CN117150457B - Application method and system for anti-theft watermark - Google Patents

Application method and system for anti-theft watermark Download PDF

Info

Publication number
CN117150457B
CN117150457B CN202311425076.4A CN202311425076A CN117150457B CN 117150457 B CN117150457 B CN 117150457B CN 202311425076 A CN202311425076 A CN 202311425076A CN 117150457 B CN117150457 B CN 117150457B
Authority
CN
China
Prior art keywords
information
watermark
code
point
bitmap
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311425076.4A
Other languages
Chinese (zh)
Other versions
CN117150457A (en
Inventor
孙晓飞
郑传义
高伟
谭少卿
朱庆夫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Zhongfu Information Technology Co Ltd
Original Assignee
Nanjing Zhongfu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Zhongfu Information Technology Co Ltd filed Critical Nanjing Zhongfu Information Technology Co Ltd
Priority to CN202311425076.4A priority Critical patent/CN117150457B/en
Publication of CN117150457A publication Critical patent/CN117150457A/en
Application granted granted Critical
Publication of CN117150457B publication Critical patent/CN117150457B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Abstract

The invention provides an application method and system of anti-theft watermark, belonging to the technical field of information security. The method comprises the following steps: starting a watermark embedding function of the terminal equipment; obtaining watermark information, generating a code point lattice by using a watermark code point information template, and forming a lattice diagram; the bitmap is embedded on the watermark carrier and displayed on top of the screen of the terminal device. Acquiring a screen-stealing picture of a terminal device, preprocessing the picture, and extracting a bitmap; identifying an initial code point in the bitmap to confirm that the bitmap is generated based on the anti-theft watermark; determining information code points in the bitmap according to the initial code points, and performing decoding operation on the information code points to obtain corresponding character information; and combining the character information of all the information code points to generate the information of the anti-theft watermark. The invention realizes hidden embedding of the anti-theft watermark and extraction tracing of the anti-theft picture.

Description

Application method and system for anti-theft watermark
Technical Field
The invention relates to the technical field of information security, in particular to an application method and system of anti-theft watermark.
Background
With the rapid development of information technology and the advent of the large data age, a large amount of sensitive information data can be displayed and output through various computer screens. The existing plaintext watermarking, access control, illegal external connection control, identity verification and other large amount of security control technologies are applied to information security protection, and the problem of data theft caused by the way of unauthorized export, illegal network transmission and the like of important data is effectively solved.
However, along with the increasing number of intelligent devices with photographing and recording functions, important documents and information are revealed in the manners of photographing, recording and screen capturing on a screen, which becomes a great hidden danger. The popularization of the intelligent mobile phone further reduces the cost and difficulty of illegal shooting of screen information, and increases the convenience of operation and the use concealment.
Currently, digital watermarking technology is commonly used to prevent theft of screen information. Embedding regular dot matrix and color block information on a computer screen through a digital watermarking technology, and setting the embedded information into an image with weak visual effect so as to achieve the effect of information hiding; the embedded hidden information is extracted through a specific extraction algorithm, and the information tracking and tracing purpose is achieved through a tracking and tracing management system.
Although the existing digital watermarking technology can protect most electronic office scenes, important documents and information revealed in the modes of photographing, shooting and recording and screen capturing on a screen cause great difficulty in information protection and tracing.
In addition, although the picture with embedded watermark information has high fidelity, the embedded watermark information is regular, the information can be displayed by a special means, and then dotting attack is carried out according to the embedded information. Meanwhile, the watermark image shot by the mobile phone is generally difficult to ensure parallelism between the angle and the shooting plane, so perspective projection deformation is introduced in the imaging process, so that the watermark detection difficulty of the picture shot by the mobile phone is high, and the detection and extraction of the watermark are hindered.
Disclosure of Invention
Aiming at the problems existing in the prior art, the invention aims to provide an application method and system of the anti-theft watermark, which realize hidden embedding of the anti-theft watermark and extraction tracing of the anti-theft picture.
The invention aims to achieve the aim, and the aim is achieved by the following technical scheme:
a method of applying a watermark to be protected from theft, comprising:
embedding the anti-theft watermark into a screen of the terminal equipment;
acquiring a screen-stealing picture, extracting a watermark in the screen-stealing picture, and identifying information of the watermark;
the embedding of the anti-theft watermark on the screen of the terminal device comprises the following steps:
starting a watermark embedding function of the terminal equipment;
watermark information is obtained, watermark information to be embedded is generated according to an algorithm by utilizing initial code point information, and then a code point lattice is generated by utilizing a watermark code point information template, so as to form a lattice diagram;
the bitmap is embedded on the watermark carrier and displayed on top of the screen of the terminal device.
Further, the obtaining watermark information, generating watermark information to be embedded according to an algorithm by using initial code point information, generating a code point lattice by using a watermark code point information template, and forming a lattice diagram, including:
acquiring a terminal equipment identification number and user login information;
generating watermark information to be embedded through a watermark generation algorithm according to the acquired information;
loading a watermark code point information template, setting an initial lattice of code points according to requirements, and generating an information lattice corresponding to the initial lattice according to watermark information;
and according to the watermark lattice pattern template, mapping the initial code points and the corresponding information code points into a lattice pattern through a watermark embedding algorithm.
Further, the embedding the bitmap onto the watermark carrier and displaying the bitmap on the top of the screen of the terminal device includes:
embedding the bitmap onto a watermark carrier;
the watermark carrier is embedded on the screen of the terminal device and is arranged for overhead display.
Further, the start code point and the information code point each include 9 3×3 arranged points; the point positions are used for displaying code points; the bitmap includes 9 code points arranged in 3×3, and the 9 code points include 1 start code point and 8 information code points.
Further, the obtaining the cut-screen picture, extracting the anti-theft watermark in the anti-theft screen picture, and identifying the information of the anti-theft watermark, includes:
acquiring a screen-stealing picture of a terminal device, preprocessing the picture, and extracting a bitmap;
identifying an initial code point in the bitmap to confirm that the bitmap is generated based on the anti-theft watermark;
determining information code points in the bitmap according to the initial lattice, and performing decoding operation on the information code points to obtain corresponding character information;
and combining the character information of all the information code points to generate the information of the anti-theft watermark.
Further, the obtaining the screen-theft picture of the terminal device, preprocessing the picture, and extracting the bitmap includes:
acquiring a screen stealing picture of a terminal device;
performing image binarization processing, corrosion processing, sharpening processing, noise reduction processing, perspective transformation processing and image contour obtaining operation on the screen-stealing picture by using an OpenCV image processing frame;
after the processing operation is completed, a bitmap is extracted.
Further, the identifying the starting code point in the bitmap to confirm that the bitmap is generated based on the anti-theft watermark comprises:
