A new ECG obfuscation method: A joint feature extraction and corruption approach

Sufi, F, Mahmoud, S and Khalil, I 2008, 'A new ECG obfuscation method: A joint feature extraction and corruption approach', in YT Zhang (ed.) International Conference on Information Technology and Applications in Biomedicine, ITAB 2008, Shenzhen, China, 30-31 May, 2008.


Document type: Conference Paper
Collection: Conference Papers

Title A new ECG obfuscation method: A joint feature extraction and corruption approach
Author(s) Sufi, F
Mahmoud, S
Khalil, I
Year 2008
Conference name 5th International Conference on Information Technology and Applications in Biomedicine
Conference location Shenzhen, China
Conference dates 30-31 May, 2008
Proceedings title International Conference on Information Technology and Applications in Biomedicine, ITAB 2008
Editor(s) YT Zhang
Publisher IEEE
Place of publication United States
Abstract With cardiovascular disease as the number one killer of modern era, ECG is collected, stored and transmitted in greater frequency than ever before. However, lack of existing research in secured ECG distribution forces patient privacy under serious threat. Moreover, without adopting secured ECG transmission and storage, HIFAA recommendations for patient privacy are being compromised. This paper presents a new ECG obfuscation method, which uses cross correlation based template matching approach to detect all ECG features followed by corruption of those features with added noises. Without the knowledge of the templates used for feature matching and the noise, the obfuscated features can not be reconstructed. Therefore, three templates and three noises for P wave, QRS Complex and T wave comprise the key, which is only 0.4%-0.9% of the original ECG file size. Only authored doctors possessing this key can reconstruct the original signal. Key distribution is extremely efficient and fast due to small size. Moreover, if the obfuscated ECG reaches to the wrong hand (hacker), it would appear as regular ECG without encryption. Therefore, traditional decryption techniques including powerful brute force attack are useless against this obfuscation. Finally, with unimaginably high number of noise combinations the security strength of the presented method is very high.
Subjects Medical Biotechnology Diagnostics (incl. Biosensors)
Keyword(s) body sensor networks
mobile healthcare
security
DOI - identifier 10.1109/ITAB.2008.4570644
Copyright notice ©2008 IEEE.
Versions
Version Filter Type
Altmetric details:
Access Statistics: 231 Abstract Views  -  Detailed Statistics
Created: Fri, 21 Oct 2011, 07:47:00 EST by Catalyst Administrator
© 2014 RMIT Research Repository • Powered by Fez SoftwareContact us