CN110933086A - Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking - Google Patents
Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking Download PDFInfo
- Publication number
- CN110933086A CN110933086A CN201911206253.3A CN201911206253A CN110933086A CN 110933086 A CN110933086 A CN 110933086A CN 201911206253 A CN201911206253 A CN 201911206253A CN 110933086 A CN110933086 A CN 110933086A
- Authority
- CN
- China
- Prior art keywords
- digital watermark
- screenshot
- traffic
- digital
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
- H04N19/467—Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses a non-invasive screenshot protection method and a non-invasive screenshot protection system based on digital watermarking and flow hijacking, which are used for generating a unique transparent watermark in real time through a frequency domain-based digital watermarking technology according to related information of a user. And adding the digital watermark on the original page by a flow hijack technology and returning the digital watermark to the user, wherein the perception that the user adds the watermark when browsing the page is completely the same. Due to the characteristics of the digital watermark, if the screenshot propagation action is carried out on the web page, the watermark still remains in the picture no matter the screenshot is subjected to smearing, cutting, rotating, stretching, shading adjustment, saturation adjustment and other operations. And (4) the investigator decodes the screenshot content to obtain the watermark in the screenshot, and then the investigator can trace to the specific responsible person who is disclosed according to the watermark content.
Description
Technical Field
The invention relates to the technical field of data encryption, in particular to a non-invasive screenshot protection method and a non-invasive screenshot protection system based on digital watermarking and traffic hijacking.
Background
Generally, for privacy and public opinion, the enterprise intranet strictly controls employees to reveal data of the enterprise intranet. In this regard, sensitive documents are generally the subject of significant attention. For protection of sensitive files, traditional watermarking technology is mainly to add a translucent logo or icon on the content. However, the conventional watermarking technology still has some problems, namely, excessive watermarking or the fact that the watermarking exists in a key position leads to poor user experience. Secondly, the traditional watermark is easy to remove by technical means, so that the protection effect cannot be achieved. There are some DLP systems that use digital watermarking to protect sensitive files. There is no good way for the content of a web page. Generally, the access authority is set for control, but the access authority is difficult to control, and once leakage occurs, the leakage source cannot be traced.
Disclosure of Invention
The invention aims to provide a non-invasive screenshot protection method and a non-invasive screenshot protection system based on digital watermarking and traffic hijacking.
The technical scheme adopted by the invention is as follows:
a non-invasive screenshot protection system based on digital watermarking and traffic hijacking is characterized in that: the system is accessed between the switch and the user, and comprises the following modules:
a digital watermark configuration module: configuring information and a generating strategy in the digital watermark;
the digital watermark generating module: generating a transparent digital watermark in real time according to the configuration content of the digital watermark;
a flow hijacking and modifying module: the system is arranged between the switch and the user, analyzes the flow between the switch and the user to obtain user information, calls the digital watermark generation module in real time, and returns the page with the digital watermark to the user;
the digital watermark decoding module: and extracting the digital watermark in real time according to the configuration content of the digital watermark.
Further, the digital watermark configuration module configures the content and comprises decoding and encoding algorithms, formats, information, encryption and decryption methods of the information and a generation strategy.
Further, all traffic between the switch and the user includes http traffic and https traffic.
Further, the user information includes job number, identity information and time.
Furthermore, the digital watermark generating module generates the digital watermark in real time by adopting a frequency domain digital watermark technology.
The invention also discloses a non-invasive screenshot protection method based on the digital watermark and the traffic hijacking, which adopts the non-invasive screenshot protection system based on the digital watermark and the traffic hijacking; the method comprises the following steps:
step 1, configuring information and a generating strategy in the digital watermark according to needs;
step 2, analyzing all traffic between the switch and the user to acquire user information required in the digital watermark;
step 3, generating a unique transparent digital watermark in real time according to the incoming user information and a generation strategy;
step 4, returning the digital watermark and the original page to the user;
and 5, when the leaked screenshot exists, acquiring the screenshot, calling a decoding interface to analyze the digital watermark information in the screenshot, and acquiring the leaked responsible person.
Further, the step 1 of configuring the content includes decoding an encoding algorithm, a format, information, an encryption and decryption method of the information, and a generation strategy.
Further, all traffic between the switch and the user in step 2 includes http traffic and https traffic.
Further, in step 2, the user information includes the job number, the identity information and the time.
Further, in step 3, a frequency domain digital watermark technology is adopted to generate a digital watermark in real time.
The invention adopts the technical scheme that a digital watermark technology is adopted to combine with the relevant information accessed by the user to generate a unique blind watermark in real time, then the digital watermark is added to the original page by the flow hijacking technology and returned to the user, and the perception that the user adds no watermark when browsing the page is completely the same. And if the behavior of screenshot propagation on the web page occurs, the watermark still remains in the picture no matter the screenshot is subjected to operations such as smearing, cutting, rotating, stretching, shading adjustment, saturation adjustment and the like. And (4) the investigator decodes the screenshot content to obtain the watermark in the screenshot, and then the investigator can trace to the specific responsible person who is disclosed according to the watermark content.
Drawings
The invention is described in further detail below with reference to the accompanying drawings and the detailed description;
fig. 1 is a schematic structural diagram of a non-intrusive screenshot protection system based on digital watermarking and traffic hijacking according to the present invention.
Detailed Description
As shown in fig. 1, the invention discloses a non-intrusive screenshot protection system based on digital watermarking and traffic hijacking, which is characterized in that: the system is accessed between the switch and the user, and comprises the following modules:
a digital watermark configuration module: configuring information and a generating strategy in the digital watermark;
the digital watermark generating module: generating a transparent digital watermark in real time according to the configuration content of the digital watermark;
a flow hijacking and modifying module: the system is arranged between the switch and the user, analyzes the flow between the switch and the user to obtain user information, calls the digital watermark generation module in real time, and returns the page with the digital watermark to the user;
the digital watermark decoding module: and extracting the digital watermark in real time according to the configuration content of the digital watermark.
Further, the digital watermark configuration module configures the content and comprises decoding and encoding algorithms, formats, information, encryption and decryption methods of the information and a generation strategy.
Further, all traffic between the switch and the user includes http traffic and https traffic.
Further, the user information includes job number, identity information and time.
Furthermore, the digital watermark generating module generates the digital watermark in real time by adopting a frequency domain digital watermark technology.
The invention also discloses a non-invasive screenshot protection method based on the digital watermark and the traffic hijacking, which adopts the non-invasive screenshot protection system based on the digital watermark and the traffic hijacking; the method comprises the following steps:
step 1, configuring information and a generating strategy in the digital watermark according to needs;
step 2, analyzing all traffic between the switch and the user to acquire user information required in the digital watermark;
step 3, generating a unique transparent digital watermark in real time according to the incoming user information and a generation strategy;
step 4, returning the digital watermark and the original page to the user;
and 5, when the leaked screenshot exists, acquiring the screenshot, calling a decoding interface to analyze the digital watermark information in the screenshot, and acquiring the leaked responsible person.
Further, the step 1 of configuring the content includes decoding an encoding algorithm, a format, information, an encryption and decryption method of the information, and a generation strategy.
Further, all traffic between the switch and the user in step 2 includes http traffic and https traffic.
Further, in step 2, the user information includes the job number, the identity information and the time.
Further, in step 3, a frequency domain digital watermark technology is adopted to generate a digital watermark in real time.
