scispace - formally typeset
Proceedings ArticleDOI

Steganography techniques for ECG signals : A survey

01 Dec 2016-pp 269-273

TL;DR: Various ECG Steganography techniques that have been used by researchers are discussed; in which patient details and diagnosis report are embedded into ECG signals.

AbstractMedical Images have been widely used to diagnose and detect the abnormalities in the human body. In this study, we have focused on ECG (Electrocardiography) signals which play a vital role in diagnosing Cardio Vascular Disease (CVD). CVD is most prevalent among the people because of changing lifestyle, Age, Tobacco, etc. According to the WHO (World Health Organization) report in 2012, around 17 million people die each year because of CVD, which represents 31% of the overall death rate. Due to the advancement in the e-Health care system, most of the ECG signals along with the patient's sensitive data are transmitted among doctors and hospitals for detailed analysis. According to the HIPAA act, it should be made sure that patient's details are to be sent securely during the transmission. In this study various ECG Steganography techniques that have been used by researchers are discussed; in which patient details and diagnosis report are embedded into ECG signals.

...read more


Citations
More filters
Journal ArticleDOI
11 Oct 2018-Sensors
TL;DR: Experimental work on the assessment of the loss of ECG (electrocardiogram signal) diagnostic quality from the industrial standard EN60601-2-25:2015 point of view is presented and the Symlet of 11-th order is found as the best of the wavelets that were tested.
Abstract: Watermarking is currently investigated as an efficient and safe method of embedding additional patient or environment-related data into the electrocardiogram. This paper presents experimental work on the assessment of the loss of ECG (electrocardiogram signal) diagnostic quality from the industrial standard EN60601-2-25:2015 point of view. We implemented an original time-frequency watermarking technique with an adaptive beat-to-beat lead-independent data container design. We tested six wavelets, six coding bit depth values (including the automatic noise-dependent one) and two types of watermark content to find the conditions that are necessary for watermarked ECG to maintain the compliance with International Electrotechnical Commission (IEC) requirements for interpretation performance. Unlike other authors, we did not assess the differences of signal values, but errors in ECG wave delineation results. The results of a total of 7300 original and watermarked 10 s ECGs were statistically processed to reveal possible interpretation quality degradation due to watermarking. Finally we found (1) the Symlet of 11-th order as the best of the wavelets that were tested; (2) the important role of ECG wave delineation and noise tracking procedures; (3) the high influence of the watermark-to-noise similarity of amplitude and values distribution and (4) the stability of the watermarking capacity for different heart rates in atrial rhythms.

7 citations


Cites methods from "Steganography techniques for ECG si..."

  • ...Suganya [13] is specifically focused on steganography methods using the ECG as a carrier signal....

    [...]

Proceedings ArticleDOI
30 Dec 2018
TL;DR: A method for integrating the exercise and environmental data into a digital ECG structure by watermarking technique is presented and it is proved the watermarked ECG to maintain the wave borders accuracy within tolerance limits.
Abstract: Exercise test is worldwide recognized as a valuable tool for investigating ST segment-based ischemia markers. Due to load-related risk, the test is reserved for office use, what causes inconvenience, limits patients participation rate and precludes screening for early ischemia stages. Transferring the diagnosis to patients' premises and using everyday activities as a stimulus is an interesting alternative, but needs reliable recording of physical load data. This paper presents a method for integrating the exercise and environmental data into a digital ECG structure by watermarking technique. The method analyses the time-scale ECG representation, detects the bandgap, where the bandwidth of actual cardiac content is lower than the throughput of digital series, detects the noise and replaces it by exercise-related data. Unless in irregular signals, the capacity of data container can accommodate an accompanying accelerometer and environment-related signals without deteriorating the ECG content. This makes possible to perform ECG exercise test in home conditions without additional transmission channels or data structures. The method was tested with CSE database accordingly to EN60601-2-25:2015 and proved the watermarked ECG to maintain the wave borders accuracy within tolerance limits. Consequently, restoration of original ECG record is not necessary. The method was also tested with anonymized stress-test records, which were watermarked with accelerometer data and re-interpreted to yield results fairly comparable to original diagnoses.

Cites methods from "Steganography techniques for ECG si..."

  • ...In case of ECG various approaches were proposed [10-11], however we use the concept of instantaneous bandwidth of the electrocardiogram (IBE) developed in our previous papers [12-13]....

    [...]


References
More filters
Journal ArticleDOI
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Abstract: This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

6,058 citations

Journal ArticleDOI
TL;DR: The experimental results for many standard test images show that prediction-error expansion doubles the maximum embedding capacity when compared to difference expansion, and there is a significant improvement in the quality of the watermarked image, especially at moderate embedding capacities.
Abstract: Reversible watermarking enables the embedding of useful information in a host signal without any loss of host information. Tian's difference-expansion technique is a high-capacity, reversible method for data embedding. However, the method suffers from undesirable distortion at low embedding capacities and lack of capacity control due to the need for embedding a location map. We propose a histogram shifting technique as an alternative to embedding the location map. The proposed technique improves the distortion performance at low embedding capacities and mitigates the capacity control problem. We also propose a reversible data-embedding technique called prediction-error expansion. This new technique better exploits the correlation inherent in the neighborhood of a pixel than the difference-expansion scheme. Prediction-error expansion and histogram shifting combine to form an effective method for data embedding. The experimental results for many standard test images show that prediction-error expansion doubles the maximum embedding capacity when compared to difference expansion. There is also a significant improvement in the quality of the watermarked image, especially at moderate embedding capacities

1,069 citations

01 Jan 2002
TL;DR: A high capacity and high quality reversible watermarking method based on difference expansion that does not need to compress original values of the embedding area and explores the redundancy in the digital content to achieve reversibility.
Abstract: Reversible watermark has drawn lots of interest recently. Different from other types of digital watermarks, a reversible watermark has a special feature that the original digital content can be completely restored. In this paper we describe a high capacity and high quality reversible watermarking method based on difference expansion. A noticeable difference between our method and others is that we do not need to compress original values of the embedding area. We explore the redundancy in the digital content to achieve reversibility.

152 citations


"Steganography techniques for ECG si..." refers methods in this paper

  • ...Difference expansion [12] was introduced by Tian et al in 2002....

    [...]

Journal ArticleDOI
TL;DR: A wavelet-based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data and it is found that the proposed technique provides high-security protection for patients data with low distortion and ECG data remain diagnosable after watermarking.
Abstract: With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as point-of-care (PoC) applications in hospitals around the world. Therefore, huge amount of ECG signal collected by body sensor networks from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level, etc., and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data are being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this paper, a wavelet-based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest. To evaluate the effectiveness of the proposed technique on the ECG signal, two distortion measurement metrics have been used: the percentage residual difference and the wavelet weighted PRD. It is found that the proposed technique provides high-security protection for patients data with low (less than 1%) distortion and ECG data remain diagnosable after watermarking (i.e., hiding patient confidential data) and as well as after watermarks (i.e., hidden data) are removed from the watermarked data.

145 citations


"Steganography techniques for ECG si..." refers background or methods in this paper

  • ...In 2013, Ibaida et al [3] proposed a wavelet-based steganography technique with four steps....

    [...]

  • ...5 Jero et al, 2016 PSNR, PRD, BER DWT and SVD It is observed that the usage of BCH code corrects the bit error by 28.4% but the PSNR value has been reduced by 10.5%....

    [...]

  • ...Based on the performance measure (RMSE and rRMSE), DWT and DCT show better performance when compared to DFT. Authors have not considered the size of the watermark to be used....

    [...]

  • ...Here DWT used to decompose the signal and SVD is applied to the selected sub-band in order to embed the watermark....

    [...]

  • ...Jero et al [4] have proposed a technique for performing DWT – SVD based ECG Steganography....

    [...]

Journal ArticleDOI
01 Jan 2008
TL;DR: In this paper, a flexible cryptographic key management solution is proposed to facilitate interoperations among the applied cryptographic mechanisms to comply with the HIPAA regulations.
Abstract: The Health Insurance Portability and Accountability Act (HIPAA) privacy and security regulations are two crucial provisions in the protection of healthcare privacy. Privacy regulations create a principle to assure that patients have more control over their health information and set limits on the use and disclosure of health information. The security regulations stipulate the provisions implemented to guard data integrity, confidentiality, and availability. Undoubtedly, the cryptographic mechanisms are well defined to provide suitable solutions. In this paper, to comply with the HIPAA regulations, a flexible cryptographic key management solution is proposed to facilitate interoperations among the applied cryptographic mechanisms. In addition, case of consent exceptions intended to facilitate emergency applications and other possible exceptions can also be handled easily.

141 citations


"Steganography techniques for ECG si..." refers background in this paper

  • ...According to the HIPAA act [11], privacy regulations have to be maintained which deals with the Protected Health Information (PHI) as mentioned above and Confidentiality has to be taken care that deals with the security of the data....

    [...]