2018
DOI: 10.1109/jbhi.2017.2698498
|View full text |Cite
|
Sign up to set email alerts
|

ECG Data Encryption Then Compression Using Singular Value Decomposition

Abstract: Electrocardiogram (ECG) monitoring systems are widely used in healthcare. ECG data must be compressed for transmission and storage. Furthermore, there is a need to be able to directly process biomedical signals in encrypted domains to ensure the protection of patients' privacy. Existing encryption-then-compression (ETC) approaches for multimedia using the state-of-the-art encryption techniques inevitably sacrifice the compression efficiency or signal quality. This paper presents the first ETC approach for proc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
28
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 65 publications
(32 citation statements)
references
References 34 publications
1
28
0
Order By: Relevance
“…The principle is evaluating the coefficients of the original signal associated with a pre-designed basis so that the signal can be represented by few parameters. For example, the wavelet transform [10,13,14,15], the discrete cosine transform (DCT) [16,17], the Hermite transform [18,19], the nonlinear transform [20], the compressed sensing [21,22,23], and the singular value decomposition (SVD) [24,25]. While the wavelet transform is popular, however, the compression performance is largely dependent on the chosen mother wavelet, number of decomposition levels and different optimization schemes [26].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The principle is evaluating the coefficients of the original signal associated with a pre-designed basis so that the signal can be represented by few parameters. For example, the wavelet transform [10,13,14,15], the discrete cosine transform (DCT) [16,17], the Hermite transform [18,19], the nonlinear transform [20], the compressed sensing [21,22,23], and the singular value decomposition (SVD) [24,25]. While the wavelet transform is popular, however, the compression performance is largely dependent on the chosen mother wavelet, number of decomposition levels and different optimization schemes [26].…”
Section: Related Workmentioning
confidence: 99%
“…Other practical issues. A separate but relevant topic that we do not discuss in this paper is the data encryption issue, which is needed to protect the patient privacy issue when any bio-signal is transmitted over public networks, according to the Health Insurance Portability and Accountability Act (HIPAA) [25,46]. A study taking into account the encryption to the proposed compression algorithm will be reported in the future work.…”
Section: 3mentioning
confidence: 99%
“…In this paper, we focus on EtC systems although the traditional way of securely transmitting images is to use a compression-then-encryption (CtE) system. Most studies on EtC systems assumed the use of a proprietary compression scheme incompatible with international compression standards such as JPEG [3], [13]- [17], so they can not be applied to social media. For example, an arithmetic coding-based approach and a singular value decomposition transformation are used to efficiently compress encrypted images in [3], [17], respectively.…”
Section: Introductionmentioning
confidence: 99%
“…Most studies on EtC systems assumed the use of a proprietary compression scheme incompatible with international compression standards such as JPEG [3], [13]- [17], so they can not be applied to social media. For example, an arithmetic coding-based approach and a singular value decomposition transformation are used to efficiently compress encrypted images in [3], [17], respectively. Because of such a situation, block scramblingbased image encryption schemes, which are compatible with international standards, have been proposed for EtC systems T. Chuman, S. Warit and H. Kiya [18]- [22].…”
Section: Introductionmentioning
confidence: 99%
“…Corresponding author: Hitoshi Kiya Email: kiya@tmu.ac.jp the use of a proprietary compression scheme incompatible with international compression standards such as JPEG [3,14,15,[22][23][24], block scrambling-based image encryption schemes, which are compatible with international standards, have been proposed for EtC systems [16][17][18][19][20][21].…”
mentioning
confidence: 99%