Next Article in Journal
Optimal Resource Provisioning and Task Offloading for Network-Aware and Federated Edge Computing
Previous Article in Journal
Seaweed Growth Monitoring with a Low-Cost Vision-Based System
Previous Article in Special Issue
Integrating Artificial Intelligence and Wearable IoT System in Long-Term Care Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Patient Confidential Data Hiding and Transmission System Using Amplitude Quantization in the Frequency Domain of ECG Signals

1
Department of Medical Informatics, Chung Shan Medical University, Taichung 40201, Taiwan
2
Department of Information Center, Chung Shan Medical University Hospital, Taichung 40201, Taiwan
3
Graduate School of Applied Chinese Studies, National Yunlin University of Science and Technology, Yunlin 64002, Taiwan
4
Bachelor’s Program in Business Management, Fu Jen Catholic University, New Taipei City 242062, Taiwan
*
Authors to whom correspondence should be addressed.
Sensors 2023, 23(22), 9199; https://doi.org/10.3390/s23229199
Submission received: 20 August 2023 / Revised: 31 October 2023 / Accepted: 31 October 2023 / Published: 15 November 2023
(This article belongs to the Special Issue Advanced Sensor Technologies for Biomedical-Information Processing)

Abstract

:
The transform domain provides a useful tool in the field of confidential data hiding and protection. In order to protect and transmit patients’ information and competence, this study develops an amplitude quantization system in a transform domain by hiding patients’ information in an electrocardiogram (ECG). In this system, we first consider a non-linear model with a hiding state switch to enhance the quality of the hidden ECG signals. Next, we utilize particle swarm optimization (PSO) to solve the non-linear model so as to have a good signal-to-noise ratio (SNR), root mean square error (RMSE), and relative root mean square error (rRMSE). Accordingly, the distortion of the shape in each ECG signal is tiny, while the hidden information can fulfill the needs of physiological diagnostics. The extraction of hidden information is reversely similar to a hiding procedure without primary ECG signals. Preliminary outcomes confirm the effectiveness of our proposed method, especially an Amplitude Similarity of almost 1, an Interval RMSE of almost 0, and SNRs all above 30.

1. Introduction

An electrocardiogram (ECG) shows the human heart’s electrical activity as a basis to investigate heart disease and diagnose a cardiovascular anomaly. Accordingly, an ECG is a paramount biosignal to be secured and transmitted in a hospital network. For this goal, it is necessary to apply information-hiding techniques on the ECG to preserve the patient’s information. Related research is still an important issue. Engin [1] proposed a simple data-hiding method for ECG signals. However, their method was not blind. Zheng and Qian [2,3] proposed a wavelet-based ECG data-hiding method of a non-QRS complex to ensure the replacement of undistorted ECG signals. Kuar and colleagues [4] proposed a blind hiding method to warrant the secure spreading of ECG signals in wireless networks. Ibaida [5] used an improved least significant bit (LSB) watermarking method to embed the patient’s biomedical information into the ECG signal while ensuring the integrity of the patient’s ECG. Nevertheless, the choice of an immersing position is sophisticated [6].
In [7,8], the authors applied a quantization watermarking technique to ECG signals in a wavelet domain. Nevertheless, this method was blind. However, the quality of each ECG signal embedded with a watermark decreased when the embedding strength increased. Moreover, Zhou [8] proposed a blind recognition model of a single-channel electromyography. Dey et al. [9] embedded a reversible binary watermark into photoplethysmo-graphic (PPG) signals and then extract the watermark by an error-prediction algorithm. The same laboratory [10] inserted the binary watermark image into the electrocardiogram signal and then proposed a new session-based blind watermarking scheme. However, methods [9] and [10] were not blind. In [11,12], a single-coefficient quantization in the transform domain applied digital watermark encryption technology to the ECG for the protection of the patient’s information and competence. Based on this method, the changes in PQRST complexes and magnitude in the ECG signal are trivial. Jero et al. [13,14] applied curvelet transforms to identify coefficients that keep important data regarding diagnosis. The originality of their paper is to propose a curvelet transform of the ECG steganography, adaptive selection of a watermarking location, and a new algorithm of the selecting threshold. In [15], the authors proposed a novel time-frequency watermarking scheme with an adaptive lead-independent beat-to-beat data repository plan. In [16], authors embedded the information obtained from the patient’s data into the ECG signals based on curvelet transform. It is a new method to make the hidden message robust against image-processing attacks. In [17], the authors integrated the watermarking and compression in Fourier domain for electrocardiogram (ECG). In [18], authors proposed an ECG watermarking scheme based on redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD). First, the ECG signal is adjusted into a 2-D matrix by the Pan–Tompkins algorithm. Then, the hybrid of RDWT and SVD is to conceal the patient data and logo image in the 2-D ECG image. Sanivarapu et al. [19] embedded the patient’s data with a QR image into the ECG in the wavelet domain. Initially, they adjusted the ECG signal into a 2-D ECG image by applying the Pan–Tompkins algorithm and applying wavelet transform to deteriorate the 2-D ECG image. Then, they applied QR decomposition to the QR image to reduce the detail coefficient of the wavelet to obtain the hidden information. In [20], the authors proposed an ECG signal watermarking scheme based on multiple embedding strength (MES), which is optimized by a hunger games search (HGS) algorithm. The scheme maintained the imperceptibility–robustness trade-off. Table 1 lists the domain, solution, fining, and gap for these references.
In this study, we develop a new bio-information hiding method on the ECG signals by using the MIT-BIH arrhythmia database [21,22] to protect patients’ information and competence. Firstly, we develop an amplitude optimization model with a hiding state switch in the transform domain to hide patient information in ECG signals. In the model, we consider the optimization of the SNR with respect to two hiding equations to maximize the feature of the hidden ECG signals. Next, we apply particle swarm optimization (PSO) to solve the optimization problem in the proposed non-linear model in order to obtain best signal-to-noise ratio (SNR), root mean square error (RMSE), and relative root mean square error (rRMSE). Accordingly, the shape distortion in each ECG signal is extremely small. The removal of hidden information is reversely similar to the hiding procedure without the original ECG signals. In experiments, we evaluate the relationship between the hiding strength Q and SNR, the hiding strength Q and RMSE, and the hiding strength Q and similarity. The results of our experiment confirm the efficacy of this proposal.
This paper is composed of five main parts. Part 1 gives an introduction to the background knowledge. Part 2 reviews some preliminaries. Part 3 mainly introduces the proposed hiding method including an optimization model and its solver PSO. Part 4 demonstrates our outcome results and discussion in this study. Part 5 lists our conclusions.

2. Preliminaries

In this part, we recall the waveform of the ECG and point out its fundamental requirement when performing information hiding.

2.1. ECG Signal

Electrocardiography is a technique that uses repeated cardiac cycles to record the electrophysiological activity of the heart in units of time. It works by plotting voltage versus time of the heart’s electrical activity using electrodes placed on the skin. These electrodes detect small electrical changes caused by depolarization and repolarization of the heart muscle during each cardiac cycle (heartbeat). A cardiac cycle is divided into P, Q, R, S, and T complexes. The electrocardiogram contains three major components: the P wave represents atrial depolarization; the QRS complex represents ventricular depolarization; and the T wave represents ventricular repolarization.

2.2. Discrete Wavelet Transform (DWT)

The DWT is a scaling method which translates the mother wavelet ψ ( x ) . The normalized wavelets obtained by scales are defined as φ i , n ( t ) = 2 i 2 h i φ ( 2 i t n ) ,   ψ i , n ( t ) = 2 i 2 g i ψ ( 2 i t n ) , where i and n stand for scale and translation parameters, and h i and g i stand for low-pass and high-pass filters. In order to decompose the input signal into multiple non-overlapping multi-resolution sub-bands, including high-frequency sub-bands and low-frequency sub-bands, we choose orthogonal wavelet basis functions to expand the coefficients. For example, Figure 1 shows a 4-level Haar DWT with orthogonal wavelet bases.

2.3. Discrete Fourier Transform (DFT)

Discrete Fourier Transform (DFT) is a discrete form of Fourier transform in both the time domain and frequency domain, converting the time domain samples of the signal into the frequency domain samples of its DTFT. Since it contains a certain amount of quantity information, this may be accomplished by computers with numerical algorithms or customized tools. The achievements apply structured fast Fourier transform (FFT) algorithms in a way that “FFT” and “DFT” are usually utilized mutually. The DFT has been an important discrete transform used in many practical applications to perform Fourier analysis. In digital signal processing, a function is any time-varying quantity or signal that is sampled over a finite time interval, such as a radio signal or a daily temperature value. In image processing, samples can be pixel values along rows or columns of a raster image. DFT can also be used to solve equations such as partial differential equations.

2.4. Discrete Cosine Transform (DCT)

The discrete cosine transform (DCT) is a finite sequence of data samples represented by the sum of cosine functions oscillating at different frequencies and is widely used in signal processing and data compression. In addition, DCT is also used in most digital media, including digital imaging, digital video, digital audio, digital television, and digital broadcasting. In particular, DCT is a Fourier-related transform interchangeable to DFT applying barely real numbers.

2.5. Particle Swarm Optimization (PSO)

Particle swarm optimization (PSO) was proposed by Eberhart and Kennedy in 1995. It was inspired by observing the social behavior of foraging birds and applied it to search for solutions to optimization-related problems. The search method is to use a group of potential solutions called particles to find the best solution position in the multi-dimensional solution space. Each time a particle moves, it will refer to the best solution position it has found in the past and the past best solutions of all particles. The position then determines the movement direction and distance. Therefore, PSO is a method with group intelligence and a new branch of evolutionary computing. However, PSO is not guaranteed to find an optimal solution exactly [23,24,25,26,27].

3. Proposed System

This part shows the recommended amplitude-quantization technique for hiding patient information in ECGs in the transform domain.

3.1. Information Hiding and Detection

Information hiding means embedding certain data into a digital carrier comprising signal, imaging, video, document, software, etc. This will not reduce the performance of the initial carrier and is difficult to detect or catch by human visual and auditory perception systems. The block diagram for information hiding in the transform domain is given in Figure 2.
The ECG diagnosis is based on the waves of the PQRST. Accordingly, it is necessary to keep these waveform shapes as we include data in the ECG signals or execute their compression. Presumably, the signal of the ECG is changed when the patient’s confidential information is embedded. The modification is normally defined as distortion. With the intention of decreasing the ECG signal distortion, we scrutinize to maximize the SNR during information hiding.
The information hiding and detection proposed in this study is introduced as follows. In information hiding, we first denote S = s 1 , s 2 , , s n to be one segment of a patient’s ECG signal. Subsequently, we transform the DWT, DCT, and DFT separately on the ECG signal S = s 1 , s 2 , , s n to obtain transform-domain coefficients C = c 1 , c 2 , , c n in DWT, DCT, and DFT so that the binary bits B = 0 , 1 can be hidden in the amplitude performed by the coefficients C = c 1 , c 2 , , c n as follows.
Maximize   10 log i = 1 n c i 2 i = 1 n c ˜ i c i 2
Subject   to   i = 1 n c ˜ i = α i = 1 n c i Q Q + 3 4 Q + ( 1 - α ) i = 1 n c i Q Q + 1 4 Q
where C ˜ = c ˜ 1 , c ˜ 2 , , c ˜ n denotes the hidden ECG signal; Q is the hiding strength; α = 1 or α = 0 represents the hiding state of the binary bit “ β i = 1 ” or “ β i = 0 ”.
In information detection, we utilize the formula in (2) for detecting binary bits B * from the DWT, DCT, and DFT coefficient-amplitude c ˜ i
B * = 1 ,   if   i = 1 N c ˜ i i = 1 N c ˜ i Q Q Q 2 0 ,   if   i = 1 N c ˜ i i = 1 N c ˜ i Q Q < Q 2

3.2. Enhance Performance by PSO

In this sub-part, we adopt the solver PSO [20,21,22,23] to find the optimization solutions of c ˜ i i = 0 N the proposed optimization model approximately in (1). We suppose x j , h ( t ) and v j , h ( t ) are the position and velocity of the hth dimension for the jth particle at time t. There are two calculating equations:
v j , h ( t ) = v j , h ( t 1 ) + k 1 r 1 ( x j , h * x j , h ( t 1 ) ) + k 2 r 2 ( x h # x j , h ( t 1 ) )
x j , h ( t ) = x j , h ( t 1 ) + v j , h ( t )
where x j * and x # stand for the finest position solution of the jth particle with all particles as of time t−1; both r 1 and r 2 denote random numbers; k 1 and k 2 represent the individuality coefficient and sociality coefficient; it is normally set to 2.
From the previous two calculating equations and fitness 10 log i = 1 n c i 2 / i = 1 n c ˜ i c i 2 , we itemize the solving solutions of PSO phases by the proposed optimization model as follows.
Phase I. Set the sample size to 20, then give the beginning value arbitrarily for the position and velocity of every particle.
Phase II. Calculate the fitness 10 log i = 1 n c i 2 / i = 1 n c ˜ i c i 2 of the potential position solution for every particle j. When the fitness of the position solution is better than the individual position solution in old memory, the individual position solution is updated.
Phase III. Search the novel finest position solution in the whole particle swarm. If the fitness of this position solution is superior to the previous one, then it is upgraded.
Phase IV. If the terminating condition is satisfied, then the PSO is stopped. If not, go to phase V.
Phase V. Use the PSO flowchart to upgrade the velocity and position solution of every particle. Return to phase II in order to proceed.

3.3. Flowchart

Figure 3 shows a flowchart hiding the patient’s information in the ECG signal in the transform domain. The transform domain is first applied to ECG signals and then the authentication and patient’s confidential data are hidden in the coefficient-amplitude of the transform domain by the proposed information-hiding method. Finally, we perform an inverse transform to obtain the hidden ECG signals. At the other end, the authentication and patient’s confidential data are conducted after the hidden ECG signals are received and the performing of the transform. Practically, our daily life is full of many other applications.

4. Experiments and Discussion

In experiments, we apply the ECG data ID100 to ID105 obtained through the MIT-BIH arrhythmia database [21,22] to examine our suggested solution. The ECG data possess a 360 Hz sampling rate together with a 12-bit binary characterization. Every ECG signal is converted to zero in order to erase the DCT offset. Nevertheless, the settlement of the 12-bit binary characterization is to predict the precise coefficients for hiding the patient’s confidential data. Thus, every signal of ECG with 12-bit binary characteristics is graded to 1 with 16-bit characteristics comparatively. The experimental procedure and results are listed in the following.
First of all, we apply 5-level Haar DWT with orthogonal wavelet bases to degrade an ECG signal to six non-overlapping sub-bands. In order to avoid distorting too much, we hide the binary bits in the multiple low-frequency coefficient-amplitude in the fifth level. The hiding in the DCT and DFT also adopts the low-frequency coefficient-amplitudes, respectively.
Next, we perform the transform domain DWT, DCT, and DFT in every ECG signal of length 4096 selected via 47 datasets from the MIT-BIH arrhythmia database. Study outcomes for the proposed solution in the sample of N = 2 are analyzed in the following.
Without loss of generality, presentation of the proposed scheme is examined by the SNR, similarity, and RMSE, as in the following formulas:
SNR = 10 log 10 i = 1 N s i 2 i = 1 N s ˜ i s i 2
Similarity S , S ˜ = i = 1 N s i s ˜ i i = 1 N s ˜ i 2
RMSE = 1 N i = 1 N s ˜ i s i 2
where s i and s ˜ i indicate theoriginal sample and hidden sample in some ECG signals.
The proposed information detection is similar to the proposed information-hiding procedure. First of all, we transform DWT, DCT, and DFT in the test ECG signals, respectively. Next, we detect the binary bits by the rule in (2).
Each hidden ECG signal has good quality because of the proposed method. For example, Figure 4a,b show the original ECG signal and the hidden ECG signal of dataset ID 100 using DWT lowest-frequency coefficients in a 5-level decomposition. They are similar, as shown in Figure 4c, where the green curve demonstrates primitive ECG signals; in addition, the green curve shows hidden ECG signals by DWT and the quantization size Q = 3000.
Moreover, as shown in Table 2, our recommended technique applies PSO (20 particles) to maximize amplitude similarity and SNR but minimize RMSE. SNR is significantly diminished when the quantization size Q is escalated. In addition, our technique persists with high quality, small RMSE and high SNR, for each hidden ECG signal under a sufficient hiding capacity when the quantization size Q is escalated. Both DFT and DCT also have the same effect on the RMSE and SNR. For extracting the embedded patient information, the average success rate of extraction is about 81.2% since PSO does not guarantee that it can accurately solve the proposed optimization model in Equation (1a,b). Usually, the average success rate of extraction in non-approximation hiding methods is above 90%. For example, the average success rate of extraction in reference [12] is 94.8%. Compared with these methods, the success rate of extraction in our method is lower.
When transmitting data, they is sent to the receiver by the transmission speed of 1 Giga (G) bps. When the quantity of information transmitted is not large enough or during a restriction on transmitting data, information-hiding is recommended.

5. Conclusions

By developing an optimization model, we combine coefficient-amplitude quantization with a SNR to propose a new hiding method for a patient’s confidential data in this study. After testing six ECG datasets by using the proposed hiding method, the distinction of the hidden ECG signal and primitive one has an Amplitude Similarity of almost 1, an Interval RMSE of almost 0, and SNRs all above 30, which is tiny and insignificant for physiological detection. In addition, our recommended technique ameliorates the weakness of each hidden ECG signal, which is significantly diminished when the quantization size Q is escalated. However, our proposed method has the limitation of a low extraction success rate. In future work, we will improve the shortcomings of the low extraction success rate.

Author Contributions

Conceptualization, S.-T.C.; methodology, S.-T.C.; software, S.-T.C.; validation, S.-T.C.; writing—review and editing, S.-T.C., R.-J.Y., T.-H.W., C.-W.C., P.-Y.Z., K.-M.C. and W.-Y.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Engin, M.; Çidam, O.; Engin, E.Z. Wavelet transformation based watermarking technique for human electrocardiogram (ECG). J. Med. Syst. 2005, 29, 589–594. [Google Scholar] [CrossRef] [PubMed]
  2. Zheng, K.M.; Qian, X. Reversible data hiding for electrocardiogram signal based on wavelet transforms. In Proceedings of the 2008 International Conference on Computational Intelligence and Security (CIS2008), Suzhou, China, 13–17 December 2008; pp. 295–299. [Google Scholar]
  3. Zheng, K.M.; Tang, L.W.; Qian, X. Watermarking technology for electrocardiogram signal certification. Comput. Eng. Appl. 2009, 45, 231–233. [Google Scholar]
  4. Kaur, S.; Farooq, O.; Singhal, R.; Ahuja, B.S. Digital watermarking of ECG data for secure wireless communication. In Proceedings of the 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC2010), Kochi, India, 12–13 March 2010; pp. 140–144. [Google Scholar]
  5. Ibaida, A.; Khalil, I.; van Dhiah, A.S. Embedding Patients Confidential Data in ECG Signal for HealthCare Information System. In Proceedings of the 32nd Annual International Conference of the IEEE EMBS, Buenos Aires, Argentina, 31 August–4 September 2010; pp. 3891–3894. [Google Scholar]
  6. Ibaida, A.; Khalil, I.; van Schyndel, R. A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system. In Proceedings of the Computing in Cardiology (CinC), Hangzhou, China, 18–21 September 2011; pp. 393–396. [Google Scholar]
  7. He, X.; Tseng, K.K.; Huang, H.H.; Chen, S.T.; Tu, S.Y.; Zeng, F.; Pan, J.S. Wavelet-based Quantization Watermarking for ECG Signals. In Proceedings of the 2012 International Conference on Computing, Measurement, Control and Sensor Network (CMCSN), Taiyuan, China, 7–9 July 2012; pp. 233–236. [Google Scholar]
  8. Guo, Y.; Zhou, D. Single channel surface electromyography blind recognition model based on watermarking. J. Vib. Control. 2012, 18, 42–47. [Google Scholar]
  9. Dey, N.; Biswas, S.; Roy, A.B.; Das, A.; Chowdhuri, S.S. Analysis of Photoplethysmographic Signals Modified by Reversible Watermarking Technique using Prediction-Error in Wireless Telecardiology. In Proceedings of the First International Conference on Intelligent Infrastructure the 47th Annual National Convention at Computer Society of Inda CSI, Kolkata, India, 1 December 2012; Available online: https://www.academia.edu/64990486/Analysis_of_Photoplethysmographic_Signals_Modified_by_Reversible_Watermarking_Technique_using_Prediction_Error_in_Wireless_Telecardiology (accessed on 15 January 2020).
  10. Dey, N.; Mukhopadhyay, S.; Das, A.; Chaudhuri, S.S. Analysis of P-QRS-T Components Modified by Blind Watermarking Technique Within the Electrocardiogram Signal for Authentication in Wireless Telecardiology Using DWT. Int. J. Image Graph. Signal Process. 2012, 4, 33–46. [Google Scholar] [CrossRef]
  11. Tseng, K.-K.; He, X.; Kung, W.-M.; Chen, S.-T.; Liao, M.; Huang, H.-N. Wavelet-Based Watermarking and Compression for ECG Signals with Verification Evaluation. Sensors 2014, 14, 3721–3736. [Google Scholar] [CrossRef] [PubMed]
  12. Chen, S.-T.; Guo, Y.-J.; Huang, H.-N.; Kung, W.-M.; Tseng, K.-K.; Tu, S.-Y. Hiding Patients Confidential Data in the ECG Signal via Transform-Domain Quantization Scheme. J. Med. Syst. 2014, 38, 54. [Google Scholar] [CrossRef] [PubMed]
  13. Jero, S.E.; Ramu, P.; Ramakrishna, S.N. ECG steganography using curvelet transform. Biomed. Signal Process. Control. 2015, 22, 161–169. [Google Scholar] [CrossRef]
  14. Jero, S.E.; Ramu, P. Curvelets-based ECG steganography for data security. Electron. Lett. 2016, 52, 283–285. [Google Scholar] [CrossRef]
  15. Świerkoszand, A.; Augustyniak, P. Optimizing wavelet ECG watermarking to maintain measurement performance according to industrial standard. Sensors 2018, 18, 3401. [Google Scholar] [CrossRef]
  16. Goyal, L.M.; Mittal, M.; Kaushik, R.; Verma, A.; Kaur, I.; Roy, S.; Kim, T.-H. Improved ECG watermarking technique using curvelet transform. Sensors 2020, 20, 2941. [Google Scholar] [CrossRef]
  17. Tripathi, P.M.; Kumar, A.; Komaragiri, R.; Kumar, M. Watermarking of ECG signals compressed using Fourier decomposition method. Multimed. Tools Appl. 2022, 81, 19543–19557. [Google Scholar] [CrossRef]
  18. Sharma, N.; Anand, A.; Singh, A.K. Optimization based ECG watermarking in RDWT-SVD domain. Multimed. Tools Appl. 2023, 82, 5031–5047. [Google Scholar] [CrossRef]
  19. PSanivarapu, V.; Rajesh, K.N.V.P.S.; Reddy, N.V.R.; Reddy, N.C.S. Patient data hiding into ECG signal using watermarking in transform domain. Phys. Eng. Sci. Med. 2020, 43, 213–226. [Google Scholar] [CrossRef]
  20. Sharma, N.K.; Kumar, S.; Kumar, N. HGSmark: An efficient ECG watermarking scheme using hunger games search and Bayesian regularization BPNN. Biomed. Signal Process. Control. 2023, 83, 104633. [Google Scholar] [CrossRef]
  21. Moody, G.B.; Mark, R.G. The impact of the MIT-BIH arrhythmia database. IEEE Eng. Med. Biol. Mag. 2001, 20, 45–50. [Google Scholar] [CrossRef] [PubMed]
  22. MIT-BIH Arrhythmia Database Directory, Harvard University-Massachusetts Institute of Technology Division of Health Science and Technology. 1992. Available online: http://www.ph (accessed on 18 January 2020).
  23. Kothari, V.; Anuradha, J.; Shah, S.; Mittal, P. A survey on particle swarm optimization in feature selection. In Global Trends in Information Systems and Software Applications, Proceedings of the International Conference on Computing and Communication Systems, Vellore, India, 9–11 December 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 192–201. [Google Scholar]
  24. Marini, F.; Walczak, B. Particle swarm optimization (pso). A tutorial. Chemom. Intell. Lab. Syst. 2015, 149, 153–165. [Google Scholar] [CrossRef]
  25. Mavrovouniotis, M.; Li, C.; Yang, S. A survey of swarm intelligence for dynamic optimization: Algorithms and applications. Swarm Evol. Comput. 2017, 33, 1–17. [Google Scholar] [CrossRef]
  26. Gad, A.G. Particle Swarm Optimization Algorithm and Its Applications: A Systematic Review. Arch. Comput. Methods Eng. 2022, 29, 2531–2561. [Google Scholar] [CrossRef]
  27. Zhao, M.; Chen, S.-T.; Tu, S.-Y. Wavelet-Domain Information-Hiding Technology with High-Quality Audio Signals on MEMS Sensors. Sensors 2022, 22, 6548. [Google Scholar] [CrossRef] [PubMed]
Figure 1. The 4-level DWT decomposition.
Figure 1. The 4-level DWT decomposition.
Sensors 23 09199 g001
Figure 2. Block diagram for information (a) hiding and (b) detection.
Figure 2. Block diagram for information (a) hiding and (b) detection.
Sensors 23 09199 g002
Figure 3. A flowchart of the proposed method.
Figure 3. A flowchart of the proposed method.
Sensors 23 09199 g003
Figure 4. Differentiation of original signals and hidden signals for dataset ID 100.
Figure 4. Differentiation of original signals and hidden signals for dataset ID 100.
Sensors 23 09199 g004
Table 1. List of domain, solution, fining, gap for references [11,12,13,14,15,16,17,18,19,20].
Table 1. List of domain, solution, fining, gap for references [11,12,13,14,15,16,17,18,19,20].
ReferenceDomainSolution.Fining Gap.
[11]transform domainsingle-coefficient quantizationIn case of embedding strength by SNR = 32, most of amplitude simi-larities are 1, root mean square ap-proaches 0.For increase in embedding strength, there is decrease in the SNR value.
[12]transform domainsingle-coefficient quantizationIn case of embedding strength by SNR = 32, most of amplitude similarities are 1, root mean square approaches 0.For increase in embed-ding strength, there is decrease in the SNR value.
[13]transform domainadaptive selection of watermarking location and threshold selecting for embeddingAs the patient data size is increased, the cover signal deteriorates but the Bit Error Rate is zero. The signal deterioration is about 10% when patient data increase 1.5 times.For increase in watermark size, there is decrease in the PSNR value.
[14]transform domainadaptive selection of watermarking location and selecting threshold for embeddingAs the patient data size is increased, the cover signal deteriorates but the Bit Error Rate is zero. For increase in watermark size, there is decrease in the PSNR value.
[15]transform domainadaptive lead-independent beat-to-beat data repository plan(1) The 11th order Symlet is the best among the wavelets tested (2) The watermark and noise similarity of amplitude and numerical distribution are highly affectedFurther watermarking destroys the existing watermark.
[16]transform domainembed the information of the patient’s data into the ECG signals using curvelet transformA PSNR value higher than 64 shows the high quality of extracted information. The NC values of all ECG signals are 1 and the SSIM values are close to 1, which indicates high similarity between embedded and extracted information.Some false positives occur during the watermark embedding process, which not only reduces the quality of the extracted watermark, but also affects the robustness of the image.
[17]transform domainECG watermarking and compression in Fourier domainThe improved SNR proves the denoising ability of the watermark signal.For increase in embedding strength, there is decrease in the SNR value.
[18]transform domainECG watermarking using the integration of redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD)The optimal invisibility and robustness result are more effective.There does not seem to be any guarantee that the encoded binary bits could be recovered using particle swarm optimization (PSO).
[19]transform domainembedding factor value is calculated adaptively by harnessing the entropy value of the signalThe embedding factor value is calculated adaptively by harnessing the entropy of the ECG signal. The embedded data can be easily extracted with no distortion.For increase in embedding strength, there is decrease in the SNR value.
[20]time domainmultiple embedding strength optimized by hunger games search algorithm maintaining the imperceptibility-robustness trade-off to obtain PSNR = 57.725 dB Embedded patient information is less hidden and less robust.
Table 2. Experimental results for the three transforms: DWT, DCT, and DFT.
Table 2. Experimental results for the three transforms: DWT, DCT, and DFT.
IDMethodDomainQAmplitude
Similarity
SNRRMSEInterval RMSE in ECG
PRQRSSTQT
Reference
[12]
DWT
(Level 5)
400140.8536.860000
1000135.1667.430000
3000124.26121.520000
DFT400161.133.750000
1000154.688.210000
40000.9946.1228.360000
DCT4000.9929.92197.920000
10000.9820.16435.110000
30000.819.212014.60000
ProposedDWT
(Level 5)
4000.9939.8651.930000
10000.9939.1449.220000
30000.9938.9549.370000
DFT400134.2293.150000
1000131.81109.740000
3000131.09105.820000
DCT400147.1619.880000
1000145.9421.900000
3000145.7823.120000
101Reference [12]DWT
(Level 5)
400141.7836.3900.0010.0020
1000134.6771.650000
3000125.39141.470000
DFT400160.424.120000
1000154.376.950000
3000145.5829.730000
DCT4000.9926.63203.310000
10000.9818.67441.870000
30000.788.321983.40000
ProposedDWT
(Level 5)
400133.4592.560000
1000133.1692.130000
30000.9932.8996.090000
DFT4000.9932.25107.580000
10000.9930.82103.140000
30000.9930.1994.310000
DCT400136.4670.150000
1000135.8368.630000
3000135.4768.510000
102Reference
[12]
DWT
(Level 5)
4000.9944.6533.940000
10000.9937.3570.160000
30000.9927.31267.170000
DFT400163.184.120000
1000156.287.450000
3000147.5330.280000
DCT4000.9928.02200.190000
10000.9921.45421.370000
30000.8713.281890.50000
ProposedDWT
(Level 5)
400134.2892.780000
1000134.2295.680000
3000133.42115.240000
DFT4000.9928.62300.250000
10000.9926.61334.680000
30000.9926.60293.240000
DCT400129.57171.130000
1000129.36170.120000
3000129.24166.770000
103Reference [12]DWT
(Level 5)
400140.5636.070000
1000137.6563.480000
3000126.35270.750000
DFT400163.234.070000
1000155.768.130000
30000.9947.1230.080000
DCT4000.9928.23211.170000
10000.9921.62450.700000
30000.8510.211980.20000
ProposedDWT
(Level 5)
400127.38258.110000
1000126.75238.720000
3000126.48253.620000
DFT4000.9928.32155.430000
10000.9928.54160.410000
30000.9928.61158.370000
DCT400134.1796.240000
1000134.1195.840000
3000134.2594.330000
104Reference [12]DWT
(Level 5)
4000.9941.5637.210.041000
10000.9937.2068.960000
30000.9923.67260.170000
DFT400162.464.370.6530.01500
1000156.478.570000
30000.9944.4530.160000
DCT4000.9927.84202.6450000
10000.9921.26431.980000
30000.868.411895.50000
ProposedDWT
(Level 5)
4000.9925.16317.650000
10000.9925.34327.750000
30000.9925.76322.640000
DFT4000.9927.18166.730000
10000.9927.29167.350000
30000.9927.36166.460000
DCT400131.41134.540000
1000132.26130.170000
3000132.18128.960000
105Reference [12]DWT
(Level 5)
400141.9634.540000
1000139.1568.280000
30000.9924.75284.630000
DFT400164.463.700000
1000158.377.470000
3000146.2430.210000
DCT4000.9829.58205.580000
10000.9922.76450.820000
30000.889.432092.60000
ProposedDWT
(Level 5)
400126.83283.360000
1000126.39297.790000
3000126.56291.290000
DFT4000.9925.96161.360000
10000.9925.74162.850000
30000.9925.36161.460000
DCT400146.5831.010000
1000146.0031.050000
3000146.2228.540000
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, S.-T.; Ye, R.-J.; Wu, T.-H.; Cheng, C.-W.; Zhan, P.-Y.; Chen, K.-M.; Zhong, W.-Y. Patient Confidential Data Hiding and Transmission System Using Amplitude Quantization in the Frequency Domain of ECG Signals. Sensors 2023, 23, 9199. https://doi.org/10.3390/s23229199

AMA Style

Chen S-T, Ye R-J, Wu T-H, Cheng C-W, Zhan P-Y, Chen K-M, Zhong W-Y. Patient Confidential Data Hiding and Transmission System Using Amplitude Quantization in the Frequency Domain of ECG Signals. Sensors. 2023; 23(22):9199. https://doi.org/10.3390/s23229199

Chicago/Turabian Style

Chen, Shuo-Tsung, Ren-Jie Ye, Tsung-Hsien Wu, Chun-Wen Cheng, Po-You Zhan, Kuan-Ming Chen, and Wan-Yu Zhong. 2023. "Patient Confidential Data Hiding and Transmission System Using Amplitude Quantization in the Frequency Domain of ECG Signals" Sensors 23, no. 22: 9199. https://doi.org/10.3390/s23229199

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop