption scheme, although the encrypted images have no color information. In an experiment, encrypted images were uploaded to and then downloaded from Twitter and Facebook, and the results demonstrated that the proposed scheme is effective for EtC systems and enhances the compression performance, while maintaining the security against brute-force and jigsaw puzzle solver attacks.

78 citations


Cites methods from "ECG Data Encryption Then Compressio..."

  • ...In [3, 14, 15], the compression methods for EtC systems have been proposed, but they are not applicable to EtC systems with JPEG compression....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: The theoretical bases behind the direct ECG data compression schemes are presented and classified into three categories: tolerance-comparison compression, DPCM, and entropy coding methods and a framework for evaluation and comparison of ECG compression schemes is presented.
Abstract: Electrocardiogram (ECG) compression techniques are compared, and a unified view of these techniques is established. ECG data compression schemes are presented in two major groups: direct data compression and transformation methods. The direct data compression techniques are ECG differential pulse code modulation (DPCM) and entropy coding, AZTEC, Turning-point, CORTES, Fan and SAPA algorithms, peak-picking, and cycle-to-cycle compression methods. The transformation methods include Fourier, Walsh, and Karhunen-Loeve transforms. The theoretical bases behind the direct ECG data compression schemes are presented and classified into three categories: tolerance-comparison compression, DPCM, and entropy coding methods. A framework for evaluation and comparison of ECG compression schemes is presented. >

690 citations


"ECG Data Encryption Then Compressio..." refers background in this paper

  • ...A survey and comparison of early works can be found in [4]....

    [...]

  • ...Generally, compression approaches can be classified into three categories: direct, parameter extraction, and transform methods [4]....

    [...]

Journal ArticleDOI
TL;DR: A wavelet electrocardiogram (ECG) data codec based on the set partitioning in hierarchical trees (SPIHT) compression algorithm is proposed and is significantly more efficient in compression and in computation than previously proposed ECG compression schemes.
Abstract: A wavelet electrocardiogram (ECG) data codec based on the set partitioning in hierarchical trees (SPIHT) compression algorithm is proposed in this paper. The SPIHT algorithm (A. Said and W.A. Pearlman, IEEE Trans. Ccts. Syst. II, vol. 6, p. 243-50, 1996) has achieved notable success in still image coding. The authors modified the algorithm for the one-dimensional case and applied it to compression of ECG data. Experiments on selected records from the MIT-BIH arrhythmia database revealed that the proposed codec is significantly more efficient in compression and in computation than previously proposed ECG compression schemes. The coder also attains exact bit rate control and generates a bit stream progressive in quality or rate.

521 citations

Journal ArticleDOI
TL;DR: Pilot data from a blind evaluation of compressed ECG's by cardiologists suggest that the clinically useful information present in original ECG signals is preserved by 8:1 compression, and in most cases 16:1 compressed ECGs are clinically useful.
Abstract: Wavelets and wavelet packets have recently emerged as powerful tools for signal compression. Wavelet and wavelet packet-based compression algorithms based on embedded zerotree wavelet (EZW) coding are developed for electrocardiogram (ECG) signals, and eight different wavelets are evaluated for their ability to compress Holter ECG data. Pilot data from a blind evaluation of compressed ECG's by cardiologists suggest that the clinically useful information present in original ECG signals is preserved by 8:1 compression, and in most cases 16:1 compressed ECG's are clinically useful.

445 citations


"ECG Data Encryption Then Compressio..." refers methods in this paper

  • ...The commonly used transform methods include the Fourier transform [13], Karhunen-Loeve transform (KLT) [14], 2D discrete cosine transform (DCT) [15], Walsh transform [16], the wavelet transform [17], and singular value decomposition (SVD) [18]–[20]....

    [...]

Journal ArticleDOI
TL;DR: A preprocessing program developed for real-time monitoring of the electrocardiogram by digital computer has proved useful for rhythm analysis.
Abstract: A preprocessing program developed for real-time monitoring of the electrocardiogram by digital computer has proved useful for rhythm analysis. The program suppresses low amplitude signals, reduces the data rate by a factor of about 10, and codes the result in a form convenient for analysis.

374 citations


"ECG Data Encryption Then Compressio..." refers background in this paper

  • ...Examples include amplitude zone time epoch coding (AZTEC) [5], the coordinate reduction time encoding system (CORTES) [6], scan along polygonal approximation (SAPA) [7], and differential pulsecode modulation (DPCM) [8]....

    [...]

  • ...[5] J. R. Cox, F. M. Nolle, H. A. Fozzard, and C. G. Oliver, “AZTEC, a preprocessing program for real time ECG rhythm analysis,” IEEE Trans....

    [...]

Journal ArticleDOI
TL;DR: Although counter-intuitive, it is shown surprisingly that, through the use of coding with side information principles, this reversal of order is indeed possible in some settings of interest without loss of either optimal coding efficiency or perfect secrecy.
Abstract: When it is desired to transmit redundant data over an insecure and bandwidth-constrained channel, it is customary to first compress the data and then encrypt it. In this paper, we investigate the novelty of reversing the order of these steps, i.e., first encrypting and then compressing, without compromising either the compression efficiency or the information-theoretic security. Although counter-intuitive, we show surprisingly that, through the use of coding with side information principles, this reversal of order is indeed possible in some settings of interest without loss of either optimal coding efficiency or perfect secrecy. We show that in certain scenarios our scheme requires no more randomness in the encryption key than the conventional system where compression precedes encryption. In addition to proving the theoretical feasibility of this reversal of operations, we also describe a system which implements compression of encrypted data.

352 citations