key: cord-0054809-406rwngi authors: Sharma, N.; Anand, A.; Singh, A. K. title: Bio-signal data sharing security through watermarking: a technical survey date: 2021-01-06 journal: Computing DOI: 10.1007/s00607-020-00881-y sha: 80c535639999024f9caebb9c5c8a997bcef0b1d2 doc_id: 54809 cord_uid: 406rwngi Due to smart healthcare systems highly connected information and communications technologies, sensitive medical information and records are easily transmitted over the networks. However, stealing of healthcare data is increasing crime every day to greatly impact on financial loss. In order to this, researchers are developing various cost-effective bio-signal based data hiding techniques for smart healthcare applications. In this paper, we first introduce various aspects of data hiding along with major properties, generic embedding and extraction process, and recent applications. This survey provides a comprehensive survey on data hiding techniques, and their new trends for solving new challenges in real-world applications. Then, we survey the various notable bio-signal based data hiding techniques. The summary of some notable techniques in terms of their objective, type of data hiding, methodology and database used, performance metrics, important features, and limitations are also presented in tabular form. At the end, we discuss the major issues and research directions to explore the promising areas for future research. With the widespread advancement of Information and Communications Technologies (ICT), it has become possible to share diagnosis data of the patient along with the physiological signals to achieve better tele-medicine, tele-diagnosis, tele-consultation and healthcare services [1] . Now a days sharing of biomedical data and medical images over wireless media becomes common to get the facility of remote healthcare system [2] . These signals are widely used in medical services for both diagnoses and interpretation of health status of any individual. Now a days different "Point-of-Care" (POC) services like POC documentation, POC testing are used to provide a cost-effective, fast and 24 × 7 medical service to the patients [3] . Further, these POC services are used to collect patient's data including temperature, biomedical signals, blood pressure and glucose level using sensors in short intervals [4] . This data is then sent to healthcare experts using various techniques [4] . It helps in saving patient's life and reduces burden on hospitals. Additionally, medical records including patients' details and other significant medical data is stored on the cloud which is handled by various hospitals and healthcare center [5] . This information adds up in taking more appropriate decisions by the healthcare professionals. On other hand, transfer of the medical records might bring many issues [2, 5] . Generally, medical records are transmitted using digital imaging and communications in medicine (DICOM) standard [6] . Here, a header is appended with the DICOM images which carry the important patient data. However, DICOM is not much effective for reliable healthcare communication [6] . In case of sharing the bio-signals through the open network it should be noted that the distortion of the signal at the time of receiving should be minimum. To solve this problem machine learning algorithms is used at the receiver side for real time feature extraction and binary classification of the received signal [7, 8] . Presently, Coronavirus pandemic has been declared as a global health emergency by the World Health Organization (WHO) [9] . During these times, a lot of significant patient data is stored in the local server of the medical centre and distributed from once centre to other hospitals via unsecure network. However, this may lead to high risk of data security and privacy in the current advanced healthcare systems [10] . In order to solve these issues, data hiding techniques are used to provide confidentiality, integrity and authenticity requirements of medical data [11] . Some notable applications of data hiding approaches are illustrated in Fig. 1 [12] . As pointed out by various researchers, watermarking is more popular and robust among similar technologies (see Fig. 2 ) that facilitate embedding information into digital content for authentication or protection purpose of healthcare data [2, 5, 13] . Table 1 indicated the clear difference between popular data hiding techniques. Watermarking technique can be used for hiding data efficiently within cover bio signal. Special domain techniques like LSB embedding and correlation modifications are widely used as those are fast and simple but are more prone to attacks. Frequency domain techniques like discrete wavelet transform (DWT) and discrete cosine transform (DCT) are more advanced techniques which provides better security and robustness at the time of insertion and extraction from the signal [6] . Bio-signals are very important for diagnosis purposes and are classified in two types; action potential and event related potential. Action potential includes electrocardiography (ECG), electroencephalography (EEG), and electromyogram (EMG). However, electrogastrogram (EGG), phonocardiogram (PCG), carotid pulse (CP) are of event related potentials [14] . Different types of electrical and physiological activities are captured with physiological instruments and these measurements are used in biomedical signal processing to give the health status of a patient [15] . It is very important to maintain the authenticity and integrity of these bio signal data while transmission over the unsecure network. Watermarking can be a suitable approach to add some secret data within the bio signals to resolve any ownership conflict, tracking of data and content authenticiation [16] . The main contributions of this paper are given as follows. • We introduce the preliminary concepts of data hiding techniques and its importance in advanced healthcare domain, noticeable applications, important properties and embedding and extraction process. • We present a brief introduction about different types of bio-signals. The bio-signal includes ECG, EEG, EMG, EGG, PCG, and CP. • We survey the various notable bio-signal based data hiding techniques with their objective, type of data hiding, methodology and database used, performance metrics, important features, and limitations • Finally, we investigate the potential issues that existing approaches of bio-signals based data hiding face. Watermarking techniques facilitate embedding sensitive information into digital content for authentication or copyright protection purpose. Robustness, invisibility, and capacity are the notable properties for any watermarking system. However, it has been proven that maintaining a trade-off between these parameters is very important [12] . The relationship between these parameters is clearly illustrated in Fig. 3 . The basic properties of watermarking techniques are given as follows [12, 13] . The secret data, also called watermark, is embedded within the cover media [18] By manipulating and scrambling the pixels the secret data is embedded within host data [19] Meaningful content is transformed into encoded form to provide security [19] Purpose of use Proof the ownership i.e. authentication purpose and to provide robustness [13, 20] To provide confidentiality and is highly secure [13, 20] Maintain the integrity of the data. Provides data secrecy, information uprightness, verification and non-repudiation [20] Cover image selection [21] Here the cover image should be related with the embedded message The cover image may be or may not be related with the embedded message There is no need of relating cover image with embedded message Communication type One-to-many [13, 22] One-to-one [13] One-to-many [13] • Imperceptibility refers the similarity of cover and marked data will not be noticeable for any viewer. Data should be highly imperceptible for a reliable transmission. • Robustness demands the hidden (secrete) data should be resistant to any kind of attacks. • Embedding capacity refers to the amount of secret information imperceptibly hidden into cover. • Security refers that the system should be designed in such a way that no unauthorized user can access, remove or alter the watermark easily. • Detectability refers that the marked data should be extracted by authorized users only. • Computational complexity is the cost associated with the process of data insertion and extraction from the cover. • False positive rate refers to the probability of recognizing non-watermark portion of the cover as watermarks. The basic process of data hiding method is shown in Fig. 4 . In the embedding process, the secret data is marked within the cover bio-medical signal by using some secret key and data hiding algorithms. In this stage, other techniques like encryption, encoding, scrambling and hashing functions can also be applied to ensure the security of the secret signal while transmitting through the open unsecure network [12] . In the receiver side, the same key is used to recover the hidden data from the marked signal. Generally, watermarking system is classified in to blind, semi-blind and nonblind [12, 23, 24] . In blind system, cover information is not required for the recovery of hidden mark. However, cover information is used for the recovery of hidden mark in the non-blind system. In semi-blind system, cover information is not required and only know about the watermark for the recovery of hidden mark. These systems are frequently used in various potential applications [23, 24] . Different metric is used to measure performance of the bio-signals based data hiding algorithms. Some of the notable metrics are discussed below. BER is defined as the percentage of erroneous bits (say B err may occur in the received data) in comparison with total number of bits transmitted ( B Total ) over the channel [12] . BER should be ideal for any reliable watermarking system The PSNR refer the similarity between the cover and the marked signal. It is the ratio between maximum amplitude i.e., peak of cover ECG signal and the mean square error between the cover and watermarked ECG signal. High value of PSNR defines that the method is highly imperceptible [25] . It is defined as, (2) PSNR = 20 log 10 4 Embedding and extraction process in data hiding for bio-medical signals [12] Here N represents the total number of samples, x c and x w are the amplitude of the cover and watermarked ECG signals. PRD is used to measure the imperceptibility of the secret data by comparing the distortion between the cover bio-signal (x c ) and the marked bio-signal x w . It measures the distortion level of two bio-signals as follows [26,27]: where, N represents the total number of samples in the bio-signal. KL divergence is used to measure the distance between the histograms of the cover and marked signal. The distance can be calculated by using the following equation [25] : where D represents the KL divergence, p c and p w represent the probability of cover and watermarked ECG signals. In this section, we provide basic concepts of important bio-signals and then moved to surveys focused on ECG, EEG, EMG, EGG, PCG, and CP based state-of-the-art data hiding are discussed in detail. ECG signal is a graphical representation generated by the electrical activity of the heart and is very important to detect any cardio vascular disease. One ECG signal consists of various cardiac cycles and each cycle is composed of P wave followed by QRS complex and a T wave [6] . The maximum energy is concerted in the QRS complex portion of the ECG signal. As the size of the ECG signal is good enough, so some confidential data of the patient can be hidden here for a secure transmission [26] . The Normal ECG samples are presented in Fig. 5 . Watermarking and steganography is used to embed data into 1-D and 2-D ECG signals to provide secure transmission over public network [25, 28] . It is established that the secret data can be marked within the QRS region or non-QRS region of the signal as for the requirements. To avoid any distortion of the original signal, non-QRS region is used to embed the watermark [29] . To enhance the privacy of the secret data, it can be hidden in any position of the ECG signal without making any kind of distortion or quality degradation [30] . Some of the recent ECG based data hiding are discussed below. In [6] , Dey et al. proposed self-recovering blind watermarking method for hiding binary data into ECG signal using stationary wavelet, spread-spectrum and quantization. It is useful for the authentication of source of information. The author reduces the complexity by implementing self-authentication and removing the concept of sharing session key between sender and receiver. The suggested method is robust and can also be used for copyright protection. Ibaida et al. proposed an imperceptible steganography technique to securely transmit confidential details of the patient [26] . It uses Shift Special Range Transform for concealing the confidential details of patients into most significant positions of the ECG signal. The performance of this method is measured by PRD value and it experimentally depicts that security of the hidden data is high. In [29] , Zheng and Qian proposed a reversible data hiding method to imperceptibly embed the watermark data into the non-QRS region of the ECG signal. The cover signal is decomposed using Haar based lifting wavelet transform. Prior to embedding the secret data is scrambled using Arnold transform to provide more security. Authors of [31] proposed watermarking technique where bio medical information is marked into ECG signal using LSB embedding technique. Also, the ECG signal is pre-processed using simple linear transformation technique. It provides patient authentication with low complexity. Sanivarapu et al. proposed a DWT based robust watermarking method for hiding patient data into the ECG signal [32] . Patient information is embedded as a QR image to improve imperceptibility and embedding capacity. Further, Pan-Tompkins algorithm is used to convert the 1D-ECG signal to 2D-ECG image. The proposed work outperforms in terms of imperceptibility when compared with existing stateof-the-art [33, 34] . Nambakhsh et al. proposed lossless dual watermarking technique to securely transmit ECG signal and patient ID and avoid diagnosis mismatching [35] . In this method, ECG signal and patient ID are considered as watermarks which are embedded into PET image using multi-resolution wavelet transform. Further, [31] texture feature extraction method is used to identify the locations for imperceptibly and robustly concealing the marks. This proposed method provides better result in terms of imperceptibility as compared with existing methods [36] . In [19] , Mathivanan et al. proposed a secure steganography technique to transmit ECG signal and diagnosis data in color image. The ECG signal and diagnosis data are converted into corresponding QR codes improving the error handling capacity. These QR codes are then embedded within the components of color image by using pixel permutation. Further, embedded points are encrypted using 1D chaotic encryption technique increasing the security. The suggested scheme offered superior performance when compared with similar techniques [37, 38, 39] . In [40] , the DWT based scheme embeds the motion data including homemade exercise data and in-field screening into ECG signal. The method uses Holter equipment to capture the data. It helps in keeping track real-time physical activities of patients in natural environment without additional storage or media channel. The experimental result shows that the proposed method is imperceptible and robust. To get secure communication of patient details, wavelet-based steganography technique is proposed by the authors to hide mark inside ECG signal [41] . XOR ciphering technique is used for encryption to prevent unauthorized access of data. The quality of the proposed method is measured in terms of PSNR and MSE and found that the method is secure and highly imperceptible. In [42] , Nagaraju and Par-thaSarath proposed a secure watermarking approach where patient details and ECG signal are marked within medical images. Before embedding, ASCII format of these marks are encrypted and then embedded into host image using LSB algorithm. The suggested scheme is robust and fault tolerant.. In [43] , Anandini et al. proposed a watermarking technique for secure transmission of ECG data over insecure network. The ECG signal of the patient is embedded into high frequency plane of a color image using Haar wavelet. Jero and Ramu proposed another curvelet transformation based steganographic technique to hide patient data into ECG signal [33] . Quantization technique is used to embed the data into the coefficient's values. Further, Simple sequence approach is used to get the locations of embedding the marks. It is found that in terms of imperceptibility simple sequence approach is better than random location approach. A Secure and imperceptible steganography method is proposed in [44] where the diagnosis data is concealed within the ECG signal. Special range numbers of the ECG signals are used to mark the diagnosis data. It maintains the privacy of the user by providing access control mechanism along with providing privacy to sensitive medical data whilst reducing the storage and bandwidth capacity. In this model, the data is arranged in a hierarchical tree like structure and only authorized users can access the nodes with the corresponding keys. In [45] , the authors proposed a robust and imperceptible steganography method using combination of DWT and SVD and continuous ant colony optimization (CACO) technique to conceal the medical data within ECG signal. After the decomposition of the signal using DWT, SVD along with additive quantization method is used to embed the confidential data in the high frequency sub bands of ECG signal. Here, CACO algorithm is used to identify the multiple scaling factors which are useful in maintaining the quality of the signal. Tseng et al. suggested a robust and feasible watermarking technique for secure transmission of patient data and ECG and also reduce the transmission overhead [46] . Quantization based encryption technique is used to maintain the integrity and security of the ECG signal prior the DWT based decomposition. The mark is embedded into the lowest frequency coefficient to ensure better security. The proposed method is tested against various types of attacks and found that it is robust and reliable [30] . In [27] , Wang et al. proposed two reversible data hiding techniques to maintain the integrity and security of the patient data and the ECG signal. In the first technique, Histogram shifting and prediction-error expansion (PPE) based reversible data hiding technique is proposed to maintain the shape of the ECG signal at the receiver side. This method ensures high imperceptibility of the watermarked ECG signal. The other technique uses unified embedding-scrambling method for concealing the medical information. This method ensures higher embedding capacity and better security since the marked ECG signal is in decoded form. Swierkosz and Augustyniak have proposed an irreversible watermarking technique for ECG signal [47] . Forward wavelet transform is used to decompose the cover ECG signal and create the data container, followed by replacing intrinsic noises of the signal with the diagnosis data. Further, to increase the security, LSB embedding is applied on the watermarked signal. The marked signal is also checked against various types of attacks and found that the method is imperceptible and reliable. The proposed method works superior in terms of imperceptibility when compared with some existing methods [31, 33, 48, 49] . A DWT based data hiding technique is proposed by Mathivanan et al. in [50] where QR code containing the patient data is treated as watermark and concealed within the ECG signal. After the decomposition of the signal using DWT, the code is marked into the lowest coefficient values using swapping technique. It is experimentally proved that the proposed method is highly secured and imperceptible. In [51] , Duy et al. proposed an LSB based adaptive data hiding technique to secure patient data inside the non-essential components of the ECG signal. The security is enhanced by applying SHA3 and AES algorithm for encryption of patient information before the embedding. A DWT based secure and imperceptible watermarking method is proposed by Engin et al. in [52] to authenticate of the ECG signal by embedding authentication information within the signal. To increase the robustness, pseudo random sequence is used for embedding. Another secure and imperceptible steganography technique is proposed by Mathivanan et al. in [34] where the encoded patient data is transmitted through ECG signal. The 1D ECG signal is converted into 2D image using DWT technique. To further improve the security, the secret data is converted into QR code which has error handling capacity. This code is embedded within the decomposed signal using additive quantization method to provide double security. In terms of imperceptibility, the proposed method is superior to the existing methods [25, 33, 35, [53] [54] [55] [56] . In [57] , Pandey et al. proposed an imperceptible and robust data hiding technique for secure transmission of patient data into ECG signal based on SVD. Coupled chaotic map is used to generate the pseudo-random locations for embedding and the secret data is marked into those locations using sample value difference approach and SVD. Further, OFDM method is used to transmit the watermarked signal in the network and to get real time access of data. In terms of imperceptibility, the proposed work outperforms the existing state-of-art [18, 25, 28, 45, 58] . Curvelet transform based data hiding technique is proposed by Patil et al. in [59] to conceal encrypted form of patient data into ECG signal. Security of the secret data is improved by applying chaotic encryption method. Curvelet transform is applied on the cover signal to get the coefficient values, on which adaptive LSB embedding technique is performed. Experimental results show that the method is imperceptible and the data can be extracted completely at receiver side. In [60] , Sahu et al. proposed another reliable data hiding technique for secure transmission of ECG signal and diagnosis data using DWT. To make the system more energy efficient, the secret data is embedded within the decomposed signal using Unequal steganography embedding method. Further, the robustness is enhanced by using Unequal error protection technique during embedding. Table 2 shows the summary of some notable ECG signal-based data hiding techniques in terms of their objective, type of data hiding, methodology and database used, performance metrics, important features, and limitations for healthcare applications. Electroencephalography (EEG) is a medical technique for recording electrical signal generated from the brain. EEG signals (see in Fig. 6 ) are mainly used for clinical diagnosis of epileptic seizures, sleep disorders, encephalopathy and brain death [61] . These signals can be used as cover signal in telemedicine due their large size and important in many non-clinical researches [62] . The frequency ranges of the EEG signals are defined from 0.01 Hz to 100 Hz. The range can be further divided into five frequency bands which are used to determine the current state of the brain [63] . Based on the feature selection, the EEG control signals is further divided into Time domain, Frequency domain and time-frequency domain [64] . To do the embedding in frequency domain, the EEG signal is first converted into 2D matrix and then decomposed into sub bands like HH, HL, LH and LL. The embedding of secret data is mainly performed into the HH sub bands [65] . Some of the notable ECG based data hiding are discussed below. In [61] , Duy et al. proposed an imperceptible and blind watermarking technique based on pattern recognition to securely transmit secret data marked within EEG signals using DWT. Patient information and signature are used as watermarks and to increase the security, Arnold transform is used to scramble the mark. Further, the watermarked data is embedded within the decomposed signal using mean value relationship of the coefficients. At receiver side, support vector data description (SVDD) is used to efficiently extract the mark. The suggested scheme can handle different types of common attacks. In [64] , authors proposed a reversible and blind watermarking technique where electronic patient record is embedded as watermark into the EEG signal to achieve data authenticity and maintain signal integrity along with restriction in copy process. After applying rectification and round off techniques on the signal, Alattar's method is used to mark the EPR into the processed signal to ensure reversibility of the technique. The experimental results show that the proposed method is imperceptible and highly secure. Pham et al. proposed Here the size of the watermark signal is a limitation [65] to ensure the security of EEG signal using fusion of DWT and SVD. EEG signal is transformed into 2-D form and then decomposed using DWT. Further, SVD is used on this decomposed signal to embed the watermark and ensure blind detection. A fragile watermarking technique is proposed by hiding EPR and hospital logo within EEG signal to ensure the authenticity and integrity of the transmitted data [66] . The method is proposed for colour image. The watermark image is embedded within the cover signal using MSB bits. To make the system robust, File Checksum Integrity Verifier is used for data tracking. Experimental results show that the proposed method is robust and can reduce payload. In [67] , the authors proposed two steganography methods where patient data is marked within magnetic resonance image using similarity and fuzzy logic based LSB algorithm. Here, the hidden data is composed of EEG signal, patient details and comments by the doctors. To enhance the security and reduce the size, this secret data is compressed using LZW and Huffman compression techniques. Further, to provide better protection to the compressed data, Rijndael symmetric encryption is used. This encrypted data is concealed within the cover image based on Fuzzy logic based LSB and Similarity based LSB using gray level difference of pixels. Both steganography methods are suitable for reducing transmission and storage overhead. The proposed method is better than existing methods in terms of embedding capacity and imperceptibility [36] [68] [69] [70] [71] [72] . In [73] , author proposed a secure and lossless data hiding technique to embed patient EEG signal within encoded video sequences with high embedding capacity. H.264/AVC encoder is used to mark the samples of the signal within the motion Fig. 6 Original EEG signal [64] vectors. Duy et al. proposed another blind scheme where secret data is embedded within EEG signal using approximation coefficient values and SVDD based extraction is practiced for watermark retrieval [74] . Owner signature and logo is taken as watermark and Arnold transformation is applied to it prior embedding. DWT is applied to the signal for decomposition. Further the scrambled data is embedded using the mean value modulation and approximate coefficient values. At the receiver side the watermarked signal is extracted without any loss using trained SVDD model. The proposed method is highly robust and imperceptible. Parashar et al. proposed a robust data hiding technique to securely embed confidential data of patient within EEG signal using lifting based integer wavelet [75] . The secret data is encrypted prior embedding and pseudo random number is used to conceal the data in a distributed fashion. In [76] , Pundkar and Joshi proposed a blind and secure steganography technique to conceal the patient data within EEG signal based on Lifting wavelet transform. ECG image and information of the patient are treated as watermark and encrypted using Arnold transform prior embedding. The encrypted data is embedded within the transformed signal using mean modulation relationship of approximation coefficients and at the receiver side the marked data is extracted using SVDD. The proposed method is imperceptible and can handle different processing attacks. Table 3 provides the brief summary of some notable ECG signal-based data hiding techniques. Some of the other bio signal (EOG, PPG, EMG) are equally important as ECG and EEG signal. Electrooculography (EOG) is a medical test to detect any abnormality in human eyes by monitoring movement of eye ball in rapid eye movement and with no rapid movement during sleep period. EOG signal is the graphical representation of electrical response of the sensitive rods and cons cells and motor nerves present inside the eye [77] . Figure 7 gives the representation of EOG signal. Photoplethysmography (PPG) is a very sensitive and uncomplicated medical diagnostic tool to detect various types of cardio-vascular diseases (see Fig. 8 ). PPG is a non-invasive method where a light source and photo detector is used at the surface level of the skin to measure the variation relative blood volume in the blood vessels [79] . Analysis of PPG signal is very important as various cardio diseases like atherosclerosis and arterial stiffness can be detected from the second derivative of the signal [11] . EMG signal analysis is performed to measure and record the biceps muscle activity during exercise [80] . These EMG signals (See fig. 9 ) are also used as diagnostic tools to detect various diseases of muscles by recording electrical signal of muscles. Using this EMG signal, the reason of muscle weakness can be detected that whether it is caused by the breakdown of a nerve attached with the muscle or neurological disorder [78] . Some of the notable other bio-signal (EOG, PPG, EMG) based-data hiding techniques are discussed below. In [4] , Abuadbba and Khalil proposed a 3D steganography method to securely embed secret data within bio signal preserving the integrity and authenticity of the signal. Fast Walsh Hadamard transform technique is used to decompose signal. Less important coefficient values are replaced at the time of embedding. The secret data is first encrypted using AES method. Using the rotation factor on the key, a 3D template is generated and further the secret data are randomly embedded using this template. The proposed method is highly secure when compared with similar techniques [31] . Bio-signal based blind watermarking techniques are proposed by Dey et al. in [78] where EMG signal is used as cover signal. It proposed session key and selfrecovery watermarking methods using spread spectrum and stationary wavelet transformation (SWT). Self-authentication verifies the integrity and source of the confidential information. Based on experimental results, it is concluded that self-recovery model works superior in comparison to key based model since there is no burden of exchanging session key between sender and receiver. In [79] , Dey et al. proposed a Original EMG signal [78] blind watermarking technique where patient data is embedded within PPG signal to provide source authentication. Prediction error algorithm is used to securely imperceptibly embed the EPR into the transformed PPG signal. Dey et al. in [81] further suggested a blind scheme to verify the integrity of the EOG signal and to reduce the computation time and complexity. The mean value of the blink frequency and blink interval of the EOG signal is used as watermark. The watermark is concealed using difference expansion algorithm. A reversible steganography method is proposed by Rahman et al. where secret data of the patient is embedded as errors within the bio signals to achieve source authentication [82] . To achieve reversibility, the bio signal samples are encoded using extended binary golay code before embedding. Further the secrecy of the hidden data is increased by random selection of the embedding point using pseudo random sequence. Results proved that the scheme is reliable offered the high embedding capacity. In [77] , another blind watermarking technique is proposed by Dey et al. to provide data authenticity along with access control in EOG signal. Authors used frequency domain techniques to imperceptibly embed the gray scale mark image. The proposed method is imperceptible and can provide security against unauthorized access and copying. A blind and reversible steganography technique is proposed by Shiu et al. in [56] where secret data is securely embedded within physiological signals. It achieves privacy and authenticates data in time of transmission through the insecure network. The signal is transformed into bit of stream using error correcting codes. Further, confidential data of the patient is embedded within the transformed signal using hamming code. The proposed system has high embedding capacity and can reduce the payload. Also, when compared with similar techniques [28, 29, 58, 83] , this technique offers better results. A blind recognition of surface EMG based on watermarking is proposed by Yina and Dawei in [84] . To provide more security, Arnold transformation is used to scramble the secret image. DWT is used to decompose the EMG signal. Synchronization codes are used to get the embedding locations and then embedding is done using adaptive coefficients. Experimental results show that the proposed method is robust against various types of processing attacks. A reversible and blind watermarking technique is proposed by Dey et al. to ensure the authenticity of PPG signal when transmitted over open channel [85] . It uses binary image as watermark. The PPG signal is cropped according to the mark size and then decomposed using lifting wavelet transform method. The watermark image is embedded within the decomposed signal using pseudo random sequence. This session key based secure watermarking technique is secure and imperceptible. Table 4 provides the brief summary of some notable EOG, PPG, and EMG signal-based data hiding techniques. Various notable watermarking approaches have been developed. However, a lot of other significant issues still need to be addressed in near future. Through our comprehensive survey, we have identified numerous open issues and valuable research directions are discussed and also shown in Fig. 10 . • We need to maintain an optimal balance between imperceptibility, robustness and embedding capacity while embedding secret data into biomedical signals. • Security of the significant information and computational cost is equally important for any practical application. • Different optimization techniques and Fuzzy logic concepts can be added with watermarking technique for getting better embedding locations. However it will increase the time complexity as well. • While developing the watermarking scheme, different types of attacks should be considered. • The embedding methods need to be chosen in such a way that it should be independent of the number of samples present in the cover signal to maximize the overall capacity. • Similar to ECG signal, other bio signals also have importance in diagnosis respective and can also be used as cover to achieve a secure transmission. • The embedding location in the ECG signal should be chosen according to the requirement of the application that whether to maintain high imperceptibility or try to minimize the distortion. • To control the access and confidentiality of the data cryptographic techniques as well as key management and distribution model can be added with data hiding methods. However, it should enhance the cost as well. • To enhance the security of data in spatial domain, different error correcting codes can be applied at receiver side to increase robustness and to achieve reversibility. • Machine learning algorithm can be used with watermarking techniques to increase the robustness and blind detection of time series bio medical data. However, it increases the computational complexities as well. • Scrambling operations can be added with the existing methods to increase the imperceptibility and confidentiality of the cover signal. However, the integrity of the data should not be altered. • Along with the data hiding method, different encryption and compression scheme can also be merged to increase the overall security and imperceptibility of the system. However, the overall complexity of the system will increase. • In order to handle real time data from any application, neural network based watermarking techniques can be used. • Data hiding scheme for 3D signal are computationally expensive. Data hiding techniques plays a significant role to provide copyright protection and content authentication in digital world. No universal bio-signal data hiding techniques has been proposed to effectively provide the complete robustness and security of the medical data. This paper outlines and surveys the bio-signal based data hiding scheme in several aspects. We introduced basic concepts of data hiding along with major properties, generic embedding and extraction process, and recent applications. Then, traditional and recently developed bio-signal based data hiding techniques are reviewed and compared by highlighting their objective, type of data hiding, methodology and database used, performance metrics, and important features. At the end, some open issues and research directions are discussed. Author is confident that this survey would motivates more research into bio-signal based data hiding in secure healthcare application, and we believe that in the future, the concept will become a standard for dealing with sensitive bio-signal data. Optimal image component transmissions in multirate wireless sensor networks Joint watermarking-encryption-ECC for patient record security in wavelet domain Current status of point-of-care diagnostic devices in the Indian healthcare system with an update on COVID-19 pandemic Walsh-hadamard based 3D steganography for protecting sensitive information in point-of-care Compression-then-encryption-based secure watermarking technique for smart healthcare system Stationary wavelet transformation based self-recovery of blindwatermark from electrocardiogram signal in wireless telecardiology Medical signal processing in biomedical and clinical applications Machine learning based adaptive watermark decoding in view of anticipated attack Chest CT and coronavirus disease (COVID-19): a critical review of the literature to date Personal data usage and privacy considerations in the COVID-19 global pandemic A review on wearable photoplethysmography sensors and their potential future applications in healthcare Watermarking techniques for medical data authentication: a survey Everything you want to know about watermarking: from paper marks to hardware protection: from paper marks to hardware protection Advances in biomedical signal and image processing-a systematic review Addressing Biosignal Data Sharing Security Issues with Robust Watermarking A survey :digital audio watermarking techniques and applications. In: 2013 4th Int Conf Comput Commun Technol Hiding patients confidential datainthe ECG Signal viaa transformdomain quantization scheme QR code based color image cryptography for the secured transmission of ECG signal A comparison of different data hiding techniques Secure data hiding techniques : a survey Hybrid transform based reversible watermarking technique for medical images in telemedicine applications Survey of robust and imperceptible watermarking Secure semi-blind watermarking based on iteration mapping and image features ECG steganography using curvelet transform Embedding Patients Confidential Data in ECG Signal For HealthCare Information Systems Protecting patient confidential information based on ECG reversible data hiding Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission Reversible Data Hiding for Electrocardiogram Signal Based on Wavelet Transforms Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT Van Schyndel R (2011) A low complexity high capacity ECG signal watermark for wearable sensor-net Health monitoring system Patient data hiding into ECG signal using watermarking in transform domain Curvelets-based ECG steganography for data security QR code based patient data protection in ECG steganography A contextual based double watermarking of PET images by patient ID and ECG signal Secure and efficient health data management through multiple watermarking on medical images An improved Color Image Encryption Based on Multiple DNA sequence operations with DNA synthetic image and Chaos A color image encryption with heterogeneous bit-permutation and correlated chaos A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system Application of Watermarking Technique to Embedding Homemade Exercise Test Data into a Standard ECG Signal Steganography of ECG signals for hiding of patient confidential data Embedding ECG and Patient Information In Medical Image Secure electrocardiograph communication through discrete wavelet transform. Soft Comput Steganography-based Access Control to Medical Data Hidden in Electrocardiogram Imperceptibility-Robustness tradeoff studies for ECG steganography using continuous ant colony optimization Wavelet-based watermarking and compression for ECG signals with verification evaluation Optimizing wavelet ECGWatermarking to Maintain measurement performance according to industrial standard Steganography in Arrhythmic Electrocardiogram Signal Securely Data H iding and T ransmission in an ECG Signal using DWT QR Code-Based Highly Secure ECG Steganography Adaptive steganography technique to secure patient confidential information using ECG signal Wavelet Transformation based watermarking technique for human electrocardiogram (ECG) Wavelet-based Quantization Watermarking for ECG Signals Secure information embedding into 1D biomedical signals based on SPIHT A lightweight high capacity ECG watermark with protection against data loss Preserving privacy of online digital physiological signals using blind and reversible steganography An Integrated approach using chaotic map & sample value difference method for electrocardiogram steganography and OFDM based secured patient information transmission Effective electrocardiogram steganography based on coefficient alignment Curvelet Based ECG Steganography for Protection of Data Unequal Steganography with Unequal Error Protection for Wireless Physiological Signal Transmission A Proposed Pattern Recognition Framework for EEG-Based Smart Blind Watermarking System Fast DCT Algorithms for EEG data compression in embedded systems Removal of artifacts from EEG signals : a review Feature Analysis for the Blind-Watermarked Electroencephalogram Signal in Wireless Telemonitoring using Alattar 's Method Categories and Subject Descriptors A Proposed Blind DWT-SVD Watermarking Scheme for EEG Data Web-based intelligent EEG signal authentication and tamper detection system for secure Telemonitoring A novel fuzzy logic-based image steganography method to ensure medical data security A Secure Data Hiding Technique with Heterogeneous Data-Combining Capability for Electronic Patient Records A Novel Blind Watermarking of ECG Signals on Medical Images Using EZW Algorithm WATERMARKING MEDICAL IMAGES WITH PATIENT INFORMATION Transmission and storage of medical images with patient information Simultaneous storage of patient information with medical images in the frequency domain A data hiding technique to synchronously embed physiological signals in H. 264 / AVC encoded video for medicine healthcare An intelligent learning-based watermarking scheme for outsourced biomedical time series data An Electronic Health Record for Medical Signal using Spread Data Hiding Steganographic scheme for outsourced biomedical time series data using an intelligent learning-a research DWT-DCT-SVD based blind watermarking technique of gray image in Electrooculogram signal Feature analysis of blind watermarked electromyogram signal in wireless telemonitoring Analysis of Photoplethysmographic Signals Modified by Reversible Watermarking Technique using Prediction-Error in Wireless Telecardiology Discrete wavelet transform approach on the electromyography signal processing during rehabilitation exercise Das A 2012 embedding of blink frequency in electrooculography signal using difference expansion based reversible watermarking technique Reversible Biosignal Steganography Approach for Authenticating Biosignals using Extended Binary Golay code Reversible data hiding in ECG signals based on histogram shifting and thresholding Single channel surface electromyography blind recognition model based on watermarking Lifting wavelet transformation based blind watermarking technique of photoplethysmographic signals in wireless telecardiology Acknowledgements This research is supported by research project entitled "Copyright protection tool for digital data" order no. DLRL/21CR0003/SW-CC&ENT/GN/LP dt. 29 August, 2020, Defence Electronics Research Laboratory (DLRL), Ministry of Defence, DRDO, Hyderabad.