2020
DOI: 10.1002/ima.22477
|View full text |Cite
|
Sign up to set email alerts
|

ECG steganography based on tunable Q‐factor wavelet transform and singular value decomposition

Abstract: The article presents a novel ECG steganography scheme based on the tunable Q‐factor wavelet transformation (TQWT) and also singular value decomposition (SVD) techniques that ensure better safety and confidentiality of patient information. Initial parameters such as Q, r, and J are used to decompose the cover signal into individual frequency sub‐bands with the tunable Q‐factor wavelet transform (TQWT). The singular value decomposition (SVD) technique is used to further decompose high‐frequency sub‐band coeffici… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 45 publications
0
2
0
Order By: Relevance
“…Security and privacy issues appear when these data is transmitted over open communication networks [4]. Different instructions and rules are used to preserve patients' privacy when sending and receiving their medical data for diagnosis or research [5,6]. Regardless of the several advantages in this, medical data and images may reach unlicensed people, thus threatening privacy.…”
Section: Introductionmentioning
confidence: 99%
“…Security and privacy issues appear when these data is transmitted over open communication networks [4]. Different instructions and rules are used to preserve patients' privacy when sending and receiving their medical data for diagnosis or research [5,6]. Regardless of the several advantages in this, medical data and images may reach unlicensed people, thus threatening privacy.…”
Section: Introductionmentioning
confidence: 99%
“…At the time of transmission over the open network, different security issues also arise, including preserving data's integrity and privacy along with the source authentication [ 5 ]. To date, a variety of guidelines and standards is used to protect patient’s privacy while sharing data for diagnosis or research purposes [ 5 , 9 , 21 ]. Despite several benefits, health data may be redistributed by unauthorized person, which leads to strong security issue.…”
Section: Introductionmentioning
confidence: 99%