Methodology
Shoug Alamri
Reem Almedbl
Ghada Almutairi
Ebtihal Alahmari
Ebtisam Alotaibi
Lama Saif
Ghalia Alanazi
soperviser:
Dr. naglaa soliman
4.Dec.2019
thanks for listening!
one of the most important reasons why this system works is information security.
This is the purpose of our project ..
It is the work of effective security plans that help to deal with the issues of trust, credibility and integrity.
Therefore, we have been using a fast and powerful encryption technology for the ECG signal.
The first step is decompose signal in DWT and the second step is encrypt the ECG signal using Random projection.
1
Since the health-care data contains highly sensitive and personal
data, strong security issues should be addressed to avoid
serious consequences, causing damage, disruption to operations
2
-the project is concerned mainly with encryption of ECG ( Electro cardio gram ) Signal.
-The protection of ECG signal is very sensitive.
- The encryption algorithm is based on applying the fusion rule after wavelet analysis of the ECG signal
- The proposed system will be applied to the medical field anytime, and anywhere, it helps much more to the patients regarding their cardiac issues.
3
DWT is an implementation of the wavelet transform using a discrete set of the wavelet scales and some
defined rules, this transform decomposes the signal into mutually orthogonal set of wavelets.
one dimension :
4
Random projection is the process of projecting the original signal or the feature
vector on a random space. It can be achieved through multiplication with a random matrix.
5
Proposed & Similar Systems Comparison
6
the project presents a new approach for cryptographic system in which, fusion is applied
for the cryptographic system after wavelet analysis of the ECG signal is applied.
In the proposed telemedicine system, we include the encryption process based on the
random projection.
At the receiver the reverse process is applied to decrypt the ECG signal.
7
8
9
10
Correlation between Clear Signal and processed signal (CR)
Measure the entropy
Measure the PSNR
11
Confidentiality:
It means that only the authorized users can access to the medical data.
Availability:
Assuring that authorized users have continued access to information and resources.
Capacity:
Capacity describes how many information bits can be embedded.
Security:
it ensures protection against information leakage. It can also be defined as the ability to ensure authenticity and integrity of the encryption under malicious attack
12
13
14
In conclusion the encrypted ECG does not reveal the patient identifiable characteristics, as well as private health information. Therefore, the encrypted ECG can be freely transmitted over the public internet. Even if the hacker captures the ECG packet, the patient remains completely anonymized.
When the cardiologist and the hospital receive the encrypted ECG, they need to request the chaos key used for encrypting the ECG.
15