Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 6, pp 6763–6786 | Cite as

QR code based color image cryptography for the secured transmission of ECG signal

  • P. Mathivanan
  • A. Balaji GaneshEmail author
Article
  • 108 Downloads

Abstract

The paper presents a novel QR code based color image steganography to facilitate remote transmission of ECG signal along with patient diagnosis data. The proposed system is configured with two stage security processes, namely pixel permutation and chaos encryption. A three step sequential strategy is adapted for the implementation of the system. At first, the diagnose information in the form of alphanumeric data is given to QR code generator for the generation of equivalent 2D binary matrix. Similarly, the ECG signal samples are transformed into alphanumeric cipher text by involving integer to binary sequence conversion process and eventually into corresponding QR codes. Secondly, the both diagnose data as well as ECG signal integrated QR codes are embedded within individual R, G and B color image components by using the pixel permutation process. Finally, the color image components, R, B and G are individually encrypted by using 1D chaotic encryption technique as an attempt to enhance further the security of existing steganography process. The experimental results are validated in terms of NCPR, UACI and also entropy which found to be better and comparable than other baseline algorithms.

Keywords

Pixel permutation Color image encryption Chaos Security analysis 

Notes

References

  1. 1.
    A pivot-hinged, multilayer SU-8 micro motion amplifier assembled by a self-aligned approachGoogle Scholar
  2. 2.
    Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17:4653–4661MathSciNetCrossRefGoogle Scholar
  3. 3.
    Ardagna CA, Cremonini M, De Capitani Di Vimercati S, Samarati P (2008a) A privacy-aware access control system. J Comput Secur 16(4):369–397.  https://doi.org/10.3233/JCS-2008-0328 CrossRefGoogle Scholar
  4. 4.
    Arnold VI (1968) Ergodic problems of classical mechanics. Mathematical physics monograph series. WA Ben jams in Inc, New YorkGoogle Scholar
  5. 5.
    Barrera JF, Mira A, Torroba R (2013) Optical encryption and QR codes: secure and noise-free information retrieval. Opt Express 21(5):5373–5378CrossRefGoogle Scholar
  6. 6.
    Barrera JF, Mira-Agudelo A, Torroba R (2014) Experimental QR code optical encryption: noise-free data recovering. Opt Lett 39(10):3074–3077CrossRefGoogle Scholar
  7. 7.
    Bertino E. Yang Y. Ooi BC. & Deng RH (2005c) Privacy and ownership preserving of outsourced medical data. Proc. - Int. Conf. Data Eng., (Icde): 521–532.  https://doi.org/10.1109/ICDE.2005.111
  8. 8.
    Bilal M et al (2014) Chaos based zero-steganography algorithm. Multimed Tools Appl 72(2):1073–1092CrossRefGoogle Scholar
  9. 9.
    Brumen B, Heričko M, Sevčnikar A, Završnik J, Hölbl M (2013d) Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues? J Med Internet Res 15(12):e283.  https://doi.org/10.2196/jmir.2471 CrossRefGoogle Scholar
  10. 10.
    El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157CrossRefGoogle Scholar
  11. 11.
    Engin M, Çidam O, Engin EZ (2005) Wavelet transformation based watermarking technique for human electrocardiogram (ECG). J Med Syst 29(6):589–594CrossRefGoogle Scholar
  12. 12.
    Ibaida A, Khalil I (2013) Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans Biomed Eng 60(12):3322–3330CrossRefGoogle Scholar
  13. 13.
    International Standard ISO/IEC 18004 (2006) Information technology – automatic identification and data capture techniques – QR Code 2005 bar code symbology specification, Second EditionGoogle Scholar
  14. 14.
    Jain M, Lenka SK, Vasistha SK (2016) Adaptive circular queue image steganography with RSA cryptosystem. Perspect Sci 8:417–420CrossRefGoogle Scholar
  15. 15.
    Jain M, Kumar A, Choudhary RC (2017) Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem. Brain Info 4(2):95–106CrossRefGoogle Scholar
  16. 16.
    Jawad LM, G Sulong (2015) A survey on emerging challenges in selective color image encryption techniques." Indian Journal of Science and Technology 8.27Google Scholar
  17. 17.
    Jero SE, Ramu P, Ramakrishnan S (2014) Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J Med Syst 38.10:132CrossRefGoogle Scholar
  18. 18.
    Kalpana J, Murali P (2015) An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Optik-Int J Light Electron Optics 126(24):5703–5709CrossRefGoogle Scholar
  19. 19.
    Kaur R, Singh EK (2013) Image encryption techniques: a selected review. J Comput Eng 9(6):80–83Google Scholar
  20. 20.
    Law P (1996b) Health Insurance Portability and Accountability Act of 1996. Public Law 104–191. US. Statut. Large, 1101936–2103Google Scholar
  21. 21.
    Li M, Yu S, Zheng Y, Ren K, Lou W (2013e) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143.  https://doi.org/10.1109/TPDS.2012.97 CrossRefGoogle Scholar
  22. 22.
    Li L et al (2016) An aesthetic QR code solution based on error correction mechanism. J Syst Softw 116:85–94CrossRefGoogle Scholar
  23. 23.
    Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246CrossRefGoogle Scholar
  24. 24.
    Lin Y-H et al (2004) A wireless PDA-based physiological monitoring system for patient transport. IEEE Trans Inf Technol Biomed 8(4):439–447CrossRefGoogle Scholar
  25. 25.
    Maheswari SU, Jude Hemanth D (2015) Frequency domain QR code based image steganography using Fresnelet transform. AEU-Int J Electron Commun 69(2):539–544CrossRefGoogle Scholar
  26. 26.
    Mazloom S, Eftekhari-Moghadam A (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos, Solitons Fractals 42:1745–1754CrossRefGoogle Scholar
  27. 27.
    Murugan B, Gounder A (2016) Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput Vis 10:593–602CrossRefGoogle Scholar
  28. 28.
    Nassar SS et al (2016) Secure wireless image communication using LSB steganography and chaotic baker ciphering. Wirel Pers Commun 91(3):1023–1049CrossRefGoogle Scholar
  29. 29.
    Ng HS, Sim ML, Tan CM (2006f) Security issues of wireless sensor networks in healthcare applications. BT Technol J 24(2):138–144.  https://doi.org/10.1007/s10550-006-0051-8 CrossRefGoogle Scholar
  30. 30.
    Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137CrossRefGoogle Scholar
  31. 31.
    Pashakolaee PG, Shahhoseini HS, Mollajafari M (2017). Hyper-chaotic Feeded GA (HFGA): a reversible optimization technique for robust and sensitive image encryption. Multimedia Tools and Applications, 1–30Google Scholar
  32. 32.
    Passively self-aligned assembly of compact barrel hinges for high-performance, out-of-plane MEMS actuatorsGoogle Scholar
  33. 33.
    Priya S, B Santhi, P Swaminathan (2017) Hybrid Transform Based Reversible Watermarking Technique for Medical Images in Telemedicine Applications." Optik-International Journal for Light and Electron OpticsGoogle Scholar
  34. 34.
    Ramesh G, Hambiraja E, Umarani DR (2012) A survey on various most common encryption techniques. Int J Adv Res Comput Sci Softwar Eng 2(7):226–233Google Scholar
  35. 35.
    Roy R, Sarkar A, Changder S (2013) Chaos based edge adaptive image steganography. Proced Technol 10:138–146CrossRefGoogle Scholar
  36. 36.
    Scalable, MEMS-enabled, vibrational tactile actuators for high resolution tactile displays, JMM 2014Google Scholar
  37. 37.
    Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92:1202–1215CrossRefGoogle Scholar
  38. 38.
    Seyedzadeh SM, Norouzi B, Mosavi MR et al (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81:511MathSciNetCrossRefGoogle Scholar
  39. 39.
    Wang X, Zhang H-l (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51–60CrossRefGoogle Scholar
  40. 40.
    Wang Y et al (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522MathSciNetCrossRefGoogle Scholar
  41. 41.
    Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92:1101–1108CrossRefGoogle Scholar
  42. 42.
    Wang L, Song H, Liu P (2016) A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt Lasers Eng 77:118–125CrossRefGoogle Scholar
  43. 43.
    Wei X et al (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299CrossRefGoogle Scholar
  44. 44.
    Wong K-W, Kwok BS-H, Law W-S (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A372(15):2645–2652CrossRefGoogle Scholar
  45. 45.
    Zhang Xiaoqiang, Zhu Guiliang, Wang Weiping, Wang Mengmeng, Ma Shilong (1968) Period law of discrete two-dimensional Arnold transformation. In: Proceedings of the 2010 fifth international conference on frontier of computer science and technology 565–9Google Scholar
  46. 46.
    Xie X, Zaitsev Y, Velasquez-Garcia L, Teller S, Livermore C (2014) Compact, scalable, high-resolution, MEMS-enabled tactile displays. In Proc. of Solid-State Sensors, Actuators, and Microsystems Workshop 127–130Google Scholar
  47. 47.
    Yang H, Wong K-W, Liao X, Zhang W, Wei P (2010) A fast image encryption and authentication scheme based on chaotic maps. Commun Non linear Sci Numer Simul 15(11):3507–3517CrossRefGoogle Scholar
  48. 48.
    Yavuz E et al (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483CrossRefGoogle Scholar
  49. 49.
    Zhai X et al. (2016) ECG encryption and identification based security solution on the Zynq SoC for connected health systems. J Paral Distrib ComputGoogle Scholar
  50. 50.
    Zhenjun T, Juan S, Xianquan Z, Ronghai S (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80(5):1–11Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Electronics and communication EngineeringVelammal Engineering CollegeChennaiIndia
  2. 2.Electronic System Design Laboratory, Department of Electrical and Electronics EngineeringVelammal Engineering CollegeChennaiIndia

Personalised recommendations