CN113784011A - Anti-counterfeiting method for official document flow seal picture - Google Patents

Anti-counterfeiting method for official document flow seal picture Download PDF

Info

Publication number
CN113784011A
CN113784011A CN202010523412.9A CN202010523412A CN113784011A CN 113784011 A CN113784011 A CN 113784011A CN 202010523412 A CN202010523412 A CN 202010523412A CN 113784011 A CN113784011 A CN 113784011A
Authority
CN
China
Prior art keywords
seal
encryption
picture
information
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010523412.9A
Other languages
Chinese (zh)
Other versions
CN113784011B (en
Inventor
宋延平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ipi Network Technology Co ltd
Original Assignee
Shenzhen Ipi Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ipi Network Technology Co ltd filed Critical Shenzhen Ipi Network Technology Co ltd
Priority to CN202010523412.9A priority Critical patent/CN113784011B/en
Publication of CN113784011A publication Critical patent/CN113784011A/en
Application granted granted Critical
Publication of CN113784011B publication Critical patent/CN113784011B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32352Controlling detectability or arrangements to facilitate detection or retrieval of the embedded information, e.g. using markers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4413Restricting access, e.g. according to user identity involving the use of passwords, ID codes or the like, e.g. PIN
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention relates to the technical field of electronic official document encryption and anti-counterfeiting, and particularly discloses an anti-counterfeiting method of an official document flow seal picture, which comprises an encryption flow and a verification flow and has higher security, wherein the anti-counterfeiting method of the official document flow seal picture comprises the encryption flow and the verification flow, and the encryption flow comprises the acquisition of the seal picture and ID information; generating an encryption string; generating position information; writing the encryption string and the position information into the seal picture to form an encrypted seal picture; adding the encrypted stamp picture into a workflow; the verification process comprises the steps of obtaining a seal picture to be verified and a document process ID; and inquiring the ID information and the position information, respectively inquiring the corresponding position encryption string and the ID encryption string according to the ID information and the position information, and comparing.

Description

Anti-counterfeiting method for official document flow seal picture
Technical Field
The invention relates to the technical field of electronic official document encryption and anti-counterfeiting, in particular to an anti-counterfeiting method for official document flow seal pictures.
Background
OA paperless office is a new form of office at present, and has important significance for improving office efficiency, reducing paper consumption and lowering office cost. In OA office application of enterprises and public institutions, particularly in OA office application of government affairs, the first problem is to ensure the security of documents, and avoid the problems that seal pictures in the official document flow are transferred to other documents, namely, the official document seal pictures are embezzled, and the like, so as to ensure that the official document seal pictures are added by effective users in the official document transfer process, and further ensure the security and the effectiveness of the seal pictures in the official documents.
The traditional official document encryption mainly comprises digital certificate encryption and picture watermarking modes, the encryption cost of the former encryption mode is high, and the picture encryption is difficult to realize; although the latter encryption mode can encrypt the picture, the picture is corrected more in the encryption process, the original style of the seal picture is changed, and after the seal picture is encrypted by adopting the picture watermarking mode, the watermark on the seal picture can still be removed by means of related software, such as Photoshop and the like, the purpose of seal encryption is still difficult to achieve, and the security of the use of the official seal picture is insufficient.
Disclosure of Invention
Therefore, it is necessary to provide an anti-counterfeiting method for a seal picture in a document process, which includes an encryption process and a verification process, for solving the technical problem of insufficient security of the seal picture.
An anti-counterfeiting method for a seal picture in a document process comprises an encryption process and a verification process, wherein the encryption process comprises the following steps:
step S101: the workflow acquires a stamp picture and ID information;
step S102: performing MD5 encryption processing on the ID information to generate an encryption string;
step S103: generating position information of random pixel points according to the size of the seal;
step S104: grouping the encryption strings in the step S102 to form a plurality of RGB value groups, and writing the RGB value groups and the position information of the pixel points into the seal picture to form an encrypted seal picture;
step S105: recording the ID information and the position information of the pixel points into the associated information of the workflow, and adding the encrypted seal picture into the workflow to finish the seal operation;
the checking process comprises the following steps:
step S201: the workflow acquires information such as a seal picture to be verified, a document flow ID and the like;
step S202: inquiring corresponding ID information and position information of the pixel points in the related information of the workflow according to the official document process ID;
step S203: inquiring the position encryption string of the seal picture to be verified according to the position information of the pixel points;
step S204: performing MD5 processing on the inquired ID information to generate an ID encryption string;
step S205: and comparing the position encryption string with the ID encryption string, if the position encryption string and the ID encryption string are consistent, determining that the seal is valid, and finishing verification operation.
In one embodiment, the ID information includes a stamp ID, a user ID, a time, and a process ID.
In one embodiment, the encrypted string is a 32-bit encrypted string or a 64-bit encrypted string.
In one embodiment, the set of RGB values includes four bytes, corresponding to the red, green, blue and transparency values of the image table, respectively.
The anti-counterfeiting method for the official document flow seal picture comprises an encryption flow and a verification flow, wherein in the encryption flow, MD5 encryption processing is carried out on ID information of the seal picture to form an encryption string with less digits and position information of random pixel points corresponding to the encryption string, then a corresponding RGB value group is generated according to the encryption string, and the RGB value group and the position information of the random pixel points are written into the seal picture to form the encrypted seal picture; the encrypted seal pictures are added into the workflow, so that the binding of the official document flow and the seal pictures is realized, namely, a user can only use the corresponding seal pictures in a specific official document and cannot be used in other official document flows of the same system by modifying the pictures and the like, and the seal safety of the user is ensured; on the basis of encrypting the seal picture, in the official document flow, a user can call the seal picture to be verified, the MD5 processing is carried out on the seal picture again, the position information and the ID information are respectively inquired, the corresponding position encryption string and the ID encryption string are obtained, and the position information and the ID information are compared to judge whether the called seal picture to be verified is consistent with the encrypted seal picture in the official document flow, namely whether the seal picture to be verified is effective, so that the verification of the seal picture is realized.
Drawings
FIG. 1 is a flow chart of an anti-counterfeiting method for a seal picture in a document flow according to an embodiment of the invention;
FIG. 2 is a diagram of an encryption code for an encryption process according to one embodiment of the present invention;
FIG. 3 is a check code diagram of a check flow according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein.
Referring to fig. 1, the present invention provides an anti-counterfeiting method 10 for a seal picture in a document flow, the anti-counterfeiting method 10 for the seal picture in the document flow comprises an encryption flow 100 and a verification flow 200, the encryption flow 100 is used for encrypting the seal picture to be added into a designated document to obtain an encrypted seal picture, and adding the encrypted seal picture into a workflow so as to call a corresponding seal picture when the seal is needed; the verification process 200 is used for verifying the authenticity of the stamp picture in the official document process, so as to prevent the problems of picture stealing, picture mistake and the like.
The encryption process 100 includes the following steps:
step S101: and acquiring a seal picture and ID information by the workflow.
Specifically, before the official document flow is performed, a user often makes seal pictures required to be stamped in advance, and the seal pictures all contain uniquely determined identification IDs to represent the seal pictures. After the system receives a stamping request of a user, the official document flow calls an input stamp picture to be stamped and ID information of the stamp from the system, and puts the stamp picture and the ID information of the stamp into a workflow, wherein the ID information comprises encoding information such as a stamp ID, a user ID, time, a flow ID and the like, it needs to be noted that the time encoding information corresponds to encoding information at a time point when the encryption flow 100 starts, and after the encryption flow 100 is finished, the time encoding information is interpreted as encryption time encoding information of the stamp picture.
Step S102: the ID information is subjected to MD5 encryption processing to generate an encrypted string.
Specifically, the encrypted string of the specified number of bits is generated by concatenating the encoded information such as the stamp ID, the user ID, the time, and the flow ID in the form of a character string and performing MD5 processing on the character string. It should be noted that MD5 is treated as MD5 encryption method, MD5(Message-Digest Algorithm5) is also called Message-Digest Algorithm, which makes large-capacity information "compressed" into a secret format before signing a private key with digital signature software, and it can also be understood that a byte string of any length is converted into a large integer of a certain length, and MD5 adds a concept of security-band to MD4, which further improves the security of data. When the MD5 is used to encrypt the character string, the bit number of the generated encrypted string is 32 bits, that is, the encrypted result is 32 bits, and in the actual processing process, the character string may also be encrypted in combination by the MD5 to obtain encrypted strings with other bit numbers, such as a 64-bit encrypted string and an encrypted string with more bit numbers.
Step S103: and generating the position information of the random pixel points according to the size of the seal.
Specifically, after the 32-bit encryption string is generated, the system identifies the size of the seal picture, namely the length and width value of the seal picture, on the basis of calling the seal picture, and generates 8 groups of random position information, namely the positions of 8 pixel points, in the seal picture range according to the length and width value of the seal picture, so that 8 pixel points are compared and verified in the verification flow 200.
Step S104: and (4) grouping the encryption strings in the step (S102) to form a plurality of RGB value groups, and writing the RGB value groups and the position information of the pixel points into the seal picture to form the encrypted seal picture.
Specifically, every 4 bytes of the 32-bit encryption string generated in step S102 are divided into 8 RGB value groups, four bytes of each group respectively correspond to red, green, blue and transparency values of the image table, i.e., an R value, a G value, a B value and an alpha value of the image table, and then the position information of the 8 pixel points and the RGB value groups generated in step S103 are written into the stamp picture, so as to obtain the encrypted stamp picture. Referring to fig. 2, fig. 2 shows that JAVA is used to write the encrypted string and the position information of the designated random pixel point into the code information of the stamp picture, that is, the code information of the MD5 encrypted string is written into a stamp picture, including obtaining the stamp picture object and obtaining the length value and width value of the stamp picture; calculating the pixel pitch, specifically obtaining the pixel pitch length by a predetermined formula, such as (width-minx)/5, namely dividing the length value of the stamp picture by 5, and obtaining the pixel pitch width by (height-miny)/3, namely dividing the width value of the stamp picture by 3; circularly calculating the positions of pixel points, assigning values to the pixel points, namely acquiring RGB values of the seal picture, and writing the positions and the RGB values of random pixel points into the seal picture to obtain a png-format new seal picture file, namely an encrypted seal picture file; and saving the picture. It should be noted that, in this embodiment, only a specific divisor, such as 3 and 5, is used to calculate the length value and the width value of the stamp picture and assign a value to the pixel pitch, and in the actual operation, other divisor values may be selected according to specific situations, such as the size of the picture, and are not described herein again.
Step S105: and recording the ID information and the position information of the pixel points into the associated information of the workflow, and adding the encrypted seal picture into the workflow to finish the seal operation.
Specifically, the position information and ID information of the random pixel points of the encrypted stamp picture, that is, the encoded information such as the stamp ID, the user ID, the encryption time, and the process ID, are recorded in the official document process of the system, so that the user can obtain the ID information of the stamp picture to be verified by querying the process ID of the official document process in the later verification process 200. And after the ID information of the encrypted seal picture is recorded, the system adds the encrypted seal picture into the official document flow and binds the encrypted seal picture with the specific official document content, namely finishing the seal operation of the official document.
It should be noted that, in step S105, the encrypted stamp picture is bound with the document content in the specific document flow, so that, in the document processing process, the specific encrypted stamp picture can only be used in the specific document flow, that is, only can be added to the specific document content, thereby preventing the stamp picture from being used by other document flows in the same system, and ensuring the security of the stamp picture.
In the process of circulation of the official document flow or when the user doubts the authenticity of the seal picture of the official document, the validity of the seal picture can be verified through the verification flow 200. Specifically, the verification process 200 includes the following steps:
step S201: and the workflow acquires information such as a seal picture to be verified, a document flow ID and the like.
Specifically, after receiving a request of a user for verifying a stamp picture, the system reads the stamp picture in the designated document and the document flow ID of the designated document, where the document flow ID originates from the encryption flow 100, and the flow ID code information generated when the encrypted stamp picture information is recorded uniquely corresponds to the code information of the document printed with the stamp picture.
Step S202: and inquiring corresponding ID information and position information of the pixel points in the associated information of the workflow according to the official document process ID.
Specifically, in the seal picture encryption process 100 of the official document process, the relevant information of the encrypted seal picture, that is, the encoding information such as the seal ID, the user ID, the encryption time, and the process ID, has been recorded and stored, so in the official document process, the seal ID, the user ID, the encryption time, the random pixel point position information, and the like of the official document seal picture relevant to the process ID can be searched through the process ID, for example, the process ID is compared with various process IDs in the system until the process ID encoding values are consistent, and the ID value and the random pixel point position information corresponding to the seal picture are obtained.
Step S203: and inquiring the position encryption string of the seal picture to be verified according to the position information of the pixel points.
Specifically, the encryption string in the stamp picture is further inquired through the inquired position information of the random pixel point, namely the encryption string containing the position information of the random pixel point in the inquiry system. It should be noted that, in the process of querying the encrypted string corresponding to the location information of the random pixel, the encoded information is still processed in an MD5 manner, and further, an MD5 verification manner is adopted. The reading and inquiring process is opposite to the process of encrypting the seal picture by MD5, and is characterized in that the R value, the G value, the B value and the alpha value of the corresponding pixel at the position of the random pixel point are connected to form a character string, and the character string is spliced into a 32-bit encryption string, so that the position encryption string is obtained. Referring to fig. 3, fig. 3 shows code information obtained by combining RGB values associated with position information of random pixel points in JAVA to form a 32-bit encryption string, that is, code information of an MD5 encryption string is read from a stamp picture, including reading a stamp picture object; acquiring a pixel object according to the transmitted pixel position, namely according to the length value and the width value of the stamp picture; reading pixels to obtain R, G, B and Alpha values of each random pixel point; and forming an MD5 string with 32 bits, and comparing the MD5 string with the previously stored data to judge whether the MD5 string is a valid picture.
Step S204: the ID information thus found is subjected to MD5 processing, thereby generating an ID encryption string.
Specifically, the inquired ID information, i.e., the seal ID, the user ID, the encryption time, the process ID, and other encoded information are connected in the form of a character string, and then the character string is MD5 processed to generate a 32-bit encryption string, which is formed by encoding the ID information of the seal picture and is recorded as an ID encryption string.
Step S205: and comparing the position encryption string with the ID encryption string, if the position encryption string and the ID encryption string are consistent, determining that the seal is valid, and finishing the verification operation.
Specifically, the MD5 processing is performed by using the position information of the random pixel and the RGB values of the related pixels, and the position encryption string obtained by splicing and the ID encryption string obtained by using the ID information of the stamp picture are encryption strings obtained by using different encoding information processing, and when the stamp picture to be verified is an effective stamp picture, that is, the encryption string information of the stamp picture to be verified should be completely identical to the encryption string information written in the encryption process 100 in the document process, in this case, both the position encryption string obtained by using the position information of the random pixel and the ID encryption string obtained by using the ID information of the stamp picture should be identical. In other words, when the stamp picture to be verified is an invalid stamp picture, the position encryption string obtained by performing operation by using the JAVA code shown in fig. 3 is difficult to match with the ID encryption string obtained by encoding the ID information of the stamp picture to be verified, that is, the position encryption string and the ID encryption string fail to match, thereby reporting the information that the stamp picture is invalid to the system.
The anti-counterfeiting method 10 for the official document flow seal picture comprises an encryption flow 100 and a verification flow 200, wherein in the encryption flow 100, MD5 encryption processing is carried out on ID information of the seal picture to form an encryption string with less digits and position information of random pixel points corresponding to the encryption string, then a corresponding RGB value group is generated according to the encryption string, and the RGB value group and the position information of the random pixel points are written into the seal picture to form the encrypted seal picture, compared with the original seal picture, the encrypted seal picture only changes the pixel points with less digits, so that the change is difficult to see by human eyes, and the interface effect is better; the encrypted seal pictures are added into the workflow, so that the binding of the official document flow and the seal pictures is realized, namely, a user can only use the corresponding seal pictures in a specific official document and cannot be used in other official document flows of the same system by modifying the pictures and the like, and the seal safety of the user is ensured; on the basis of encrypting the seal picture, in the official document flow, a user can call the seal picture to be verified, perform MD5 processing on the seal picture again, obtain the corresponding position encryption string and ID encryption string by respectively inquiring the position information and the ID information, and compare the position encryption string and the ID encryption string, so that whether the called seal picture to be verified is consistent with the encrypted seal picture in the official document flow or not can be judged, namely whether the seal picture to be verified is valid or not can be judged, and the verification of the seal picture can be realized.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (4)

1. An anti-counterfeiting method (10) for a seal picture in a document process is characterized by comprising an encryption process (100) and a verification process (200), wherein the encryption process (100) comprises the following steps:
step S101: the workflow acquires a stamp picture and ID information;
step S102: performing MD5 encryption processing on the ID information to generate an encryption string;
step S103: generating position information of random pixel points according to the size of the seal;
step S104: grouping the encryption strings in the step S102 to form a plurality of RGB value groups, and writing the RGB value groups and the position information of the pixel points into the seal picture to form an encrypted seal picture;
step S105: recording the ID information and the position information of the pixel points into the associated information of the workflow, and adding the encrypted seal picture into the workflow to finish the seal operation;
the verification process (200) comprises the steps of:
step S201: the workflow acquires information such as a seal picture to be verified, a document flow ID and the like;
step S202: inquiring corresponding ID information and position information of the pixel points in the related information of the workflow according to the official document process ID;
step S203: inquiring the position encryption string of the seal picture to be verified according to the position information of the pixel points;
step S204: performing MD5 processing on the inquired ID information to generate an ID encryption string;
step S205: and comparing the position encryption string with the ID encryption string, if the position encryption string and the ID encryption string are consistent, determining that the seal is valid, and finishing verification operation.
2. The official document flow seal picture anti-counterfeiting method (10) according to claim 1, wherein the ID information comprises a seal ID, a user ID, time and a flow ID.
3. The anti-counterfeiting method (10) for official document process seal pictures according to claim 1, wherein the encryption string is a 32-bit encryption string or a 64-bit encryption string.
4. The anti-counterfeiting method (10) for official document process seal pictures according to claim 1, wherein the set of RGB values comprises four bytes corresponding to red, green, blue and transparency values of the image table, respectively.
CN202010523412.9A 2020-06-10 2020-06-10 Anti-fake method for document flow seal picture Active CN113784011B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010523412.9A CN113784011B (en) 2020-06-10 2020-06-10 Anti-fake method for document flow seal picture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010523412.9A CN113784011B (en) 2020-06-10 2020-06-10 Anti-fake method for document flow seal picture

Publications (2)

Publication Number Publication Date
CN113784011A true CN113784011A (en) 2021-12-10
CN113784011B CN113784011B (en) 2024-01-23

Family

ID=78834577

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010523412.9A Active CN113784011B (en) 2020-06-10 2020-06-10 Anti-fake method for document flow seal picture

Country Status (1)

Country Link
CN (1) CN113784011B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022681A (en) * 2022-05-14 2022-09-06 中国广电广州网络股份有限公司 Method for processing broadcast picture of broadcast television

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004080399A (en) * 2002-08-19 2004-03-11 Matsushita Electric Ind Co Ltd Method and device for embedding electronic watermark, video processor using the device, data distribution device, and network camera
CN1818966A (en) * 2006-03-01 2006-08-16 成都卫士通信息产业股份有限公司 Electronic seal realization
US20070150739A1 (en) * 2005-12-22 2007-06-28 Fuji Xerox Co., Ltd. Image reading apparatus, electronic document generation method, and storing medium storing electronic document generation program
CN103985082A (en) * 2014-05-29 2014-08-13 中国工商银行股份有限公司 Verification method and device for electronic certificate information
CN104268742A (en) * 2014-10-20 2015-01-07 陕西万宇电子信息科技有限公司 Official seal fake detection method and device based on network digital certificate and network lookup
CN104463554A (en) * 2013-09-25 2015-03-25 天津书生投资有限公司 Electronic seal achieving method and device
US20160055552A1 (en) * 2013-03-26 2016-02-25 China Unionpay Co., Ltd. Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same
CN105741226A (en) * 2016-02-01 2016-07-06 江苏实达迪美数据处理有限公司 Electronic stamp based visible digital image watermark embedding and detection methods
CN105912894A (en) * 2016-04-07 2016-08-31 广西国盾科技有限公司 Method for applying certificate number to electronic seal stamp anti-counterfeiting
CN106228502A (en) * 2016-07-15 2016-12-14 北华航天工业学院 The digital watermark embedding of satellite remote-sensing image tiff file and extracting method
CN107992759A (en) * 2017-12-13 2018-05-04 重庆金融资产交易所有限责任公司 Realize device, method and the computer-readable recording medium of E-seal
CN110263505A (en) * 2019-05-13 2019-09-20 阿里巴巴集团控股有限公司 Image processing method and device based on block chain
CN110321673A (en) * 2018-03-28 2019-10-11 北京京东尚科信息技术有限公司 Information ciphering method and device, information decryption method and device, security system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004080399A (en) * 2002-08-19 2004-03-11 Matsushita Electric Ind Co Ltd Method and device for embedding electronic watermark, video processor using the device, data distribution device, and network camera
US20070150739A1 (en) * 2005-12-22 2007-06-28 Fuji Xerox Co., Ltd. Image reading apparatus, electronic document generation method, and storing medium storing electronic document generation program
CN1818966A (en) * 2006-03-01 2006-08-16 成都卫士通信息产业股份有限公司 Electronic seal realization
US20160055552A1 (en) * 2013-03-26 2016-02-25 China Unionpay Co., Ltd. Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same
CN104463554A (en) * 2013-09-25 2015-03-25 天津书生投资有限公司 Electronic seal achieving method and device
CN103985082A (en) * 2014-05-29 2014-08-13 中国工商银行股份有限公司 Verification method and device for electronic certificate information
CN104268742A (en) * 2014-10-20 2015-01-07 陕西万宇电子信息科技有限公司 Official seal fake detection method and device based on network digital certificate and network lookup
CN105741226A (en) * 2016-02-01 2016-07-06 江苏实达迪美数据处理有限公司 Electronic stamp based visible digital image watermark embedding and detection methods
CN105912894A (en) * 2016-04-07 2016-08-31 广西国盾科技有限公司 Method for applying certificate number to electronic seal stamp anti-counterfeiting
CN106228502A (en) * 2016-07-15 2016-12-14 北华航天工业学院 The digital watermark embedding of satellite remote-sensing image tiff file and extracting method
CN107992759A (en) * 2017-12-13 2018-05-04 重庆金融资产交易所有限责任公司 Realize device, method and the computer-readable recording medium of E-seal
CN110321673A (en) * 2018-03-28 2019-10-11 北京京东尚科信息技术有限公司 Information ciphering method and device, information decryption method and device, security system
CN110263505A (en) * 2019-05-13 2019-09-20 阿里巴巴集团控股有限公司 Image processing method and device based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
费天浩;: "一种应用于电子印章服务的数字水印算法的研究", 航空计算技术, no. 05 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022681A (en) * 2022-05-14 2022-09-06 中国广电广州网络股份有限公司 Method for processing broadcast picture of broadcast television

Also Published As

Publication number Publication date
CN113784011B (en) 2024-01-23

Similar Documents

Publication Publication Date Title
US20230360165A1 (en) Method and apparatus for protecting digital photos from alteration
US7187781B2 (en) Information processing device and method for processing picture data and digital watermark information
Rey et al. A survey of watermarking algorithms for image authentication
JP4625841B2 (en) System and method for digital content security
US7146502B2 (en) Information processing apparatus and its control method, computer program, and storage medium
CN106951943B (en) Method for printing credible electronic contract into paper contract and recovering electronic contract
CN111183423B (en) Identifying copyrighted material using copyrighted information embedded in electronic files
US8230216B2 (en) Information processing apparatus, control method therefor, information processing system, and program
CN101377837A (en) Method for generating and checking electronic check two-dimension code credence
US20060242416A1 (en) Systems and methods for embedding messages in look-up tables
US20200250786A1 (en) System and method for encoding and authenticating a digital image
CN111177666A (en) Forensic document anti-counterfeiting and anti-tampering method and system based on fragile watermark
CN113784011B (en) Anti-fake method for document flow seal picture
WO2021120781A1 (en) Picture copyright authentication method and device, and storage medium
Memon et al. Distortion-bounded authentication techniques
Lin et al. A copyright protection scheme based on PDF
CN111026583A (en) Backup recovery method for multiple private keys of blockchain wallet and computer-readable storage medium
CN114119332A (en) Block chain-based digital watermark writing and reading method and device
WO2022123635A1 (en) Signature generation device, authentication device, and program
US6992797B1 (en) Systems and methods for embedding messages in look-up tables
US11522715B2 (en) Methods for processing and verifying a document
CN112989434A (en) Electronic document encryption tamper-proof decryption verification method
Chowdhury et al. Dynamic authentication protocol using multiple signatures
JP2008192111A (en) Method, system and product for introducing improvement of confidentiality in symbol system with error correcting function
US11954756B1 (en) Anti-leak digital document marking system and method using distributed ledger

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant