应用科学学报 ›› 2017, Vol. 35 ›› Issue (6): 735-744.doi: 10.3969/j.issn.0255-8297.2017.06.007

• 信号与信息处理 • 上一篇    下一篇

基于QR分解的NSCT域指纹图像脆弱水印算法

史骏鹏1, 吴一全1,2   

  1. 1. 南京航空航天大学 电子信息工程学院, 南京 211106;
    2. 南京理工大学 江苏省社会安全图像与视频理解重点实验室, 南京 210094
  • 收稿日期:2016-04-07 修回日期:2017-02-20 出版日期:2017-11-30 发布日期:2017-11-30
  • 作者简介:吴一全,教授,博导,研究方向:图像处理与分析、生物特征识别与数字水印、目标检测与识别、视觉检测与图像测量等,E-mail:nuaaimage@163.com
  • 基金资助:

    国家自然科学基金(No.61573183);江苏省社会安全图像与视频理解重点实验室(南京理工大学)开放基金(No.JSKL201302);江苏高校优势学科建设工程项目基金(2012)资助

Fragile Watermarking for Fingerprint Images Based on QR Decomposition in NSCT-Domain

SHI Jun-peng1, WU Yi-quan1,2   

  1. 1. College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China;
    2. Jiangsu Key Laboratory of Image and Video Understanding for Social Safety, Nanjing University of Science and Technology, Nanjing 210094, China
  • Received:2016-04-07 Revised:2017-02-20 Online:2017-11-30 Published:2017-11-30

摘要:

为保证指纹信息在网络传输中的安全性,提出一种基于QR分解的非下采样contourlet变换(non-subsampled contourlet transform,NSCT)域指纹图像脆弱水印算法.首先用Arnold变换和Logistic置乱对指纹水印进行双重加密待用.将宿主图像进行两层NSCT分解,提取出低频分量进行分块处理,对所有分块都进行QR分解,得到多个上三角矩阵.由于图像QR分解后大部分信息集中于上三角矩阵的首行元素,具有较好的信息保真能力,因此将加密后的指纹水印嵌入上三角矩阵.实验结果表明,该算法在保证不可感知性的前提下,对于常规图像处理和一般几何攻击都具有很好的脆弱性,并且能够精确地定位出篡改区域.

关键词: NSCT变换, 脆弱水印, 指纹图像, QR分解, 篡改定位

Abstract:

To ensure security of fingerprint information in a network environment, a fragile watermarking algorithm for fingerprint images based on QR decomposition in the nonsubsampled contourlet transform (NSCT) domain is proposed. The fingerprint watermark is prepared by double encryption using Arnold transform and logistic scrambling. Twolevel NSCT is performed on a host image, and the low frequency component is divided into blocks with QR decomposition. The encrypted fingerprint watermark is embedded into the upper triangular matrix obtained with QR decomposition. The algorithm has good fidelity of the information because entries in the first row of the upper triangular matrix contain most information in the image. Experimental results show that, keeping invisibility, the proposed algorithm is vulnerable to both conventional image processing and geometric attacks, and therefore can accurately locate the tampered area.

Key words: fragile watermarking, fingerprint image, non-subsampled contourlet transform (NSCT), tamper localization, QR decomposition

中图分类号: