An efficient reversible ECG steganography by adaptive LSB approach based on 1D FDCT domain

  • PDF / 2,546,089 Bytes
  • 14 Pages / 439.37 x 666.142 pts Page_size
  • 1 Downloads / 200 Views

DOWNLOAD

REPORT


An efficient reversible ECG steganography by adaptive LSB approach based on 1D FDCT domain Ching-Yu Yang 1 & Lian-Ta Cheng 1 & Wen-Fong Wang 2 Received: 24 July 2019 / Revised: 29 March 2020 / Accepted: 22 May 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

Based on the processing of one-dimensional fast discrete cosine transform (1D FDCT) coefficients, we present an efficient reversible data hiding method for electrocardiogram (ECG) signal. The proposed method is implemented in two phases. The purpose of phase-I is to classify the FDCT (host) bundles, where each input bundle will be attributed to one of four different bundles. The aim of phase-II is to embed data bits in the selected coefficients of the classified bundles according to a predetermined bit-index table (which generated from phase-I) via adaptive least significant bit (LSB) technique. Simulations confirmed that hidden bits were extracted without distortion and the original ECG signal can be completely recovered. Furthermore, a good perceived quality and a hiding capacity superior to existing techniques were achieved. Moreover, our method is robust against attacks such as noise addition, inversion, truncation, translations, and so on. Notice that the robustness is rarely seen in conventional reversible ECG steganography methods. Since this method has a fast computation speed, it is feasible for real-time applications and can be installed in the health care devices such as the wearable ECG measure equipment. Keywords Data hiding . Reversible ECG steganography . 1D FDCT . Adaptive LSB technique

1 Introduction With the proliferation of hardware technologies, ubiquity of internetworking services, and smart portable devices, it has become economical and easy to share and exchange resources via the Internet, and this has helped organizations expand their business scales via electronic commerce.

* Ching-Yu Yang [email protected]

1

Department of Computer Science and Information Engineering, National Penghu University of Science and Technology, Taiwan, 300 Liu-Ho Rd., Magong, Penghu 880, Taiwan

2

Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology, Taiwan, 123 University Rd., Section 3, Douliou, Yunlin 64002, Taiwan

Multimedia Tools and Applications

However, it is possible for crucial resources to be compromised. The contents of a message could be intercepted, eavesdropped, or forged by hackers or adversaries during communications. An economical way to protect important information is the use of data hiding approaches, which is majorly applied in the protection of intellectual property rights, copyright protection and covert communications. Generally, data hiding can be divided into two categories: steganography and digital watermarking [4]. The applications of both algorithms are quite different. The prominent goal of steganography [1, 2, 6, 9] is to embed the most possible data bits in host multimedia such as images, videos, and audio while maintain