Adaptive Electrocardiogram Steganography Based on 2D Approach with Predetermined Rules
DOI:
https://doi.org/10.24203/ajcis.v8i1.6059Keywords:
Data Hiding, ECG Steganography, 2D Bit-embedding/-extraction Approach, Real-time ApplicationsAbstract
Based on two-dimensional (2D) bit-embedding/-extraction approach, we propose a simple data hiding for electrocardiogram (ECG) signal. The patient’s sensitive (diagnostic) data can be efficiently hidden into 2D ECG host via the proposed decision rules. The performance of the proposed method using various sizes of the host bundles was demonstrated. Simulations have confirmed that the average SNR of the proposed method with a host bundle of size 3 ´ 3 is superior to that of existing techniques, while our payload is competitive to theirs. In addition, our method with a host bundle of size 2 ´  2 generated the best SNR values, while that with a host bundle of size 4 ´  4 provided the largest payload among the compared methods. Moreover, the proposed method provides robustness performance better than existing ECG steganography. Namely, our method provides high hiding capacity and robust against the attacks such as cropping, inversion, scaling, translation, truncation, and Gaussian noise-addition attacks. Since the proposed method is simple, it can be employed in real-time applications such as portable biometric devices.References
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, “Digital Watermarking and Steganography,†2nd Ed., Morgan Kaufmann, USA, 2007.
E. Eielinska, W. Mazurczyk, and K. Szczypiorski, “Trends in steganography,†Comm. of the ACM, vol. 57, pp. 86-95, 2014.
S. Liu, Z. Pan, and H. Song, “Digital image watermarking method based on DCT and fractal encoding,†IET Image Proc., vol. 11, pp. 815-821, 2017.
K.M. Hosny and M.M. Darwish, “Invariant image watermarking using accurate Polar harmonic transform,†Computer and Electrical Engineering, vol. 62, pp. 429-447, 2017.
C.Y. Hsiao, M.F. Tsai, and C.Y. Yang, “Simple and robust watermarking scheme based on square-root-modulus technique,†Multimedia Tools and Applications, vol. 77, pp. 30419-30435, 2018.
Hedieh Sajedi, “Applications of data hiding techniques in medical and healthcare systems: a survey,†Network Modeling Analysis in Health Informatics and Bioinformatics, doi: 10.1007/s13721-018-0169-x, 2018.
H.J. Shiu, B.S. Lin, C.H. Huang, P.Y. Chiang, and C.L. Lei, “Preserving privacy of online digital physiological signals using blind and reversible steganography,†Computer Method and Programs in Biomedicine, vol. 151, pp. 159-170, 2017.
L.T. Cheng and C.Y. Yang, “High-performance Reversible Electrocardiogram Steganography Based on Fast Discrete Cosine Transform with Coefficients Offset,†2019 Global Conference on Engineering and Applied Science (GCEAS 2019), July 16-18, Sapporo, Japan, 2019.
S. Bhalerao, I.A. Ansari, A. Kumar, D. Kumar, and D.K. Jain, “A reversible and multipurpose ECG data hiding technique for telmedicine applications,†Pattern Recogition Letter, vol. 125, pp. 463-473, 2019.
A. Swierkosz and P. Augustyniak, “Optimizing wavelet ECG watermarking to maintain measurement performance according to industrial standard,†Sensors, vol. 18, doi: 10.3390/s18103401, 2018.
S.T. Chen, Y.J. Guo, H.N. Huang, W.M. Kung, K.K. Tseng, and S.Y. Tu, “Hiding patients confidential data in the ECG signal via transform-domain quantization,†Journal of Medical Systems, vol. 38, doi: 10.1007/s10916-014-0054-9, 2014.
A. Ibaida and I. Khalil, “Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems,†IEEE T. Biomedical Eng., vol. 60, pp. 3322-3330, 2013.
S.E. Jero, P. Ramu, and S. Ramakrishnan, “Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission,†Journal of Medical Systems, vol. 38:132, doi: 10.1007/s10916-014-0132-z, 2014.
S.E. Jero, P. Ramu, and S. Ramakrishnan, “ECG steganography using curvelet transform,†Biomedical Signal Processing and Control, vol. 22, pp. 161-169, 2015.
C.Y. Yang and W.F. Wang, “Effective electrocardiogram steganography based on coefficient alignment,†Journal of Medical Systems, vol. 40, DOI: 10.1007/s10916-015-0426-9, 2016.
S.E. Jero, P. Ramu, and S. Ramakrishnan, “Imperceptability-robustness tradeoff studies for ECG steganography using continuous ant colony optimization,†Expert Systems With Applications, vol. 49, pp. 123-135, 2016.
C.Y. Yang and W.F. Wang, “High-capacity ECG steganography with smart offset coefficients,†The 13th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2017), Aug. 12-15, Matsue, Japan, 2017.
C.Y. Yang and W.F. Wang, “An improved high-capacity ECG steganography with smart offset coefficients,†The 14th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2018), Nov. 26-28, Sendai, Japan, 2018.
G.B. Moody and R.G. Mark, “The impact of the MIT-BIH arrhythmia database,†IEEE Eng. in Medical and Biol., vol. 20, pp. 45-50, 2001.
Downloads
Published
Issue
Section
License
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.