Abstract
Nowadays, scientists make effort to provide security for the communication channels. Several security and privacy threats are introduced via the Internet as the major communication channel. Therefore, information exchanging through the Internet should be protected and secured. Now healthcare systems are getting very common in the world. A health care system should preserve privacy while sending patients’ information, prevent the patients’ information from tampering, and prevent any sabotage in the healthcare systems. Therefore, it is crucial to provide security in such systems to attract the confidence of people for using the Internet (network)-based health care systems. In this respect, the goal of this paper is to review the accessories to provide security in healthcare systems. Our objective is to state the achievements of a literature review regarding the security of health care systems provided by information hiding methods including cryptography, steganography and watermarking methods. Furthermore, discussion about these methods, the media employed in these methods such as medical images and biomedical signals, their pros and cons and the applications in healthcare systems are provided. Correspondingly, we share the visions into the open research problems and highlight future directions in this extent.
Similar content being viewed by others
References
Abuturab M (2013) Color information security system using Arnold transform and double structured phase encoding in gyrator transform domain. Opt Laser Technol 4:525–532
Ahmad T (2014) Shared secret-based steganography for protecting medical data. In: Proceedings of international conference on computer, control, informatics and its applications (IC3INA), pp 87–92
Ahmed SM, Al-Zoubi Q, Abo-Zahhad M (2007) A hybrid ECG compression algorithm based on singular value decomposition and discrete wavelet transform. J Med Eng Technol 31(1):54–61
Ahson SA, Ilyas M (2010) Cloud computing and software services theory and techniques. CRC Press, Boca Raton
Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Processing 13:1147–1156
AzamiSidek K, Mai V, Khalil I (2014) Data mining in mobile ECG based biometric identification. J Netw Comput Appl 44:83–91
Bacharova L, Bang L, Szathmary V, Mateasik A (2014) Imaging QRS complex and ST segment in myocardial infarction. J Electrocardiol 47(4):438–447
Boucsein W (2012) Electrodermal activity. Springer, Berlin, p 2 (ISBN 978-1-461-41126-0)
Bulling A et al (2009) Wearable EOG goggles: seamless sensing and context-awareness in everyday environments. J Ambient Intell Smart Environ 1(2):157–171
Calvillo J, Roman I, Roa LM (2013) Empowering citizens with access control mechanisms to their personal health resources. Int J Med Inf 82:58–72
Cavagnino D, Lucenteforte M, Grangetto M (2015) High capacity reversible data hiding and content protection for radiographic images. Sig Process 117:258–269
Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253–266
Chakraborty S, Samanta S, Biswas D, Dey N, Chaudhuri S (2013) Particle swarm optimization based parameter optimization technique in medical information hiding. In: Proceedings of IEEE international conference on computational intelligence and computing research
Chao HM, Hsu CM, Miaou SG (2002) A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6:46–53
Chaoab H, Twua S, Hsu C (2005) A patient-identity security mechanism for electronic medical records during transit and at rest. Med Inf Internet Med 30(3):227–240
Coatrieux G, Maitre H, Sankur B (2001) Strict integrity control of biomedical images. In: Proceedings of SPIE security and watermarking of multimedia
Correa MAgustinaG, Leber EL (2011) Noise removal from EEG signals in polisomnographic records applying adaptive filters in cascade, adaptive filtering applications, Chap. 8. InTech, Croatia
Cox IJ, Miller ML, Bloom JA, Fridrich J (2008) Ton Kalker digital watermarking and steganography. Morgan Kaufmann, Burlington
Crichtona JHM (2009) Defining high, medium, and low security in forensic mental healthcare: the development of the Matrix of Security in Scotland. J Forensic Psychiatry Psychol 20(3):333–353
Dao T, Pouletaut P, Charleux F, Lazáry Á, Eltes P, Varga P, Ho Ba Tho M (2015) Multimodal medical imaging (CT and dynamic MRI) data and computer-graphics multi-physical model for the estimation of patient specific lumbar spine muscle forces. Data Knowl Eng 96–97:3–18
De la Rosa Algarin A, Demurjian S, Berhe S, Pavlich-Mariscal J (2012) A security framework for xml schemas and documents for healthcare. In: Proceedings of IEEE international conference on bioinformatics and biomedicine workshops, pp 782–789
Delbarpour S, Sajedi H (2017) Image steganography with artificial immune system. In: 7th joint conference on artificial intelligence and robotics and the 9th RoboCup IranOpen International Symposium
Delorme A, Makeig S (2004) EEGLAB: an open source toolbox for analysis of single trial EEG dynamics including independent component analysis. J Neurosci Methods 134:9–21
Edward Jero S, Ramu P, Ramakrishnan S (2014) Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J Med Syst 38(10):132–140
Eisenberg RL, Margulis AR (2011) A patient’s guide to medical imaging. Oxford University Press, Oxford (ISBN 978-0-19-972991-3)
Electroencephalogram (EEG) (2018). http://hopkinsmedicine.org/healthlibrary/test_procedures/neurological/electroencephalogram_eeg_92,p07655/. Accessed 4 Aug 2018
Engin M, Cidam O, Engin EZ (2005) Wavelet transformation based watermarking technique for human electrocardiogram (ECG). J Med Syst 29(6):589–594
Fernandez-Aleman JL, Carrion Seor I, angel Oliver Lozoya P, Toval A (2013) Security and privacy in electronic health records: a systematic literature review. J Biomed Inform 46:541–562
Gao MZ, Wu ZG, Wang L (2013) Comprehensive evaluation for HE based contrast enhancement techniques. Adv Intell Syst Appl 2:331–338
Gavrovska A, Bogdanović V, Reljin I, Reljin B (2014) Automatic heart sound detection in pediatric patients without electrocardiogram reference via pseudo-affine Wigner–Ville distribution and Haar wavelet lifting. Comput Methods Programs Biomed 113(2):515–528
Ghazvini A, Shukur Z (2013) Security challenges, and success factors of electronic healthcare system. In: Proceedings of 4th international conference on electrical engineering and informatics (ICEEI 2013), pp 212–219
Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10:722–732
Giannetti V (2003) Medical errors: the hidden victim. Clin Res Regul Affairs 20(4):425–432
Gkoulalas-Divanis A, Loukides G, Sun J (2014) Publishing data from electronic health records while preserving privacy: a survey of algorithms. J Biomed Inform 50:4–19
Goljan M, Fridrich J, Du R (2001) Distortion-free data embedding for images. In: Proceedings of 4th information hiding workshop, pp 27–41
Golpira H, Danyali H (2010) Reversible blind watermarking for medical images based on wavelet histogram shifting. In: Proceedings of IEEE international symposium on signal processing and information technology (ISSPIT), pp 31–36
Gritzalis S, Iliadis J, Gritzalis D, Spinellis D, Katsikas S (1999) Developing secure web-based medical applications. Med Inf Internet Med 24(1):75–90
Gritzalisa D, Katsikasa S, Keklikoglou J, Tomaras A (1991) Data security in medical information systems: technical aspects of a proposed legislation. Med Inf 16(4):371–383
Guo X, Zhuang T (2003) A lossless watermarking scheme for enhancing security of medical data in PACS. In: Proceedings of SPIE and medical imaging, pp 350–359
Guo X, Zhuang T (2009) A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64
Hafizah Hassan N, Ismail Z (2012) A conceptual model for investigating factors influencing information security culture in healthcare environment. International Congress on Interdisciplinary Business and Social Science
Hu F, Jiang M, Wagner M, Dong D (2007) Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software code sign. IEEE Trans Inf Technol Biomed 11(6):619–627
Ibaida A, Khalil I, Al-Shammary D (2010) Embedding patients confidential data in ECG signal for healthcare information systems. In: Proceedings of IEEE engineering in medicine and biology society
Ibrahim W, Saniee M, Abadeh (2017) Extracting features from protein sequences to improve deep extreme learning machine for protein fold recognition. J Theor Biol 421:1–15
Ibrahim W, Saniee M, Abadeh (2018) Protein fold recognition using deep kernelized extreme learning machine and linear discriminant analysis. Neural Comput Appl 1–14. https://doi.org/10.1007/s00521-018-3346-z
Istepanian RS, Petrosian AA (2000) Optimal zonal wavelet-based ECG data compression for a mobile telecardiology system. IEEE Trans Inf Technol Biomed 4(3):200–211
Joseph T, Remya UL (2014) ECG steganography based privacy protection of medical data for telemedicine application. J Dent Med Sci 13(8):85–94
Kamal S, Khan M (2014a) An integrated algorithm for local sequence alignment. Netw Model Anal Health Inf Bioinf 3:68
Kamal Md, Khan M (2014b) Chapman–Kolmogorov equations for global PPIs with discriminant-EM. Int J Biomath 07(05):1450053
Kamal MdS, Khan M, Dev K, Chowdhury L, Dey N (2016) An optimized graph-based metagenomic gene classification approach: metagenomic gene analysis, classification and clustering in biomedical signal processing, IEG Global Publisher, pp 290–314
Kamal MdS, Chowdhury L, Khan M, Ashour AS, Tavares J, Dey N (2017a) Hidden Markov model and Chapman Kolmogrov for protein structures prediction from images, Comput Biol Chem 68:231–244
Kamal MdS, Sarowar MdG, Dey N, Ashour AS, Ripon SH, Panigrahi BK, Tavares JRS (2017b) Self-organizing mapping based swarm intelligence for secondary and tertiary proteins classification. Int J Mach Learn Cybern:1–24
Kamal MdS, Dey N, Ashour AS (2017c) Large scale medical data mining for accurate diagnosis: a blueprint, handbook of large-scale distributed computing in smart healthcare. Scalable computing and communications. Springer, Cham
Kamal MdS, Dey N, Nimmy S, Ripon S, Ali N, Ashour A, Karaa W, Nguyen G, Shi F (2018) Evolutionary framework for coding area selection from cancer data. Neural Comput Appl 29(4):1015–1037
Kaur S, Singhal R, Farooq O, Ahuja B (2010) Digital watermarking of ECG data for secure wireless communication. In: Proceedings of international conference on recent trends in information, telecommunication and computing, pp 140–144
Khan M, Kamal MS (2015) Performance evaluation of Warshall algorithm and dynamic programming for Markov chain i0 local sequence alignment. Interdiscip Sci 7(1):78–81
Khokhar RH, Chen R, Fung BCM, Man Lui S (2014) Quantifying the costs and benefits of privacy-preserving health data publishing. J Biomed Inform 50:107–121
Kullback S (1987) Letter to the editor: the Kullback–Leibler distance. Am Stat 41(4):340–341
Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143
Liberati A, Altman DG, Tetzlaff J, Mulrow C, Gotzsche PC, Ioannidis JPA et al (2009) The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. J Clin Epidemiol 62(10):e1–e34
Lin JC (1999) Applying telecommunication technology to health care delivery. IEEE Eng Med Biol Mag 18(4):28–31
Malashree KS, Jagadish KN, Suma M (2014) Confidential data hiding using wavelet based ECG steganography. Int J Eng Res Appl 4(5):84–88
Mazurczyk W, Szczypiorski K, Lubacz J (2013) 4 new ways to smuggle messages across the internet. IEEE Spectr 50(11):42–4523
Moody G, Mark R, Goldberger A (1988) Evaluation of the ‘TRIM’ ECG data compressor. In: Proceedings of computers in cardiology, pp 167–70
Mu-Hsing A, Kuo (2011) Opportunities and challenges of cloud computing to improve health care services. J Med Internet Res 13(3):e67
Naheed T, Usman I, Khan TM, Dar AH, Shafique M (2014) Intelligent reversible watermarking technique in medical images using GA and PSO. Optik 125:2515–2525
Nambakhsh MS, Ahmadian A, Ghavami M, Dilmaghani RS, Karimi-Fard S (2006) A novel blind watermarking of ECG signals on medical images using EZW algorithm. In: Proceedings of IEEE engineering in medicine and biology society, pp 3274–3277
National Biomedical Imaging Archive. http://imaging.nci.nih.gov. Accessed 28 Apr 2018
Nimmy S, Kamal MdS, Hossain MI, Dey N, Ashour AS, Shi F (2017) Neural skyline filtering for imbalance features classification. Int J Comput Intell Appl 16(03):1–25
Omotosho A, Adegbola O, Olayemi Mikail O, Emuoyibofarhe J (2014) A secure electronic prescription system using steganography with encryption key implementation. Int J Comput Inf Technol 3(5):980–986
Pangalos GJ (1995) Design, and implementation of secure medical database systems. Med Inform 20(3):265–277
Pangalosa GJ (1993) Medical database security evaluation. Med Inform 18(4):283–292
Phukpattaranont P (2015) QRS detection algorithm based on the quadratic filter. Expert Syst Appl 42(11):4867–4877
Poremba S (2015) Cyber security is growing importance for medical devices too. Forbes magazine. 1/19/2015
Rao NV, Kumarib VM (2011) Watermarking in medical imaging for security and authentication. Inf Secur J 20(3):148–155
Rubio OJ, Alesanco A, Garcia J (2013) Secure information embedding into 1D biomedical signals based on SPIHT. J Biomed Inform 46:653–664
Said A, Pearlman W (1996) A new fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans Circ Syst Video Technol 6(3):243–250
Sajedi H, Jamzad M (2009a) Adaptive batch steganography considering image embedding capacity. Opt Eng 48(8):1–10
Sajedi H, Jamzad M (2009b) Secure steganography based on embedding capacity. J Inf Secur 8(6):433–445
Sajedi H, Jamzad M (2010a) HYSA: hybrid steganographic approach using multiple steganography methods. Secur Commun Netw 4(10):1173–1184
Sajedi H, Jamzad M (2010b) BSS: boosted steganography scheme with cover image preprocessing. Expert Syst Appl 37:7703–7710
Sajedi H, Mohammadipanah F, Shariat Panahi HK (2018) An image analysis-aided method for redundancy reduction in differentiation of identical actinobacterial strains. Future Microbiol 13(3):313–329
Shapiro JM (1993) Embedded image coding using zerotrees of wavelet coefficients. IEEE Trans Signal Proces 41(12):3445–3462
Shoukat IA, Bakar KA, Iftikhar M (2011) A survey about the latest trends and research issues of cryptographic elements. Int J Comput Sci Issues 8(3):140–149
Srinivasan Y, Nutter B, Mitra S, Phillips B, Ferris D (2004) Secure transmission of medical records using high capacity steganography. In: Proceedings of 17th IEEE symposium on computer-based medical systems
Staal JJ, Abramoff MD, Niemeijer M, Viergever MA, van Ginneken B (2004) Ridge based vessel segmentation in color images of the retina. IEEE Trans Med Imaging 23:501–509
Stansfield S (2005) Structuring information and incentives to improve health. Bull World Health Organ 83(8):562
Stokes M, Blythe M (2001) Muscle Sounds in physiology, sports science and clinical investigation. Medintel, Oxford (ISBN 0-9540572-0-1)
Subhedara MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13(14):95–113
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13:890–896
Traver V, Monton E, Bayo JL, Garcia JM, Hernandez J, Guillen S (2003) Multiagent home telecare platform for patients with cardiac diseases. In: Proceedings of computing in cardiology, pp 117–120
Tupakula U, Varadharajan V (2013) security techniques for counteracting attacks in mobile healthcare services. In: Proceedings of 3rd international conference on current and future trends of information and communication technologies in healthcare, pp 374–381
Tzelepi S, Pangalos G, Nikolacopoulou G (2002) Security of medical multimedia, medical informatics and the internet in medicine. Taylor & Francis, London, vol 27, no 3, pp 169–184
Ullsberger P, Delorme A (2007) EEGLAB study set. http://tinyurl.com/bsdkyaj. Accessed May 2012
Vargheese R, Prabhudesai P (2014) Securing B2B pervasive information sharing between healthcare providers: enabling the foundation for evidence based medicine. International Workshop on Privacy and Security in HealthCare (PSCare14), pp 525–530
Vleeschouwer C, Delaigle JF, Macq B (2003) Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimed 5:97–105
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error measurement to structural similarity. IEEE Trans Image Process 13(1):600–612
Wang H, Peng D, Wang W, Sharif H, Chen H, Khoynezhad A (2010) Resource-aware secure ECG healthcare monitoring through body sensor networks. Wirel Commun 17(1):12–19
Wong S, Zaremba L, Gooden D, Huang HK (1995) Radiologic image compression—a review. In: Proceedings of the IEEE, vol 83, no 2, pp 194–219
Wu H, Huang J, Shi Y (2015) A reversible data hiding method with contrast enhancement for medical images. J Vis Commun Image Retriev 31:146–153
Yang J, Li J, Niu Y (2015a) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Syst 43:74–86
Yang J, Qiang Li J, Niu Y (2015b) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Systems 44:74–86
Zehl L, Jaillet F, Stoewer A, Grewe J, Sobolev A, Wachtler T, Brochier TG, Riehle A, Denker M, Grun S (2016) Handling metadata in a neurophysiology laboratory. Front Neuroinform 10:26
Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surv Tutor 14(2):380–400
Zheng K, Qian X (2008) Reversible data hiding for electrocardiogram signal based on wavelet transforms. In: Proceedings of international conference on computational intelligence and security
Zhou XQ, Huang HK, Lou SL (2001) Authenticity, and integrity of digital mammography images. IEEE Trans Med Imaging 20:784–791
Zhou Z, Huang HK, Liu BJ (2005) Digital signature embedding (DSE) for medical image integrity in a data grid off-site backup archive. In: Proceedings of SPIE and Medical imaging, pp 306–317
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Author declares that they have no conflict of interest.
Studies with human participants or animals
This article does not contain any studies with human participants or animals performed by the author.
Rights and permissions
About this article
Cite this article
Sajedi, H. Applications of data hiding techniques in medical and healthcare systems: a survey. Netw Model Anal Health Inform Bioinforma 7, 6 (2018). https://doi.org/10.1007/s13721-018-0169-x
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13721-018-0169-x