Result Paper on Protecting confidential information in POC System ECG Steganography
Journal: International Journal of Engineering and Techniques (Vol.3, No. 3)Publication Date: 2017-05-01
Authors : Ankita K.Ramekar Prof.M.A.Pund;
Page : 122-128
Keywords : ECG; Steganography; Encryption; Wavelet; Watermarking; Confidentiality;
Abstract
This paper proposes the development of Secure system for secret data communication through encrypted data hiding in ECG signals. The proposed encryption technique used to encrypt the secret data into unreadable form and enhances the safety of secret carrier information by making the information inaccessible to any intruder having a random method. After data encryption, the data hider will hide the secret data into the ECG signal coefficients. Although encryption achieves certain security effects, they make the secret messages unreadable and unnatural or meaningless. This is the reason a new security approach called reversible data hiding arises. It's art of hiding the data in another transmission medium to get secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Here the DWT(Discrete Wavelet Transform) is used to decompose an ECG signal to different frequency sub bands. Hence, patients ECG signal and other readings such as blood pressure, glucose reading, position,etc., are collected at home by using Body Sensor Networks (BSNs) will be transmitted and diagnosed by remote patient monitoring systems. At the same cost that the patient privacy is protected against intruders while data traverse in open network and stored in hospital servers. In this project, to fulfill HIPAA act, a Discrete Wavelet Transform based steganography technique has been proposed. DWT technique allow ECG signal to put out of sight the patient confidential data and thus guarantees the patient's privacy and confidentiality.
Other Latest Articles
- Automated Vehicle Collision Avoidance and Navigation Using Raspberry Pi
- MHD Viscoelastic Fluid Flow over a Vertical Stretching sheet with nth order of chemical reaction
- A Evaluation of OSI Reference model and Comparison with TCP/IP Model
- Voltage Stability Analysis by Simulated Annealing Algorithm
- Evaluation of Security Aspects of Some Optical Code Division Multiple Access (OCDMA) Systems
Last modified: 2018-05-19 17:44:26