CN109740318A - A kind of electric business commodity copyright infringement evidence-obtaining system and method - Google Patents
A kind of electric business commodity copyright infringement evidence-obtaining system and method Download PDFInfo
- Publication number
- CN109740318A CN109740318A CN201910007483.0A CN201910007483A CN109740318A CN 109740318 A CN109740318 A CN 109740318A CN 201910007483 A CN201910007483 A CN 201910007483A CN 109740318 A CN109740318 A CN 109740318A
- Authority
- CN
- China
- Prior art keywords
- information
- electric business
- commodity
- picture
- functional module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of electric business commodity copyright infringement evidence-obtaining system and method, which includes encryption function module, merging functional module, abstraction function module and decryption functional module, this method comprises: the encryption and merging of (1) copyright information;(2) copyright evidence obtaining is carried out in electric business platform.Can be inserted into privately owned label in commodity picture file, the commodity picture file after being inserted into privately owned label have substantially no effect on can normal use can not visually be recognized wherein privately owned label information mixes in the picture.Using this characteristic of picture file, it can be placed in hiding information, the hiding information being placed into can also be extracted efficiently and distinguish.If being copyright information by hiding information content setting, the judgement whether use to image file passes through authorization can be achieved.When the image file being determined has specific hiding information, owner is by legal authorization;It is on the contrary then uncommitted.
Description
Technical field
The present invention relates to be related to a kind of electric business commodity copyright infringement evidence-obtaining system and method.
Background technique
Illegal electric business operator often utilizes the specific condition under electric business environment, needs to authorize without obligee's legal authorization operation
The commodity that could be managed, but actually and without authorization.The commodity that it is managed are only similar to copyright commodity in shape or feature,
But it is nominally master commodity, really imitative product, therefore its behavior constitutes copyright infringement.
Under electric business environment, commodity or LOGO picture are often the carrier of commodity copyright.Illegal electric business operator is by cutting
The modes such as screen obtain original commodity picture, place it in oneself on-line shop and directly use or use after compiled, are indicated certainly with this
The legal identity that oneself has been authorized to, cheats consumer, and unlawful interests is sought in induction consumption.The above behavior has invaded obligee's
Lawful right and interests.
For the above behavior, the invention patent proposes a kind of electric business commodity copyright infringement evidence-obtaining system and method, to steal
The copyright infringement behavior being characterized with commodity picture is collected evidence, and provides technical support for obligee's right-safeguarding.
Summary of the invention
It is an object of the invention to be directed to problem of the prior art, provide a kind of electric business commodity copyright infringement evidence-obtaining system and
Method.
In order to solve the above-mentioned technical problem, it adopts the following technical scheme that
A kind of electric business commodity copyright infringement evidence-obtaining system, including encryption function module, merging functional module, abstraction function mould
Block and decryption functional module,
The encryption function module: the encryption to copyright information is realized using Encryption Algorithm.
The merging functional module: encrypted copyright information is set in realization to targeted graphical file with privately owned label
Enter.
Abstraction function module: the extraction to the privately owned label of targeted graphical file is realized.
It decrypts functional module: realizing the decryption to copyright information.
The system also includes copyright informations to check functional module, and the function of the copyright information inspection functional module is such as
Under:
Obtain the copyright information of certain legal electric business commodity picture.
The commodity picture of every other on-line shop in electric business platform management system is traversed.
To each picture traversed using abstraction function module and decryption functional module carry out privately owned label extraction and
The decryption of copyright information.
The copyright information that will acquire is compared with the copyright information that on-line shop's commodity picture is extracted.
If copyright information has not been obtained, directly determine that the on-line shop operator being traversed to is doubtful infringement, by its figure
Piece evidence is retained.
If get copyright authorization information, but copyright authorization information with should to be authorized to object information inconsistent, then determine
The on-line shop operator being traversed to is doubtful infringement, its picture evidence is retained.
If getting copyright authorization information, and copyright authorization information is consistent with that should be authorized to object information, then determining should
Commodity picture used in electric business operator is the picture of normal authorization.
A kind of electric business commodity copyright infringement evidence collecting method, comprising the following steps:
(1) encryption and merging of copyright information: commodity picture is chosen, by the merging functional module in the commodity figure
It is inserted into privately owned label in piece, the copyright information of the commodity picture is contained in the privately owned label.
(2) copyright evidence obtaining is carried out in electric business platform:
(a) assume that commodity picture used in all electric business operators by authorizing, includes authorization in the commodity picture
Copyright information afterwards.
(b) it checks functional module by the copyright information to check commodity picture used in electric business operator, such as
Copyright information has not been obtained in fruit, then directly determines that the on-line shop operator being traversed to is doubtful infringement, by the commodity picture
Evidence is retained;If get copyright authorization information, but copyright authorization information with should to be authorized to object information inconsistent, then determine
The on-line shop operator being traversed to is doubtful infringement, and the evidence of the commodity picture is retained;If getting copyright authorization letter
Breath, and copyright authorization information with should be authorized to that object information is consistent, then determine that commodity picture used in electric business operator is positive
The picture often authorized.
(c) copyright information for obtaining next electric business commodity picture, repeats step (b).
Further, in the step (1), the privately owned label is inserted in the directory entry of the commodity picture.
Further, in the step (1), the encryption method of the copyright information is as follows: passing through the encryption function mould
The copyright marking of copyright information is arranged in block, and the copyright marking is set as one 32 numeric strings, and each bit digital correspondence takes
Its binary-coded decimal forms 128 numeric string, is encrypted to 128 digit word strings using 3DES algorithm, obtains the close of copyright marking
Code.
Further, in the step (1), the method for posting of the copyright information is as follows:
(a) in image file directory composition, the number of directory entry is added 1 on current basal, increases an attribute item newly.
(b) it increases the last one former directory entry serial number of directory entry serial number newly and adds 1.
(c) byte number extends this as 12, type integer.
(d) storage location that the last one former directory entry is found in directory entry memory block, fills in category after the directory entry
Property correlation values.
(e) Tag extends this as newly-increased directory entry serial number;Type extends this as integer;Length extends this as 64, indicates 64
128 bytes of integer-bit.
(f) valueOffset fills in the offset at storage copyright password storage area relative file beginning.
(g) it at file beginning and deviates at valueOffset, fills in 128 copyright passwords.
Further, in (b) of the step (2), inspection process is being carried out to commodity picture used in electric business operator
In, the extraction of privately owned label and the decryption of copyright information are carried out by abstraction function module and decryption functional module, according to institute
The inverse process for stating the merging process of merging functional module, takes out copyright password;After taking out copyright password, carried out using 3DES algorithm
Decryption, obtains copyright information initial value.
As a result of the above technical solution, the following beneficial effects are obtained:
The present invention is a kind of electric business commodity copyright infringement evidence-obtaining system and method, be can be inserted into commodity picture file privately owned
Label, the commodity picture file after being inserted into privately owned label have substantially no effect on can normal use, wherein privately owned label information is mingled in
In image, can not visually it recognize.Using this characteristic of picture file, it can be placed in hiding information, the hiding information being placed into
It can be extracted efficiently and distinguish.If being copyright information by hiding information content setting, the use to image file can be achieved
Whether the judgement of authorization is passed through.When the image file being determined has specific hiding information, owner is awarded by legal
Power;It is on the contrary then uncommitted.
For legal authorization electric business operator, obligee provides the commodity picture with copyright hiding information, electrical supplier warp
Battalion person uses in electric business platform management backstage upload to its on-line shop.It, then can only be by cutting for unwarranted electric business operator
The modes such as screen obtain, but its graphic file generated does not have copyright information entrained by privately owned label centainly.Therefore, it uploads
Content to the graphic file of this on-line shop is different.The commodity graphics file of each on-line shop is stored entirely in electric business platform management system
System.Within the system, original copyright information and the copyright information that platform Zhong Ge on-line shop commodity picture file should carry are compared, i.e.,
It can obtain corresponding conclusion.
To prevent legal authorization people from picture reproduction will be authorized to use to other people, removing in privately owned label includes that copyright authorization is believed
Breath is outer, the object information also authorized comprising copyright, such as on-line shop ID.When system carry out copyright comparison during find certain net
When the commodity picture authorization object information in shop and the actual information of on-line shop are not inconsistent, equally also it is judged as uncommitted.
This method implement it is simple and effective, can quickly find commodity picture used in electric business operator whether be authorization after quotient
Product picture.
