CN108549796A - The method for the power that passed into silence by digital watermark technology protection user - Google Patents
The method for the power that passed into silence by digital watermark technology protection user Download PDFInfo
- Publication number
- CN108549796A CN108549796A CN201810379280.XA CN201810379280A CN108549796A CN 108549796 A CN108549796 A CN 108549796A CN 201810379280 A CN201810379280 A CN 201810379280A CN 108549796 A CN108549796 A CN 108549796A
- Authority
- CN
- China
- Prior art keywords
- data
- watermark
- clouds
- owner
- authentication center
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000005516 engineering process Methods 0.000 title claims abstract description 16
- 238000012795 verification Methods 0.000 claims description 13
- 238000012217 deletion Methods 0.000 claims description 10
- 230000037430 deletion Effects 0.000 claims description 10
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 9
- 238000000605 extraction Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000012946 outsourcing Methods 0.000 abstract description 4
- 238000011084 recovery Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000013139 quantization Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- YBJHBAHKTGYVGT-ZKWXMUAHSA-N (+)-Biotin Chemical compound N1C(=O)N[C@@H]2[C@H](CCCCC(=O)O)SC[C@@H]21 YBJHBAHKTGYVGT-ZKWXMUAHSA-N 0.000 description 1
- 238000009412 basement excavation Methods 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
- FEPMHVLSLDOMQC-UHFFFAOYSA-N virginiamycin-S1 Natural products CC1OC(=O)C(C=2C=CC=CC=2)NC(=O)C2CC(=O)CCN2C(=O)C(CC=2C=CC=CC=2)N(C)C(=O)C2CCCN2C(=O)C(CC)NC(=O)C1NC(=O)C1=NC=CC=C1O FEPMHVLSLDOMQC-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
User is protected to pass into silence the method for power by digital watermark technology the invention discloses a kind of; this method supports user's outsourcing clear data; ensure high in the clouds in the request for receiving user simultaneously; delete user data; otherwise the dishonest conduct in high in the clouds will be traced back to, and then maintain the power of passing into silence of user.
Description
Technical field
The present invention relates to digital watermarkings and technical field of cryptology, more particularly to a kind of protected by digital watermark technology to use
Family passes into silence the method for power.
Background technology
With increasing rapidly for data volume, demand also therewith sharp increase of the people to memory space.Cloud storage technology
It comes into being in this case, proposes the storage i.e. concept of service.Cloud storage has provided i.e. cheap and sufficient storage to the user
Space.Local datastore beyond the clouds, is correspondingly just lost the control to its data by people.One, certain day user is not
It needs to store significant data beyond the clouds, just requires his these data of Cloud Server complete deletion.Cloud respond user it
Data are deleted, his data of the genuine complete deletion of cloud but user is uncertain about.And currently popular cloud storage structure pair
Data are backed up, with the unexpected generation that is against any misfortune.Finally, the data being backed up are distributed under not collinear upper or line
In storage server.So even if cloud deletes the data of current memory space, it is also possible to not delete all of corresponding data
Backup.
In order to ensure user after request cloud deletes data, the high in the clouds genuine complete deletion data, some scholars propose
Ciphertext data are uploaded, user oneself preserves encrypted key, and when user wants to delete the data of oneself, user, which just deletes, to be added
Close key makes the data of storage beyond the clouds become mixed and disorderly ciphertext, other people can not understand in text obtaining the ciphertext
Content.But more service providers need to collect public data at present, carry out data analysis and excavation, not to ciphertext data
It is received.
Outsourcing clear data so that user can efficiently use cloud computing service, such as to scheme to search figure, picture editting etc.
Service.However when user uploads clear data, which needs cloud will be according to the request complete deletion of oneself oneself not
The data needed, to maintain the power of passing into silence of oneself.But there is presently no the data for outsourcing plaintext version, protection is used
Family passes into silence the scheme of power.
Invention content
User is protected to pass into silence the method for power by digital watermark technology the object of the present invention is to provide a kind of.
The purpose of the present invention is what is be achieved through the following technical solutions:
A method of protect user to pass into silence power by digital watermark technology, including:
Data upload the stage:Pass through the ownership watermark O of data ownerWAnd the generation of watermark authentication center is unique
For marking the watermark W of high in the clouds identityCAfter handling data X, it is sent to high in the clouds and is stored;
The data retrieval stage:The unique watermark for being used for flag data owner's identity generated by watermark authentication center
WOAfter handling data to be retrieved in storing beyond the clouds, it is sent to data owner;
Data delete the stage:When data upload, data upload after the completion of, when data retrieval or data retrieval complete
Afterwards, by watermark authentication center according to the data-delete command of the transmission of data owner, corresponding data is sent to high in the clouds and are deleted
Order makes high in the clouds delete corresponding data;
Arbitration phase:Data owner completes after data upload, if it find that a doubtful copy Y of data X, then basis
The ownership watermark O' extracted from doubtful copy YWWith the ownership watermark O of data ownerWBetween matching degree, to judge to doubt
Whether belong to data X like copy Y;If so, the water by being used for marking high in the clouds identity in the doubtful copy Y of watermark authentication center extraction
Print W'CAnd the watermark W' for flag data owner's identityO, and data is combined to upload stage and/or the production of data retrieval stage
Raw watermark WCAnd/or WOJudge whether doubtful copy Y is leaked by high in the clouds, to protecting the power of passing into silence of user.
As seen from the above technical solution provided by the invention, it supports user's outsourcing clear data, while ensureing high in the clouds
In the request for receiving user, user data is deleted, otherwise the dishonest conduct in high in the clouds will be traced back to, and then maintain user
The power of passing into silence.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment
Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this
For the those of ordinary skill in field, without creative efforts, other are can also be obtained according to these attached drawings
Attached drawing.
Fig. 1 be it is provided in an embodiment of the present invention it is a kind of by digital watermark technology protect user pass into silence power method stream
Cheng Tu;
Fig. 2 is the flow chart that data provided in an embodiment of the present invention upload the stage;
Fig. 3 is the flow chart in data retrieval stage provided in an embodiment of the present invention;
Fig. 4 is the power system capacity schematic diagram under difference m provided in an embodiment of the present invention;
Fig. 5 is the power system capacity schematic diagram under difference W provided in an embodiment of the present invention.
Specific implementation mode
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on this
The embodiment of invention, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, belongs to protection scope of the present invention.
The embodiment of the present invention provides a kind of method for the power that passes into silence by digital watermark technology protection user, as shown in Figure 1,
It includes mainly:
Data upload the stage:Pass through the ownership watermark O of data ownerWAnd the generation of watermark authentication center is unique
For marking the watermark W of high in the clouds identityCAfter handling data X, it is sent to high in the clouds and is stored;
The data retrieval stage:The unique watermark for being used for flag data owner's identity generated by watermark authentication center
WOAfter handling data to be retrieved in storing beyond the clouds, it is sent to data owner;
Data delete the stage:When data upload, data upload after the completion of, when data retrieval or data retrieval complete
Afterwards, by watermark authentication center according to the data-delete command of the transmission of data owner, corresponding data is sent to high in the clouds and are deleted
Order makes high in the clouds delete corresponding data;
Arbitration phase:If data owner has found that a doubtful copy Y of data X, basis are carried from doubtful copy Y
The ownership watermark O' takenWWith the ownership watermark O of data ownerWBetween matching degree, to judge whether doubtful copy Y belongs to
Data X;If so, the watermark W' by being used for marking high in the clouds identity in the doubtful copy Y of watermark authentication center extractionCAnd for marking
Remember the watermark W' of data owner's identityO, and data is combined to upload the watermark W that stage and/or data retrieval stage generateCAnd/or
WOJudge whether doubtful copy Y is leaked by high in the clouds, to protecting the power of passing into silence of user.
In the embodiment of the present invention, based on Public Key Infrastructure, the Watermarking Protocol between the high in the clouds and user of proposition,
In include three different roles:The watermark authentication center of data owner, high in the clouds and honesty, are abbreviated as O, C and WCA respectively.
Data involved by the embodiment of the present invention can there are many forms, for example, image, audio and document etc..
A large amount of data are being locally stored in data owner, these data occupy local a large amount of memory space.By
It is the user of cloud storage service in data owner, cloud storage service can be enjoyed, therefore data owner can be by local
Data upload to cloud server storage, to reduce local amount of storage.Data owner possesses the public private key pair being certified,
It is denoted as (pkO,skO), the ID number of data owner is denoted as IDO。
Cloud service provider provides and manages many cloud storage service devices, provides a large amount of memory space to the user.High in the clouds possesses
Public private key pair, be denoted as (pkC,skC), the ID number of high in the clouds C is denoted as IDC。
Watermark authentication center is a honest third party, is responsible for generating watermark, embedded watermark and passes through Detection and Extraction water
Print verifies whether that the presence of watermark, the assigned public private key pair in watermark authentication center are denoted as (pkWCA,skWCA)。
Detailed introduction is done below for each stage.
One, data upload the stage.
As shown in Fig. 2, uploading the flow chart in stage for data, main process is as follows:
1, data owner O sends the ID number ID of itself before uploading data XOWith an odd-numbered n to high in the clouds
C indicates that data owner O will upload data X to high in the clouds C.
In the embodiment of the present invention, odd-numbered n, which represents user, will upload data, naturally it is also possible to directly transmit upload life
It enables.
2, high in the clouds C is in the ID number ID for receiving data owner OOAfter odd-numbered n, the ID number of high in the clouds C is sent
IDCData owner O is given with odd-numbered n, indicates that high in the clouds is already prepared to receive data X.
3, after data owner O receives the data that high in the clouds C is returned, an embedded ownership watermark O in data XW, obtain
Obtain dataAnd utilize high in the clouds public key pkCIt is encrypted, obtains ciphertext dataLater, by ciphertext dataThe ID number ID of data owner OO, odd-numbered n, high in the clouds C ID number IDCAnd data owner O with
The signature in high in the cloudsIt is sent to watermark authentication center WCA.
4, after watermark authentication center WCA receives above-mentioned data, to signatureInto
Row verification then generates a unique watermark W for being used for marking high in the clouds identity if the verification passesC, and use high in the clouds public key pkC
Encrypted watermark WC, obtain ciphertext watermarkThen, by ciphertext watermarkIt is embedded in ciphertext data
In, obtain ciphertext watermark dataWherein,Represent watermark embedding operation;Later,
Watermark authentication center WCA is by ciphertext watermark dataThe ID number ID of odd-numbered n, data owner OO, Yi Jishui
Print the signature between authentication center WCA and high in the clouds CIt is sent to high in the clouds.
It will be understood by those skilled in the art that homomorphism may be implemented in encrypted domain EOperation.
Meanwhile watermark authentication center WCA records the information involved by the data upload stage in the table of itself, such as table 1
It is shown, include mainly:The ID number ID of data owner OO, odd-numbered n, high in the clouds C ID number IDC, unique be used for marking
The watermark W of high in the clouds identityCAnd the signature between watermark authentication center WCA and high in the clouds C
Information involved by the 1 data upload stage of table
5, after high in the clouds receives the information that watermark authentication center WCA is sent, verification signatureIntegrality and correctness, if by verification, utilize the private key sk of itselfCTo close
Literary watermark dataIt is decrypted, obtain plaintext version and carries watermark WCWatermark dataAnd it stores.
It will be understood by those skilled in the art that the watermark data that high in the clouds is storedIt is initially uploaded with data owner
The content of data X is essentially identical, differs only in watermark dataAlso it is embedded in the ownership watermark O of data ownerW, with
And for marking the watermark W of high in the clouds identityC。
Two, the data retrieval stage.
As shown in figure 3, uploading the flow chart in stage for data, main process is as follows:
1, data owner O sends the ID number ID of itself before fetching data XOWith an even-numbered n '=n+1
High in the clouds C is given, indicates that data owner O fetches data X to high in the clouds C.
In the embodiment of the present invention, even-numbered n ', which represents user, will fetch data, naturally it is also possible to directly transmit and fetch life
It enables.
2, high in the clouds C is in the ID number ID for receiving data owner OOAfter even-numbered n ', the ID number of high in the clouds C is sent
IDCData owner O is given with even-numbered n ', indicates that high in the clouds is already prepared to down-transmitting data X.
3, high in the clouds C utilizes the public key pk of data owner OOTo corresponding watermark dataIt is encrypted, obtains ciphertext water
Printing evidenceLater, by even-numbered n ', ciphertext watermark dataThe ID number ID of high in the clouds CC, data
The ID number ID of owner OOAnd the signature of data owner O and high in the cloudsIt sends
Give watermark authentication center WCA.
4, after watermark authentication center WCA receives above-mentioned data, to signature
It is verified, if the verification passes, then generates a unique watermark W for being used for flag data owner's identityO, and use number
According to the public key pk of the ownerOEncrypted watermark WO, the ciphertext watermark of acquisitionThen, by ciphertext watermarkIt is embedded
To ciphertext watermark dataObtain new ciphertext watermark dataIts
In,Represent watermark embedding operation;Later, watermark authentication center WCA is by even-numbered n ', new ciphertext watermark dataThe ID number ID of data owner OOAnd the signature between watermark authentication center WCA and data owner OIt is sent to data owner O.
Meanwhile watermark authentication center WCA records the information involved by the data retrieval stage in the table of itself, such as table 2
It is shown, include mainly:The ID number ID of data owner OO, even-numbered n ', high in the clouds C ID number IDC, unique be used for marking
Remember the watermark W of high in the clouds identityC, the unique watermark W for being used for flag data owner's identityO, watermark authentication center WCA and high in the clouds C
Between signatureAnd the signature between watermark authentication center WCA and data owner O
Information involved by the 2 data retrieval stage of table
5, after data owner receives the information that watermark authentication center WCA is sent, verification signatureIntegrality and correctness, if by verification, utilize the private key sk of itselfODecryptionObtain plaintext version and carry watermark WOData
It will be understood by those skilled in the art that the data that data owner finally obtainsThe watermark stored with high in the clouds
DataContent it is essentially identical, differ only in, dataIn be embedded in the watermark for flag data owner's identity
WO.That is, dataCompared with the data X that data owner initially uploads, it is only embedded in the ownership of data owner
Watermark OW, for marking the watermark W of high in the clouds identityC, and for the watermark W of flag data owner's identityO, main data
Content does not change.
Three, data delete the stage.
Data owner can delete its data of storage beyond the clouds at any time, for example, when data upload, in data
After the completion of biography, when data retrieval or after the completion of data retrieval etc..
The process that data delete the stage is as follows:
If 1, data owner needs to delete the data X of high in the clouds storage, odd-numbered n, data owner O are sent
ID number IDO, high in the clouds C ID number IDCAnd delete command gives watermark authentication center WCA;
2, watermark authentication center WCA sends the ID number ID of odd-numbered n, data owner OOWith delete command to high in the clouds
C;
3, all copies of the data X of storage are deleted in high in the clouds, and are returned all to delete and replied to watermark authentication center
WCA。
Meanwhile watermark authentication center WCA records the information involved by the data deletion stage in the table of itself, such as table 3
It is shown, include mainly:The ID number ID of data owner OO, odd-numbered n, high in the clouds C ID number IDC, unique be used for marking
The watermark W of high in the clouds identityC, the unique watermark W for being used for flag data owner's identityO, watermark authentication center WCA and high in the clouds C it
Between signatureSignature between watermark authentication center WCA and data owner OAnd the label whether data X has deleted.
Information involved by the 3 data deletion stage of table
Four, arbitration phase.
After data owner, which completes data, to be uploaded, it is likely to carry out arbitration phase.
If it find that a doubtful copy Y, data owner O and watermark authentication center WCA of data X pass through a under type
Differentiate incredible high in the clouds.
1, the ownership watermark O' that data owner O is extracted from doubtful copy YWIf ownership watermark O'WWith data institute
The ownership watermark O for the person of havingWBetween matching degree be more than certain threshold value, be more than certain threshold value, then judge that doubtful copy Y belongs to data
X, and further judged by watermark authentication center WCA;Otherwise, termination process.
2, the watermark W' for being used for marking high in the clouds identity in doubtful copy Y is extracted by watermark authentication center WCACAnd for marking
Remember the watermark W' of data owner's identityO, and data is combined to upload the watermark W that stage and data retrieval stage generateCWith WOAnd
The information recorded in itself table judges whether doubtful copy Y is leaked by high in the clouds, to protecting the power of passing into silence of user.Work as water
Print W'CWith the watermark W for uniquely being used for marking high in the clouds identity recorded in the respective entries in tableCMatching degree is more than threshold value
When, following three kinds of situations:
If 1) there is no record to be uniquely used for the watermark W of flag data owner's identity in the respective entries in tableO,
And have recorded delete command, then it is assumed that data owner, which does not send out, fetches order, only has issued delete command, but high in the clouds does not have
Have and deletes corresponding data as requested and have leaked corresponding data;
If 2) there is no record to be uniquely used for the watermark W of flag data owner's identity in the respective entries in tableO,
And there is no record deletion order, then it is assumed that data owner, which does not send out, fetches order and delete command, but high in the clouds has leaked phase
Answer data;
If 3) watermark W'OWith if flag data owner's body is uniquely used for recorded in the respective entries in table
The watermark W of partOMatching degree is more than threshold value, then it is assumed that doubtful copy Y comes from data owner;At this point, no matter data whether
Deleted or data whether leakage part is unrelated with high in the clouds.
It is introduced with reference to a specific example.
In this example, as long as specific encipherment scheme and watermarking project can be met the requirements, you can use.
Data in this example select 1000 width difference gray level images by taking image as an example, and the size of image is all 512 ×
512, as this exemplary image library, the quality of image after embedded watermark is tested using Y-PSNR PSNR, uses accuracy
The quality of BCR Test extraction watermarks.
Homomorphic cryptography method is encrypted using Paillier, and key length is more than 1024 bits.Consider do not have in homomorphic cryptography
Decimal, quantization decimal are the quantizing factor S=2 of integer16。
The ownership watermark O of data owner OW, it is embedded in similar method using with second generation watermark, α is embedded in for watermark
Intensity, now by ownership watermark OWThe low frequency range being embedded into after 3 wavelet transformations is carrying out one carrying out an inverse wavelet transform
Feature of the sign of secondary Fourier transformation extraction low frequency range as image, is denoted as Key.By the graphic feature Key of extraction with it is embedding
The raw water print O enteredWExclusive or obtains compound characteristics V.Data owner O is when uploading image by OWWCA is sent to simultaneously with V.It is secondary
Sanction stage, data owner O extract characteristics of image Key ', if Key ' and the watermark O' after V exclusive orWO is printed with raw waterWMatching degree
More than certain threshold value, this proves that data owner O is strictly the owner of image.
Identity watermark W, i.e. WCAnd WO, using the embedding grammar of the quantization step with shake.The embedded water of quality factor q controls
The quality of image after print, in selected be used for being embedded in identity watermark 8 × 8 pieces, the number of embedded watermark is denoted as NEB.
The image each tested is divided into nonoverlapping 8 × 8 block, and random selection half is used for embedded images ownership
Watermark OW, half be used for be embedded in cloud and the identity watermark of data owner, i.e. WCAnd WO, it is referred to as identity watermark W.Herein, own
Weigh watermark OWCorrect recovery rate be denoted as BCRO, the correct recovery rate of identity watermark is denoted as BCRI.The correct recovery rate of final watermark
It is denoted as Prosuc=BCRO×BCRI.As α=0.05, q=55, NEB=2, the agreement is without the experiment under attacking and having attack
Effect is as shown in table 4 below:
PSNR and BCR under the different tests of table 4
The quantity for the number of users and cloud service provider that the test present invention can support, is not denoted as NU and NC.Due to embedded
Watermark is binary watermarking, then user identity watermark is also data owner's identity watermark WOLength be log2(NU), high in the clouds identity
Watermark WCLength be log2(NU).The size for the image each tested is W × H, is divided into nonoverlapping 8 × 8 block, is tied
The scheme and identity watermark for closing ownership watermark insertion are embedded in scheme, and the NU and NC which can accommodate meet following relational expression:
In practical applications, NU is far more than NC, in this example, it is assumed thatThen above formula is reduced to:
Work as NEB=2, W=H, when, maximum user volume NUmaxLogarithmic curve at different W about m variations, such as Fig. 4 institutes
Show.Work as W=H, when m=1000, NEB is within the scope of this of 1 to 4, in maximum user volume NUmaxLogarithmic curve about W variations is such as
Shown in Fig. 5.
In conjunction with Fig. 4 and Fig. 5 it is found that m is to maximum number of user amount NUmaxInfluence it is smaller, and the size of image is to NUmaxThere is finger
The influence of several levels.Work as W=210, when m=1000, NEB=2, maximum number of user amount NUmaxUp to 28442。
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment can
By software realization, the mode of necessary general hardware platform can also be added to realize by software.Based on this understanding,
The technical solution of above-described embodiment can be expressed in the form of software products, the software product can be stored in one it is non-easily
In the property lost storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.), including some instructions are with so that a computer is set
Standby (can be personal computer, server or the network equipment etc.) executes the method described in each embodiment of the present invention.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Any one skilled in the art is in the technical scope of present disclosure, the change or replacement that can be readily occurred in,
It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of claims
Subject to enclosing.
Claims (6)
1. a kind of method for the power that passed into silence by digital watermark technology protection user, which is characterized in that including:
Data upload the stage:Pass through the ownership watermark O of data ownerWAnd the unique of watermark authentication center generation is used for
Mark the watermark W of high in the clouds identityCAfter handling data X, it is sent to high in the clouds and is stored;
The data retrieval stage:The unique watermark W for being used for flag data owner's identity generated by watermark authentication centerOIt is right
After data to be retrieved are handled in storage beyond the clouds, it is sent to data owner;
Data delete the stage:When data upload, after the completion of data upload, when data retrieval or after the completion of data retrieval, by
Watermark authentication center sends corresponding data-delete command according to the data-delete command of the transmission of data owner to high in the clouds,
High in the clouds is set to delete corresponding data;
Arbitration phase:Data owner completes after data upload, if it find that a doubtful copy Y of data X, then according to from doubting
Like the ownership watermark O' extracted in copy YWWith the ownership watermark O of data ownerWBetween matching degree, to judge doubtful pair
Whether this Y belongs to data X;If so, the watermark by being used for marking high in the clouds identity in the doubtful copy Y of watermark authentication center extraction
W'CAnd the watermark W' for flag data owner's identityO, and data is combined to upload stage and/or the generation of data retrieval stage
Watermark WCAnd/or WOJudge whether doubtful copy Y is leaked by high in the clouds, to protecting the power of passing into silence of user.
2. a kind of method of power that passed into silence by digital watermark technology protection user according to claim 1, feature exist
In the process that data upload is as follows:
Data owner O sends the ID number ID of itself before uploading data XOHigh in the clouds C is given with an odd-numbered n, is indicated
Data owner O will upload data X to high in the clouds C;
High in the clouds C is in the ID number ID for receiving data owner OOAfter odd-numbered n, the ID number ID of high in the clouds C is sentCWith it is strange
Number number n give data owner O, indicates that high in the clouds is already prepared to receive data X;
After data owner O receives the data of high in the clouds C returns, an embedded ownership watermark O in data XW, obtain dataAnd utilize high in the clouds public key pkCIt is encrypted, obtains ciphertext dataLater, by ciphertext data
The ID number ID of data owner OO, odd-numbered n, high in the clouds C ID number IDCAnd the signature of data owner O and high in the cloudsIt is sent to watermark authentication center WCA;
After watermark authentication center WCA receives above-mentioned data, to signatureIt is tested
Card then generates a unique watermark W for being used for marking high in the clouds identity if the verification passesC, and use high in the clouds public key pkCEncryption
Watermark WC, obtain ciphertext watermarkThen, by ciphertext watermarkIt is embedded in ciphertext dataIn, it obtains
Obtain ciphertext watermark dataWherein,Represent watermark embedding operation;Later, watermark
Authentication center WCA is by ciphertext watermark dataThe ID number ID of odd-numbered n, data owner OOAnd watermark is recognized
Signature between card center WCA and high in the clouds CIt is sent to high in the clouds;
After high in the clouds receives the information of watermark authentication center WCA transmissions, verification signatureIt is complete
If whole property and correctness utilize the private key sk of itself by verificationCTo ciphertext watermark dataIt is decrypted,
Obtain plaintext version and carry watermark WCWatermark dataAnd it stores.
3. a kind of method of power that passed into silence by digital watermark technology protection user according to claim 1, feature exist
In the process of data retrieval is as follows:
Data owner O sends the ID number ID of itself before fetching data XOWith an even-numbered n '=n+1 to high in the clouds
C indicates that data owner O fetches data X to high in the clouds C;
High in the clouds C is in the ID number ID for receiving data owner OOAfter even-numbered n ', the ID number ID of high in the clouds C is sentCWith idol
Number number n ' give data owner O, indicates that high in the clouds is already prepared to down-transmitting data X;
High in the clouds C utilizes the public key pk of data owner OOTo corresponding watermark dataIt is encrypted, obtains ciphertext watermark dataLater, by even-numbered n ', ciphertext watermark dataThe ID number ID of high in the clouds CC, data owner O
ID number IDOAnd the signature of data owner O and high in the cloudsIt is sent to watermark
Authentication center WCA;
After watermark authentication center WCA receives above-mentioned data, to signatureIt is tested
Card then generates a unique watermark W for being used for flag data owner's identity if the verification passesO, and it is all using data
The public key pk of personOEncrypted watermark WO, the ciphertext watermark of acquisitionThen, by ciphertext watermarkIt is embedded in ciphertext
Watermark dataObtain new ciphertext watermark dataWherein,Generation
Table watermark embedding operation;Later, watermark authentication center WCA is by even-numbered n ', new ciphertext watermark dataNumber
According to the ID number ID of owner OOAnd the signature between watermark authentication center WCA and data owner OIt is sent to data owner O;
After data owner receives the information of watermark authentication center WCA transmissions, verification signatureIntegrality and correctness, if by verification, utilize the private key sk of itselfODecryptionObtain plaintext version and carry watermark WOData
4. a kind of method of power that passed into silence by digital watermark technology protection user according to claim 1, feature exist
In the process that data delete the stage is as follows:
If data owner needs to delete the data X of high in the clouds storage, the ID number of odd-numbered n, data owner O are sent
IDO, high in the clouds C ID number IDCAnd delete command gives watermark authentication center WCA;
Then, watermark authentication center WCA sends the ID number ID of odd-numbered n, data owner OOHigh in the clouds C is given with delete command;
Later, all copies of the data X of storage are deleted in high in the clouds, and are returned all to delete and replied to watermark authentication center WCA.
5. protect user to pass into silence the method for power by digital watermark technology according to claim 2-4 any one of them is a kind of,
It is characterized in that, watermark authentication center WCA records data in the table of itself uploads stage, data retrieval stage and data
Information involved by the deletion stage;Wherein:
Information involved by the data upload stage, including:The ID number ID of data owner OO, odd-numbered n, high in the clouds C identity
Number IDC, the unique watermark W for being used for marking high in the clouds identityCAnd the signature between watermark authentication center WCA and high in the clouds C
Information involved by the data retrieval stage, including:The ID number ID of data owner OO, even-numbered n ', high in the clouds C body
Part IDC, the unique watermark W for being used for marking high in the clouds identityC, the unique watermark W for being used for flag data owner's identityO, water
Print the signature between authentication center WCA and high in the clouds CAnd watermark authentication center WCA with
Signature between data owner O
Information involved by the data deletion stage, including:The ID number ID of data owner OO, odd-numbered n, high in the clouds C identity
Number IDC, the unique watermark W for being used for marking high in the clouds identityC, the unique watermark W for being used for flag data owner's identityO, watermark
Signature between authentication center WCA and high in the clouds CWatermark authentication center WCA and data institute
Signature between the person of having OAnd the label whether data X has deleted.
6. a kind of method of power that passed into silence by digital watermark technology protection user according to claim 5, feature exist
In, in arbitration phase, watermark W' that watermark authentication center WCA is extractedCWith watermark W'OAfterwards, in conjunction with data upload the stage and/or
The watermark W that the data retrieval stage generatesCWith/WOAnd whether the information recorded in itself table judges the doubtful copy Y by cloud
End leakage, is divided into following three kinds of situations:
If there is no record to be uniquely used for the watermark W of flag data owner's identity in the respective entries in tableO, and record
Delete command, then it is assumed that data owner does not send out fetches order, only has issued delete command, but high in the clouds not according to
It is required that deleting corresponding data and having leaked corresponding data;
If there is no record to be uniquely used for the watermark W of flag data owner's identity in the respective entries in tableO, and do not have
Record deletion order, then it is assumed that data owner, which does not send out, fetches order and delete command, but high in the clouds has leaked corresponding data;
If watermark W'OIf with the water for being uniquely used for flag data owner's identity recorded in the respective entries in table
Print WOMatching degree is more than threshold value, then it is assumed that doubtful copy Y comes from data owner.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810379280.XA CN108549796B (en) | 2018-04-25 | 2018-04-25 | Method for protecting user's forgetting right by digital watermark technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810379280.XA CN108549796B (en) | 2018-04-25 | 2018-04-25 | Method for protecting user's forgetting right by digital watermark technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108549796A true CN108549796A (en) | 2018-09-18 |
CN108549796B CN108549796B (en) | 2020-08-25 |
Family
ID=63512498
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810379280.XA Active CN108549796B (en) | 2018-04-25 | 2018-04-25 | Method for protecting user's forgetting right by digital watermark technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108549796B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104994068A (en) * | 2015-05-22 | 2015-10-21 | 武汉大学 | Multimedia content protection and safe distribution method in cloud environment |
CN105303069A (en) * | 2014-07-10 | 2016-02-03 | 厦门简帛信息科技有限公司 | Digital rights management system and method |
CN105323209A (en) * | 2014-06-05 | 2016-02-10 | 江苏博智软件科技有限公司 | Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology |
CN106156655A (en) * | 2015-03-26 | 2016-11-23 | 中国科学院声学研究所 | The compressing file of a kind of facing cloud storage and authentication method |
CN107197037A (en) * | 2017-02-24 | 2017-09-22 | 重庆第二师范学院 | A kind of data access method and system with audit function based on Cloud Server |
-
2018
- 2018-04-25 CN CN201810379280.XA patent/CN108549796B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105323209A (en) * | 2014-06-05 | 2016-02-10 | 江苏博智软件科技有限公司 | Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology |
CN105303069A (en) * | 2014-07-10 | 2016-02-03 | 厦门简帛信息科技有限公司 | Digital rights management system and method |
CN106156655A (en) * | 2015-03-26 | 2016-11-23 | 中国科学院声学研究所 | The compressing file of a kind of facing cloud storage and authentication method |
CN104994068A (en) * | 2015-05-22 | 2015-10-21 | 武汉大学 | Multimedia content protection and safe distribution method in cloud environment |
CN107197037A (en) * | 2017-02-24 | 2017-09-22 | 重庆第二师范学院 | A kind of data access method and system with audit function based on Cloud Server |
Non-Patent Citations (3)
Title |
---|
KEYANG LIU, WEIMING ZHANG等: "《A Cloud-User Protocol Based on Ciphertext Watermarking Technology》", 《SECURITY AND COMMUNICATION NETWORKS》 * |
张逸为,张卫明等: "《针对特定测试样本的隐写分析方法》", 《软件学报》 * |
金燕: "《基于被遗忘权的第三方个人数据监管平台》", 《情报理论与实践》 * |
Also Published As
Publication number | Publication date |
---|---|
CN108549796B (en) | 2020-08-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shih | Digital watermarking and steganography: fundamentals and techniques | |
US20230360165A1 (en) | Method and apparatus for protecting digital photos from alteration | |
Ahmed et al. | A secure and robust hash-based scheme for image authentication | |
JP4669187B2 (en) | Method for embedding a watermark in a compressed image, method for recovering a watermark from a compressed image, and recording medium | |
Zhang | Commutative reversible data hiding and encryption | |
CN104980278B (en) | The method and apparatus for verifying the availability of biometric image | |
CN104517045B (en) | Digital document guard method and system | |
Benedict | Improved file security system using multiple image steganography | |
CN110889796B (en) | Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and equipment | |
Pan et al. | A lossless watermarking scheme for halftone image authentication | |
Pevnev et al. | Ensuring the Data Integrity in Infocommunication Systems | |
Kumar et al. | A reversible high embedding capacity data hiding technique for hiding secret data in images | |
CN113190857B (en) | Picture processing method and device, electronic equipment and computer readable medium | |
CN108549796A (en) | The method for the power that passed into silence by digital watermark technology protection user | |
Rao et al. | A novel information security scheme using cryptic steganography | |
Singh et al. | Review of Spatial and Frequency Domain Steganographic Approaches | |
CN110134647B (en) | Digital watermarking method and system supporting cloud data deduplication | |
Raj et al. | A survey on reversible data hiding in encrypted image | |
Mantoro et al. | Stegano-image as a digital signature to improve security authentication system in mobile computing | |
US20210143977A1 (en) | Method for encoding, transmitting and/or storing and decoding digital information in an unbreakable manner | |
Dhanashri et al. | Mms steganography for smartphone devices | |
Shaliyar et al. | Metadata Analysis of Web Images for Source Authentication in Online Social Media | |
CN117216039B (en) | Method for constructing three-dimensional base of building based on three-dimensional cadastral database | |
CN212135424U (en) | Tracking management system for dynamically tracking leakage information | |
Kaur et al. | A new efficient approach towards steganography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |