Skip to main content
Log in

Encryption of ECG signals for telemedicine applications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Multimedia security has been extensively used in content protection, image authentication, data hiding and signal encryption. Similarly, transmission of biomedical data or information remotely for healthcare applications should be secure. One of the important medical signals that need to be transmitted to healthcare centers is the Electrocardiogram (ECG) signal. This paper is concerned mainly with ECG signal encryption for security applications. The paper presents three cryptosystems for ECG signal encryption based on the fusion of ECG signals with other masking signals that are rich in activities such as speech signals. The common thread between these cryptosystems is the operation on sample values of the ECG signal rather than adopting encoding and decoding schemes, and this saves much time and is more immune to both noise and hacking scenarios. The proposed cryptosystems are compared to the encryption technique that uses 1-D logistic map. The performances of the proposed cryptosystems are evaluated through simulation experiments in terms of histogram, structural similarity index, Signal-to-Noise Ratio (SNR), log-likelihood ratio, spectral distortion and correlation coefficient. It is clear from the experiments that the utilization of more levels of encryption increases the security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Tong Bai, Jinzhao Lin, Guoquan Li, Huiqian Wang, Peng Ran, Zhangyong Li,Dan Li, Yu Pang, Wei Wu, and Gwanggil Jeon,(2018). A lightweight method of data encryption in BANs using electrocardiogram signal. In future generation computer systems. March 2019 92:800-811. DOI: https://doi.org/10.1016/j.future.2018.01.031, database: science direct.

  2. Baig MM, GholamHosseini H, Moqeem AA, Mirza F, Lindén M (2019) Clinical decision support systems in hospital care using ubiquitous devices: current issues and challenges. Health informatics journal 25(3):1091–1104. https://doi.org/10.1177/1460458217740722

    Article  Google Scholar 

  3. Siddharth Bhalerao, Irshad Ahmad Ansari, Anil Kumar, Deepak Kumar Jain, ( 2019). A reversible and multipurpose ECG data hiding technique for telemedicine applications“, Pattern Recognition Letters , Jul2019, Vol. 125, p463–473, 11p; DOI: https://doi.org/10.1016/j.patrec..06.004, Database: Applied Science & Technology Source

  4. Chai, Xiuli, Gan, Zhihua, Chen, Yiran, Zhang, Yushu. (2016). A visually secure image encryption scheme based on compressive sensing Signal Processing 134. https://doi.org/10.1016/j.sigpro.2016.11.016.

  5. Claudio DC, Meduri A, Morello R (2010) A Smart ECG Measurement System Based on Web-Service-Oriented Architecture for Telemedicine Applications. Instrumentation and Measurement, IEEE Transactions on 59:2530–2538. https://doi.org/10.1109/TIM.2010.2057652

    Article  Google Scholar 

  6. Clifford, Gari D., Francisco Azuaje, And Patrick McSharry.)2006(. Advanced methods and tools for ECG data analysis. Boston: Artech House http://www.books24x7.com/marc.asp.

  7. H Ding, C Xie, and L Zeng, )2016(“. The Correlation Between Signal Distance and Consonant Pronunciation in Mandarin Words”, Chinese Spoken Language Processing (ISCSLP), 2016 10th International Symposium Conference: IEEE Xplore.

  8. El-Hoseny HM, El Kareh ZZ, Mohamed WA et al (2019) An optimal wavelet-based multi-modality medical image fusion approach based on modified central force optimization and histogram matching. Multimed Tools Appl 78:26373–26397. https://doi.org/10.1007/s11042-019-7552-1

    Article  Google Scholar 

  9. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(6):1259–1284

    Article  MathSciNet  Google Scholar 

  10. Golpîra H, Danyali H (2010) Reversible blind watermarking for medical images based on wavelet histogram shifting. IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2009:31–36. https://doi.org/10.1109/ISSPIT.2009.5407489

    Article  Google Scholar 

  11. Guang Z, Carmen P, Yuan-Ting Z (2011) Analysis of Using Interpulse Intervals to Generate 128-Bit Biometric Random Binary Sequences for Securing Wireless Body Sensor Networks. IEEE transactions on information technology in biomedicine : a publication of the IEEE Engineering in Medicine and Biology Society 16:176–182. https://doi.org/10.1109/TITB.2011.2173946

    Article  Google Scholar 

  12. Hameed M, Nurulfajar AM, Attiah M (2019) Comparative study of several operation modes of AES algorithm for encryption ECG biomedical signal. International Journal of Electrical and Computer Engineering 9:4850–4859. https://doi.org/10.11591/ijece.v9i6.pp4850-4859

    Article  Google Scholar 

  13. Hashad, Fatma, Zahran, O., El-Rabaie, El-Sayed, Elashry, Ibrahim, Abd El-Samie, Fathi. (2019). Fusion-based encryption scheme for cancelable fingerprint recognition Multimedia Tools and Applications 78. https://doi.org/10.1007/s11042-019-7580-x

  14. Pei Huang, Borui Li, Linke Guo, Zhanpeng Jin, Yu Chen, (2016) “A robust and reusable ecg-based authentication and data encryption scheme for ehealth systems “2016 IEEE Global Communications Conference, Pages: 1–6,.

  15. Jagadish N, Rajendra AU, Kumar M (2009) Efficient Storage and Transmission of Digital Fundus Images with Patient Information Using Reversible Watermarking Technique and Error Control Codes. Journal of medical systems 33:163–171. https://doi.org/10.1007/s10916-008-9176-2.

    Article  Google Scholar 

  16. Zheng Kai-mei, Qian Xu. (2008). Reversible data hiding for electrocardiogram signal based on wavelet transforms. 295–299. https://doi.org/10.1109/CIS.2008.71.

  17. Lila R, Abdusalam S, Masoud T, Amirhossein G, Arshad B (2019) Healthcare big data processing mechanisms: The role of cloud computing. International Journal of Information Management 49:271–289. https://doi.org/10.1016/j.ijinfomgt.2019.05.017.

    Article  Google Scholar 

  18. Lucani, Daniel, Cataldo, Giancarlos, Cruz, Julio, Villegas, Guillermo, Wong, Sara. (2006). A portable ECG monitoring device with Bluetooth and Holter capabilities for telemedicine applications. Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Conference. 1. 5244–7. https://doi.org/10.1109/IEMBS.2006.260798

  19. Manjunath G., Anand Gargeshwari. (2002). Speech encryption using circulant transformations. Proceedings - 2002 IEEE International Conference on Multimedia and Expo, ICME 2002. 1. 553–556 vol.1. https://doi.org/10.1109/ICME.2002.1035841.

  20. Merone, Mario & Soda, Paolo, Sansone, Mario, Sansone, Carlo. (2016). ECG databases for biometric systems: a systematic review. Expert Syst Appl 67. https://doi.org/10.1016/j.eswa.2016.09.030.

  21. Moody, GB, Mark, RG (2001). The impact of the MIT-BIH arrhythmia database. IEEE engineering in medicine and biology magazine: the quarterly magazine of the engineering in Medicine & Biology Society. 20. 45-50. https://doi.org/10.1109/51.932724.

  22. Muhammad M, Sapiee J, Abdulkadir D, Zahraddeen P, Nur S, Mustafa MD (2017) A Survey on the Cryptographic Encryption Algorithms. International Journal of Advanced Computer Science and Applications 8:333–344

    Article  Google Scholar 

  23. Murillo-Escobar, Miguel, Cardoza-Avendaño, L., Lopez-Gutierrez, Rosa, Cruz-Hernández, C.. (2017). A double chaotic layer encryption algorithm for clinical signals in telemedicine. J Med Syst 41. https://doi.org/10.1007/s10916-017-0698-3.

  24. Pak, Chanil, Huang, Lilian. (2017). A new color image encryption using combination of the 1D chaotic map. Signal Process 138. https://doi.org/10.1016/j.sigpro.2017.03.011.

  25. Anukul Pandey , Butta Singh, Barjinder Singh Saini, Neetu Sood (2019). A novel fused coupled chaotic map based confidential data embedding-then-encryption of electrocardiogram signal “ In Biocybernetics and Biomedical Engineering. April–June 2019 39(2):282–300 Language: English. DOI: https://doi.org/10.1016/j.bbe.2018.11.012, Database: ScienceDirect

  26. Pascal S, Jozue F (1996) Speech enhancement based on a priori signal to noise estimation. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings 2(2):629–632. https://doi.org/10.1109/ICASSP.1996.543199.

    Article  Google Scholar 

  27. Patel V, Ratha N, Chellappa R (2015) Cancelable biometrics: a review. Signal processing magazine. IEEE. 32:54–65. https://doi.org/10.1109/MSP.2015.2434151

    Article  Google Scholar 

  28. Pillai, Jaishanker, Patel, Vishal, Chellappa, Rama, Ratha, Nalini. (2011). Secure and robust Iris recognition using random projections and sparse representations. IEEE Trans Pattern Anal Mach Intell 33. https://doi.org/10.1109/TPAMI.2011.34.