Detailed description of the invention
The present invention will be further explained below with reference to the attached drawings:
Fig. 1 is the structure chart of Tiff file in the present invention;
Fig. 2 is the structural schematic diagram of tiff file citing 1 in the present invention;
Fig. 3 is the structural schematic diagram of tiff file citing 2 in the present invention.
Specific embodiment
In order to make the objectives, technical solutions and advantages of the present invention clearer, below by accompanying drawings and embodiments, to this
Invention is further elaborated.However, it should be understood that the specific embodiments described herein are merely illustrative of the present invention,
The range being not intended to restrict the invention.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to keep away
Exempt from unnecessarily to obscure idea of the invention.
Embodiment
A kind of electric business commodity copyright infringement evidence-obtaining system, including encryption function module, merging functional module, abstraction function mould
Block and decryption functional module,
The encryption function module: the encryption to copyright information is realized using Encryption Algorithm.
The merging functional module: encrypted copyright information is set in realization to targeted graphical file with privately owned label
Enter.
Abstraction function module: the extraction to the privately owned label of targeted graphical file is realized.
It decrypts functional module: realizing the decryption to copyright information.
The system also includes copyright informations to check functional module, and the function of the copyright information inspection functional module is such as
Under:
Obtain the copyright information of certain legal electric business commodity picture.
The commodity picture of every other on-line shop in electric business platform management system is traversed.
To each picture traversed using abstraction function module and decryption functional module carry out privately owned label extraction and
The decryption of copyright information.
The copyright information that will acquire is compared with the copyright information that on-line shop's commodity picture is extracted.
If copyright information has not been obtained, directly determine that the on-line shop operator being traversed to is doubtful infringement, by its figure
Piece evidence is retained.
If get copyright authorization information, but copyright authorization information with should to be authorized to object information inconsistent, then determine
The on-line shop operator being traversed to is doubtful infringement, its picture evidence is retained.
If getting copyright authorization information, and copyright authorization information is consistent with that should be authorized to object information, then determining should
Commodity picture used in electric business operator is the picture of normal authorization.
The commodity picture that the present embodiment is chosen is Tiff file format, is as described in Figure 1 the structure chart of Tiff file.
Wherein:
8 byte of image file head (IFH) image file header starts and is directed toward first IFD.Specifically, image
File header (IFH) is as shown in table 1 below:
Table 1
1. Byteorder: may be H4D4D or H4949, H4D4D indicates that the figure is Motorola's integer data format, H4949
Indicate that the figure is Intel integer data format.
2. Version: always H2A00, it may be the version of tiff file, it is also possible to for further verifying this document
It whether is TIF format.
3. the offset at IFD: the first IFD relative file beginning Offset to first is (because might have more
A tactic IFD).
IFD data structure might not be behind IFH, on the contrary, after it is frequently located in Part III image data
The general organizational form in face, i.e. TIF image file is: IFH --- image data --- IFD.
Image file directory (IFD) image file directory includes the various information of image, due to a TIF text
There can be multiple images in part, and an IFD only identifies all properties of an image, there is several images in a TIF file,
Just have several IFD.The composition of FD such as the following table 2:
Table 2
1. Directory Entry Count: pointing out the number of the DE in the IFD;
2. Directory Entry: totally 12 bytes, structure are shown in directory entry (DE).The number of DE is uncertain, because each
As soon as DE only identifies the attribute of image, piece image has N number of attribute to have N number of DE.User can add customized label
Attribute.
3. the position relative to file beginning NULL: next IFD Offset to next IFD Or, this is one
Chain type is constituted.If the number is 0, expression has been the last one IFD.Certainly, if the TIF file contains only a width
Image, then with regard to only one IFD, it is clear that this offset can also be equal to 0.
The each DE of directory entry (DE) directory entry identifies an attribute of image.The composition of DE such as the following table 3:
Table 3
Had by the image attributes that DE is identified: whether the size of image resolution ratio, is compressed, ranks number, the color depth of pixel
(monochrome, 16 colors, 256 colors, true color) etc..Wherein:
1. tag: being the tag number (TagID) of the attribute, in image file directory, it is arranged according to ascending order
(but being not necessarily continuous).
2. type: indicating the type of the attribute data, it is considered that TIF official specified has 5 kinds of data types
(tiff6.0 is further extended for 12 kinds of data types).
3. length: the number of the data of this type, rather than the length of some data.
4. valueOffset: being the offset at the variate-value relative file beginning that tagID is represented, but if variate-value
The space occupied is not more than 4 bytes (such as value of only 1 Integer type), then the value is just directly deposited in
In valueOffset, it need not still further be directed toward a place.
The tiff file citing 1 and citing 2 of actual storage are respectively such as Fig. 2 and Fig. 3:
A kind of electric business commodity copyright infringement evidence collecting method, comprising the following steps:
(1) encryption and merging of copyright information: commodity picture is chosen, by the merging functional module in the commodity figure
It is inserted into privately owned label in piece, the copyright information of the commodity picture is contained in the privately owned label.
(2) copyright evidence obtaining is carried out in electric business platform:
(a) assume that commodity picture used in all electric business operators by authorizing, includes authorization in the commodity picture
Copyright information afterwards.
(b) it checks functional module by the copyright information to check commodity picture used in electric business operator, such as
Copyright information has not been obtained in fruit, then directly determines that the on-line shop operator being traversed to is doubtful infringement, by the commodity picture
Evidence is retained;If get copyright authorization information, but copyright authorization information with should to be authorized to object information inconsistent, then determine
The on-line shop operator being traversed to is doubtful infringement, and the evidence of the commodity picture is retained;If getting copyright authorization letter
Breath, and copyright authorization information with should be authorized to that object information is consistent, then determine that commodity picture used in electric business operator is positive
The picture often authorized.
(d) copyright information for obtaining next electric business commodity picture, repeats step (b).
In the present embodiment, in the step (1), the privately owned label is inserted in the directory entry of the commodity picture
It is interior.
In the present embodiment, in the step (1), the encryption method of the copyright information is as follows: passing through the encryption
Functional module, is arranged the copyright marking of copyright information, and the copyright marking is set as one 32 numeric strings, each bit digital
Correspondence takes its binary-coded decimal, forms 128 numeric string, is encrypted to 128 digit word strings using 3DES algorithm, obtains copyright marking
Password.
In the present embodiment, in the step (1), the method for posting of the copyright information is as follows:
(a) in image file directory composition, the number of directory entry is added 1 on current basal, increases an attribute item newly.
(b) it increases the last one former directory entry serial number of directory entry serial number newly and adds 1.
(c) byte number extends this as 12, type integer.
(d) storage location that the last one former directory entry is found in directory entry memory block, fills in category after the directory entry
Property correlation values.
(e) Tag extends this as newly-increased directory entry serial number;Type extends this as integer;Length extends this as 64, indicates 64
128 bytes of integer-bit.
(f) valueOffset fills in the offset at storage copyright password storage area relative file beginning.
(g) it at file beginning and deviates at valueOffset, fills in 128 copyright passwords.
In the present embodiment, it in (b) of the step (2), is checked to commodity picture used in electric business operator
During looking into, the extraction of privately owned label and the decryption of copyright information are carried out by abstraction function module and decryption functional module, according to
The inverse process of the merging process of the merging functional module accordingly, takes out copyright password;After taking out copyright password, calculated using 3DES
Method is decrypted, and obtains copyright information initial value.
Copyright infringement evidence obtaining and the evidence obtaining of different electric business platform copyright infringements, same electric business are flat in specific same electric business platform
For the mode that copyright infringement is collected evidence in platform referring to the above method, the mode of different electric business platform copyright infringement evidence obtainings is as follows: by
Copyright rights whatsoever people or market surpervision mechanism provide authorization commodity picture file, and inspection process is completed on specified electric business platform.
The above is only specific embodiments of the present invention, but technical characteristic of the invention is not limited thereto.It is any with this hair
Based on bright, to solve essentially identical technical problem, essentially identical technical effect is realized, made ground simple change, etc.
With replacement or modification etc., all it is covered by among protection scope of the present invention.
Claims (7)
1. a kind of electric business commodity copyright infringement evidence-obtaining system, it is characterised in that: including encryption function module, merging functional module,
Abstraction function module and decryption functional module,
The encryption function module: the encryption to copyright information is realized using Encryption Algorithm;
The merging functional module: it realizes to encrypted copyright information to targeted graphical file with the merging of privately owned label;
Abstraction function module: the extraction to the privately owned label of targeted graphical file is realized;
It decrypts functional module: realizing the decryption to copyright information.
2. a kind of electric business commodity copyright infringement evidence-obtaining system according to claim 1, it is characterised in that: further include copyright letter
The function of breath inspection functional module, the copyright information inspection functional module is as follows:
Obtain the copyright information of certain legal electric business commodity picture;
The commodity picture of every other on-line shop in electric business platform management system is traversed;
The extraction and copyright of privately owned label are carried out using abstraction function module and decryption functional module to each picture traversed
The decryption of information;
The copyright information that will acquire is compared with the copyright information that on-line shop's commodity picture is extracted;
If copyright information has not been obtained, directly determines that the on-line shop operator being traversed to is doubtful infringement, its picture is demonstrate,proved
According to retention;
If get copyright authorization information, but copyright authorization information with should to be authorized to object information inconsistent, then determine by time
The on-line shop operator gone through is doubtful infringement, its picture evidence is retained;
If getting copyright authorization information, and copyright authorization information is consistent with that should be authorized to object information, then determines the electric business
Commodity picture used in operator is the picture of normal authorization.
3. a kind of electric business commodity copyright infringement evidence collecting method as claimed in claim 1 or 2, it is characterised in that including following step
It is rapid:
(1) encryption and merging of copyright information: commodity picture is chosen, through the merging functional module in the commodity picture
It is inserted into privately owned label, the copyright information of the commodity picture is contained in the privately owned label;
(2) copyright evidence obtaining is carried out in electric business platform:
(a) assume that commodity picture used in all electric business operators passes through authorization, include after authorizing in the commodity picture
Copyright information;
(b) it checks functional module by the copyright information to check commodity picture used in electric business operator, if not
Copyright information is got, then directly determines that the on-line shop operator being traversed to is doubtful infringement, by the evidence of the commodity picture
It retains;If get copyright authorization information, but copyright authorization information with should to be authorized to object information inconsistent, then determine by time
The on-line shop operator gone through is doubtful infringement, and the evidence of the commodity picture is retained;If copyright authorization information is got, and
Copyright authorization information with should be authorized to that object information is consistent, then determine that commodity picture used in electric business operator is normal authorization
Picture;
(c) copyright information for obtaining next electric business commodity picture, repeats step (b).
4. a kind of electric business commodity copyright infringement evidence collecting method according to claim 3, it is characterised in that: in the step
(1) in, the privately owned label is inserted in the directory entry of the commodity picture.
5. a kind of electric business commodity copyright infringement evidence collecting method according to claim 3, it is characterised in that: in the step
(1) in, the encryption method of the copyright information is as follows: by the encryption function module, the copyright marking of copyright information is set,
The copyright marking is set as one 32 numeric strings, and each bit digital correspondence takes its binary-coded decimal, forms 128 numeric string, right
128 digit word strings are encrypted using 3DES algorithm, obtain the password of copyright marking.
6. a kind of electric business commodity copyright infringement evidence collecting method according to claim 3, it is characterised in that: in the step
(1) in, the method for posting of the copyright information is as follows:
(a) in image file directory composition, the number of directory entry is added 1 on current basal, increases an attribute item newly;
(b) it increases the last one former directory entry serial number of directory entry serial number newly and adds 1;
(c) byte number extends this as 12, type integer;
(d) storage location that the last one former directory entry is found in directory entry memory block, fills in attribute phase after the directory entry
Close numerical value;
(e) Tag extends this as newly-increased directory entry serial number;Type extends this as integer;Length extends this as 64, indicates 64 integers
128 bytes in position;
(f) valueOffset fills in the offset at storage copyright password storage area relative file beginning;
(g) it at file beginning and deviates at valueOffset, fills in 128 copyright passwords.
7. a kind of electric business commodity copyright infringement evidence collecting method according to claim 3, it is characterised in that: in the step
(2) in (b), during checking commodity picture used in electric business operator, pass through abstraction function module and decryption
Functional module carries out the extraction of privately owned label and the decryption of copyright information, according to the merging process of the merging functional module
Inverse process takes out copyright password;After taking out copyright password, it is decrypted using 3DES algorithm, obtains copyright information initial value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910007483.0A CN109740318A (en) | 2019-01-04 | 2019-01-04 | A kind of electric business commodity copyright infringement evidence-obtaining system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910007483.0A CN109740318A (en) | 2019-01-04 | 2019-01-04 | A kind of electric business commodity copyright infringement evidence-obtaining system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109740318A true CN109740318A (en) | 2019-05-10 |
Family
ID=66361563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910007483.0A Pending CN109740318A (en) | 2019-01-04 | 2019-01-04 | A kind of electric business commodity copyright infringement evidence-obtaining system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109740318A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010004736A1 (en) * | 1999-12-16 | 2001-06-21 | Hideyuki Hirano | Method for facilitating legitimate use of digital content |
CN102208097A (en) * | 2011-05-26 | 2011-10-05 | 浙江工商大学 | Network image copyright real-time distinguishing method |
CN102609890A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding and detecting system |
CN104077399A (en) * | 2014-07-02 | 2014-10-01 | 成都市卓睿科技有限公司 | Network commodity infringement monitoring system and method |
-
2019
- 2019-01-04 CN CN201910007483.0A patent/CN109740318A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010004736A1 (en) * | 1999-12-16 | 2001-06-21 | Hideyuki Hirano | Method for facilitating legitimate use of digital content |
CN102609890A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding and detecting system |
CN102208097A (en) * | 2011-05-26 | 2011-10-05 | 浙江工商大学 | Network image copyright real-time distinguishing method |
CN104077399A (en) * | 2014-07-02 | 2014-10-01 | 成都市卓睿科技有限公司 | Network commodity infringement monitoring system and method |
Non-Patent Citations (2)
Title |
---|
VSTION: "TIFF图像文件格式详解", 《HTTPS://WWW.CNBLOGS.COM/GYWEI/P/3393816.HTML》 * |
王军: "基于三基色原理的彩色图像拼接算法改进", 《中国优秀硕士学位论文全文数据库 (电子期刊)》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7171021B2 (en) | Data processing apparatus and method, and storage medium therefor | |
US7440143B2 (en) | Tampering judgement system, encrypting system for judgement of tampering and tampering judgement method | |
US7222235B1 (en) | Image processing system utilizing digital watermarks in predetermined regions | |
US7127615B2 (en) | Security based on subliminal and supraliminal channels for data objects | |
US6504941B2 (en) | Method and apparatus for digital watermarking of images | |
EP1399798B1 (en) | Method of invisibly embedding into a text document the license identification of the generating licensed software | |
EP1320013A3 (en) | Method and apparatus for securing electronic data | |
US20120148089A1 (en) | Method and system for efficient watermarking of video content | |
US7934097B1 (en) | Method, apparatus, and system for managing, reviewing, comparing and detecting data on a wide area network | |
US20140324716A1 (en) | Method and system for deterring product counterfeiting | |
US8243930B2 (en) | Counterfeit prevention system based on random processes and cryptography | |
Rejani et al. | Pixel pattern based steganography on images | |
CN108062481B (en) | Intelligent encryption method for logistics information | |
CN105809015A (en) | Electronic ticket information hiding and verifying method, device and system | |
EP2009639B1 (en) | Semi fragile signature for authorising content modification if the difference between the fingerprints before and after modification is under a threshold transmitted together with the content. | |
Kekre et al. | Performance evaluation of pixel value differencing and Kekre's modified algorithm for information hiding in images | |
CN110084737A (en) | A kind of watermark insertion and extracting method based on two-dimensional adaptive Fourier decomposition | |
CN109740318A (en) | A kind of electric business commodity copyright infringement evidence-obtaining system and method | |
Arya et al. | A review on different digital watermarking techniques | |
Nath et al. | An overview of multimedia technologies in current era of internet of things (IoT) | |
KR101603201B1 (en) | Image key certification method and system using color histogram and texture information of image | |
Abboud | Multifactor authentication for software protection | |
WO2017047862A1 (en) | Image key authentication method and system, which use color histogram and texture information of images | |
JP2007110571A (en) | Video change device, data structure of changed video frame, video restoration device, video change method, video restoration method, video change program and video restoration program | |
Singh et al. | A recent survey of DCT based digital image watermarking theories and techniques: a review |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Room 1202, floor 12, building 6, Chuangzhi Green Valley Development Center, 788 HONGPU Road, Jianggan District, Hangzhou City, Zhejiang Province Applicant after: Hangzhou: Intellectual Property Services Limited Address before: 310000 303, 3 / F, 4 building, 9 Ring Road, Jianggan District nine, Hangzhou, Zhejiang. Applicant before: Hangzhou: Intellectual Property Services Limited |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190510 |
|
RJ01 | Rejection of invention patent application after publication |