Skip to main content

2015 | OriginalPaper | Buchkapitel

A Study on Medical Data Hiding Using Wireless Capsule Endoscopy

verfasst von : R. Suji Pramila, A. Shajin Nargunam

Erschienen in: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently wireless body area networks (WBAN) has been designed to monitor and collect patient’s vital parameters continuously and send them to the remote healthcare center or hospital. It is very important to protect the confidential data while transferring them. Different steganography techniques have been proposed for that. In a wavelet-based steganography, ECG signals were used to hide the patient’s confidential data and there is system degradation and it is not suitable to see the smoothness along the contours of the image. Here, contourlet transform is proposed, where image can be used as a host medium to improve the system performance. It combines encryption and scrambling technique to protect patient’s confidential data. The proposed method allows images to efficiently hide the patient’s confidential data and other physiological information. Typically, patient’s biological signals and other physiological readings are collected using sensors. The host image can be obtained from the technique called wireless capsule endoscopy (WCE). Capsule endoscopy is a way to record images of the digestive tract which is used in medical field. The capsule looks like a pill and contains a tiny camera. After a patient swallows the capsule, it takes pictures of the inside of the gastrointestinal tract. Encryption of patient’s confidential data prevents an unauthorized person who does not have the shared key from accessing patient’s confidential data. Therefore, the proposed contourlet technique guarantees secure medical data transfer.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Y. Zhang, H. Xiao, Bluetooth-based sensor networks for remotely monitoring the physiological signals of a patient. IEEE Trans. Info. Technol. Biomed. 13(6), 21–37 (2009) Y. Zhang, H. Xiao, Bluetooth-based sensor networks for remotely monitoring the physiological signals of a patient. IEEE Trans. Info. Technol. Biomed. 13(6), 21–37 (2009)
2.
Zurück zum Zitat K.K. Venkatasubramanian, A. Banerjee, S.K.S. Gupta, PSKA usable and secure key agreement scheme for body area networks. IEEE Trans. Info. Technol. Biomed. 14(1), 1102–1117 (2010) K.K. Venkatasubramanian, A. Banerjee, S.K.S. Gupta, PSKA usable and secure key agreement scheme for body area networks. IEEE Trans. Info. Technol. Biomed. 14(1), 1102–1117 (2010)
3.
Zurück zum Zitat H. Wang et al., Secure ECG healthcare monitoring through body sensor networks. IEEE Wirel. Commun. 12–19 (2010) H. Wang et al., Secure ECG healthcare monitoring through body sensor networks. IEEE Wirel. Commun. 12–19 (2010)
4.
Zurück zum Zitat M. Li, S. Yu, Y. Zheng, K. Ren, W. Lou, Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)CrossRef M. Li, S. Yu, Y. Zheng, K. Ren, W. Lou, Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)CrossRef
5.
Zurück zum Zitat S. Wang, J.-T. Park, Modeling and analysis of multi-type failures in wireless body area networks with semi-markov model. IEEE Commun. Lett. 14(1), 6–8 (2010)CrossRef S. Wang, J.-T. Park, Modeling and analysis of multi-type failures in wireless body area networks with semi-markov model. IEEE Commun. Lett. 14(1), 6–8 (2010)CrossRef
6.
Zurück zum Zitat O.J. Rubio, A. Alesanco, J. Garcia, Secure information embedding into 1D biomedical signal based on SPIHT. J. Biomed. Info. 46(11), 653–664 (2013) O.J. Rubio, A. Alesanco, J. Garcia, Secure information embedding into 1D biomedical signal based on SPIHT. J. Biomed. Info. 46(11), 653–664 (2013)
7.
Zurück zum Zitat A. Ibaida, I. Khalil, Wavelet based ECG steganography for protecting patient confidential information in point-of-care systems, in IEEE Transactions on Biomedical Engineering (2013) A. Ibaida, I. Khalil, Wavelet based ECG steganography for protecting patient confidential information in point-of-care systems, in IEEE Transactions on Biomedical Engineering (2013)
8.
Zurück zum Zitat C. Qin, C.-C. Chang, L.-T. Liao, An adaptive prediction-error expansion oriented reversible information hiding scheme. J. Pattern Recogn. Lett. 33(2), 2166–2172 (2012) C. Qin, C.-C. Chang, L.-T. Liao, An adaptive prediction-error expansion oriented reversible information hiding scheme. J. Pattern Recogn. Lett. 33(2), 2166–2172 (2012)
9.
Zurück zum Zitat L.-C. Huangc, L.-Y. Tsengb, M.-S. Hwanga, A Reversible data hiding method by histogram shifting in high quality medical images. J. Syst. Softw. 86(13), 716–727 (2013) L.-C. Huangc, L.-Y. Tsengb, M.-S. Hwanga, A Reversible data hiding method by histogram shifting in high quality medical images. J. Syst. Softw. 86(13), 716–727 (2013)
10.
Zurück zum Zitat D. He, C. Chen, S. Chan, J. Bu, A.V. Vasilakos, ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Info. Technol. 10(10), 3472–3481 (2011) D. He, C. Chen, S. Chan, J. Bu, A.V. Vasilakos, ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Info. Technol. 10(10), 3472–3481 (2011)
11.
Zurück zum Zitat M.-S. Nambakhsha, A. Ahmadianb, H. Zaidi, A Contextual based double watermarking of PET images by patient ID and ECG signal. J. Comput. Methods Programs Biomed. 104(5), 418–425 (2011) M.-S. Nambakhsha, A. Ahmadianb, H. Zaidi, A Contextual based double watermarking of PET images by patient ID and ECG signal. J. Comput. Methods Programs Biomed. 104(5), 418–425 (2011)
Metadaten
Titel
A Study on Medical Data Hiding Using Wireless Capsule Endoscopy
verfasst von
R. Suji Pramila
A. Shajin Nargunam
Copyright-Jahr
2015
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2135-7_61

Premium Partner