CN109522684A - Data processing method, equipment and storage medium - Google Patents
Data processing method, equipment and storage medium Download PDFInfo
- Publication number
- CN109522684A CN109522684A CN201811422511.7A CN201811422511A CN109522684A CN 109522684 A CN109522684 A CN 109522684A CN 201811422511 A CN201811422511 A CN 201811422511A CN 109522684 A CN109522684 A CN 109522684A
- Authority
- CN
- China
- Prior art keywords
- data
- cell
- key
- obtains
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000003860 storage Methods 0.000 title claims abstract description 14
- 238000003672 processing method Methods 0.000 title claims abstract description 12
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 42
- 238000000034 method Methods 0.000 claims abstract description 32
- 238000012545 processing Methods 0.000 claims abstract description 18
- 238000013144 data compression Methods 0.000 claims abstract description 11
- 230000006870 function Effects 0.000 claims description 20
- 238000004364 calculation method Methods 0.000 claims description 7
- 238000007906 compression Methods 0.000 claims description 3
- 230000006835 compression Effects 0.000 claims description 3
- 238000013461 design Methods 0.000 description 6
- 238000002347 injection Methods 0.000 description 5
- 239000007924 injection Substances 0.000 description 5
- 239000000243 solution Substances 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- BQCADISMDOOEFD-UHFFFAOYSA-N Silver Chemical compound [Ag] BQCADISMDOOEFD-UHFFFAOYSA-N 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 229910052709 silver Inorganic materials 0.000 description 1
- 239000004332 silver Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Editing Of Facsimile Originals (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present invention provides a kind of data processing method, equipment and storage medium, wherein, this method comprises: obtaining watermark data and pending data, and data compression coding processing is carried out to watermark data, compressed encoding is obtained, wherein pending data is made of multiple data cells;It based on preset random number and key, is calculated using the first preset algorithm and obtains the first Data Position, and be located at the first data on the first Data Position from acquisition in each data cell;It is calculated using the second preset algorithm based on key, watermark data and the first data got from data cell for each data cell and obtains the second Data Position, and be located at the second data on the second Data Position from acquisition in compressed encoding;Target data is obtained using the first data in corresponding second data replacement data unit for each data cell.Technical solution provided in an embodiment of the present invention can be marked the ownership of data, facilitate the ownership of authentication data.
Description
Technical field
The present embodiments relate to field of computer technology more particularly to a kind of data processing method, equipment and storage to be situated between
Matter.
Background technique
Due to information-based and networking development, the data of social every field is caused all to present explosive growth, phase
After the scene for occurring for data being worth as the performance of the important means of production.To large-scale data how to carry out value excavate and
It utilizes, makes data from original static storage and the form of consumption value, be transformed into the form that can dynamically use simultaneously productive value,
It is the thing that every field all competitively sticks at.Meanwhile between different all sides of data also carry out data sharing, carry out across
Enterprise, inter-trade, cross-cutting data files, to obtain bigger value.
Although the technological means that cryptography can be used in large-scale data during transimission and storage is protected,
During being excavated, utilized as the means of production, it is current or need to be reduced into carry out in plain text using, still there is
The risk revealed by interior employee, external attack, third party helpmate or data purchaser.Therefore, how data are carried out
Ownership proves, how in the case where data are leaked, it can be found that the source of leakage of data, trace back data leakage person, just seem
With very important realistic meaning.
Summary of the invention
The embodiment of the present invention provides a kind of data processing method, equipment and storage medium, to inject in data content
Watermark, with the ownership of flag data.
First aspect of the embodiment of the present invention provides a kind of data processing method, comprising:
Watermark data and pending data are obtained, and data compression coding processing is carried out to the watermark data, is pressed
Code is reduced the staff, wherein the pending data is made of multiple data cells;It is pre- using first based on preset random number and key
Imputation method calculates and obtains the first Data Position, and from obtaining the be located on first Data Position in each data cell
One data;For each data cell, get based on the key, the watermark data and from the data cell
First data are calculated using the second preset algorithm and are obtained the second Data Position, and are obtained and be located at from the compressed encoding
The second data on second Data Position;For each data cell, the data are replaced using corresponding second data
First data in unit, obtain target data.
The second aspect of the embodiment of the present invention is to provide a kind of data processing equipment, which includes:
Processor and memory are stored with instruction in the memory, execute when the processor executes described instruction
Following operation:
Watermark data and pending data are obtained, and data compression coding processing is carried out to the watermark data, is pressed
Code is reduced the staff, wherein the pending data is made of multiple data cells;It is pre- using first based on preset random number and key
Imputation method calculates and obtains the first Data Position, and from obtaining the be located on first Data Position in each data cell
One data;For each data cell, get based on the key, the watermark data and from the data cell
First data are calculated using the second preset algorithm and are obtained the second Data Position, and are obtained and be located at from the compressed encoding
The second data on second Data Position;For each data cell, the data are replaced using corresponding second data
First data in unit, obtain target data.
The third aspect of the embodiment of the present invention provides a kind of computer readable storage medium, including instruction, when described instruction exists
When being run on the computer, method that the computer can execute above-mentioned first aspect.
The embodiment of the present invention carries out data compression coding to watermark data by obtaining watermark data and pending data
Processing obtains compressed encoding, is based on preset random data and key, and using the first preset algorithm, calculating the first data of acquisition is
Only, and from the first data being located on the first Data Position are obtained in each data cell, for each data cell, based on close
Key, watermark data and the first data got from data cell are calculated using the second preset algorithm and are obtained the second data
Position, from the second data being located on the second Data Position are obtained in compressed encoding, for each data cell, using corresponding
The first data in second data replacement data unit, the target data after obtaining injection watermark.The present embodiment passes through in data
Watermark is injected in content, realizes the label to data ownership, improves the reliability of data ownership label.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art
To obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of data processing method provided in an embodiment of the present invention;
Fig. 2 is a kind of flow chart of data processing method provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of data processing equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The term " includes " of description and claims of this specification and " having " and their any deformation, it is intended that
Be to cover it is non-exclusive include, for example, the device of the process or structure that contain series of steps is not necessarily limited to clearly arrange
Those of out structure or step but may include other steps being not clearly listed or intrinsic for these processes or device
Rapid or structure.
Noun involved in the embodiment of the present invention is explained first below in order to facilitate understanding:
Identification information, the embodiment of the present invention define the information for capableing of the main bodys such as unique identification user, equipment, things, activity
For identification information.If certain main body is user, identification information may be identification card number, cell-phone number, passport No., social security card number, silver
Row card number, mailbox etc., one in these information can be assigned to specific user agent.
Attribute information, it is attribute information that the present embodiment, which defines the information for main body to be described,.Such as main body is carried out
Description, such as gender, date of birth, residence, educational background information are customer attribute information.Mailbox is described, such as
Registration date, IP is logged in, close guarantor's problem etc. is mailbox attribute information etc..
Corresponding label information can be obtained after carrying out feature classification according to preset rules to the attribute information of main body, such as at certain
Day has carried out the mobile phone user of shopping browsing, the label letter of the user using the mobile flow of 4G the period in the morning 9:00~12:00
Breath can be divided into telecom operators, discharge pattern, cell phone application classification etc..
It should be understood that the meaning that some information indicate different subjects is different, such as geographical location latitude and longitude information,
When user is described, expression is user location attribute information, and when diagram data is described over the ground is then mark
Information indicates the world somewhere.
Aiming at the problem that how to prove data ownership and how to trace source of leakage after leaking data, the prior art is provided
The following two kinds method:
Method one establishes closed system environment, and data circulation and use are limited in the system environments, can not flow out.System
There are complete access control, auditing system and firewall in system, and there is stringent data flow management strategy to be controlled.When having
When data are revealed, leakage main body can be known by auditing system and revealed time and operation that behavior occurs.But side
Method one must limit data and use in limited enclosed environment, and data sphere of circulation is limited, can not promote data sharing, and by
The necessarily centralization of the environment of limit, is otherwise difficult to be managed, but will thus make paired data supplier or data management
Person bears the operation of the enclosed environment.
Method two carries out digital watermarking injection to the biggish file of the redundancies content such as picture, document, audio, video,
Injection object is the carrier of data, i.e. file format, rather than file content.Such as picture file format jpeg, bmp, document files
Format doc, excel, audio file formats wav, mp3, video file format mp4, mpeg etc..When there is data to reveal,
By detecting the digital watermarking in these document format datas, leakage main body is known.But method two is in the bearer documents of data
There is excessive limitation, it is desirable that document format data is needed comprising biggish redundant space, to carry out digital watermarking on format
Filling operation.This method file format lesser for redundant space can not be carried out, simultaneously for independent of file format
Be also for data it is inefficient or invalid, such as when the content in document is replicated from the file of doc format, and be stored in
When in the file of txt format, data have occurred and that leakage, but can not carry out watermark detection.
In view of the above-mentioned problems existing in the prior art, the embodiment of the invention provides a kind of data processing method, this method
By adding watermark in the data content of data, so that data are able to demonstrate that data circulation is in open environment
Ownership, and method provided in an embodiment of the present invention can get rid of dependence of the conventional watermark method for implanting to document format data,
Even if data content is replicated or data file is by format transformation, also still number can be proved by the watermark in data content
According to ownership, or even the leakage point for the data that can also trace to the source.
The scheme of the embodiment of the present invention is described below with reference to exemplary embodiment.
Fig. 1 is a kind of flow chart of data processing method provided in an embodiment of the present invention, and this method can be by a kind of data
Processing equipment is handled, wherein in order to make it easy to understand, illustratively can be interpreted as having by data processing equipment in the present embodiment
The computer of calculation processing power.As shown in Figure 1, this method comprises the following steps:
Step 101 obtains watermark data and pending data, and carries out at data compression coding to the watermark data
Reason, obtains compressed encoding, wherein the pending data is made of multiple data cells.
Wherein, preset compressed encoding function can be used after getting watermark data and calculate acquisition watermark for the present embodiment
The corresponding compressed encoding of data.
So-called pending data includes multiple data cells in the present embodiment, which can be specially data
Entry or data block.Wherein in each data cell including the affiliated main body of pending data at least one identification information and
At least one attribute information.
Step 102 is based on preset random number and key, using the first preset algorithm, calculates and obtains the first Data Position,
And it is located at the first data on first Data Position from acquisition in each data cell.
Main body belonging to random number and key and pending data in the present embodiment is bound.
The first preset algorithm in the present embodiment, which can according to need, to be set, for be easy to understand and first can be preset
Algorithm is interpreted as preset cipher function.
The first Data Position in the present embodiment is used to indicate the position that data are obtained from data cell.Such as in one kind
In possible design, which can be specifically used for the position that instruction obtains identification information from data cell, or another
In the possible design of kind, which may be used to indicate that the position that attribute information is obtained from data cell.For example, this implementation
Example first can generate first set for the identification information in each data cell based on the data unit, be based on data cell
In attribute information generate second set so that element in first set is that identification information and identification information position are formed
Binary group, the element in second set is attribute information and the binary group that the attribute information position is formed, for example, raw
At first set and second set can be following form:
First set: SetID={ (ID1, Loc1),…,(IDm, Locm),
Second set: Settttr={ (Attr1, Loc1),…,(Attrn, Locn)}
Wherein, IDmIndicate m-th of identification information in data cell, LocmIndicate m-th of mark letter in data cell
The position of breath, AttrnIndicate n-th of attribute information in data cell, LocnIndicate n-th of attribute information in data cell
Position.That is, the first Data Position can serve to indicate that first set SetIDIn be located at the first Data Position on mark
Know information, or can be used for instruction second set SetAttrIn be located in the attribute information on the first Data Position.Certainly
It limits it is only for illustrating rather than uniquely.
Exemplary, the present embodiment can be directly by the position based on random number and cipher key calculation acquisition, as the first data
Position.Such as, it is assumed that the first Data Position is used to indicate the identification information in first set, then can be first according to the first data bit
It sets from obtaining the binary group being located on the first Data Position in data cell, then obtain identification information as the from the binary group
One data.
Or can also after obtaining a third Data Position based on random number and cipher key calculation, based on above-mentioned key with
And identification information or attribute information indicated by the third Data Position, it is calculated using preset second function and obtains the first data
Position.The calculation method of certain first Data Position provided herein is merely illustrative to be illustrated rather than to unique limit of the invention
It is fixed.
Step 103 is directed to each data cell, based on the key, the watermark data and from the data cell
In first data that get calculate using the second preset algorithm and obtain the second Data Position, and from the compressed encoding
It is middle to obtain the second data being located on second Data Position.
Second preset algorithm involved in the present embodiment can be identical or not identical with above-mentioned first preset algorithm, than
Such as, in one possible implementation, the second preset algorithm and the first preset algorithm can be specially cipher function.
The second Data Position in the present embodiment is used to indicate the position that data are obtained from compressed encoding.If for example
Attribute information in first Data Position designation date unit on some position, then using the attribute information as the first data, base
The Data Position obtained in compressed encoding is calculated in the attribute information, key, watermark data, so that data in this position be made
For the second data.
Step 104 is directed to each data cell, and described the in the data cell is replaced using corresponding second data
One data, obtain target data.
The present embodiment carries out data compression coding processing to watermark data by obtaining watermark data and pending data
Compressed encoding is obtained, preset random data and key are based on, using the first preset algorithm, is calculated until obtaining the first data,
And from the first data being located on the first Data Position are obtained in each data cell, for each data cell, based on key,
Watermark data and the first data got from data cell are calculated using the second preset algorithm and are obtained the second data bit
It sets, from the second data being located on the second Data Position are obtained in compressed encoding, for each data cell, using corresponding the
The first data in two data replacement data units, the target data after obtaining injection watermark.The present embodiment passes through in data
Watermark is injected in appearance, realizes the label to data ownership, improves the reliability of data ownership label.
Above-described embodiment is further optimized and extended below.
Fig. 2 is a kind of flow chart of data processing method provided in an embodiment of the present invention, as shown in Fig. 2, in Fig. 1 embodiment
On the basis of, the present embodiment includes the following steps:
Step 201 obtains watermark data and pending data, and carries out at data compression coding to the watermark data
Reason, obtains compressed encoding, wherein the pending data is made of multiple data cells.
Wherein, at least one identification information and at least one attribute in data cell including the affiliated main body of pending data
Information.
Step 202 is directed to each data cell, and the identification information in unit generates first set, base based on the data
Attribute information in the data cell generates second set, wherein the element in the first set be identification information and
The binary group that identification information position is formed, where the element in the second set is attribute information and the attribute information
The binary group that position is formed.
Step 203 is based on default random number and key, is calculated using preset first function and obtains third Data Position,
And it is located at the binary group on the third Data Position from acquisition in the corresponding first set of each data cell.
Step 204 is directed to each data cell, described two got based on the key and from the data cell
Identification information in tuple is calculated using preset second function and obtains the first Data Position, and corresponding from the data cell
Second set in obtain be located at first Data Position on the first data.
Step 205 is directed to each data cell, based on the key, the watermark data and from the data cell
In attribute information in the binary group that gets calculate using the second preset algorithm and obtain the second Data Position, and from the pressure
Reduce the staff the second data for obtaining and being located on second Data Position in code.
Step 206 is directed to each data cell, and described the in the data cell is replaced using corresponding second data
One data, obtain target data.
It is exemplary, it is assumed that there is watermark data WM, then can be calculated by compressed encoding function CE, obtain compressed encoding W,
I-th of element representation of middle W is wi, (1,2 ... l), and l indicates the length of W by i=.
Further, it is assumed that data BD to be handled, BD are made of data cell RowText, then for each
RowText identifies identification information and attribute information in RowText, and records its position, generates first set: SetID=
{(ID1, Loc1),…,(IDm, Locm) and second set: SetAttr={ (Attr1, Loc1),…,(Attrn, Locn),
Middle IDmIndicate m-th of identification information in data cell, LocmIndicate the position of m-th of identification information in data cell,
AttrnIndicate n-th of attribute information in data cell, LocnIndicate the position of n-th of attribute information in data cell.
Further, third number is calculated using preset first function based on preset random data Rpre and key Key
According to position, which is used to indicate the position of first set identification information.A kind of wherein optional calculation method
Third Data Position α can be calculated using cipher function H, expression formula is as follows:
H (Rpre | | Key) mod m=α
After determining third Data Position, for each data cell, obtained from the first set of data cell RowText
Fetch bit is in the binary group (ID on third Data Positionα, Locα)=SetID(α), based on the identification information ID in the binary groupαWith
The first Data Position β is calculated using preset second function (such as cipher function), further in preset key Key
It is located at the binary group (Attr on the first Data Position from acquisition in the second set of data cell RowText againβ, Locβ)=
SetAttr(β)。
Further, for each data cell, key Key, attribute information Attr are based onβIt is calculated with watermark data WM
To the second Data Position γ for being used to indicate Data Position in compressed encoding, and then obtains in compressed encoding and be located on the γ of position
Second data wγ.To wγAnd AttrβAttr is calculated using confused function FCβ'=FC (Attrβ,wγ, γ), use Attrβ′
Replace AttrβObtain target data.
Optionally, the present embodiment can also include the extraction process of watermark data.Specifically, for each data segment member,
Attr can be got by method similar to the aboveβ', and using the inverse function of confused function FC to Attrβ' carry out
Processing, obtains corresponding AttrβAnd positioned at the data w in compressed encoding on the γ of positionγ, getting all data cells pair
The w answeredγIt afterwards, can be to wγIt is ranked up, obtains compressed encoding.
Certainly it above are only and illustrate rather than to unique restriction of the invention.
The present embodiment carries out data compression coding processing to watermark data by obtaining watermark data and pending data
Compressed encoding is obtained, preset random data and key are based on, using the first preset algorithm, is calculated until obtaining the first data,
And from the first data being located on the first Data Position are obtained in each data cell, for each data cell, based on key,
Watermark data and the first data got from data cell are calculated using the second preset algorithm and are obtained the second data bit
It sets, from the second data being located on the second Data Position are obtained in compressed encoding, for each data cell, using corresponding the
The first data in two data replacement data units, the target data after obtaining injection watermark.The present embodiment passes through in data
Watermark is injected in appearance, realizes the label to data ownership, improves the reliability of data ownership label.
Fig. 3 is a kind of structural schematic diagram of data processing equipment provided in an embodiment of the present invention, as shown in figure 3, equipment 30
Include: processor 31 and memory 32, be stored with instruction in the memory 32, when the processor 31 executes described instruction
It performs the following operations:
Watermark data and pending data are obtained, and data compression coding processing is carried out to the watermark data, is pressed
Code is reduced the staff, wherein the pending data is made of multiple data cells;It is pre- using first based on preset random number and key
Imputation method calculates and obtains the first Data Position, and from obtaining the be located on first Data Position in each data cell
One data;For each data cell, get based on the key, the watermark data and from the data cell
First data are calculated using the second preset algorithm and are obtained the second Data Position, and are obtained and be located at from the compressed encoding
The second data on second Data Position;For each data cell, the data are replaced using corresponding second data
First data in unit, obtain target data.
In a kind of possible design, including at least one of the affiliated main body of the pending data in the data cell
Identification information and at least one attribute information;
The processor 31 is being based on preset random number and key, using the first preset algorithm, calculates and obtains the first number
It obtains before the first data on first Data Position, is also used to according to position, and from each data cell:
For each data cell, the identification information in unit generates first set based on the data, is based on the number
Second set is generated according to the attribute information in unit, wherein the element in the first set is identification information and identification information
The binary group that position is formed, the element in the second set are that attribute information is formed with the attribute information position
Binary group.
In a kind of possible design, the processor 31 is being based on preset random number and key, default using first
Algorithm, calculate obtain the first Data Position, and from each data cell obtain be located at first Data Position on first
When data, it is specifically used for:
It based on default random number and key, is calculated using preset first function and obtains third Data Position, and from each
The binary group being located on the third Data Position is obtained in the corresponding first set of data cell;For each data cell,
Based on the key and from the identification information in the binary group got in the data cell, using preset second letter
Number, which calculates, obtains the first Data Position, and obtains from the corresponding second set of the data cell and be located at first data bit
The first data set.
In a kind of possible design, the processor 31 is being directed to each data cell, is based on the key, the water
First data that printing is got accordingly and from the data cell are calculated using the second preset algorithm and are obtained second
Data Position, and from when obtaining the second data being located on second Data Position in the compressed encoding, it is specifically used for:
It is described to be directed to each data cell, it is obtained based on the key, the watermark data and from the data cell
The attribute information in binary group got is calculated using the second preset algorithm and obtains the second Data Position, and compiled from the compression
The second data being located on second Data Position are obtained in code.
In a kind of possible design, the processor 31 is being based on preset random number and key, default using first
Algorithm, calculate obtain the first Data Position, and from each data cell obtain be located at first Data Position on first
When data, it is specifically used for:
It based on default random number and key, is calculated using the first preset algorithm and obtains the first Data Position, and from every number
It is located at the binary group on first Data Position according to acquisition in the corresponding first set of unit;It, will for each data cell
From the identification information in the binary group got in the data cell as the first data.
Equipment provided in this embodiment can be used in the method for executing any of the above-described embodiment, executive mode and beneficial effect
Fruit seemingly, repeats no more herein.
The embodiment of the present invention also provides a kind of computer readable storage medium, including instruction, when described instruction is in the meter
When being run on calculation machine, method that the computer can execute any of the above-described embodiment.
Finally, it should be noted that those of ordinary skill in the art will appreciate that whole in above-described embodiment method or
Part process is that relevant hardware can be instructed to complete by computer program, and the program can be stored in a computer
In readable storage medium storing program for executing, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, described to deposit
Storage media can be disk, CD, read-only memory (ROM) or random access memory (RAM) etc..
Each functional unit in the embodiment of the present invention can integrate in a processing module, be also possible to each unit
It is individually physically present, can also be integrated in two or more units in a module.Above-mentioned integrated module both can be with
Using formal implementation of hardware, can also be realized in the form of software function module.If the integrated module is with software
The form of functional module realizes, and when sold or used as an independent product, also can store and computer-readable deposits at one
In storage media.Storage medium mentioned above can be read-only memory, disk or CD etc..
The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;Although referring to aforementioned each reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified, or equivalent substitution of some or all of the technical features;And
These are modified or replaceed, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (11)
1. a kind of data processing method characterized by comprising
Watermark data and pending data are obtained, and data compression coding processing is carried out to the watermark data, compression is obtained and compiles
Code, wherein the pending data is made of multiple data cells;
It based on preset random number and key, using the first preset algorithm, calculates and obtains the first Data Position, and from each data
The first data being located on first Data Position are obtained in unit;
For each data cell, based on the key, the watermark data and the institute got from the data cell
The first data are stated, using the second preset algorithm, calculates and obtains the second Data Position, and obtained from the compressed encoding and be located at institute
State the second data on the second Data Position;
For each data cell, first data in the data cell are replaced using corresponding second data, are obtained
Target data.
2. the method according to claim 1, wherein including belonging to the pending data in the data cell
At least one identification information and at least one attribute information of main body;
It is described to be based on preset random number and key, it using the first preset algorithm, calculates and obtains the first Data Position, and from each
Before obtaining the first data being located on first Data Position in data cell, the method also includes:
For each data cell, the identification information in unit generates first set based on the data, single based on the data
Attribute information in member generates second set, wherein the element in the first set is identification information and identification information place
The binary group that position is formed, the element in the second set is attribute information and the attribute information position is formed two
Tuple.
3. according to the method described in claim 2, it is characterized in that, described be based on preset random number and key, using first
Preset algorithm calculates and obtains the first Data Position, and is located on first Data Position from obtaining in each data cell
First data, comprising:
It based on default random number and key, is calculated using preset first function and obtains third Data Position, and from each data
The binary group being located on the third Data Position is obtained in the corresponding first set of unit;
For each data cell, based on the key and from the mark in the binary group got in the data cell
Information is calculated using preset second function and obtains the first Data Position, and from the corresponding second set of the data cell
Obtain the first data being located on first Data Position.
4. according to the method described in claim 3, it is characterized in that, described be directed to each data cell, based on the key, institute
First data stating watermark data and getting from the data cell are calculated and are obtained using the second preset algorithm
Second Data Position, and it is located at the second data on second Data Position from acquisition in the compressed encoding, comprising:
It is described to be directed to each data cell, it is got based on the key, the watermark data and from the data cell
Binary group in attribute information calculate and obtain the second Data Position, and from the compressed encoding using the second preset algorithm
Obtain the second data being located on second Data Position.
5. according to the method described in claim 2, it is characterized in that, described be based on preset random number and key, using first
Preset algorithm calculates and obtains the first Data Position, and is located on first Data Position from obtaining in each data cell
First data, comprising:
It based on default random number and key, is calculated using the first preset algorithm and obtains the first Data Position, and from each data sheet
The binary group being located on first Data Position is obtained in the corresponding first set of member;
For each data cell, counted from the identification information in the binary group got in the data cell as first
According to.
6. a kind of data processing equipment, which is characterized in that including processor and memory, instruction is stored in the memory,
It is performed the following operations when the processor executes described instruction:
Watermark data and pending data are obtained, and data compression coding processing is carried out to the watermark data, compression is obtained and compiles
Code, wherein the pending data is made of multiple data cells;
It based on preset random number and key, using the first preset algorithm, calculates and obtains the first Data Position, and from each data
The first data being located on first Data Position are obtained in unit;
For each data cell, based on the key, the watermark data and the institute got from the data cell
The first data are stated, using the second preset algorithm, calculates and obtains the second Data Position, and obtained from the compressed encoding and be located at institute
State the second data on the second Data Position;
For each data cell, first data in the data cell are replaced using corresponding second data, are obtained
Target data.
7. equipment according to claim 6, which is characterized in that include belonging to the pending data in the data cell
At least one identification information and at least one attribute information of main body;
The processor is being based on preset random number and key, using the first preset algorithm, calculates and obtains the first Data Position,
And obtained before the first data on first Data Position from each data cell, it is also used to:
For each data cell, the identification information in unit generates first set based on the data, single based on the data
Attribute information in member generates second set, wherein the element in the first set is identification information and identification information place
The binary group that position is formed, the element in the second set is attribute information and the attribute information position is formed two
Tuple.
8. equipment according to claim 7, which is characterized in that the processor is being based on preset random number and key,
It using the first preset algorithm, calculates and obtains the first Data Position, and obtained from each data cell and be located at first data
When the first data on position, it is specifically used for:
It based on default random number and key, is calculated using preset first function and obtains third Data Position, and from each data
The binary group being located on the third Data Position is obtained in the corresponding first set of unit;
For each data cell, based on the key and from the mark in the binary group got in the data cell
Information is calculated using preset second function and obtains the first Data Position, and from the corresponding second set of the data cell
Obtain the first data being located on first Data Position.
9. equipment according to claim 8, which is characterized in that the processor is being directed to each data cell, is based on institute
Key, the watermark data and first data got from the data cell are stated, using the second preset algorithm,
It calculates and obtains the second Data Position, and be located at the second data on second Data Position from acquisition in the compressed encoding
When, it is specifically used for:
It is described to be directed to each data cell, it is got based on the key, the watermark data and from the data cell
Binary group in attribute information calculate and obtain the second Data Position, and from the compressed encoding using the second preset algorithm
Obtain the second data being located on second Data Position.
10. equipment according to claim 7, which is characterized in that the processor is being based on preset random number and key,
It using the first preset algorithm, calculates and obtains the first Data Position, and obtained from each data cell and be located at first data
When the first data on position, it is specifically used for:
It based on default random number and key, is calculated using the first preset algorithm and obtains the first Data Position, and from each data sheet
The binary group being located on first Data Position is obtained in the corresponding first set of member;
For each data cell, counted from the identification information in the binary group got in the data cell as first
According to.
11. a kind of computer readable storage medium, including instruction, when described instruction is run on the computer, the meter
Calculation machine can execute method described in any one of the claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811422511.7A CN109522684B (en) | 2018-11-27 | 2018-11-27 | Data processing method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811422511.7A CN109522684B (en) | 2018-11-27 | 2018-11-27 | Data processing method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109522684A true CN109522684A (en) | 2019-03-26 |
CN109522684B CN109522684B (en) | 2020-07-28 |
Family
ID=65779482
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811422511.7A Active CN109522684B (en) | 2018-11-27 | 2018-11-27 | Data processing method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109522684B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114708138A (en) * | 2022-06-06 | 2022-07-05 | 天津联想协同科技有限公司 | Network disk image watermark adding method and device, network disk and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104850765A (en) * | 2014-02-19 | 2015-08-19 | 中国移动通信集团福建有限公司 | Watermark processing method, device and system |
CN107330306A (en) * | 2017-06-28 | 2017-11-07 | 百度在线网络技术(北京)有限公司 | Text Watermarking is embedded in and extracting method, device, electronic equipment and storage medium |
CN107992727A (en) * | 2017-12-11 | 2018-05-04 | 北京安华金和科技有限公司 | A kind of watermark processing realized based on legacy data deformation and data source tracing method |
CN108665403A (en) * | 2017-03-29 | 2018-10-16 | 腾讯科技(深圳)有限公司 | Data waterprint embedded method, extracting method, device and digital watermarking system |
-
2018
- 2018-11-27 CN CN201811422511.7A patent/CN109522684B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104850765A (en) * | 2014-02-19 | 2015-08-19 | 中国移动通信集团福建有限公司 | Watermark processing method, device and system |
CN108665403A (en) * | 2017-03-29 | 2018-10-16 | 腾讯科技(深圳)有限公司 | Data waterprint embedded method, extracting method, device and digital watermarking system |
CN107330306A (en) * | 2017-06-28 | 2017-11-07 | 百度在线网络技术(北京)有限公司 | Text Watermarking is embedded in and extracting method, device, electronic equipment and storage medium |
CN107992727A (en) * | 2017-12-11 | 2018-05-04 | 北京安华金和科技有限公司 | A kind of watermark processing realized based on legacy data deformation and data source tracing method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114708138A (en) * | 2022-06-06 | 2022-07-05 | 天津联想协同科技有限公司 | Network disk image watermark adding method and device, network disk and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109522684B (en) | 2020-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mahajan et al. | RETRACTED ARTICLE: Integration of Healthcare 4.0 and blockchain into secure cloud-based electronic health records systems | |
Kim et al. | CCTV video processing metadata security scheme using character order preserving-transformation in the emerging multimedia | |
CN104200171B (en) | A kind of Virtual File System based on Information hiding | |
Li et al. | An efficient privacy-preserving public auditing protocol for cloud-based medical storage system | |
CN107423637A (en) | Support the traceable integrality auditing method of electronic health record data on cloud | |
Hsu et al. | An autonomous log storage management protocol with blockchain mechanism and access control for the Internet of Things | |
CN110784316B (en) | Adaptive strategy updating fast attribute encryption method based on strategy hiding | |
CN109522684A (en) | Data processing method, equipment and storage medium | |
Zhang et al. | NANO: Cryptographic Enforcement of Readability and Editability Governance in Blockchain Databases | |
CN110889140A (en) | Data processing method and storage medium | |
Li et al. | A consortium blockchain wallet scheme based on dual-threshold key sharing | |
CN116305294B (en) | Data leakage tracing method and device, electronic equipment and storage medium | |
Tiwari et al. | A novel watermarking scheme for secure relational databases | |
Sharma et al. | MapSafe: A complete tool for achieving geospatial data sovereignty | |
JP2005242530A (en) | History recording system, history recording method, history recording program and terminal for receipt transferer | |
Renwick et al. | Practical architectures for deployment of searchable encryption in a cloud environment | |
CN116560863A (en) | Task management method and device based on block chain and computer equipment | |
CN100531032C (en) | Method for storing cipher key | |
CN106845273B (en) | A kind of method and apparatus for protecting intelligent terminal local file | |
Ma et al. | EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy | |
CN105407147B (en) | Method and device for downloading theme pack | |
Peng et al. | Towards Privacy Preserving in 6G Networks: Verifiable Searchable Symmetric Encryption Based on Blockchain | |
Qi et al. | Privacy-Preserving Image Classification Using ConvMixer with Adaptative Permutation Matrix and Block-Wise Scrambled Image Encryption | |
Zhang et al. | Self-embedding watermarking algorithm under high tampering rates | |
CN114330758B (en) | Data processing method, device and storage medium based on federal learning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |