A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking

With cardiovascular disease as the number one killer of modern era, Electrocardiogram (ECG) is collected, stored and transmitted in greater frequency than ever before. However, in reality, ECG is rarely transmitted and stored in a secured manner. Recent research shows that eavesdropper can reveal th...

Full description

Saved in:
Bibliographic Details
Published inJournal of medical systems Vol. 33; no. 2; pp. 121 - 132
Main Authors Sufi, Fahim, Khalil, Ibrahim
Format Journal Article
LanguageEnglish
Published Boston Springer US 01.04.2009
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN0148-5598
1573-689X
DOI10.1007/s10916-008-9172-6

Cover

More Information
Summary:With cardiovascular disease as the number one killer of modern era, Electrocardiogram (ECG) is collected, stored and transmitted in greater frequency than ever before. However, in reality, ECG is rarely transmitted and stored in a secured manner. Recent research shows that eavesdropper can reveal the identity and cardiovascular condition from an intercepted ECG. Therefore, ECG data must be anonymized before transmission over the network and also stored as such in medical repositories. To achieve this, first of all, this paper presents a new ECG feature detection mechanism, which was compared against existing cross correlation (CC) based template matching algorithms. Two types of CC methods were used for comparison. Compared to the CC based approaches, which had 40% and 53% misclassification rates, the proposed detection algorithm did not perform any single misclassification. Secondly, a new ECG obfuscation method was designed and implemented on 15 subjects using added noises corresponding to each of the ECG features. This obfuscated ECG can be freely distributed over the internet without the necessity of encryption, since the original features needed to identify personal information of the patient remain concealed. Only authorized personnel possessing a secret key will be able to reconstruct the original ECG from the obfuscated ECG. Distribution of the key is extremely efficient and fast due to small size (only 0.04–0.09% of the original ECG file). Moreover, if the obfuscated ECG reaches to the wrong hand (hacker), it would appear as regular ECG without encryption. Therefore, traditional decryption techniques including powerful brute force attack are useless against this obfuscation.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
content type line 23
ObjectType-Undefined-3
ISSN:0148-5598
1573-689X
DOI:10.1007/s10916-008-9172-6