scanning the dot matrix outline in the dot matrix diagram, and calculating the upper left corner coordinate and the lower right corner coordinate of each dot matrix;
detecting the right lower corner by taking the left upper corner of the lattice diagram as the origin, and cutting out an ROI rectangular region containing the lattice after the first code point is detected;
identifying code point characteristics of the ROI rectangular region, and judging whether the dot matrix characteristics meet initial code point characteristics or not;
if the initial code point characteristic is met, the bitmap is generated based on the anti-theft watermark;
and outputting the left upper corner coordinates of the initial code points, the width of the middle points of the code points and the distance between each pixel point in the code points.
Further, determining the information code point in the bitmap according to the start code point, and performing decoding operation on the information code point to obtain corresponding character information, including:
determining the position information of each information code point in the bitmap according to the initial code point;
acquiring a pixel point image of each point on the information code point according to the position information of the information code point;
calculating the area coincidence ratio of each pixel point image and the standard pixel point;
if the area overlap ratio is larger than the overlap ratio threshold value, the code of the point position is recorded as 1; if the area overlap ratio is smaller than the threshold value, the code of the point position is recorded as 0;
combining codes of each point location to generate codes of information code points;
and inquiring corresponding character information in a preset code table according to the codes of the information code points.
Correspondingly, the invention also discloses an application system for preventing the watermark from being stolen, which comprises the following steps:
a watermark embedding unit for embedding the anti-theft watermark into a screen of the terminal device;
the watermark identification unit is used for acquiring the screen-stealing pictures, extracting the anti-theft watermarks in the screen-stealing pictures and identifying the information of the anti-theft watermarks;
the watermark embedding unit includes:
the starting module is used for starting the watermark embedding function of the terminal equipment;
the bitmap generation module is used for acquiring watermark information, generating watermark information to be embedded according to an algorithm by utilizing initial code point information, generating a code point lattice by utilizing a watermark code point information template, and forming a bitmap;
and the bitmap display module is used for embedding the bitmap onto the watermark carrier and displaying the bitmap on the top of the screen of the terminal equipment.
Further, the watermark identifying unit includes:
the picture preprocessing module is used for acquiring a screen-stealing picture of the terminal equipment, preprocessing the picture and extracting a bitmap;
the initial lattice detection module is used for identifying initial code points in the lattice diagram to confirm that the lattice diagram is generated based on the anti-theft watermark;
the information extraction module is used for determining information code points in the bitmap according to the initial code points, and performing decoding operation on the information code points to acquire corresponding character information;
and the information combination module is used for combining the character information of all the information lattices to generate information of the anti-theft watermark.
Compared with the prior art, the invention has the beneficial effects that: the invention provides an application method and a system for preventing watermark theft, which realize protection of important files by embedding screen watermark theft prevention, can trace and trace source according to embedded information, and generate irregular watermark theft prevention information according to a dot matrix code table template in a confused manner.
It can be seen that the present invention has outstanding substantial features and significant advances over the prior art, as well as the benefits of its implementation.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present invention, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a watermark embedding process for preventing theft according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of an information identification process of a watermark preventing theft according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of an extraction flow of a watermark protected from theft according to an embodiment of the present invention.
Fig. 4 is a schematic diagram of a lattice code according to an embodiment of the present invention.
Fig. 5 is a system configuration diagram of an embodiment of the present invention.
In the figure, 1, a watermark embedding unit; 2. a watermark identifying unit; 11. starting a module; 12. a bitmap generation module; 13. a bitmap display module; 21. a picture preprocessing module; 22. a starting dot matrix detection module; 23. an information extraction module; 24. and an information combination module.
Detailed Description
The following describes specific embodiments of the present invention with reference to the drawings.
The invention discloses an application method of anti-theft watermark, which comprises the following two processes:
1. the anti-theft watermark embedding process comprises the following steps: the anti-theft watermark is embedded on the screen of the terminal device.
2. Information identification process of anti-theft watermark: and acquiring a screen-stealing picture, extracting a watermark in the screen-stealing picture, and identifying information of the watermark.
As shown in fig. 1, the anti-theft watermark embedding process specifically includes the following steps:
s101: and starting the watermark embedding function of the terminal equipment.
S102: the actual watermark information is acquired.
S103: generating watermark information to be embedded through an algorithm according to the initial code point information and the actual watermark information, generating a code point lattice by matching the watermark information to be embedded with a watermark code point information template, and forming a lattice diagram.
Specifically, firstly, acquiring a terminal equipment identification number and user login information; and generating watermark information to be embedded through a watermark generation algorithm according to the acquired information. At this time, a watermark code point information template is loaded, an initial code point is set according to requirements, and an information code point corresponding to the initial code point is generated according to watermark information.
And finally, according to the watermark lattice pattern template, mapping the initial code points and the corresponding information code points into a lattice pattern through a watermark embedding algorithm.
It should be noted that the start code point and the information code point of the method each include 9 3×3 arranged points. One pixel point may be displayed on each dot. As shown in fig. 4, the bitmap includes 9 code points arranged 3×3, each of which includes 1 start code point and 8 information code points. The start code point is set at the first row and first column of the bitmap. The starting code point and the information code point can be distinguished by the number of pixels in the code point, 6-9 pixels are arranged in the starting code point, and 5 pixels are arranged in the information code point.
S104: the bitmap is embedded on the watermark carrier and displayed on top of the screen of the terminal device.
Specifically, firstly, embedding a bitmap onto a watermark carrier; the watermark carrier is then embedded on the screen of the terminal device and arranged for a set-top display.
As shown in fig. 2, the information identification process of the anti-theft watermark specifically includes the following steps:
s201: and acquiring a screen-stealing picture of the terminal equipment, preprocessing the picture, and extracting a bitmap.
Firstly, obtaining a screen-stealing picture of a terminal device. And then performing image binarization processing, corrosion processing, sharpening processing, noise reduction processing, perspective transformation processing and image contour acquisition operation on the screen-stealing picture by using an OpenCV image processing frame. After the processing operation is completed, a bitmap is extracted.
S202: the starting code point is identified in the bitmap to confirm that the bitmap is generated based on the anti-theft watermark.
Specifically, first, the dot matrix outline in the dot matrix map is scanned, and the upper left and lower right corner coordinates of each code point are calculated. At this time, the upper left corner of the lattice diagram is used as the origin to detect the lower right corner, and when the first code point is detected, a ROI rectangular area containing the lattice is cut out. Then, code point features of the rectangular region of the ROI are identified, and it is determined whether the code point features satisfy the start code point features. If the starting code point characteristic is satisfied, the bitmap is generated based on the anti-theft watermark. And finally, outputting the upper left corner coordinates of the initial code point, the width of the midpoint of the code point and the distance between the pixel points.
S203: and determining information code points in the bitmap according to the initial code points, and performing decoding operation on the information code points to acquire corresponding character information.
Firstly, determining the position information of each information code point in a bitmap according to a start code point; and acquiring a pixel point image of each point position on the information code point according to the position information of the information code point.
At this time, a set of binary codes is generated by identifying whether each dot on the information code dot has a pixel. That is, nine points represent a two-level system bit respectively, if there is no pixel point on the point, the corresponding two-level system position is 0, and if there is a pixel point on the point, and the pixel point is a standard pixel point, the corresponding two-level system position is 1. In a specific embodiment, the identification of the pixel points can be realized by calculating the area overlap ratio of each pixel point image and the standard pixel points. If the area overlap ratio is larger than the overlap ratio threshold value, the code of the point position is recorded as 1; if the area overlap ratio is less than the threshold value, the code of the point is marked as 0. After the identification is completed, the codes of each point location are combined to generate codes of information code points.
And finally, inquiring corresponding character information in a preset code table according to the codes of the information code points.
S204: and combining the character information of all the information code points to generate the information of the anti-theft watermark.
As an example, the above-mentioned information identification process of the anti-theft watermark may also be regarded as an extraction process of the anti-theft watermark, and as shown in fig. 3, the extraction process of the anti-theft watermark specifically includes the following three parts:
preprocessing a picture: using an OpenCV image processing framework, comprising: and performing operations such as binarization, corrosion, sharpening, noise reduction, perspective transformation, image contour acquisition and the like on the image to finish preprocessing of the anti-theft watermark image and extraction of the bitmap.
Initial lattice detection: scanning all dot matrix contours, calculating the upper left corner and the lower right corner of each code point, detecting the upper left corner serving as an original point to the lower right corner, cutting out an ROI rectangular region, judging whether the dot matrix quantity, the row and the column, the code point width, the distance and the like in the rectangular region meet the initial code point characteristics, and outputting the upper left corner coordinates of the initial code point, the width of the code point midpoint and the distance between the points after the initial code point is met.
And (3) extracting an embedded code: finding a complete code point to the right according to the coordinates of the initial code point, obtaining the distance between the code points, dividing the code point blocks according to the size and the distance of the code points, sequentially calculating the coincidence degree of the actual point area of a single pixel point and a standard pixel point, marking the coincidence degree threshold value as '1', and marking the coincidence degree threshold value as '0', so as to obtain a binary code corresponding to the single information code point, and mapping the binary result into a corresponding character result by using a code table to obtain the character information of the single code point.
Correspondingly, as shown in fig. 5, the invention also discloses an application system for preventing watermark theft, which comprises: a watermark embedding unit 1 and a watermark identifying unit 2.
A watermark embedding unit 1 for embedding a watermark against theft onto a screen of the terminal device.
