Sie sind auf Seite 1von 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/324079173

A Hybrid Watermarking Technique for Copyright Protection of Medical Signals


in Teleradiology

Chapter · April 2018


DOI: 10.4018/978-1-5225-5152-2.ch017

CITATIONS READS
3 80

3 authors:

Dr. Rohit M. Thanki Surekha Borra

115 PUBLICATIONS   118 CITATIONS   


K.S.Institute of Technology
57 PUBLICATIONS   215 CITATIONS   
SEE PROFILE
SEE PROFILE

Komal Rajendrakumar Borisagar


Atmiya Institute Of Technology & Science
63 PUBLICATIONS   115 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Multiple Biometric Data Protection Using CS Theory and Watermarking View project

Hybrid Watermarking Technique for Security of Medical Images in Telemedicine Applications View project

All content following this page was uploaded by Dr. Rohit M. Thanki on 29 March 2018.

The user has requested enhancement of the downloaded file.


Detailed Table of Contents

Preface................................................................................................................................................. xvii

Acknowledgment...............................................................................................................................xxiii

Section 1
Security Requirements for Biomedical Signals

Chapter 1
PCG-Based Biometrics............................................................................................................................ 1
Takhellambam Gautam Meitei, NERIST, India
Sinam Ajitkumar Singh, NERIST, India
Swanirbhar Majumder, Tripura University, India

These days the wide usage of data has opened security vulnerabilities everywhere. This has led to research
in the biometrics area for improving security. Presently with wide development of technology different
forms of biometrics are being used in various applications. Thus, fingerprint and face are no longer the
only ones being used in this field. The authors have concentrated on PCG as a biometric in this chapter.
A very few sources are available in this area deeming it to be nascent. Recent proposals were examined,
and it was observed that PCG reduces the risks of vulnerability faced by other biometric system. A
simple biometric system would consist of steps like preprocessing, segmentation, feature extraction, and
comparison or matching phase. In this chapter, some pre-processing steps as implemented by various
authors using wavelets and other feature extraction techniques, implemented for the PCG biometric
system by various researchers, are reviewed. Later, in the matching phase, Euclidean distance, GMM,
FSR, VQ method are examined.

Chapter 2
Biosignal Denoising Techniques............................................................................................................ 26
Suchetha M., VIT University, India
Jagannath M., VIT University, India

The main aim of ECG signal enhancement is to separate the required signal components from the unwanted
artifacts. Adaptive filter-based ECG enhancement helps in detecting time varying potentials and also
helps to track the dynamic variations of the signals. LMS-based adaptive recurrent filter is used to obtain
the impulse response of normal QRS complexes. It is also used for arrhythmia detection in ambulatory
ECG recordings. Adaptive filters self-modify its frequency response to change the behavior in time. This
property of adaptive filter allows it to adapt its response to change in the input signal characteristics.




A major problem in adaptive filtering is the computational complexity of adaptive algorithm when the
unknown system has a long impulse response and therefore requires a large number of taps. The wavelet
transform is a time-scale representation method with a basis function called mother wavelet. In wavelet
transform, the input signal is subsequently decomposed into subbands. Wavelet transform thresholding
in the subband gives better performance of denoising.

Chapter 3
Secure Access to Biomedical Images.................................................................................................... 38
Tariq Javid, Hamdard University, Pakistan

This chapter introduces a framework for secure access to biomedical images. Biomedical images are
acquired using a vast array of imaging techniques depending upon the specific application. A magnetic
resonance spatial domain image is acquired by taking inverse weighted Fourier transform of raw frequency
domain data generated by the modality. After correction, these images are stored in a standard format. The
access to these stored images is typically subjected to authorization. Medical information in biomedical
images needs to be protected in both stored form and in transmission. Encryption technologies are used
to secure information whereas compression technologies are used to reduce the information without
affecting the contents. In this chapter, a cryptocompression system is proposed which integrates both
encryption and compression to fulfill the requirements of electronic protected health information records.

Chapter 4
Early Detection of Breast Cancer Using Image Processing Techniques................................................ 54
Amutha S., Dayananda Sagar College of Engineering, India
Ramesh Babu D. R., Dayananda Sagar College of Engineering, India

Breast cancer is the second leading cause of death among women according to Cancer Facts and Figures.
In order to increase the survival rate of women due to breast cancer, early and accurate detection of
breast cancer is very essential. The quality of the image acquired through different breast imaging
modalities: mammography, ultrasonography, and magnetic resonance imaging (MRI) have drawbacks
which reduces the efficiency of accurate detection. As per the literature survey, the quality of the image
acquired through the breast imaging modalities is not optimal for the accurate detection of cancer at the
early stage. Digital image enhancement methods have been widely used in radiology in order to enhance
the image quality. Considerable research has been undertaken in the development of enhancement of the
image to assist radiologists in the identification of breast abnormalities. In order to further improve the
efficiency of detection, diagnosis, and treatment of cancer, the quality of the image has to be improved.

Chapter 5
Filtration and Classification of ECG Signals......................................................................................... 72
Satya Ranjan Dash, KIIT University, India
Asim Syed Sheeraz, KIIT University, India
Annapurna Samantaray, Indraprastha Institute of Information Technology Delhi (IIIT-D),
India

Electrocardiogram (ECG) is a kind of process of recording the electrical activity/signals of the heart with
respect to the time. ECG conveys a wide amount of information related to the structure and functions
of the heart, its electrical conduction processes. ECG is a diagnostic tool that the doctors and medical
professionals use to measure patients’ heart activity by paying attention to the electric current flowing


in the heart. Due to the presence of noises, it needs to carry out the filtration process. Filtration is the
process of keeping the components of the signals of desired frequencies by setting up an “fc” value and
removing the components apart from the said “fc” frequency. It is required to eliminate the noise level
from the ECG signal, such that the resultant ECG signal must be free from noises. All these techniques
and algorithms have their advantages and limitations which are discussed in this chapter.

Chapter 6
Wavelet and Curvelet Transforms for Biomedical Image Processing.................................................... 95
Manas Saha, Siliguri Institute of Technology, India
Mrinal Kanti Naskar, Jadavpur University, India
B. N. Chatterji, B. P. Poddar Institute of Management and Technology, India

This chapter introduces two mathematical transforms—wavelet and curvelet—in the field of biomedical
imaging. Presenting the theoretical background with relevant properties, the applications of the two
transforms are presented. The biomedical applications include heart sound analysis, electrocardiography
(ECG) characterization, positron emission tomography (PET) image analysis, medical image compression,
mammogram enhancement, magnetic resonance imaging (MRI) and computer tomography (CT) image
denoising, diabetic retinopathy detection. The applications emphasize the development of algorithms
to diagnose human diseases, thereby rendering fast and reliable support to the medical personnel. The
transforms—one classical (wavelet) and another contemporary (curvelet)—are selected to focus the
difference in architecture, limitation, evolution, and application of individual transform. Two joint
applications are addressed to compare their performance. This survey is also supplemented by a case
study: mammogram denoising using wavelet and curvelet transforms with the underlying algorithms.

Chapter 7
Pulse Oximetry: An Introduction......................................................................................................... 130
Ashoka Reddy Komalla, Kakatiya Institute of Technology and Science, India

Pulse rate, body temperature, blood pressure, and respiratory rate are four vital signs indicating health
status of a patient. Oxygen saturation of arterial blood (SaO2) is regarded as fifth vital sign of health status.
Pulse oximeters are used in post-operative intensive care units for monitoring pulse rate and SaO2. They
make non-invasive simultaneous estimation of pulse rate and SaO2 using photoplethysmogram (PPG)
signals captured at red and IR wavelengths. This chapter describes the concept of oximetry, importance
of non-invasive medical measurements, principle of pulse oximetry, and the block diagram approach
for the design of pulse oximeters. It also presents an exhaustive review on various methods in-vogue
for SaO2 estimation, identifies the problems associated with pulse oximeters. The critical limitation is
that commercial pulse oximeters are as accurate as their calibration curves. Finally, it presents state-of-
the-art research aimed at performance enhancement of pulse oximeters and directions for future work.

Section 2
Security Over Wireless Sensor Networks and Distributed Systems

Chapter 8
Attacks and Countermeasures.............................................................................................................. 155
Mukta Sharma, Teerthanker Mahaveer University, India

Information technology has benefitted the society enormously in all spheres of life. Medical sciences
have not been left untouched, rather it is using information technology extensively for storing, retrieving,


transmitting, and manipulating data. There are various simulators and software designed using virtual
reality explicitly to train the medical students like computer-assisted learning (CAL). Biomedical science
is a discipline that connects information science, computer science, and healthcare. Biomedical science
is critically analyzing, understanding, and knowing the human body. Real-time monitoring can help
studying and analyzing the chronic diseases and managing it before the adverse events. Information
technology has been proven as a boon in all areas, but it has certain limitations, making it vulnerable to
attacks. Information security is a matter of great concern, especially when the data is traveling through the
internet, which is an insecure channel. This chapter focuses on varied attacks and their countermeasures.

Chapter 9
Security Risks of Biomedical Data Processing in Cloud Computing Environment............................ 177
Babangida Zubairu, Jaipur National University, India

The emergence of new innovations in technology changes the rate of data generated in health-related
institutions and the way data should be handled. As such, the amount of data generated is always on the
increase, which demands the need of advanced, automated management systems and storage platforms
for handling large biomedical data. Cloud computing has emerged as the promising technology for
present and future that can handle large amount of data and enhance processing and management of the
data remotely. One of the disturbance concerns of the technology is the security of the data. Data in the
cloud is subject to security threats, and this has highlighted the need for exploring security measures
against the threats. The chapter provides detailed analysis of cloud computing deployment strategies
and risks associated with the technology and tips for biomedical data storage and processing through
cloud computing services.

Chapter 10
Intrusion Detection System in Wireless Sensor Networks for Wormhole Attack Using Trust-Based
System.................................................................................................................................................. 198
Umashankar Ghugar, Berhampur University, India
Jayaram Pradhan, Berhampur University, India

Intrusion detection in wireless sensor network (WSN) has been a critical issue for the stable functioning
of the networks during last decade. Wireless sensors are small and cheap devices that have a capacity
to sense actions, data movement, and communicate with each other. It is a self-governing network that
consists of sensor nodes deployed in a particular environment, which has wide applications in various
areas such as data gathering, military surveillance, transportation, medical system, agriculture, smart
building, satellite communication, and healthcare. Wormhole attack is one of the serious attacks, which
is smoothly resolved in networks but difficult to observe. There are various techniques used to detect
the malicious node such as LITEWORP, SAM, DelPHI, GRPW, and WRHT. This chapter focuses on
detection methods for wormhole attacks using trust-based systems in WSN.

Chapter 11
UWDBCSN Analysis During Node Replication Attack in WSN........................................................ 210
Harpreet Kaur, Thapar University, India
Sharad Saxena, Thapar University, India

Wireless sensor network is an emerging area in which multiple sensor nodes are present to perform many
real-time applications like military application, industrialized automation, health monitoring, weather


forecast, etc. Sensor nodes can be organized into a group which is led by a cluster head; this concept is
known as clustering. Clustering of wireless sensor network is used when sensor nodes want to communicate
simultaneously in a single network. The author organizes the sensor nodes by applying UWDBCSN
(underwater density-based clustering sensor network) clustering approach in which routing of the packets
is controlled by cluster head. The author also considers the security of sensor nodes which are harmful
to different types of mischievous attacks like wormhole attack, denial of service attack, replication or
cloning attack, blackhole attack, etc. Node replication is one of the types in which an attacker tries to
capture the node and generate the replica or clone of that node in the same network. So, this chapter
describes how to deal with these types of attacks. The author used the intrusion detection process to deal
with this type of attack. All the detection procedure is combined with sleep/wake scheduling algorithm
to increase the performance of sensor nodes in the network.

Chapter 12
Wireless Enhanced Security Based on Speech Recognition................................................................ 228
S. Selva Nidhyananthan, Mepco Schlenk Engineering College, India
Joe Virgin A., Mepco Schlenk Engineering College, India
Shantha Selva Kumari R., Mepco Schlenk Engineering College, India

Security is the most notable fact of all computerized control gadgets. In this chapter, a voice ID
computerized gadget is utilized for the security motivation using speech recognition. Mostly, the voices
are trained by extracting mel frequency cepstral coefficient feature (MFCC), but it is very sensitive to
noise interference and degrades the performance; hence, dynamic MFCC is used for speech and speaker
recognition. The registered voices are stored in a database. When the device senses any voice, it cross
checks with the registered voice. If any mismatches occur, it gives an alert to the authorized person through
global system for mobile communication (GSM) to intimate the unauthorized access. GSM works at a
rate of 168 Kb/s up to 40 km and it operates at different operating frequencies like 800MHz, 900MHz,
etc. This proposed work is more advantageous for the security systems to trap the unauthorized persons
through an efficient communication.

Section 3
Security Through Machine Learning Techniques and Watermarking Techniques

Chapter 13
Algorithms for Detection and Classification of Abnormality in Mammograms: An Overview.......... 255
Anuradha Chetan Phadke, Maharashtra Institute of Technology, India
Priti P. Rege, College of Engineering Pune, India

Mammography is a popular imaging modality currently in use for routine screening of breast. Radiologists
look for some of the significant signs of breast cancer while examining the mammogram visually. These
signs are bounded masses, clusters of micro-calcifications, spiculations, and architectural distortions.
Developing computer-aided algorithms for the detection and classification of abnormalities in mammograms
is an extremely challenging task because of significant variableness in the type, size, shape, texture
variation of abnormal region, and variability in the structure of surrounding tissues of the breast. The
main objective of this chapter is to introduce dominant features of various signs of abnormalities and to
discuss techniques to detect various abnormalities in mammograms. This knowledge will help to develop
a system that is useful for the early detection and classification of breast cancer.


Chapter 14
A Novel Approach for Computer-Aided Diagnosis for Distinction Between Benign and Malignant
of Lung Nodules Based on Machine Learning Techniques................................................................. 281
Shashidhara Bola, Dayananda Sagar College of Engineering, India

A new method is proposed to classify the lung nodules as benign and malignant. The method is based
on analysis of lung nodule shape, contour, and texture for better classification. The data set consists of
39 lung nodules of 39 patients which contain 19 benign and 20 malignant nodules. Lung regions are
segmented based on morphological operators and lung nodules are detected based on shape and area
features. The proposed algorithm was tested on LIDC (lung image database consortium) datasets and
the results were found to be satisfactory. The performance of the method for distinction between benign
and malignant was evaluated by the use of receiver operating characteristic (ROC) analysis. The method
achieved area under the ROC curve was 0.903 which reduces the false positive rate.

Chapter 15
Automatic Detection of Tumor and Bleed in Magnetic Resonance Brain Images.............................. 291
Jayanthi V. E., PSNA College of Engineering and Technology, India
Jagannath Mohan, VIT University, India
Adalarasu K., Sastra University, India

Brain tumor and intracerebral hemorrhage are major causes for death among the people. Brain tumor is
the growth of abnormal cells multiplied in an uncontrolled manner in brain. Magnetic resonance imaging
(MRI) technique plays a major role for analysis, diagnosis, and treatment planning of abnormalities in the
brain. Bleed is detected manually by radiologists, but it is laborious, time-consuming, and error prone.
The automatic detection method was performed to detect the tumor as well as bleed in brain under a
single system. The proposed method includes image acquisition, pre-processing, patch extraction, feature
extraction, convolutional neural network (CNN) classification, and fuzzy inference system (FIS) to detect
the abnormality with reduced classification loss percentage. This chapter is compared with the existing
system of tumor detection using convolution neural network based on certain features such as skewness,
kurtosis, homogeneity, smoothness, and correlation.

Chapter 16
Mutual Correlation-Based Anonymization for Privacy Preserving Medical Data Publishing............ 304
Ashoka Kukkuvada, Bapuji Institute of Engineering and Technology, India
Poornima Basavaraju, Bapuji Institute of Engineering and Technology, India

Currently the industry is focused on managing, retrieving, and securing massive amounts of data.
Hence, privacy preservation is a significant concern for those organizations that publish/share personal
data for vernacular analysis. In this chapter, the authors presented an innovative approach that makes
use of information gain of the quasi attributes with respect to sensitive attributes for anonymizing the
data, which gives the fruitfulness of an attribute in classifying the data elements, which is a two-way
correlation among attributes. The authors show that the proposed approach preserves better data utility
and has lesser complexity than former methods.


Chapter 17
A Hybrid Watermarking Technique for Copyright Protection of Medical Signals in
Teleradiology....................................................................................................................................... 320
Rohit M. Thanki, C. U. Shah University, India
Surekha Borra, K. S. Institute of Technology, India
Komal Borisagar, Atmiya Institute of Technology and Science, India

Today, an individual’s health is being monitored for diagnosis and treatment of diseases upon analyzing
various medical data such as images and signals. Modifications of this medical data when it is transferred
over an open communication channel or network leads to deviations in diagnosis and creates a serious
health issue for any individual. Digital watermarking techniques are one of the solutions for providing
protection to multimedia contents. This chapter gives requirements and various techniques for the security
of medical data using watermarking. This chapter also demonstrates a novel hybrid watermarking technique
based on fast discrete curvelet transform (FDCuT), redundant discrete wavelet transform (RDWT), and
discrete cosine transform (DCT). This watermarking technique can be used for securing medical various
types of medical images and ECG signals over an open communication channel.

Chapter 18
Medical Signal Security Enhancement Using Chaotic Map and Watermarking Technique............... 350
Ajita Sahay, KIIT University, India
Chittaranjan Pradhan, KIIT University, India
Amandip Sinha, West Bengal University of Technology, India

This chapter explores medical signal security enhancement using chaotic map and watermarking techniques.
This new approach provides security to both the medical image and also maintains the confidentially
of both the patient and doctor. Medical image encryption is done by using 2D Gaussian iterated map
and BARCODE ECC200. Personal data is encoded in barcode. The encrypted image and barcode are
embedded using DCT and DWT, which provides high PSNR values and higher NC value, which help
to provide more security.

Compilation of References................................................................................................................ 371

About the Contributors..................................................................................................................... 405

Index.................................................................................................................................................... 412

View publication stats

Das könnte Ihnen auch gefallen