信号与信息处理

基于QR分解的NSCT域指纹图像脆弱水印算法

展开
  • 1. 南京航空航天大学 电子信息工程学院, 南京 211106;
    2. 南京理工大学 江苏省社会安全图像与视频理解重点实验室, 南京 210094
吴一全,教授,博导,研究方向:图像处理与分析、生物特征识别与数字水印、目标检测与识别、视觉检测与图像测量等,E-mail:nuaaimage@163.com

收稿日期: 2016-04-07

  修回日期: 2017-02-20

  网络出版日期: 2017-11-30

基金资助

国家自然科学基金(No.61573183);江苏省社会安全图像与视频理解重点实验室(南京理工大学)开放基金(No.JSKL201302);江苏高校优势学科建设工程项目基金(2012)资助

Fragile Watermarking for Fingerprint Images Based on QR Decomposition in NSCT-Domain

Expand
  • 1. College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China;
    2. Jiangsu Key Laboratory of Image and Video Understanding for Social Safety, Nanjing University of Science and Technology, Nanjing 210094, China

Received date: 2016-04-07

  Revised date: 2017-02-20

  Online published: 2017-11-30

Supported by

null

摘要

为保证指纹信息在网络传输中的安全性,提出一种基于QR分解的非下采样contourlet变换(non-subsampled contourlet transform,NSCT)域指纹图像脆弱水印算法.首先用Arnold变换和Logistic置乱对指纹水印进行双重加密待用.将宿主图像进行两层NSCT分解,提取出低频分量进行分块处理,对所有分块都进行QR分解,得到多个上三角矩阵.由于图像QR分解后大部分信息集中于上三角矩阵的首行元素,具有较好的信息保真能力,因此将加密后的指纹水印嵌入上三角矩阵.实验结果表明,该算法在保证不可感知性的前提下,对于常规图像处理和一般几何攻击都具有很好的脆弱性,并且能够精确地定位出篡改区域.

本文引用格式

史骏鹏, 吴一全 . 基于QR分解的NSCT域指纹图像脆弱水印算法[J]. 应用科学学报, 2017 , 35(6) : 735 -744 . DOI: 10.3969/j.issn.0255-8297.2017.06.007

Abstract

To ensure security of fingerprint information in a network environment, a fragile watermarking algorithm for fingerprint images based on QR decomposition in the nonsubsampled contourlet transform (NSCT) domain is proposed. The fingerprint watermark is prepared by double encryption using Arnold transform and logistic scrambling. Twolevel NSCT is performed on a host image, and the low frequency component is divided into blocks with QR decomposition. The encrypted fingerprint watermark is embedded into the upper triangular matrix obtained with QR decomposition. The algorithm has good fidelity of the information because entries in the first row of the upper triangular matrix contain most information in the image. Experimental results show that, keeping invisibility, the proposed algorithm is vulnerable to both conventional image processing and geometric attacks, and therefore can accurately locate the tampered area.

参考文献

[1] Jain A K, Uludag U. Hiding fingerprint minutiae in images[C]//Proceedings of Automatic Identification Advanced Technologies, New York, 2002:97-102.
[2] 张毅刚,焦玉华,牛夏牧,俞龙江. 基于指纹特征数字水印算法的身份认证技术研究[J]. 电子学报,2003, 31(12A):2131-2134. Zhang Y G, Jiao Y H, Niu X M, Yu L J. Authentication based on fingerprint feature watermarking algorithm[J]. Acta Electronica Sinica, 2003, 31(12A):2131-2134. (in Chinese)
[3] 蔡龙飞,赵慧民,方艳梅. 一种公钥密码体制下指纹识别与数字水印的身份认证协议[J]. 中山大学学报(自然科学版),2013, 52(4):51-57. Cai L F,Zhao H M,Fang Y M. An identity authentication protocol of the public key infrastructure combining fingerprint identification with digital watermarking[J]. Acta Scientiarum Naturalium Universitatis Sunyatseni, 2013, 52(4):51-57. (in Chinese)
[4] Ashokarajan R, Angelinjosphia R, Gayathri P, Rajendran T. A novel approach for secure ATM transactions using fingerprint watermarking[C]//IEEE Conference on Advanced Computing, Chennai, 2013:547-552.
[5] Zebbiche K, Khelifi F. Efficient wavelet-based perceptual watermark masking for robust fingerprint image watermarking[J]. IET Image Processing, 2014, 8(1):23-32.
[6] Lin E T, Delp E J. A review of fragile image watermarks[C]//Multimedia and Security Workshop, Orlando, 1999:25-29.
[7] 宋玉杰,谭铁牛. 基于脆弱性数字水印的图象完整性验证研究[J]. 中国图象图形学报,2003, 8(1):4-10. Song Y J, Tan T N. A brief review on fragile watermarking based image authentication[J]. Journal of Image and Graphics, 2003, 8(1):4-10. (in Chinese)
[8] Chang C C, Chen K N, Lee C F. A secure fragile watermarking scheme based on chaos-andhamming code[J]. Journal of Systems and Software, 2011, 84(9):1462-1470.
[9] 王国栋,刘粉林,刘媛,姚刚. 一种能区分水印或内容篡改的脆弱水印算法[J]. 电子学报,2008, 36(7):1349-1354. Wang G D, Liu F L, Liu Y, Yao G. An image authentication scheme with discrimination of tampers on watermark or image[J]. Acta Electronica Sinica, 2008, 36(7):1349-1354. (in Chinese)
[10] 金喜子,姜文哲. 块级篡改定位的JPEG图像脆弱水印[J]. 电子学报,2010, 38(7):1585-1589. Jin X Z, Jiang W Z. Fragile watermarking capable of locating tampered blocks in JPEG images[J]. Acta Electronica Sinica, 2010, 38(7):1585-1589. (in Chinese)
[11] 和红杰,张家树. 基于混沌置乱的分块自嵌入水印算法[J]. 通信学报,2006, 27(7):80-86. He H J, Zhang J S. Chaos-based scramble self-embedding watermarking algorithm[J]. Journal on Communications, 2006, 27(7):80-86. (in Chinese)
[12] 和红杰,张家树. 基于混沌的自嵌入安全水印算法[J]. 物理学报,2007, 56(6):3092-3100. He H J, Zhang J S. A chaos-based self-embedding secure watermarking algorithm[J]. Acta Physica Sinica, 2007, 56(6):3092-3100. (in Chinese)
[13] Hu H T, Hsu L Y. Robust, transparent and high-capacity audio watermarking in DCT domain[J]. Signal Processing, 2015, 109(4):226-235.
[14] 彭玉楼,何怡刚. 基于小波和混沌映射的函数水印算法[J]. 仪器仪表学报,2011, 31(12):2768-2773. Peng Y L, He Y G. Functional watermarking algorithm based on wavelet transform and chaotic map[J]. Chinese Journal of Scientific Instrument, 2011, 31(12):2768-2773. (in Chinese)
[15] Akhaee M A, Sahraeian S M E, Marvasti F. Contourlet-based image watermarking using optimum detector in a noisy environment[J]. IEEE Transactions on Image Processing, 2010, 19(4):967-980.
[16] Tianyu Y E, Niu X X, Yang Y X. Fragile authentication watermark based on singular value decomposition and chaotic mapping[J]. Opto-electronic Engineering, 2008, 35(9):138-144.
[17] 杨卫民,蔡键. 一种自嵌入的图像脆弱水印算法[J]. 小型微型计算机系统,2011, 32(1):169-172. Yang W M, Cai J. Image fragile watermarking algorithm of self-embedding[J]. Journal of Chinese Computer Systems, 2011, 32(1):169-172. (in Chinese)
[18] 刘东彦,刘文波,张弓. 图像内容可恢复的半脆弱水印技术研究[J]. 中国图象图形学报,2010, 15(1):20-25. Liu D Y, Liu W B, Zhang G. Research of recoverable semi-fragile watermarking for image content[J]. Journal of Image and Graphics, 2010, 15(1):20-25. (in Chinese)
[19] 李娟. 离散小波变换和正交三角分解相融合的图像水印算法[J]. 激光杂志,2015, 36(9):72-76. Li J. An audio watermarking algorithm based on DWT-QR[J]. Laser Journal, 2015, 36(9):72-76. (in Chinese)
[20] 尹义龙,宁新宝,张晓梅. 改进的指纹细节特征提取算法[J]. 中国图象图形学报,2002, 7(12):1302-1306. Yin Y L, Ning X B, Zhang X M. An improved algorithm for minutiae extraction in fingerprint images[J]. Journal of Image and Graphics, 2002, 7(12):1302-1306. (in Chinese)

文章导航

/