Skip to main content

A New Wavelet Based Steganography Method for Securing Medical Data

  • Conference paper
  • First Online:
Innovations and Interdisciplinary Solutions for Underserved Areas (InterSol 2022)

Abstract

The transmission of confidential information over an open communication channel is susceptible to many threats like copyright infringement, eavesdropping and hacking. In this paper, we propose a solution combining data encryption techniques and multiscale signal analysis for securing patients’ confidential data. Discrete Wavelet Transform (DWT) is first applied to an ECG signal. The confidential patient information and the electrocardiogram (ECG) signal are then encrypted with the Advanced Encryption Standard (AES) method. Finally, the output of the encryption is hidden in an image to form the stego image and transferred to a medical server. While cryptography ensures the confidentiality of the data modified by the encryption process, steganography enhance the security. The evaluation of the proposed system was performed with real data and quantitative parameters such as Percent Residual Difference (PRD), Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The experimental results show the proposed scheme has a good encryption effect and a strong ability to resist detection compared with the existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Apnea-ECG Database. www.physionet.org/content/apnea-ecg/1.0.0/. Accessed 9 Nov 2021

  2. Abd Elminaam, D.S., Abdual-Kader, H.M., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 216–222 (2010)

    Google Scholar 

  3. Abdullah, A.: Advanced encryption standard (AES) algorithm to encrypt and decrypt data, June 2017

    Google Scholar 

  4. Abdur Razzaq, M., Shaikh, R., Adnan, M., Ahmed, A.: Digital image security: fusion of encryption, steganography and watermarking. Int. J. Adv. Comput. Sci. Appl. 8 (2007). https://doi.org/10.14569/IJACSA.2017.080528

  5. Bhardwaj, R., Sharma, V.: Image steganography based on complemented message and inverted bit LSB substitution. Procedia Comput. Sci. 93, 832–838 (2016). https://doi.org/10.1016/j.procs.2016.07.245, www.sciencedirect.com/science/article/pii/S1877050916314879

  6. Chan, C.K., Cheng, L.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37, 469–474 (2004). https://doi.org/10.1016/j.patcog.2003.08.007

  7. jin Chen, D., Wan, S., Xiang, J., Bao, F.S.: A high-performance seizure detection algorithm based on discrete wavelet transform (DWT) and EEG. PLoS ONE 12, e0173138 (2017)

    Google Scholar 

  8. Cheng, L.T., Yang, C.Y.: High performance electrocardiogram steganography based on fast discrete cosine transform. Int. J. Inf. Control Comput. Sci. 11(7) (2018). https://doi.org/10.5281/zenodo.1317262

  9. Elhoseny, M., Ramírez-González, G., Abu-Elnasr, O.M., Shawkat, S.A., Arunkumar, N., Farouk, A.: Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6, 20596–20608 (2018). https://doi.org/10.1109/ACCESS.2018.2817615

    Article  Google Scholar 

  10. Hashim, M., Taha, M.S., Aman, A.H.M., Hashim, A.H.A., Rahim, M.S.M., Islam, S.: Securing medical data transmission systems based on integrating algorithm of encryption and steganography. In: 2019 7th International Conference on Mechatronics Engineering (ICOM), pp. 1–6. IEEE (2019)

    Google Scholar 

  11. Hashim, M., Taha, M., Aman, A., Hashim, A., Rahim, M., Islam, S.: Securing medical data transmission systems based on integrating algorithm of encryption and steganography. In: 2019 7th International Conference on Mechatronics Engineering (ICOM), pp. 1–6, October 2019. https://doi.org/10.1109/ICOM47790.2019.8952061

  12. Hureib, E., Gutub, A.A.: Enhancing medical data security via combining elliptic curve cryptography and image steganography. Int. J. Comput. Sci. Netw. Secur. 20(8), 1–8 (2020)

    Google Scholar 

  13. Hureib, E., Gutub, A.: Enhancing medical data security via combining elliptic curve cryptography and image steganography, Vol. 20, pp. 1–8 , August 2020

    Google Scholar 

  14. Ibaida, A., Khalil, I.: Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans. Bio-med. Eng. 60 (2013). https://doi.org/10.1109/TBME.2013.2264539

  15. Nemcová, A., Smisek, R., Maršánová, L., Smital, L., Vitek, M.: A comparative analysis of methods for evaluation of ECG signal quality after compression. BioMed Res. Int. 2018 (2018). https://doi.org/10.1155/2018/1868519

  16. Pandey, H.: Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Fut. Gene. Comput. Sys. 111 (2020). https://doi.org/10.1016/j.future.2020.04.034

  17. Pawar, K., Naiknaware, D.: AES encrypted wavelet based ECG steganography. Int. J. Eng. Tech. 4 (2018)

    Google Scholar 

  18. Penzel, T., Moody, G., Mark, R., Goldberger, A., Peter, J.: The apnea-ECG database. In: Proceedings of Conference Computers in Cardiology 2000, vol. 27, pp. 255–258 (2000). https://doi.org/10.1109/CIC.2000.898505

  19. Priya, J., Suganya, R.: Steganography techniques for ECG signals: a survey. In: 2016 11th International Conference on Industrial and Information Systems (ICIIS), pp. 269–273 (2016). https://doi.org/10.1109/ICIINFS.2016.8262949

  20. Rajoub, B.: An efficient coding algorithm for the compression of ECG signals using the wavelet transform. IEEE Trans. Bio-med. Eng. 49, 355–362 (2002). https://doi.org/10.1109/10.991163

  21. Roy, R., Changder, S.: Quality evaluation of image steganography techniques: a heuristics based approach. Int. J. Secur. Appl. 10, 179–196 (2016)

    Google Scholar 

  22. Edward Jero, S., Ramu, P., Ramakrishnan, S.: Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J. Med. Syst. 38(10), 1–11 (2014). https://doi.org/10.1007/s10916-014-0132-z

    Article  Google Scholar 

  23. Santiago, A.M., et al.: Lightweight security hardware architecture using dwt and AES algorithms. IEICE Trans. Inf. Syst. E101.D(11), 2754–2761 (2018). https://doi.org/10.1587/transinf.2018EDP7174

  24. Zhang, Y., Xie, K., Ruan, O.: An improved and efficient mutual authentication scheme for session initiation protocol. PLoS ONE 14, e0213688 (2019). https://doi.org/10.1371/journal.pone.0213688

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aminata Ngom .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ngom, A., Djimnaibeye, S., Ngom, N.F., Sidibé, S., Niang, O. (2022). A New Wavelet Based Steganography Method for Securing Medical Data. In: Mambo, A.D., Gueye, A., Bassioni, G. (eds) Innovations and Interdisciplinary Solutions for Underserved Areas. InterSol 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 449. Springer, Cham. https://doi.org/10.1007/978-3-031-23116-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-23116-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-23115-5

  • Online ISBN: 978-3-031-23116-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics