Skip to main content

Encryption by Heart (EbH) for Secured Data Transmission and CNN Based EKG Signal Classification of Arrhythmia with Normal Data

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2019)

Abstract

Remote healthcare monitoring systems are commonly used to manage patient diagnostic data. These systems are subjected to data privacy and security, reliability, etc. A new technique is introduced in this paper to solve privacy and security issues. Using Discrete Wavelet Transforms (DWT), EKG steganography technique is implemented in the proposed method. This method is based on the techniques of encryption and decryption. Encryption is used to hide the EKG signal within an image and to extract the EKG signal from the encrypted image, decryption is used. Subsequently, a prominent amount of raw EKG time series signal information is given as inputs for convolution neural networks (CNN). The representative and key characteristics used to classify the module autonomously are learned. Thus, the features are learned directly from the prominent time domain EKG signals by using a CNN. Trained characteristics can efficiently substitute the hand-crafted characteristics of the time-consuming user and traditional ad hoc characteristics. Using GoogLeNet CNN we have achieved an accuracy of 0.90625 .

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://healthmetrics.heart.org/at-a-glance-heart-disease-and-stroke-statistics-2019/

  2. Ibrahim, R., Kuan, TS.: PRIS: image processing tool for dealing with criminal cases using steganography technique. In: 2011 Sixth International Conference on Digital Information Management (ICDIM), pp. 193–198, 26–28 September 2011

    Google Scholar 

  3. Liu, T., Pang, C.: Eye-gaze tracking research based on image processing. In: Congress on Image and Signal Processing, CISP 2008, vol. 4, pp. 176–180, 27–30 May 2008

    Google Scholar 

  4. Ye, Z., Mohamadian, H., Ye, Y.: Quantitative effects of discrete wavelet transforms and wavelet packets on aerial digital image denoising. In: 2009 6th International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE, pp. 1–5, 10–13 January 2009

    Google Scholar 

  5. Hasan, M.M., Singh, S.S.: PAPR analysis of FFT and wavelet based OFDM systems for wireless communications. UITS, Dhaka January 2009

    Google Scholar 

  6. Moholkar. S.V., Deshmukh. A.: PAPR analysis of FFT and wavelet based OFDM systems. Int. J. Electron. Commun. Comput. Eng. 5(4) (2014). Technovision. ISSN 2249–071X

    Google Scholar 

  7. Wang, J.-W., Le, N.T., Wang, C.-C., Lee, J.-S.: Enhanced ridge structure for improving fingerprint image quality based on a wavelet domain. IEEE Signal Process. Lett. 22(4), 390–394 (2015)

    Article  Google Scholar 

  8. Ali, M., Wook, A.: Comments on optimized gray-scale image watermarking using DWT-SVD and Firefly algorithm. Short Commun. Expert Syst. Appl. 42, 2392–2394 (2015)

    Article  Google Scholar 

  9. Tang, H., Tong, D., Dong, B., Dillenseger, J.: A new stationary gridline artifact suppression method based on the 2D discrete wavelet transform. Med. Phys. 42, 1721 (2015). https://doi.org/10.1118/1.4914861

    Article  Google Scholar 

  10. Li, T., Zhou, M.: ECG classification using wavelet packet entropy and random forests. Entropy. 18(8), 285 (2016)

    Article  Google Scholar 

  11. Maharaj, E., Alonso, A.: Discriminant analysis of multivariate time series: application to diagnosis based on ECG signals. Comput. Stat. Data Anal. 70, 67–87 (2014)

    Article  MathSciNet  Google Scholar 

  12. Russakovsky, O., Deng, J.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tarun Kumar D .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

D, T.K., Srinivasan, R.L., N R, R. (2019). Encryption by Heart (EbH) for Secured Data Transmission and CNN Based EKG Signal Classification of Arrhythmia with Normal Data. In: Shankar Sriram, V., Subramaniyaswamy, V., Sasikaladevi, N., Zhang, L., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2019. Communications in Computer and Information Science, vol 1116. Springer, Singapore. https://doi.org/10.1007/978-981-15-0871-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0871-4_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0870-7

  • Online ISBN: 978-981-15-0871-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics