Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search

Authentication is very important in validating a medical content in the domain of telemedicine; however, there are many challenges. Accurate verification is paramount, and any misuse of personal information may have serious consequences. Many authentication processes tried to design various methods to minimise such discrepancies. In this current work, we propose a new approach to design a robust biomedical content authentication system by embedding logo of the hospital within the electrocardiogram signal by means of both discrete wavelet transformation and cuckoo search CS. An adaptive meta-heuristic cuckoo search is used to find the optimal scaling factor settings for logo embedding. Results show that the proposed method can serve as a secure and accurate authentication system.

[1]  Nilanjan Dey,et al.  Analysis of P-QRS-T Components Modified by Blind Watermarking Technique Within the Electrocardiogram Signal for Authentication in Wireless Telecardiology Using DWT , 2012 .

[2]  Nilanjan Dey,et al.  Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method , 2012, SIN '12.

[3]  Xin-She Yang,et al.  Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).

[4]  Omar Farooq,et al.  Watermarking biomedical signal for authentication using integer wavelet transform , 2011, 2011 4th International Conference on Biomedical Engineering and Informatics (BMEI).

[5]  S. Sumathi,et al.  IMPLEMENTATION OF GENETIC ALGORITHM FOR A DWT BASED IMAGE WATERMARKING SCHEME , 2011 .

[6]  Mou Ling Dennis Wong,et al.  Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt , 2009, e-Forensics.

[7]  P. Barthelemy,et al.  A Lévy flight for light , 2008, Nature.

[8]  M. Srinivasan Search for Research , 2014, Journal of conservative dentistry : JCD.

[9]  G. Zaslavsky,et al.  Lévy Flights and Related Topics in Physics , 2013 .

[10]  Sheli Sinha Chaudhuri,et al.  Lifting Wavelet Transformation based blind watermarking technique of Photoplethysmographic signals in wireless telecardiology , 2012, 2012 World Congress on Information and Communication Technologies.

[11]  John J. Grefenstette,et al.  Optimization of Control Parameters for Genetic Algorithms , 1986, IEEE Transactions on Systems, Man, and Cybernetics.

[12]  Ilya Pavlyukevich Lévy flights, non-local search and simulated annealing , 2007, J. Comput. Phys..

[13]  S. Vongpradhip,et al.  Intelligent Audio Watermarking using Genetic Algorithm in DWT Domain , 2007 .

[14]  Arnon D. Cohen,et al.  Biomedical Signal Processing , 1986 .

[15]  Xin-She Yang,et al.  Chaos-enhanced accelerated particle swarm optimization , 2013, Commun. Nonlinear Sci. Numer. Simul..

[16]  Nilanjan Dey,et al.  A Novel Session Based Dual Steganographic Technique Using DWT and Spread Spectrum , 2012, ArXiv.

[17]  Xin-She Yang,et al.  Computational Optimization and Applications in Engineering and Industry , 2013, Computational Optimization and Applications in Engineering and Industry.

[18]  Rangaraj M. Rangayyan,et al.  Biomedical Signal Analysis: A Case-Study Approach , 2001 .

[19]  Nilanjan Dey,et al.  Embedding of Blink Frequency in Electrooculography Signal using Difference Expansion based Reversible Watermarking Technique , 2013, ArXiv.

[20]  Nilanjan Dey,et al.  A Session based Multiple Image Hiding Technique using DWT and DCT , 2012, ArXiv.

[21]  Jeng-Shyang Pan,et al.  Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..

[22]  Xin-She Yang,et al.  Two-stage eagle strategy with differential evolution , 2012, Int. J. Bio Inspired Comput..

[23]  Habibollah Danyali,et al.  Medical image authentication based on fragile watermarking using hamming code , 2010, 2010 17th Iranian Conference of Biomedical Engineering (ICBME).

[24]  Xin-She Yang,et al.  Nature-Inspired Metaheuristic Algorithms , 2008 .

[25]  Mandar Mitra,et al.  An automated data extraction system from 12 lead ECG images , 2003, Comput. Methods Programs Biomed..

[26]  Jun Shen,et al.  Authentication of biomedical images based on zero location watermarking , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..

[27]  Jufeng Dai,et al.  Image Watermarking based on Genetic Algorithm , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[28]  Clifford T. Brown,et al.  Lévy Flights in Dobe Ju/’hoansi Foraging Patterns , 2007 .

[29]  Zhihua Cui,et al.  Swarm Intelligence and Bio-Inspired Computation: Theory and Applications , 2013 .

[30]  Nilanjan Dey,et al.  Multilevel Threshold Based Gray Scale Image Segmentation using Cuckoo Search , 2013, ArXiv.

[31]  Chang-Tsun Li,et al.  Authenticating Medical Images through Repetitive Index Modulation Based Watermarking , 2009, e-Forensics.

[32]  Nilanjan Dey,et al.  Analysis of Photoplethysmographic Signals Modified by Reversible Watermarking Technique using Prediction-Error in Wireless Telecardiology , 2013 .

[33]  Nilanjan Dey,et al.  Wavelet Based QRS Complex Detection of ECG Signal , 2012, ArXiv.

[34]  Vikash Kumar,et al.  Vikash Kumar , 2019, Authors group.

[35]  A. Reynolds,et al.  Free-Flight Odor Tracking in Drosophila Is Consistent with an Optimal Intermittent Scale-Free Search , 2007, PloS one.

[36]  I. Pavlyukevich Cooling down Lévy flights , 2007, cond-mat/0701651.

[37]  Xin-She Yang,et al.  Multiobjective cuckoo search for design optimization , 2013, Comput. Oper. Res..