Securing Online Medical Data

  • John Vong
  • Insu Song
Part of the Topics in Intelligent Engineering and Informatics book series (TIEI, volume 11)


One of the challenges in providing medical services over the network connections is maintaining authenticity and integrity of the data that are transmitted over the network and stored on remote servers. To provide critical medical services, data must be free from tempering. Medical data often also contain sensitive information, and therefore require a method to prevent unauthorized access to sensitive information of patients. In this chapter, we illustrate how the methods developed for the protection of copyright can be used to achieve this. In particular, we illustrate how a watermarking scheme can be used for protecting breath sounds transmitted over the internet. We illustrate how this method can be used to insert encrypted source and identity information in breath sounds while maintaining significant biological signals for proper diagnosis. The method can be applied to any types of data including image, video, and sound data. We show experimental results to demonstrate that the proposed watermarking scheme obtains good robustness against common manipulation attacks and preserves imperceptivity. The performance comparison results verify that the scheme outperforms existing approaches in terms of robustness and imperceptibility.


Digital watermarking Secure medical data Breath sound 



This project is funded by a grant from the Bill & Melinda Gates Foundation through the Grand Challenges Explorations Initiative (Grant Number: OPP1032125).


  1. Andrews H, Patterson C (1976) Singular value decompositions and digital image processing. IEEE Trans Acoust Speech Signal Process 24(1):26–53. doi: 10.1109/TASSP.1976.1162766 CrossRefGoogle Scholar
  2. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3–4):313–336. doi: 10.1147/sj.353.0313 CrossRefGoogle Scholar
  3. Bhat KV, Sengupta I, Das A (2010) An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digit Signal Process Rev J 20(6), 1547–1558Google Scholar
  4. Kennedy J, Eberhart RC (2001) Swarm intelligence. Morgan Kaufmann Publishers Inc., San FranciscoGoogle Scholar
  5. Lei B, Song I, Rahman SA (2013) Robust and secure watermarking scheme for breath sound. J Syst Software 86(6):1638–1649Google Scholar

Copyright information

© Springer Science+Business Media Singapore 2015

Authors and Affiliations

  1. 1.Financial IT AcademySingapore Management UniversitySingaporeSingapore
  2. 2.School of Business (IT)James Cook UniversitySingaporeSingapore

Personalised recommendations