Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Securely Data Transmission Using DWT via ECG Signal

Author : Sumedha P Awasarmol 1 Prof. Shweta Ashtekar 2 Prof. Amruta Chintawar 3

Date of Publication :20th April 2017

Abstract: For aged population suffering from cardiac disorders, remote ECG monitoring system is essential to be established in point of care system. Also it is essential to maintain patient confidentiality while transmitting data over public network and storing that information at hospital servers securely. This work, Secured Data Transmission via ECG Signal combines encryption and scrambling matrix technique using Discrete Wavelet Transform to protect patient confidential information. The encryption method hides patient confidential information using scrambling matrix and the shared key thereby generating watermarked ECG signal. To extract patient secret information from the ECG signal, decryption method is used using the same shared key and scrambling matrix. To evaluate diagnosability, Wavelet Weighted Percentage Residual Difference (WWPRD) and extracted WWPRD measurement would be used for analyzation

Reference :

  1. [1]D. Awasthi and S. Madhe, “Evaluation of wavelet based ECG steganography system by using Percentage Residual Difference (PRD) measurements,” Communications and Signal Processing (ICCSP), 2015 International Conference on, Melmaruvathur, 2015, pp. 0559-0563.

    [2] K.Malasri and L.Wang, “Addressing security in medical sensor networks,”in proc. 1st ACM SIGMOBILE imWorkshop syst. Netw. Supp. Healthcare Assist. Living Environ. 2007, p.12.

    [3] J. Garcia, I. Martinez, L. Sommo, S. Olmos, A. Mur, and P. Laguna, “Remote processing server for ECG-based clinical diagnosis support, ”IEEE Trans. in! Technol.Biomed.,vol. 6,no. 4,pp.277- 284,Dec.2002.

    [4] F. Hu, M. Jiang, M. Wagner, and D. Dong, “Privacy-preserving telecardiology sensor networks: Toward a low-cost portable wireless hardware/software codesign,” iEEE Trans. In!Techno!.Biomed.,vol. 11 , no. 6, pp. 619- 627, Nov. 2007.

    [5] W.Lee and C. Lee, “A cryptographic key management solution for HIPAA privacy/security regulations”, IEEE Trans.lnf. Technol.Biomed. , vol. 12,no. 1,pp. 34–41,Jan. 2008. [6] L. Marvel, C. Boncelet, and C. Retter, “Spread spectrum image steganography,” iEEE Trans. Imag. Process. , vol. 8, no. 8, pp. 1075-1083, Aug. 1999.

    [7] H.Golpira and H. Danyali, “Reversible blind watermarking for medical images based on wavelet histogram shifting,”in Proc. iEEE int. Symp. Signal Process. Inf Technol., Dec. 2009, pp. 31 - 36.

    [8] AymanIbaida and Ibrahim Khalil, “Wavelet based ECG steganography for protecting patient confidential information in point of care systems,” IEEE Trans. Biomedical Engineering, vol. 60, no. 12, December 2013.

    [9] Dr Prena Mahajan and Abhishek Suchdeva, “A study of encryption algorithm AES, DES , and RSA for security, ”Global Journal of Computer Science and Technology Network, web and security volume 13, issue 15 version 1.0 year 2013.

    [10] Masoud Nosrati, Ronak Karimi and Mehdi Hariri, “An introduction to steganography methods”, World Applied Programming, Vol (1), No (3), August 2011.

    [11] S. Edward Jero, Palaniappan Ramu and S. Ramakrishnan, “Steganography in Arrhythmic Electrocardiogram Signal”, 2015 IEEE 978-1-4244- 9270-1/15/

    [12] Ching-Yu Yang and Wen-Fong Wang, “Effective Electrocardiogram Steganography Based on Coefficient Alignment”, J Med Syst (2016) 40: 66 DOI 10.1007/s10916- 015-0426-9, Department of Computer Science and Information Engineering, Springer Science Business Media New York 2015.


    1. S. Chen, B. Mulgrew, and P. M. Grant, “A clustering technique for digital communications channel equalization using radial basis function networks,” IEEE Trans. on Neural Networks, vol. 4, pp. 570-578, July 1993.
    2. J. U. Duncombe, “Infrared navigation—Part I: An assessment of feasibility,” IEEE Trans. Electron Devices, vol. ED-11, pp. 34-39, Jan. 1959.
    3.  C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, and M. Miller, “Rotation, scale, and translation resilient public watermarking for images,” IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001.
    4.  O. Raaschou-Nielsen, Z. 1. Andersen, M. Hvidberg, S. S. Jensen, M. Ketzel, M. Sorensen, ATjonneland, “Lung cancer incidence and longterm exposure to air pollution from traffic,” Environmental health perspectives, 2011, Vol. 119(6), 860-865.
    5. D.L. Yang, F. Liu, and Y.D. Liang, “A survey of the internet of things,” Proceedings of International Conference on E-Business Intelligence (ICEBI-2010), Advances in Intelligent Systems Research. Atlantis Press, 2010, pp.358-366.
    6. P. Jianli, S. Paul, and R. Jain. “A survey of the research on future internet architectures,” IEEE Communications Magazine, vol. 49, no. 7 (2011) PP: 26-36.

Recent Article