CN101533389A - Works copyright protection method - Google Patents
Works copyright protection method Download PDFInfo
- Publication number
- CN101533389A CN101533389A CN200910073987A CN200910073987A CN101533389A CN 101533389 A CN101533389 A CN 101533389A CN 200910073987 A CN200910073987 A CN 200910073987A CN 200910073987 A CN200910073987 A CN 200910073987A CN 101533389 A CN101533389 A CN 101533389A
- Authority
- CN
- China
- Prior art keywords
- works
- font
- protection method
- copyright protection
- numeral
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Document Processing Apparatus (AREA)
Abstract
The invention discloses a works copyright protection method, comprising the following steps: 1) constructing font libraries and numbering each font library; 2) coding the copyright to form a group of numeral strings with length as L; 3) typesetting a (K*L+i)th character in the works according to the font corresponding to an ith number in the numeral strings; wherein, K>=0 and i<=L; the numbers in the numeral strings correspond to the numerical symbols in the font libraries. In the method, by coding the copyright and presenting the codes in the typeset works in the form of fonts, the unauthorized persons are hard to crack the copyright and only can ruin the copyright for pirating, therefore, consumers and departments to crack down on fake goods can easily distinguish whether the works are pirated and the benefits of the consumers and copyright owners are safeguarded.
Description
Technical field
The present invention relates to a kind of Works copyright protection method.
Background technology
Information is carrier with the material medium, the sign that the various things existing waies motions in the transmission and the reflection world are posed.The accumulation of information and propagation are the bases of human civilization progress.Literal, photography, recording, video recording and the computer memory etc. of human invention can carry out information stores.Along with the high speed development of society, information storage means presents more and more stronger diversity, except the increase of continuous pursuit memory capacity, the raising of read or write speed, some unusual demands also occurred.
Networks development has brought more convenient, channel more efficiently for the propagation of information, and meanwhile, intellecture property is easier to be subjected to invading also become a problem that is difficult to avoid in network.In intellectual property protection, literary works have brought certain difficulty for its intellectual property protection because its singularity that only constitutes for literal makes it be difficult to load property right information.For strengthening the digital watermarking that antijamming capability designs, destroy a kind of technology that some important informations such as copyright information are remained exactly in order to resist some foreseeable attacks.
In the existing online literature works intellectual property protection method, a kind of employing picture issue literary works occurred, the mode of property right information is stored in while watermark in picture.Yet the anti-aggressiveness of this means is very poor, does not play the protective effect to works.At first for visible watermark, treatment measures such as fuzzy, covering are very easily eliminated.For invisible watermark, all can adopt comparatively simple image processing method to remove, as the back denoising point etc. that discolors.
Summary of the invention
The technical issues that need to address of the present invention provide a kind of Works copyright protection method, and this method can be difficult to crack and piracy with copyright information with in the present works of the form body of font.
For addressing the above problem, the technical solution used in the present invention is: a kind of Works copyright protection method, and this method may further comprise the steps:
1) makes up fontlib, and carry out numeral number for each fontlib;
2) copyright information is encoded, form the set of number character string, digit strings length is counted L;
3) the K in the works * L+i literal used the font of i numeral correspondence in the digit strings set type, K 〉=0 wherein, i≤L, the numeral number of the digital corresponding character library in the digit strings.
This method is further comprising the steps of: will generate picture format through the back works of setting type.
Described step 2) copyright information in is compiled into digital format, and coded system adopts any one in scale-of-two, three-shift, the quaternary, quinary, senary, septenary, scale-of-eight, the novenary.
Adopt the beneficial effect that technique scheme produced to be: the present invention is by encoding to copyright information, and will encode with in the present works of setting type of the form body of font, make the unauthorized person be difficult to crack copyright information, can only destroy copyright information and carry out piracy, whether pirate, safeguarded consumer and copyright owner's interests if can make consumer and departments to crack down on fake goods be easy to resolution.
Description of drawings
Fig. 1 is the Tang poetry " Jiang Xue " that adopts after the inventive method stores copyright information " 325 ";
Fig. 2 does not store " Jiang Xue " that copyright information is generated by No. 0 font " upright thin golden letters body ";
Fig. 3 does not store " Jiang Xue " that copyright information is generated by No. 1 font " Chinese row pattern ".
Embodiment
Below in conjunction with accompanying drawing the present invention is done and to describe in further detail:
The present invention is the solution that proposes for the solution problem of piracy, and it may further comprise the steps:
1) makes up fontlib, and carry out numeral number for each fontlib;
2) copyright information is encoded, form the set of number character string, digit strings length is counted L;
3) the K in the works * L+i literal used the font of i numeral correspondence in the digit strings set type, K 〉=0 wherein, i≤L, the numeral number of the digital corresponding character library in the digit strings.
Tang poetry as shown in Figure 1 " Jiang Xue " employing method of the present invention is embodied in copyright information " 325 " in the works and (is equivalent to works are encrypted), to prevent piracy.
The manufacturing process of works shown in Figure 1 is as follows:
At first make up fontlib, and carry out numeral number for each fontlib; This example has made up the fontlib of both font types " upright thin golden letters body " and " Chinese row pattern ", and wherein " upright thin golden letters body " font number is 0, and " Chinese row pattern " font number is 1; Certainly, can also make up more font, and be its numbering, for example can define 3-16 kind font, number 1-16 respectively.
Secondly copyright information is encoded, form the set of number character string, digit strings length is counted L; This example adopts the binary coding mode that copyright information " 325 " is encoded, and its digit strings that is converted to behind the scale-of-two is " 101000101 ", and the numerical character string length is 9; Wherein coded system is not limited to scale-of-two, can also be in three-shift, the quaternary, quinary, senary, septenary, scale-of-eight, the novenary any one, also can be other system modes, certainly in order to make it be difficult for being cracked, copyright information can be some numeral of relative complex, also can be that literal or letter are through the digital format after compiling, and (quantity of the font of structure is depended in the selection of coded system to choose suitable coded system, the number of fonts that makes up is many more, and alternative leeway is big more).
Then the K in the works * L+i literal used the font of i numeral correspondence in the digit strings to set type, K 〉=0 wherein, i≤L, the numeral number of the digital corresponding character library in the digit strings; In this example 1 of the 1st word correspondence " 101000101 ", adopt Chinese row pattern, 0 of the 2nd word correspondence " 101000101 ", adopt upright thin golden letters body, and the like (because the punctuation mark of different fonts is not easily distinguishable, punctuation mark is not counted in literal quantity in this example, if desired or in order to set type conveniently, also can count punctuation mark), form format shown in Figure 1.
At last, will generate picture format through the back works of setting type, picture format is convenient to issue on the network and anti-piracy, if publish books merely, this step can omit.
The embodiment of the invention makes up both font types; adopt binary coding that copyright information " 325 " is embodied (storage) in works; this can not be as limiting foundation of the present invention; those skilled in the art also can adopt other codings, fontlib to set type according to the present invention, but all can not break away from protection scope of the present invention.
Understand for convenience and be convenient to comparison, it all is " Jiang Xue " that No. 0 font generates that the present invention also provides, and as Fig. 2, all is that No. 1 font " Jiang Xue " that generate is as Fig. 3.
Claims (3)
1, a kind of Works copyright protection method, this method may further comprise the steps:
1) makes up fontlib, and carry out numeral number for each fontlib;
2) copyright information is encoded, form the set of number character string, digit strings length is counted L;
3) the K in the works * L+i literal used the font of i numeral correspondence in the digit strings set type, K 〉=0 wherein, i≤L, the numeral number of the digital corresponding character library in the digit strings.
2, Works copyright protection method according to claim 1 is characterized in that this method is further comprising the steps of: will generate picture format through the back works of setting type.
3, Works copyright protection method according to claim 1; it is characterized in that described step 2) in copyright information be compiled into digital format, coded system adopts any one in scale-of-two, three-shift, the quaternary, quinary, senary, septenary, scale-of-eight, the novenary.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910073987A CN101533389A (en) | 2009-03-24 | 2009-03-24 | Works copyright protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910073987A CN101533389A (en) | 2009-03-24 | 2009-03-24 | Works copyright protection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101533389A true CN101533389A (en) | 2009-09-16 |
Family
ID=41103999
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910073987A Pending CN101533389A (en) | 2009-03-24 | 2009-03-24 | Works copyright protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101533389A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111279338A (en) * | 2019-05-20 | 2020-06-12 | 阿里巴巴集团控股有限公司 | Identifying copyrighted material using embedded copyright information |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040001606A1 (en) * | 2002-06-28 | 2004-01-01 | Levy Kenneth L. | Watermark fonts |
CN1812321A (en) * | 2006-02-28 | 2006-08-02 | 电子科技大学 | Hidden communication method for mutual independence of character graphic and code |
CN1924925A (en) * | 2006-09-28 | 2007-03-07 | 北京理工大学 | Document data waterprint embedded method |
-
2009
- 2009-03-24 CN CN200910073987A patent/CN101533389A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040001606A1 (en) * | 2002-06-28 | 2004-01-01 | Levy Kenneth L. | Watermark fonts |
CN1812321A (en) * | 2006-02-28 | 2006-08-02 | 电子科技大学 | Hidden communication method for mutual independence of character graphic and code |
CN1924925A (en) * | 2006-09-28 | 2007-03-07 | 北京理工大学 | Document data waterprint embedded method |
Non-Patent Citations (1)
Title |
---|
吕伟等: "基于中文字体的Word文档数字水印算法", 《信息与电子工程》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111279338A (en) * | 2019-05-20 | 2020-06-12 | 阿里巴巴集团控股有限公司 | Identifying copyrighted material using embedded copyright information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alotaibi et al. | Improved capacity Arabic text watermarking methods based on open word space | |
Po-Yueh et al. | A DWT based approach for image steganography | |
CN103049682B (en) | Character pitch encoding-based dual-watermark embedded text watermarking method | |
Lee et al. | A new approach to covert communication via PDF files | |
CN100447812C (en) | Document data waterprint embedded method | |
CN1259709A (en) | Method and system for inserting information into piles | |
Zhang | Digital watermarking technology: A review | |
Singh et al. | A survey on text based steganography | |
CN110322386A (en) | A kind of insertion of digital text watermarking and detection method and device | |
CN101593247A (en) | Utilize the literal body characteristics to carry the text digital water mark technology of watermark information | |
CN108040190A (en) | A kind of stealth watermark recognition methods, device and storage device | |
WO2020237881A1 (en) | Method and apparatus for injecting anti-counterfeit information, computer device, and storage medium | |
Chaudhary et al. | Text steganography based on feature coding method | |
Jaiswal et al. | Implementation of a new technique for web document protection using unicode | |
US7831060B2 (en) | Method for protecting content of vector graphics formats | |
CN101533389A (en) | Works copyright protection method | |
CN102385680A (en) | Tamperproof protective method for Word file | |
KR100988309B1 (en) | Inserting method of document identifier and decoding method thereof | |
Zhang et al. | Chinese text watermarking based on occlusive components | |
Li et al. | DWTC: A dual watermarking scheme based on threshold cryptography for web document | |
Chen et al. | Word text watermarking for IP protection and tamper localization | |
Li et al. | The study on digital watermarking based on word document | |
CN105208462A (en) | Video digital watermarking processing method and video digital watermarking system executing same | |
Cheng et al. | A robust text digital watermarking algorithm based on fragments regrouping strategy | |
CN106815798A (en) | A kind of threedimensional model design original text digital watermarking and the method for detection digital watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20090916 |