  29. Ponnambalam, Mathivanan & Ganesh, A. & Rv, Venkatesan. (2019). QR code–based ECG signal encryption/decryption algorithm. Cryptologia. https://doi.org/10.1080/01611194.2018.1549122.

  30. Raeiatibanadkooki Mahsa, Quchani Saeed, Khalilzadeh Mohammad Mahdi, Bahaadinbeigy Kambiz. (2016). Compression and encryption of ECG signal using wavelet and chaotically Huffman code in telemedicine application. J Med Syst 40. https://doi.org/10.1007/s10916-016-0433-5.

  31. Rajendra AU, Udipi N, Choo L (2004) Simultaneous storage of patient information with medical images in the frequency domain. Computer Methods and Programs in Biomedicine 76:13–19. https://doi.org/10.1016/j.cmpb.2004.02.009.

    Article  Google Scholar 

  32. RajendraAcharya U, Suri JS, Spaan JAE, Krishnan SM (2007) Advances in cardiac signal processing. Springer-Verlag, Berlin Heidelberg

    MATH  Google Scholar 

  33. Saad SA, Hato E (2014) A speech encryption based on chaotic maps. Int J Comput Appl 93:19–28

    Google Scholar 

  34. Rahimi Moosavi Sanaz, Nigussie Ethiopia, Levorato Marco, Virtanen Seppo, Isoaho Jouni. (2017). Low-latency Approach for Secure ECG Feature Based Cryptographic Key Generation. IEEE Access. PP. 1–1. https://doi.org/10.1109/ACCESS.2017.2766523.

  35. Rahimi Moosavi Sanaz, Nigussie Ethiopia, Virtanen Seppo, Isoaho Jouni. (2017). Cryptographic key generation using ECG signal https://doi.org/10.1109/CCNC.2017.7983280.

  36. Sankari, V, Nandhini, K. (2015). Steganography technique to secure patient confidential information using ECG signal. 2014 international conference on information communication and embedded systems, ICICES 2014. https://doi.org/10.1109/ICICES.2014.7033925.

  37. Shih-Chin F, Hsiao-Lung C (2009) Human identification by quantifying similarity and dissimilarity in electrocardiogram phase space. Pattern Recognition 42:1824–1831. https://doi.org/10.1016/j.patcog.2008.11.020.

    Article  Google Scholar 

  38. Vinod K, Suresh S, Giri V (2006) Direct data compression of ECG signal for telemedicine. Int. J. Systems Science. 37:45–63. https://doi.org/10.1080/00319100500412337.

    Article  MATH  Google Scholar 

  39. Wang, Xiong & Chen, Guanrong. (2012). Constructing a chaotic system with any number of equilibria. Nonlinear Dynamics 71. https://doi.org/10.1007/s11071-012-0669-7.

  40. Fei Wang , Qiming Ma, Wenhan Liu, Sheng Chang, Hao Wang, Jin He, Qijun Huang (2019). A novel ECG signal compression method using spindle convolutional auto-encoder” In Computer Methods and Programs in Biomedicine journal, July 2019 175:139–150. DOI: https://doi.org/10.1016/j.cmpb.2019.03.019, Database: ScienceDirect

  41. Yue W, Gelan Y, Huixia J, Joseph N (2012) Image encryption using the two-dimensional logistic chaotic map. Journal of Electronic Imaging 21:3014. https://doi.org/10.1117/1.JEI.21.1.013014

    Article  Google Scholar 

  42. Zhang Y, Wenying W, Moting S, Ming L (2014) Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik - International Journal for Light and Electron Optics 125:1562–1564. https://doi.org/10.1016/j.ijleo.2013.09.018

    Article  Google Scholar 

  43. Zhou W, Alan B, Hamid S, Eero S (2004) Image Quality Assessment: From Error Visibility to Structural Similarity. Image Processing, IEEE Transactions on 13:600–612. https://doi.org/10.1109/TIP.2003.819861.

    Article  Google Scholar 

  44. Zhou Y, Long B, Chen C (2014) A new 1D chaotic system for image encryption. Signal Processing 97:172–182. https://doi.org/10.1109/ICSSE.2012.6257151

    Article  Google Scholar 

Download references

Acknowledgments

This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abeer D. Algarni.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Algarni, A.D., Soliman, N.F., Abdallah, H.A. et al. Encryption of ECG signals for telemedicine applications. Multimed Tools Appl 80, 10679–10703 (2021). https://doi.org/10.1007/s11042-020-09369-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09369-5

Keywords

Navigation