Development of a Smart Oriental Medical System Using Security Functions
Development of a Smart Oriental Medical System Using Security Functions
International Journal of Fuzzy Logic and Intelligent Systems. 2014. Dec, 14(4): 268-275
Copyright © 2014, Korean Institute of Intelligent Systems
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License ( which permits unrestricted noncommercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • Received : August 16, 2014
  • Accepted : October 17, 2014
  • Published : December 25, 2014
Export by style
Cited by
About the Authors
YouSik Hong
Department of Computer Science, Sangji University, Wonju, Korea
Eun-Jun Yoon
Department of Cyber Security, Kyungil University, Gyeongsan, Korea
Nojeong Heo
Department of Information and Communication Engineering, Dongyang University, Yeongju, Korea
Eun-Ju Kim
Korea Institute of Science and Technology Information, Daejeon, Korea
Youngchul Bae
Division of Electrical, Electronic and Computer Engineering, Chonnam National University, Yeosu, Korea

In future, hospitals are expected to automatically issue remote transcriptions. Many general hospitals are planning to encrypt their medical database to secure personal information as mandated by law. The electronic medical record system, picture archiving communication system, and the clinical data warehouse, amongst others, are the preferred targets for which stronger security is planned. In the near future, medical systems can be assumed to be automated and connected to remote locations, such as rural areas, and islands. Connecting patients who are in remote locations to medical complexes that are usually based in larger cities requires not only automatic processing, but also a certain amount of security in terms of medical data that is of a sensitive and critical nature. Unauthorized access to patients' transcription data could result in the data being modified, with possible lethal results. Hence, personal and sensitive data on telemedicine and medical information systems should be encrypted to protect patients from these risks. Login passwords, personal identification information, and biological information should similarly be protected in a systematic way. This paper proposes the use of electronic acupuncture with a built-in multi-pad, which has the advantage of being able to establish a patient's physical condition, while simultaneously treating the patient with acupuncture. This system implements a sensing pad, amplifier, a small signal drive circuit, and a digital signal processing system, while the use of a built-in fuzzy technique and a control algorithm have been proposed for performing analyses.
1. Introduction
This paper proposes a traditional-style electronic acupuncture system for telemedicine, together with an encryption method for securing patients’ data. The provision of a medical service in dangerous or remote situations, such as on battle fields, would be possible if the pulse signal of patients could be transmitted to doctors based remotely with as little distortion as possible. In this regard, an Internet-based remote transmission system was implemented to conduct noise reduction research. The use of such a system requires the ability to accurately perform a diagnosis using pulse data, and to understand changes in the skin conductivity across the different areas of the body [1 - 4] .
This paper proposes an electronic mechanism for the accurate measurement of pulse data and skin conductivity by objectively measuring physical conditions such as patients’ body type, skin impedance, and blood vessel compliance based on fuzzy rules and body context algorithms. Body areas presenting a negative diagnosis are treated by applying electronic stimuli upon which the returned signal patterns are measured for determining the patient’s conductivity characteristics [5 - 7] . Damaged bodily functions and reduced muscle performance impede blood circulation and lead to a corresponding reduction in oxygen and nutrition supply. Restricted circulation results in the accumulation of bodily waste that is not excreted [8 - 10] .
These symptoms are the main cause of muscle pain. Areas presenting acne, atopic dermatitis, and age spots have a high electrical resistance as they behave similar to insulators. A low oxygen supply and a disruption of the balance in the skin tissue could give rise to inflammation of the skin caused by dead tissue, which would in turn result in atopic dermatitis and age spots. Previous studies attempting to use pulse data for diagnostic purposes were unable to transfer data of this nature electrically as it is influenced by characteristics such as the condition of a patient’s skin tissue, and age and gender-related diseases, all of which complicate the location of the exact point for acupuncture treatment as well as the determination of the duration and strength of the treatment. For these reasons it is particularly challenging to treat elderly people and children for whom damaged or bruised skin tissue is often reported after electronic acupuncture treatment.
This paper proposes the intelligent fuzzy methods [11 - 13] in an attempt to address the problems described above. The method adjusts the duration and intensity of the electronic acupuncture according to the requirements of each individual patient. Moreover, the new method uses a glove-type device to provide multiple stimuli of varying intensities to those areas of the body that require treatment.
2. Electronic Acupuncture Systems Using Security Functions
This paper presents an electronic stimulus system for treatment via the palm of the hand. The system recognizes registered users and retrieves their medical data, before applying the appropriate stimuli. The system improves the reliability of users’ pulse signal by first applying a reference signal to the palm area, after which the response signals are measured using the sensing pads located at the fingertips. Both signals are subsequently compared at MCU with information that was obtained during previous examinations as the physical conditions of the patient are known to the system. The information is processed using the fuzzy algorithm of the system and used to determine customized treatment methods. Following this, adjusted stimulus signals are sent to the sensing pad. Though there are some variations, care has to be taken to ensure that the current does not exceed levels between 16 mA and 50 mA, which the human body would be unable to tolerate as it would cause an irregular heartbeat that could endanger human life. Figure 1 shows the flowchart of the electronic acupuncture system.
PPT Slide
Lager Image
Flowchart showing the pulse signal analysis flow of the electronic acupuncture system.
The skin impedance of the patient is measured at different temperature and humidity levels by applying an intermittent electronic stimulus in the form of a pulse signal with a DC voltage between DC 50 V and 200 V, a current between 500 μ A and 1,500 μ A, and a frequency between 5 Hz and 5 kHz to both the main and the sensing pads. The peak voltage and phase are measured at a given frequency. Traditional acupuncture is problematic and inconvenient, because it causes problems such as bruising and bleeding of the area being treated. Although these shortcomings can be overcome by using an electronic acupuncture system, these systems would still require the determination of the exact treatment area and method for the particular patient. At the time of our research, existing electronic acupuncture systems were unable to provide a satisfactory customized treatment solution for each individual patient by using the sensors in the multi-pads to obtain their medical research data and condition. Previous systems used an AD202 insulation amplifier, which is expensive, but delivers a high performance, as the circuits are designed to limit the amount of current to below 2 mA over the required AC voltage range. However, application of those techniques to the multi-pad system would increase the price of the system considerably, which would make production uncompetitive. Hence, this paper proposes a wireless electronic acupuncture system that does not require an insulation amplifier, but instead relies on an active check functionality to enhance competitiveness at the production stage.
Figure 2 shows the electronic acupuncture system that uses WiBro-based Internet access instead of an RS232C serial connection to obtain the measured pulse signals. After a treatment session, the 28 pulse-signal graphs, intensities and periods are easily saved. A possible signal interference in the form of an electric shock to the computer through the cable can be prevented by changing the connection method from wired to wireless.
PPT Slide
Lager Image
Components of the electronic acupuncture system using a WiBro connection.
Figure 3 shows the interface of a globe-type electronic acupuncture system. The near future will see the development of a mobile phone-based electronic acupuncture system that will have the ability to save blood pressure measurements, an electrocardiogram as well as pulse data to an electronic medical record (EMR) chart. Globe-type electronic acupuncture systems are currently being simulated in preparation for these developments. Many current research efforts are being directed at applying scientific research methodology to traditional medical treatments. This includes combining traditional oriental medical systems with western medical systems and using them cooperatively to advance medical knowledge. This paper proposes a new way of collaboration by applying a secure web-based wireless connection to enable remote diagnosis based on remote access to patients’ data, which is protected using cryptography technology. For this purpose secret keys and a personal health record (PHR) are used to protect patients’ pulse data using a secure image steganography method that offers efficiency and an enhanced level of security. The algorithm utilizes the LSB algorithm to hide a patient’s PHR in a medical image with a secret key. The image steganography technology for pulse data comprises two steps: encoding and decoding.
PPT Slide
Lager Image
Electronic acupuncture monitoring system.
- 2.1 Encoding Phase
Assuming the sender and the receiver share a secret key x beforehand, then the encoding phase works as follows:
  • 1) The sender receives imageiwith pulse data from the electronic acupuncture system database to send to the receiver in a secure way.
  • 2) The sender uses the shared secret key to apply the LSB based steganography algorithm to the pulse signal graph imagei, upon which the secured pulse signal imageCiis generated and sent to the receiver through public channels.
- 2.2 Decoding Phase
The decoding phase works as follows: after the receiver receives the PHR Ci that was secured using steganography, the receiver follows the steps described below to decode the original image i .
- 2.3 Mutual Authentication Scheme
The lightweight mutual authentication scheme is composed of two phases: registration and authentication.
- 2.4 Registration Phase
First, the assumption is made that PHR contains name, gender, age, blood sugar, weight, symptoms, and that the electronic acupuncture system has a shared secret key x beforehand. The patient’s PHR sends a registration request to the electronic acupuncture system that performs the role of manager. The electronic acupuncture system issues the patient’s PHR with secret information V after going through the following registration process. Figure 4 shows the process of the registration phase.
PPT Slide
Lager Image
Registration phase.
  • 1) Calculate the secret informationV=h(PHR||x), where h() denotes a secure one-way hash function such as SHA-256, and ||denotes a concatenation operation.
  • 2) Save PHR to the secure databases.
  • 3) Send (V) to the patient through a secure communication channel.
- 2.5 Mutual Authentication Phase
Figure 5 shows the process of the mutual authentication phase. The patient with a PHR and authentication information V on record proceeds through the following steps to be authenticated with the smart electronic acupuncture system (SEAS).
PPT Slide
Lager Image
Mutual authentication phase.
  • 1) Generate the current authentication request time stamp informationT.
  • 2) Calculate the encryption message C=h(V||T).
  • 3) Send the ISO/IEEE access and authentication request message (C,T) to a SEAS.
After the SEAS receives the authentication request message (C,T), it executes the following steps to finish the authentication process.
  • 4) The validity of the received time stampTis verified by the condition:
  •                     Tc − T ≤ ΔT,
  • where Tc is the received time stamp information from the SEAS, and ΔT is a legitimate time interval including transmission delay. If the above condition is not met, the SEAS denies the authentication request.
  • 5) Final authentication is decided using Eq. (1).
PPT Slide
Lager Image
If Eq. (1) is not correct, the SEAS denies the patient’s authentication request; however, if the validation process passes without problems, the system considers the request to be from a legitimate patient and replies with an ISO/IEEE access response message. Authentication request trials that fail more than three times to automatically lock the patient’s account by the system, which can be reactivated once the patient requests it to be unlocked by providing the required proof.
  • 6) After the patient is successfully authenticated, the SEAS calculates the encrypted message for mutual authentication D = h(T||h(PHR||x)), which it sends to the patient as an ISO/IEEE response message.
  • 7) Once the patient receives the mutual authentication message (D), the patient checks Eq. (2) to decide whether the mutual authentication can be accepted or not.
PPT Slide
Lager Image
If the result of Eq. (2) is correct, the patient is able to confirm mutual authentication to the system, whereupon both the patient and the system execute measurements, which are then transmitted and collected safely.
  • 8) The receiver can extract the PHR and the original pulse signal diagram imageisecurely from the pulse signal diagram image Ci(that was created using steganography) by using the LSB based steganography algorithm and the shared secret keyx. Since the patient’s PHR can be accessed once the recovered pulse-signal diagram imageIhas been authenticated, the proposed steganography methods provide a high level of security.
  • (1) The software that automatically saves the medical data has been simulated for traditional medical devices such as those performing tongue or pulse diagnosis.(2) The web-based SEAS (SW + HW) is implemented and can easily be used for remote diagnosis without limitations in terms of time, location, or user.(3) Upon transfer of the patient’s medical data to the hospital via the internet, the medical record (JPG, BMP) files are prone to tampering or interception, a vulnerability that can be overcome by using the proposed encryption method.(4) The electronic acupuncture system + EMR SW + HW uses simulation and measures the skin impedance to automatically search for a suitable area to which the treatment can be applied.Figure 6shows example of graphic illustration of the process used for a patient’s EMR data encryption.(5) Existing electronic acupuncture systems have dif-ficulty to simultaneously locate multiple spots for treatment. Therefore, this study proposes an effi-cient SW that uses parallel electronic acupuncture stimulation capable of locating multiple spots for treatment.
PPT Slide
Lager Image
Graphic illustration of the process used for a patient#x2019;s electronic medical record (EMR) data encryption.
3. Simulation
Even though the frequency and amplitude of the pulse wave are the most important factors, the waveform state varies for the same patient, depending on the patient’s mood, on whether the measurement is taken before or after a meal, and on the time of day (morning, afternoon, or evening). Moreover, the frequency and amplitude of the pulse wave is influenced by other factors such as drinking a cup of coffee, or feelings of anxiety or fear. In addition, the psychological state of the patient and all other physical conditions are not always constant. Therefore, in this research the patient’s gender, age, and physical condition were considered together with the degree of confidence about the disease, and our new algorithm is based on those considerations.
First, knowledge of the conditional probability P (Hi |E) is required to know the prior probability P (Hj), and the conditional probability P (E |Hj). For example, in the body of the patient the symptoms of the disease, Hi, can be deduced if E represents the symptoms of each disease. However, this data would be insufficient to obtain a realistic value for the probability P (E |Hj). Therefore, in this research, fuzzy rules were used to calculate confidence values based on the understanding of the disease. This was done as follows:
  • CF (H, E) = CF (H, E1 ∧ E2 ∧ E3) = 0.8
  • MB (E1, e) = 0.6, MD (E1, e) = 0, CF (E1, e) = 0.6
  • MB (E2, e) = 0.3, MD (E2, e) = 0, CF (E2, e) = 0.3
  • MB (E3, e) = 0.5, MD (E3, e) = 0, CF (E3, e) = 0.5
  • When it is called,
  • CF (E, e) = CF (E1 ∧ E2 ∧ E3, e)
  • = MB (E1 ∧ E2 ∧ E3, e) - MD (E1 ∧ E ∧ E3, e)
  • = Min (MB (E1, e), MB (E2, e), MB (E3, e)) -
  • Max (MD (E1, e), MD (E2, e), MD (E3, e))
  • Min [0.5, 0.6, 0.3] -0
  • CF (H, e) = CF (E, e) CF (H, E)
  • = 0.3 0.7
  • = 0.21
  • Rule: IF A is t1 THEN C is B2
  • (Fu)
  • fact: A is t1 ’(Fr)
  • conclusion: C is t2 ’
  • (FC)
  • A: clinical patient status
  • C: inference results
  • Fu: rules of the fuzzy number that represents the uncertainty
  • Fr: the fact that is the uncertainty of the fuzzy number
  • FC: conclusion of the fuzzy number that represents the uncertainty
  • V1, V2, V1 ’, V2’: value (values)
  • where the conviction rate (CF) represents as, Fr as a measure indicates the possible
  • RULE
  • IF P amp = Low And
  •   BMI = High And
  •   P_cycle = High And
  •   Tongue coating area= Med And
  • Then
  •   Strongwave = CNF 70
This can be explained as follows: This RULE indicates the degree of confidence to be 70%. Without the use of fuzzy rules, existing methods do not display the degree of confidence in these patients; hence, it is likely to always be classified as a strong wave, assuming a degree of confidence of 100%. For the purposes of this simulation, body mass index (BMI, weight [kg] / height [m 2 ]), rate of the pulse waveform (P_rate), amplitude of the pulse wave form (P_amp), and the Tongue coating area were taken into account. If the patient presents a low degree of confidence in their pulse wave form (P_amp = Low), then it is concluded that the degree of confidence that is required is 80%, which means that 0.8 × 0.7 = 0.56. However, values such as this are difficult to determine with any precision, because the disease may have caused the patient to become exhausted, thereby influencing their pulse strength and rate, and hence, their gender or age-related pulse wave form. Variations in the pulse wave form could also result from other physical conditions.
Fuzzy IF-THEN rules are typically represented in the form of fuzzy reasoning (fuzzy inference) to determine which new relationships can be inferred from a given rule or set of processes. For this purpose max-min inference was used.
  • Input: x is A ’AND y is B’
  • R1: IF x is A1 AND y is B1, THEN z is C1
  • OR R2: IF x is A2 AND y is B2, THEN z is C2
  • ..... ....... ........
  • OR Rn: IF x is An AND y is Bn, THEN z is Cn
Figure 7 shows the fuzzy production rules in which two or more different conclusions will both have a credible value. In this case, the credible conclusion, which is used to re-calculate the value function, is a function of the combined credible values. For example, although some patients have experienced aortic regurgitation, their aortic membrane would be considered normal, if the probability that the probability of 0.3 is 0.7. However, in this ambiguous situation, it would not be possible to judge whether the fuzzy measure of the probability of aortic regurgitation ‘risk’, as suggested by the 0.3 and 0.7 probability, confirms normal aortic membrane function. This situation arises because the physical condition of the patient, the patient’s health condition, and other factors such as the presence of other diseases are only some of the many variables that could exist. A fuzzy set is defined by defining the fuzzy set of fuzzy values associated with all of the elements that belong to a set of values. Thus, in fuzzy sets there are degrees of belonging (or membership), with the respective values of fuzzy sets ranging from 0% (or 0) to 100% (or 1). This contrasts with the concept of an exact value, where only one of the values in a range is correct and all the other values are incorrect. In fuzzy sets and fuzzy values, each of the probabilities in the range from 0% to 100% represents the truth.
PPT Slide
Lager Image
Simulation of the fuzzy inference system.
Oriental doctors should not only judge the basic biological signals such as checking the pulse’s size, strength, and rate, but should also consider a basic and quantitative analysis of the pulse in order to make an accurate diagnosis. In addition, the doctor should consider physical characteristics, such as the thickness of the skin and blood vessels, to reach an accurate conclusion. Therefore, measurement of the blood flow rate is a vital indicator for understanding the blood pressure rate and the methods by which substances are transported in the blood. Existing diagnostic methods are problematic in that they cannot be used to obtain an exact diagnosis of the old and the infirm, because these methods do not take into consideration the patient’s age or gender, or the condition of their skin. This problem was solved by analyzing the fine distinction between variations in the thickness of the skin, blood vessels, and the pulse, to assess their condition in terms of size, strength, and rate. As shown in Figure 8 , the proposed algorithm enables an optimal patient diagnosis that considers the patient’s condition by using an intelligent fuzzy technique.
PPT Slide
Lager Image
Simulation of the electronic acupuncture system using fuzzy rules.
4. Conclusion
In future, hospitals are expected to automatically issue transcriptions and perform remote diagnosis, which means that patients’ data are important and need to be protected. Patients’ transcription data could be compromised as a result of unauthorized access, possibly with lethal results. Hence, personal and sensitive data stored on telemedicine and medical information systems should be encrypted and require the use of login passwords, and personal identification and biological information should similarly be protected in a systematic way. This paper proposes a system based on electronic acupuncture with a built in multi-pad. The advantage of this system is that it has the ability to determine a patient’s physical condition, while simultaneously treating the patient with acupuncture. The system implements a sensing pad, AMP, a small signal drive circuit, and a digital signal processing system and performs analyses by using the proposed built-in fuzzy technique together with a control algorithm. Traditional medical systems consider the pulse rhythm to be important, the reason why it is observed carefully during health checks and diagnoses of diseases. In contrast, this research utilized fuzzy logic and a fuzzy inference rule to estimate the proper treatment duration for each patient. Patients’ physical condition, related diseases, and age-related effects are all assessed using electronic acupuncture. The simulation results showed that the proposed method is more efficient than existing methods.
Conflict of Interest No potential conflict of interest relevant to this article was reported.
You-Sik Hong was born in Seoul, Korea. He received the B.S. degree in electronics engineering from the Kyung Hee University, Seoul, Korea, in 1983, and the M.S. degree in computer science from the New York Institute of Technology, NewYork, U.S.A., in 1989, and Ph.D. degree in automatic control from the Kyung Hee University, Seoul, Korea, in 1997. From 1989-1990, he was a research engineer at the Samsung Electronic Company in Korea. He is currently full professor in Department of Computer Science, Sangji University, Wonju, Korea. His research interests are in the area of fuzzy control, fuzzy expert system, artificial traffic light and neural network problems. He is now a board of Korea Fuzzy Logic and Intelligent System Society (KFIS) and a board of Korean Institute of Electrical Engineers (KIEE).
EunJun Yoon received the B.S. degree in computer science from Kyungpook National University 2007. He is currently an assistant professor in the Department of Cyber Security at Kyungil University. His research interestsare in the area of information security, ubiquitous security, network security, and authentication protocols.
Nojeong Heo received the B.S. degree in Electrical Engineering from Seoul National University, Seoul, Korea, in 1996 and the M.S. and Ph.D. degrees in electrical engineering from Syracuse University, Syracuse, NY, in 1999 and 2004, respectively. He is currently an assistant professor in the Department of Information and Communications Engineering at Dongyang University. His research interests include wireless communication, ad hoc networks, sensor networks, and next-generation mobile networks.
Eun-Ju Kim received his B.S., M.S., and Ph.D. from the Department of Electrical Engineering, Chonnam National University, Korea, in 1991, 2002, and 2012, respectively. He works at Korea Institute of Science and Technology Information (KISTI) from as a senior researcher. His research interests include information processing and analysis.
Youngchul Bae received his B.S., M.S., and Ph.D. from the Department of Electrical Engineering, Kwangwoon University, Korea, in 1984, 1985, and 1997, respectively. He worked at Korea Electric Power Corporation (KEPCO) during 1986-1991, and also worked at Korea Institute of Science and Technology Information (KISTI) during 1991-1997 as a senior researcher. He is currently professor at the Division of Electrical · Electronic Communication and Computer Engineering, Chonnam National University, Yeosu, Korea. His research interests include nonlinear dynamics, chaos dynamics, robot control, intelligent system and motor control. He is member of KIEE, KIECS and KIIS.
Tel: +82-61-659-7315, Fax: +82-61-659-7310
Kim Y. J. 1995 “A meridian system study on Mawangtew medical books and Whang Di Nei Qing,” The Journal of Oriental Medical Classics 9 51 - 86
Kim H. W. 2004 “Meridian system and Bong-Han Theorys Sanal,” The Korean Society Jungshin Science 21th Fall Symposium 37 - 43
Soh K. S. 2003 “Meridian point and meridian system in the Bong-Han Theory,” Gwahaksasang Gwahaksasang 47 68 - 88
Alter M. J. 2004 Science of Flexibility 3rd ed. Human Kinetics Champaign, IL
2002 2001 Health Insurance Review and Evaluation Statistical Yearbook Health Insurance Review Agency Seoul
Finando S. , Finando D. 2011 “Fascia and the mechanism of acupuncture,” Journal of Bodywork and Movement Therapies 15 (2) 168 - 176    DOI : 10.1016/j.jbmt.2010.03.001
Jeong D. M. , Kim Y. J. , Sohn I. C. 1999 “Hydrodynamic analysis for objectification of meridian substance by vibration stimulus of body,” Journal of the Korean Jungshin Science Society 3 (2) 141 - 145
Jeong D. M. , Lee Y. H. , Lee S. R. , Kim K. S. 1999 “Implementation of the visualizing system for meridian by overlapping with bio-signal and image,” Journal of the Korean Jungshin Science Society 3 (2) 133 - 140
“Accelerated photoplethysmograph,” Available
2004 The Outlook of Information and Future War Korea National Defense University Seoul
H. S. Son , J. B. Park , Y. H. Joo 2013 “Intelligent range decision method for figure of merit of sonar equation,” Journal of Korean Institute of Intelligent Systems 23 (4) 304 - 309    DOI : 10.5391/JKIIS.2013.23.4.304
Park M. , Cho H. , Kim K. , Kim S. 2014 “Improvement of bipolar magnetic guidance sensor performance using fuzzy inference system,” Journal of Korean Institute of Intelligent Systems 24 (1) 58 - 63    DOI : 10.5391/JKIIS.2014.24.1.058
Lee T. J. , Sim K. B. 2014 “EEG based vowel feature extraction for speech recognition system using international phonetic alphabet,” Journal of Korean Institute of Intelligent Systems 24 (1) 90 - 95    DOI : 10.5391/JKIIS.2014.24.1.090