You are on page 1of 4

32nd Annual International Conference of the IEEE EMBS

Buenos Aires, Argentina, August 31 - September 4, 2010

Embedding Patients Confidential Data in ECG Signal For HealthCare


Information Systems
Ayman Ibaida, Ibrahim Khalil and Dhiah Al-Shammary
School of Computer Science and IT
RMIT University
Melbourne, VIC 3000, Australia
ayman.ibaida@student.rmit.edu.au, ibrahimk@cs.rmit.edu.au, d.alshammary@student.rmit.edu.au

2
Abstract— In Wireless tele-cardiology applications, ECG sig-

Amplitude (mV)
nal is widely used to monitor cardiac activities of patients. 0
Accordingly, in most e-health applications, ECG signals need to
be combined with patient confidential information. Data hiding −2
and watermarking techniques can play a crucial role in ECG
−4
wireless tele-monitoring systems by combining the confidential 0 500 1000 1500 2000 2500
information with the ECG signal since digital ECG data is Number of Samples
huge enough to act as host to carry tiny amount of additional
secret data . In this paper, a new steganography technique is Fig. 1. Typical ECG signal for Tachycardia Affected Patient With a Heart
proposed that helps embed confidential information of patients Rate of 200
into specific locations (called special range numbers) of digital
ECG host signal that will cause minimal distortion to ECG,
and at the same time, any secret information embedded is signals of patients and their personal information separately
completely extractable. We show that there are 2.1475 × 109 to the hospital servers without any protection. However,
possible special range numbers making it extremely difficult The Health Insurance Portability and Accountability Act
for intruders to identify locations of secret bits. Experiments
show that percentage residual difference (PRD) of watermarked (HIPAA) of 1996 in US mandates that confidential and
ECGs can be as low as 0.0247% and 0.0678% for normal and private information related to patients be protected and sent
abnormal ECG segments (taken from MIT-BIH Arrhythmia over the net and stored in a secured manner. In this paper, a
database) respectively. steganography technique as shown in Fig. 2 is proposed that
allows ECG samples to be gathered on a wireless mobile
I. I NTRODUCTION device and sent with patient sensitive personal information
Steganography is the communication art of sending and such as name, age, personal ID, etc. At hospital servers,
receiving secret messages that are hidden inside a specific patients data can be extracted from the received ECG signal
host content such as images, waves, and videos [1]. In other [5].
words, steganography can be defined as hiding technique that The challenge of the proposed steganography algorithm,
is able to embed secret data inside another data host in such is to preserve the physical features of the ECG signal and
a way that prevents unauthorized persons to access the secret guarantee the success of the diagnosis process of the ECG
message [4]. In recent years, data hiding models are gain- signal after extracting the hidden data. In this paper, the
ing popularity in establishing more secured communication evaluation of the proposed technique is based on computing
channels for delivering secret messages [3] since there is the PRD error measurement as a way to show the ability of
huge demand for sending sensitive information over the net. diagnosing the host ECG signal. In summary, this paper tries
In most wireless health care systems, patients are monitored to answer the following research questions:
continuously using body sensors in order to collect their • How can the ECG signals be used efficiently to achieve
physiological signals and send them to the hospital servers high level of security in sending and receiving the
over the internet. This enables the physicians to take fast patients confidential information ?
action in case of any emergency situation. • Can the resultant ECG host signals provide the same
ECG signal as shown in fig 1 is an electric signal that physiological features as the original one?
is generated by the heart which is used by cardiologists to The rest of the paper is organized as follows. In section II
diagnose the heart functionality [8] . If a patient with heart we discuss the related work that has been done in this area.
abnormality is remotely monitored, then with 12 lead ECG, Section III discusses the proposed steganography technique.
10 bit Resolution and 360 Hz Sampling Frequency the data Then, section IV shows the evaluation of the ECG host
can easily reach up to 2.77 GB in one day. The enormous signals. Finally, section V concludes the paper.
volume of digital ECG samples has the ability to serve as
a data host material for hiding confidential information of II. R ELATED WORK
patients. In a typical wireless telemonitoring scenario for Although there is a large volume of works on watermark-
remote cardiac patients wireless e-health systems send ECG ing and steganography, not many researchers have addressed
978-1-4244-4124-2/10/$25.00 ©2010 IEEE 3891
Raw Patient’s
ECG Signal ECG signal ECG signal
Smartphone Shift special Data hiding
preprocessing Scale and level
range Transform
correction

ECG Signal special range


Secret Bits ECG Signal with
Watermarked parameters
ECG Signal
secret bits

Patien with
ECG sensor Fig. 3. Block Diagram for the Proposed ECG Steganography System

Internet

Hospital server will


shifting and scaling factors that are mandatory parameters
extract the information
and distribute it to for extracting the secret information. Equation 1 is required
Extracted patient
the different doctor
information
seperated from
devices for shifting up the ECG signal samples.
ECG signal

X̄ = s + X (1)
Desktop Tablet Laptop PDA
Where X̄ is the shifted ECG signal, s is the shift value
and X is the original ECG signal. Then, the resultant shifted
Fig. 2. Watermarking ECGs in Body Sensors Enabled Mobile Health Care signal is scaled to compute the integer version of the ECG
Systems
signal. Equation 2 is required to perform the scaling function.

b = p ∗ X̄
X (2)
issues related to ECG data. In [6] Mohammed Nambakhsh
and Alireza Ahmadian used the ECG signal as a secret Where X b is the scaled ECG vector, p is the scale factor and
data, and embedded it inside medical images like CT and X̄ is the shifted ECG vector. Technically , the value of p is
MRI. Other researchers [2] implemented a wavelet based based on the ECG sample precisions of the ECG acquisition
watermarking technique for ECG signal. To achieve this they device and the ADC converter (analogue to digital).
first decomposed ECGs up to level 3 to divide them into 8
bands, and then computed the average power for each band B. Shift Special Range Transform
and used the calculated power as threshold parameters. They In our proposed system, a number of special values in the
selected sub-bands to add the watermark to it according ECG signal samples are found to be relevant hosts that can
to the threshold values. Finally, inverse Digital Wavelet hide the secret bits in the most significant positions with the
Transform (DWT) is applied to reconstruct the watermarked condition of inverting the values of the right hand bits to
ECG signal. the secret bit position. At the same time, these special host
In all the above techniques the algorithms have high com- values do not produce large errors as a result of the hiding
putation complexity. Since some transforms must be done, operation. Let M = 128 be a special value that allows us to
these operations require a high amount of computational hide the secret bit B in the 8th position of binary value of
resources and will incur delay in generating watermarked M . By computing the binary representation of M , we get
signal. Since we are limited in resources and power, a simple (10000000)2 . If B = 1, then the special value of M will not
power preserving technique is required for steganography be changed as the 8th bit of M is already equal to 1. On
process. the other hand, if B = 0, conversion of the 8th bit of M to
zero will cause a dramatic change to the host value as the
III. T HE METHODOLOGY
new value of M will be equal to 0 (00000000)2 . However, by
As mentioned already, in recent e-health systems the usage applying the condition of inverting all the right hand side bits
of ECG signal has increased significantly to provide highly of the secret position(in this case right of 8th bit), the new
qualified remote medical services. In this paper, a new value of M will be 127 which is equivalent to (01111111)2 .
steganography technique is proposed that is able to hide the As a result, this process will reduce the resultant error to 1.
secret message in any position in the host signal without For our ECG host signal, we use 32 bits to form each ECG
distorting the original signal. This technique provides high sample. In this binary format, there are many special ranges
security for the secret message by selecting more secured that are relevant to hide the secret bits in all host sample
positions (such as MSB) in the host ECG signal that are positions. Equation 3 calculates the total number of special
unexpected to the intruders. The proposed model consists of ranges that can be used.
four sequential steps as shown in Fig. 3.
i=r
X
A. ECG Signal Preprocessing T = 2r−i (3)
The first step is responsible of shifting up and scaling the i=2

ECG signal to avoid the negative values and converting the Where T is the total number of special ranges, i is the
signal floating point numbers into integers. At the same time, position of the secret bit, and r is the total number of bits
the function of this step represents the fist level of security per sample. By applying Equation 3, and setting r = 32,
of the steganography technique by hiding the values of both the resultant T is 2.1475 × 109 .
3892
TABLE I
very large possibilities of the available special ranges that is
S PECIAL RANGES FOR DIFFERENT POSITIONS
up to 2.1475 × 109 and pre-processing parameters such as
Rmin Rmax n Position 232 possible shifting values and few possibilities of scaling
127 129 3 8 values 200 for MIT-BIH data. Therefore, even if we ignore
32767 32769 3 16
8388607 8388607 3 24
scaling factor, the intruder needs to try this very large number
2147483647 2147483649 3 32 of possibilities (i.e. 2.1475 × 109 × 232 ) to enable him to
extract the secret message from host ECG samples.
011001110110100111
101111101010000110 IV. R ESULTS AND D ISCUSSIONS
100011000111011000 A testbed of 81 ECG segments has been set up by
101010111110001010 collecting ECGs from The Creighton University Ventricular
Tachyarrhythmia Database [7]. Each ECG segment has a
Fig. 4. The Secret Binary Data length of 10 seconds with 250Hz sampling frequency and
consists of 2500 samples. In this paper, secret bits have been
hidden in different positions (8th,16th,24th, and 32nd bits)
With the aim of utilizing all the ECG signal samples as using four special ranges. To evaluate the proposed steganog-
host for the secret bits, in the second step of the proposed raphy technique, the resultant ECG signals are compared
technique (Shift range transform) a new shifting transform with their original signals. The percentage residual difference
is proposed to shift any number in the host signal to any (PRD) is computed using equation 6.
required special range number. Equation 4 is required to v
uX
perform the shifting operation to the host signal sample. u N
u (xi − yi )2
u
u
S = Rmin + (M mod n) (4) P RD = u i=1 N (6)
u X
t x2
Where S is the new shifted value, Rmin is the starting i
value of the target special range, M is the value of the host i=1

signal sample and n is the length of the special range. Table Where x is the original ECG signal, and y is the resultant
I shows some examples of special ranges that we used to watermarked signal.
hide bits in positions 8,16,24 and 32.
TABLE II
C. Data Hiding D IFFERENT PRD VALUES FOR D IFFERENT RANGE LENGTHS
The third step of the proposed technique is the actual data number of changed LSB Range Length PRD
hiding process. The basic idea of this process is to hide the 0 2 0.02
secret bits using the shifted value as a host, then the resultant 1 4 0.0735
value would be shifted back to its original level. Equation 5 2 8 0.1946
3 16 0.4493
is required to perform the hiding processes.
(
Mo + (Rmax − S) if B=1 Fig 5 shows eight ECG segments divided into two groups,
Mn = (5) where the first group contains the original normal ECG
Mo − (S − Rmin ) if B=0
segment and three resultant host signals when we applied
Where Mn is the new resultant value of the host data, different special ranges and had data hidden in secret bit
Mo is the original host signal sample, Rmin is the minimum positions(see table I). The second group contains the original
value of the selected special range, Rmax is the maximum abnormal ECG segment in addition to three resultant host
value of the selected special range and B is the secret bit. signals using the same special ranges and secret bit positions
Fig 4 shows a block of the secret bits that were inserted that we used in the first group. This figure shows that despite
into the host signal samples of ECGs. hiding in different secret positions, PRD error measurement
remains very low and same for all cases of the same ECG
D. ECG Signal Scaling and Level Correction signal. However, PRD error measurements vary slightly for
The final step of the proposed technique is to de-scale normal and abnormal groups of host ECG signals. This
the signal and shift it back to its original values. To extract fact of being able to generate a constant PRD value using
the hidden data from the host signal the receiver needs different bit positions is a powerful characteristic of the
to know two parameters, the used range and signal pre- proposed steganography technique that enables the users to
processing parameters. The receiver should apply the same hide their secret messages in highly secured positions without
transformation using equation 1 in addition to performing affecting the important features of the ECG signal.
bitwise operation to extract the secret bits located in special The evaluation of the proposed technique show the
range values of ECG host samples. Consequently, only strength of the hiding model by performing simulated attacks
authorized persons know this information can extract the to prove the ability of extracting the embedded data com-
hidden data. The strength of this approach is based on the pletely although the least significant bits of the host signal
3893
Abnormal Original ECG Normal Original ECG
1 4

0 2

−1 0

−2 −2
0 200 400 600 800 1000 0 200 400 600 800 1000

Abnormal, data hidden in bit position 8 PRD=0.0678% Normal, data hidden in bit position 8 PRD=0.0247%
1 4

0 2

−1 0

−2 −2
0 200 400 600 800 1000 0 200 400 600 800 1000

Abnormal, data hidden in bit position 24 PRD=0.0678% Normal, data hidden in bit position 24 PRD=0.0247%
1 4

0 2

−1 0

−2 −2
0 200 400 600 800 1000 0 200 400 600 800 1000

Abnormal, data hidden in bit position 32 PRD=0.0678% Normal, data hidden in bit position 32 PRD=0.0247%
1 4

0 2

−1 0

−2 −2
0 200 400 600 800 1000 0 200 400 600 800 1000

Fig. 5. Different Cases of Watermarked ECG Signals After Hiding Secret Information in Bit 8,24 and 32 of Binary ECG Data

have been changed deliberately. Table II shows several cases secret data are not noticeable by naked eyes. The PRD of
of the simulated attacks on the host signal and the required modified watermarked ECG segments were very low for both
range lengths to protect the embedded data in addition to the normal and abnormal ECGs. The proposed technique uses
resultant PRD of each case. For example, if the first LSB very simple mathematical equations which can be easily
is changed, then a range length of 4 is required to protect implemented inside the patient PDA device. On the other
the secret hidden bits. Moreover, if the least two significant hand, the receiver should know the signal pre-processing
bits are changed, a range length of 8 is required to achieve parameters in addition to the selected special range as the
the secret bit’s protection. Finally, a range length of 16 is secret key to extract the embedded data. The validity of the
required to protect the secret message from changing the fist proposed technique has been proved by different simulated
three LSBs. As shown in Table II, the PRD values will be attacks on the host signals. For future work, frequency
increased when the number of the changed bits is increased. domain approaches will be proposed using discrete cosine
Consequently, as long as the secret data is more protected, transform as a steganography technique that provide another
the original signal will be more distorted. high level of security.
In our experiments, each 10 sec ECG segment was 10,000
R EFERENCES
bytes (2500 samples x 4 bytes/sample= 10,000) and in each
[1] N. Cvejic et al. Increasing robustness of LSB audio steganography
sample we modified 1 bit to host the secret bits. Overall, we using a novel embedding method. 2004.
could host 2500 bits = 312.5 bytes. As ECG host signal size [2] M. Engin, O. Çıdam, and E. Engin. Wavelet Transformation Based
increases we are able to add more secret bits by replacing Watermarking Technique for Human Electrocardiogram (ECG). Journal
of Medical Systems, 29(6):589–594, 2005.
existing bits of host data appropriately. [3] F. Hartung and B. Girod. Watermarking of uncompressed and com-
pressed video. Signal processing, 66(3):283–301, 1998.
V. CONCLUSION AND FUTURE WORK [4] N. Johnson and S. Jajodia. Exploring steganography: Seeing the unseen.
IEEE computer, 31(2):26–34, 1998.
As a result of the large demand of sending and receiving [5] B. Lo, S. Thiemjarus, R. King, and G. Yang. Body sensor network–a
confidential information of patients in e-health care systems, wireless sensor platform for pervasive healthcare monitoring. In The
3rd International Conference on Pervasive Computing. Citeseer, 2005.
and the fact that ECG samples are large in size, they can be [6] M. Nambakhsh, A. Ahmadian, M. Ghavami, R. Dilmaghani, and
used as hosts to carry confidential information as secret bits. S. Karimi-Fard. A novel blind watermarking of ECG signals on medical
A new steganography technique is proposed to hide personal images using EZW algorithm. In Conference proceedings:... Annual
International Conference of the IEEE Engineering in Medicine and
information of patients inside ECG signals that are capable Biology Society. IEEE Engineering in Medicine and Biology Society.
of hiding the secret bits in any position of the digital signal Conference, volume 1, page 3274, 2006.
samples including the most significant bit. In this paper, it [7] PhysioNet. The creighton university ventricular tachyarrhythmia
database.
has been proven that the proposed steganography technique [8] R. Silipo and C. Marchesi. Artificial neural networks for automatic ECG
does not affect the significant features of the ECG signals analysis. IEEE Transactions on Signal Processing, 46(5):1417–1425,
as the modifications performed on host signals in order to 1998.

3894

You might also like