CN108549796A - The method for the power that passed into silence by digital watermark technology protection user - Google Patents

The method for the power that passed into silence by digital watermark technology protection user Download PDF

Info

Publication number
CN108549796A
CN108549796A CN201810379280.XA CN201810379280A CN108549796A CN 108549796 A CN108549796 A CN 108549796A CN 201810379280 A CN201810379280 A CN 201810379280A CN 108549796 A CN108549796 A CN 108549796A
Authority
CN
China
Prior art keywords
data
watermark
clouds
owner
authentication center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810379280.XA
Other languages
Chinese (zh)
Other versions
CN108549796B (en
Inventor
张卫明
俞能海
董晓娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology of China USTC
Original Assignee
University of Science and Technology of China USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology of China USTC filed Critical University of Science and Technology of China USTC
Priority to CN201810379280.XA priority Critical patent/CN108549796B/en
Publication of CN108549796A publication Critical patent/CN108549796A/en
Application granted granted Critical
Publication of CN108549796B publication Critical patent/CN108549796B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

User is protected to pass into silence the method for power by digital watermark technology the invention discloses a kind of; this method supports user's outsourcing clear data; ensure high in the clouds in the request for receiving user simultaneously; delete user data; otherwise the dishonest conduct in high in the clouds will be traced back to, and then maintain the power of passing into silence of user.

Description

The method for the power that passed into silence by digital watermark technology protection user
Technical field
The present invention relates to digital watermarkings and technical field of cryptology, more particularly to a kind of protected by digital watermark technology to use Family passes into silence the method for power.
Background technology
With increasing rapidly for data volume, demand also therewith sharp increase of the people to memory space.Cloud storage technology It comes into being in this case, proposes the storage i.e. concept of service.Cloud storage has provided i.e. cheap and sufficient storage to the user Space.Local datastore beyond the clouds, is correspondingly just lost the control to its data by people.One, certain day user is not It needs to store significant data beyond the clouds, just requires his these data of Cloud Server complete deletion.Cloud respond user it Data are deleted, his data of the genuine complete deletion of cloud but user is uncertain about.And currently popular cloud storage structure pair Data are backed up, with the unexpected generation that is against any misfortune.Finally, the data being backed up are distributed under not collinear upper or line In storage server.So even if cloud deletes the data of current memory space, it is also possible to not delete all of corresponding data Backup.
In order to ensure user after request cloud deletes data, the high in the clouds genuine complete deletion data, some scholars propose Ciphertext data are uploaded, user oneself preserves encrypted key, and when user wants to delete the data of oneself, user, which just deletes, to be added Close key makes the data of storage beyond the clouds become mixed and disorderly ciphertext, other people can not understand in text obtaining the ciphertext Content.But more service providers need to collect public data at present, carry out data analysis and excavation, not to ciphertext data It is received.
Outsourcing clear data so that user can efficiently use cloud computing service, such as to scheme to search figure, picture editting etc. Service.However when user uploads clear data, which needs cloud will be according to the request complete deletion of oneself oneself not The data needed, to maintain the power of passing into silence of oneself.But there is presently no the data for outsourcing plaintext version, protection is used Family passes into silence the scheme of power.
Invention content
User is protected to pass into silence the method for power by digital watermark technology the object of the present invention is to provide a kind of.
The purpose of the present invention is what is be achieved through the following technical solutions:
A method of protect user to pass into silence power by digital watermark technology, including:
Data upload the stage:Pass through the ownership watermark O of data ownerWAnd the generation of watermark authentication center is unique For marking the watermark W of high in the clouds identityCAfter handling data X, it is sent to high in the clouds and is stored;
The data retrieval stage:The unique watermark for being used for flag data owner's identity generated by watermark authentication center WOAfter handling data to be retrieved in storing beyond the clouds, it is sent to data owner;
Data delete the stage:When data upload, data upload after the completion of, when data retrieval or data retrieval complete Afterwards, by watermark authentication center according to the data-delete command of the transmission of data owner, corresponding data is sent to high in the clouds and are deleted Order makes high in the clouds delete corresponding data;
Arbitration phase:Data owner completes after data upload, if it find that a doubtful copy Y of data X, then basis The ownership watermark O' extracted from doubtful copy YWWith the ownership watermark O of data ownerWBetween matching degree, to judge to doubt Whether belong to data X like copy Y;If so, the water by being used for marking high in the clouds identity in the doubtful copy Y of watermark authentication center extraction Print W'CAnd the watermark W' for flag data owner's identityO, and data is combined to upload stage and/or the production of data retrieval stage Raw watermark WCAnd/or WOJudge whether doubtful copy Y is leaked by high in the clouds, to protecting the power of passing into silence of user.
As seen from the above technical solution provided by the invention, it supports user's outsourcing clear data, while ensureing high in the clouds In the request for receiving user, user data is deleted, otherwise the dishonest conduct in high in the clouds will be traced back to, and then maintain user The power of passing into silence.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without creative efforts, other are can also be obtained according to these attached drawings Attached drawing.
Fig. 1 be it is provided in an embodiment of the present invention it is a kind of by digital watermark technology protect user pass into silence power method stream Cheng Tu;
Fig. 2 is the flow chart that data provided in an embodiment of the present invention upload the stage;
Fig. 3 is the flow chart in data retrieval stage provided in an embodiment of the present invention;
Fig. 4 is the power system capacity schematic diagram under difference m provided in an embodiment of the present invention;
Fig. 5 is the power system capacity schematic diagram under difference W provided in an embodiment of the present invention.
Specific implementation mode
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on this The embodiment of invention, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, belongs to protection scope of the present invention.
The embodiment of the present invention provides a kind of method for the power that passes into silence by digital watermark technology protection user, as shown in Figure 1, It includes mainly:
Data upload the stage:Pass through the ownership watermark O of data ownerWAnd the generation of watermark authentication center is unique For marking the watermark W of high in the clouds identityCAfter handling data X, it is sent to high in the clouds and is stored;
The data retrieval stage:The unique watermark for being used for flag data owner's identity generated by watermark authentication center WOAfter handling data to be retrieved in storing beyond the clouds, it is sent to data owner;
Data delete the stage:When data upload, data upload after the completion of, when data retrieval or data retrieval complete Afterwards, by watermark authentication center according to the data-delete command of the transmission of data owner, corresponding data is sent to high in the clouds and are deleted Order makes high in the clouds delete corresponding data;
Arbitration phase:If data owner has found that a doubtful copy Y of data X, basis are carried from doubtful copy Y The ownership watermark O' takenWWith the ownership watermark O of data ownerWBetween matching degree, to judge whether doubtful copy Y belongs to Data X;If so, the watermark W' by being used for marking high in the clouds identity in the doubtful copy Y of watermark authentication center extractionCAnd for marking Remember the watermark W' of data owner's identityO, and data is combined to upload the watermark W that stage and/or data retrieval stage generateCAnd/or WOJudge whether doubtful copy Y is leaked by high in the clouds, to protecting the power of passing into silence of user.
In the embodiment of the present invention, based on Public Key Infrastructure, the Watermarking Protocol between the high in the clouds and user of proposition, In include three different roles:The watermark authentication center of data owner, high in the clouds and honesty, are abbreviated as O, C and WCA respectively. Data involved by the embodiment of the present invention can there are many forms, for example, image, audio and document etc..
A large amount of data are being locally stored in data owner, these data occupy local a large amount of memory space.By It is the user of cloud storage service in data owner, cloud storage service can be enjoyed, therefore data owner can be by local Data upload to cloud server storage, to reduce local amount of storage.Data owner possesses the public private key pair being certified, It is denoted as (pkO,skO), the ID number of data owner is denoted as IDO
Cloud service provider provides and manages many cloud storage service devices, provides a large amount of memory space to the user.High in the clouds possesses Public private key pair, be denoted as (pkC,skC), the ID number of high in the clouds C is denoted as IDC
Watermark authentication center is a honest third party, is responsible for generating watermark, embedded watermark and passes through Detection and Extraction water Print verifies whether that the presence of watermark, the assigned public private key pair in watermark authentication center are denoted as (pkWCA,skWCA)。
Detailed introduction is done below for each stage.
One, data upload the stage.
As shown in Fig. 2, uploading the flow chart in stage for data, main process is as follows:
1, data owner O sends the ID number ID of itself before uploading data XOWith an odd-numbered n to high in the clouds C indicates that data owner O will upload data X to high in the clouds C.
In the embodiment of the present invention, odd-numbered n, which represents user, will upload data, naturally it is also possible to directly transmit upload life It enables.
2, high in the clouds C is in the ID number ID for receiving data owner OOAfter odd-numbered n, the ID number of high in the clouds C is sent IDCData owner O is given with odd-numbered n, indicates that high in the clouds is already prepared to receive data X.
3, after data owner O receives the data that high in the clouds C is returned, an embedded ownership watermark O in data XW, obtain Obtain dataAnd utilize high in the clouds public key pkCIt is encrypted, obtains ciphertext dataLater, by ciphertext dataThe ID number ID of data owner OO, odd-numbered n, high in the clouds C ID number IDCAnd data owner O with The signature in high in the cloudsIt is sent to watermark authentication center WCA.
4, after watermark authentication center WCA receives above-mentioned data, to signatureInto Row verification then generates a unique watermark W for being used for marking high in the clouds identity if the verification passesC, and use high in the clouds public key pkC Encrypted watermark WC, obtain ciphertext watermarkThen, by ciphertext watermarkIt is embedded in ciphertext data In, obtain ciphertext watermark dataWherein,Represent watermark embedding operation;Later, Watermark authentication center WCA is by ciphertext watermark dataThe ID number ID of odd-numbered n, data owner OO, Yi Jishui Print the signature between authentication center WCA and high in the clouds CIt is sent to high in the clouds.
It will be understood by those skilled in the art that homomorphism may be implemented in encrypted domain EOperation.
Meanwhile watermark authentication center WCA records the information involved by the data upload stage in the table of itself, such as table 1 It is shown, include mainly:The ID number ID of data owner OO, odd-numbered n, high in the clouds C ID number IDC, unique be used for marking The watermark W of high in the clouds identityCAnd the signature between watermark authentication center WCA and high in the clouds C
Information involved by the 1 data upload stage of table
5, after high in the clouds receives the information that watermark authentication center WCA is sent, verification signatureIntegrality and correctness, if by verification, utilize the private key sk of itselfCTo close Literary watermark dataIt is decrypted, obtain plaintext version and carries watermark WCWatermark dataAnd it stores.
It will be understood by those skilled in the art that the watermark data that high in the clouds is storedIt is initially uploaded with data owner The content of data X is essentially identical, differs only in watermark dataAlso it is embedded in the ownership watermark O of data ownerW, with And for marking the watermark W of high in the clouds identityC
Two, the data retrieval stage.
As shown in figure 3, uploading the flow chart in stage for data, main process is as follows:
1, data owner O sends the ID number ID of itself before fetching data XOWith an even-numbered n '=n+1 High in the clouds C is given, indicates that data owner O fetches data X to high in the clouds C.
In the embodiment of the present invention, even-numbered n ', which represents user, will fetch data, naturally it is also possible to directly transmit and fetch life It enables.
2, high in the clouds C is in the ID number ID for receiving data owner OOAfter even-numbered n ', the ID number of high in the clouds C is sent IDCData owner O is given with even-numbered n ', indicates that high in the clouds is already prepared to down-transmitting data X.
3, high in the clouds C utilizes the public key pk of data owner OOTo corresponding watermark dataIt is encrypted, obtains ciphertext water Printing evidenceLater, by even-numbered n ', ciphertext watermark dataThe ID number ID of high in the clouds CC, data The ID number ID of owner OOAnd the signature of data owner O and high in the cloudsIt sends Give watermark authentication center WCA.
4, after watermark authentication center WCA receives above-mentioned data, to signature It is verified, if the verification passes, then generates a unique watermark W for being used for flag data owner's identityO, and use number According to the public key pk of the ownerOEncrypted watermark WO, the ciphertext watermark of acquisitionThen, by ciphertext watermarkIt is embedded To ciphertext watermark dataObtain new ciphertext watermark dataIts In,Represent watermark embedding operation;Later, watermark authentication center WCA is by even-numbered n ', new ciphertext watermark dataThe ID number ID of data owner OOAnd the signature between watermark authentication center WCA and data owner OIt is sent to data owner O.
Meanwhile watermark authentication center WCA records the information involved by the data retrieval stage in the table of itself, such as table 2 It is shown, include mainly:The ID number ID of data owner OO, even-numbered n ', high in the clouds C ID number IDC, unique be used for marking Remember the watermark W of high in the clouds identityC, the unique watermark W for being used for flag data owner's identityO, watermark authentication center WCA and high in the clouds C Between signatureAnd the signature between watermark authentication center WCA and data owner O
Information involved by the 2 data retrieval stage of table
5, after data owner receives the information that watermark authentication center WCA is sent, verification signatureIntegrality and correctness, if by verification, utilize the private key sk of itselfODecryptionObtain plaintext version and carry watermark WOData
It will be understood by those skilled in the art that the data that data owner finally obtainsThe watermark stored with high in the clouds DataContent it is essentially identical, differ only in, dataIn be embedded in the watermark for flag data owner's identity WO.That is, dataCompared with the data X that data owner initially uploads, it is only embedded in the ownership of data owner Watermark OW, for marking the watermark W of high in the clouds identityC, and for the watermark W of flag data owner's identityO, main data Content does not change.
Three, data delete the stage.
Data owner can delete its data of storage beyond the clouds at any time, for example, when data upload, in data After the completion of biography, when data retrieval or after the completion of data retrieval etc..
The process that data delete the stage is as follows:
If 1, data owner needs to delete the data X of high in the clouds storage, odd-numbered n, data owner O are sent ID number IDO, high in the clouds C ID number IDCAnd delete command gives watermark authentication center WCA;
2, watermark authentication center WCA sends the ID number ID of odd-numbered n, data owner OOWith delete command to high in the clouds C;
3, all copies of the data X of storage are deleted in high in the clouds, and are returned all to delete and replied to watermark authentication center WCA。
Meanwhile watermark authentication center WCA records the information involved by the data deletion stage in the table of itself, such as table 3 It is shown, include mainly:The ID number ID of data owner OO, odd-numbered n, high in the clouds C ID number IDC, unique be used for marking The watermark W of high in the clouds identityC, the unique watermark W for being used for flag data owner's identityO, watermark authentication center WCA and high in the clouds C it Between signatureSignature between watermark authentication center WCA and data owner OAnd the label whether data X has deleted.
Information involved by the 3 data deletion stage of table
Four, arbitration phase.
After data owner, which completes data, to be uploaded, it is likely to carry out arbitration phase.
If it find that a doubtful copy Y, data owner O and watermark authentication center WCA of data X pass through a under type Differentiate incredible high in the clouds.
1, the ownership watermark O' that data owner O is extracted from doubtful copy YWIf ownership watermark O'WWith data institute The ownership watermark O for the person of havingWBetween matching degree be more than certain threshold value, be more than certain threshold value, then judge that doubtful copy Y belongs to data X, and further judged by watermark authentication center WCA;Otherwise, termination process.
2, the watermark W' for being used for marking high in the clouds identity in doubtful copy Y is extracted by watermark authentication center WCACAnd for marking Remember the watermark W' of data owner's identityO, and data is combined to upload the watermark W that stage and data retrieval stage generateCWith WOAnd The information recorded in itself table judges whether doubtful copy Y is leaked by high in the clouds, to protecting the power of passing into silence of user.Work as water Print W'CWith the watermark W for uniquely being used for marking high in the clouds identity recorded in the respective entries in tableCMatching degree is more than threshold value When, following three kinds of situations:
If 1) there is no record to be uniquely used for the watermark W of flag data owner's identity in the respective entries in tableO, And have recorded delete command, then it is assumed that data owner, which does not send out, fetches order, only has issued delete command, but high in the clouds does not have Have and deletes corresponding data as requested and have leaked corresponding data;
If 2) there is no record to be uniquely used for the watermark W of flag data owner's identity in the respective entries in tableO, And there is no record deletion order, then it is assumed that data owner, which does not send out, fetches order and delete command, but high in the clouds has leaked phase Answer data;
If 3) watermark W'OWith if flag data owner's body is uniquely used for recorded in the respective entries in table The watermark W of partOMatching degree is more than threshold value, then it is assumed that doubtful copy Y comes from data owner;At this point, no matter data whether Deleted or data whether leakage part is unrelated with high in the clouds.
It is introduced with reference to a specific example.
In this example, as long as specific encipherment scheme and watermarking project can be met the requirements, you can use.
Data in this example select 1000 width difference gray level images by taking image as an example, and the size of image is all 512 × 512, as this exemplary image library, the quality of image after embedded watermark is tested using Y-PSNR PSNR, uses accuracy The quality of BCR Test extraction watermarks.
Homomorphic cryptography method is encrypted using Paillier, and key length is more than 1024 bits.Consider do not have in homomorphic cryptography Decimal, quantization decimal are the quantizing factor S=2 of integer16
The ownership watermark O of data owner OW, it is embedded in similar method using with second generation watermark, α is embedded in for watermark Intensity, now by ownership watermark OWThe low frequency range being embedded into after 3 wavelet transformations is carrying out one carrying out an inverse wavelet transform Feature of the sign of secondary Fourier transformation extraction low frequency range as image, is denoted as Key.By the graphic feature Key of extraction with it is embedding The raw water print O enteredWExclusive or obtains compound characteristics V.Data owner O is when uploading image by OWWCA is sent to simultaneously with V.It is secondary Sanction stage, data owner O extract characteristics of image Key ', if Key ' and the watermark O' after V exclusive orWO is printed with raw waterWMatching degree More than certain threshold value, this proves that data owner O is strictly the owner of image.
Identity watermark W, i.e. WCAnd WO, using the embedding grammar of the quantization step with shake.The embedded water of quality factor q controls The quality of image after print, in selected be used for being embedded in identity watermark 8 × 8 pieces, the number of embedded watermark is denoted as NEB.
The image each tested is divided into nonoverlapping 8 × 8 block, and random selection half is used for embedded images ownership Watermark OW, half be used for be embedded in cloud and the identity watermark of data owner, i.e. WCAnd WO, it is referred to as identity watermark W.Herein, own Weigh watermark OWCorrect recovery rate be denoted as BCRO, the correct recovery rate of identity watermark is denoted as BCRI.The correct recovery rate of final watermark It is denoted as Prosuc=BCRO×BCRI.As α=0.05, q=55, NEB=2, the agreement is without the experiment under attacking and having attack Effect is as shown in table 4 below:
PSNR and BCR under the different tests of table 4
The quantity for the number of users and cloud service provider that the test present invention can support, is not denoted as NU and NC.Due to embedded Watermark is binary watermarking, then user identity watermark is also data owner's identity watermark WOLength be log2(NU), high in the clouds identity Watermark WCLength be log2(NU).The size for the image each tested is W × H, is divided into nonoverlapping 8 × 8 block, is tied The scheme and identity watermark for closing ownership watermark insertion are embedded in scheme, and the NU and NC which can accommodate meet following relational expression:
In practical applications, NU is far more than NC, in this example, it is assumed thatThen above formula is reduced to:
Work as NEB=2, W=H, when, maximum user volume NUmaxLogarithmic curve at different W about m variations, such as Fig. 4 institutes Show.Work as W=H, when m=1000, NEB is within the scope of this of 1 to 4, in maximum user volume NUmaxLogarithmic curve about W variations is such as Shown in Fig. 5.
In conjunction with Fig. 4 and Fig. 5 it is found that m is to maximum number of user amount NUmaxInfluence it is smaller, and the size of image is to NUmaxThere is finger The influence of several levels.Work as W=210, when m=1000, NEB=2, maximum number of user amount NUmaxUp to 28442
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment can By software realization, the mode of necessary general hardware platform can also be added to realize by software.Based on this understanding, The technical solution of above-described embodiment can be expressed in the form of software products, the software product can be stored in one it is non-easily In the property lost storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.), including some instructions are with so that a computer is set Standby (can be personal computer, server or the network equipment etc.) executes the method described in each embodiment of the present invention.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Any one skilled in the art is in the technical scope of present disclosure, the change or replacement that can be readily occurred in, It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of claims Subject to enclosing.

Claims (6)

1. a kind of method for the power that passed into silence by digital watermark technology protection user, which is characterized in that including:
Data upload the stage:Pass through the ownership watermark O of data ownerWAnd the unique of watermark authentication center generation is used for Mark the watermark W of high in the clouds identityCAfter handling data X, it is sent to high in the clouds and is stored;
The data retrieval stage:The unique watermark W for being used for flag data owner's identity generated by watermark authentication centerOIt is right After data to be retrieved are handled in storage beyond the clouds, it is sent to data owner;
Data delete the stage:When data upload, after the completion of data upload, when data retrieval or after the completion of data retrieval, by Watermark authentication center sends corresponding data-delete command according to the data-delete command of the transmission of data owner to high in the clouds, High in the clouds is set to delete corresponding data;
Arbitration phase:Data owner completes after data upload, if it find that a doubtful copy Y of data X, then according to from doubting Like the ownership watermark O' extracted in copy YWWith the ownership watermark O of data ownerWBetween matching degree, to judge doubtful pair Whether this Y belongs to data X;If so, the watermark by being used for marking high in the clouds identity in the doubtful copy Y of watermark authentication center extraction W'CAnd the watermark W' for flag data owner's identityO, and data is combined to upload stage and/or the generation of data retrieval stage Watermark WCAnd/or WOJudge whether doubtful copy Y is leaked by high in the clouds, to protecting the power of passing into silence of user.
2. a kind of method of power that passed into silence by digital watermark technology protection user according to claim 1, feature exist In the process that data upload is as follows:
Data owner O sends the ID number ID of itself before uploading data XOHigh in the clouds C is given with an odd-numbered n, is indicated Data owner O will upload data X to high in the clouds C;
High in the clouds C is in the ID number ID for receiving data owner OOAfter odd-numbered n, the ID number ID of high in the clouds C is sentCWith it is strange Number number n give data owner O, indicates that high in the clouds is already prepared to receive data X;
After data owner O receives the data of high in the clouds C returns, an embedded ownership watermark O in data XW, obtain dataAnd utilize high in the clouds public key pkCIt is encrypted, obtains ciphertext dataLater, by ciphertext data The ID number ID of data owner OO, odd-numbered n, high in the clouds C ID number IDCAnd the signature of data owner O and high in the cloudsIt is sent to watermark authentication center WCA;
After watermark authentication center WCA receives above-mentioned data, to signatureIt is tested Card then generates a unique watermark W for being used for marking high in the clouds identity if the verification passesC, and use high in the clouds public key pkCEncryption Watermark WC, obtain ciphertext watermarkThen, by ciphertext watermarkIt is embedded in ciphertext dataIn, it obtains Obtain ciphertext watermark dataWherein,Represent watermark embedding operation;Later, watermark Authentication center WCA is by ciphertext watermark dataThe ID number ID of odd-numbered n, data owner OOAnd watermark is recognized Signature between card center WCA and high in the clouds CIt is sent to high in the clouds;
After high in the clouds receives the information of watermark authentication center WCA transmissions, verification signatureIt is complete If whole property and correctness utilize the private key sk of itself by verificationCTo ciphertext watermark dataIt is decrypted, Obtain plaintext version and carry watermark WCWatermark dataAnd it stores.
3. a kind of method of power that passed into silence by digital watermark technology protection user according to claim 1, feature exist In the process of data retrieval is as follows:
Data owner O sends the ID number ID of itself before fetching data XOWith an even-numbered n '=n+1 to high in the clouds C indicates that data owner O fetches data X to high in the clouds C;
High in the clouds C is in the ID number ID for receiving data owner OOAfter even-numbered n ', the ID number ID of high in the clouds C is sentCWith idol Number number n ' give data owner O, indicates that high in the clouds is already prepared to down-transmitting data X;
High in the clouds C utilizes the public key pk of data owner OOTo corresponding watermark dataIt is encrypted, obtains ciphertext watermark dataLater, by even-numbered n ', ciphertext watermark dataThe ID number ID of high in the clouds CC, data owner O ID number IDOAnd the signature of data owner O and high in the cloudsIt is sent to watermark Authentication center WCA;
After watermark authentication center WCA receives above-mentioned data, to signatureIt is tested Card then generates a unique watermark W for being used for flag data owner's identity if the verification passesO, and it is all using data The public key pk of personOEncrypted watermark WO, the ciphertext watermark of acquisitionThen, by ciphertext watermarkIt is embedded in ciphertext Watermark dataObtain new ciphertext watermark dataWherein,Generation Table watermark embedding operation;Later, watermark authentication center WCA is by even-numbered n ', new ciphertext watermark dataNumber According to the ID number ID of owner OOAnd the signature between watermark authentication center WCA and data owner OIt is sent to data owner O;
After data owner receives the information of watermark authentication center WCA transmissions, verification signatureIntegrality and correctness, if by verification, utilize the private key sk of itselfODecryptionObtain plaintext version and carry watermark WOData
4. a kind of method of power that passed into silence by digital watermark technology protection user according to claim 1, feature exist In the process that data delete the stage is as follows:
If data owner needs to delete the data X of high in the clouds storage, the ID number of odd-numbered n, data owner O are sent IDO, high in the clouds C ID number IDCAnd delete command gives watermark authentication center WCA;
Then, watermark authentication center WCA sends the ID number ID of odd-numbered n, data owner OOHigh in the clouds C is given with delete command;
Later, all copies of the data X of storage are deleted in high in the clouds, and are returned all to delete and replied to watermark authentication center WCA.
5. protect user to pass into silence the method for power by digital watermark technology according to claim 2-4 any one of them is a kind of, It is characterized in that, watermark authentication center WCA records data in the table of itself uploads stage, data retrieval stage and data Information involved by the deletion stage;Wherein:
Information involved by the data upload stage, including:The ID number ID of data owner OO, odd-numbered n, high in the clouds C identity Number IDC, the unique watermark W for being used for marking high in the clouds identityCAnd the signature between watermark authentication center WCA and high in the clouds C
Information involved by the data retrieval stage, including:The ID number ID of data owner OO, even-numbered n ', high in the clouds C body Part IDC, the unique watermark W for being used for marking high in the clouds identityC, the unique watermark W for being used for flag data owner's identityO, water Print the signature between authentication center WCA and high in the clouds CAnd watermark authentication center WCA with Signature between data owner O
Information involved by the data deletion stage, including:The ID number ID of data owner OO, odd-numbered n, high in the clouds C identity Number IDC, the unique watermark W for being used for marking high in the clouds identityC, the unique watermark W for being used for flag data owner's identityO, watermark Signature between authentication center WCA and high in the clouds CWatermark authentication center WCA and data institute Signature between the person of having OAnd the label whether data X has deleted.
6. a kind of method of power that passed into silence by digital watermark technology protection user according to claim 5, feature exist In, in arbitration phase, watermark W' that watermark authentication center WCA is extractedCWith watermark W'OAfterwards, in conjunction with data upload the stage and/or The watermark W that the data retrieval stage generatesCWith/WOAnd whether the information recorded in itself table judges the doubtful copy Y by cloud End leakage, is divided into following three kinds of situations:
If there is no record to be uniquely used for the watermark W of flag data owner's identity in the respective entries in tableO, and record Delete command, then it is assumed that data owner does not send out fetches order, only has issued delete command, but high in the clouds not according to It is required that deleting corresponding data and having leaked corresponding data;
If there is no record to be uniquely used for the watermark W of flag data owner's identity in the respective entries in tableO, and do not have Record deletion order, then it is assumed that data owner, which does not send out, fetches order and delete command, but high in the clouds has leaked corresponding data;
If watermark W'OIf with the water for being uniquely used for flag data owner's identity recorded in the respective entries in table Print WOMatching degree is more than threshold value, then it is assumed that doubtful copy Y comes from data owner.
CN201810379280.XA 2018-04-25 2018-04-25 Method for protecting user's forgetting right by digital watermark technology Active CN108549796B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810379280.XA CN108549796B (en) 2018-04-25 2018-04-25 Method for protecting user's forgetting right by digital watermark technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810379280.XA CN108549796B (en) 2018-04-25 2018-04-25 Method for protecting user's forgetting right by digital watermark technology

Publications (2)

Publication Number Publication Date
CN108549796A true CN108549796A (en) 2018-09-18
CN108549796B CN108549796B (en) 2020-08-25

Family

ID=63512498

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810379280.XA Active CN108549796B (en) 2018-04-25 2018-04-25 Method for protecting user's forgetting right by digital watermark technology

Country Status (1)

Country Link
CN (1) CN108549796B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104994068A (en) * 2015-05-22 2015-10-21 武汉大学 Multimedia content protection and safe distribution method in cloud environment
CN105303069A (en) * 2014-07-10 2016-02-03 厦门简帛信息科技有限公司 Digital rights management system and method
CN105323209A (en) * 2014-06-05 2016-02-10 江苏博智软件科技有限公司 Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology
CN106156655A (en) * 2015-03-26 2016-11-23 中国科学院声学研究所 The compressing file of a kind of facing cloud storage and authentication method
CN107197037A (en) * 2017-02-24 2017-09-22 重庆第二师范学院 A kind of data access method and system with audit function based on Cloud Server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323209A (en) * 2014-06-05 2016-02-10 江苏博智软件科技有限公司 Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology
CN105303069A (en) * 2014-07-10 2016-02-03 厦门简帛信息科技有限公司 Digital rights management system and method
CN106156655A (en) * 2015-03-26 2016-11-23 中国科学院声学研究所 The compressing file of a kind of facing cloud storage and authentication method
CN104994068A (en) * 2015-05-22 2015-10-21 武汉大学 Multimedia content protection and safe distribution method in cloud environment
CN107197037A (en) * 2017-02-24 2017-09-22 重庆第二师范学院 A kind of data access method and system with audit function based on Cloud Server

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
KEYANG LIU, WEIMING ZHANG等: "《A Cloud-User Protocol Based on Ciphertext Watermarking Technology》", 《SECURITY AND COMMUNICATION NETWORKS》 *
张逸为,张卫明等: "《针对特定测试样本的隐写分析方法》", 《软件学报》 *
金燕: "《基于被遗忘权的第三方个人数据监管平台》", 《情报理论与实践》 *

Also Published As

Publication number Publication date
CN108549796B (en) 2020-08-25

Similar Documents

Publication Publication Date Title
Shih Digital watermarking and steganography: fundamentals and techniques
US20230360165A1 (en) Method and apparatus for protecting digital photos from alteration
Ahmed et al. A secure and robust hash-based scheme for image authentication
JP4669187B2 (en) Method for embedding a watermark in a compressed image, method for recovering a watermark from a compressed image, and recording medium
Zhang Commutative reversible data hiding and encryption
CN104980278B (en) The method and apparatus for verifying the availability of biometric image
CN104517045B (en) Digital document guard method and system
Benedict Improved file security system using multiple image steganography
CN110889796B (en) Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and equipment
Pan et al. A lossless watermarking scheme for halftone image authentication
Pevnev et al. Ensuring the Data Integrity in Infocommunication Systems
Kumar et al. A reversible high embedding capacity data hiding technique for hiding secret data in images
CN113190857B (en) Picture processing method and device, electronic equipment and computer readable medium
CN108549796A (en) The method for the power that passed into silence by digital watermark technology protection user
Rao et al. A novel information security scheme using cryptic steganography
Singh et al. Review of Spatial and Frequency Domain Steganographic Approaches
CN110134647B (en) Digital watermarking method and system supporting cloud data deduplication
Raj et al. A survey on reversible data hiding in encrypted image
Mantoro et al. Stegano-image as a digital signature to improve security authentication system in mobile computing
US20210143977A1 (en) Method for encoding, transmitting and/or storing and decoding digital information in an unbreakable manner
Dhanashri et al. Mms steganography for smartphone devices
Shaliyar et al. Metadata Analysis of Web Images for Source Authentication in Online Social Media
CN117216039B (en) Method for constructing three-dimensional base of building based on three-dimensional cadastral database
CN212135424U (en) Tracking management system for dynamically tracking leakage information
Kaur et al. A new efficient approach towards steganography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant