It becomes utmost important that the patient confidentiality is ensured while medical data is being sent over the public networks as well as when it is stored in the healthcare repository used by a remote monitoring system. ECG monitoring facilitates in providing accelerated health status of the concerned patient to the healthcare centre in case of the hostile cardiac behaviour. Transmission of this compressed ECG via a communication channel introduces various security and privacy issues [5]. To counteract with these concerns, there is a need for implementation of efficient security protocols. To this effect, several algorithms have been developed in the past two to three decades. The patient’s confidential data hiding through watermarking and the ECG encryption techniques are the emerging biometric security mechanisms. This paper attempts to explore the state of the are approaches developed for ECG encryption and steganography.
[1] M. Nichols, N. Townsend, P. Scarborough, and M. Rayner, “Cardiovascular disease in Europe: Epidemiological update,” Eur. Heart J., vol. 35, no. 42, pp. 3028–3034, 2014.
[2] S. Gupta, R. Gudapati, K. Gaurav, and M. Bhise, “Emerging risk factors for cardiovascular diseases: Indian context,” Indian J. Endocrinol. Metab., vol. 17, no. 5, pp. 806–814, 2013.
[3] S. S. Mahmoud, Q. Fang, Z. M. Hussain, and I. Cosic, “A blind equalization algorithm for biological signals transmission,” Digit. Signal Process. A Rev. J., vol. 22, no. 1, pp. 114–123, 2012.
[4] A. Ibaida, D. Al-Shammary, and I. Khalil, “Cloud enabled fractal based ECG compression in wireless body sensor networks,” Futur. Gener. Comput. Syst., vol. 35, pp. 91–101, 2014.
[5] A. Ibaida and I. Khalil, “Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems,” IEEE Trans. Biomed. Eng., vol. 60, no. 12, pp. 3322–3330, 2013.
[6] W. B. Lee and C. D. Lee, “A cryptographic key management solution for HIPAA privacy/security regulations,” IEEE Trans. Inf. Technol. Biomed., vol. 12, no. 1, pp. 34–41, 2008.
[7] S. K. Chen, T. Kao, C. T. Chan, C. N. Huang, C.Y. Chiang, C. Y. Lai, T. H. Tung, and P. C. Wang, “A reliable transmission protocol for zigbee-based wireless patient monitoring,” IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 1, pp. 6–16, 2012.
[8] C. Lu, Z. Wu, M. Liu, W. Chen, and J. Guo, “A patient privacy protection scheme for medical information system,” J. Med. Syst., vol. 37, no. 6, 2013.
[9] F. Sufi and I. Khalil, “Enforcing secured ECG transmission for realtime telemonitoring : A joint encoding, compression , encryption mechanism,” Secur. Comm. Networks, vol. 1, no. 5, pp. 389–405, 2008.
[10] F. Sufi and I. Khalil, “A new feature detection mechanism and its application in secured ECG transmission with noise masking,” J. Med. Syst., vol. 33, no.2, pp. 121–132, 2009.
[11] S.-T. T. Chen, Y.-J. J. Guo, H.-N. N. Huang, W.- M. M. Kung, K.-K. K. Tseng, and S.-Y. Y. Tu, “Hiding patients confidential datainthe ECG signal viaa transform-domain quantization scheme,” J. Med. Syst., vol. 38, no. 6, p. 54, 2014.
[12] M. A. Murillo-Escobar, L. Cardoza-Avendaño, R. M. López-Gutiérrez, and C. Cruz-Hernández, “A double chaotic layer encryption algorithm for clinical signals in telemedicine,” J. Med. Syst., vol. 41, no. 4, pp. 1–17, 2017.
[13] M. Raeiatibanadkooki, S. R. ahati Quchani, M. M. KhalilZade, and K. Bahaadinbeigy, “Compression and encryption of ECG signal using wavelet and chaotically huffman code in telemedicine application,” J. Med. Syst., vol. 40, no. 3, p. 73, 2016.