Skip to main content
Log in

QR code based patient data protection in ECG steganography

  • Technical Paper
  • Published:
Australasian Physical & Engineering Sciences in Medicine Aims and scope Submit manuscript

Abstract

Connected health enables patient centric interventions resulting in better healthcare and hence better living. In order to accomplish this, bio-signals, medical and diagnosis information are shared and accessed by multiple actors and it is important to protect the privacy of patient data. Steganography is widely used to protect patient data by hiding it in the medical information. Current work investigates ECG steganography using Discrete Wavelet Transform (DWT) and Quick Response (QR) code. Steganography deteriorates the ECG signal and it is important to minimize this deterioration to preserve diagnosability. 1D ECG signal is converted to 2D ECG image and decomposed into sub-bands by subjecting it to DWT. The novelty of the proposed approach lies in converting the patient data into QR code and using it as watermark in ECG steganography. The QR code is embedded in the 2D image using additive quantization scheme. The performance of proposed method is measured using Peak Signal to Noise Ratio, Percentage Residual Difference and Kullback–Leibler distance. These metrics are used as a measure of imperceptibility while the data loss during retrieval is measured by Bit Retrieval Rate. The proposed method is demonstrated on normal ECG signals obtained from MIT-BIH database for different QR code versions. Metrics reveal that imperceptibility decreased for increasing patient data size and increasing scaling factors. Metrics were independent of the sub-band and the proposed method allows reliable patient data protection with full retrieval ability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Ardagna CA, Cremonini M, De Capitani Di Vimercati S, Samarati P (2008) A privacy-aware access control system. J Comput Secur 16(4):369–397

    Article  Google Scholar 

  2. Law P (1996) Health insurance portability and accountability act of 1996 public law 104-191. US Statut Large 110:1936–2103

    Google Scholar 

  3. Bertino E, Yang Y, Ooi BC, Deng RH (2005) Privacy and ownership preserving of outsourced medical data. Proc. Int. Conf. Data Eng., (Icde), pp 521–532

  4. Brumen B, Heričko M, Sevčnikar A, Završnik J, Hölbl M (2013) Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues? J Med Internet Res 15(12):e283

    Article  Google Scholar 

  5. Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143

    Article  Google Scholar 

  6. Ng HS, Sim ML, Tan CM (2006) Security issues of wireless sensor networks in healthcare applications. BT Technol J 24(2):138–144

    Article  Google Scholar 

  7. Zielińska E, Mazurczyk W, Szczypiorski K (2014) Trends in steganography. Commun ACM 2014:5786–5795

    Google Scholar 

  8. Chen ST, Guo YJ, Huang HN, Kung WM, Tseng KK, Tu SY (2014) Hiding patients confidential datainthe ECG signal viaa transform-domain quantization scheme topical collection on mobile systems. J Med Syst 38:54

    Article  CAS  Google Scholar 

  9. Ibaida A, Khalil I (2013) Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans Biomed Eng 60:3322–3330

    Article  Google Scholar 

  10. Martins D, Guyennet H (2010) Steganography in MAC layers of 802.15.4 protocol for securing wireless sensor networks. In 2010 International Conference on Multimedia Information Networking and Security (pp. 824–828)

  11. Maglogiannis I, Kazatzopoulos L, Delakouridis K, Hadjiefthymiades S (2009) Enabling location privacy and medical data encryption in patient telemonitoring systems. IEEE Trans Inf Technol Biomed 13(6):946–954

    Article  Google Scholar 

  12. Chen H-M, Lo J-W, Yeh C-K (2012) An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J Med Syst 36(6):3907–3915

    Article  Google Scholar 

  13. Kong X, Feng R (2001) Watermarking medical signals for telemedicine. IEEE Trans Inf Technol Biomed 5:195–201

    Article  CAS  Google Scholar 

  14. Raúl RC, Claudia FU, Trinidad-Blas GDJ (2007) Data hiding scheme for medical images. In 17th International Conference on Electronics, Communications and Computers, CONIELECOMP’07, Proceedings

  15. Huang L-C, Tseng L-Y, Hwang M-S (2013) A reversible data hiding method by histogram shifting in high quality medical images. J Syst Softw 86(3):716–727

    Article  Google Scholar 

  16. Edward Jero S, Ramu P, Ramakrishnan S (2014) Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J Med Syst 38:132

    Article  CAS  Google Scholar 

  17. Cox IJ, Kilian J, Leighton FT, Shamoon T (1996) A secure, robust watermark for multimedia. In: Information hiding, vol. 1174, Springer, Berlin, pp. 185–206

    Chapter  Google Scholar 

  18. Lei B, Song I, Rahman SA (2013) Robust and secure watermarking scheme for breath sound. J Syst Softw 86(6):1638–1649

    Article  Google Scholar 

  19. Lin Y-S, Luo S-J, Chen B-Y (2013) Artistic QR code embellishment. Comput Graph Forum 32(7):137–146

    Article  Google Scholar 

  20. Engin M, Çidam O, Engin EZ (2005) Wavelet transformation based watermarking technique for human Electrocardiogram (ECG). J Med Syst 29(6):589–594

    Article  Google Scholar 

  21. Zheng KM, Qian X (2008) Reversible data hiding for electrocardiogram signal based on wavelet transforms. In Computational Intelligence and Security, 2008. CIS’08. International Conference on (Vol. 1, pp. 295–299). IEEE

  22. Kozat SS, Vlachos M, Lucchese C, Van Herle H, Yu PS (2009) Embedding and retrieving private metadata in electrocardiograms. J Med Syst 33(4):241–259

    Article  Google Scholar 

  23. Ibaida A, Khalil I, Al-Shammary D (2010) Embedding patients confidential data in ECG signal for healthcare information systems. In Engineering in Medicine and Biology Society (EMBC), 2010 Annual International Conference of the IEEE (pp. 3891–3894). IEEE

  24. Kaur S, Singhal R, Farooq O, Ahuja B (2010) Digital watermarking of ECG data for secure wireless commuication. In 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, pp 140–144. IEEE

  25. Farooq O, Vyas AL, Datta S, Mulvaney D (2011) Watermarking biomedical signal for authentication using integer wavelet transform. In Biomedical Engineering and Informatics (BMEI), 2011 4th International Conference on (Vol. 2, pp. 892–896). IEEE

  26. Ibaida A, Khalil I, Schynde RV (2011) A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system. Comput Cardiol 38:393–396

    Google Scholar 

  27. He X, Tseng KK, Huang HH, Chen ST, Tu SY, Zeng F, Pan JS (2012) Wavelet-based quantization watermarking for ECG signals. In: 2012 International Conference on Computing, Measurement, Control and Sensor Network (CMCSN), Taiyuan, China, July 7–9, pp. 233–236

  28. Rubio OJ, Alesanco Á, García J (2013) Secure information embedding into 1D biomedical signals based on SPIHT. J Biomed Inform 46(4):653–664

    Article  Google Scholar 

  29. Soltani Panah A, van Schyndel R (2014) A lightweight high capacity ECG watermark with protection against data loss. In: Proceedings of the 8th International Conference on Pervasive Computing Technologies for Healthcare. ICST, pp 93–100

  30. Halder B, Mitra S (2015) Modified watermarked ECG signals by using adaptive normalization factor. In: 2015 IEEE 2nd International Conference on Recent Trends in Information Systems (ReTIS). IEEE, pp 434–439

  31. Wu W-C, Lin Z-W, Wong W-T (2013) Application of QR-code steganography using data embedding technique. In: Information technology convergence. Springer, Dordrecht, pp 597–605

    Google Scholar 

  32. Wang X, Meng J (2008) A 2-D ECG compression algorithm based on wavelet transform and vector quantization. Digit Signal Process 18:179–188. https://doi.org/10.1016/j.dsp.2007.03.003

    Article  Google Scholar 

  33. Jero SE, Ramu P (2016) Curvelets-based ECG steganography for data security. Electron Lett 52(4):283–285

    Article  CAS  Google Scholar 

  34. Jero SE, Ramu P, Ramakrishnan S (2015) ECG steganography using curvelet transform. Biomed Signal Process Control 22:161–169

    Article  Google Scholar 

  35. Shiu HJ, Lin BS, Huang CH, Chiang PY, Lei CL (2017) Preserving privacy of online digital physiological signals using blind and reversible steganography. Comput Methods Prog Biomed 151:159–170

    Article  Google Scholar 

  36. Yang CY, Wang WF (2017, August) High-Capacity ECG Steganography with Smart Offset Coefficients. In International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 129–136). Springer, Cham

    Google Scholar 

  37. Maheswari SU, Jude Hemanth D (2015) Frequency domain QR code based image steganography using Fresnelet transform. AEU Int J Electron Commun 69(2):539–544

    Article  Google Scholar 

  38. Huang HC, Chang FC, Fang WC (2011) Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans Consum Electron 57(2):779–787

    Article  Google Scholar 

  39. Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94(1):219–235

    Article  Google Scholar 

  40. Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Foren Secur 5(1):187–193

    Article  Google Scholar 

  41. Mazurczyk W, Caviglione L (2014) Steganography in modern smartphones and mitigation techniques. IEEE Commun Surv Tutorials 2014:1

    Google Scholar 

  42. Vongpradhip S, Rungraungsilp S (2011) QR code using invisible watermarking in frequency domain. In International Conference on ICT and Knowledge Engineering (pp. 47–52)

  43. Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik 145:158–168

    Article  Google Scholar 

  44. Priya S, Santhi B, Swaminathan P (2017) Hybrid transform based reversible watermarking technique for medical images in telemedicine applications. Optik 145:655–671

    Google Scholar 

  45. Li C, Zheng C, Tai C (1995) Detection of ECG characteristic points using wavelet transforms. IEEE Trans Biomed Eng 42(1):21–28

    Article  CAS  Google Scholar 

  46. Kaminski M, Chlapinski J, Sakowicz B, Balcerak S (2009) ECG signal preprocessing for T-wave alternans detection. 2009 10th Int. Conf. - Exp. Des. Appl. CAD Syst. Microelectron, pp 103–106

  47. Goldberger AL, Amaral LA, Glass L, Hausdorff JM, Ivanov PC, Mark RG, Mietus JE, Moody GB, Peng CK, Stanley HE (2000) PhysioBank, PhysioToolkit, and PhysioNet: components of a new research resource for complex physiologic signals. Circulation 101(23):E215–E220

    Article  CAS  Google Scholar 

  48. Liu C-L (2010) A tutorial of the wavelet transform. History 2010:1–72

    Google Scholar 

  49. Pan J, Tompkins WJ (1985) A real-time QRS detection algorithm. IEEE Trans Biomed Eng 32(3):230–236

    Article  CAS  Google Scholar 

  50. Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44:800–801

    Article  Google Scholar 

  51. Roy WLOCJ (2010) Verification and validation in scientific computing. Cambridge University Press, Cambridge

    Google Scholar 

  52. Chen YH, Huang HC, Lin CC (2015) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimed Tools Appl. https://doi.org/10.1007/s11042-015-2825-9)

    Article  Google Scholar 

  53. Nambakhsh MS, Ahmadian A, Zaidi H (2011) A contextual based double watermarking of PET images by patient ID and ECG signal. Comput Methods Prog Biomed 104(3):418–425

    Article  Google Scholar 

  54. Yang CY, Wang WF (2016) Effective electrocardiogram steganography based on coefficient alignment. J Med Syst 40(3):66

    Article  CAS  Google Scholar 

  55. Raeiatibanadkooki M, Quchani SR, KhalilZade M, Bahaadinbeigy K (2016) Compression and encryption of ECG signal using wavelet and chaotically Huffman code in telemedicine application. J Med Syst 40(3):73

    Article  Google Scholar 

Download references

Acknowledgements

A. Balaji Ganesh acknowledges the financial support of Department of Science and Technology under Technology Intervention for Elderly (TIE) scheme (No. SSD/TISN/047/2011-TIE Dt. 08.05.2014) to Velammal Engineering College, Chennai. Part of this research work was supported by this financial support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Athi Balaji Ganesh.

Ethics declarations

Conflict of interest

Authors, P. Mathivanan, Edward jero, Palaniappan Ramu and A. Balaji Ganesh declares that they have no conflict of interest.

Ethical Approval

This article does not contain any studies involving human participants and animal as subjects performed by any of the authors.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mathivanan, P., Edward Jero, S., Ramu, P. et al. QR code based patient data protection in ECG steganography. Australas Phys Eng Sci Med 41, 1057–1068 (2018). https://doi.org/10.1007/s13246-018-0695-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13246-018-0695-y

Keywords

Navigation