The watermark identifying unit 2 is used for acquiring the steal screen picture, extracting the steal watermark in the steal screen picture and identifying the information of the steal watermark.
Watermark embedding unit 1, comprising: a starting module 11, a bitmap generation module 12 and a bitmap display module 13.
And the starting module 11 is used for starting the watermark embedding function of the terminal equipment.
The bitmap generation module 12 is configured to obtain watermark information, generate watermark information to be embedded according to an algorithm using the start code point information, generate a code point lattice using a watermark code point information template, and form a bitmap.
In a specific embodiment, the bitmap generation module 12 is specifically configured to: acquiring a terminal equipment identification number and user login information; generating watermark information to be embedded through a watermark generation algorithm according to the acquired information; loading a watermark code point information template, setting a starting code point according to requirements, and generating an information code point corresponding to the starting code point according to watermark information; and according to the watermark lattice pattern template, mapping the initial code points and the corresponding information code points into a lattice pattern through a watermark embedding algorithm.
And the bitmap display module 13 is used for embedding the bitmap onto the watermark carrier and displaying the bitmap on the screen of the terminal equipment.
In a specific embodiment, the bitmap display module 13 is specifically configured to: embedding the bitmap onto a watermark carrier; the watermark carrier is embedded on the screen of the terminal device and is arranged for overhead display.
The watermark identifying unit 2 includes: the device comprises a picture preprocessing module 21, a start dot matrix detection module 22, an information extraction module 23 and an information combination module 24.
The picture preprocessing module 21 is configured to acquire a screen-theft picture of the terminal device, preprocess the picture, and extract a bitmap.
In a specific embodiment, the picture preprocessing module 21 is specifically configured to: acquiring a screen stealing picture of a terminal device; performing image binarization processing, corrosion processing, sharpening processing, noise reduction processing, perspective transformation processing and image contour obtaining operation on the screen-stealing picture by using an OpenCV image processing frame; after the processing operation is completed, a bitmap is extracted.
The starting lattice detection module 22 is configured to identify a starting code point in a lattice diagram to confirm that the lattice diagram is a lattice diagram generated based on the anti-theft watermark.
In a specific embodiment, the start dot matrix detection module 22 is specifically configured to: scanning the outline of the code points in the bitmap, and calculating the left upper corner coordinate and the right lower corner coordinate of each code point; detecting the right lower corner by taking the left upper corner of the lattice diagram as the origin, and cutting out an ROI rectangular region containing the lattice after the first code point is detected; identifying code point characteristics of the ROI rectangular region, and judging whether the code point characteristics meet initial code point characteristics or not; if the initial code point characteristic is met, the bitmap is generated based on the anti-theft watermark; and outputting the left upper corner coordinates of the initial code points, the width of the middle points of the code points and the distance between the pixel points.
The information extraction module 23 is configured to determine an information code point in the bitmap according to the start code point, and perform a decoding operation on the information code point to obtain corresponding character information.
In a specific embodiment, the information extraction module 23 is specifically configured to: determining the position information of each information code point in the bitmap according to the initial code point; acquiring a pixel point image of each point on the information code point according to the position information of the information code point; calculating the area coincidence ratio of each pixel point image and the standard pixel point; if the area overlap ratio is larger than the overlap ratio threshold value, the code of the point position is recorded as 1; if the area overlap ratio is smaller than the threshold value, the code of the point position is recorded as 0; combining codes of each point location to generate codes of information code points; and inquiring corresponding character information in a preset code table according to the codes of the information code points.
The information combining module 24 is configured to combine the character information of all the code dot lattices to generate information of the anti-theft watermark.
Therefore, the application method and the system for preventing watermark theft disclosed by the invention realize protection of important files in a mode of embedding the screen watermark theft prevention, can trace and trace the source according to the embedded information, generate irregular watermark theft prevention information according to the dot matrix code table template in a mixing way, can be used for speculatively injecting or tracing attack by taking the extracted binarized picture in the actual protection process, can also effectively protect, and increases the robustness of the protection technology.
In the several embodiments provided by the present invention, it should be understood that the disclosed systems, and methods may be implemented in other ways. For example, the system embodiments described above are merely illustrative, e.g., the division of the elements is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interface, system or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each module may exist alone physically, or two or more modules may be integrated in one unit.
Similarly, each processing unit in the embodiments of the present invention may be integrated in one functional module, or each processing unit may exist physically, or two or more processing units may be integrated in one functional module.
The invention will be further described with reference to the accompanying drawings and specific embodiments. It is to be understood that these examples are illustrative of the present invention and are not intended to limit the scope of the present invention. Further, it will be understood that various changes or modifications may be made by those skilled in the art after reading the teachings of the invention, and such equivalents are intended to fall within the scope of the invention as defined herein.

