Patient Information Implantation and Reclamation From Compressed ECG Signal By LSB Watermarking Technique

نویسنده

  • B. Halder
چکیده

In the application of telemedicine, ECG signal is transmitted to the Doctor end without any patient details. As a result, confusion is arisen between signal and patient’s identity. To avoid this confusion, ECG signals need to be combined with patient confidential information when sent. A typical ECG monitoring device generates massive volumes of digital data. Huge amount of bandwidth is required for the transmission of the ECG signal for telemedicine purposes. This huge amount of bandwidth for the transmission of the ECG signal can be avoided if the signal is compressed after embedding the patient’s personal information within the ECG signal. Since the ECG signal and the patient details integrated into one, bandwidth for the transmission can be reduced in telemedicine applications. In this paper ECG signals are watermarked with patient information using LSB watermark technique and compressed the huge amount of ECG data using ASCII character encoding in order to confirm patient or ECG linkage integrity and reduced the bandwidth in telemedicine applications. The whole module has been applied to various ECG data of all the 12 leads taken from PTB diagnostic database (PTB-DB) of physioNet and gives a highly compressed result that can be stored using far less digital space without distorting important ECG characteristics and at the same time, embedded information can be completely retrieved. Keywords— telemedicine, watermarked, ASCII character, PRD, SD, CR

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Blind Watermarking of ECG Signals on Medical Images Using EZW Algorithm

Introduction:In this study, ECG signals have been embedded into medical images to create a novel blind watermarking method. The embedding is done when the original image is compressed using the EZW algorithm. The extraction process is performed at the decompression time of the watermarked image. Materials and Methods: The multi-resolution watermarking with a secret key algorithm developed in th...

متن کامل

An Adaptive LSB and PPM Based ECG Steganography to Protect Patient Confidential Information for Bio-Medical Datas

The Health Insurance Portability and Accountability Act (HIPAA) privacy and security regulations are two crucial provisions in the protection of healthcare privacy. According to HIPAA patient information sent through the internet should be protected and secured. In this paper, to comply with the HIPAA regulations, chaos cryptographic technique is used to encrypt the confident data into unreadab...

متن کامل

SLT based ECG Signal Steganography for Telemedicine Application

1,2 Department of Electronics & Telecommunication, D. N. Patel College of Engineering, Shahada Abstract-In the application of telemedicine, ECG signal without any patient details is sent to the Doctor end. Consequently, confusion is arisen between signal and patient’s identity. To avoid this confusion, it is necessary to combine ECG signals with patient confidential information when sent. In th...

متن کامل

Digital Image Watermarking using LSB Technique

Watermarking belongs to hide particular information, so that you can easily detect any tamper detection .It is used for confidenality, authentication and copy right protection. In this paper watermarking is done with the help of least significant bit technique (LSB).As LSB technique is used as it has less effect on image. This new algorithm is using LSB of original image and idoing ‘&&’ operati...

متن کامل

Two Novel Chaos-Based Algorithms for Image and Video Watermarking

In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014