The invention adopts the technical scheme and generates the unique transparent watermark in real time through the digital watermark technology based on the frequency domain according to the relevant information of the user. And adding the digital watermark on the original page by a flow hijack technology and returning the digital watermark to the user, wherein the perception that the user adds the watermark when browsing the page is completely the same. Due to the characteristics of the digital watermark, if the screenshot propagation action is carried out on the web page, the watermark still remains in the picture no matter the screenshot is subjected to smearing, cutting, rotating, stretching, shading adjustment, saturation adjustment and other operations. And (4) the investigator decodes the screenshot content to obtain the watermark in the screenshot, and then the investigator can trace to the specific responsible person who is disclosed according to the watermark content.
Reference documents:
[1] yi Hao, Lin Chuan, Qiu Feng, etc. digital watermarking techniques reviewed [ J ] computer research and development, 2005,42(7).
[2] Liu Ruzhen, Tan Tu niu digital image watermarking research review [ J ] Communication, 2000,21(8) doi:10.3321/j.issn: 1000-.
[3] The digital watermark hiding and detecting algorithm [ J ] based on wavelet transformation, 2000,23(1), doi:10.3321/j.issn:0254-4164.2000.01.003.
[4] Huangdaren, Liu Jiufen, Huang Jiu, wavelet transform domain image watermark embedding countermeasures and algorithms [ J ] software academy, 2002,13(7).
[5] Poplar Hengv, Chenxianxiawei. wavelet domain robust adaptive public watermarking technology [ J ] software academic newspaper, 2003,14(9).
Claims (10)
1. A non-invasive screenshot protection system based on digital watermarking and traffic hijacking is characterized in that: the system is accessed between the switch and the user, and comprises the following modules:
a digital watermark configuration module: configuring information and a generating strategy in the digital watermark;
the digital watermark generating module: generating a transparent digital watermark in real time according to the configuration content of the digital watermark;
a flow hijacking and modifying module: the system is arranged between the switch and the user, analyzes the flow between the switch and the user to obtain user information, calls the digital watermark generation module in real time, and returns the page with the digital watermark to the user;
the digital watermark decoding module: and extracting the digital watermark in real time according to the configuration content of the digital watermark.
2. The non-intrusive screenshot protection system based on digital watermarking and traffic hijacking as claimed in claim 1, wherein: the digital watermark configuration module configures contents including decoding and encoding algorithms, formats, information encryption and decryption methods and generation strategies.
3. The non-intrusive screenshot protection system based on digital watermarking and traffic hijacking as claimed in claim 1, wherein: all traffic between the switch and the subscriber includes http traffic and https traffic.
4. The non-intrusive screenshot protection system based on digital watermarking and traffic hijacking as claimed in claim 1, wherein: the user information includes job number, identity information and time.
5. The non-intrusive screenshot protection system based on digital watermarking and traffic hijacking as claimed in claim 1, wherein: the digital watermark generating module generates the digital watermark in real time by adopting a frequency domain digital watermark technology.
6. The non-intrusive screenshot protection method based on digital watermarking and traffic hijacking adopts the non-intrusive screenshot protection system based on digital watermarking and traffic hijacking according to any one of claims 1 to 5; the method is characterized in that: the method comprises the following steps:
step 1, configuring information and a generating strategy in the digital watermark according to needs;
step 2, analyzing all traffic between the switch and the user to acquire user information required in the digital watermark;
step 3, generating a unique transparent digital watermark in real time according to the incoming user information and a generation strategy;
step 4, returning the digital watermark and the original page to the user;
and 5, when the leaked screenshot exists, acquiring the screenshot, calling a decoding interface to analyze the digital watermark information in the screenshot, and acquiring the leaked responsible person.
7. The non-intrusive screenshot protection method based on digital watermarking and traffic hijacking as claimed in claim 6, wherein: the configuration content in step 1 comprises decoding and encoding algorithm, format, information encryption and decryption method and generation strategy.
8. The non-intrusive screenshot protection method based on digital watermarking and traffic hijacking as claimed in claim 6, wherein: all traffic between the switch and the user in step 2 includes http traffic and https traffic.
9. The non-intrusive screenshot protection method based on digital watermarking and traffic hijacking as claimed in claim 6, wherein: and step 2, the user information comprises a job number, identity information and time.
10. The non-intrusive screenshot protection method based on digital watermarking and traffic hijacking as claimed in claim 6, wherein: and 3, generating the digital watermark in real time by adopting a frequency domain digital watermark technology.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911206253.3A CN110933086A (en) | 2019-11-29 | 2019-11-29 | Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911206253.3A CN110933086A (en) | 2019-11-29 | 2019-11-29 | Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110933086A true CN110933086A (en) | 2020-03-27 |
Family
ID=69847948
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911206253.3A Pending CN110933086A (en) | 2019-11-29 | 2019-11-29 | Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110933086A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0982927A1 (en) * | 1998-08-28 | 2000-03-01 | Hitachi, Ltd. | Method of generating authentication-enabled electronic data |
CN103294667A (en) * | 2012-02-27 | 2013-09-11 | 深圳市腾讯计算机系统有限公司 | Method and system for tracing homologous image through watermark |
CN109726348A (en) * | 2018-12-29 | 2019-05-07 | 上海携程商务有限公司 | The method and system of webpage watermark protection |
-
2019
- 2019-11-29 CN CN201911206253.3A patent/CN110933086A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0982927A1 (en) * | 1998-08-28 | 2000-03-01 | Hitachi, Ltd. | Method of generating authentication-enabled electronic data |
CN103294667A (en) * | 2012-02-27 | 2013-09-11 | 深圳市腾讯计算机系统有限公司 | Method and system for tracing homologous image through watermark |
CN109726348A (en) * | 2018-12-29 | 2019-05-07 | 上海携程商务有限公司 | The method and system of webpage watermark protection |
Non-Patent Citations (1)
Title |
---|
钱军浩: "《特种印刷新技术》", 28 February 2010 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107423629B (en) | Method and system for file information output anti-disclosure and tracing | |
US10713391B2 (en) | Tamper protection and video source identification for video processing pipeline | |
Kundar | Multiresolution digital watermarking: algorithms and implications for multimedia signals. | |
KR100335308B1 (en) | Secured signal modification and verification with privacy control | |
US7171021B2 (en) | Data processing apparatus and method, and storage medium therefor | |
Roy et al. | Evaluating image steganography techniques: Future research challenges | |
CN107784207B (en) | Display method, device and equipment of financial APP interface and storage medium | |
Gugelmann et al. | Screen watermarking for data theft investigation and attribution | |
EP3537319A1 (en) | Tamper protection and video source identification for video processing pipeline | |
Kaur et al. | Audio steganography techniques-a survey | |
US9268713B2 (en) | Methods, systems and apparatus for managing data entries on a database | |
CN114880687A (en) | Document security protection method and device, electronic equipment and storage medium | |
CN101908203A (en) | Image and audio recoding-based steganography prevention method | |
CN110933086A (en) | Non-invasive screenshot protection method and system based on digital watermark and traffic hijacking | |
Noor et al. | High performance and energy efficient image watermarking for video using a mobile device | |
Jambhale et al. | A deep learning approach to invisible watermarking for copyright protection | |
Sharma et al. | A study of steganography based data hiding techniques | |
Kaur et al. | XOR-EDGE based video steganography and testing against chi-square steganalysis | |
Pilania et al. | A roadmap of steganography tools: conventional to modern | |
Mantoro et al. | Stegano-image as a digital signature to improve security authentication system in mobile computing | |
Bajaj et al. | Steganography using HTML Web Pages as a Carrier: A Survey | |
Mishra et al. | Information security through digital image steganography using multilevel and compression technique | |
Kumar | Steganography using visual cryptography | |
Kaur et al. | Audio steganography using LSB edge detection algorithm | |
Pilania et al. | Performance Analysis of Open-Source Image Steganography Tools |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200327 |
|
RJ01 | Rejection of invention patent application after publication |