CN114021084A - Cross-media attack-based digital watermark technology implementation method - Google Patents

Cross-media attack-based digital watermark technology implementation method Download PDF

Info

Publication number
CN114021084A
CN114021084A CN202111116436.3A CN202111116436A CN114021084A CN 114021084 A CN114021084 A CN 114021084A CN 202111116436 A CN202111116436 A CN 202111116436A CN 114021084 A CN114021084 A CN 114021084A
Authority
CN
China
Prior art keywords
watermark
information
document
signal
cross
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111116436.3A
Other languages
Chinese (zh)
Inventor
周治国
许屹
华晓
杨轩麒
郑樟磊
冯守超
查昊迅
周凯
叶雄峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Quzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Quzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Quzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Quzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority to CN202111116436.3A priority Critical patent/CN114021084A/en
Publication of CN114021084A publication Critical patent/CN114021084A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a cross-media attack-based digital watermark technology implementation method, which comprises the following steps of S1, coding information of access equipment; s2, embedding the watermark information into the original information; s3, encrypting the signal containing the watermark; s4, adding screen watermark and document printing watermark through the encrypted watermark signal according to the requirement; s5, when the detection and extraction are needed, inputting a key to unlock the encrypted watermark signal; s6, extracting watermark information from the signal containing the watermark, and detecting the signal for comparison detection; the invention can identify some accessed device data information and automatically generate the watermark font library, then embed the watermark information into the original content, strengthen the watermark by using an encryption system, trace and trace according to the watermark information, and not only has the effect of automatically generating the font library, but also has the characteristics of confidentiality, safety and detectability.

Description

Cross-media attack-based digital watermark technology implementation method
Technical Field
The invention relates to the technical field of digital watermarking, in particular to a cross-media attack-based digital watermarking technology implementation method.
Background
With the rapid development of computer network technology and the increasing abundance of multimedia technology, the copying and the circulation of information become simpler, which also promotes the risk of data leakage. Since documents are one of the most efficient and direct means for information recording, preventing document leakage is always a hot problem. Digital watermarking is one of the important means for solving the problem of document leakage. By the document watermarking technology, watermarking information can be embedded into a document in a fine and robust mode, and management, control and tracking of a divulgence source of electronic and paper files can be effectively achieved under the condition that the use value of the document is not influenced.
Typical document watermarking methods today can be classified into document structure-based, natural language processing-based, grid pattern-based, image-based, and character geometry-based methods. The document watermarking method based on the character geometric characteristics expresses watermarking information by utilizing the characteristics of characters in a document, and achieves better compromise in the aspects of visual effect, robustness and capacity. However, in the traditional Chinese document watermarking method based on character characteristics, a word stock needs to be generated manually in the generation stage of a watermarking document, so that the use efficiency of the watermarking is greatly influenced, the data watermarking is mostly added at a fixed position, or obvious information is inserted, the data watermarking can be found very easily and damaged, the traditional character watermarking is low in secrecy and poor in protection effect, and after the information of a database is leaked, the tracing and tracing cannot be performed, and the whole data leakage process is restored.
Disclosure of Invention
The invention solves the problem that the prior art can not track and trace the source after the information of the database is leaked, and provides a method for realizing the digital watermarking technology based on cross-media attack, which can extract some accessed equipment data information through a certain algorithm and automatically generate a watermarking word stock, then the watermarking information is embedded into the original content in a secret way, and then the watermarking is reinforced by adopting an encryption system in cryptography.
In order to realize the purpose, the following technical scheme is provided:
a cross-media attack-based digital watermark technology implementation method comprises the following steps:
s1, extracting the information of the device accessing the document, and coding the information of the device to obtain watermark information;
s2, embedding the watermark information into the original information of the document to obtain a signal containing the watermark;
s3, encrypting the signal containing the watermark to obtain an encrypted watermark signal;
s4, when the document is read, adding screen watermark or printing watermark by encrypting watermark signal;
s5, when the device accessing the document needs to be detected, the encrypted watermark signal is decrypted to obtain a signal containing the watermark;
and S6, extracting watermark information according to the signal containing the watermark, if the watermark information can be extracted, comparing the watermark information to obtain the information of the equipment accessing the document, and if the watermark information can not be extracted, ending the detection.
The invention extracts some accessed device data information and automatically generates a watermark information word stock, then the watermark information is embedded into the original information of the document in a concealed way, according to the reading and printing requirements, a screen watermark and a document printing watermark are respectively added through an encrypted watermark signal, a display watermark and a blind watermark can be set for protection when adding, so that the embedded position of the data watermark and the data watermark marking information are not easy to find and perceive, the concealed property can be effectively improved, a secret key is set, the signal containing the watermark is encrypted, and the watermark information is strengthened by adopting an encryption system in cryptography.
When a database leakage event or an infringement event occurs, tracing and tracing can be carried out through the data watermarks, the whole data leakage process is restored, the identity, operation and leakage range and channel of an operation data user are located, the anti-attack capability is very strong, and the effects of preventing leakage and detecting and tracing are achieved conveniently.
Preferably, the watermark information includes picture information or text information, and is used to identify information of the access device, and generate a watermark font library using the watermark information.
Preferably, the text information includes a computer name, an IP & MAC, a printing date, and user information, and the text information is generated and then automatically sorted.
Preferably, the signal containing the watermark comprises a screen watermark and a document printing watermark, the display position of the screen watermark comprises the center, the upper left corner, the lower left corner, the upper right corner or the lower right corner of the document, and the screen watermark can also self-define the watermark display position, the whole display or partial display of the content, the watermark depth and the character size.
Preferably, the encrypted watermark signal comprises a visible watermark and a blind watermark, and when the watermark is modified or cancelled, the encrypted watermark signal needs to be decrypted first for tracing and warning of a printed document divulgence event.
Preferably, the blind watermark can be embedded with position and mark information in a customized manner.
Preferably, the watermark-containing signal is encrypted using a key or keys.
The invention has the beneficial effects that: when a database leakage event or an infringement event occurs, tracing and tracing can be carried out through the data watermarks, the whole data leakage process is restored, the identity, operation and leakage range and channel of an operation data user are located, the anti-attack capability is very strong, and the effects of preventing leakage and detecting and tracing are achieved conveniently.
Drawings
FIG. 1 is a flow chart of an embedding method of the present invention;
FIG. 2 is a schematic illustration of the embedding principle of the present invention;
FIG. 3 is a flow chart of the extraction method of the present invention;
fig. 4 is a schematic diagram of the extraction principle of the present invention.
Detailed Description
Example (b):
the embodiment provides a method for implementing a digital watermarking technology based on cross-media attack, and with reference to fig. 1 to 4, the method includes the following steps:
s1, when the user accesses the document, the information of the access device is coded to obtain watermark information, the watermark information comprises picture information or character information and is used for identifying the information of the access device, and a watermark word stock is generated by utilizing the picture information or the character information;
no matter what equipment is used, text information accessed by the equipment can be generated after a document is accessed, the text information comprises a computer name, IP & MAC, a printing date and user information, the text information is automatically sequenced after being generated, a screen watermark and a document printing watermark are set according to requirements, the text information can be set in a self-defined mode after being decrypted, the watermark information cannot cause any damage to original information, and when the user prints an encrypted document, a document watermark is added according to requirements and is used for tracing and warning a document divulgence event;
s2, embedding the watermark information into the original information to obtain a signal containing the watermark, wherein the signal containing the watermark comprises two watermark formats of a screen and a document printing, and the embedded document has the watermark information and is used for protecting remote electronic document printing outgoing and screen recording or shooting attack;
the screen watermark display position comprises the center, the upper left corner, the lower left corner, the upper right corner and the lower right corner of the document, the watermark display position, the whole display or partial display, the watermark content, the watermark depth and the character size can be customized, the document printing watermark is displayed in the center of the document, the watermark information comprises the company name, the current date and the user information, and the watermark information, the display style (inclined and horizontal), the font size and the color can be customized;
s3, encrypting the signal containing the watermark by using the key to obtain an encrypted watermark signal, so that the embedded watermark supports two watermarks of a display watermark and a blind watermark, and when the watermark is modified or cancelled, the key needs to be firstly unlocked, so that the method is mainly used for tracing and warning the leakage event of the printed document, preventing the data watermark information from being cracked and modified, and improving the concealment of the watermark;
the blind watermark can self-define the embedding position and the marking information, the embedded data watermark is difficult to forge or modify, even if the data watermark is embedded, the specific position cannot be found, the embedding position of the data watermark and the marking information of the data watermark are difficult to find and perceive, and the usability of the original data is ensured to the maximum extent;
s4, when a user reads an encrypted document, a screen watermark format is added through an encrypted watermark signal as required, so that tracing and warning of a divulgence event caused by mobile phone photographing are mainly facilitated;
when the watermark is embedded and extracted, a key or the combination of several keys can be used, the key is mainly used for limiting the modification of the digital watermark, the character string is hidden in a picture, so that the function of hiding information is achieved, and finally, the information can be restored by using a specific program. Although the picture itself does not change in the view of ordinary people, the picture actually has a unique identifier of the picture, which is the prior art, redundant description is not provided here, after the encrypted document is used, the watermark information can be erased through a special tool after decryption, the encrypted document is restored to the original shape, the whole process of adding the encrypted document to the erasure does not cause any damage to the data, the algorithm for encrypting the information containing the watermark can be realized by using a 3DES encryption algorithm, an RSA encryption algorithm, or national secret algorithms SM 1-SM 9, and the like, which is the prior art, the tracing information is encrypted by the encryption algorithm first, the secrecy of the watermark data can be enhanced, and the watermark is not easy to be found by other people due to the displayed messy code information after encryption;
s5, when the detection and extraction are needed, a specific program input key is used for unlocking the encrypted watermark signal to obtain a signal containing the watermark, and the signal containing the watermark consists of original information and watermark information;
s6, extracting watermark information from the signal containing the watermark, so as to detect the accessed equipment information of the document; and when the watermark information is not extracted, the detection is finished, and the detectable effect is realized.
When data in a database is maliciously attacked by an attacker, complete data watermark information is efficiently extracted through a certain extraction algorithm, so that the copyright of a data owner to the data owner is declared, tracing can be performed through the data watermark, equipment information accessed in a watermark library is identified, a document is seen, who has accessed the document is seen, then the whole data leakage process is restored according to information such as user names and IP (Internet protocol), and the identity, operation, leakage range and channel of an operation data user are located.
The working principle is as follows: according to the invention, when a computer accesses a document, the database directly records the information of the access device in the watermark information base, and simultaneously encodes to generate a series of watermark information;
when a user prints an encrypted document, a document printing watermark is added through an encrypted watermark signal as required, the method is mainly used for tracing and warning the leakage event of the printed document (document protection user name, IP and other information), a display watermark or a blind watermark can be set, the document printing watermark is displayed in the center of the document, the company name, the current date and user information of watermark content display equipment can be set, the display position (all display or partial display), the display style (inclined type and horizontal type), the font size, the watermark depth and the color can be set, the watermark position can be set in the center, the upper left corner, the lower left corner, the upper right corner and the lower right corner of the document, the watermark content supports picture or character information, when the remote electronic document prints the leakage information, the complete data watermark information is extracted through a certain extraction algorithm program in a cross-medium manner, and the extracted watermark information content is tracked and traced to the source, identifying information in a water-printed library, seeing who has accessed a document, then restoring the whole data leakage process according to information such as user name, IP and the like, and positioning to the identity, operation, leakage range and channel of an operation data user, thereby improving the confidentiality, safety and detectability of the document and playing a role in encrypting and protecting the document from remote printing leakage;
when a user reads a document, a document watermark is added according to needs, the tracing and warning of a divulgence event caused by mobile phone photographing are mainly facilitated, the screen watermark is displayed in the center, the upper left corner, the lower left corner, the upper right corner and the lower right corner of the document, the watermark content supports pictures or character information, the character information comprises identified computer names, IP & MAC, current date and user information, the watermark display position (all display or partial display), watermark content, watermark depth and character size can be set, and when the screen is recorded or shot, the watermark and the content can be displayed on the pictures together, so that the effect of shooting protection is achieved.

Claims (7)

1. A cross-media attack-based digital watermark technology implementation method is characterized by comprising the following steps:
s1, extracting the information of the device accessing the document, and coding the information of the device to obtain watermark information;
s2, embedding the watermark information into the original information of the document to obtain a signal containing the watermark;
s3, encrypting the signal containing the watermark to obtain an encrypted watermark signal;
s4, when the document is read, adding screen watermark or printing watermark by encrypting watermark signal;
s5, when the device accessing the document needs to be detected, the encrypted watermark signal is decrypted to obtain a signal containing the watermark;
and S6, extracting watermark information according to the signal containing the watermark, if the watermark information can be extracted, comparing the watermark information to obtain the information of the equipment accessing the document, and if the watermark information can not be extracted, ending the detection.
2. The method for implementing digital watermarking based on cross-media attack according to claim 1, wherein: the watermark information comprises picture information or character information and is used for identifying the information of the access equipment and generating a watermark word stock by utilizing the watermark information.
3. The method for implementing digital watermarking based on cross-media attack according to claim 2, wherein: the text information comprises a computer name, IP & MAC, printing date and user information, and the text information is automatically sequenced after being generated.
4. The method for implementing digital watermarking based on cross-media attack according to claim 1, wherein: the watermark-containing signal comprises a screen watermark and a document printing watermark, the display position of the screen watermark comprises the center, the upper left corner, the lower left corner, the upper right corner or the lower right corner of the document, and the screen watermark can also define the watermark display position, the whole or partial display of the content, the watermark depth and the character size by self.
5. The method for implementing digital watermarking based on cross-media attack according to claim 1, wherein: the encrypted watermark signals comprise a visible watermark and a blind watermark, and when the watermarks are modified or cancelled, the encrypted watermark signals need to be decrypted first for tracing and warning the printed document divulgence event.
6. The method for implementing digital watermarking based on cross-media attack according to claim 5, wherein: the blind watermark can self-define the embedded position and the marking information.
7. The method for implementing digital watermarking based on cross-media attack according to claim 1, wherein: when the signal containing the watermark is encrypted, one key or a plurality of keys are used for encryption.
CN202111116436.3A 2021-09-23 2021-09-23 Cross-media attack-based digital watermark technology implementation method Pending CN114021084A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111116436.3A CN114021084A (en) 2021-09-23 2021-09-23 Cross-media attack-based digital watermark technology implementation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111116436.3A CN114021084A (en) 2021-09-23 2021-09-23 Cross-media attack-based digital watermark technology implementation method

Publications (1)

Publication Number Publication Date
CN114021084A true CN114021084A (en) 2022-02-08

Family

ID=80054677

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111116436.3A Pending CN114021084A (en) 2021-09-23 2021-09-23 Cross-media attack-based digital watermark technology implementation method

Country Status (1)

Country Link
CN (1) CN114021084A (en)

Similar Documents

Publication Publication Date Title
Altaay et al. An introduction to image steganography techniques
Rey et al. A survey of watermarking algorithms for image authentication
US5765176A (en) Performing document image management tasks using an iconic image having embedded encoded information
US7171021B2 (en) Data processing apparatus and method, and storage medium therefor
CN107239713B (en) Sensitive content data information protection method and system
US20040001606A1 (en) Watermark fonts
US20080297853A1 (en) Methods and Apparatus for Embedding and Detecting Digital Watermarks in a Text Document
CN108805787B (en) Paper document tampering and authenticating method and device
JP2003264685A (en) Document image output method and apparatus, tampering judging method and system, and program for controlling tampering judging system
KR20120070664A (en) System for tracking illegal distributeur and preventing distribution of illegal content and method thereof
CN104517045B (en) Digital document guard method and system
CN111680273A (en) Watermark embedding method, device, electronic equipment and readable storage medium
Katariya Digital watermarking
CN115114598A (en) Watermark generation method, and method and device for file tracing by using watermark
Muyco et al. Least significant bit hash algorithm for digital image watermarking authentication
CN103559251B (en) Data security protection method based on Information hiding
CN113987581A (en) Method for data security protection and traceability check of intelligent security community platform
CN102142073A (en) System for preventing and identifying disclosure of paper documents based on hidden watermarks
CN114078071A (en) Image tracing method, device and medium
Jaiswal et al. Implementation of a new technique for web document protection using unicode
Yadav Study of Information Hiding Techniques and their Counterattacks
CN114021084A (en) Cross-media attack-based digital watermark technology implementation method
KR101572242B1 (en) Preventing system and method for copying electronic book
JP2001344557A (en) Method and device for managing document
Khadam et al. Data aggregation and privacy preserving using computational intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination