ECG Steganography and Hash Function Based Privacy Protection of Patients Medical Information

Page 1

INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303

ECG Steganography and Hash Function Based Privacy Protection of Patients Medical Information S.Neela1,

Dr. V.R.Vijaykumar, B.E.,M.E.,Ph.D2.,

PG Scholar M.E., Applied electronics, Department of ECE, Anna University Regional Centre, Coimbatore – 641 047.

Associate Professor and Head, Department of ECE, Anna University Regional Centre, Coimbatore – 641 047.

Abstract— Data hiding can hide sensitive information into signals for covert communication. Most data hiding techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the embedded data and the original host signal. The project proposes the enhancement of protection system for secret data communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system. Keywords- ECG Steganography, Fingerprint, Lifting Wavelet Transform, Medical data, Privacy Protection, Twelve square ciphers. This technique allows ECG to put out of sight the patient confidential data and thus guarantees the patient’s privacy and confidentiality. The aim is to show that both the Host ECG and stego ECG signals can be used for diagnoses and the difference would be undetectable.

1. INTRODUCTION Nowadays, patients confidential information sent through the public network should be secured and protect. Tolerant protection is essential that a patient can control who will use his/her confidential health details, like the name, and the address them, telephone number, and Medicare number and who can access patient’s data. The primary goal is to provide integrity, confidentiality and accessibility. Steganography is a branch of cryptography that involves hiding information. to reduces the chance of a message being detected. The main aim is to hide patient's confidential data and other physiological information in ECG signal. ECG signal is used because the size of ECG is large compared to other medical images. Therefore, patients ECG signal and other physiological readings such as temperature level, range of blood pressure, and the glucose reading etc., are collected at homes by using Body Sensor Networks will be transmitted and diagnosed by re-mote patient monitoring device.in the same cost that the patient confidentiality is protected against intruders while data traverse in open network and stored in hospital servers.

The work of this project is motivated by investigations from the above and similar research findings. Our main theme is to save patient confidential information from harm by using steganography strategy. From the proposed model, new steganography technique using ECG is formulated and introduces their particular calculations, which are quick and adaptable, but on the other hand are capable of providing high-quality and consistent performance. Information Security is to prevent the unauthorized access, misuse of data, content modification, or denial of access, certainties, and so forth. The essential objective is to give secrecy, trustworthiness and accessibility. The great security in reality is compiling of these arrangements. The strong physical security key is to guard substantial assets like papers, records. Computer security is important to control access over others computer systems, and

236


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.