Skip to main content

A Brief Survey of Steganographic Methods for ECG Signal

  • Conference paper
  • First Online:
Proceedings of International Conference on Frontiers in Computing and Systems

Abstract

The following paper represents a survey of steganography techniques suitable for usage in ECG. A few steganographic methods have been discussed below, it has been believed that these methods can be exploited to bring out more techniques suitable for ECG. The objective of this paper is to provide a comprehensive survey of existing steganographic techniques for ECG.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Petitcolas, F.A., et al.: Information hiding-a survey. Proc. IEEE 87, 1062–1078 (1999)

    Article  Google Scholar 

  2. Johnson, N.F., et al.: Exploring steganography: seeing the unseen. Computer 31, 26–34 (1998)

    Article  Google Scholar 

  3. Ibaida, A., Khalil, I.: Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans. Biomed. Eng. 60(12), 3322–3330 (2013)

    Article  Google Scholar 

  4. Jero, S.E., Ramu, P., Ramakrishnan, S.: Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J. Med. Syst. 38(10) (2014)

    Google Scholar 

  5. Jero, S.E., Ramu, P., Ramakrishnan, S.: Steganography in arrhythmic electrocardiogram signal. In Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC) (2015)

    Google Scholar 

  6. Liji, C.A., Indiradevi, K.P., Babu, K.K.A.: Integer-to-integer wavelet transform based ECG steganography for securing patient confidential information. Proc. Technol. 24, 1039–1047 (2016)

    Article  Google Scholar 

  7. Dilip, P.K., Raskar, V.B.: Hiding patient confidential information in ECG signal using DWT technique. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(2), 533–538 (2015)

    Google Scholar 

  8. Tseng, K.-K., He, X., Kung, W.-M., Chen, S.-T., Liao, M., Huang, H.-N.: Wavelet-based watermarking and compression for ECG signals with verification evaluation. Sensors 14(2), 3721–3736 (2014)

    Article  Google Scholar 

  9. Jero, S.E., Ramu, P., Swaminathan, R.: Imperceptibility—robustness tradeoff studies for ECG steganography using continuous ant colony optimization. Expert Syst. Appl. 49, 123–135 (2016)

    Google Scholar 

  10. Mishra, A., Agarwal, C., Sharma, A., Bedi, P.: Optimized gray-scale image watermarking using DWT–SVD and Firefly algorithm. Expert Syst. Appl. 41(17), 7858–7867 (2014)

    Article  Google Scholar 

  11. Ali, M., Ahn, C.W.: Comments on optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm. Expert Syst. Appl. 42(5), 2392–2394 (2015)

    Article  Google Scholar 

  12. Run, R.S., et al.: An improved SVD based watermarking technique for copyright protection. Expert Syst. Appl. 39(1), 673–689 (2012)

    Article  Google Scholar 

  13. Loukhaoukha, K., Chouinard, J.-Y., Taieb, M.H.: Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization. J. Inf. Hiding Multimedia Sign. Proces. 2(4), 303–319 (2011)

    Google Scholar 

  14. Sankari, V., Nandhini, K.: Steganography technique to secure patient confidential information using ECG signal. In: Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES) (2014)

    Google Scholar 

  15. Kaur, S., Singhal, R., Farooq, O., Ahuja, B.: Digital watermarking of ECG data for secure wireless communication. In: Proceedings of the 2010 International Conference on Recent Trends in Information, Telecommunication and Computing. IEEE, pp. 140–144 (2010)

    Google Scholar 

  16. Zheng, K., Qian, X.: Reversible data hiding for electrocardiogram signal based on wavelet transforms. In: Proceedings of the International Conference on Computational Intelligence and Security, CIS’08, vol. 1, pp. 295–299. IEEE (2008)

    Google Scholar 

  17. Golpira, H., Danyali, H.: Reversible blind watermarking for medical images based on wavelet histogram shifting. In: 2009 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 31–36. IEEE (2009)

    Google Scholar 

  18. Jero, S.E., Ramu, P.: A robust ECG steganography method. In: 2016 10th International Symposium on Medical Information and Communication Technology (ISMICT) (2016)

    Google Scholar 

  19. Raeiatibanadkooki, M., Quchani, S.R., KhalilZade, M., Bahaadinbeigy, K.: Compression and encryption of ECG signal using wavelet and chaotically Huffman codein telemedicine application. J. Med. Syst. 40(3) (2016)

    Google Scholar 

  20. Mahmoud, S.S.: A generalised wavelet packet-based anonymisation approach for ECG security application. Secur. Commun. Netw. 9(18), 6137–6147 (2016)

    Article  MathSciNet  Google Scholar 

  21. Devi, A., Shiva Kumar, K.B.: Novel audio steganography technique for ECG signals in point of care systems (NASTPOCS). In: Proceedings of the 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) (2016)

    Google Scholar 

  22. Engin, M., Çıdam, O., Engin, E.Z.: Wavelet transformation based watermarking technique for human electrocardiogram (ECG). J. Med. Syst. 29(6), 589–594 (2005)

    Google Scholar 

  23. Asha, N.S., Anithadevi, M.D., Shivakumar, K.B., Kurian, M.Z.: ECG signal steganography using wavelet transforms. Int. J. Adv. Netw. Appl. (IJANA) In: Proceedings of the 1st International Conference on Innovations in Computing & Networking (ICICN16), CSE, RRCE, pp. 355–359 (2016)

    Google Scholar 

  24. Meghani, D., Geetha, S.: ECG Steganography to secure patient data in an E-Healthcare System. In: Proceedings of the ACM Symposium on Women in Research 2016—WIR’16 (2016)

    Google Scholar 

  25. Sheeba, G., et al.: Secure crypto and ECG steganography based data communication for wireless body sensor network. Int. J. Innovative Res. Comput. Commun. Eng. 3(3) (2015) (An ISO 3297:2007 Certified Organization)

    Google Scholar 

  26. Sivaranjani, B., Radha, N.: Securing patient’s confidiential information using ECG steganography. In: Proceedings of the 2017 2nd International Conference on Communication and Electronics Systems (ICCES) (2017)

    Google Scholar 

  27. Marakarkandy, B., Tiwari, M.R.: Secure steganography, compression and transmission of ECG signal for protecting patient confidential information in point-of care systems. Int. J. Appl. Innovation Eng. Manag. (IJAIEM) 4(7), 94–99 (2015)

    Google Scholar 

  28. Awasarmol, S. P., Ashtekar, S., Chintawar, A.: Securely data hiding and transmission in an ECG signal using DWT. In: Proceedings of the International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) (2017)

    Google Scholar 

  29. Tabash, F.K.: A proposed technique for hiding the information of patients on ECG signals. In: IMPACT-2013 (2013)

    Google Scholar 

  30. PremChandran, K., et al.: ECG steganography using integer wavelet transform. In: Proceedings of the 2015 International Conference on Computer Communication and Informatics (ICCCI) (2015)

    Google Scholar 

  31. Sahu, N., Peng, D., Sharif, H.: Unequal steganography with unequal error protection for wireless physiological signal transmission. In: IEEE International Conference Communication (2017)

    Google Scholar 

  32. Mathivanan, P., et al.: QR code-based highly secure ECG steganography. In: Proceedings of the International Conference on Intelligent Computing and Applications, pp. 171–178 (2018)

    Google Scholar 

  33. Mathivanan, P., et al.: QR code-based patient data protection in ECG steganography. Australa. Phys. Eng. Sci. Med. (2018)

    Google Scholar 

  34. Mathivanan, P., Balaji Ganesh, A.: QR code-based color image cryptography for the secured transmission of ECG signal. Multimedia Tools Appl. (2018)

    Google Scholar 

  35. Edward Jero, S., Ramu, P., Ramakrishnan, S.: ECG steganography using curvelet transform. Biomed. Signal Process. Control 22, 161–169 (2015)

    Article  Google Scholar 

  36. Degadwala, S., et al.: High capacity image steganography using curvelet transform and bit plane slicing. Int. J. Adv. Res. Comp. Sci. 4 (2013) ISSN No. 0976–5697

    Google Scholar 

  37. Patil, V., Patil, M.: Curvelet based ECG steganography for protection of data. Lecture Notes in Computational Vision and Biomechanics, pp. 238–248 (2018)

    Google Scholar 

  38. Jero, S.E., Ramu, P.: Curvelets-based ECG steganography for data security. Electron. Lett. 52(4), 283–285 (2016)

    Article  Google Scholar 

  39. Ibaida, A., Khalil, I., & Al-Shammary, D.: Embedding patient’s confidential data in ECG signal for healthcare information systems. In: Proceedings of the 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology (2010)

    Google Scholar 

  40. Vu Mai, Khalil, I., & Ibaida, A. (2013). Steganography-based access control to medical data hidden in electrocardiogram. In: Proceedings of the 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    Google Scholar 

  41. Abuadbba, A., Khalil, I.: Walsh–hadamard-based 3-D steganography for protecting sensitive information in point-of-care. IEEE Trans. Biomed. Eng. 64(9), 2186–2195 (2017)

    Article  Google Scholar 

  42. Pandey, A., Singh, B., Saini, B.S., Sood, N.: A joint application of optimal threshold based discrete cosine transform and ASCII encoding for ECG data compression with its inherent encryption. Australas. Phys. Eng. Sci. Med. 39(4), 833–855 (2016)

    Article  Google Scholar 

  43. Wu, W., Liu, B., Zhang, W., & Chen, C. (2015). Reversible data hiding in ecg signals based on histogram shifting and thresholding. In: Proceedings of the 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech)

    Google Scholar 

  44. Vallathan, G., Devi, G. G., & Kannan, A. V. (2016). Enhanced data concealing technique to secure medical image in telemedicine applications. In: Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)

    Google Scholar 

  45. Mohsin, A.H., et al.: Real-time medical systems based on human biometric steganography: a systematic review. J. Med. Syst. 42(12) (2018)

    Google Scholar 

  46. Premarathne, U., et al.: Hybrid cryptographic access control for cloud-based EHR systems. IEEE Cloud Comput. 3(4), 58–64 (2016)

    Article  Google Scholar 

  47. Sivaranjani, D.N.R.B.: Securing patient’s confidential information using ECG steganography, 540–544 (2017)

    Google Scholar 

  48. Liu, T.Y., Lin, K.J., Wu, H.C., et al.: ECG data encryption then compression using singular value decomposition. IEEE J. Biomed. Health Infor. 22(3), 707–713 (2018)

    Google Scholar 

  49. Pandey, A., et al.: An integrated approach using chaotic map & sample value difference method for electrocardiogram steganography and OFDM based secured patient information transmission. J. Med. Syst. 41(12) (2017)

    Google Scholar 

  50. Bethzia, S.H., et al.: An efficient steganography scheme based on chaos encryption. i-Manager’s J. Digital Sign. Proces. 2(2), 22–26 (2014)

    Google Scholar 

  51. Karakış, R., Güler, I., Çapraz, I., Bilir, E.: A novel fuzzy logic-based image steganography method to ensure medical data security. Comput. Biol. Med. 67, 172–183 (2015)

    Google Scholar 

  52. Ibaida, A., Khalil, I., van Schyndel, R.: A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system (2011)

    Google Scholar 

  53. Shekhawat, A.S., et al.: A study of ECG steganography for securing patient’s confidential data based on wavelet transformation. Int. J. Comput. Appl. (0975–8887) 105(12) (2014)

    Google Scholar 

  54. Duy, D., et al.: Adaptive steganography technique to secure patient confidential information using ECG signal. In: Proceedings of the 4th NAFOSTED Conference on Information and Computer Science (2017)

    Google Scholar 

  55. Neela, S., et al.: ECG steganography and hash function based privacy protection of patients medical information. Int. J. Trends Eng. Technol. 5(2), 236–241 (2015)

    Google Scholar 

  56. Kumar, P.P., Raj, E.B.: An enhanced cryptography for ECG steganography to satisfy HIPAA privacy and security regulation for bio-medical datas

    Google Scholar 

  57. Acharya, R., Niranjan, U.C., et al.: Simultaneous storage of patient information with medical images in the frequency domain. Comput. Methods Programs Biomed. 76(1), 13–19 (2004)

    Google Scholar 

  58. Acharya, R., et al.: Transmission and storage of medical images with patient information. Comput. Biol. Med. 33(4), 303–310 (2003)

    Google Scholar 

  59. Yang, C.Y., Wang, W.F.: Effective electrocardiogram steganography based on coefficient alignment. J. Med. Syst. 40(3) (2015)

    Google Scholar 

  60. Yang, C.Y., Wang, W.F.: High-capacity ECG steganography with smart offset coefficients. Smart Innovation, Systems and Technologies, pp. 129–136 (2017)

    Google Scholar 

  61. Chen, S.-T., et al.: Hiding patients confidential data in the ECG signal via a transform-domain quantization scheme. J. Med. Syst. 38(6) (2014)

    Google Scholar 

  62. Shiu, H.-J., et al.: Preserving privacy of online digital physiological signals using blind and reversible steganography. Comput. Methods Programs Biomed. 151, 159–170 (2017)

    Article  Google Scholar 

  63. Rekha, R., et al.: Secure medical data transmission in body area sensor networks using dynamic biometrics and steganography. Bonfring Int. J. Softw. Eng. Soft Comput. 2(1), 5 (2012)

    Google Scholar 

  64. Cherukuri, S., et al.: Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In: Proceedings of the IEEE International Conference Parallel Processing Workshops, pp. 432–439 (2003)

    Google Scholar 

  65. Raazi, S.M.K.U.R., et al.: Bar in a distributed key management approach for wireless body area networks. In: IEEE Conference (2009)

    Google Scholar 

  66. Miao, F., et al.: A novel biometrics based security solution for body sensor networks. In: IEEE Conference (2009)

    Google Scholar 

  67. Sufi, F., et al.: A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. Secur. Commun. Netw. (2010)

    Google Scholar 

  68. Wu, J., Shimamoto, S.: An energy efficient data secrecy scheme for wireless body area sensor networks. Comput. Sci. Eng. Int. J. (CSEIJ) 1(2) (2011)

    Google Scholar 

  69. Soni, N., et al.: Robust steganography in Non-QRS regions of 2D ECG for securing patients’ confidential information in E-healthcare paradigm. In: Medical Data Security for Bioengineers (2019)

    Google Scholar 

  70. Wang, H., Zhang, W., Yu, N.: Protecting patient confidential information based on ECG reversible data hiding. Multimed. Tools Appl. 75, 13733–13747 (2016)

    Article  Google Scholar 

  71. Khandare, M., et al.: An approach of ECG steganography to secure the patient’s confidential information. Int. Res. J. Eng. Technol. (IRJET) 3(03), 1867–1871 (2016)

    Google Scholar 

  72. Usman, M. A., Usman, M. R.: Using image steganography for providing enhanced medical data security. In: Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference (CCNC) (2018)

    Google Scholar 

  73. Augustyniak, P.: Analysis of ECG bandwidth gap as a possible carrier for supplementary digital data. In: 2012 Computing in Cardiology, Krakow, Poland, 9–12 Sept 2012

    Google Scholar 

  74. Sathya, D., Kumar, P.G.: Secured remote health monitoring system. Healthc. Technol. Lett. 4(6), 228–232 (2017)

    Article  Google Scholar 

  75. Mathivanan, P., et al.: Color image steganography using XOR multi-bit embedding process. In Proceedings of the International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) (2017). Author, F.: Article title. Journal 2(5), 99–110 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debayan Ganguly .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhattacherjee, P., Ganguly, D., Chatterjee, K. (2021). A Brief Survey of Steganographic Methods for ECG Signal. In: Bhattacharjee, D., Kole, D.K., Dey, N., Basu, S., Plewczynski, D. (eds) Proceedings of International Conference on Frontiers in Computing and Systems. Advances in Intelligent Systems and Computing, vol 1255. Springer, Singapore. https://doi.org/10.1007/978-981-15-7834-2_4

Download citation

Publish with us

Policies and ethics