Claims (4)

1. A method of applying a watermark to be protected from theft, comprising:
embedding the anti-theft watermark into a screen of the terminal equipment;
acquiring a screen-stealing picture, extracting a watermark in the screen-stealing picture, and identifying information of the watermark;
the embedding of the anti-theft watermark on the screen of the terminal device comprises the following steps:
starting a watermark embedding function of the terminal equipment;
watermark information is obtained, watermark information to be embedded is generated according to an algorithm by utilizing initial code point information, and then a code point lattice is generated by utilizing a watermark code point information template, so as to form a lattice diagram;
embedding the bitmap onto a watermark carrier, and displaying the bitmap on the top of a screen of terminal equipment;
the obtaining watermark information, generating watermark information to be embedded according to an algorithm by utilizing initial code point information, generating a code point lattice by utilizing a watermark code point information template, and forming a lattice diagram, comprising:
acquiring a terminal equipment identification number and user login information;
generating watermark information to be embedded through a watermark generation algorithm according to the acquired information;
loading a watermark code point information template, setting an initial lattice of code points according to requirements, and generating an information lattice corresponding to the initial lattice according to watermark information;
according to the watermark lattice pattern template, mapping the initial code points and the corresponding information code points into a lattice pattern through a watermark embedding algorithm;
the initial code point and the information code point comprise 9 points which are arranged in a 3 multiplied by 3 way; the point positions are used for displaying single code points; the bitmap comprises 9 code points which are arranged in a 3 multiplied by 3 way, wherein the 9 code points comprise 1 initial code point and 8 information code points;
the obtaining the screen-cut picture, extracting the anti-theft watermark in the screen-theft picture, and identifying the information of the anti-theft watermark comprises the following steps:
acquiring a screen-stealing picture of a terminal device, preprocessing the picture, and extracting a bitmap;
identifying an initial code point in the bitmap to confirm that the bitmap is generated based on the anti-theft watermark;
determining information code points in the bitmap according to the initial code points, and performing decoding operation on the information code points to obtain corresponding character information;
combining the character information of all the information code points to generate information of the anti-theft watermark;
the identifying the starting code point in the bitmap to confirm that the bitmap is generated based on the anti-theft watermark comprises the following steps:
scanning the dot matrix outline in the dot matrix diagram, and calculating the upper left corner coordinate and the lower right corner coordinate of each dot matrix;
detecting the right lower corner by taking the upper left corner of the bitmap as the origin, and cutting out an ROI rectangular region containing the code point after the first code point is detected;
identifying code point characteristics of the ROI rectangular region, and judging whether the code point characteristics meet initial code point characteristics or not;
if the initial code point characteristic is met, the bitmap is generated based on the anti-theft watermark;
outputting the left upper corner coordinates of the initial code points, the width of the middle points of the code points and the distance between each pixel point in the code points;
the determining the information code points in the bitmap according to the initial code points, and performing decoding operation on the information code points to obtain corresponding character information includes:
determining the position information of each information code point in the bitmap according to the initial code point;
acquiring a pixel point image of each point on the information code point according to the information code point position information;
calculating the area coincidence ratio of each pixel point image and the standard pixel point;
if the area overlap ratio is larger than the overlap ratio threshold value, the code of the point position is recorded as 1; if the area overlap ratio is smaller than the threshold value, the code of the point position is recorded as 0;
combining codes of each point location to generate codes of information code points;
and inquiring corresponding character information in a preset code table according to the codes of the information code points.
2. The method for applying a watermark in accordance with claim 1, wherein said embedding the bitmap onto the watermark carrier and displaying the bitmap on top of the screen of the terminal device comprises:
embedding the bitmap onto a watermark carrier;
the watermark carrier is embedded on the screen of the terminal device and is arranged for overhead display.
3. The method for applying the anti-theft watermark according to claim 1, wherein the steps of obtaining the screen-theft picture of the terminal device, preprocessing the picture, and extracting the bitmap include:
acquiring a screen stealing picture of a terminal device;
performing image binarization processing, corrosion processing, sharpening processing, noise reduction processing, perspective transformation processing and image contour obtaining operation on the screen-stealing picture by using an OpenCV image processing frame;
after the processing operation is completed, a bitmap is extracted.
4. A system for use in securing a watermark against theft, comprising:
a watermark embedding unit for embedding the anti-theft watermark into a screen of the terminal device;
the watermark identification unit is used for acquiring the screen-stealing pictures, extracting the anti-theft watermarks in the screen-stealing pictures and identifying the information of the anti-theft watermarks;
the watermark embedding unit includes:
the starting module is used for starting the watermark embedding function of the terminal equipment;
the bitmap generation module is used for acquiring watermark information, generating watermark information to be embedded according to an algorithm by utilizing initial code point information, generating a code point lattice by utilizing a watermark code point information template, and forming a bitmap;
the bitmap display module is used for embedding the bitmap onto the watermark carrier and displaying the bitmap on the top of the screen of the terminal equipment;
the watermark identifying unit includes:
the picture preprocessing module is used for acquiring a screen-stealing picture of the terminal equipment, preprocessing the picture and extracting a bitmap;
the initial lattice detection module is used for identifying initial code points in the lattice diagram to confirm that the lattice diagram is generated based on the anti-theft watermark;
the information extraction module is used for determining information code points in the bitmap according to the initial code points, and performing decoding operation on the information code points to acquire corresponding character information;
the information combination module is used for combining the character information of all the information code points to generate information of the anti-theft watermark;
the obtaining watermark information, generating watermark information to be embedded according to an algorithm by utilizing initial code point information, generating a code point lattice by utilizing a watermark code point information template, and forming a lattice diagram, comprising:
acquiring a terminal equipment identification number and user login information;
generating watermark information to be embedded through a watermark generation algorithm according to the acquired information;
loading a watermark code point information template, setting an initial lattice of code points according to requirements, and generating an information lattice corresponding to the initial lattice according to watermark information;
according to the watermark lattice pattern template, mapping the initial code points and the corresponding information code points into a lattice pattern through a watermark embedding algorithm;
the initial code point and the information code point comprise 9 points which are arranged in a 3 multiplied by 3 way; the point positions are used for displaying single code points; the bitmap comprises 9 code points which are arranged in a 3 multiplied by 3 way, wherein the 9 code points comprise 1 initial code point and 8 information code points;
the identifying the starting code point in the bitmap to confirm that the bitmap is generated based on the anti-theft watermark comprises the following steps:
scanning the dot matrix outline in the dot matrix diagram, and calculating the upper left corner coordinate and the lower right corner coordinate of each dot matrix;
detecting the right lower corner by taking the upper left corner of the bitmap as the origin, and cutting out an ROI rectangular region containing the code point after the first code point is detected;
identifying code point characteristics of the ROI rectangular region, and judging whether the code point characteristics meet initial code point characteristics or not;
if the initial code point characteristic is met, the bitmap is generated based on the anti-theft watermark;
outputting the left upper corner coordinates of the initial code points, the width of the middle points of the code points and the distance between each pixel point in the code points;
the determining the information code points in the bitmap according to the initial code points, and performing decoding operation on the information code points to obtain corresponding character information includes:
determining the position information of each information code point in the bitmap according to the initial code point;
acquiring a pixel point image of each point on the information code point according to the information code point position information;
calculating the area coincidence ratio of each pixel point image and the standard pixel point;
if the area overlap ratio is larger than the overlap ratio threshold value, the code of the point position is recorded as 1; if the area overlap ratio is smaller than the threshold value, the code of the point position is recorded as 0;
combining codes of each point location to generate codes of information code points;
and inquiring corresponding character information in a preset code table according to the codes of the information code points.
CN202311425076.4A 2023-10-31 2023-10-31 Application method and system for anti-theft watermark Active CN117150457B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311425076.4A CN117150457B (en) 2023-10-31 2023-10-31 Application method and system for anti-theft watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311425076.4A CN117150457B (en) 2023-10-31 2023-10-31 Application method and system for anti-theft watermark

