Skip to main content

Advertisement

Log in

Applications of data hiding techniques in medical and healthcare systems: a survey

  • Review Article
  • Published:
Network Modeling Analysis in Health Informatics and Bioinformatics Aims and scope Submit manuscript

Abstract

Nowadays, scientists make effort to provide security for the communication channels. Several security and privacy threats are introduced via the Internet as the major communication channel. Therefore, information exchanging through the Internet should be protected and secured. Now healthcare systems are getting very common in the world. A health care system should preserve privacy while sending patients’ information, prevent the patients’ information from tampering, and prevent any sabotage in the healthcare systems. Therefore, it is crucial to provide security in such systems to attract the confidence of people for using the Internet (network)-based health care systems. In this respect, the goal of this paper is to review the accessories to provide security in healthcare systems. Our objective is to state the achievements of a literature review regarding the security of health care systems provided by information hiding methods including cryptography, steganography and watermarking methods. Furthermore, discussion about these methods, the media employed in these methods such as medical images and biomedical signals, their pros and cons and the applications in healthcare systems are provided. Correspondingly, we share the visions into the open research problems and highlight future directions in this extent.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Abuturab M (2013) Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain. Opt Laser Technol 4:525–532

    Article  Google Scholar 

  • Ahmad T (2014) Shared secret-based steganography for protecting medical data. In: Proceedings of international conference on computer, control, informatics and its applications (IC3INA), pp 87–92

  • Ahmed SM, Al-Zoubi Q, Abo-Zahhad M (2007) A hybrid ECG compression algorithm based on singular value decomposition and discrete wavelet transform. J Med Eng Technol 31(1):54–61

    Article  Google Scholar 

  • Ahson SA, Ilyas M (2010) Cloud computing and software services theory and techniques. CRC Press, Boca Raton

    Book  Google Scholar 

  • Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Processing 13:1147–1156

    Article  MathSciNet  Google Scholar 

  • AzamiSidek K, Mai V, Khalil I (2014) Data mining in mobile ECG based biometric identification. J Netw Comput Appl 44:83–91

    Article  Google Scholar 

  • Bacharova L, Bang L, Szathmary V, Mateasik A (2014) Imaging QRS complex and ST segment in myocardial infarction. J Electrocardiol 47(4):438–447

    Article  Google Scholar 

  • Boucsein W (2012) Electrodermal activity. Springer, Berlin, p 2 (ISBN 978-1-461-41126-0)

    Book  Google Scholar 

  • Bulling A et al (2009) Wearable EOG goggles: seamless sensing and context-awareness in everyday environments. J Ambient Intell Smart Environ 1(2):157–171

    Google Scholar 

  • Calvillo J, Roman I, Roa LM (2013) Empowering citizens with access control mechanisms to their personal health resources. Int J Med Inf 82:58–72

    Article  Google Scholar 

  • Cavagnino D, Lucenteforte M, Grangetto M (2015) High capacity reversible data hiding and content protection for radiographic images. Sig Process 117:258–269

    Article  Google Scholar 

  • Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253–266

    Article  Google Scholar 

  • Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri S (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: Proceedings of IEEE international conference on computational intelligence and computing research

  • Chao HM, Hsu CM, Miaou SG (2002) A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6:46–53

    Article  Google Scholar 

  • Chaoab H, Twua S, Hsu C (2005) A patient-identity security mechanism for electronic medical records during transit and at rest. Med Inf Internet Med 30(3):227–240

    Article  Google Scholar 

  • Coatrieux G, Maitre H, Sankur B (2001) Strict integrity control of biomedical images. In: Proceedings of SPIE security and watermarking of multimedia

  • Correa MAgustinaG, Leber EL (2011) Noise removal from EEG signals in polisomnographic records applying adaptive filters in cascade, adaptive filtering applications, Chap. 8. InTech, Croatia

    Google Scholar 

  • Cox IJ, Miller ML, Bloom JA, Fridrich J (2008) Ton Kalker digital watermarking and steganography. Morgan Kaufmann, Burlington

    Google Scholar 

  • Crichtona JHM (2009) Defining high, medium, and low security in forensic mental healthcare: the development of the Matrix of Security in Scotland. J Forensic Psychiatry Psychol 20(3):333–353

