SlideShare a Scribd company logo
1 of 6
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
54
Secure Transmission of Patient Physiological
Information in Point of Care System
Mr.K.Prem Kumar1
Dr.S.Thilagamani2
P.G Scholar, Department of CSE Head of the Department, Department of CSE
M.Kumarasamy College of Engineering M.Kumarasamy College of Engineering
kam.prem89@gmail.com sthilagamani11@gmail.com
Abstract: With an increase in the population of aged people with health issues, nowadays the significance of ECG based remote patient
monitoring system as a point of care (PoC) application in the hospitals is getting increased. Patient ECG signal and other physiological
information like body temperature, blood pressure, and glucose level, etc., collected by the body sensor networks will be transmitted
to the central hospital servers. After processing this information, the system sends the alerts to the doctors if any abnormal condition
arises. The major problem with this scenario is, the confidentiality of these information must be potted while the transmission over
public channel and storing in the hospital servers. In this paper, an ECG steganography based cryptographic technique is proposed to
preserve the confidentiality of the information. The proposed algorithm conceals the encrypted patients’ information in the ECG signal
without affecting the quality of that signal. It uses the cryptography and ECG steganography techniques to preserve the confidentiality
of the patients’ information. The effectiveness of the proposed algorithm is evaluated by comparing with the existing algorithms. It is
proved that the proposed algorithm is more secure with high processing speed and low distortion of data and host ECG signal.
Index Terms – Point of care system, ECG, cryptography, wavelet, confidentiality, steganography
——————————  ——————————
1 INTRODUCTION
Nowadays the remote health care monitoring systems
and Point of care (PoC) applications are more popular as they
reduce the medical labor cost and traffic in the medical
centers. In emergency cases Point of Care application provides
more reliable services by sending the Patient Health Record
(PHR) to doctors and necessary actions can be taken in order
to save the patients life. Here, the Internet is used as the
channel for transmitting the Patient Health Record (PHR) in
remote health care monitoring system. In remote health care
monitoring system, the body sensor networks are responsible
for collecting the ECG signals and the physiological
information of the patient. Then, the collected information will
be processed by the Personal Digital Assistant (PDA). After
all, the processed information will be sent to the central
hospital servers through the Internet. Now the doctors can
analyze this biomedical information and can take apposite
action in case of an emergency using any device from
anywhere. As the Internet is used as the communication
channel for PHR transmission in remote health care
monitoring system, preserving the confidentiality of the
patients’ health information is a major problem. According to
the Health Insurance Portability and Accountability Act
(HIPAA), while transmitting the patients health related
information through the common channel, it must be sent in a
secure way in order to conserve the privacy and confidentiality
of the information.
So it is indispensable to develop a security protocol
for secure communication and storage of PHR. Several
researchers have proposed various techniques for ensuring the
confidentiality of the PHR. There are two categories of
techniques proposed for the security of the PHR in remote
health care monitoring system. First, the techniques use the
encryption and decryption algorithms for securing the user
data while communication. The encryption algorithms convert
actual user data into unknown format that is very hard to
understand. The keys used for encryption and decryption of
user data play a vital role in the security issues. The notifiable
problem with this technique is computational overhead.
Second, the techniques that conceal the sensitive user
information inside insensitive information without increasing
the size of host information. These techniques are named as
steganography techniques. Though it is secure, this
steganography technique alone is not sufficient to overcome
the problem of secure communication in remote health care
monitoring system as stated by HIPAA.
In this paper, a new technique is proposed to
guarantee the secure transmission of patient health information
collected by body sensor networks. The proposed technique
employs both the cryptography and steganography techniques
for the secure communication in the remote health care
monitoring system. First, the patient physiological information
like glucose level, temperature, pressure level, etc., are
encrypted using the enhanced encryption algorithm. Then the
encrypted information is hidden inside the patient biomedical
signal collected by the body sensors. Here the patient ECG
signal acts as the host signal in which the patient health
information is concealed. Since almost all the health care
systems collect ECG signal, the usage of the ECG as host
signal is proposed in this paper. Moreover, the ECG signal size
is large compared to all other biomedial signals. Therefore it
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
55
fits to conceal all other small size information. As a result, the
proposed technique guarantees the security of the patient
information in the public channel by preventing unauthorized
access.
As the Fig. 1 depicts, in the proposed model, the body sensor
nodes will collect all the bio medical information like ECG
signal, temperature reading, pressure level, glucose level, etc.,
and then this information will be sent to the patients PDA
device via Bluetooth. Inside the PDA device, the
steganography and cryptography techniques will be applied in
order to hide the patient secret information inside the ECG
signal. Then, the resultant ECG signal is transmitted to the
central hospital servers. The patient secret information can be
extracted from the host ECG signal only by the authorized
persons.
2. RELATED WORK
There are so many approaches proposed to secure the
patient confidential data. One approach proposed to secure the
data is based on using cryptography technique. Here the
patient confidential data is encrypted before transmission. The
problem with this approach is computational overhead. As the
processing of patient information is done in the PDA, the
algorithm used for the encryption and decryption of patient
information should not reduce the speed of the PDA device.
Wei-Bin Lee and Chien-Ding Lee [4] proposed an
efficient approach for key management in the health care
system. The proposed method comprises of three phases
named as Registration phase, Encryption phase and
Decryption phase. In Registration phase when receiving the
registration request from the patient, SG sends the contract
consists of patient’s master key (Km) to the patient. In
Encryption phase, the patients information is encrypted with
the Session Key (Ks) calculated using Km, unique part of
health information (sn) and identification of the health care
provider (Hid).
In Decryption phase, the received encrypted patients
information is decrypted using the session key (Ks) calculated
as same as in encryption phase.The usage of smart card for the
key management is proposed here. The notable problem of this
scheme is usage of smart card because lots of countries may
have problems with smart card adoption. Also the calculation
of the session key is highly difficult to implement in PDA
devices.
Ilias Maglogiannis et all [6] proposed an architecture
for enhancing the location privacy and data encryption in the
Patient telemonitoring system (PTS). They proposed the
modified Mist architecture for the location privacy and
asymmetric encryption algorithm for data encryption. The
modification of the Mist architecture for the preservation of
location privacy is difficult to understand and implement in
real time patient telemonitoring system.
Zheng and Qian [3] proposed a wavelet transform
based reversible data hiding. In the proposed method, the B-
Spline wavelet transform is applied on the original ECG signal
for detecting the QRS complex. Once the R waves are
detected, Haar lifting wavelet transform is applied on the
original ECG signal. Then, with the help of Index subscripts
mapping the non-QRS high frequency wavelet coefficients are
selected. Next, the watermarking data are embedded by
shifting the selected coefficients 1 bit to the left. Finally, the
Fig.1. An Point of care (POC) systems where body sensors collect patient’s ECG and diagnostics information and watermarking process
implemented inside the patient’s mobile devices
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
56
reverse Haar lifting wavelet transform applied to construct the
ECG signal. Since 1 bit shifting is performed, the notable
problem of this approach is low capacity for watermarking.
Also this algorithm works on QRS complex of ECG signal
which is highly difficult to calculate in abnormal ECG signals.
Finally the proposed algorithm does not use any user defined
key, thus makes this algorithm more vulnerable for the
security attacks.
Golpira and Danyali [2] proposed a wavelet
histogram shifting based reversible blind watermarking
algorithm for medical images. Here the medical images like
MRI image is used as host signal. The proposed algorithm
applies 2d-wavelet transform to the MRI images and
histogram shifting for watermarking of binary data. This
algorithm is only capable of working with the MRI images,
thus reduces the capacity for watermarking. Also no
encryption of watermarking data is performed. So this
algorithm is highly susceptible to security threats.
Kaur et al. [1] proposed quantization based new
digital watermarking of ECG data. In the proposed algorithm,
each ECG sample is quantized using 10 bits and is divided
into segments. The chirp signal is modulated using patient ID,
multiplied by a window-dependent factor and added to the
ECG signal. Therefore, the final signal consists of 16 bits per
sample. The problem of this algorithm is the original size of
the host signal gets increased. Since the size of the host signal
gets varied after watermarking process, the intruders may be
altered about the presence of watermarked data.
3. METHODOLOGY
The proposed technique is enhanced with an
authentication process to avert the unauthorized access from
extracting the hidden information. The sender side algorithm
is designed with four integrated stages as shown in Fig. 2.
Whereas the receiver side algorithm consists of as shown in
Fig. 3. The proposed algorithm is designed to guarantee the
secrete information hiding with minimal distortion of the host
ECG signal.
A. Stage 1: Registration
In this phase, the patient has to register his or her
details with the point of care system. Here the indenture
between the patient and the person who is going to monitor
their health condition will be created. This stage crucially
focuses on the generation of keys for the encryption and
decryption. Along with the personal and health information, a
patient has to select two prime numbers for the purpose of key
generation. With the support of the selected prime number, the
following calculations will be done
c = a x b; c > 128 (1)
g = (a-1) x (b-1) (2)
where a and b are the prime numbers selected by the
patients while registration. Then the patient must select the
encryption key with the following condition
gcd ( E, g ) = 1 ; 1 < e < c (3)
where gcd represents the greatest common factor of e
and g. E represents encryption key. Then the decryption key
can be calculated using the following formula
D = E-1
(mod g) (4)
here mod represents the modules operation between E-1
and g.
The keys for encryption and decryption of patients
confidential information are as follows
Encryption key = {E, c}
Decryption key = {D,c}
In completion of registration phase, the key for
encrypting and decrypting the information get generated and
stored in the user’s PDA device.
B. Stage 2: Encryption
The body sensors placed in the patients body
calculate the patients physiological information like body
temperature, glucose level, pressure level, etc.... These
numeric values are transmitted to the patients PDA device that
via Bluetooth. Now encryption of the user’s information is
performed using the following formula
P = M E
(mod c) (5)
Where M represents the numeric value of the patients
physiological information. P represents the encrypted value of
the patients physiological information.
Fig.2. Block diagram of the sender steganography
C: Stage 3: Wavelet Decomposition
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
57
The wavelet transform is a process of decomposing
the signals over dilated and translated functions called
wavelets, which convert the signal into coefficients that
represents the frequency of the signal at a given time. The
Wavelet transform can be mathematically expressed as
follows
∞
C ( A, B) = ∫ f(t) ᴪ (6)
-∞
Where ᴪ represents the wavelet function. A and B are
positive integers represents transform parameters. C
symbolizes the coefficient which is a function of scale and
position parameters [9]. The Wavelet transform unite time
domain and frequency domain in one transform. Since the
ECG signal must be treated in the form of discrete signal, the
proposed algorithm uses discrete wavelet transform (DWT).
Band filters is used to perform the DWT decomposition by
applying wavelet transform. As a result of the decomposition
two different signals, one will be associated with the high-
frequency components and the other will be related to low-
frequency components of the original ECG signal. Here
multilevel packet wavelet decomposition is done to
decompose the original ECG signal into multiple sub bands of
the signals where the embedding of the encrypted user’s data
is done. The DWT can be defined as follows:
W(i,j) = ∑ ∑ X(i) ᴪi,j (n) (7)
i j
where W(i,j) represents the DWT coefficients , i and j
are the scale and shift transform parameters, and ᴪi,j (n) is the
wavelet basis time function with finite energy and fast decay.
The wavelet function can be defined as follows:
ᴪi,j (n) = 2 –i/2
ᴪ ( 2-i
n – j) (8)
In this paper, four level wavelet packet decomposition has
been applied to the host ECG signal. So that 15 sub bands
resulted from this decomposition process. The original ECG
signal is divided into two signals in each decomposition that
represent high and low frequency components of the original
signal. In order to achieve the minimal distortion, different
steganography level will be selected for each band.
Accordingly, the selected steganography level for bands from
1 to 17 is 5 bits and 6 bits for the other bands [7].
D: Stage 4: Embedding Process
As the Fig.2 portrays, the proposed technique uses
the scrambling matrix and level vector for the embedding of
the encrypted secrets bits into the decomposed wavelet
coefficients. A scrambling operation is done with the help of
two parameters. First is the shared key generated in the
registration phase. Second is the scrambling matrix with the
size 128 x 15. The scrambling matrix is stored inside both the
sender and the receiver. So each transmitter and receiver pair
has a unique scrambling matrix. The important rule for
building the scrambling matrix is there should not any
repetition of values in the matrix. The embedding process is
done as shown in the Fig.3
Fig.3. Block diagram of Embedding process
The secret data are embedded in the wavelet
coefficients according to the sub band sequence from the
fetched row of the scrambling matrix. In the similar way, the
steganography level is determined according to the level
vector.
E: Stage 5: Inverse wavelet Recomposition
This is the final stage of the sender side. Here the
resultant watermarked 15 sub bands are recomposed using
inverse wavelet packet Recomposition algorithm. The result of
this stage is a watermarked ECG signal. The inverse wavelet
Recomposition process converts the wavelet frequency
coefficients into time domain signals. The resultant
watermarked ECG signal will have minimal distortion and
remain diagnosable.
F: Stage 6: Watermark Extraction Process
Fig.4. Block diagram of receiver steganography
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
58
This process involves in the extraction of secret
information from the watermarked ECG signal. It is necessary
to know the shared key, level vector and the scrambling matrix
in the receiver side for the extraction of hidden information.
The Fig.4 depicts the steps involved in the extraction process.
The watermark extraction process starts with the four-level
wavelet packet decomposition to generate the 15 sub bands
signals. Then, according to the sequence row fetched from the
scrambling matrix the secret bits are extracted using the shared
key and scrambling matrix. Finally, the extracted secret bits
are decrypted using the same shared key. This stage is
performed in the receiver side.
4. RESULTS AND DISCUSSION
As explained, the proposed technique mainly focuses on the
following
1. Secure transmission of patients confidential
information
2. Minimal distortion
3. High processing speed
In the proposed algorithm, the security of the patients
information is based on the three parameters. Any changes
in the parameters will restrict the users from accessing the
secret information hidden in the ECG signal. So the
transmitter and receiver must have the agreement over the
following parameters
1. The encryption key
2. Scrambling matrix with the size 128 x 15
3. Steganography Level vector
Even if the encryption key is stolen by the attacker, the hidden
information cannot be extracted without knowing the
scrambling matrix and steganography level vector. Since the
scrambling matrix is stored in the transmitter and receiver
device, there is no need of transmission of scrambling matrix.
So it is very hard for the third party to get the knowledge
about the scrambling matrix. Even the guessing of values of
the scrambling matrix is also highly challengeable for the
attacker since the size of the matrix is high.
The number of transmitter / receiver pairs with a unique
scrambling matrix can be calculated as follows:
N = 128! x 15! (9)
The amount of data that can be stored inside the ECG host
signal using the proposed algorithm is totally depends on the
steganography level vectors. That can be calculated as follows
[7]:
(10)
where t is the total signal in seconds, fs is the sampling
frequency and b is the total number of bits stored. As the result
of
the comparison between the ECG signals showed in the Fig.5,
Fig.6 and Fig.7 its clearly proven that after watermarking also
the ECG signal remains diagnosable.
Fig.5. ECG signal before watermarking
Fig.6. ECG signal after watermarking
Fig.7. ECG signal after watermark extraction
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
59
5. CONCLUSION
In this paper, new ECG steganography based
algorithm is proposed to conceal the patients confidential
information inside the ECG signal for easy and secure
transmission in the point of care system. Here the ECG signals
are decomposed into four levels that results 15 sub bands of
the frequency coefficients. The ECG signals are decomposed
using the discrete wavelet transform concept. The scrambling
matrix and the level vectors are used to identify the sub bands
for the embedding process. Before embedding, the patients
information is encrypted to attain high security. Finally it is
proven that the resultant watermarked ECG signal is having
the same quality like original ECG signal and the embedded
data can be extracted with minimal negligible distortion.
REFERENCES
[1] S. Kaur, R. Singhal, O. Farooq, and B. Ahuja, ―Digital
watermarking of ECG data for secure wireless communication,‖ in
Proc. Int. Conf. Recent Trends Inf. Telecommun. Comput., Mar. 2010,
pp. 140–144.
[2] H. Golpira and H. Danyali, ―Reversible blind watermarking for
medical images based on wavelet histogram shifting,‖ in Proc. IEEE
Int. Symp. Signal Process. Inf. Technol., Dec. 2009, pp. 31–36.
[3] K. Zheng and X. Qian, ―Reversible data hiding for
electrocardiogram signal based on wavelet transforms,‖ in Proc. Int.
Conf. Comput. Intell. Security, Dec. 2008, vol. 1, pp. 295–299.
[4] W. Lee and C. Lee, ―A cryptographic key management solution
for HIPAA privacy/security regulations,‖ IEEE Trans. Inf. Technol.
Biomed., vol. 12, no. 1, pp. 34–41, Jan. 2008.
[5] M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, ―Scalable and secure
sharing of personal health records in cloud computing using attribute-
based encryption,‖ IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1,
pp. 131–143, Jan. 2013.
[6] I. Maglogiannis, L. Kazatzopoulos, K. Delakouridis, and S.
Hadjiefthymiades, ―Enabling location privacy and medical data
encryption in patient telemonitoring systems,‖ IEEE Trans. Inf.
Technol. Biomed., vol. 13, no. 6, pp. 946–954, Nov. 2009.
[7] Ayman Ibaida and Ibrahim Khalil, ―Wavelet-Based ECG
Steganography for Protecting Patient Confidential Information in
Point-of-Care Systems,‖ IEEE Trans. Biomed., vol. 60, no. 12, Dec
2013
[8] D. Stinson, Cryptography: Theory and Practice. Boca Raton, FL,
USA: CRC Press, 2006.
[9] A. Poularikas, Transforms and Applications Handbook.
BocaRaton, FL, USA: CRC Press, 2009.

More Related Content

What's hot

7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app68917e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891Rajarshee Dhar
 
IRJET- Design and Implementation of Health Monitoring System
IRJET-  	  Design and Implementation of Health Monitoring SystemIRJET-  	  Design and Implementation of Health Monitoring System
IRJET- Design and Implementation of Health Monitoring SystemIRJET Journal
 
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTSecurity and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTIRJET Journal
 
An intelligent patient tele monitoring system using android technology
An intelligent patient tele monitoring system using android technologyAn intelligent patient tele monitoring system using android technology
An intelligent patient tele monitoring system using android technologyeSAT Journals
 
Intelligent Healthcare Monitoring in IoT
Intelligent Healthcare Monitoring in IoTIntelligent Healthcare Monitoring in IoT
Intelligent Healthcare Monitoring in IoTIJAEMSJORNAL
 
A wearable ecg recording system for continuous arrhythmia
A wearable ecg recording system for continuous arrhythmiaA wearable ecg recording system for continuous arrhythmia
A wearable ecg recording system for continuous arrhythmiaBarracca
 
Healthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor NetworksHealthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor NetworksEbin Ephrem Elavathingal
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
 
Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...eSAT Publishing House
 
An IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring SystemAn IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring Systemvishal dineshkumar soni
 
Internet of Things IoT Based Healthcare Monitoring System using NodeMCU and A...
Internet of Things IoT Based Healthcare Monitoring System using NodeMCU and A...Internet of Things IoT Based Healthcare Monitoring System using NodeMCU and A...
Internet of Things IoT Based Healthcare Monitoring System using NodeMCU and A...ijtsrd
 
IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET Journal
 
IRJET - An Efficient Approach for Monitoring the Patient’s Condition usin...
IRJET -  	  An Efficient Approach for Monitoring the Patient’s Condition usin...IRJET -  	  An Efficient Approach for Monitoring the Patient’s Condition usin...
IRJET - An Efficient Approach for Monitoring the Patient’s Condition usin...IRJET Journal
 
IOT Based Patient Health Monitoring System Using WIFI
IOT Based Patient Health Monitoring System Using WIFIIOT Based Patient Health Monitoring System Using WIFI
IOT Based Patient Health Monitoring System Using WIFIijtsrd
 
An efficient IoT based biomedical health monitoring and diagnosing system usi...
An efficient IoT based biomedical health monitoring and diagnosing system usi...An efficient IoT based biomedical health monitoring and diagnosing system usi...
An efficient IoT based biomedical health monitoring and diagnosing system usi...TELKOMNIKA JOURNAL
 
IRJET- Smart ICU using IoT
IRJET- Smart ICU using IoTIRJET- Smart ICU using IoT
IRJET- Smart ICU using IoTIRJET Journal
 

What's hot (20)

7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app68917e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
7e397c56 3d5b-4898-a4ea-96787699a447-150509181138-lva1-app6891
 
IRJET- Design and Implementation of Health Monitoring System
IRJET-  	  Design and Implementation of Health Monitoring SystemIRJET-  	  Design and Implementation of Health Monitoring System
IRJET- Design and Implementation of Health Monitoring System
 
Secret key generation
Secret key generationSecret key generation
Secret key generation
 
B1103010918
B1103010918B1103010918
B1103010918
 
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTSecurity and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
 
An intelligent patient tele monitoring system using android technology
An intelligent patient tele monitoring system using android technologyAn intelligent patient tele monitoring system using android technology
An intelligent patient tele monitoring system using android technology
 
Intelligent Healthcare Monitoring in IoT
Intelligent Healthcare Monitoring in IoTIntelligent Healthcare Monitoring in IoT
Intelligent Healthcare Monitoring in IoT
 
A wearable ecg recording system for continuous arrhythmia
A wearable ecg recording system for continuous arrhythmiaA wearable ecg recording system for continuous arrhythmia
A wearable ecg recording system for continuous arrhythmia
 
Healthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor NetworksHealthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor Networks
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 
Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...Implementation of ecg signal acquisition and transmission through bluetooth t...
Implementation of ecg signal acquisition and transmission through bluetooth t...
 
An IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring SystemAn IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring System
 
A04530105
A04530105A04530105
A04530105
 
Internet of Things IoT Based Healthcare Monitoring System using NodeMCU and A...
Internet of Things IoT Based Healthcare Monitoring System using NodeMCU and A...Internet of Things IoT Based Healthcare Monitoring System using NodeMCU and A...
Internet of Things IoT Based Healthcare Monitoring System using NodeMCU and A...
 
IRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoTIRJET- Health Monitoring system using IoT
IRJET- Health Monitoring system using IoT
 
IRJET - An Efficient Approach for Monitoring the Patient’s Condition usin...
IRJET -  	  An Efficient Approach for Monitoring the Patient’s Condition usin...IRJET -  	  An Efficient Approach for Monitoring the Patient’s Condition usin...
IRJET - An Efficient Approach for Monitoring the Patient’s Condition usin...
 
IOT Based Patient Health Monitoring System Using WIFI
IOT Based Patient Health Monitoring System Using WIFIIOT Based Patient Health Monitoring System Using WIFI
IOT Based Patient Health Monitoring System Using WIFI
 
An efficient IoT based biomedical health monitoring and diagnosing system usi...
An efficient IoT based biomedical health monitoring and diagnosing system usi...An efficient IoT based biomedical health monitoring and diagnosing system usi...
An efficient IoT based biomedical health monitoring and diagnosing system usi...
 
Cs35531534
Cs35531534Cs35531534
Cs35531534
 
IRJET- Smart ICU using IoT
IRJET- Smart ICU using IoTIRJET- Smart ICU using IoT
IRJET- Smart ICU using IoT
 

Similar to Secure Transmission of Patient Physiological Information in Point of Care System

Ecg stegnography
Ecg stegnographyEcg stegnography
Ecg stegnographySarath K
 
Implementation Of Real Time IoT Based Health monitoring system
Implementation Of Real Time IoT Based Health monitoring systemImplementation Of Real Time IoT Based Health monitoring system
Implementation Of Real Time IoT Based Health monitoring systemkchakrireddy
 
Health Care Monitoring for the CVD Detection using Soft Computing Techniques
Health Care Monitoring for the CVD Detection using Soft Computing TechniquesHealth Care Monitoring for the CVD Detection using Soft Computing Techniques
Health Care Monitoring for the CVD Detection using Soft Computing Techniquesijfcstjournal
 
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area NetworksProposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area Networksjosephjonse
 
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKSPROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKSijngnjournal
 
Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Abhijit Mukherji
 
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...IJECEIAES
 
SPHMS : Smart Patient m-Healthcare Monitoring System with NFC and IOT
SPHMS : Smart Patient m-Healthcare Monitoring System with NFC and IOTSPHMS : Smart Patient m-Healthcare Monitoring System with NFC and IOT
SPHMS : Smart Patient m-Healthcare Monitoring System with NFC and IOTEditor IJCATR
 
Android Based Patient Health Monitoring System
Android Based Patient Health Monitoring SystemAndroid Based Patient Health Monitoring System
Android Based Patient Health Monitoring SystemIRJET Journal
 
A Healthcare Monitoring System Using Wifi Module
A Healthcare Monitoring  System Using Wifi ModuleA Healthcare Monitoring  System Using Wifi Module
A Healthcare Monitoring System Using Wifi ModuleIRJET Journal
 
Electrocardiogram signal processing algorithm on microcontroller using wavele...
Electrocardiogram signal processing algorithm on microcontroller using wavele...Electrocardiogram signal processing algorithm on microcontroller using wavele...
Electrocardiogram signal processing algorithm on microcontroller using wavele...IJECEIAES
 
Wireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring SystemWireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring SystemIRJET Journal
 
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...IJECEIAES
 
Compression and encryption for ECG biomedical signal in healthcare system
Compression and encryption for ECG biomedical signal in healthcare systemCompression and encryption for ECG biomedical signal in healthcare system
Compression and encryption for ECG biomedical signal in healthcare systemTELKOMNIKA JOURNAL
 
IoT Based Intelligent Medicine Box with Assistance
IoT Based Intelligent Medicine Box with AssistanceIoT Based Intelligent Medicine Box with Assistance
IoT Based Intelligent Medicine Box with AssistanceIRJET Journal
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataIRJET Journal
 
Utilizing communication techniques in IoT-based healthcare monitoring systems...
Utilizing communication techniques in IoT-based healthcare monitoring systems...Utilizing communication techniques in IoT-based healthcare monitoring systems...
Utilizing communication techniques in IoT-based healthcare monitoring systems...ssuser7256f7
 

Similar to Secure Transmission of Patient Physiological Information in Point of Care System (20)

Ecg stegnography
Ecg stegnographyEcg stegnography
Ecg stegnography
 
Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...
Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...
Wireless Sensor Networks for Monitoring Physiological Signals of Multiple Pat...
 
Implementation Of Real Time IoT Based Health monitoring system
Implementation Of Real Time IoT Based Health monitoring systemImplementation Of Real Time IoT Based Health monitoring system
Implementation Of Real Time IoT Based Health monitoring system
 
Health Care Monitoring for the CVD Detection using Soft Computing Techniques
Health Care Monitoring for the CVD Detection using Soft Computing TechniquesHealth Care Monitoring for the CVD Detection using Soft Computing Techniques
Health Care Monitoring for the CVD Detection using Soft Computing Techniques
 
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area NetworksProposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
 
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKSPROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
 
Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)Computers in medicine (revised) 2 (1)
Computers in medicine (revised) 2 (1)
 
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
An enhanced lossless compression with cryptography hybrid mechanism for ECG b...
 
SPHMS : Smart Patient m-Healthcare Monitoring System with NFC and IOT
SPHMS : Smart Patient m-Healthcare Monitoring System with NFC and IOTSPHMS : Smart Patient m-Healthcare Monitoring System with NFC and IOT
SPHMS : Smart Patient m-Healthcare Monitoring System with NFC and IOT
 
Android Based Patient Health Monitoring System
Android Based Patient Health Monitoring SystemAndroid Based Patient Health Monitoring System
Android Based Patient Health Monitoring System
 
A Healthcare Monitoring System Using Wifi Module
A Healthcare Monitoring  System Using Wifi ModuleA Healthcare Monitoring  System Using Wifi Module
A Healthcare Monitoring System Using Wifi Module
 
Electrocardiogram signal processing algorithm on microcontroller using wavele...
Electrocardiogram signal processing algorithm on microcontroller using wavele...Electrocardiogram signal processing algorithm on microcontroller using wavele...
Electrocardiogram signal processing algorithm on microcontroller using wavele...
 
Wireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring SystemWireless Sensor Network for Patient Health Monitoring System
Wireless Sensor Network for Patient Health Monitoring System
 
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...
 
Multi-Parameter Measurement of ICU Patient Using GSM and Embedded Technology
Multi-Parameter Measurement of ICU Patient Using GSM and Embedded TechnologyMulti-Parameter Measurement of ICU Patient Using GSM and Embedded Technology
Multi-Parameter Measurement of ICU Patient Using GSM and Embedded Technology
 
Compression and encryption for ECG biomedical signal in healthcare system
Compression and encryption for ECG biomedical signal in healthcare systemCompression and encryption for ECG biomedical signal in healthcare system
Compression and encryption for ECG biomedical signal in healthcare system
 
IoT Based Intelligent Medicine Box with Assistance
IoT Based Intelligent Medicine Box with AssistanceIoT Based Intelligent Medicine Box with Assistance
IoT Based Intelligent Medicine Box with Assistance
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
Utilizing communication techniques in IoT-based healthcare monitoring systems...
Utilizing communication techniques in IoT-based healthcare monitoring systems...Utilizing communication techniques in IoT-based healthcare monitoring systems...
Utilizing communication techniques in IoT-based healthcare monitoring systems...
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Secure Transmission of Patient Physiological Information in Point of Care System

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 54 Secure Transmission of Patient Physiological Information in Point of Care System Mr.K.Prem Kumar1 Dr.S.Thilagamani2 P.G Scholar, Department of CSE Head of the Department, Department of CSE M.Kumarasamy College of Engineering M.Kumarasamy College of Engineering kam.prem89@gmail.com sthilagamani11@gmail.com Abstract: With an increase in the population of aged people with health issues, nowadays the significance of ECG based remote patient monitoring system as a point of care (PoC) application in the hospitals is getting increased. Patient ECG signal and other physiological information like body temperature, blood pressure, and glucose level, etc., collected by the body sensor networks will be transmitted to the central hospital servers. After processing this information, the system sends the alerts to the doctors if any abnormal condition arises. The major problem with this scenario is, the confidentiality of these information must be potted while the transmission over public channel and storing in the hospital servers. In this paper, an ECG steganography based cryptographic technique is proposed to preserve the confidentiality of the information. The proposed algorithm conceals the encrypted patients’ information in the ECG signal without affecting the quality of that signal. It uses the cryptography and ECG steganography techniques to preserve the confidentiality of the patients’ information. The effectiveness of the proposed algorithm is evaluated by comparing with the existing algorithms. It is proved that the proposed algorithm is more secure with high processing speed and low distortion of data and host ECG signal. Index Terms – Point of care system, ECG, cryptography, wavelet, confidentiality, steganography ——————————  —————————— 1 INTRODUCTION Nowadays the remote health care monitoring systems and Point of care (PoC) applications are more popular as they reduce the medical labor cost and traffic in the medical centers. In emergency cases Point of Care application provides more reliable services by sending the Patient Health Record (PHR) to doctors and necessary actions can be taken in order to save the patients life. Here, the Internet is used as the channel for transmitting the Patient Health Record (PHR) in remote health care monitoring system. In remote health care monitoring system, the body sensor networks are responsible for collecting the ECG signals and the physiological information of the patient. Then, the collected information will be processed by the Personal Digital Assistant (PDA). After all, the processed information will be sent to the central hospital servers through the Internet. Now the doctors can analyze this biomedical information and can take apposite action in case of an emergency using any device from anywhere. As the Internet is used as the communication channel for PHR transmission in remote health care monitoring system, preserving the confidentiality of the patients’ health information is a major problem. According to the Health Insurance Portability and Accountability Act (HIPAA), while transmitting the patients health related information through the common channel, it must be sent in a secure way in order to conserve the privacy and confidentiality of the information. So it is indispensable to develop a security protocol for secure communication and storage of PHR. Several researchers have proposed various techniques for ensuring the confidentiality of the PHR. There are two categories of techniques proposed for the security of the PHR in remote health care monitoring system. First, the techniques use the encryption and decryption algorithms for securing the user data while communication. The encryption algorithms convert actual user data into unknown format that is very hard to understand. The keys used for encryption and decryption of user data play a vital role in the security issues. The notifiable problem with this technique is computational overhead. Second, the techniques that conceal the sensitive user information inside insensitive information without increasing the size of host information. These techniques are named as steganography techniques. Though it is secure, this steganography technique alone is not sufficient to overcome the problem of secure communication in remote health care monitoring system as stated by HIPAA. In this paper, a new technique is proposed to guarantee the secure transmission of patient health information collected by body sensor networks. The proposed technique employs both the cryptography and steganography techniques for the secure communication in the remote health care monitoring system. First, the patient physiological information like glucose level, temperature, pressure level, etc., are encrypted using the enhanced encryption algorithm. Then the encrypted information is hidden inside the patient biomedical signal collected by the body sensors. Here the patient ECG signal acts as the host signal in which the patient health information is concealed. Since almost all the health care systems collect ECG signal, the usage of the ECG as host signal is proposed in this paper. Moreover, the ECG signal size is large compared to all other biomedial signals. Therefore it
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 55 fits to conceal all other small size information. As a result, the proposed technique guarantees the security of the patient information in the public channel by preventing unauthorized access. As the Fig. 1 depicts, in the proposed model, the body sensor nodes will collect all the bio medical information like ECG signal, temperature reading, pressure level, glucose level, etc., and then this information will be sent to the patients PDA device via Bluetooth. Inside the PDA device, the steganography and cryptography techniques will be applied in order to hide the patient secret information inside the ECG signal. Then, the resultant ECG signal is transmitted to the central hospital servers. The patient secret information can be extracted from the host ECG signal only by the authorized persons. 2. RELATED WORK There are so many approaches proposed to secure the patient confidential data. One approach proposed to secure the data is based on using cryptography technique. Here the patient confidential data is encrypted before transmission. The problem with this approach is computational overhead. As the processing of patient information is done in the PDA, the algorithm used for the encryption and decryption of patient information should not reduce the speed of the PDA device. Wei-Bin Lee and Chien-Ding Lee [4] proposed an efficient approach for key management in the health care system. The proposed method comprises of three phases named as Registration phase, Encryption phase and Decryption phase. In Registration phase when receiving the registration request from the patient, SG sends the contract consists of patient’s master key (Km) to the patient. In Encryption phase, the patients information is encrypted with the Session Key (Ks) calculated using Km, unique part of health information (sn) and identification of the health care provider (Hid). In Decryption phase, the received encrypted patients information is decrypted using the session key (Ks) calculated as same as in encryption phase.The usage of smart card for the key management is proposed here. The notable problem of this scheme is usage of smart card because lots of countries may have problems with smart card adoption. Also the calculation of the session key is highly difficult to implement in PDA devices. Ilias Maglogiannis et all [6] proposed an architecture for enhancing the location privacy and data encryption in the Patient telemonitoring system (PTS). They proposed the modified Mist architecture for the location privacy and asymmetric encryption algorithm for data encryption. The modification of the Mist architecture for the preservation of location privacy is difficult to understand and implement in real time patient telemonitoring system. Zheng and Qian [3] proposed a wavelet transform based reversible data hiding. In the proposed method, the B- Spline wavelet transform is applied on the original ECG signal for detecting the QRS complex. Once the R waves are detected, Haar lifting wavelet transform is applied on the original ECG signal. Then, with the help of Index subscripts mapping the non-QRS high frequency wavelet coefficients are selected. Next, the watermarking data are embedded by shifting the selected coefficients 1 bit to the left. Finally, the Fig.1. An Point of care (POC) systems where body sensors collect patient’s ECG and diagnostics information and watermarking process implemented inside the patient’s mobile devices
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 56 reverse Haar lifting wavelet transform applied to construct the ECG signal. Since 1 bit shifting is performed, the notable problem of this approach is low capacity for watermarking. Also this algorithm works on QRS complex of ECG signal which is highly difficult to calculate in abnormal ECG signals. Finally the proposed algorithm does not use any user defined key, thus makes this algorithm more vulnerable for the security attacks. Golpira and Danyali [2] proposed a wavelet histogram shifting based reversible blind watermarking algorithm for medical images. Here the medical images like MRI image is used as host signal. The proposed algorithm applies 2d-wavelet transform to the MRI images and histogram shifting for watermarking of binary data. This algorithm is only capable of working with the MRI images, thus reduces the capacity for watermarking. Also no encryption of watermarking data is performed. So this algorithm is highly susceptible to security threats. Kaur et al. [1] proposed quantization based new digital watermarking of ECG data. In the proposed algorithm, each ECG sample is quantized using 10 bits and is divided into segments. The chirp signal is modulated using patient ID, multiplied by a window-dependent factor and added to the ECG signal. Therefore, the final signal consists of 16 bits per sample. The problem of this algorithm is the original size of the host signal gets increased. Since the size of the host signal gets varied after watermarking process, the intruders may be altered about the presence of watermarked data. 3. METHODOLOGY The proposed technique is enhanced with an authentication process to avert the unauthorized access from extracting the hidden information. The sender side algorithm is designed with four integrated stages as shown in Fig. 2. Whereas the receiver side algorithm consists of as shown in Fig. 3. The proposed algorithm is designed to guarantee the secrete information hiding with minimal distortion of the host ECG signal. A. Stage 1: Registration In this phase, the patient has to register his or her details with the point of care system. Here the indenture between the patient and the person who is going to monitor their health condition will be created. This stage crucially focuses on the generation of keys for the encryption and decryption. Along with the personal and health information, a patient has to select two prime numbers for the purpose of key generation. With the support of the selected prime number, the following calculations will be done c = a x b; c > 128 (1) g = (a-1) x (b-1) (2) where a and b are the prime numbers selected by the patients while registration. Then the patient must select the encryption key with the following condition gcd ( E, g ) = 1 ; 1 < e < c (3) where gcd represents the greatest common factor of e and g. E represents encryption key. Then the decryption key can be calculated using the following formula D = E-1 (mod g) (4) here mod represents the modules operation between E-1 and g. The keys for encryption and decryption of patients confidential information are as follows Encryption key = {E, c} Decryption key = {D,c} In completion of registration phase, the key for encrypting and decrypting the information get generated and stored in the user’s PDA device. B. Stage 2: Encryption The body sensors placed in the patients body calculate the patients physiological information like body temperature, glucose level, pressure level, etc.... These numeric values are transmitted to the patients PDA device that via Bluetooth. Now encryption of the user’s information is performed using the following formula P = M E (mod c) (5) Where M represents the numeric value of the patients physiological information. P represents the encrypted value of the patients physiological information. Fig.2. Block diagram of the sender steganography C: Stage 3: Wavelet Decomposition
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 57 The wavelet transform is a process of decomposing the signals over dilated and translated functions called wavelets, which convert the signal into coefficients that represents the frequency of the signal at a given time. The Wavelet transform can be mathematically expressed as follows ∞ C ( A, B) = ∫ f(t) ᴪ (6) -∞ Where ᴪ represents the wavelet function. A and B are positive integers represents transform parameters. C symbolizes the coefficient which is a function of scale and position parameters [9]. The Wavelet transform unite time domain and frequency domain in one transform. Since the ECG signal must be treated in the form of discrete signal, the proposed algorithm uses discrete wavelet transform (DWT). Band filters is used to perform the DWT decomposition by applying wavelet transform. As a result of the decomposition two different signals, one will be associated with the high- frequency components and the other will be related to low- frequency components of the original ECG signal. Here multilevel packet wavelet decomposition is done to decompose the original ECG signal into multiple sub bands of the signals where the embedding of the encrypted user’s data is done. The DWT can be defined as follows: W(i,j) = ∑ ∑ X(i) ᴪi,j (n) (7) i j where W(i,j) represents the DWT coefficients , i and j are the scale and shift transform parameters, and ᴪi,j (n) is the wavelet basis time function with finite energy and fast decay. The wavelet function can be defined as follows: ᴪi,j (n) = 2 –i/2 ᴪ ( 2-i n – j) (8) In this paper, four level wavelet packet decomposition has been applied to the host ECG signal. So that 15 sub bands resulted from this decomposition process. The original ECG signal is divided into two signals in each decomposition that represent high and low frequency components of the original signal. In order to achieve the minimal distortion, different steganography level will be selected for each band. Accordingly, the selected steganography level for bands from 1 to 17 is 5 bits and 6 bits for the other bands [7]. D: Stage 4: Embedding Process As the Fig.2 portrays, the proposed technique uses the scrambling matrix and level vector for the embedding of the encrypted secrets bits into the decomposed wavelet coefficients. A scrambling operation is done with the help of two parameters. First is the shared key generated in the registration phase. Second is the scrambling matrix with the size 128 x 15. The scrambling matrix is stored inside both the sender and the receiver. So each transmitter and receiver pair has a unique scrambling matrix. The important rule for building the scrambling matrix is there should not any repetition of values in the matrix. The embedding process is done as shown in the Fig.3 Fig.3. Block diagram of Embedding process The secret data are embedded in the wavelet coefficients according to the sub band sequence from the fetched row of the scrambling matrix. In the similar way, the steganography level is determined according to the level vector. E: Stage 5: Inverse wavelet Recomposition This is the final stage of the sender side. Here the resultant watermarked 15 sub bands are recomposed using inverse wavelet packet Recomposition algorithm. The result of this stage is a watermarked ECG signal. The inverse wavelet Recomposition process converts the wavelet frequency coefficients into time domain signals. The resultant watermarked ECG signal will have minimal distortion and remain diagnosable. F: Stage 6: Watermark Extraction Process Fig.4. Block diagram of receiver steganography
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 58 This process involves in the extraction of secret information from the watermarked ECG signal. It is necessary to know the shared key, level vector and the scrambling matrix in the receiver side for the extraction of hidden information. The Fig.4 depicts the steps involved in the extraction process. The watermark extraction process starts with the four-level wavelet packet decomposition to generate the 15 sub bands signals. Then, according to the sequence row fetched from the scrambling matrix the secret bits are extracted using the shared key and scrambling matrix. Finally, the extracted secret bits are decrypted using the same shared key. This stage is performed in the receiver side. 4. RESULTS AND DISCUSSION As explained, the proposed technique mainly focuses on the following 1. Secure transmission of patients confidential information 2. Minimal distortion 3. High processing speed In the proposed algorithm, the security of the patients information is based on the three parameters. Any changes in the parameters will restrict the users from accessing the secret information hidden in the ECG signal. So the transmitter and receiver must have the agreement over the following parameters 1. The encryption key 2. Scrambling matrix with the size 128 x 15 3. Steganography Level vector Even if the encryption key is stolen by the attacker, the hidden information cannot be extracted without knowing the scrambling matrix and steganography level vector. Since the scrambling matrix is stored in the transmitter and receiver device, there is no need of transmission of scrambling matrix. So it is very hard for the third party to get the knowledge about the scrambling matrix. Even the guessing of values of the scrambling matrix is also highly challengeable for the attacker since the size of the matrix is high. The number of transmitter / receiver pairs with a unique scrambling matrix can be calculated as follows: N = 128! x 15! (9) The amount of data that can be stored inside the ECG host signal using the proposed algorithm is totally depends on the steganography level vectors. That can be calculated as follows [7]: (10) where t is the total signal in seconds, fs is the sampling frequency and b is the total number of bits stored. As the result of the comparison between the ECG signals showed in the Fig.5, Fig.6 and Fig.7 its clearly proven that after watermarking also the ECG signal remains diagnosable. Fig.5. ECG signal before watermarking Fig.6. ECG signal after watermarking Fig.7. ECG signal after watermark extraction
  • 6. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 59 5. CONCLUSION In this paper, new ECG steganography based algorithm is proposed to conceal the patients confidential information inside the ECG signal for easy and secure transmission in the point of care system. Here the ECG signals are decomposed into four levels that results 15 sub bands of the frequency coefficients. The ECG signals are decomposed using the discrete wavelet transform concept. The scrambling matrix and the level vectors are used to identify the sub bands for the embedding process. Before embedding, the patients information is encrypted to attain high security. Finally it is proven that the resultant watermarked ECG signal is having the same quality like original ECG signal and the embedded data can be extracted with minimal negligible distortion. REFERENCES [1] S. Kaur, R. Singhal, O. Farooq, and B. Ahuja, ―Digital watermarking of ECG data for secure wireless communication,‖ in Proc. Int. Conf. Recent Trends Inf. Telecommun. Comput., Mar. 2010, pp. 140–144. [2] H. Golpira and H. Danyali, ―Reversible blind watermarking for medical images based on wavelet histogram shifting,‖ in Proc. IEEE Int. Symp. Signal Process. Inf. Technol., Dec. 2009, pp. 31–36. [3] K. Zheng and X. Qian, ―Reversible data hiding for electrocardiogram signal based on wavelet transforms,‖ in Proc. Int. Conf. Comput. Intell. Security, Dec. 2008, vol. 1, pp. 295–299. [4] W. Lee and C. Lee, ―A cryptographic key management solution for HIPAA privacy/security regulations,‖ IEEE Trans. Inf. Technol. Biomed., vol. 12, no. 1, pp. 34–41, Jan. 2008. [5] M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, ―Scalable and secure sharing of personal health records in cloud computing using attribute- based encryption,‖ IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131–143, Jan. 2013. [6] I. Maglogiannis, L. Kazatzopoulos, K. Delakouridis, and S. Hadjiefthymiades, ―Enabling location privacy and medical data encryption in patient telemonitoring systems,‖ IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 946–954, Nov. 2009. [7] Ayman Ibaida and Ibrahim Khalil, ―Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems,‖ IEEE Trans. Biomed., vol. 60, no. 12, Dec 2013 [8] D. Stinson, Cryptography: Theory and Practice. Boca Raton, FL, USA: CRC Press, 2006. [9] A. Poularikas, Transforms and Applications Handbook. BocaRaton, FL, USA: CRC Press, 2009.