Back to Search Start Over

Bilateral hashing model of ECG signal encryption system using downhill peak follow (DPF)-based encryption technique.

Authors :
Kumar, A. N. Sanjeev
Naik, B. Ramesh
Source :
Soft Computing - A Fusion of Foundations, Methodologies & Applications. Aug2023, Vol. 27 Issue 16, p11843-11851. 9p.
Publication Year :
2023

Abstract

This research suggests a unique ECG security solution based on the data pattern-based encryption paradigm to address security issues in ECG signal transmission or storage environments. According to this concept, the encryption system controls the data security process by extracting key signatures from the ECG signal peaks to identify the characteristics or attributes of the data and encrypt it. To estimate the hashing qualities, the approach is to build a random key pattern based on the signal peaks and extract the signature. The signal was then encrypted and sent to a doctor or signal analyzer. Bilateral random hashing (BRH) is used to achieve this. This updates the hashing generation model by analyzing the parameters using probabilistic distributional characteristics. This crucial motif was applied. This key pattern was utilized to encrypt the data samples using the downhill peak follow (DPF) encryption technique, which follows the strength of the peak value in the ECG waveform. This suggested project is carried out using MATLAB scripting. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
14327643
Volume :
27
Issue :
16
Database :
Academic Search Index
Journal :
Soft Computing - A Fusion of Foundations, Methodologies & Applications
Publication Type :
Academic Journal
Accession number :
164552288
Full Text :
https://doi.org/10.1007/s00500-023-08684-x