CN101814120A - Word document data transfer based on digital watermarking - Google Patents

Word document data transfer based on digital watermarking Download PDF

Info

Publication number
CN101814120A
CN101814120A CN201010121991A CN201010121991A CN101814120A CN 101814120 A CN101814120 A CN 101814120A CN 201010121991 A CN201010121991 A CN 201010121991A CN 201010121991 A CN201010121991 A CN 201010121991A CN 101814120 A CN101814120 A CN 101814120A
Authority
CN
China
Prior art keywords
word document
concerning security
security matters
document
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010121991A
Other languages
Chinese (zh)
Inventor
杨海军
李科
张无忌
安虎
何小龙
李怡璇
周磊
杨文�
陶然
朱善保
李坤东
伍良富
谭斌
徐力
卢国成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan university jinjiang college
Original Assignee
Sichuan university jinjiang college
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan university jinjiang college filed Critical Sichuan university jinjiang college
Priority to CN201010121991A priority Critical patent/CN101814120A/en
Publication of CN101814120A publication Critical patent/CN101814120A/en
Pending legal-status Critical Current

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

Word document data transfer based on digital watermarking is a method for protecting the work document information with secret, belonging to the field of computer information security. The invention aims to protect the security and the integrity of the information of the document with secret and prevent reading, deleting, copying, duplicating and editing the information of the document with secret without authorization. The invention adopts the digital watermarking and data transfer technology, so that the user, without authorization, can not read the real document contents but read a document with information without secret, which is generated by a Hash mapping table. Therefore, the document without secret generated by the generated Hash mapping table hides the information of the document with secret. The invention is convenient to operate, high in stability and security and has broad prospect in the field of protecting the information of the word document with secret.

Description

Word document data transfer based on digital watermarking
Technical field
Patent of the present invention belongs to field of computer information security, is specifically related to a kind of a kind of method of protecting concerning security matters word document security and integrality.
Background technology
Show according to relevant authoritative department statistics, along with every profession and trade produce, the level of informatization increases day by day in the management, the computing machine behavior of divulging a secret is also in rising trend.And computing machine is divulged a secret maximum characteristics exactly than generally occupying case, and its means are more hidden, harm is also bigger.The secret leakage incident of a malice tends to cause consequence difficult to the appraisal to enterprise: gently then need to drop into a huge sum of money and remedy, heavyly then an enterprise can be put to death.AUTHORITATIVE DATA shows, nearly all Chinese Enterprise to document all without any safeguard procedures.Even and, be to use traditional encryption method only to security files having been taked safeguard measure.
A few days ago, an investigation about enterprise information security has been carried out at the information-based responsible official of 358 enterprises in the SearchSecurity website.The result of investigation shows that enterprise's secret reveals 30%~40% at present, causes by the leakage of e-file, and the company of last thousand families of " wealth " rank, each document is revealed the loss that causes and is about 4,000,000 US dollars.
The direct or indirect leakage of security files mostly is under various situation in the air with destroying, and uncommitted user carries out taking place in the operating process of security files; Even enterprise or individual have taked encryption measures, the hacker also can decipher in the relatively shorter time, thereby cause a large amount of concerning security matters, core document have a mind to/to leak unintentionally and run off lostly often, corroding concerning security matters assets and core competitiveness just as leech is continuous.The massive losses that brings could be saved and be remedied already in case arrived The game is over! Traditional encryption method has been subjected to unprecedented challenge along with the continuous raising of computer computation ability!
Along with the development of hacking technique, the shortcoming of conventional cryptography document begins to expose gradually, and for better protection security files user can only increase the length of key, but along with the growth of key length, the memory key just becomes a problem! Encrypting simultaneously also exists a fatal focus to be exactly, the user open file see be a string mess code or the prompting user import key, this just is equivalent to tell others this is very important document, the hacker will crack your encrypted document specially so, no matter whether the hacker can crack your encrypted document, encrypt just be equivalent to point out others' encrypted document importance, such way tends to cause immeasurable loss!
Summary of the invention
1, a kind of method of using the protection concerning security matters word document information of digital watermarking and data transfer technology, its step are to hide non-concerning security matters word document, Hash mapping, data transfer.
2, summary of the invention 1 described hiding non-concerning security matters word document comprises following steps:
With x (15< "X< "200) the non-concerning security matters word document of a piece of writing is hidden in the file under some catalogues of computing machine (as picture and video), and this hiding process has adopted digital watermark technology and user to carry out automatically when mounted.
3, summary of the invention 1 described Hash mapping comprises following steps:
The utilization hash algorithm is set up one group of mapping with concerning security matters word document with by the non-concerning security matters word document that adopts digital watermark technology to be hidden in the file under the some catalogues of computing machine, forms a Hash mapping table;
Under the situation that the user does not obtain the authorization, the Hash mapping table will be activated; Under the situation that the user obtains the authorization, the Hash mapping table will temporarily be closed;
Under the situation that the user obtains the authorization, use (deletion, copy, duplicate, editor) behind the concerning security matters word document, concerning security matters word document will be set up one group of new mapping with the non-concerning security matters word document in the file that is hidden in by the employing digital watermark technology under the some catalogues of computing machine, form a new Hash mapping table.The user is using (deletion, copy duplicates, editor) concerning security matters word document without permission, and this Hash mapping table can not change.
4, summary of the invention 1 described data shift, and comprise following steps:
It is under the situation of authentication code authentification failure that data shift, the concerning security matters word document of the current use of user will be shifted and replace by non-concerning security matters word document by the mapping relations between these concerning security matters word document in the Hash mapping table and the non-concerning security matters word document, shift thereby finish data;
The authentication of authentication code is adopted cryptographic algorithm and it is solidificated in USB lock of formation on the movable storage device, and under the situation of not using the USB lock, user's input authentication sign indicating number can not pointed out by system; The user can only be by USB lock ability input authentication sign indicating number, and under the situation of authentication code authentication success, system does not carry out data and shifts, and the user can read and use (deletion, copy duplicates, editor) concerning security matters word document;
Embodiment
Embodiment one: when the user used the present invention to protect security files word, the assailant can't read the document information that arrive real concerning security matters under unwarranted situation.
The assailant is under unwarranted situation; the word document that visit is protected by the present invention; what open but is a non-concerning security matters word document; the assailant just think immediately this be a common document rather than he to seek security files; so will abandon attacking, and then remove to open other document at once.If assailant's document that computing machine is all copies, the assailant also can only copy non-concerning security matters word document to so.
Embodiment two: tell in advance and moved program of the present invention on assailant's computing machine, but USB is not provided lock.The assailant still can't open concerning security matters word document.
The assailant has on knowing this computing machine after the bottom drawer program, under the situation that does not have the USB lock, can't find the interface of input authentication sign indicating number, and promptly the user can't finish the operation of input authentication sign indicating number, more can't import correct authentication code.Therefore, the assailant still read and use (deletion, the copy, duplicate, editor) be non-concerning security matters word document.
Embodiment two: tell in advance and moved the bottom drawer program on assailant's computing machine, and authentication code authentication movable storage device is provided.The assailant still is difficult to open concerning security matters word document.
Though the assailant has had the interface of input authentication sign indicating number, the present invention has used cryptographic algorithm.The assailant adopts the way that is broken to the world to attack authentication code.But need cost just can break through authentication code for a long time.

Claims (4)

1. a method of using the protection concerning security matters word document information of digital watermarking and data transfer technology is characterized in that hiding non-concerning security matters word document, Hash mapping, data transfer.
2. claim 1 is described hides non-concerning security matters word document, and its feature comprises following steps:
With x (15< "X< "200) the non-concerning security matters word document of a piece of writing is hidden in the file under some catalogues of computing machine (as picture and video), and this hiding process has adopted digital watermark technology and user to carry out automatically when mounted.
3. the described Hash mapping of claim 1, its feature comprises following steps:
The utilization hash algorithm is set up one group of mapping with concerning security matters word document with by the non-concerning security matters word document that adopts digital watermark technology to be hidden in the file under the some catalogues of computing machine, forms a Hash mapping table;
Under the situation that the user does not obtain the authorization, the Hash mapping table will be activated; Under the situation that the user obtains the authorization, the Hash mapping table will temporarily be closed;
Under the situation that the user obtains the authorization, use (deletion, copy, duplicate, editor) behind the concerning security matters word document, concerning security matters word document will be set up one group of new mapping with the non-concerning security matters word document in the file that is hidden in by the employing digital watermark technology under the some catalogues of computing machine, form a new Hash mapping table.The user is using (deletion, copy duplicates, editor) concerning security matters word document without permission, and this Hash mapping table can not change.
4. the described data of claim 1 shift, and its feature comprises following steps:
It is under the situation of authentication code authentification failure that data shift, the concerning security matters word document of the current use of user will be shifted and replace by non-concerning security matters word document by the mapping relations between these concerning security matters word document in the Hash mapping table and the non-concerning security matters word document, shift thereby finish data;
The authentication of authentication code is adopted cryptographic algorithm and it is solidificated in USB lock of formation on the movable storage device, and under the situation of not using the USB lock, user's input authentication sign indicating number can not pointed out by system;
The user can only be by USB lock ability input authentication sign indicating number, and under the situation of authentication code authentication success, system does not carry out data and shifts, and the user can read and use (deletion, copy duplicates, editor) concerning security matters word document.
CN201010121991A 2010-03-11 2010-03-11 Word document data transfer based on digital watermarking Pending CN101814120A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010121991A CN101814120A (en) 2010-03-11 2010-03-11 Word document data transfer based on digital watermarking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010121991A CN101814120A (en) 2010-03-11 2010-03-11 Word document data transfer based on digital watermarking

Publications (1)

Publication Number Publication Date
CN101814120A true CN101814120A (en) 2010-08-25

Family

ID=42621372

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010121991A Pending CN101814120A (en) 2010-03-11 2010-03-11 Word document data transfer based on digital watermarking

Country Status (1)

Country Link
CN (1) CN101814120A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254565A (en) * 2010-05-18 2011-11-23 杨海军 Method for protecting digital video works based on TG (Theme Gallery) information safety concept
CN106709852A (en) * 2015-08-13 2017-05-24 新人类资讯科技股份有限公司 Method for generating watermark file and electronic device
WO2017092151A1 (en) * 2015-12-03 2017-06-08 福建福昕软件开发股份有限公司 Method for creating garbled pdf text

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1731312A (en) * 2005-09-02 2006-02-08 北京北大方正电子有限公司 An anti-copy method for documents
CN1897522A (en) * 2005-07-15 2007-01-17 国际商业机器公司 Water mark embedded and/or inspecting method, device and system
CN101149770A (en) * 2007-09-21 2008-03-26 中山大学 Electronic stamp system based on Word/Excel electronic document
CN101271497A (en) * 2008-04-30 2008-09-24 李硕 Electric document anti-disclosure system and its implementing method
CN101291224A (en) * 2007-04-17 2008-10-22 美国博通公司 Method and system for processing data in communication system
US20090024854A1 (en) * 2007-07-18 2009-01-22 Canon Kabushiki Kaisha Document outputting apparatus, control method thereof, and document output system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1897522A (en) * 2005-07-15 2007-01-17 国际商业机器公司 Water mark embedded and/or inspecting method, device and system
CN1731312A (en) * 2005-09-02 2006-02-08 北京北大方正电子有限公司 An anti-copy method for documents
CN101291224A (en) * 2007-04-17 2008-10-22 美国博通公司 Method and system for processing data in communication system
US20090024854A1 (en) * 2007-07-18 2009-01-22 Canon Kabushiki Kaisha Document outputting apparatus, control method thereof, and document output system
CN101149770A (en) * 2007-09-21 2008-03-26 中山大学 Electronic stamp system based on Word/Excel electronic document
CN101271497A (en) * 2008-04-30 2008-09-24 李硕 Electric document anti-disclosure system and its implementing method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254565A (en) * 2010-05-18 2011-11-23 杨海军 Method for protecting digital video works based on TG (Theme Gallery) information safety concept
CN106709852A (en) * 2015-08-13 2017-05-24 新人类资讯科技股份有限公司 Method for generating watermark file and electronic device
WO2017092151A1 (en) * 2015-12-03 2017-06-08 福建福昕软件开发股份有限公司 Method for creating garbled pdf text

Similar Documents

Publication Publication Date Title
KR101577886B1 (en) Method and apparatus for memory encryption with integrity check and protection against replay attacks
Deshmukh et al. Transparent Data Encryption--Solution for Security of Database Contents
CN102355352B (en) Data confidentiality and integrity protection method
KR101033511B1 (en) Method for protecting private information and computer readable recording medium therefor
Law et al. Protecting digital data privacy in computer forensic examination
CN100585608C (en) Data file safe treatment method and system
Lee et al. Secure Data Deletion for USB Flash Memory.
CN103065102A (en) Data encryption mobile storage management method based on virtual disk
CN102185695A (en) Information management system, information management method and apparatus, and encryption method and program
CN102254117A (en) Virtualized technology-based data anti-disclosure system
US8972747B2 (en) Managing information in a document serialization
CN103154957A (en) Method for extracting fingerprint of publication, apparatus for extracting fingerprint of publication, system for identifying publication using fingerprint, and method for identifying publication using fingerprint
Belenko et al. “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really?
KR101559380B1 (en) Apparatus and method for obfuscating contents
CN101101622A (en) Method for constructing transparent coding environment
CN101814120A (en) Word document data transfer based on digital watermarking
CN110837634A (en) Electronic signature method based on hardware encryption machine
CN103379133A (en) Safe and reliable cloud storage system
Sassani et al. Evaluating encryption algorithms for sensitive data using different storage devices
JP2012215973A (en) Method for preventing information leakage
Saini A survey on watermarking web contents for protecting copyright
CN101901320A (en) Data leakage prevention method for electronic book reader
CN1154050C (en) Virtual magnetic disk method under windows
Bhat et al. After-deletion data recovery: myths and solutions
TWI444849B (en) System for monitoring personal data file based on server verifying and authorizing to decrypt and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: Yang Haijun

Document name: Notification of Patent Invention Entering into Substantive Examination Stage

Addressee: Yang Haijun

Document name: Notification of Decision on Request for Restoration of Right

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20100825