CN110933086A - Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking - Google Patents

Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking Download PDF

Info

Publication number
CN110933086A
CN110933086A CN201911206253.3A CN201911206253A CN110933086A CN 110933086 A CN110933086 A CN 110933086A CN 201911206253 A CN201911206253 A CN 201911206253A CN 110933086 A CN110933086 A CN 110933086A
Authority
CN
China
Prior art keywords
digital watermark
screenshot
traffic
digital
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911206253.3A
Other languages
Chinese (zh)
Inventor
陈伟
牛冬霞
朱达
肖春黎
崔曼曼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electric Fufu Mdt Infotech Ltd
Original Assignee
China Electric Fufu Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electric Fufu Mdt Infotech Ltd filed Critical China Electric Fufu Mdt Infotech Ltd
Priority to CN201911206253.3A priority Critical patent/CN110933086A/en
Publication of CN110933086A publication Critical patent/CN110933086A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a non-invasive screenshot protection method and a non-invasive screenshot protection system based on digital watermarking and flow hijacking, which are used for generating a unique transparent watermark in real time through a frequency domain-based digital watermarking technology according to related information of a user. And adding the digital watermark on the original page by a flow hijack technology and returning the digital watermark to the user, wherein the perception that the user adds the watermark when browsing the page is completely the same. Due to the characteristics of the digital watermark, if the screenshot propagation action is carried out on the web page, the watermark still remains in the picture no matter the screenshot is subjected to smearing, cutting, rotating, stretching, shading adjustment, saturation adjustment and other operations. And (4) the investigator decodes the screenshot content to obtain the watermark in the screenshot, and then the investigator can trace to the specific responsible person who is disclosed according to the watermark content.

Description

Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking
Technical Field
The invention relates to the technical field of data encryption, in particular to a non-invasive screenshot protection method and a non-invasive screenshot protection system based on digital watermarking and traffic hijacking.
Background
Generally, for privacy and public opinion, the enterprise intranet strictly controls employees to reveal data of the enterprise intranet. In this regard, sensitive documents are generally the subject of significant attention. For protection of sensitive files, traditional watermarking technology is mainly to add a translucent logo or icon on the content. However, the conventional watermarking technology still has some problems, namely, excessive watermarking or the fact that the watermarking exists in a key position leads to poor user experience. Secondly, the traditional watermark is easy to remove by technical means, so that the protection effect cannot be achieved. There are some DLP systems that use digital watermarking to protect sensitive files. There is no good way for the content of a web page. Generally, the access authority is set for control, but the access authority is difficult to control, and once leakage occurs, the leakage source cannot be traced.
Disclosure of Invention
The invention aims to provide a non-invasive screenshot protection method and a non-invasive screenshot protection system based on digital watermarking and traffic hijacking.
The technical scheme adopted by the invention is as follows:
a non-invasive screenshot protection system based on digital watermarking and traffic hijacking is characterized in that: the system is accessed between the switch and the user, and comprises the following modules:
a digital watermark configuration module: configuring information and a generating strategy in the digital watermark;
the digital watermark generating module: generating a transparent digital watermark in real time according to the configuration content of the digital watermark;
a flow hijacking and modifying module: the system is arranged between the switch and the user, analyzes the flow between the switch and the user to obtain user information, calls the digital watermark generation module in real time, and returns the page with the digital watermark to the user;
the digital watermark decoding module: and extracting the digital watermark in real time according to the configuration content of the digital watermark.
Further, the digital watermark configuration module configures the content and comprises decoding and encoding algorithms, formats, information, encryption and decryption methods of the information and a generation strategy.
Further, all traffic between the switch and the user includes http traffic and https traffic.
Further, the user information includes job number, identity information and time.
Furthermore, the digital watermark generating module generates the digital watermark in real time by adopting a frequency domain digital watermark technology.
The invention also discloses a non-invasive screenshot protection method based on the digital watermark and the traffic hijacking, which adopts the non-invasive screenshot protection system based on the digital watermark and the traffic hijacking; the method comprises the following steps:
step 1, configuring information and a generating strategy in the digital watermark according to needs;
step 2, analyzing all traffic between the switch and the user to acquire user information required in the digital watermark;
step 3, generating a unique transparent digital watermark in real time according to the incoming user information and a generation strategy;
step 4, returning the digital watermark and the original page to the user;
and 5, when the leaked screenshot exists, acquiring the screenshot, calling a decoding interface to analyze the digital watermark information in the screenshot, and acquiring the leaked responsible person.
Further, the step 1 of configuring the content includes decoding an encoding algorithm, a format, information, an encryption and decryption method of the information, and a generation strategy.
Further, all traffic between the switch and the user in step 2 includes http traffic and https traffic.
Further, in step 2, the user information includes the job number, the identity information and the time.
Further, in step 3, a frequency domain digital watermark technology is adopted to generate a digital watermark in real time.
The invention adopts the technical scheme that a digital watermark technology is adopted to combine with the relevant information accessed by the user to generate a unique blind watermark in real time, then the digital watermark is added to the original page by the flow hijacking technology and returned to the user, and the perception that the user adds no watermark when browsing the page is completely the same. And if the behavior of screenshot propagation on the web page occurs, the watermark still remains in the picture no matter the screenshot is subjected to operations such as smearing, cutting, rotating, stretching, shading adjustment, saturation adjustment and the like. And (4) the investigator decodes the screenshot content to obtain the watermark in the screenshot, and then the investigator can trace to the specific responsible person who is disclosed according to the watermark content.
Drawings
The invention is described in further detail below with reference to the accompanying drawings and the detailed description;
fig. 1 is a schematic structural diagram of a non-intrusive screenshot protection system based on digital watermarking and traffic hijacking according to the present invention.
Detailed Description
As shown in fig. 1, the invention discloses a non-intrusive screenshot protection system based on digital watermarking and traffic hijacking, which is characterized in that: the system is accessed between the switch and the user, and comprises the following modules:
a digital watermark configuration module: configuring information and a generating strategy in the digital watermark;
the digital watermark generating module: generating a transparent digital watermark in real time according to the configuration content of the digital watermark;
a flow hijacking and modifying module: the system is arranged between the switch and the user, analyzes the flow between the switch and the user to obtain user information, calls the digital watermark generation module in real time, and returns the page with the digital watermark to the user;
the digital watermark decoding module: and extracting the digital watermark in real time according to the configuration content of the digital watermark.
Further, the digital watermark configuration module configures the content and comprises decoding and encoding algorithms, formats, information, encryption and decryption methods of the information and a generation strategy.
Further, all traffic between the switch and the user includes http traffic and https traffic.
Further, the user information includes job number, identity information and time.
Furthermore, the digital watermark generating module generates the digital watermark in real time by adopting a frequency domain digital watermark technology.
The invention also discloses a non-invasive screenshot protection method based on the digital watermark and the traffic hijacking, which adopts the non-invasive screenshot protection system based on the digital watermark and the traffic hijacking; the method comprises the following steps:
step 1, configuring information and a generating strategy in the digital watermark according to needs;
step 2, analyzing all traffic between the switch and the user to acquire user information required in the digital watermark;
step 3, generating a unique transparent digital watermark in real time according to the incoming user information and a generation strategy;
step 4, returning the digital watermark and the original page to the user;
and 5, when the leaked screenshot exists, acquiring the screenshot, calling a decoding interface to analyze the digital watermark information in the screenshot, and acquiring the leaked responsible person.
Further, the step 1 of configuring the content includes decoding an encoding algorithm, a format, information, an encryption and decryption method of the information, and a generation strategy.
Further, all traffic between the switch and the user in step 2 includes http traffic and https traffic.
Further, in step 2, the user information includes the job number, the identity information and the time.
Further, in step 3, a frequency domain digital watermark technology is adopted to generate a digital watermark in real time.
The invention adopts the technical scheme and generates the unique transparent watermark in real time through the digital watermark technology based on the frequency domain according to the relevant information of the user. And adding the digital watermark on the original page by a flow hijack technology and returning the digital watermark to the user, wherein the perception that the user adds the watermark when browsing the page is completely the same. Due to the characteristics of the digital watermark, if the screenshot propagation action is carried out on the web page, the watermark still remains in the picture no matter the screenshot is subjected to smearing, cutting, rotating, stretching, shading adjustment, saturation adjustment and other operations. And (4) the investigator decodes the screenshot content to obtain the watermark in the screenshot, and then the investigator can trace to the specific responsible person who is disclosed according to the watermark content.
Reference documents:
[1] yi Hao, Lin Chuan, Qiu Feng, etc. digital watermarking techniques reviewed [ J ] computer research and development, 2005,42(7).
[2] Liu Ruzhen, Tan Tu niu digital image watermarking research review [ J ] Communication, 2000,21(8) doi:10.3321/j.issn: 1000-.
[3] The digital watermark hiding and detecting algorithm [ J ] based on wavelet transformation, 2000,23(1), doi:10.3321/j.issn:0254-4164.2000.01.003.
[4] Huangdaren, Liu Jiufen, Huang Jiu, wavelet transform domain image watermark embedding countermeasures and algorithms [ J ] software academy, 2002,13(7).
[5] Poplar Hengv, Chenxianxiawei. wavelet domain robust adaptive public watermarking technology [ J ] software academic newspaper, 2003,14(9).

Claims (10)

1. A non-invasive screenshot protection system based on digital watermarking and traffic hijacking is characterized in that: the system is accessed between the switch and the user, and comprises the following modules:
a digital watermark configuration module: configuring information and a generating strategy in the digital watermark;
the digital watermark generating module: generating a transparent digital watermark in real time according to the configuration content of the digital watermark;
a flow hijacking and modifying module: the system is arranged between the switch and the user, analyzes the flow between the switch and the user to obtain user information, calls the digital watermark generation module in real time, and returns the page with the digital watermark to the user;
the digital watermark decoding module: and extracting the digital watermark in real time according to the configuration content of the digital watermark.
2. The non-intrusive screenshot protection system based on digital watermarking and traffic hijacking as claimed in claim 1, wherein: the digital watermark configuration module configures contents including decoding and encoding algorithms, formats, information encryption and decryption methods and generation strategies.
3. The non-intrusive screenshot protection system based on digital watermarking and traffic hijacking as claimed in claim 1, wherein: all traffic between the switch and the subscriber includes http traffic and https traffic.
4. The non-intrusive screenshot protection system based on digital watermarking and traffic hijacking as claimed in claim 1, wherein: the user information includes job number, identity information and time.
5. The non-intrusive screenshot protection system based on digital watermarking and traffic hijacking as claimed in claim 1, wherein: the digital watermark generating module generates the digital watermark in real time by adopting a frequency domain digital watermark technology.
6. The non-intrusive screenshot protection method based on digital watermarking and traffic hijacking adopts the non-intrusive screenshot protection system based on digital watermarking and traffic hijacking according to any one of claims 1 to 5; the method is characterized in that: the method comprises the following steps:
step 1, configuring information and a generating strategy in the digital watermark according to needs;
step 2, analyzing all traffic between the switch and the user to acquire user information required in the digital watermark;
step 3, generating a unique transparent digital watermark in real time according to the incoming user information and a generation strategy;
step 4, returning the digital watermark and the original page to the user;
and 5, when the leaked screenshot exists, acquiring the screenshot, calling a decoding interface to analyze the digital watermark information in the screenshot, and acquiring the leaked responsible person.
7. The non-intrusive screenshot protection method based on digital watermarking and traffic hijacking as claimed in claim 6, wherein: the configuration content in step 1 comprises decoding and encoding algorithm, format, information encryption and decryption method and generation strategy.
8. The non-intrusive screenshot protection method based on digital watermarking and traffic hijacking as claimed in claim 6, wherein: all traffic between the switch and the user in step 2 includes http traffic and https traffic.
9. The non-intrusive screenshot protection method based on digital watermarking and traffic hijacking as claimed in claim 6, wherein: and step 2, the user information comprises a job number, identity information and time.
10. The non-intrusive screenshot protection method based on digital watermarking and traffic hijacking as claimed in claim 6, wherein: and 3, generating the digital watermark in real time by adopting a frequency domain digital watermark technology.
CN201911206253.3A 2019-11-29 2019-11-29 Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking Pending CN110933086A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911206253.3A CN110933086A (en) 2019-11-29 2019-11-29 Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911206253.3A CN110933086A (en) 2019-11-29 2019-11-29 Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking

Publications (1)

Publication Number Publication Date
CN110933086A true CN110933086A (en) 2020-03-27

Family

ID=69847948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911206253.3A Pending CN110933086A (en) 2019-11-29 2019-11-29 Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking

Country Status (1)

Country Link
CN (1) CN110933086A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0982927A1 (en) * 1998-08-28 2000-03-01 Hitachi, Ltd. Method of generating authentication-enabled electronic data
CN103294667A (en) * 2012-02-27 2013-09-11 深圳市腾讯计算机系统有限公司 Method and system for tracing homologous image through watermark
CN109726348A (en) * 2018-12-29 2019-05-07 上海携程商务有限公司 The method and system of webpage watermark protection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0982927A1 (en) * 1998-08-28 2000-03-01 Hitachi, Ltd. Method of generating authentication-enabled electronic data
CN103294667A (en) * 2012-02-27 2013-09-11 深圳市腾讯计算机系统有限公司 Method and system for tracing homologous image through watermark
CN109726348A (en) * 2018-12-29 2019-05-07 上海携程商务有限公司 The method and system of webpage watermark protection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
钱军浩: "《特种印刷新技术》", 28 February 2010 *

Similar Documents

Publication Publication Date Title
CN107423629B (en) Method and system for file information output anti-disclosure and tracing
US10713391B2 (en) Tamper protection and video source identification for video processing pipeline
Kundar Multiresolution digital watermarking: algorithms and implications for multimedia signals.
KR100335308B1 (en) Secured signal modification and verification with privacy control
US7171021B2 (en) Data processing apparatus and method, and storage medium therefor
Roy et al. Evaluating image steganography techniques: Future research challenges
CN107784207B (en) Display method, device and equipment of financial APP interface and storage medium
Gugelmann et al. Screen watermarking for data theft investigation and attribution
EP3537319A1 (en) Tamper protection and video source identification for video processing pipeline
Kaur et al. Audio steganography techniques-a survey
US9268713B2 (en) Methods, systems and apparatus for managing data entries on a database
CN114880687A (en) Document security protection method and device, electronic equipment and storage medium
CN101908203A (en) Image and audio recoding-based steganography prevention method
CN110933086A (en) Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking
Noor et al. High performance and energy efficient image watermarking for video using a mobile device
Jambhale et al. A deep learning approach to invisible watermarking for copyright protection
Sharma et al. A study of steganography based data hiding techniques
Kaur et al. XOR-EDGE based video steganography and testing against chi-square steganalysis
Pilania et al. A roadmap of steganography tools: conventional to modern
Mantoro et al. Stegano-image as a digital signature to improve security authentication system in mobile computing
Bajaj et al. Steganography using HTML Web Pages as a Carrier: A Survey
Mishra et al. Information security through digital image steganography using multilevel and compression technique
Kumar Steganography using visual cryptography
Kaur et al. Audio steganography using LSB edge detection algorithm
Pilania et al. Performance Analysis of Open-Source Image Steganography Tools

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200327

RJ01 Rejection of invention patent application after publication