Publications (2)

Publication Number Publication Date
CN117150457A CN117150457A (en) 2023-12-01
CN117150457B true CN117150457B (en) 2024-02-23

Family

ID=88901181

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311425076.4A Active CN117150457B (en) 2023-10-31 2023-10-31 Application method and system for anti-theft watermark

Country Status (1)

Country Link
CN (1) CN117150457B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004128845A (en) * 2002-10-02 2004-04-22 Oki Electric Ind Co Ltd Method and device for padding and detecting watermark information
EP1418542A1 (en) * 2002-11-08 2004-05-12 European Central Bank Watermarking a security document
FR3044140A1 (en) * 2015-11-24 2017-05-26 B<>Com METHOD FOR PROCESSING A SEQUENCE OF DIGITAL IMAGES, TATTOOTING METHOD, DEVICES AND COMPUTER PROGRAMS
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output
CN107743123A (en) * 2017-09-30 2018-02-27 北京北信源软件股份有限公司 A kind of screen watermark handling method and device
CN109087234A (en) * 2018-08-09 2018-12-25 李晓妮 Watermark embedding method and device in a kind of text image
CN110796586A (en) * 2019-10-29 2020-02-14 中国人民解放军63850部队 Blind watermarking method and system based on digital dot matrix and readable storage medium
CN111008923A (en) * 2018-10-08 2020-04-14 阿里巴巴集团控股有限公司 Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and watermark extracting equipment
CN111444998A (en) * 2020-03-27 2020-07-24 深圳市旺盈彩盒纸品有限公司 Method for manufacturing multiple anti-counterfeiting traceable package identifier
CN111784554A (en) * 2020-06-15 2020-10-16 江苏诚印科技有限公司 Seal embedding information processing method, digital watermark extraction method and seal processing system
CN115375527A (en) * 2022-08-26 2022-11-22 南京中孚信息技术有限公司 Image processing method, device, equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004128845A (en) * 2002-10-02 2004-04-22 Oki Electric Ind Co Ltd Method and device for padding and detecting watermark information
EP1418542A1 (en) * 2002-11-08 2004-05-12 European Central Bank Watermarking a security document
FR3044140A1 (en) * 2015-11-24 2017-05-26 B<>Com METHOD FOR PROCESSING A SEQUENCE OF DIGITAL IMAGES, TATTOOTING METHOD, DEVICES AND COMPUTER PROGRAMS
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output
CN107743123A (en) * 2017-09-30 2018-02-27 北京北信源软件股份有限公司 A kind of screen watermark handling method and device
CN109087234A (en) * 2018-08-09 2018-12-25 李晓妮 Watermark embedding method and device in a kind of text image
CN111008923A (en) * 2018-10-08 2020-04-14 阿里巴巴集团控股有限公司 Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and watermark extracting equipment
CN110796586A (en) * 2019-10-29 2020-02-14 中国人民解放军63850部队 Blind watermarking method and system based on digital dot matrix and readable storage medium
CN111444998A (en) * 2020-03-27 2020-07-24 深圳市旺盈彩盒纸品有限公司 Method for manufacturing multiple anti-counterfeiting traceable package identifier
CN111784554A (en) * 2020-06-15 2020-10-16 江苏诚印科技有限公司 Seal embedding information processing method, digital watermark extraction method and seal processing system
CN115375527A (en) * 2022-08-26 2022-11-22 南京中孚信息技术有限公司 Image processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN117150457A (en) 2023-12-01

Similar Documents

Publication Publication Date Title
Fang et al. Screen-shooting resilient watermarking
CN106778996B (en) It is embedded with the generation system and method for the two dimensional code of visual pattern and reads system
US7613328B2 (en) Label detection
US20180130170A1 (en) Determining pose for use with digital watermarking, fingerprinting and augmented reality
EP1416440A2 (en) Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation
CN111680273B (en) Watermark embedding method, watermark embedding device, electronic equipment and readable storage medium
US20100142756A1 (en) Document security method
CN110796586B (en) Blind watermarking method and system based on digital dot matrix and readable storage medium
CN112085643B (en) Image desensitization processing method, verification method and device, equipment and medium
CN101359360A (en) Graphics context fused electronic ticket coding/decoding method
CN113538197B (en) Watermark extraction method, watermark extraction device, storage medium and electronic equipment
Lu et al. Combined watermarking for image authentication and protection
CN117150457B (en) Application method and system for anti-theft watermark
KR20140094163A (en) Watermarking Method and Apparatus for Inserting Watermark Created from an image into another image
Qi et al. An adaptive visible watermark embedding method based on region selection
AU2006252223B2 (en) Tamper Detection of Documents using Encoded Dots
Renklier et al. A novel Frei‐Chen based fragile watermarking method for authentication of an image
CN104680515A (en) Method for identifying image authenticity
CA2692456A1 (en) Volume marking with low-frequency
CN113628091B (en) Safety information extraction method and device for electronic display screen content reproduction scene
Barni et al. Robust watermarking of cartographic images
CN111612683A (en) Data processing method and system
CN117436907B (en) Anti-fake information tracing method based on combination of mobile phone scanning dot matrix code and digital watermark
Jung Block-based authentication scheme for forgery attacks on digital images
Sharma et al. Digital image watermarking methods: A review

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant