CN109522684A - Data processing method, equipment and storage medium - Google Patents

Data processing method, equipment and storage medium Download PDF

Info

Publication number
CN109522684A
CN109522684A CN201811422511.7A CN201811422511A CN109522684A CN 109522684 A CN109522684 A CN 109522684A CN 201811422511 A CN201811422511 A CN 201811422511A CN 109522684 A CN109522684 A CN 109522684A
Authority
CN
China
Prior art keywords
data
cell
key
obtains
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811422511.7A
Other languages
Chinese (zh)
Other versions
CN109522684B (en
Inventor
裴超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201811422511.7A priority Critical patent/CN109522684B/en
Publication of CN109522684A publication Critical patent/CN109522684A/en
Application granted granted Critical
Publication of CN109522684B publication Critical patent/CN109522684B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention provides a kind of data processing method, equipment and storage medium, wherein, this method comprises: obtaining watermark data and pending data, and data compression coding processing is carried out to watermark data, compressed encoding is obtained, wherein pending data is made of multiple data cells;It based on preset random number and key, is calculated using the first preset algorithm and obtains the first Data Position, and be located at the first data on the first Data Position from acquisition in each data cell;It is calculated using the second preset algorithm based on key, watermark data and the first data got from data cell for each data cell and obtains the second Data Position, and be located at the second data on the second Data Position from acquisition in compressed encoding;Target data is obtained using the first data in corresponding second data replacement data unit for each data cell.Technical solution provided in an embodiment of the present invention can be marked the ownership of data, facilitate the ownership of authentication data.

Description

Data processing method, equipment and storage medium
Technical field
The present embodiments relate to field of computer technology more particularly to a kind of data processing method, equipment and storage to be situated between Matter.
Background technique
Due to information-based and networking development, the data of social every field is caused all to present explosive growth, phase After the scene for occurring for data being worth as the performance of the important means of production.To large-scale data how to carry out value excavate and It utilizes, makes data from original static storage and the form of consumption value, be transformed into the form that can dynamically use simultaneously productive value, It is the thing that every field all competitively sticks at.Meanwhile between different all sides of data also carry out data sharing, carry out across Enterprise, inter-trade, cross-cutting data files, to obtain bigger value.
Although the technological means that cryptography can be used in large-scale data during transimission and storage is protected, During being excavated, utilized as the means of production, it is current or need to be reduced into carry out in plain text using, still there is The risk revealed by interior employee, external attack, third party helpmate or data purchaser.Therefore, how data are carried out Ownership proves, how in the case where data are leaked, it can be found that the source of leakage of data, trace back data leakage person, just seem With very important realistic meaning.
Summary of the invention
The embodiment of the present invention provides a kind of data processing method, equipment and storage medium, to inject in data content Watermark, with the ownership of flag data.
First aspect of the embodiment of the present invention provides a kind of data processing method, comprising:
Watermark data and pending data are obtained, and data compression coding processing is carried out to the watermark data, is pressed Code is reduced the staff, wherein the pending data is made of multiple data cells;It is pre- using first based on preset random number and key Imputation method calculates and obtains the first Data Position, and from obtaining the be located on first Data Position in each data cell One data;For each data cell, get based on the key, the watermark data and from the data cell First data are calculated using the second preset algorithm and are obtained the second Data Position, and are obtained and be located at from the compressed encoding The second data on second Data Position;For each data cell, the data are replaced using corresponding second data First data in unit, obtain target data.
The second aspect of the embodiment of the present invention is to provide a kind of data processing equipment, which includes:
Processor and memory are stored with instruction in the memory, execute when the processor executes described instruction Following operation:
Watermark data and pending data are obtained, and data compression coding processing is carried out to the watermark data, is pressed Code is reduced the staff, wherein the pending data is made of multiple data cells;It is pre- using first based on preset random number and key Imputation method calculates and obtains the first Data Position, and from obtaining the be located on first Data Position in each data cell One data;For each data cell, get based on the key, the watermark data and from the data cell First data are calculated using the second preset algorithm and are obtained the second Data Position, and are obtained and be located at from the compressed encoding The second data on second Data Position;For each data cell, the data are replaced using corresponding second data First data in unit, obtain target data.
The third aspect of the embodiment of the present invention provides a kind of computer readable storage medium, including instruction, when described instruction exists When being run on the computer, method that the computer can execute above-mentioned first aspect.
The embodiment of the present invention carries out data compression coding to watermark data by obtaining watermark data and pending data Processing obtains compressed encoding, is based on preset random data and key, and using the first preset algorithm, calculating the first data of acquisition is Only, and from the first data being located on the first Data Position are obtained in each data cell, for each data cell, based on close Key, watermark data and the first data got from data cell are calculated using the second preset algorithm and are obtained the second data Position, from the second data being located on the second Data Position are obtained in compressed encoding, for each data cell, using corresponding The first data in second data replacement data unit, the target data after obtaining injection watermark.The present embodiment passes through in data Watermark is injected in content, realizes the label to data ownership, improves the reliability of data ownership label.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art To obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of data processing method provided in an embodiment of the present invention;
Fig. 2 is a kind of flow chart of data processing method provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of data processing equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The term " includes " of description and claims of this specification and " having " and their any deformation, it is intended that Be to cover it is non-exclusive include, for example, the device of the process or structure that contain series of steps is not necessarily limited to clearly arrange Those of out structure or step but may include other steps being not clearly listed or intrinsic for these processes or device Rapid or structure.
Noun involved in the embodiment of the present invention is explained first below in order to facilitate understanding:
Identification information, the embodiment of the present invention define the information for capableing of the main bodys such as unique identification user, equipment, things, activity For identification information.If certain main body is user, identification information may be identification card number, cell-phone number, passport No., social security card number, silver Row card number, mailbox etc., one in these information can be assigned to specific user agent.
Attribute information, it is attribute information that the present embodiment, which defines the information for main body to be described,.Such as main body is carried out Description, such as gender, date of birth, residence, educational background information are customer attribute information.Mailbox is described, such as Registration date, IP is logged in, close guarantor's problem etc. is mailbox attribute information etc..
Corresponding label information can be obtained after carrying out feature classification according to preset rules to the attribute information of main body, such as at certain Day has carried out the mobile phone user of shopping browsing, the label letter of the user using the mobile flow of 4G the period in the morning 9:00~12:00 Breath can be divided into telecom operators, discharge pattern, cell phone application classification etc..
It should be understood that the meaning that some information indicate different subjects is different, such as geographical location latitude and longitude information, When user is described, expression is user location attribute information, and when diagram data is described over the ground is then mark Information indicates the world somewhere.
Aiming at the problem that how to prove data ownership and how to trace source of leakage after leaking data, the prior art is provided The following two kinds method:
Method one establishes closed system environment, and data circulation and use are limited in the system environments, can not flow out.System There are complete access control, auditing system and firewall in system, and there is stringent data flow management strategy to be controlled.When having When data are revealed, leakage main body can be known by auditing system and revealed time and operation that behavior occurs.But side Method one must limit data and use in limited enclosed environment, and data sphere of circulation is limited, can not promote data sharing, and by The necessarily centralization of the environment of limit, is otherwise difficult to be managed, but will thus make paired data supplier or data management Person bears the operation of the enclosed environment.
Method two carries out digital watermarking injection to the biggish file of the redundancies content such as picture, document, audio, video, Injection object is the carrier of data, i.e. file format, rather than file content.Such as picture file format jpeg, bmp, document files Format doc, excel, audio file formats wav, mp3, video file format mp4, mpeg etc..When there is data to reveal, By detecting the digital watermarking in these document format datas, leakage main body is known.But method two is in the bearer documents of data There is excessive limitation, it is desirable that document format data is needed comprising biggish redundant space, to carry out digital watermarking on format Filling operation.This method file format lesser for redundant space can not be carried out, simultaneously for independent of file format Be also for data it is inefficient or invalid, such as when the content in document is replicated from the file of doc format, and be stored in When in the file of txt format, data have occurred and that leakage, but can not carry out watermark detection.
In view of the above-mentioned problems existing in the prior art, the embodiment of the invention provides a kind of data processing method, this method By adding watermark in the data content of data, so that data are able to demonstrate that data circulation is in open environment Ownership, and method provided in an embodiment of the present invention can get rid of dependence of the conventional watermark method for implanting to document format data, Even if data content is replicated or data file is by format transformation, also still number can be proved by the watermark in data content According to ownership, or even the leakage point for the data that can also trace to the source.
The scheme of the embodiment of the present invention is described below with reference to exemplary embodiment.
Fig. 1 is a kind of flow chart of data processing method provided in an embodiment of the present invention, and this method can be by a kind of data Processing equipment is handled, wherein in order to make it easy to understand, illustratively can be interpreted as having by data processing equipment in the present embodiment The computer of calculation processing power.As shown in Figure 1, this method comprises the following steps:
Step 101 obtains watermark data and pending data, and carries out at data compression coding to the watermark data Reason, obtains compressed encoding, wherein the pending data is made of multiple data cells.
Wherein, preset compressed encoding function can be used after getting watermark data and calculate acquisition watermark for the present embodiment The corresponding compressed encoding of data.
So-called pending data includes multiple data cells in the present embodiment, which can be specially data Entry or data block.Wherein in each data cell including the affiliated main body of pending data at least one identification information and At least one attribute information.
Step 102 is based on preset random number and key, using the first preset algorithm, calculates and obtains the first Data Position, And it is located at the first data on first Data Position from acquisition in each data cell.
Main body belonging to random number and key and pending data in the present embodiment is bound.
The first preset algorithm in the present embodiment, which can according to need, to be set, for be easy to understand and first can be preset Algorithm is interpreted as preset cipher function.
The first Data Position in the present embodiment is used to indicate the position that data are obtained from data cell.Such as in one kind In possible design, which can be specifically used for the position that instruction obtains identification information from data cell, or another In the possible design of kind, which may be used to indicate that the position that attribute information is obtained from data cell.For example, this implementation Example first can generate first set for the identification information in each data cell based on the data unit, be based on data cell In attribute information generate second set so that element in first set is that identification information and identification information position are formed Binary group, the element in second set is attribute information and the binary group that the attribute information position is formed, for example, raw At first set and second set can be following form:
First set: SetID={ (ID1, Loc1),…,(IDm, Locm),
Second set: Settttr={ (Attr1, Loc1),…,(Attrn, Locn)}
Wherein, IDmIndicate m-th of identification information in data cell, LocmIndicate m-th of mark letter in data cell The position of breath, AttrnIndicate n-th of attribute information in data cell, LocnIndicate n-th of attribute information in data cell Position.That is, the first Data Position can serve to indicate that first set SetIDIn be located at the first Data Position on mark Know information, or can be used for instruction second set SetAttrIn be located in the attribute information on the first Data Position.Certainly It limits it is only for illustrating rather than uniquely.
Exemplary, the present embodiment can be directly by the position based on random number and cipher key calculation acquisition, as the first data Position.Such as, it is assumed that the first Data Position is used to indicate the identification information in first set, then can be first according to the first data bit It sets from obtaining the binary group being located on the first Data Position in data cell, then obtain identification information as the from the binary group One data.
Or can also after obtaining a third Data Position based on random number and cipher key calculation, based on above-mentioned key with And identification information or attribute information indicated by the third Data Position, it is calculated using preset second function and obtains the first data Position.The calculation method of certain first Data Position provided herein is merely illustrative to be illustrated rather than to unique limit of the invention It is fixed.
Step 103 is directed to each data cell, based on the key, the watermark data and from the data cell In first data that get calculate using the second preset algorithm and obtain the second Data Position, and from the compressed encoding It is middle to obtain the second data being located on second Data Position.
Second preset algorithm involved in the present embodiment can be identical or not identical with above-mentioned first preset algorithm, than Such as, in one possible implementation, the second preset algorithm and the first preset algorithm can be specially cipher function.
The second Data Position in the present embodiment is used to indicate the position that data are obtained from compressed encoding.If for example Attribute information in first Data Position designation date unit on some position, then using the attribute information as the first data, base The Data Position obtained in compressed encoding is calculated in the attribute information, key, watermark data, so that data in this position be made For the second data.
Step 104 is directed to each data cell, and described the in the data cell is replaced using corresponding second data One data, obtain target data.
The present embodiment carries out data compression coding processing to watermark data by obtaining watermark data and pending data Compressed encoding is obtained, preset random data and key are based on, using the first preset algorithm, is calculated until obtaining the first data, And from the first data being located on the first Data Position are obtained in each data cell, for each data cell, based on key, Watermark data and the first data got from data cell are calculated using the second preset algorithm and are obtained the second data bit It sets, from the second data being located on the second Data Position are obtained in compressed encoding, for each data cell, using corresponding the The first data in two data replacement data units, the target data after obtaining injection watermark.The present embodiment passes through in data Watermark is injected in appearance, realizes the label to data ownership, improves the reliability of data ownership label.
Above-described embodiment is further optimized and extended below.
Fig. 2 is a kind of flow chart of data processing method provided in an embodiment of the present invention, as shown in Fig. 2, in Fig. 1 embodiment On the basis of, the present embodiment includes the following steps:
Step 201 obtains watermark data and pending data, and carries out at data compression coding to the watermark data Reason, obtains compressed encoding, wherein the pending data is made of multiple data cells.
Wherein, at least one identification information and at least one attribute in data cell including the affiliated main body of pending data Information.
Step 202 is directed to each data cell, and the identification information in unit generates first set, base based on the data Attribute information in the data cell generates second set, wherein the element in the first set be identification information and The binary group that identification information position is formed, where the element in the second set is attribute information and the attribute information The binary group that position is formed.
Step 203 is based on default random number and key, is calculated using preset first function and obtains third Data Position, And it is located at the binary group on the third Data Position from acquisition in the corresponding first set of each data cell.
Step 204 is directed to each data cell, described two got based on the key and from the data cell Identification information in tuple is calculated using preset second function and obtains the first Data Position, and corresponding from the data cell Second set in obtain be located at first Data Position on the first data.
Step 205 is directed to each data cell, based on the key, the watermark data and from the data cell In attribute information in the binary group that gets calculate using the second preset algorithm and obtain the second Data Position, and from the pressure Reduce the staff the second data for obtaining and being located on second Data Position in code.
Step 206 is directed to each data cell, and described the in the data cell is replaced using corresponding second data One data, obtain target data.
It is exemplary, it is assumed that there is watermark data WM, then can be calculated by compressed encoding function CE, obtain compressed encoding W, I-th of element representation of middle W is wi, (1,2 ... l), and l indicates the length of W by i=.
Further, it is assumed that data BD to be handled, BD are made of data cell RowText, then for each RowText identifies identification information and attribute information in RowText, and records its position, generates first set: SetID= {(ID1, Loc1),…,(IDm, Locm) and second set: SetAttr={ (Attr1, Loc1),…,(Attrn, Locn), Middle IDmIndicate m-th of identification information in data cell, LocmIndicate the position of m-th of identification information in data cell, AttrnIndicate n-th of attribute information in data cell, LocnIndicate the position of n-th of attribute information in data cell.
Further, third number is calculated using preset first function based on preset random data Rpre and key Key According to position, which is used to indicate the position of first set identification information.A kind of wherein optional calculation method Third Data Position α can be calculated using cipher function H, expression formula is as follows:
H (Rpre | | Key) mod m=α
After determining third Data Position, for each data cell, obtained from the first set of data cell RowText Fetch bit is in the binary group (ID on third Data Positionα, Locα)=SetID(α), based on the identification information ID in the binary groupαWith The first Data Position β is calculated using preset second function (such as cipher function), further in preset key Key It is located at the binary group (Attr on the first Data Position from acquisition in the second set of data cell RowText againβ, Locβ)= SetAttr(β)。
Further, for each data cell, key Key, attribute information Attr are based onβIt is calculated with watermark data WM To the second Data Position γ for being used to indicate Data Position in compressed encoding, and then obtains in compressed encoding and be located on the γ of position Second data wγ.To wγAnd AttrβAttr is calculated using confused function FCβ'=FC (Attrβ,wγ, γ), use Attrβ′ Replace AttrβObtain target data.
Optionally, the present embodiment can also include the extraction process of watermark data.Specifically, for each data segment member, Attr can be got by method similar to the aboveβ', and using the inverse function of confused function FC to Attrβ' carry out Processing, obtains corresponding AttrβAnd positioned at the data w in compressed encoding on the γ of positionγ, getting all data cells pair The w answeredγIt afterwards, can be to wγIt is ranked up, obtains compressed encoding.
Certainly it above are only and illustrate rather than to unique restriction of the invention.
The present embodiment carries out data compression coding processing to watermark data by obtaining watermark data and pending data Compressed encoding is obtained, preset random data and key are based on, using the first preset algorithm, is calculated until obtaining the first data, And from the first data being located on the first Data Position are obtained in each data cell, for each data cell, based on key, Watermark data and the first data got from data cell are calculated using the second preset algorithm and are obtained the second data bit It sets, from the second data being located on the second Data Position are obtained in compressed encoding, for each data cell, using corresponding the The first data in two data replacement data units, the target data after obtaining injection watermark.The present embodiment passes through in data Watermark is injected in appearance, realizes the label to data ownership, improves the reliability of data ownership label.
Fig. 3 is a kind of structural schematic diagram of data processing equipment provided in an embodiment of the present invention, as shown in figure 3, equipment 30 Include: processor 31 and memory 32, be stored with instruction in the memory 32, when the processor 31 executes described instruction It performs the following operations:
Watermark data and pending data are obtained, and data compression coding processing is carried out to the watermark data, is pressed Code is reduced the staff, wherein the pending data is made of multiple data cells;It is pre- using first based on preset random number and key Imputation method calculates and obtains the first Data Position, and from obtaining the be located on first Data Position in each data cell One data;For each data cell, get based on the key, the watermark data and from the data cell First data are calculated using the second preset algorithm and are obtained the second Data Position, and are obtained and be located at from the compressed encoding The second data on second Data Position;For each data cell, the data are replaced using corresponding second data First data in unit, obtain target data.
In a kind of possible design, including at least one of the affiliated main body of the pending data in the data cell Identification information and at least one attribute information;
The processor 31 is being based on preset random number and key, using the first preset algorithm, calculates and obtains the first number It obtains before the first data on first Data Position, is also used to according to position, and from each data cell:
For each data cell, the identification information in unit generates first set based on the data, is based on the number Second set is generated according to the attribute information in unit, wherein the element in the first set is identification information and identification information The binary group that position is formed, the element in the second set are that attribute information is formed with the attribute information position Binary group.
In a kind of possible design, the processor 31 is being based on preset random number and key, default using first Algorithm, calculate obtain the first Data Position, and from each data cell obtain be located at first Data Position on first When data, it is specifically used for:
It based on default random number and key, is calculated using preset first function and obtains third Data Position, and from each The binary group being located on the third Data Position is obtained in the corresponding first set of data cell;For each data cell, Based on the key and from the identification information in the binary group got in the data cell, using preset second letter Number, which calculates, obtains the first Data Position, and obtains from the corresponding second set of the data cell and be located at first data bit The first data set.
In a kind of possible design, the processor 31 is being directed to each data cell, is based on the key, the water First data that printing is got accordingly and from the data cell are calculated using the second preset algorithm and are obtained second Data Position, and from when obtaining the second data being located on second Data Position in the compressed encoding, it is specifically used for:
It is described to be directed to each data cell, it is obtained based on the key, the watermark data and from the data cell The attribute information in binary group got is calculated using the second preset algorithm and obtains the second Data Position, and compiled from the compression The second data being located on second Data Position are obtained in code.
In a kind of possible design, the processor 31 is being based on preset random number and key, default using first Algorithm, calculate obtain the first Data Position, and from each data cell obtain be located at first Data Position on first When data, it is specifically used for:
It based on default random number and key, is calculated using the first preset algorithm and obtains the first Data Position, and from every number It is located at the binary group on first Data Position according to acquisition in the corresponding first set of unit;It, will for each data cell From the identification information in the binary group got in the data cell as the first data.
Equipment provided in this embodiment can be used in the method for executing any of the above-described embodiment, executive mode and beneficial effect Fruit seemingly, repeats no more herein.
The embodiment of the present invention also provides a kind of computer readable storage medium, including instruction, when described instruction is in the meter When being run on calculation machine, method that the computer can execute any of the above-described embodiment.
Finally, it should be noted that those of ordinary skill in the art will appreciate that whole in above-described embodiment method or Part process is that relevant hardware can be instructed to complete by computer program, and the program can be stored in a computer In readable storage medium storing program for executing, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, described to deposit Storage media can be disk, CD, read-only memory (ROM) or random access memory (RAM) etc..
Each functional unit in the embodiment of the present invention can integrate in a processing module, be also possible to each unit It is individually physically present, can also be integrated in two or more units in a module.Above-mentioned integrated module both can be with Using formal implementation of hardware, can also be realized in the form of software function module.If the integrated module is with software The form of functional module realizes, and when sold or used as an independent product, also can store and computer-readable deposits at one In storage media.Storage medium mentioned above can be read-only memory, disk or CD etc..
The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;Although referring to aforementioned each reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified, or equivalent substitution of some or all of the technical features;And These are modified or replaceed, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (11)

1. a kind of data processing method characterized by comprising
Watermark data and pending data are obtained, and data compression coding processing is carried out to the watermark data, compression is obtained and compiles Code, wherein the pending data is made of multiple data cells;
It based on preset random number and key, using the first preset algorithm, calculates and obtains the first Data Position, and from each data The first data being located on first Data Position are obtained in unit;
For each data cell, based on the key, the watermark data and the institute got from the data cell The first data are stated, using the second preset algorithm, calculates and obtains the second Data Position, and obtained from the compressed encoding and be located at institute State the second data on the second Data Position;
For each data cell, first data in the data cell are replaced using corresponding second data, are obtained Target data.
2. the method according to claim 1, wherein including belonging to the pending data in the data cell At least one identification information and at least one attribute information of main body;
It is described to be based on preset random number and key, it using the first preset algorithm, calculates and obtains the first Data Position, and from each Before obtaining the first data being located on first Data Position in data cell, the method also includes:
For each data cell, the identification information in unit generates first set based on the data, single based on the data Attribute information in member generates second set, wherein the element in the first set is identification information and identification information place The binary group that position is formed, the element in the second set is attribute information and the attribute information position is formed two Tuple.
3. according to the method described in claim 2, it is characterized in that, described be based on preset random number and key, using first Preset algorithm calculates and obtains the first Data Position, and is located on first Data Position from obtaining in each data cell First data, comprising:
It based on default random number and key, is calculated using preset first function and obtains third Data Position, and from each data The binary group being located on the third Data Position is obtained in the corresponding first set of unit;
For each data cell, based on the key and from the mark in the binary group got in the data cell Information is calculated using preset second function and obtains the first Data Position, and from the corresponding second set of the data cell Obtain the first data being located on first Data Position.
4. according to the method described in claim 3, it is characterized in that, described be directed to each data cell, based on the key, institute First data stating watermark data and getting from the data cell are calculated and are obtained using the second preset algorithm Second Data Position, and it is located at the second data on second Data Position from acquisition in the compressed encoding, comprising:
It is described to be directed to each data cell, it is got based on the key, the watermark data and from the data cell Binary group in attribute information calculate and obtain the second Data Position, and from the compressed encoding using the second preset algorithm Obtain the second data being located on second Data Position.
5. according to the method described in claim 2, it is characterized in that, described be based on preset random number and key, using first Preset algorithm calculates and obtains the first Data Position, and is located on first Data Position from obtaining in each data cell First data, comprising:
It based on default random number and key, is calculated using the first preset algorithm and obtains the first Data Position, and from each data sheet The binary group being located on first Data Position is obtained in the corresponding first set of member;
For each data cell, counted from the identification information in the binary group got in the data cell as first According to.
6. a kind of data processing equipment, which is characterized in that including processor and memory, instruction is stored in the memory, It is performed the following operations when the processor executes described instruction:
Watermark data and pending data are obtained, and data compression coding processing is carried out to the watermark data, compression is obtained and compiles Code, wherein the pending data is made of multiple data cells;
It based on preset random number and key, using the first preset algorithm, calculates and obtains the first Data Position, and from each data The first data being located on first Data Position are obtained in unit;
For each data cell, based on the key, the watermark data and the institute got from the data cell The first data are stated, using the second preset algorithm, calculates and obtains the second Data Position, and obtained from the compressed encoding and be located at institute State the second data on the second Data Position;
For each data cell, first data in the data cell are replaced using corresponding second data, are obtained Target data.
7. equipment according to claim 6, which is characterized in that include belonging to the pending data in the data cell At least one identification information and at least one attribute information of main body;
The processor is being based on preset random number and key, using the first preset algorithm, calculates and obtains the first Data Position, And obtained before the first data on first Data Position from each data cell, it is also used to:
For each data cell, the identification information in unit generates first set based on the data, single based on the data Attribute information in member generates second set, wherein the element in the first set is identification information and identification information place The binary group that position is formed, the element in the second set is attribute information and the attribute information position is formed two Tuple.
8. equipment according to claim 7, which is characterized in that the processor is being based on preset random number and key, It using the first preset algorithm, calculates and obtains the first Data Position, and obtained from each data cell and be located at first data When the first data on position, it is specifically used for:
It based on default random number and key, is calculated using preset first function and obtains third Data Position, and from each data The binary group being located on the third Data Position is obtained in the corresponding first set of unit;
For each data cell, based on the key and from the mark in the binary group got in the data cell Information is calculated using preset second function and obtains the first Data Position, and from the corresponding second set of the data cell Obtain the first data being located on first Data Position.
9. equipment according to claim 8, which is characterized in that the processor is being directed to each data cell, is based on institute Key, the watermark data and first data got from the data cell are stated, using the second preset algorithm, It calculates and obtains the second Data Position, and be located at the second data on second Data Position from acquisition in the compressed encoding When, it is specifically used for:
It is described to be directed to each data cell, it is got based on the key, the watermark data and from the data cell Binary group in attribute information calculate and obtain the second Data Position, and from the compressed encoding using the second preset algorithm Obtain the second data being located on second Data Position.
10. equipment according to claim 7, which is characterized in that the processor is being based on preset random number and key, It using the first preset algorithm, calculates and obtains the first Data Position, and obtained from each data cell and be located at first data When the first data on position, it is specifically used for:
It based on default random number and key, is calculated using the first preset algorithm and obtains the first Data Position, and from each data sheet The binary group being located on first Data Position is obtained in the corresponding first set of member;
For each data cell, counted from the identification information in the binary group got in the data cell as first According to.
11. a kind of computer readable storage medium, including instruction, when described instruction is run on the computer, the meter Calculation machine can execute method described in any one of the claims 1-5.
CN201811422511.7A 2018-11-27 2018-11-27 Data processing method, device and storage medium Active CN109522684B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811422511.7A CN109522684B (en) 2018-11-27 2018-11-27 Data processing method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811422511.7A CN109522684B (en) 2018-11-27 2018-11-27 Data processing method, device and storage medium

Publications (2)

Publication Number Publication Date
CN109522684A true CN109522684A (en) 2019-03-26
CN109522684B CN109522684B (en) 2020-07-28

Family

ID=65779482

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811422511.7A Active CN109522684B (en) 2018-11-27 2018-11-27 Data processing method, device and storage medium

Country Status (1)

Country Link
CN (1) CN109522684B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114708138A (en) * 2022-06-06 2022-07-05 天津联想协同科技有限公司 Network disk image watermark adding method and device, network disk and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850765A (en) * 2014-02-19 2015-08-19 中国移动通信集团福建有限公司 Watermark processing method, device and system
CN107330306A (en) * 2017-06-28 2017-11-07 百度在线网络技术(北京)有限公司 Text Watermarking is embedded in and extracting method, device, electronic equipment and storage medium
CN107992727A (en) * 2017-12-11 2018-05-04 北京安华金和科技有限公司 A kind of watermark processing realized based on legacy data deformation and data source tracing method
CN108665403A (en) * 2017-03-29 2018-10-16 腾讯科技(深圳)有限公司 Data waterprint embedded method, extracting method, device and digital watermarking system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850765A (en) * 2014-02-19 2015-08-19 中国移动通信集团福建有限公司 Watermark processing method, device and system
CN108665403A (en) * 2017-03-29 2018-10-16 腾讯科技(深圳)有限公司 Data waterprint embedded method, extracting method, device and digital watermarking system
CN107330306A (en) * 2017-06-28 2017-11-07 百度在线网络技术(北京)有限公司 Text Watermarking is embedded in and extracting method, device, electronic equipment and storage medium
CN107992727A (en) * 2017-12-11 2018-05-04 北京安华金和科技有限公司 A kind of watermark processing realized based on legacy data deformation and data source tracing method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114708138A (en) * 2022-06-06 2022-07-05 天津联想协同科技有限公司 Network disk image watermark adding method and device, network disk and storage medium

Also Published As

Publication number Publication date
CN109522684B (en) 2020-07-28

Similar Documents

Publication Publication Date Title
Mahajan et al. RETRACTED ARTICLE: Integration of Healthcare 4.0 and blockchain into secure cloud-based electronic health records systems
Kim et al. CCTV video processing metadata security scheme using character order preserving-transformation in the emerging multimedia
CN104200171B (en) A kind of Virtual File System based on Information hiding
Li et al. An efficient privacy-preserving public auditing protocol for cloud-based medical storage system
CN107423637A (en) Support the traceable integrality auditing method of electronic health record data on cloud
Hsu et al. An autonomous log storage management protocol with blockchain mechanism and access control for the Internet of Things
CN110784316B (en) Adaptive strategy updating fast attribute encryption method based on strategy hiding
CN109522684A (en) Data processing method, equipment and storage medium
Zhang et al. NANO: Cryptographic Enforcement of Readability and Editability Governance in Blockchain Databases
CN110889140A (en) Data processing method and storage medium
Li et al. A consortium blockchain wallet scheme based on dual-threshold key sharing
CN116305294B (en) Data leakage tracing method and device, electronic equipment and storage medium
Tiwari et al. A novel watermarking scheme for secure relational databases
Sharma et al. MapSafe: A complete tool for achieving geospatial data sovereignty
JP2005242530A (en) History recording system, history recording method, history recording program and terminal for receipt transferer
Renwick et al. Practical architectures for deployment of searchable encryption in a cloud environment
CN116560863A (en) Task management method and device based on block chain and computer equipment
CN100531032C (en) Method for storing cipher key
CN106845273B (en) A kind of method and apparatus for protecting intelligent terminal local file
Ma et al. EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy
CN105407147B (en) Method and device for downloading theme pack
Peng et al. Towards Privacy Preserving in 6G Networks: Verifiable Searchable Symmetric Encryption Based on Blockchain
Qi et al. Privacy-Preserving Image Classification Using ConvMixer with Adaptative Permutation Matrix and Block-Wise Scrambled Image Encryption
Zhang et al. Self-embedding watermarking algorithm under high tampering rates
CN114330758B (en) Data processing method, device and storage medium based on federal learning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant