{"title":"基于整数小波变换域和增量法的心电图自适应数据隐藏","authors":"Ching-Yu Yang, Wen-Fong Wang, Chi-Ming Lai","doi":"10.1109/ICITM48982.2020.9080382","DOIUrl":null,"url":null,"abstract":"Based on integer wavelet transform domain, an incremental bit-embedding and bit-extraction technique was employed in the proposed method. According to the predetermined criterion, data bits can be adaptively hidden into the host bundles of in an electrocardiogram (ECG) signal. Simulations revealed that the proposed method provides robustness performance better than existing techniques, while our bit-embedding/extraction procedures are much simpler than theirs. In addition, the average signal-to-noise ratio (SNR) and payload of the proposed method are competitive to that of existing techniques. Namely, our method has the merits of high hiding capacity and robust against the attacks such as cropping, inversion, scaling, translation, truncation, and Gaussian noise-addition attacks.","PeriodicalId":176979,"journal":{"name":"2020 9th International Conference on Industrial Technology and Management (ICITM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Adaptive Data-hiding in Electrocardiogram Based on Integer Wavelet Transform Domain and Incremental Approach\",\"authors\":\"Ching-Yu Yang, Wen-Fong Wang, Chi-Ming Lai\",\"doi\":\"10.1109/ICITM48982.2020.9080382\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Based on integer wavelet transform domain, an incremental bit-embedding and bit-extraction technique was employed in the proposed method. According to the predetermined criterion, data bits can be adaptively hidden into the host bundles of in an electrocardiogram (ECG) signal. Simulations revealed that the proposed method provides robustness performance better than existing techniques, while our bit-embedding/extraction procedures are much simpler than theirs. In addition, the average signal-to-noise ratio (SNR) and payload of the proposed method are competitive to that of existing techniques. Namely, our method has the merits of high hiding capacity and robust against the attacks such as cropping, inversion, scaling, translation, truncation, and Gaussian noise-addition attacks.\",\"PeriodicalId\":176979,\"journal\":{\"name\":\"2020 9th International Conference on Industrial Technology and Management (ICITM)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 9th International Conference on Industrial Technology and Management (ICITM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITM48982.2020.9080382\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 9th International Conference on Industrial Technology and Management (ICITM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITM48982.2020.9080382","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Adaptive Data-hiding in Electrocardiogram Based on Integer Wavelet Transform Domain and Incremental Approach
Based on integer wavelet transform domain, an incremental bit-embedding and bit-extraction technique was employed in the proposed method. According to the predetermined criterion, data bits can be adaptively hidden into the host bundles of in an electrocardiogram (ECG) signal. Simulations revealed that the proposed method provides robustness performance better than existing techniques, while our bit-embedding/extraction procedures are much simpler than theirs. In addition, the average signal-to-noise ratio (SNR) and payload of the proposed method are competitive to that of existing techniques. Namely, our method has the merits of high hiding capacity and robust against the attacks such as cropping, inversion, scaling, translation, truncation, and Gaussian noise-addition attacks.