References
[1]. A. Al-Fahoum, (2006). “Quality assessment of ECG compression techniquesusing a wavelet-based diagnostic measure,” IEEE Transactions on Information Technology in Biomedicine, Vol. 10, No. 1.
[2]. Ayman Ibaida, Ibrahim Khalil, (2013). “Wavelet based ECG steganography for protection patient confidential information in Point of Care Systems”, in IEEE Transactions on Biomedical Engineering, Vol. 60, No .12, pp.3322-3330.
[3]. H.Golpira and H. Danyali, (2010). “Reversible blind watermarking for medical images based on wavelet histogram shifting,” in IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2009. IEEE, pp. 31–36.
[4]. F,Hu, M.Jiang, M.Wagner, and D.Dong, (2007). “Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign,” IEEE Transactions on Information Technology in Biomedicine, Vol. 11, No. 6, pp. 619–627.
[5]. Y.Lin, I. Jan, P.Ko, Y.Chen, J.Wong, and G,Jan, (2004). “A wireless PDA-based physiological monitoring system for patient transport,” IEEE Transactions on Information Technology in Biomedicine, Vol. 8, No. 4,pp. 439–447.
[6]. L.Marvel, C.Boncelet, and C.Retter, (1999). “Spread spectrum image Steganography,” IEEE Transactions on Image Processing, Vol. 8, No. 8,pp. 1075–1083.
[7]. Sudhir Keshari and S. G. Modani, (2011). “Image Encryption Algorithm based on Chaotic Map Lattice and Arnold cat map for Secure Transmission” International Journal of Computer Science and Technology, Vol. 2, Issue 1, pp. 132–135.
[8]. K. Satish, T. Jayakar, Charles Tobin, K. Madhavi and K., (2004). “Murali, Chaos Based Spread Spectrum Image Steganography,” IEEE Transactions on Consumer 588 Electronics, Vol. 50, No. 2, pp. 987–990.
[9]. Wien Hong and Tung-Shou Chen. “A Novel Data Embedding Method Using AdaptivePixel Pair Matching”, in IEEE Transactions on Engineering, Vol.7, No .1, pp.176-184, 20
[10]. K.Zheng and X.Qian, (2008). “Reversible Data Hiding for ElectrocardiogramSignal Based on Wavelet Transforms,” in International Conference on Computational Intelligence and Security, 2008. CIS'08, Vol. 1.