Optimization of Multiple Scaling Factors for ECG Steganography Using Dynamic Thresholding GA
Keywords:
Steganography, ECG, Genetic Algorithm, Privacy, SecurityAbstract
Protecting patient data has become a top priority for healthcare providers in the digital age. ECG steganography is a technique for concealing electrocardiogram (ECG) signals during Internet transmission along with other medical data. This strategy aims to recover all embedded patient data while minimizing degradation of the cover signal caused by embedding. Quantization techniques make it possible to include patient information in the ECG signal, and it has been discovered that multiple scaling factors (MSFs) provide a superior trade-off than uniform single scaling factors. In this paper, we present a novel contribution to the field: a discrete wavelet transforms and singular value decomposition-based dynamic Thresholding GA (DTGA)-based ECG steganography scheme. Using the MITIH database, we demonstrate the efficacy of this method, and our findings corroborate that DTGA significantly improves data security.
Downloads
References
Al Ameen, M., Liu, J. and Kwak, K., 2012. Security and privacy issues in wireless sensor networks for healthcare applications. Journal of medical systems, 36(1), pp.93-101.
AbdelMouty, A.M., Abdel-Monem, A., Aal, S.I.A. and Ismail, M.M., 2023. Analysis the Role of the Internet of Things and Industry 4.0 in Healthcare Supply Chain Using Neutrosophic Sets. Neutrosophic Systems with Applications, 4, pp.33-42.
Podilchuk, C.I. and Delp, E.J., 2001. Digital watermarking: algorithms and applications. IEEE signal processing Magazine, 18(4), pp.33-46.
Shih, F.Y., 2017. Digital watermarking and steganography: fundamentals and techniques. CRC press.
Abdelhafeez, A., Mohamed, H.K. and Khalil, N.A., 2023. Rank and Analysis Several Solutions of Healthcare Waste to Achieve Cost Effectiveness and Sustainability Using Neutrosophic MCDM Model. Neutrosophic Systems with Applications, 2, pp.25-37.
Ziou, D. and Jafari, R., 2014. Efficient steganalysis of images: learning is good for anticipation. Pattern Analysis and Applications, 17(2), pp.279-289.
Zielińska, E., Mazurczyk, W. and Szczypiorski, K., 2014. Trends in steganography. Communications of the ACM, 57(3), pp.86-95.
Ibaida, A. and Khalil, I., 2013. Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Transactions on biomedical engineering, 60(12), pp.3322-3330.
Chen, S.T., Guo, Y.J., Huang, H.N., Kung, W.M., Tseng, K.K. and Tu, S.Y., 2014. Hiding patients confidential datainthe ECG signal viaa transform-domain quantization scheme. Journal of medical systems, 38(6), pp.1-8.
Edward Jero, S., Ramu, P. and Ramakrishnan, S., 2014. Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. Journal of medical systems, 38(10), pp.1-11.
Giakoumaki, A., Pavlopoulos, S. and Koutsouris, D., 2006. Secure and efficient health data management through multiple watermarking on medical images. Medical and Biological Engineering and Computing, 44(8), pp.619-631.
Lei, B., Tan, E.L., Chen, S., Ni, D., Wang, T. and Lei, H., 2014. Reversible watermarking scheme for medical image based on differential evolution. Expert Systems with Applications, 41(7), pp.3178-3188.
Raúl, R.C., Claudia, F.U. and Trinidad-BIas, G.D.J., 2007, February. Data hiding scheme for medical images. In 17th International Conference on Electronics, Communications and Computers (CONIELECOMP'07).
Ginsberg, J., Mohebbi, M.H., Patel, R.S., Brammer, L., Smolinski, M.S. and Brilliant, L., 2009. Detecting influenza epidemics using search engine query data. Nature, 457(7232), pp.1012-1014.
Kim, H.J., Lee, H., Kim, Y.K. and Chang, J.W., 2022. Privacy-preserving k NN query processing algorithms via secure two-party computation over encrypted database in cloud computing. The Journal of Supercomputing, 78(7), pp.9245-9284.
Liu, P. and Zhang, W., 2022, July. Towards practical privacy-preserving solution for outsourced neural network inference. In 2022 IEEE 15th International Conference on Cloud Computing (CLOUD) (pp. 357-362). IEEE.
Doan, K., Quang, M.N. and Le, B., 2017, December. Applied cuckoo algorithm for association rule hiding problem. In Proceedings of the Eighth International Symposium on Information and Communication Technology (pp. 26-33).
Dorigo, M. and Gambardella, L.M., 1997. Ant colony system: a cooperative learning approach to the traveling salesman problem. IEEE Transactions on evolutionary computation, 1(1), pp.53-66.
Mishra, A., Agarwal, C., Sharma, A. and Bedi, P., 2014. Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm. Expert Systems with Applications, 41(17), pp.7858-7867.
Run, R.S., Horng, S.J., Lai, J.L., Kao, T.W. and Chen, R.J., 2012. An improved SVD-based watermarking technique for copyright protection. Expert Systems with applications, 39(1), pp.673-689.
Mishra, A., Agarwal, C., Sharma, A. and Bedi, P., 2014. Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm. Expert Systems with Applications, 41(17), pp.7858-7867.
Ali, M. and Ahn, C.W., 2014. An optimized watermarking technique based on self-adaptive DE in DWT–SVD transform domain. Signal processing, 94, pp.545-556.
Bath, P.A., 2004. Data mining in health and medical information. Annu. Rev. Inf. Sci. Technol., 38(1), pp.331-369.
Jothi, N. and Husain, W., 2015. Data mining in healthcare–a review. Procedia computer science, 72, pp.306-313.
Kim, J.C. and Chung, K., 2019. Associative feature information extraction using text mining from health big data. Wireless Personal Communications, 105, pp.691-707.
Loukhaoukha, K., Chouinard, J.Y. and Taieb, M.H., 2011. Optimal Image Watermarking Algorithm Based on LWT-SVD via Multi-objective Ant Colony Optimization. J. Inf. Hiding Multim. Signal Process., 2(4), pp.303-319.
Liao, T., Socha, K., de Oca, M.A.M., Stützle, T. and Dorigo, M., 2013. Ant colony optimization for mixed-variable optimization problems. IEEE Transactions on Evolutionary Computation, 18(4), pp.503-518.
Goldberger, A.L., Amaral, L.A., Glass, L., Hausdorff, J.M., Ivanov, P.C., Mark, R.G., Mietus, J.E., Moody, G.B., Peng, C.K. and Stanley, H.E., 2000. PhysioBank, PhysioToolkit, and PhysioNet: components of a new research resource for complex physiologic signals. circulation, 101(23), pp.e215-e220.
Moody, G.B. and Mark, R.G., 1990, September. The MIT-BIH arrhythmia database on CD-ROM and software for use with it. In [1990] Proceedings Computers in Cardiology (pp. 185-188). IEEE.
Edward Jero, S., Ramu, P. and Ramakrishnan, S., 2014. Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. Journal of medical systems, 38(10), pp.1-11.
Darwish, S.M., Shendi, T.A. and Younes, A., 2019. Chemometrics approach for the prediction of chemical compounds’ toxicity degree based on quantum inspired optimization with applications in drug discovery. Chemometrics and Intelligent Laboratory Systems, 193, p.103826.
Ramu, P. and Swaminathan, R., 2016. Imperceptibility—robustness tradeoff studies for ECG steganography using continuous ant colony optimization. Expert Systems with Applications, 49, pp.123-135.
Ibaida, A. and Khalil, I., 2013. Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Transactions on biomedical engineering, 60(12), pp.3322-3330.
Trobisch, P.D., Bauman, M., Weise, K., Stuby, F. and Hak, D.J., 2010. Histologic analysis of ruptured quadriceps tendons. Knee Surgery, Sports Traumatology, Arthroscopy, 18, pp.85-88.
Kojima, T., Ohtani, N., Matsumoto, T. and Parampalli, U., 2011, October. On multiple information embedding by digital watermarking based on complete complementary codes. In Proceedings of the Fifth International Workshop on Signal Design and Its Applications in Communications (pp. 100-103). IEEE.
Zhang, Q., Xu, X. and Liang, Y.C., 2006. An improved artificial immune algorithm with a dynamic threshold. Journal of Bionic Engineering, 3(2), pp.93-97.
Dasgupta, D. ed., 2012. Artificial immune systems and their applications. Springer Science & Business Media.
https://physionet.org/content/mitdb/1.0.0/
Pasha, M. J. ., Rao, C. R. S. ., Geetha, A. ., Fernandez, T. F. ., & Bhargavi, Y. K. . (2023). A VOS analysis of LSTM Learners Classification for Recommendation System. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 179–187. https://doi.org/10.17762/ijritcc.v11i2s.6043
Muñoz, S., Hernandez, M., González, M., Thomas, P., & Anderson, C. Enhancing Engineering Education with Intelligent Tutoring Systems using Machine Learning. Kuwait Journal of Machine Learning, 1(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/116
Venu, S., Kotti, J., Pankajam, A., Dhabliya, D., Rao, G. N., Bansal, R., . . . Sammy, F. (2022). Secure big data processing in multihoming networks with AI-enabled IoT. Wireless
Communications and Mobile Computing, 2022 doi:10.1155/2022/3893875
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.