Fragile Watermarking for Fingerprint Images Based on QR Decomposition in NSCT-Domain
Received date: 2016-04-07
Revised date: 2017-02-20
Online published: 2017-11-30
Supported by
null
To ensure security of fingerprint information in a network environment, a fragile watermarking algorithm for fingerprint images based on QR decomposition in the nonsubsampled contourlet transform (NSCT) domain is proposed. The fingerprint watermark is prepared by double encryption using Arnold transform and logistic scrambling. Twolevel NSCT is performed on a host image, and the low frequency component is divided into blocks with QR decomposition. The encrypted fingerprint watermark is embedded into the upper triangular matrix obtained with QR decomposition. The algorithm has good fidelity of the information because entries in the first row of the upper triangular matrix contain most information in the image. Experimental results show that, keeping invisibility, the proposed algorithm is vulnerable to both conventional image processing and geometric attacks, and therefore can accurately locate the tampered area.
SHI Jun-peng, WU Yi-quan . Fragile Watermarking for Fingerprint Images Based on QR Decomposition in NSCT-Domain[J]. Journal of Applied Sciences, 2017 , 35(6) : 735 -744 . DOI: 10.3969/j.issn.0255-8297.2017.06.007
[1] Jain A K, Uludag U. Hiding fingerprint minutiae in images[C]//Proceedings of Automatic Identification Advanced Technologies, New York, 2002:97-102.
[2] 张毅刚,焦玉华,牛夏牧,俞龙江. 基于指纹特征数字水印算法的身份认证技术研究[J]. 电子学报,2003, 31(12A):2131-2134. Zhang Y G, Jiao Y H, Niu X M, Yu L J. Authentication based on fingerprint feature watermarking algorithm[J]. Acta Electronica Sinica, 2003, 31(12A):2131-2134. (in Chinese)
[3] 蔡龙飞,赵慧民,方艳梅. 一种公钥密码体制下指纹识别与数字水印的身份认证协议[J]. 中山大学学报(自然科学版),2013, 52(4):51-57. Cai L F,Zhao H M,Fang Y M. An identity authentication protocol of the public key infrastructure combining fingerprint identification with digital watermarking[J]. Acta Scientiarum Naturalium Universitatis Sunyatseni, 2013, 52(4):51-57. (in Chinese)
[4] Ashokarajan R, Angelinjosphia R, Gayathri P, Rajendran T. A novel approach for secure ATM transactions using fingerprint watermarking[C]//IEEE Conference on Advanced Computing, Chennai, 2013:547-552.
[5] Zebbiche K, Khelifi F. Efficient wavelet-based perceptual watermark masking for robust fingerprint image watermarking[J]. IET Image Processing, 2014, 8(1):23-32.
[6] Lin E T, Delp E J. A review of fragile image watermarks[C]//Multimedia and Security Workshop, Orlando, 1999:25-29.
[7] 宋玉杰,谭铁牛. 基于脆弱性数字水印的图象完整性验证研究[J]. 中国图象图形学报,2003, 8(1):4-10. Song Y J, Tan T N. A brief review on fragile watermarking based image authentication[J]. Journal of Image and Graphics, 2003, 8(1):4-10. (in Chinese)
[8] Chang C C, Chen K N, Lee C F. A secure fragile watermarking scheme based on chaos-andhamming code[J]. Journal of Systems and Software, 2011, 84(9):1462-1470.
[9] 王国栋,刘粉林,刘媛,姚刚. 一种能区分水印或内容篡改的脆弱水印算法[J]. 电子学报,2008, 36(7):1349-1354. Wang G D, Liu F L, Liu Y, Yao G. An image authentication scheme with discrimination of tampers on watermark or image[J]. Acta Electronica Sinica, 2008, 36(7):1349-1354. (in Chinese)
[10] 金喜子,姜文哲. 块级篡改定位的JPEG图像脆弱水印[J]. 电子学报,2010, 38(7):1585-1589. Jin X Z, Jiang W Z. Fragile watermarking capable of locating tampered blocks in JPEG images[J]. Acta Electronica Sinica, 2010, 38(7):1585-1589. (in Chinese)
[11] 和红杰,张家树. 基于混沌置乱的分块自嵌入水印算法[J]. 通信学报,2006, 27(7):80-86. He H J, Zhang J S. Chaos-based scramble self-embedding watermarking algorithm[J]. Journal on Communications, 2006, 27(7):80-86. (in Chinese)
[12] 和红杰,张家树. 基于混沌的自嵌入安全水印算法[J]. 物理学报,2007, 56(6):3092-3100. He H J, Zhang J S. A chaos-based self-embedding secure watermarking algorithm[J]. Acta Physica Sinica, 2007, 56(6):3092-3100. (in Chinese)
[13] Hu H T, Hsu L Y. Robust, transparent and high-capacity audio watermarking in DCT domain[J]. Signal Processing, 2015, 109(4):226-235.
[14] 彭玉楼,何怡刚. 基于小波和混沌映射的函数水印算法[J]. 仪器仪表学报,2011, 31(12):2768-2773. Peng Y L, He Y G. Functional watermarking algorithm based on wavelet transform and chaotic map[J]. Chinese Journal of Scientific Instrument, 2011, 31(12):2768-2773. (in Chinese)
[15] Akhaee M A, Sahraeian S M E, Marvasti F. Contourlet-based image watermarking using optimum detector in a noisy environment[J]. IEEE Transactions on Image Processing, 2010, 19(4):967-980.
[16] Tianyu Y E, Niu X X, Yang Y X. Fragile authentication watermark based on singular value decomposition and chaotic mapping[J]. Opto-electronic Engineering, 2008, 35(9):138-144.
[17] 杨卫民,蔡键. 一种自嵌入的图像脆弱水印算法[J]. 小型微型计算机系统,2011, 32(1):169-172. Yang W M, Cai J. Image fragile watermarking algorithm of self-embedding[J]. Journal of Chinese Computer Systems, 2011, 32(1):169-172. (in Chinese)
[18] 刘东彦,刘文波,张弓. 图像内容可恢复的半脆弱水印技术研究[J]. 中国图象图形学报,2010, 15(1):20-25. Liu D Y, Liu W B, Zhang G. Research of recoverable semi-fragile watermarking for image content[J]. Journal of Image and Graphics, 2010, 15(1):20-25. (in Chinese)
[19] 李娟. 离散小波变换和正交三角分解相融合的图像水印算法[J]. 激光杂志,2015, 36(9):72-76. Li J. An audio watermarking algorithm based on DWT-QR[J]. Laser Journal, 2015, 36(9):72-76. (in Chinese)
[20] 尹义龙,宁新宝,张晓梅. 改进的指纹细节特征提取算法[J]. 中国图象图形学报,2002, 7(12):1302-1306. Yin Y L, Ning X B, Zhang X M. An improved algorithm for minutiae extraction in fingerprint images[J]. Journal of Image and Graphics, 2002, 7(12):1302-1306. (in Chinese)
/
| 〈 |
|
〉 |