A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking

With cardiovascular disease as the number one killer of modern era, Electrocardiogram (ECG) is collected, stored and transmitted in greater frequency than ever before. However, in reality, ECG is rarely transmitted and stored in a secured manner. Recent research shows that eavesdropper can reveal the identity and cardiovascular condition from an intercepted ECG. Therefore, ECG data must be anonymized before transmission over the network and also stored as such in medical repositories. To achieve this, first of all, this paper presents a new ECG feature detection mechanism, which was compared against existing cross correlation (CC) based template matching algorithms. Two types of CC methods were used for comparison. Compared to the CC based approaches, which had 40% and 53% misclassification rates, the proposed detection algorithm did not perform any single misclassification. Secondly, a new ECG obfuscation method was designed and implemented on 15 subjects using added noises corresponding to each of the ECG features. This obfuscated ECG can be freely distributed over the internet without the necessity of encryption, since the original features needed to identify personal information of the patient remain concealed. Only authorized personnel possessing a secret key will be able to reconstruct the original ECG from the obfuscated ECG. Distribution of the key is extremely efficient and fast due to small size (only 0.04–0.09% of the original ECG file). Moreover, if the obfuscated ECG reaches to the wrong hand (hacker), it would appear as regular ECG without encryption. Therefore, traditional decryption techniques including powerful brute force attack are useless against this obfuscation.

[1]  Abdulhamit Subasi,et al.  A Decision Support System for Telemedicine Through the Mobile Telecommunications Platform , 2008, Journal of Medical Systems.

[2]  Chih-Lung Lin,et al.  An Integration Design of Compression and Encryption for Biomedical Signals , 2002 .

[3]  Adrian D. C. Chan,et al.  Wavelet Distance Measure for Person Identification Using Electrocardiograms , 2008, IEEE Transactions on Instrumentation and Measurement.

[4]  L. Biel,et al.  ECG analysis: a new approach in human identification , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).

[5]  S Akselrod,et al.  Cross-correlation technique for arrhythmia detection using PR and PP intervals. , 1985, Computers and biomedical research, an international journal.

[6]  Fahim Sufi,et al.  A Mobile Phone Based Intelligent Telemonitoring Platform , 2006, 2006 3rd IEEE/EMBS International Summer School on Medical Devices and Biosensors.

[7]  Chien-Ding Lee,et al.  A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations , 2008, IEEE Transactions on Information Technology in Biomedicine.

[8]  S Abboud,et al.  The use of cross-correlation function for the alignment of ECG waveforms and rejection of extrasystoles. , 1984, Computers and biomedical research, an international journal.

[9]  Emmanuel Ifeachor,et al.  Digital Signal Processing: A Practical Approach , 1993 .

[10]  Arnon D. Cohen,et al.  The weighted diagnostic distortion (WDD) measure for ECG signal compression , 2000, IEEE Transactions on Biomedical Engineering.

[11]  Patrick E. McSharry,et al.  A dynamical model for generating synthetic electrocardiogram signals , 2003, IEEE Transactions on Biomedical Engineering.

[12]  Thorsten Last,et al.  Multi-component based cross correlation beat detection in electrocardiogram analysis , 2004, Biomedical engineering online.

[13]  F. Sufi,et al.  A wavelet based secured ECG distribution technique for patient centric cpproach , 2008, 2008 5th International Summer School and Symposium on Medical Devices and Biosensors.

[14]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[15]  Young B. Choi,et al.  Challenges Associated with Privacy in Health Care Industry: Implementation of HIPAA and the Security Rules , 2006, Journal of Medical Systems.

[16]  Stamatios V. Kartalopoulos,et al.  A primer on cryptography in communications , 2006, IEEE Communications Magazine.

[17]  I. Cosic,et al.  ECG R-R Peak Detection on Mobile Phones , 2007, 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[18]  F. Sufi,et al.  A new ECG obfuscation method: A joint feature extraction & corruption approach , 2008, 2008 International Conference on Information Technology and Applications in Biomedicine.

[19]  Springhouse,et al.  ECG Interpretation Made Incredibly Easy , 1997 .

[20]  Richard C. Burgess,et al.  An arrhythmia detector and heart rate estimator for overnight polysomnography studies , 2001, IEEE Transactions on Biomedical Engineering.

[21]  Chin-Feng Lin,et al.  A Chaos Base Visual Encryption Mechanism in ECG Medical Signal , 2007 .