Adaptive Electrocardiogram Steganography Based on 2D Approach with Predetermined Rules

Authors

  • Ching Yu Yang Department of Computer Science and Information Engineering National Penghu University of Science and Technology 300, Liu-Ho Rd., Magong, Penghu, 880
  • Chi-Ming Lai Department of Computer Science and Information Engineering National Penghu University of Science and Technology 300, Liu-Ho Rd., Magong, Penghu, 880
  • Hung-Chang Lin Department of Computer Science and Information Engineering National Penghu University of Science and Technology 300, Liu-Ho Rd., Magong, Penghu, 880
  • Ting-Ying Lin Department of Computer Science and Information Engineering National Penghu University of Science and Technology 300, Liu-Ho Rd., Magong, Penghu, 880
  • Ruei-Long Lu Department of Computer Science and Information Engineering National Penghu University of Science and Technology 300, Liu-Ho Rd., Magong, Penghu, 880

DOI:

https://doi.org/10.24203/ajcis.v8i1.6059

Keywords:

Data Hiding, ECG Steganography, 2D Bit-embedding/-extraction Approach, Real-time Applications

Abstract

Based on two-dimensional (2D) bit-embedding/-extraction approach, we propose a simple data hiding for electrocardiogram (ECG) signal. The patient’s sensitive (diagnostic) data can be efficiently hidden into 2D ECG host via the proposed decision rules. The performance of the proposed method using various sizes of the host bundles was demonstrated. Simulations have confirmed that the average SNR of the proposed method with a host bundle of size 3 ´ 3 is superior to that of existing techniques, while our payload is competitive to theirs. In addition, our method with a host bundle of size 2 ´  2 generated the best SNR values, while that with a host bundle of size 4 ´  4 provided the largest payload among the compared methods. Moreover, the proposed method provides robustness performance better than existing ECG steganography. Namely, our method provides high hiding capacity and robust against the attacks such as cropping, inversion, scaling, translation, truncation, and Gaussian noise-addition attacks. Since the proposed method is simple, it can be employed in real-time applications such as portable biometric devices.

References

I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, “Digital Watermarking and Steganography,†2nd Ed., Morgan Kaufmann, USA, 2007.

E. Eielinska, W. Mazurczyk, and K. Szczypiorski, “Trends in steganography,†Comm. of the ACM, vol. 57, pp. 86-95, 2014.

S. Liu, Z. Pan, and H. Song, “Digital image watermarking method based on DCT and fractal encoding,†IET Image Proc., vol. 11, pp. 815-821, 2017.

K.M. Hosny and M.M. Darwish, “Invariant image watermarking using accurate Polar harmonic transform,†Computer and Electrical Engineering, vol. 62, pp. 429-447, 2017.

C.Y. Hsiao, M.F. Tsai, and C.Y. Yang, “Simple and robust watermarking scheme based on square-root-modulus technique,†Multimedia Tools and Applications, vol. 77, pp. 30419-30435, 2018.

Hedieh Sajedi, “Applications of data hiding techniques in medical and healthcare systems: a survey,†Network Modeling Analysis in Health Informatics and Bioinformatics, doi: 10.1007/s13721-018-0169-x, 2018.

H.J. Shiu, B.S. Lin, C.H. Huang, P.Y. Chiang, and C.L. Lei, “Preserving privacy of online digital physiological signals using blind and reversible steganography,†Computer Method and Programs in Biomedicine, vol. 151, pp. 159-170, 2017.

L.T. Cheng and C.Y. Yang, “High-performance Reversible Electrocardiogram Steganography Based on Fast Discrete Cosine Transform with Coefficients Offset,†2019 Global Conference on Engineering and Applied Science (GCEAS 2019), July 16-18, Sapporo, Japan, 2019.

S. Bhalerao, I.A. Ansari, A. Kumar, D. Kumar, and D.K. Jain, “A reversible and multipurpose ECG data hiding technique for telmedicine applications,†Pattern Recogition Letter, vol. 125, pp. 463-473, 2019.

A. Swierkosz and P. Augustyniak, “Optimizing wavelet ECG watermarking to maintain measurement performance according to industrial standard,†Sensors, vol. 18, doi: 10.3390/s18103401, 2018.

S.T. Chen, Y.J. Guo, H.N. Huang, W.M. Kung, K.K. Tseng, and S.Y. Tu, “Hiding patients confidential data in the ECG signal via transform-domain quantization,†Journal of Medical Systems, vol. 38, doi: 10.1007/s10916-014-0054-9, 2014.

A. Ibaida and I. Khalil, “Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems,†IEEE T. Biomedical Eng., vol. 60, pp. 3322-3330, 2013.

S.E. Jero, P. Ramu, and S. Ramakrishnan, “Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission,†Journal of Medical Systems, vol. 38:132, doi: 10.1007/s10916-014-0132-z, 2014.

S.E. Jero, P. Ramu, and S. Ramakrishnan, “ECG steganography using curvelet transform,†Biomedical Signal Processing and Control, vol. 22, pp. 161-169, 2015.

C.Y. Yang and W.F. Wang, “Effective electrocardiogram steganography based on coefficient alignment,†Journal of Medical Systems, vol. 40, DOI: 10.1007/s10916-015-0426-9, 2016.

S.E. Jero, P. Ramu, and S. Ramakrishnan, “Imperceptability-robustness tradeoff studies for ECG steganography using continuous ant colony optimization,†Expert Systems With Applications, vol. 49, pp. 123-135, 2016.

C.Y. Yang and W.F. Wang, “High-capacity ECG steganography with smart offset coefficients,†The 13th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2017), Aug. 12-15, Matsue, Japan, 2017.

C.Y. Yang and W.F. Wang, “An improved high-capacity ECG steganography with smart offset coefficients,†The 14th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2018), Nov. 26-28, Sendai, Japan, 2018.

G.B. Moody and R.G. Mark, “The impact of the MIT-BIH arrhythmia database,†IEEE Eng. in Medical and Biol., vol. 20, pp. 45-50, 2001.

Downloads

Published

2020-02-21

How to Cite

Yang, C. Y., Lai, C.-M., Lin, H.-C., Lin, T.-Y., & Lu, R.-L. (2020). Adaptive Electrocardiogram Steganography Based on 2D Approach with Predetermined Rules. Asian Journal of Computer and Information Systems, 8(1). https://doi.org/10.24203/ajcis.v8i1.6059