    Article  Google Scholar 

  • Dao T, Pouletaut P, Charleux F, Lazáry Á, Eltes P, Varga P, Ho Ba Tho M (2015) Multimodal medical imaging (CT and dynamic MRI) data and computer-graphics multi-physical model for the estimation of patient specific lumbar spine muscle forces. Data Knowl Eng 96–97:3–18

    Article  Google Scholar 

  • De la Rosa Algarin A, Demurjian S, Berhe S, Pavlich-Mariscal J (2012) A security framework for xml schemas and documents for healthcare. In: Proceedings of IEEE international conference on bioinformatics and biomedicine workshops, pp 782–789

  • Delbarpour S, Sajedi H (2017) Image steganography with artificial immune system. In: 7th joint conference on artificial intelligence and robotics and the 9th RoboCup IranOpen International Symposium

  • Delorme A, Makeig S (2004) EEGLAB: an open source toolbox for analysis of single trial EEG dynamics including independent component analysis. J Neurosci Methods 134:9–21

    Article  Google Scholar 

  • Edward Jero S, Ramu P, Ramakrishnan S (2014) Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J Med Syst 38(10):132–140

    Article  Google Scholar 

  • Eisenberg RL, Margulis AR (2011) A patient’s guide to medical imaging. Oxford University Press, Oxford (ISBN 978-0-19-972991-3)

    Google Scholar 

  • Electroencephalogram (EEG) (2018). http://hopkinsmedicine.org/healthlibrary/test_procedures/neurological/electroencephalogram_eeg_92,p07655/. Accessed 4 Aug 2018

  • Engin M, Cidam O, Engin EZ (2005) Wavelet transformation based watermarking technique for human electrocardiogram (ECG). J Med Syst 29(6):589–594

    Article  Google Scholar 

  • Fernandez-Aleman JL, Carrion Seor I, angel Oliver Lozoya P, Toval A (2013) Security and privacy in electronic health records: a systematic literature review. J Biomed Inform 46:541–562

    Article  Google Scholar 

  • Gao MZ, Wu ZG, Wang L (2013) Comprehensive evaluation for HE based contrast enhancement techniques. Adv Intell Syst Appl 2:331–338

    Google Scholar 

  • Gavrovska A, Bogdanović V, Reljin I, Reljin B (2014) Automatic heart sound detection in pediatric patients without electrocardiogram reference via pseudo-affine Wigner–Ville distribution and Haar wavelet lifting. Comput Methods Programs Biomed 113(2):515–528

    Article  Google Scholar 

  • Ghazvini A, Shukur Z (2013) Security challenges, and success factors of electronic healthcare system. In: Proceedings of 4th international conference on electrical engineering and informatics (ICEEI 2013), pp 212–219

  • Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10:722–732

    Article  Google Scholar 

  • Giannetti V (2003) Medical errors: the hidden victim. Clin Res Regul Affairs 20(4):425–432

    Article  Google Scholar 

  • Gkoulalas-Divanis A, Loukides G, Sun J (2014) Publishing data from electronic health records while preserving privacy: a survey of algorithms. J Biomed Inform 50:4–19

    Article  Google Scholar 

  • Goljan M, Fridrich J, Du R (2001) Distortion-free data embedding for images. In: Proceedings of 4th information hiding workshop, pp 27–41

  • Golpira H, Danyali H (2010) Reversible blind watermarking for medical images based on wavelet histogram shifting. In: Proceedings of IEEE international symposium on signal processing and information technology (ISSPIT), pp 31–36

  • Gritzalis S, Iliadis J, Gritzalis D, Spinellis D, Katsikas S (1999) Developing secure web-based medical applications. Med Inf Internet Med 24(1):75–90

    Article  Google Scholar 

  • Gritzalisa D, Katsikasa S, Keklikoglou J, Tomaras A (1991) Data security in medical information systems: technical aspects of a proposed legislation. Med Inf 16(4):371–383

    Google Scholar 

  • Guo X, Zhuang T (2003) A lossless watermarking scheme for enhancing security of medical data in PACS. In: Proceedings of SPIE and medical imaging, pp 350–359

  • Guo X, Zhuang T (2009) A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64

    Article  Google Scholar 

  • Hafizah Hassan N, Ismail Z (2012) A conceptual model for investigating factors influencing information security culture in healthcare environment. International Congress on Interdisciplinary Business and Social Science

  • Hu F, Jiang M, Wagner M, Dong D (2007) Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software code sign. IEEE Trans Inf Technol Biomed 11(6):619–627

    Article  Google Scholar 

  • Ibaida A, Khalil I, Al-Shammary D (2010) Embedding patients confidential data in ECG signal for healthcare information systems. In: Proceedings of IEEE engineering in medicine and biology society

  • Ibrahim W, Saniee M, Abadeh (2017) Extracting features from protein sequences to improve deep extreme learning machine for protein fold recognition. J Theor Biol 421:1–15

    Article  Google Scholar 

  • Ibrahim W, Saniee M, Abadeh (2018) Protein fold recognition using deep kernelized extreme learning machine and linear discriminant analysis. Neural Comput Appl 1–14. https://doi.org/10.1007/s00521-018-3346-z

  • Istepanian RS, Petrosian AA (2000) Optimal zonal wavelet-based ECG data compression for a mobile telecardiology system. IEEE Trans Inf Technol Biomed 4(3):200–211

    Article  Google Scholar 

  • Joseph T, Remya UL (2014) ECG steganography based privacy protection of medical data for telemedicine application. J Dent Med Sci 13(8):85–94

    Google Scholar 

  • Kamal S, Khan M (2014a) An integrated algorithm for local sequence alignment. Netw Model Anal Health Inf Bioinf 3:68

    Article  Google Scholar 

  • Kamal Md, Khan M (2014b) Chapman–Kolmogorov equations for global PPIs with discriminant-EM. Int J Biomath 07(05):1450053

    Article  MATH  Google Scholar 

  • Kamal MdS, Khan M, Dev K, Chowdhury L, Dey N (2016) An optimized graph-based metagenomic gene classification approach: metagenomic gene analysis, classification and clustering in biomedical signal processing, IEG Global Publisher, pp 290–314

  • Kamal MdS, Chowdhury L, Khan M, Ashour AS, Tavares J, Dey N (2017a) Hidden Markov model and Chapman Kolmogrov for protein structures prediction from images, Comput Biol Chem 68:231–244

    Article  Google Scholar 

  • Kamal MdS, Sarowar MdG, Dey N, Ashour AS, Ripon SH, Panigrahi BK, Tavares JRS (2017b) Self-organizing mapping based swarm intelligence for secondary and tertiary proteins classification. Int J Mach Learn Cybern:1–24

  • Kamal MdS, Dey N, Ashour AS (2017c) Large scale medical data mining for accurate diagnosis: a blueprint, handbook of large-scale distributed computing in smart healthcare. Scalable computing and communications. Springer, Cham

    Google Scholar 

  • Kamal MdS, Dey N, Nimmy S, Ripon S, Ali N, Ashour A, Karaa W, Nguyen G, Shi F (2018) Evolutionary framework for coding area selection from cancer data. Neural Comput Appl 29(4):1015–1037

    Article  Google Scholar 

  • Kaur S, Singhal R, Farooq O, Ahuja B (2010) Digital watermarking of ECG data for secure wireless communication. In: Proceedings of international conference on recent trends in information, telecommunication and computing, pp 140–144

  • Khan M, Kamal MS (2015) Performance evaluation of Warshall algorithm and dynamic programming for Markov chain i0 local sequence alignment. Interdiscip Sci 7(1):78–81

    Article  Google Scholar 

  • Khokhar RH, Chen R, Fung BCM, Man Lui S (2014) Quantifying the costs and benefits of privacy-preserving health data publishing. J Biomed Inform 50:107–121

    Article  Google Scholar 

  • Kullback S (1987) Letter to the editor: the Kullback–Leibler distance. Am Stat 41(4):340–341

    Google Scholar 

  • Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143

    Article  Google Scholar 

  • Liberati A, Altman DG, Tetzlaff J, Mulrow C, Gotzsche PC, Ioannidis JPA et al (2009) The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. J Clin Epidemiol 62(10):e1–e34

    Article  Google Scholar 

  • Lin JC (1999) Applying telecommunication technology to health care delivery. IEEE Eng Med Biol Mag 18(4):28–31

    Article  Google Scholar 

  • Malashree KS, Jagadish KN, Suma M (2014) Confidential data hiding using wavelet based ECG steganography. Int J Eng Res Appl 4(5):84–88

    Google Scholar 

  • Mazurczyk W, Szczypiorski K, Lubacz J (2013) 4 new ways to smuggle messages across the internet. IEEE Spectr 50(11):42–4523

    Article  Google Scholar 

  • Moody G, Mark R, Goldberger A (1988) Evaluation of the ‘TRIM’ ECG data compressor. In: Proceedings of computers in cardiology, pp 167–70

  • Mu-Hsing A, Kuo (2011) Opportunities and challenges of cloud computing to improve health care services. J Med Internet Res 13(3):e67

    Article  Google Scholar 

  • Naheed T, Usman I, Khan TM, Dar AH, Shafique M (2014) Intelligent reversible watermarking technique in medical images using GA and PSO. Optik 125:2515–2525

    Article  Google Scholar 

  • Nambakhsh MS, Ahmadian A, Ghavami M, Dilmaghani RS, Karimi-Fard S (2006) A novel blind watermarking of ECG signals on medical images using EZW algorithm. In: Proceedings of IEEE engineering in medicine and biology society, pp 3274–3277

  • National Biomedical Imaging Archive. http://imaging.nci.nih.gov. Accessed 28 Apr 2018

  • Nimmy S, Kamal MdS, Hossain MI, Dey N, Ashour AS, Shi F (2017) Neural skyline filtering for imbalance features classification. Int J Comput Intell Appl 16(03):1–25

    Article  Google Scholar 

  • Omotosho A, Adegbola O, Olayemi Mikail O, Emuoyibofarhe J (2014) A secure electronic prescription system using steganography with encryption key implementation. Int J Comput Inf Technol 3(5):980–986

    Google Scholar 

  • Pangalos GJ (1995) Design, and implementation of secure medical database systems. Med Inform 20(3):265–277

    Article  Google Scholar 

  • Pangalosa GJ (1993) Medical database security evaluation. Med Inform 18(4):283–292

    Article  Google Scholar 

  • Phukpattaranont P (2015) QRS detection algorithm based on the quadratic filter. Expert Syst Appl 42(11):4867–4877

    Article  Google Scholar 

  • Poremba S (2015) Cyber security is growing importance for medical devices too. Forbes magazine. 1/19/2015

  • Rao NV, Kumarib VM (2011) Watermarking in medical imaging for security and authentication. Inf Secur J 20(3):148–155

    Google Scholar 

  • Rubio OJ, Alesanco A, Garcia J (2013) Secure information embedding into 1D biomedical signals based on SPIHT. J Biomed Inform 46:653–664

    Article  Google Scholar 

  • Said A, Pearlman W (1996) A new fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans Circ Syst Video Technol 6(3):243–250

    Article  Google Scholar 

  • Sajedi H, Jamzad M (2009a) Adaptive batch steganography considering image embedding capacity. Opt Eng 48(8):1–10

    Article  Google Scholar 

  • Sajedi H, Jamzad M (2009b) Secure steganography based on embedding capacity. J Inf Secur 8(6):433–445

    Article  Google Scholar 

  • Sajedi H, Jamzad M (2010a) HYSA: hybrid steganographic approach using multiple steganography methods. Secur Commun Netw 4(10):1173–1184

    Article  Google Scholar 

  • Sajedi H, Jamzad M (2010b) BSS: boosted steganography scheme with cover image preprocessing. Expert Syst Appl 37:7703–7710

    Article  Google Scholar 

  • Sajedi H, Mohammadipanah F, Shariat Panahi HK (2018) An image analysis-aided method for redundancy reduction in differentiation of identical actinobacterial strains. Future Microbiol 13(3):313–329

    Article  Google Scholar 

  • Shapiro JM (1993) Embedded image coding using zerotrees of wavelet coefficients. IEEE Trans Signal Proces 41(12):3445–3462

    Article  MATH  Google Scholar 

  • Shoukat IA, Bakar KA, Iftikhar M (2011) A survey about the latest trends and research issues of cryptographic elements. Int J Comput Sci Issues 8(3):140–149

    Google Scholar 

  • Srinivasan Y, Nutter B, Mitra S, Phillips B, Ferris D (2004) Secure transmission of medical records using high capacity steganography. In: Proceedings of 17th IEEE symposium on computer-based medical systems

  • Staal JJ, Abramoff MD, Niemeijer M, Viergever MA, van Ginneken B (2004) Ridge based vessel segmentation in color images of the retina. IEEE Trans Med Imaging 23:501–509

    Article  Google Scholar 

  • Stansfield S (2005) Structuring information and incentives to improve health. Bull World Health Organ 83(8):562

    Google Scholar 

  • Stokes M, Blythe M (2001) Muscle Sounds in physiology, sports science and clinical investigation. Medintel, Oxford (ISBN 0-9540572-0-1)

    Google Scholar 

  • Subhedara MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13(14):95–113

    Article  MATH  Google Scholar 

  • Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13:890–896

    Article  Google Scholar 

  • Traver V, Monton E, Bayo JL, Garcia JM, Hernandez J, Guillen S (2003) Multiagent home telecare platform for patients with cardiac diseases. In: Proceedings of computing in cardiology, pp 117–120

  • Tupakula U, Varadharajan V (2013) security techniques for counteracting attacks in mobile healthcare services. In: Proceedings of 3rd international conference on current and future trends of information and communication technologies in healthcare, pp 374–381

  • Tzelepi S, Pangalos G, Nikolacopoulou G (2002) Security of medical multimedia, medical informatics and the internet in medicine. Taylor & Francis, London, vol 27, no 3, pp 169–184

    Google Scholar 

  • Ullsberger P, Delorme A (2007) EEGLAB study set. http://tinyurl.com/bsdkyaj. Accessed May 2012

  • Vargheese R, Prabhudesai P (2014) Securing B2B pervasive information sharing between healthcare providers: enabling the foundation for evidence based medicine. International Workshop on Privacy and Security in HealthCare (PSCare14), pp 525–530

  • Vleeschouwer C, Delaigle JF, Macq B (2003) Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimed 5:97–105

    Article  Google Scholar 

  • Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error measurement to structural similarity. IEEE Trans Image Process 13(1):600–612

    Article  Google Scholar 

  • Wang H, Peng D, Wang W, Sharif H, Chen H, Khoynezhad A (2010) Resource-aware secure ECG healthcare monitoring through body sensor networks. Wirel Commun 17(1):12–19

    Article  Google Scholar 

  • Wong S, Zaremba L, Gooden D, Huang HK (1995) Radiologic image compression—a review. In: Proceedings of the IEEE, vol 83, no 2, pp 194–219

  • Wu H, Huang J, Shi Y (2015) A reversible data hiding method with contrast enhancement for medical images. J Vis Commun Image Retriev 31:146–153

    Article  Google Scholar 

  • Yang J, Li J, Niu Y (2015a) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Syst 43:74–86

    Article  Google Scholar 

  • Yang J, Qiang Li J, Niu Y (2015b) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Systems 44:74–86

    Article  Google Scholar 

  • Zehl L, Jaillet F, Stoewer A, Grewe J, Sobolev A, Wachtler T, Brochier TG, Riehle A, Denker M, Grun S (2016) Handling metadata in a neurophysiology laboratory. Front Neuroinform 10:26

    Article  Google Scholar 

  • Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surv Tutor 14(2):380–400

    Article  Google Scholar 

  • Zheng K, Qian X (2008) Reversible data hiding for electrocardiogram signal based on wavelet transforms. In: Proceedings of international conference on computational intelligence and security

  • Zhou XQ, Huang HK, Lou SL (2001) Authenticity, and integrity of digital mammography images. IEEE Trans Med Imaging 20:784–791

    Article  Google Scholar 

  • Zhou Z, Huang HK, Liu BJ (2005) Digital signature embedding (DSE) for medical image integrity in a data grid off-site backup archive. In: Proceedings of SPIE and Medical imaging, pp 306–317

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hedieh Sajedi.

Ethics declarations

Conflict of interest

Author declares that they have no conflict of interest.

Studies with human participants or animals

This article does not contain any studies with human participants or animals performed by the author.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sajedi, H. Applications of data hiding techniques in medical and healthcare systems: a survey. Netw Model Anal Health Inform Bioinforma 7, 6 (2018). https://doi.org/10.1007/s13721-018-0169-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13721-018-0169-x

Keywords

Navigation