Advertisement

QR code based patient data protection in ECG steganography

  • Ponnambalam Mathivanan
  • Sam Edward Jero
  • Palaniappan Ramu
  • Athi Balaji Ganesh
Technical Paper
  • 56 Downloads

Abstract

Connected health enables patient centric interventions resulting in better healthcare and hence better living. In order to accomplish this, bio-signals, medical and diagnosis information are shared and accessed by multiple actors and it is important to protect the privacy of patient data. Steganography is widely used to protect patient data by hiding it in the medical information. Current work investigates ECG steganography using Discrete Wavelet Transform (DWT) and Quick Response (QR) code. Steganography deteriorates the ECG signal and it is important to minimize this deterioration to preserve diagnosability. 1D ECG signal is converted to 2D ECG image and decomposed into sub-bands by subjecting it to DWT. The novelty of the proposed approach lies in converting the patient data into QR code and using it as watermark in ECG steganography. The QR code is embedded in the 2D image using additive quantization scheme. The performance of proposed method is measured using Peak Signal to Noise Ratio, Percentage Residual Difference and Kullback–Leibler distance. These metrics are used as a measure of imperceptibility while the data loss during retrieval is measured by Bit Retrieval Rate. The proposed method is demonstrated on normal ECG signals obtained from MIT-BIH database for different QR code versions. Metrics reveal that imperceptibility decreased for increasing patient data size and increasing scaling factors. Metrics were independent of the sub-band and the proposed method allows reliable patient data protection with full retrieval ability.

Keywords

ECG steganography Discrete wavelet transform Quick response code Additive quantization Similarity metrics Bit retrieval rate 

Notes

Acknowledgements

A. Balaji Ganesh acknowledges the financial support of Department of Science and Technology under Technology Intervention for Elderly (TIE) scheme (No. SSD/TISN/047/2011-TIE Dt. 08.05.2014) to Velammal Engineering College, Chennai. Part of this research work was supported by this financial support.

Compliance with ethical standards

Conflict of interest

Authors, P. Mathivanan, Edward jero, Palaniappan Ramu and A. Balaji Ganesh declares that they have no conflict of interest.

Ethical Approval

This article does not contain any studies involving human participants and animal as subjects performed by any of the authors.

References

  1. 1.
    Ardagna CA, Cremonini M, De Capitani Di Vimercati S, Samarati P (2008) A privacy-aware access control system. J Comput Secur 16(4):369–397CrossRefGoogle Scholar
  2. 2.
    Law P (1996) Health insurance portability and accountability act of 1996 public law 104-191. US Statut Large 110:1936–2103Google Scholar
  3. 3.
    Bertino E, Yang Y, Ooi BC, Deng RH (2005) Privacy and ownership preserving of outsourced medical data. Proc. Int. Conf. Data Eng., (Icde), pp 521–532Google Scholar
  4. 4.
    Brumen B, Heričko M, Sevčnikar A, Završnik J, Hölbl M (2013) Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues? J Med Internet Res 15(12):e283CrossRefGoogle Scholar
  5. 5.
    Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143CrossRefGoogle Scholar
  6. 6.
    Ng HS, Sim ML, Tan CM (2006) Security issues of wireless sensor networks in healthcare applications. BT Technol J 24(2):138–144CrossRefGoogle Scholar
  7. 7.
    Zielińska E, Mazurczyk W, Szczypiorski K (2014) Trends in steganography. Commun ACM 2014:5786–5795Google Scholar
  8. 8.
    Chen ST, Guo YJ, Huang HN, Kung WM, Tseng KK, Tu SY (2014) Hiding patients confidential datainthe ECG signal viaa transform-domain quantization scheme topical collection on mobile systems. J Med Syst 38:54CrossRefGoogle Scholar
  9. 9.
    Ibaida A, Khalil I (2013) Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans Biomed Eng 60:3322–3330CrossRefGoogle Scholar
  10. 10.
    Martins D, Guyennet H (2010) Steganography in MAC layers of 802.15.4 protocol for securing wireless sensor networks. In 2010 International Conference on Multimedia Information Networking and Security (pp. 824–828)Google Scholar
  11. 11.
    Maglogiannis I, Kazatzopoulos L, Delakouridis K, Hadjiefthymiades S (2009) Enabling location privacy and medical data encryption in patient telemonitoring systems. IEEE Trans Inf Technol Biomed 13(6):946–954CrossRefGoogle Scholar
  12. 12.
    Chen H-M, Lo J-W, Yeh C-K (2012) An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J Med Syst 36(6):3907–3915CrossRefGoogle Scholar
  13. 13.
    Kong X, Feng R (2001) Watermarking medical signals for telemedicine. IEEE Trans Inf Technol Biomed 5:195–201CrossRefGoogle Scholar
  14. 14.
    Raúl RC, Claudia FU, Trinidad-Blas GDJ (2007) Data hiding scheme for medical images. In 17th International Conference on Electronics, Communications and Computers, CONIELECOMP’07, ProceedingsGoogle Scholar
  15. 15.
    Huang L-C, Tseng L-Y, Hwang M-S (2013) A reversible data hiding method by histogram shifting in high quality medical images. J Syst Softw 86(3):716–727CrossRefGoogle Scholar
  16. 16.
    Edward Jero S, Ramu P, Ramakrishnan S (2014) Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J Med Syst 38:132CrossRefGoogle Scholar
  17. 17.
    Cox IJ, Kilian J, Leighton FT, Shamoon T (1996) A secure, robust watermark for multimedia. In: Information hiding, vol. 1174, Springer, Berlin, pp. 185–206CrossRefGoogle Scholar
  18. 18.
    Lei B, Song I, Rahman SA (2013) Robust and secure watermarking scheme for breath sound. J Syst Softw 86(6):1638–1649CrossRefGoogle Scholar
  19. 19.
    Lin Y-S, Luo S-J, Chen B-Y (2013) Artistic QR code embellishment. Comput Graph Forum 32(7):137–146CrossRefGoogle Scholar
  20. 20.
    Engin M, Çidam O, Engin EZ (2005) Wavelet transformation based watermarking technique for human Electrocardiogram (ECG). J Med Syst 29(6):589–594CrossRefGoogle Scholar
  21. 21.
    Zheng KM, Qian X (2008) Reversible data hiding for electrocardiogram signal based on wavelet transforms. In Computational Intelligence and Security, 2008. CIS’08. International Conference on (Vol. 1, pp. 295–299). IEEEGoogle Scholar
  22. 22.
    Kozat SS, Vlachos M, Lucchese C, Van Herle H, Yu PS (2009) Embedding and retrieving private metadata in electrocardiograms. J Med Syst 33(4):241–259CrossRefGoogle Scholar
  23. 23.
    Ibaida A, Khalil I, Al-Shammary D (2010) Embedding patients confidential data in ECG signal for healthcare information systems. In Engineering in Medicine and Biology Society (EMBC), 2010 Annual International Conference of the IEEE (pp. 3891–3894). IEEEGoogle Scholar
  24. 24.
    Kaur S, Singhal R, Farooq O, Ahuja B (2010) Digital watermarking of ECG data for secure wireless commuication. In 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, pp 140–144. IEEEGoogle Scholar
  25. 25.
    Farooq O, Vyas AL, Datta S, Mulvaney D (2011) Watermarking biomedical signal for authentication using integer wavelet transform. In Biomedical Engineering and Informatics (BMEI), 2011 4th International Conference on (Vol. 2, pp. 892–896). IEEEGoogle Scholar
  26. 26.
    Ibaida A, Khalil I, Schynde RV (2011) A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system. Comput Cardiol 38:393–396Google Scholar
  27. 27.
    He X, Tseng KK, Huang HH, Chen ST, Tu SY, Zeng F, Pan JS (2012) Wavelet-based quantization watermarking for ECG signals. In: 2012 International Conference on Computing, Measurement, Control and Sensor Network (CMCSN), Taiyuan, China, July 7–9, pp. 233–236Google Scholar
  28. 28.
    Rubio OJ, Alesanco Á, García J (2013) Secure information embedding into 1D biomedical signals based on SPIHT. J Biomed Inform 46(4):653–664CrossRefGoogle Scholar
  29. 29.
    Soltani Panah A, van Schyndel R (2014) A lightweight high capacity ECG watermark with protection against data loss. In: Proceedings of the 8th International Conference on Pervasive Computing Technologies for Healthcare. ICST, pp 93–100Google Scholar
  30. 30.
    Halder B, Mitra S (2015) Modified watermarked ECG signals by using adaptive normalization factor. In: 2015 IEEE 2nd International Conference on Recent Trends in Information Systems (ReTIS). IEEE, pp 434–439Google Scholar
  31. 31.
    Wu W-C, Lin Z-W, Wong W-T (2013) Application of QR-code steganography using data embedding technique. In: Information technology convergence. Springer, Dordrecht, pp 597–605Google Scholar
  32. 32.
    Wang X, Meng J (2008) A 2-D ECG compression algorithm based on wavelet transform and vector quantization. Digit Signal Process 18:179–188.  https://doi.org/10.1016/j.dsp.2007.03.003 CrossRefGoogle Scholar
  33. 33.
    Jero SE, Ramu P (2016) Curvelets-based ECG steganography for data security. Electron Lett 52(4):283–285CrossRefGoogle Scholar
  34. 34.
    Jero SE, Ramu P, Ramakrishnan S (2015) ECG steganography using curvelet transform. Biomed Signal Process Control 22:161–169CrossRefGoogle Scholar
  35. 35.
    Shiu HJ, Lin BS, Huang CH, Chiang PY, Lei CL (2017) Preserving privacy of online digital physiological signals using blind and reversible steganography. Comput Methods Prog Biomed 151:159–170CrossRefGoogle Scholar
  36. 36.
    Yang CY, Wang WF (2017, August) High-Capacity ECG Steganography with Smart Offset Coefficients. In International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 129–136). Springer, ChamGoogle Scholar
  37. 37.
    Maheswari SU, Jude Hemanth D (2015) Frequency domain QR code based image steganography using Fresnelet transform. AEU Int J Electron Commun 69(2):539–544CrossRefGoogle Scholar
  38. 38.
    Huang HC, Chang FC, Fang WC (2011) Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans Consum Electron 57(2):779–787CrossRefGoogle Scholar
  39. 39.
    Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94(1):219–235CrossRefGoogle Scholar
  40. 40.
    Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Foren Secur 5(1):187–193CrossRefGoogle Scholar
  41. 41.
    Mazurczyk W, Caviglione L (2014) Steganography in modern smartphones and mitigation techniques. IEEE Commun Surv Tutorials 2014:1Google Scholar
  42. 42.
    Vongpradhip S, Rungraungsilp S (2011) QR code using invisible watermarking in frequency domain. In International Conference on ICT and Knowledge Engineering (pp. 47–52)Google Scholar
  43. 43.
    Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik 145:158–168CrossRefGoogle Scholar
  44. 44.
    Priya S, Santhi B, Swaminathan P (2017) Hybrid transform based reversible watermarking technique for medical images in telemedicine applications. Optik 145:655–671Google Scholar
  45. 45.
    Li C, Zheng C, Tai C (1995) Detection of ECG characteristic points using wavelet transforms. IEEE Trans Biomed Eng 42(1):21–28CrossRefGoogle Scholar
  46. 46.
    Kaminski M, Chlapinski J, Sakowicz B, Balcerak S (2009) ECG signal preprocessing for T-wave alternans detection. 2009 10th Int. Conf. - Exp. Des. Appl. CAD Syst. Microelectron, pp 103–106Google Scholar
  47. 47.
    Goldberger AL, Amaral LA, Glass L, Hausdorff JM, Ivanov PC, Mark RG, Mietus JE, Moody GB, Peng CK, Stanley HE (2000) PhysioBank, PhysioToolkit, and PhysioNet: components of a new research resource for complex physiologic signals. Circulation 101(23):E215–E220CrossRefGoogle Scholar
  48. 48.
    Liu C-L (2010) A tutorial of the wavelet transform. History 2010:1–72Google Scholar
  49. 49.
    Pan J, Tompkins WJ (1985) A real-time QRS detection algorithm. IEEE Trans Biomed Eng 32(3):230–236CrossRefGoogle Scholar
  50. 50.
    Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44:800–801CrossRefGoogle Scholar
  51. 51.
    Roy WLOCJ (2010) Verification and validation in scientific computing. Cambridge University Press, CambridgeGoogle Scholar
  52. 52.
    Chen YH, Huang HC, Lin CC (2015) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimed Tools Appl.  https://doi.org/10.1007/s11042-015-2825-9) CrossRefGoogle Scholar
  53. 53.
    Nambakhsh MS, Ahmadian A, Zaidi H (2011) A contextual based double watermarking of PET images by patient ID and ECG signal. Comput Methods Prog Biomed 104(3):418–425CrossRefGoogle Scholar
  54. 54.
    Yang CY, Wang WF (2016) Effective electrocardiogram steganography based on coefficient alignment. J Med Syst 40(3):66CrossRefGoogle Scholar
  55. 55.
    Raeiatibanadkooki M, Quchani SR, KhalilZade M, Bahaadinbeigy K (2016) Compression and encryption of ECG signal using wavelet and chaotically Huffman code in telemedicine application. J Med Syst 40(3):73CrossRefGoogle Scholar

Copyright information

© Australasian College of Physical Scientists and Engineers in Medicine 2018

Authors and Affiliations

  1. 1.Department of Electronics and Communication EngineeringVelammal Engineering CollegeChennaiIndia
  2. 2.Department of Engineering DesignIndian Institute of Technology MadrasChennaiIndia
  3. 3.Electronic System Design Laboratory, Department of Electrical and Electronics EngineeringVelammal Engineering CollegeChennaiIndia

Personalised recommendations