Skip to main content

ORIGINAL RESEARCH article

Front. Aging Neurosci., 20 April 2022
Sec. Neurocognitive Aging and Behavior
This article is part of the Research Topic Translational Advances in Alzheimer's, Parkinson's, and other Dementia: Molecular Mechanisms, Biomarkers, Diagnosis, and Therapies, Volume II View all 58 articles

Intelligent Healthcare System Using Patients Confidential Data Communication in Electrocardiogram Signals

\r\nMing ZhaoMing Zhao1Shuo-Tsung ChenShuo-Tsung Chen2Tzu-Li ChenTzu-Li Chen2Shu-Yi TuShu-Yi Tu3Cheng-Ta YehCheng-Ta Yeh4Fang-Yu LinFang-Yu Lin5Hao-Chun Lu,*\r\nHao-Chun Lu6,7*
  • 1School of Computer Science, Yangtze University, Jingzhou, China
  • 2Department of Industrial Engineering and Management, National Taipei University of Technology, Taipei, Taiwan
  • 3Department of Mathematics, University of Michigan-Flint, Flint, MI, United States
  • 4Department of Information Management, Fu Jen Catholic University, New Taipei City, Taiwan
  • 5Graduate Institute of Business Administration, Fu Jen Catholic University, New Taipei City, Taiwan
  • 6Department of Cardiology, Linkou Chang Gung Memorial Hospital, Taoyuan, Taiwan
  • 7Department of Industrial and Business Management, Chang Gung University, Taoyuan, Taiwan

With the advent of the aging era, healthcare and elderly care have become the focus of medical care, especially the care of the elderly with dementia. Patients’ confidential data hiding is a useful technology for healthcare and patient information privacy. In this study, we implement an intelligent healthcare system using the multiple-coefficient quantization technology in transform domain to hide patients’ confidential data into electrocardiogram (ECG) signals obtained by ECG sensor module. In embedding patients’ confidential data, we first consider a non-linear model for optimizing the quality of the embedded ECG signals. Next, we apply simulated annealing (SA) to solve the non-linear model so as to have good signal-to-noise ratio (SNR), root mean square error (RMSE), and relative RMSE (rRMSE). Accordingly, the distortion of the PQRST complexes and the ECG amplitude is very small so that the embedded confidential data can satisfy the requirements of physiological diagnostics. In end devices, one can receive the ECG signals with the embedded confidential data and without the original ECG signals. Experimental results confirm the effectiveness of our method, which remains high quality for each ECG signal with the embedded confidential data no matter how the quantization size Q is increased.

Introduction

In recent years, most countries around the world are facing the advent of the age of old age. Healthcare and long-term care have become the focus of medical care, especially the care of the elderly with dementia. Electrocardiogram (ECG) represents the human heart’s electrical activity, and hence it can be used as a reference for the analysis of cardiac pathology and cardiovascular system diagnostics. So, ECG contains a very important bio-information that has to be protected and transmitted on the Internet. It is necessary to apply information hiding technology on the ECG to protect patient rights and information.

Research on the protection of ECG information by watermarking or hiding techniques is still an important issue. Kong and Feng (2001) and Engin et al. (2005) propose a simple data hiding method for ECG signals, but the method is not blind. Zheng and Qian (2008) and Zheng et al. (2009) proposed a wavelet-domain ECG data hiding method in non-QRS complex frames to ensure the restoration of almost un-distorted ECG signals. Kaur et al. (2010) presented the safe transmission of ECG signals in wireless networks by using a blind hiding method. Ibaida et al. (2010) improved the watermarking technique of least significant bit (LSB) and applied this improved technique to hide healthcare information in an ECG signal. Ibaida et al. (2011) presented a watermarking technique to embed patient biomedical information into ECG signals so as to ensure patient/ECG linkage integrity, and is suitable for a wearable sensor-net health monitoring system. However, the selection of embedding location is difficult.

In Guo and Zhou (2012) and He et al. (2012), a Haar wavelet transform with 7 levels decomposition is adopted to transform the ECG signal, and then the synchronization code combined with watermark are embedded into the low-frequency sub-band of level 7 to have good signal-to-noise ratio (SNR) and bit error rate (BER). However, the quality of all watermarked ECG signals decreases when the embedding strength increases. Moreover, Guo and Zhou (2012) presented a model of single-channel electromyography blind recognition. Dey et al. (2012a) embedded reversible binary bits to be watermark in the photoplethysmography (PPG) signal and extracted them by an error prediction algorithm. Dey et al. (2012b) presented a new session-based blind watermarking scheme by hiding a binary watermark image into the ECG signal. However, the methods in Dey et al. (2012a,b) are not blind. Ayman and Ibrahim (2013) developed a wavelet-based information hiding technique to protect patient confidential data by combining encryption and scrambling. Their method applied wavelet transform to ECG signal to hide the related patient confidential data and physiological information. In Chen et al. (2014) and Tseng et al. (2014), single-coefficient quantization in transform domain is applied to the digital watermark encryption technology on the ECG for protecting patient rights and information. By this method, the changes in the PQRST complexes and amplitude of the ECG signal are very small. Jero et al. (2015) and Jero and Ramu (2016) used curvelet transforms to identify the coefficients that store the crucial information about diagnosis. The novelty of their approach is the usage of curvelet transform for ECG steganography, adaptive selection of watermark location, and a new threshold selection algorithm. In Swierkosz and Augustyniak (2018), an original time-frequency watermarking technique with an adaptive beat-to-beat lead-independent data container design is implemented. The authors tested six wavelets, six coding bit depth values, and two types of watermark content to find the conditions that are necessary for watermarked ECG to maintain the compliance with International Electrotechnical Commission (IEC) requirements for interpretation performance. Sanivarapu et al. (2020) proposed a wavelet method-based watermarking scheme for patient information hiding in the ECG as a QR image. They first converted the 1D-ECG signal to 2D-ECG image using Pan–Tompkins algorithm, and then used a wavelet transform to decompose the 2D-ECG image. They then decompose the detail coefficient of wavelet and the QR image using QR decomposition for embedding data.

In this study, we install ECG sensor module on patients to obtain their ECG and propose a new information hiding technology for the ECG. As ECG has high requirements for accuracy, we rewrite SNR and amplitude-quantization as performance index and constraint to obtain an optimization model for embedding patients’ confidential data into ECGs imperceptibly. The optimization model is then solved by simulated annealing (SA) algorithms and applied to embed patients’ confidential data. By network transmission, one can receive the ECGs embedded with the confidential data in the other end and extract the confidential data without the original ECG. In experiments, we evaluated the relation between embedding strength Q and SNR, embedding strength Q and root mean square error (RMSE), and embedding strength Q and similarity. Experimental results confirm the effectiveness of our method, which remains high quality for each ECG signal with the embedded confidential data no matter how the quantization size Q is increased.

The rest of this article is as follows. Section 2 reviews some preliminaries including ECG principle, discrete wavelet transform (DWT), discrete Fourier transform (DFT), discrete cosine transform (DCT), and SA. Section 3 presents the proposed SA-based quantization embedding method for hiding patient confidential data into ECG signals. Section 4 shows experimental results and discussion. Conclusions are finally drawn in Section 5.

Preliminaries

In this section, we review some preliminaries including ECG principle, DWT, DFT, DCT, and SA.

Electrocardiogram Signal

The abbreviation ECG denotes the electrocardiogram wave, named by the Dutch physiologist W. Einthoven (the inventor of the ECG). As shown in Figure 1, he classified one cardiac cycle into P, Q, R, S, and T complex waves (Burrus et al., 1998). The ECG diagnosis mainly depends on the PQRST waves. Therefore, it is necessary to maintain the shape of these waveforms when we add information into ECG signals or perform ECG signals compression.

FIGURE 1
www.frontiersin.org

Figure 1. ECG signal.

Discrete Wavelet Transform

The DWT is a technique attained by scales and translates a mother wavelet ψ(x). The normalized scaling functions and wavelets are defined as,

φ i , n ( t ) = 2 i / 2 h i φ ( 2 i t-n )
ψ i , n ( t ) = 2 i / 2 g i ψ ( 2 i t-n )

where i and n denote the scale and translation parameters, and hi and giare the low-pass and high-pass filters, respectively. It should be noted that orthogonal wavelet basis functions are adopted to ease the work in calculating coefficients expansion so that an input signal can be decomposed into several non-overlapping multi-resolution sub-bands, including low-frequency sub-bands and high-frequency sub-bands (Oran Brigham, 1988; Mallat, 1989, 1999).

Discrete Fourier Transform

The DFT converts a finite sequence of equally spaced samples of a function into a same-length sequence of equally spaced samples of the discrete-time Fourier transform (DTFT), which is a complex-valued function of frequency. Since it deals with a finite amount of data, it can be implemented in computers by numerical algorithms or even dedicated hardware. These implementations usually employ efficient fast Fourier transform (FFT) algorithms, so much so that the terms “FFT” and “DFT” are often used interchangeably (Rao and Yip, 1990; Oppenheim et al., 1999).

Discrete Cosine Transform

The DCT expresses a finite sequence of data points in terms of a sum of cosine functions oscillating at different frequencies. In particular, a DCT is a Fourier-related transform similar to the DFT but using only real numbers (Rao and Yip, 1990; Granville et al., 1994).

Simulated Annealing

Simulated annealing is an artificial intelligent algorithm, which utilizes probabilistic concept to approximate the global optimum of a given function. Specifically, It uses a metaheuristic method to approximate global optimization in a large discrete search space. In general, SA algorithm works as follows. At each time step, SA algorithm gives a solution randomly close to the current one, evaluates its quality, and then decides to move to it or to stay with the current solution based on either one of two probabilities between which it chooses based on the fact that the new solution is better or worse than the current one. During the search, the temperature is progressively decreased from an initial positive value to zero, and this affects the two probabilities: at each step, the probability of moving to a better new solution is either kept as 1 or is changed toward a positive value; instead, the probability of moving to a worse new solution is progressively changed toward zero (Bouttier and Gavra, 2019). The implementation of SA algorithm is easy because of its simple concept and computation.

Proposed Intelligent Healthcare System

This section first shows the proposed amplitude-quantization hiding technique for confidential data communication and private information protection in the transform domain of ECGs, as shown in Figure 2. Next, we provide the architecture of the proposed intelligent multiple-coefficient quantization hiding system for patients’ confidential data communication.

FIGURE 2
www.frontiersin.org

Figure 2. A flowchart of the proposed method.

Information Hiding

As shown in Figure 2, the information hiding and detection proposed in this study is introduced as follows. Let S = {s1,s2,⋯,sN} denote an ECG signal with total length N sample points. We then perform three transforms, DWT, DCT, and DFT, independently on the ECG signalS = {s1,s2,⋯,sN}so that the binary bits B = {mi} can be hidden into the coefficients of each transform domain. Finally, the hidden ECG signal is obtained and denoted by S~={s~1,s~2,,s~N}. The details of the hiding process for each transform are listed below.

DWT: In the information hiding, we first apply Haar DWT with orthogonal wavelet bases to decompose an ECG signal into several non-overlapping sub-bands. In order not to distort or disturb the original ECG as much as possible, we hide the binary bits B = {mi} into the DWT lowest-frequency coefficients by the following rule,

i = 1 N | c ~ i | = { i = 1 N | c i | / Q Q + 3 Q / 4 , if m i = 1 i = 1 N | c i | / Q Q + Q / 4 , if m i = 0

where {ci} and {c~i} are the DWT lowest-frequency coefficients before and after hiding, respectively; Q is the hiding strength. By performing the inverse DWT (IDWT), the hidden ECG signal S~ is obtained and the information hiding is completed.

DCT: The hiding rule for DCT multiple coefficients is the same as for DWT. Similarly, we hide the binary bits B = {mi} into the DCT lowest-frequency coefficients {ci}, respectively.

DFT: The hiding rule for DFT multiple coefficients is the same as for DWT. Similarly, we hide the binary bits B = {mi} into the DFT lowest-frequency coefficients {ci}, respectively.

Theoretically, an ECG signal is modified when embedding patient confidential information. The modification is usually called a distortion. In order to reduce the distortion of ECG signal, we consider the maximum of SNR which is defined as,

S N R = - 10 log [ i = 1 N ( s ~ i - s i ) 2 / i = 1 N s i 2 ]

where {si} represents the original ECG signal sample points, and {s~i} represents the unknown embedded (or modified) ECG signal sample points. Since we implement the DWT with orthogonal wavelet bases, the SNR can be rewritten to the form,

S N R = - 10 log [ i = 1 N ( | c ~ i | - | c i | ) 2 / i = 1 N | c i | 2 ]

From the point of view on maximizing SNR, we consider to determine the unknown values of {c~i}i=0N by using the following optimization models.

• If the bit bi = 1 is embedded into {ci|1≤iN}, i=1N|ci| is modified to i=1N|c~i| by, maximize -10log[i=1N(|c~i|-|ci|)2/i=1N|ci|2] subject to i=1N|c~i|=i=1N|ci|/QQ+34Q

• If the bit bi = 1 is embedded into {ci|1≤iN}, i=1N|ci| is modified to i=1N|c~i| by, maximize -10log[i=1N(|c~i|-|ci|)2/i=1N|ci|2] subject to i=1N|c~i|=i=1N|ci|/QQ+14Q

Due to the fact that the algorithm of SA is easy to be implemented by its simple concept and calculation mentioned in section “Simulated Annealing,” especially for embedded system, we adopt SA to solve the optimization models approximately. In other words, we apply SA to obtain the optimal solutions of {c~i}i=0N approximately. At each time step in SA, the algorithm randomly selects a solution close to the current one, measures its quality, and then decides to move to it or to stay with the current solution based on either one of two probabilities between which it chooses on the basis of the fact that the new solution is better or worse than the current one. During the search, the temperature is progressively decreased from an initial positive value to zero, which affects the two probabilities: at each step, the probability of moving to a better new solution is either kept as 1 or is changed toward a positive value; instead, the probability of moving to a worse new solution is progressively changed toward zero. In this section, we adopt SA to approach the optimal solution of the proposed optimization model. The detailed procedure of SA in solving the proposed optimization model is introduced in the following steps.

Step 1: Setting the initial value for parameters including initial solution C0, initial temperature T0, final temperature Tf, cooling rate r, and number of iteration D for each temperature T, where T0TTf.

Step 2: For each d = 1,…,D in a temperature T, do the following repeatedly:

(1) Produce a new solution C={|c1|,|c2|,,|cn|} randomly and calculate the difference ΔE=E(C)-E(C)={-10log[i=1n(|ci|-|ci|)2/i=1N|ci|2]-(-10log[i=1N(|ci|-|ci|)2/i=1N|ci|2])} between current solution C={|c1|,|c2|,,|cn|} and the new solution (neighbors)C={|c1|,|c2|,,|cn|}.

(2) The probability of making the transition from the current solution to a new solution (neighbors) is specified by an acceptance probability function PE,T) that depends on ΔE and T.

P ( Δ E , T ) = { 1 , i f Δ E 0 e ( - Δ E T ) , i f Δ E > 0

In case ΔE≤0, the probability function PE,T) is equal to 1 indicating that the current solution S is replaced by new solution S’. In case ΔE > 0, the current solution S is replaced by the new solution S’ when probability function P(ΔE,T)=e(-ΔET) is greater than a threshold H∈(0,1).

Step 3: When step 2 is finished, the temperature T is decreased by a cooling rate r to a new temperature T = rT.

Step 4: Check if temperature T reaches the final temperature Tf to stop SA.

After applying SA to embed patients’ essential body functions into ECG signal S, we obtain an embedded ECG signal S~, respectively.

Information Detection

In the information detection, similar to the information hiding mentioned earlier, we first perform the transforms, DWT, DCT, and DFT on the test ECG signals, respectively. Next, we detect binary bits {mi*} from the hidden coefficients {c~i} of the DWT, DCT, and DFT by the following rule:

m i * = { 1 , if i = 1 N | c ~ i | - i = 1 N | c ~ i | / Q Q Q / 2 0 , if i = 1 N | c ~ i | - i = 1 N | c ~ i | / Q Q < Q / 2

Architecture of the Proposed System

Figure 3 shows the architecture of the proposed intelligent multiple-coefficient quantization hiding system for patients’ confidential data communication. First, we install ECG-sensor module, including electrode patch, AD8232 ECG sensor, and Arduino, on patients or dementia patients to obtain their ECG. As the ECG-sensor module shown in the upper left corner of Figure 3, three electrode patches are installed on patient body and connected to AD8232 ECG sensor. At the same time, AD8232 is connected to Arduino which outputs the ECG data to a computer. Next, as in subsections “Information Hiding” and “Information Detection,” we hide the patient’s information into the ECG signal in the transform domain by performing DWT/DFT/DCT and IDWT/inverse DFT (IDFT)/inverse DCT (IDCT). At the other end, the embedded patients confidential data are extracted after the hidden ECG is received through wireless communication and we perform transform domain DWT/DFT/DCT on the hidden ECG.

FIGURE 3
www.frontiersin.org

Figure 3. Proposed intelligent multiple-coefficient quantization hiding and communication system for patients’ confidential data.

Experiments and Discussion

In experiments, we apply the ECG data obtained from ECG sensor module to test the proposed method on each ECG signal with length 4,096 samples represented by 16-bit. To have more embedding capacity, we set N to 2. The evaluation of experimental results and discussion are listed in section 4.1. Limitation and future research plan are listed in section 4.2.

Experimental Results and Discussion

Without generality, the performance of the proposed scheme is evaluated by SNR, similarity, and RMSE, which are formulated as follows:

SNR = - 10 log 10 ( i = 1 N ( s ~ i - s i ) 2 i = 1 N s i 2 ) ,
Similarity ( S , S ~ ) = i = 1 N s i s ~ i i = 1 N s ~ i 2 ,
RMSE = 1 N i = 1 N ( s ~ i - s i ) 2 ,

where si and s~i denote original ECG signal sample point and hidden ECG signal sample point, respectively.

The proposed method provides good quality for each hidden ECG signal. For example, Figures 4A,B show the original ECG signal and hidden ECG signal using DWT lowest-frequency coefficients in 5-level decomposition for dataset ID 1. They look almost indistinguishable. As shown in Figure 4C, the purple curve represents the original ECG signals, and the blue curve represents the hidden ECG signals using DWT and quantization size Q = 4000.

FIGURE 4
www.frontiersin.org

Figure 4. Comparison between original electrocardiogram (ECG) signal and hidden ECG signal for dataset ID 1. (A) Original ECG signal. (B) Hidden ECG signal. (C) Waveform comparison between 0.09 and 1.09 s.

Moreover, as shown in Table 1, the proposed method applies SA to optimize the quality of each hidden ECG signal and then improve the drawback that the quality of each hidden ECG signal is greatly reduced as the quantization size Q is increased. In other words, our method remains high quality, with good RMSE and SNR, for each hidden ECG signal under sufficient hiding capacity no matter how the quantization size Q is increased. In addition, both DFT and DCT also have the same effect on RMSE and SNR.

TABLE 1
www.frontiersin.org

Table 1. Experimental results for the three transforms: discrete wavelet transform (DWT), discrete cosine transform (DCT), and discrete Fourier transform (DFT).

Limitation and Future Research Plan

There are some limitations in the proposed system. The two limitations in our system are that the ECG signals embedded with patients’ confidential data are transmitted to the receiver with an upload speed with a limit of 75 Mbps and a download speed with a limit of 300 Mbps. In future research plan, we will reduce the size of the sensor module and the computer and have a waterproof case without affecting the function.

Conclusion

Based on the proposed optimization model and SA algorithm, we apply multiple-coefficients quantization technology to propose a new method for embedding patients’ confidential data into ECG signals in the transform domain. After testing ECG data sets by using the proposed embedding method, the difference between the embedded ECG signal and the original one is very small and negligible for physiological diagnostics. In addition, the proposed method improves the drawback that the quality of each embedded ECG signal is greatly reduced as the quantization size Q is increased. At the end devices, the embedded patients’ confidential data are extracted after the embedded ECG is received through internet transmission and we perform DWT on the embedded ECG.

Data Availability Statement

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.

Author Contributions

S-TC: conceptualization and methodology. S-TC, F-YL, and T-LC: software. S-TC, C-TY, and S-YT: validation. S-TC, MZ, and H-CL: writing – review and editing. All authors have read and agreed to the published version of the manuscript.

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Ayman, I., and Ibrahim, K. (2013). Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans. Biomed. Eng. 60, 3322–3330. doi: 10.1109/TBME.2013.2264539

PubMed Abstract | CrossRef Full Text | Google Scholar

Bouttier, C., and Gavra, I. (2019). Convergence rate of a simulated annealing algorithm with noisy observations. J. Mach. Learn. Res. 20, 127–171. doi: 10.1016/j.compbiolchem.2009.11.002

PubMed Abstract | CrossRef Full Text | Google Scholar

Burrus, C. S., Gopinath, R. A., and Gao, H. (1998). Introduction to Wavelet Theory and Its Application. Hoboken, NJ: Prentice-Hall.

Google Scholar

Chen, S.-T., Guo, Y.-J., Huang, H.-N., Kung, W.-M., Tseng, K.-K., and Tu, S.-Y. (2014). Hiding patients confidential data in the ECG signal via transform-domain quantization scheme. J. Med. Syst. 38:54. doi: 10.1007/s10916-014-0054-9

PubMed Abstract | CrossRef Full Text | Google Scholar

Dey, N., Biswas, S., Roy, A. B., Das, A., and Chowdhuri, S. S. (2012a). “Analysis of photoplethysmographic signals modified by reversible watermarking technique using prediction-error in wireless telecardiology,” in Proceedings of the First International Conference on Intelligent Infrastructure the 47th Annual National Convention of Computer Society of India CSI (New York, NY: McGraw-Hill) (accessed December 2, 2012).

Google Scholar

Dey, N., Mukhopadhyay, S., Das, A., and Chaudhuri, S. S. (2012b). Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. Int. J. Image Graph. Signal Process. 4, 33–46.

Google Scholar

Engin, M., Çidam, O., and Engin, E. Z. (2005). Wavelet transformation based watermarking technique for human electrocardiogram (ECG). J. Med. Syst. 29, 589–594. doi: 10.1007/s10916-005-6126-0

PubMed Abstract | CrossRef Full Text | Google Scholar

Granville, V., Krivanek, M., and Rasson, J.-P. (1994). Simulated annealing: a proof of convergence. IEEE Trans. Pattern Anal. Mach. Intell. 16, 652–656.

Google Scholar

Guo, Y., and Zhou, D. (2012). Single channel surface electromyography blind recognition model based on watermarking. J. Vib. Control 18, 42–47.

Google Scholar

He, X., Tseng, K. K., Huang, H. H., Chen, S. T., Tu, S. Y., Zeng, F., et al. (2012). “Wavelet-based quantization watermarking for ECG signals,” in Proceedings of the 2012 International Conference on Computing, Measurement, Control and Sensor Network, (CMCSN), Taiyuan, 233–236. doi: 10.1007/s10916-016-0608-0

PubMed Abstract | CrossRef Full Text | Google Scholar

Ibaida, A., Khalil, I., and van Dhiah, A. S. (2010). “Embedding patients confidential data in ECG signal for healthcare information system,” in Proceeding of the 32nd Annual International Conference of the IEEE EMBS, Buenos Aires, 3891–3894. doi: 10.1109/IEMBS.2010.5627671

PubMed Abstract | CrossRef Full Text | Google Scholar

Ibaida, A., Khalil, I., and van Schyndel, R. (2011). “A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system,” in Proceedings of the Computing in Cardiology (CinC), Hangzhou, 393–396.

Google Scholar

Jero, S. E., Palaniappan, R., and Ramakrishnan, S. (2015). ECG steganography using curvelet transform. Biomed. Signal Process. Control 22, 161–169. doi: 10.3390/s20102941

PubMed Abstract | CrossRef Full Text | Google Scholar

Jero, S. E., and Ramu, P. (2016). Curvelets-based ECG steganography for data security. Electron. Lett. 52, 283–285. doi: 10.1049/el.2015.3218

CrossRef Full Text | Google Scholar

Kaur, S., Farooq, O., Singhal, R., and Ahuja, B. S. (2010). “Digital watermarking of ECG data for secure wireless communication,” in Proceedings of the 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC2010), Kochi, 140–144. doi: 10.1109/ITC.2010.96

CrossRef Full Text | Google Scholar

Kong, X., and Feng, R. (2001). Watermarking medical signals for telemedicine. IEEE Trans. Inf. Technol. Biomed. 5, 195–201. doi: 10.1109/4233.945290

PubMed Abstract | CrossRef Full Text | Google Scholar

Mallat, S. (1989). A theory for multiresolution signal decomposition: the wavelet representation. IEEE. Trans. Pattern Anal. Mach. Intell. 11, 674–693. doi: 10.1109/34.192463

CrossRef Full Text | Google Scholar

Mallat, S. (1999). A Wavelet Tour of Signal Processing, 2nd Edn. Cambridge, MA: Academic Press. doi: 10.1016/B978-012466606-1/50008-8

CrossRef Full Text | Google Scholar

Oppenheim Alan, V., Schafer, R. W., and Buck, J. R. (1999). Discrete-time Signal Processing. Upper Saddle River, N.J: Prentice Hall.

Google Scholar

Oran Brigham, E. (1988). The Fast Fourier Transform and its Applications. Hoboken, NJ: Prentice Hall.

Google Scholar

Rao, K. R., and Yip, P. (1990). Discrete Cosine Transform: Algorithms, Advantages, Applications. Boston: Academic Press. doi: 10.1016/B978-0-08-092534-9.50007-2

CrossRef Full Text | Google Scholar

Sanivarapu, P. V., Kandala, N. V. P. S., Rajesh, N. V., Rajasekhar Reddy, N., and Sekhar Reddy, C. (2020). Patient data hiding into ECG signal using watermarking in transform domain. Phys. Eng. Sci. Med. 43, 213–226. doi: 10.1007/s13246-019-00838-2

CrossRef Full Text | Google Scholar

Swierkosz, A., and Augustyniak, P. (2018). Optimizing wavelet ECG watermarking to maintain measurement performance according to industrial standard. Sensors 18:3401. doi: 10.3390/s18103401

PubMed Abstract | CrossRef Full Text | Google Scholar

Tseng, K.-K., He, X., Kung, W.-M., Chen, S.-T., Liao, M., and Huang, H.-N. (2014). Wavelet-based watermarking and compression for ECG signals with verification evaluation. Sensors 14, 3721–3736. doi: 10.3390/s140203721

PubMed Abstract | CrossRef Full Text | Google Scholar

Zheng, K. M., and Qian, X. (2008). “Reversible data hiding for electrocardiogram signal based on wavelet transforms,” in Proceedings of the 2008 International Conference on Computational Intelligence and Security (CIS2008), Suzhou, 295–299. doi: 10.1007/s10916-016-0608-0

PubMed Abstract | CrossRef Full Text | Google Scholar

Zheng, K. M., Tang, L. W., and Qian, X. (2009). Watermarking technology for electrocardiogram signal certification. Comput. Eng. Appl. 45, 231–233.

Google Scholar

Keywords: multiple-coefficient, transform domain, non-linear model, simulated annealing, dementia

Citation: Zhao M, Chen S-T, Chen T-L, Tu S-Y, Yeh C-T, Lin F-Y and Lu H-C (2022) Intelligent Healthcare System Using Patients Confidential Data Communication in Electrocardiogram Signals. Front. Aging Neurosci. 14:870844. doi: 10.3389/fnagi.2022.870844

Received: 07 February 2022; Accepted: 28 February 2022;
Published: 20 April 2022.

Edited by:

Jiehui Jiang, Shanghai University, China

Reviewed by:

Yao-Chin Wang, Taipei Medical University, Taiwan
Wenying Du, Capital Medical University, China

Copyright © 2022 Zhao, Chen, Chen, Tu, Yeh, Lin and Lu. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Hao-Chun Lu, aGFvY2x1QGdtYWlsLmNvbQ==

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.