ecg encryption
Recently Published Documents


TOTAL DOCUMENTS

5
(FIVE YEARS 2)

H-INDEX

1
(FIVE YEARS 1)

2021 ◽  
Vol 28 (2) ◽  
pp. 493-512
Author(s):  
Jamal Kh-Madhloom ◽  
Mohd Khanapi Abd Ghani ◽  
Mohd Rizuan Baharon

Cryptography ◽  
2020 ◽  
pp. 22-38 ◽  
Author(s):  
Butta Singh ◽  
Manjit Singh ◽  
Dixit Sharma

Remote health-care monitoring systems communicate biomedical information (e.g. Electrocardiogram (ECG)) over insecure networks. Protection of the integrity, authentication and confidentiality of the medical data is a challenging issue. This chapter proposed an encryption process having a 4-round five steps -encryption structure includes: the random pixel insertion, row separation, substitution of each separated row, row combination and rotation. Accuracy and security analysis of proposed method for 2D ECG encryption is evaluated on MIT-BIH arrhythmia database.


2017 ◽  
Vol 106 ◽  
pp. 143-152 ◽  
Author(s):  
Xiaojun Zhai ◽  
Amine Ait Si Ali ◽  
Abbes Amira ◽  
Faycal Bensaali

Author(s):  
Butta Singh ◽  
Manjit Singh ◽  
Dixit Sharma

Remote health-care monitoring systems communicate biomedical information (e.g. Electrocardiogram (ECG)) over insecure networks. Protection of the integrity, authentication and confidentiality of the medical data is a challenging issue. This chapter proposed an encryption process having a 4-round five steps -encryption structure includes: the random pixel insertion, row separation, substitution of each separated row, row combination and rotation. Accuracy and security analysis of proposed method for 2D ECG encryption is evaluated on MIT-BIH arrhythmia database.


Sign in / Sign up

Export Citation Format

Share Document