Skip to main content

Advertisement

Log in

ECG steganography using Base64 encoding and pixel swapping technique

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

ECG signals tagged with secret information are transferred through wireless communication channel in remote health monitoring applications. To hide secret information, the proposed steganography system uses ECG signal as cover data. The watermarked data (grey scale image or ECG signal) is transformed into 2D binary matrix (QR code), to enhance security of the steganography process. The Base64 encoding technique converts unsigned integer values to alphanumeric cypher text, which is then turned into a 2D binary matrix (QR code) through a QR code generator/reader. The threshold selection algorithm is used to select the coefficient position, and the pixel swapping technique is employed to incorporate watermark data into the selected location. Signal degradation is minimized by selecting coefficient locations are near to zero. The imperceptibility of the watermarked ECG signal is evaluated using performance metrics such as Peak Signal to Noise Ratio (PSNR), Percentage Residual Difference (PRD), Correlation Coefficient (CC), and Structural Similarity Measure Index (SSIM). Bit Error Rate is another metric used to evaluate the quality of extracted watermark data (BER). The watermarked signals imperceptibility is found to be good and is within the ideal value. Increase in payload capacity has increased signal deterioration. The steganography scheme has no BER, and the reconstructed signal is identical to the cover ECG signal.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Act A (1996) Health insurance portability and accountability act of 1996. Public Law 104:191

    Google Scholar 

  2. Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–10

    Article  Google Scholar 

  3. Amin MM, Salleh M, Ibrahim S, Katmin MR, Shamsuddin MZI (2003) January. Information hiding using steganography. In 4th National Conference of telecommunication technology, NCTT 2003. IEEE Proceed:21–25

  4. Avcibaş I, Sankur B, Sayood K (2002) Statistical evaluation of image quality measures. J Electronic Imaging 11(2):206–223

    Article  Google Scholar 

  5. Bhalerao S, Ansari IA, Kumar A, Jain DK (2019) A reversible and multipurpose ECG data hiding technique for telemedicine applications. Pattern Recogn Lett 125:463–473

    Article  Google Scholar 

  6. Chen HM, Lo JW, Yeh CK (2012) An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J Med Syst 36(6):3907–3915

    Article  Google Scholar 

  7. Chen ST, Guo YJ, Huang HN, Kung WM, Tseng KK, Tu SY (2014) Hiding patients confidential datainthe ECG signal viaa transform-domain quantization scheme. J Med Syst 38(6):54

    Article  Google Scholar 

  8. Chen YH, Huang HC, Lin CC (2016) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimed Tools Appl 75(21):13679–13704

    Article  Google Scholar 

  9. Clifford GD (2002) Signal processing methods for heart rate variability. Doctoral dissertation, Oxford University, UK

    Google Scholar 

  10. Deng X, Zhu X (2015) A simple and practical color image encryption with the help of QR code. Opt Appl 45(4):1–10

    Google Scholar 

  11. Hamilton PS, Tompkins WJ (1986) Quantitative investigation of QRS detection rules using the MIT/BIH arrhythmia database. IEEE Trans Biomed Eng 12:1157–1165

    Article  Google Scholar 

  12. Heil CE, Walnut DF (1989) Continuous and discrete wavelet transforms. SIAM Rev 31(4):628–666

    Article  MathSciNet  MATH  Google Scholar 

  13. Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM. In 2010 20th International Conference on Pattern Recognition (pp. 2366-2369). IEEE.

  14. Huang HC, Chang FC, Fang WC (2011) Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans Consum Electron 57(2):779–787

    Article  Google Scholar 

  15. Ibaida A, Khalil I, Al-Shammary D (2010) Embedding patients confidential data in ECG signal for healthcare information systems. In 2010 Annual International Conference of the IEEE Engineering in Medicine and biology (pp. 3891-3894). IEEE.

  16. Ibaida A, Khalil I, Van Schyndel R, (2011) A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system. In 2011 Computing in cardiology, IEEE 393–396.

  17. ISO B (2006) IEC 16022: information technology-automatic identification and data capture techniques-data matrix Bar code Symbology specification. BS ISO/IEC 16022

  18. Jero SE, Ramu P (2016) Curvelets-based ECG steganography for data security. Electron Lett 52(4):283–285

    Article  Google Scholar 

  19. Jero SE, Ramu P, Ramakrishnan S (2014) Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J Med Syst 38(10):132

    Article  Google Scholar 

  20. Josefsson S (2006) The base16. base32, and base64 data encodings (pp 1–18) RFC 4648 (October)

  21. Lahoulou A, Viennet E, Bouridane A, Haddadi M (2011, May) A complete statistical evaluation of state-of-the-art image quality measures. In international workshop on systems, signal processing and their applications, WOSSPA (pp. 219-222). IEEE.

  22. Maheswari SU, Hemanth DJ (2015) Frequency domain QR code based image steganography using Fresnelet transform. AEU-Int JElectron Comm 69(2):539–544

    Article  Google Scholar 

  23. Martins D, Guyennet H 2010. Steganography in MAC layers of 802.15.4 protocol for securing wireless sensor networks. In 2010 international conference on multimedia information networking and security, pp. 824–828.

  24. Mathivanan P, Balaji Ganesh A (2021) ECG steganography based on tunable Q-factor wavelet transform and singular value decomposition. Int J Imaging Syst Technol 31(1):270–287

    Article  Google Scholar 

  25. Mathivanan P, Ganesh AB (2019) QR code based color image cryptography for the secured transmission of ECG signal. Multimed Tools Appl 78(6):6763–6786

    Article  Google Scholar 

  26. Mathivanan P, Jero SE, Ramu P, Ganesh AB (2018) QR code based patient data protection in ECG steganography. Australasian Phys Eng Sci Med 41(4):1057–1068

    Article  Google Scholar 

  27. Mathivanan P, Ganesh AB, Venkatesan R (2019) QR code–based ECG signal encryption/decryption algorithm. Cryptologia 43(3):233–253

    Article  Google Scholar 

  28. Mathivanan, P., Jero, S. E., & Ganesh, A. B. (2019). QR code-based highly secure ECG steganography. In international conference on intelligent computing and applications (pp. 171–178). Springer, Singapore.

  29. Moody GB, Mark RG (2001) The impact of the MIT-BIH arrhythmia database. IEEE Engineering in Medicine and Biology Magazine 20(3):45–50

    Article  Google Scholar 

  30. Patil V, Patil M (2018) Curvelet based ECG steganography for protection of data. In Computational Vision and Bio Inspired Computing (pp. 238–248). Springer, Cham.

  31. Rahim R, Nurdiyanto H, Hidayat R, Ahmar AS, Siregar D, Siahaan APU, ..., Abdullah D (2018). Combination Base64 Algorithm and EOF Technique for Steganography. In Journal of Physics: Conference Series (Vol. 1007, No. 1, p. 012003). IOP Publishing

  32. Selesnick IW (2011) Wavelet transform with tunable Q-factor. IEEE Trans Signal Process 59(8):3560–3575

    Article  MathSciNet  MATH  Google Scholar 

  33. Shekhawat AS, Jain A, Patil D (2014) A study of ECG steganography for securing patient's confidential data based on wavelet transformation. Int J Comput App 105:12–16

    Google Scholar 

  34. Shensa MJ (1992) The discrete wavelet transform: wedding the a trous and Mallat algorithms. IEEE Trans Signal Process 40(10):2464–2482

    Article  MATH  Google Scholar 

  35. Wang Z, Simoncelli EP (2005) Reduced-reference image quality assessment using a wavelet-domain natural image statistic model. In Human Vision and Electronic Imaging X (Vol. 5666, pp. 149-159). International Society for Optics and Photonics.

  36. Xu Y, Li Z, Wang S, Li W, Sarkodie-Gyan T, Feng S (2021) A hybrid deep-learning model for fault diagnosis of rolling bearings. Measurement 169:108502

    Article  Google Scholar 

  37. Yang CY, Wang WF (2016) Effective electrocardiogram steganography based on coefficient alignment. J Med Syst 40(3):66

    Article  MathSciNet  Google Scholar 

  38. Yang CY, Wang WF (2017) High-capacity ECG steganography with smart offset coefficients. In international conference on intelligent information hiding and multimedia signal processing, springer, Cham, pp. 129–136.

  39. Yang CY, Wang WF (2021) An improved ECG steganography using integer wavelet transform and offset coefficient with LSB substitution

  40. Yang CY, Cheng LT, Wang WF (2020) An efficient reversible ECG steganography by adaptive LSB approach based on 1D FDCT domain. Multimed Tools Appl 79(33):24449–24462

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Mathivanan.

Ethics declarations

Conflict of interest

Author, P.Mathivanan declares that he has no conflict of interest. Author, A Balaji ganesh declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mathivanan, P., Balaji Ganesh, A. ECG steganography using Base64 encoding and pixel swapping technique. Multimed Tools Appl 82, 14945–14962 (2023). https://doi.org/10.1007/s11042-022-14072-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-14072-8

Keywords