Skip to main content

Integer Wavelet Transform-Based ECG Steganography for Hiding Patients’ Confidential Information in e-Healthcare Systems

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1053))

Abstract

A novel ECG steganography technique to hide patients’ confidential information using integer wavelet transform (IWT) is proposed. Modified least significant bit (m-LSB) method has been applied to embed the secret bits into the transform coefficients of an ECG signal. To strengthen the security of the embedded information, chaotic maps are employed which randomly select the ECG coefficients to embed the secret information. The formulated approach outperformed the other state-of-the-art techniques with high embedding capacity (EC) and excellent peak signal-to-noise Ratio (PSNR) at minimal percentage residual difference (PRD) and Kullback–Leibler divergence (KL-divergence). The proficiency of the proposed technique is also evaluated in terms of the clinical diagnostic distortion measures like wavelet-based weighted PRD (WWPRD) and wavelet energy-based diagnostic distortion (WEDD). The proposed method is competent to hide the confidential information while keeping the diagnostic features intact.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Subhedar, M.S., Mankar, V.H.: Current status and key issues in image steganography: a survey. Comput. Sci. Rev. 13–14, 95–113 (2014)

    Article  Google Scholar 

  2. Mudgal, N., Singh, P., Saxena, S.: SteganoCrypt: an app for secure communication. In: Pant, M., Ray, K., Sharma, T.K., Rawat, S., Bandyopadhyay, A (eds.) Soft Computing: Theories and Applications, AISC, vol. 2, pp. 59–66. Springer, Singapore (2018)

    Google Scholar 

  3. Dmour, H.A., Ani, A.A.: Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Comput. Methods Programs Biomed. 127, 24–43 (2016)

    Article  Google Scholar 

  4. Parah, S.A., Ahad, F., Sheikh, J.A., Bhat, G.M.: Hiding clinical information in in medical images: a new high capacity and reversible data hiding technique. J. Biomed. Inform. 66, 214–230 (2017)

    Article  Google Scholar 

  5. Harnendez, J.J.G., Flores, W.G.: Analysis of the impact of digital watermarking on computer aided diagnosis in medical imaging. Comput. Biol. Med. 68, 37–48 (2016)

    Article  Google Scholar 

  6. Rubio, O.J., Alesanco, A., García, J.: Secure information embedding into 1D biomedical signals based on SPIHT. J. Biomed. Inf. 46, 653–664 (2013)

    Google Scholar 

  7. Shiu, H.J., Lin, B.S., Chien, H.H., Chiang, P.Y., Lei, C.L.: Preserving privacy of online digital physiological signals using blind and reversible steganography. Comput. Methods Programs Biomed. 151, 159–170 (2017)

    Article  Google Scholar 

  8. Pandey, A., Saini, B.S., Singh, B., Sood, N.: Complexity sorting and coupled chaotic map based on 2D ECG data compression-then-encryption and its OFDM transmission with impair sample correction. Multimedia Tools Appl. 1–39 (2018)

    Google Scholar 

  9. Yang, C.Y., Wang, W.F.: Effective electrocardiogram steganography based on coefficient alignment. J. Med. Syst. 40, 66 (2016)

    Article  Google Scholar 

  10. Pandey, A., Saini, B.S., Singh, B., Sood, N.: An integrated approach using chaotic map and sample value difference method for electrocardiogram steganography and OFDM based secured patient information transmission. J. Med. Syst. 41(187), 1–20 (2017)

    Google Scholar 

  11. Ibaida, A., Khalil, I.: Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans. Biomed. Eng. 60(12), 3322–3330 (2013)

    Article  Google Scholar 

  12. Jero, S.E., Ramu, P., Ramakrishnan, S.: Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J. Med. Syst. 38(132), 1–11 (2014)

    Google Scholar 

  13. Jero, S.E., Ramu, P., Ramakrishnan, S.: ECG steganography using curvelet transform. Biomed. Signal Process. Control 22, 161–169 (2015)

    Article  Google Scholar 

  14. Jero, S.E., Ramu, P., Ramakrishnan, S.: Imperceptibility-Robustness trade-off studies for ECG steganography using continuous ant colony optimization. Expert Syst. Appl. 49, 123–135 (2016)

    Article  Google Scholar 

  15. Trinder, J., Kleiman, J., Carrington, M., Smith, S., Breen, S., Tan, N., Kim, Y.: Autonomic activity during human sleep as a function of time and sleep stage. J. Sleep Resolut. 10, 253–264 (2001)

    Article  Google Scholar 

  16. Berkaya, S.K., Uysal, A.K., Gunal, E.S., Ergin, S., Gunal, S., Gulmezoglu, M.B.: A survey on ECG analysis. Biomed. Signal Process. Control 43, 216–235 (2018)

    Article  Google Scholar 

  17. Singh, B., Singh, D., Jaryal, A.K., Deepak, K.K.: Ecotopic beats in approximate entropy and sample entropy based HRV assessment. Int. J. Syst. Sci. 43, 884–893 (2012)

    Article  Google Scholar 

  18. Rajpurohit, J., Sharma, T.K., Abrahm, A.: Vaishali: glossary of metaheuristic algorithms. Int. J. Comput. Inf. Syst. Ind. Manag. Appl. 9, 181–205 (2017)

    Google Scholar 

  19. Daubechies, I., Sweldons, W.: Factoring wavelet transforms into lifting schemes. J. Fourier Anal. Appl. 4(3) (1998)

    Google Scholar 

  20. Lee, S., Yoo, C.D., Kalker, T.: Reversible image watermarking based on integer to integer wavelet transform. IEEE Trans. Inf. Forensics Secur. 2(3), 321–330 (2007)

    Article  Google Scholar 

  21. Liji, C.A., Indiradevi, K.P., Anish Babu, K.K.: Integer wavelet transform for embedded lossy to lossless image compression. Int. Conf. Emerg. Trends Eng. Sci. Technol. Procedia Technol. 24, 1039–1047 (2015)

    Google Scholar 

  22. Zhou, Y., Bao, L., Chang, C.L.P.: A new 1D chaotic system for image encryption. Sig. Process. 97, 172–182 (2014)

    Article  Google Scholar 

  23. Ravichandran, D., Praveenkumar, P., Rayappan, J.B.B., Amirtharajan, R.: Chaos based crossover and mutation for securing DICOM image. Comput. Biol. Med. 72, 170–180 (2016)

    Google Scholar 

  24. www.physionet.org/cgi-bin/atm/ATM

  25. Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)

    Article  Google Scholar 

  26. Maurya, I., Gupta, S.K.: Secure image steganography through pre-processing. In: Ray, K., Sharma, T.K., Rawat, Saini, R., S., Bandyopadhyay, A. (eds.) Soft Computing: Theories and Applications 2017, AISC, pp. 133–145. Springer, Singapore (2019)

    Google Scholar 

  27. Pandey, A., Saini, B.S., Singh, B., Sood, N.: A 2D electrocardiogram data compression method using a sample entropy-based complexity sorting approach. Comput. Electr. Eng. 56, 36–45 (2016)

    Article  Google Scholar 

  28. Rajaram, V.: IEEE standards for floating point numbers. Resonance (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Butta Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Soni, N., Saini, I., Singh, B. (2020). Integer Wavelet Transform-Based ECG Steganography for Hiding Patients’ Confidential Information in e-Healthcare Systems. In: Pant, M., Sharma, T., Verma, O., Singla, R., Sikander, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 1053. Springer, Singapore. https://doi.org/10.1007/978-981-15-0751-9_48

Download citation

Publish with us

Policies and ethics