Advertisement

Appending Photoplethysmograph as a Security Key for Encryption of Medical Images Using Watermarking

  • M. J. VidyaEmail author
  • K. V. Padmaja
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 713)

Abstract

In the current scenario, once a patient has been diagnosed with a disease, an expert physician’s opinion is sought forthwith, in accordance with advent of technology, and techniques do come into a key role in medical diagnosis. Most of the patients and physicians prefer to get a viewpoint before proceeding further with procedural treatment plans. Henceforth, securing and transmitting of data plays a vibrant role in terms of accuracy, security and other parameters. Cyber criminals involved in hacking medical data, look at it as an opportunity to hawk these sensitive data, leading to the hour of concern. The augment is to allow the patient information to govern and share, to end parties with at most level of seizure; so that information cannot be leaked. Because Government, International and National Medical Associations are looking at medical data security as a priority, it is very important to have an efficient algorithm or a method. The novelty in the proposed work lies in using the patient data as a security protocol and appending three stages of security: bundle encryption generated based on patient ID and age as the first stage, augmentation index derived from bioelectric signal source—photoplethysmograph (PPG)—as a pivotal opener and hybrid discrete wavelet transform–discrete cosine transform (DWT-DCT) watermarking in the second stage, last level of de-watermarking of embedded data from facial photograph of the patient.

Keywords

Watermarking Photoplethysmograph Electronic Patient Record 

References

  1. 1.
    Pradeepkumar, G., Usha, S.: Effective watermarking algorithm to protect Electronic patient record using image transform. In: 40th Annual International Conference of the EMBS Minneapolis. IEEE (2014)Google Scholar
  2. 2.
    Organization for Economic Co-operation and Development: Strengthening Health Information Infrastructure For Healthcare Quality Governance: Good practices, New opportunities and Data Privacy Protection Challenges. OECD Publishers (2015)Google Scholar
  3. 3.
    Deloitte: A report on global health care outlook, common goals, Competing Priorities (2017)Google Scholar
  4. 4.
    Thales Data Threat Report: New technologies and old habits driving data breaches and risk in global healthcare. Healthcare Edition (2017)Google Scholar
  5. 5.
    Gran, B., et al.: Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J. Digit. Imaging PubMedC. Web, 216–225 (2017)Google Scholar
  6. 6.
    Iftikhar, S., et al.: A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing. IEEE Syst. J. 11, 197–206 (2016)CrossRefGoogle Scholar
  7. 7.
    Chao, H.M., Hsu, C.M., Miaou, S.G.: A data hiding technique with authentication, integration and confidentiality for electronic patient records. IEEE TransInf. Technol. Biomed. 6, 46–52 (2002)CrossRefGoogle Scholar
  8. 8.
    RituAgrawal, M.S.: Medical image watermarking technique in the application of E-diagnosis using M-Ary modulation. Proced. Comput. Sci. 85, 648–655 (2016)CrossRefGoogle Scholar
  9. 9.
    Acharya, U.R., Niranjan, U.C., Iyengar, S.S., Kannathal, N., Min, L.C.: Simultaneous storage of patient information with medical images in the frequency domain. Comput. Methods Program. Biomed. 76, 13–19 (2004)Google Scholar
  10. 10.
    Maity, H.K., Maity, S.P.: Joint robust and reversible watermarking for medical images. Proced. Technol. 6, 275–282 (2012) ISSN 2212-0173CrossRefGoogle Scholar
  11. 11.
    Brunelli, R., Poggio, T.: Face recognition: features versus templates. IEEE Trans. Pattern Anal. Mach. Intell. 15(10), 1042–1052 (2003)CrossRefGoogle Scholar
  12. 12.
    Li, F.F.: Sound-based multimodal person identification from signature and voice. In: 5TH International Conference on Internet Monitoring and Protection(ICIMP) (2010)Google Scholar
  13. 13.
    Nakanishi, I., Baba, S., Miyamoto, C.: EEG based biometric authentication using new spectral features. In: International Symposium on Intelligent Signal Processing and Communication Systems (2009)Google Scholar
  14. 14.
    Kumar, D., Ryu, Y.: A brief introduction of biometrics and fingerprint payment technology. Int. J. Adv. Sci. Technol. 4 (2009)Google Scholar
  15. 15.
    Biel, L., Pettersson, O., Philipson, L., Wide, P.: ECG analysis: a new approach in human identification. IEEE Trans. Instrum. Meas. 50(3), 808–812 (2001)CrossRefGoogle Scholar
  16. 16.
    Elgendi, M.: On the analysis of fingertip Photoplethysmogram signals. Curr. Cardiol. Rev. 8, 14–25 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Electronics & Instrumentation EngineeringR. V. College of EngineeringBengaluruIndia

Personalised recommendations