Effective Electrocardiogram Steganography Based on Coefficient Alignment
- 191 Downloads
This study presents two types of data hiding methods based on coefficient alignment for electrocardiogram (ECG) signals, namely, lossy and reversible ECG steganographys. The lossy method is divided into high-quality and high-capacity ECG steganography, both of which are capable of hiding confidential patient data in ECG signals. The reversible data hiding method can not only hide secret messages but also completely restore the original ECG signal after bit extraction. Simulations confirmed that the perceived quality generated by the lossy ECG steganography methods was good, while hiding capacity was acceptable. In addition, these methods have a certain degree of robustness, which is rare in conventional ECG stegangraphy schemes. Moreover, the proposed reversible ECG steganography method can not only successfully extract hidden messages but also completely recover the original ECG data.
KeywordsData hiding Lossy ECG steganography Reversible ECG steganography Coefficient alignment
- 1.Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., and Kalker, T., Digital watermarking and steganography, 2nd edition. Morgan Kaufmann, MA, 2008.Google Scholar
- 2.Phadikar, A., Data hiding techniques and applications specific designs. LAP LAMBERT Academic Publishing, Saarbrucken, 2012.Google Scholar
- 5.Pan, J.S., Li, W., Yang, C.S., and Yan, L., “Image steganography based on subsampling and compressive sensing,”. Multimed. Tools Applic.. doi: 10.10071/s11042-014-2070-1.Google Scholar
- 8.Wang, S., Miyauchi, R., Unoki, M., and Kim, N. S., Tampering detection scheme for speech signals using formant enhancement based watermarking. J. Inform. Hiding Multimed. Sign. Process. 6:1264–1283, 2015.Google Scholar
- 10.Yan, B., Wang, Y. F., Song, L. Y., and Yang, H. M., Power spectrum compliant QIM watermarking for autoregressive host signals. J. Inform. Hiding Multimed. Sign. Process. 6:882–888, 2015.Google Scholar
- 13.Liu, J., Tang, G, and Sun, Y., “A secure steganography for privacy protection in healthcare system,” J. Med. Syst. 2013. doi: 10.1007/s10916-012-9918-z.
- 14.Ibaida, A., Khalil, I. and Al-Shammary, D.,“Embedding patients confidential data in ECG signal for healthcare information systems,” 32nd Ann. Int. Conf. the IEEE EMBS Buenos Aires, Argentina, Aug. 31–Sept. 4, pp. 3897–3894, 2010.Google Scholar
- 15.Ibaida, A., Khalil, I., and Schynde, R. V., A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system. Comput. Cardiol. 38:393–396, 2011.Google Scholar
- 17.Shekhawat, A. S., Jain, A., and Patil, D., A study of ECG steganography for securing patient’s confidential data based on wavelet transformation. Int. J. Comput. App. 105:12–16, 2014.Google Scholar
- 18.Jero, S.E., Ramu, P. and Ramakrishnan, S.,“Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission,” J. Med. Syst.38, doi: s10916-014-0132-z, 2014.Google Scholar
- 23.Chen, S.T., Guo, Y.J. and Huang, H.N., “Hiding patients confidential data in the ECG signal via a transform-domain quantization scheme,” J. Med. Syst. doi: s10916-014-0054-9, 2014.Google Scholar
- 24.Zheng, K.M. and Qian, X.,“Reversible data hiding for electrocardiogram signal based on wavelet transform,” Int. Conf. Comput. Intelli. Sec. 13–17 Dec. Suzhou, China, p. 295–299, 2008.Google Scholar
- 27.PhysioNet, “The creighton university ventricular tachyarrhythmia database,” http://www.physionet.org/physiobank.