CN103413204A - Examination safety management method based on watermarks and workflow control - Google Patents

Examination safety management method based on watermarks and workflow control Download PDF

Info

Publication number
CN103413204A
CN103413204A CN2013103713063A CN201310371306A CN103413204A CN 103413204 A CN103413204 A CN 103413204A CN 2013103713063 A CN2013103713063 A CN 2013103713063A CN 201310371306 A CN201310371306 A CN 201310371306A CN 103413204 A CN103413204 A CN 103413204A
Authority
CN
China
Prior art keywords
watermark
information
paper
document
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013103713063A
Other languages
Chinese (zh)
Other versions
CN103413204B (en
Inventor
徐慧
陈翔
郭荣祥
徐志远
庄林祥
金来
周艾亭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong University
Original Assignee
Nantong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nantong University filed Critical Nantong University
Priority to CN201610028912.9A priority Critical patent/CN105701618B/en
Priority to CN201310371306.3A priority patent/CN103413204B/en
Publication of CN103413204A publication Critical patent/CN103413204A/en
Application granted granted Critical
Publication of CN103413204B publication Critical patent/CN103413204B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The invention discloses an examination safety management method based on watermarks and workflow control. The method comprises the steps that a copyright watermark identifying the copyright of examination paper is arranged, a watermark used for protecting the examination paper against tampering and based on an abstract is arranged, a watermark used for protecting the examination paper against tampering and based on an attribute is arranged, and two watermarks are combined to improve tampering judgment performance. The method is convenient to use, good in safety and capable of sufficiently guaranteeing safe operation of an examination.

Description

Examination security management method based on watermark and Work-flow control
Technical field
The present invention relates to a kind of examination security administrative skill field, be specifically related to paper tamper-resistance techniques and management process robotization and control.
Background technology
Digital watermark technology is as a kind of copyright protection means; finger will have identifiable digital signal or pattern is embedded in other data (host data); in order to prove the copyright ownership of host data, and don't affect the Watermark-adding technology of host data availability.Whether digital watermark technology can be differentiated object and be protected, and monitors the propagation of protected data, and as the evidence of identifying, prosecuting illegal infringement.Simultaneously, by the determination and analysis to watermark, guarantee the integrality of numerical information.Media by watermark institute appendix can be divided into Text Watermarking, image watermark, audio frequency watermark, video watermark.
Text Watermarking can be divided into explicit watermark and implicit expression watermark.Explicit watermark refers to by text, adding in addition the watermark unit mode that usually achieves the goal.The implicit expression watermark refers to that some are trickle, change inconspicuous adds information, thereby achieves the goal by works such as the word in text, row and paragraphs.The implicit expression watermark can be divided into again based on the document format watermark with based on two kinds of the watermarks of natural language technology.It based on the document format Text Watermarking, is maximum class text watermark of algorithm appearance up to now.From initial row displacement, the word displacement, feature coding is finally from feature coding development change font size out, and the methods such as color, based on the finite capacity of format text watermark.Based on the watermark of natural language technology, its guiding theory be utilize natural language processing technique in the situation that do not change the text original meaning by equivalent information replace, the way such as voice conversion is in the watermark information embedded text.This type of watermarking algorithm is unstable, in transmitting procedure, likely loses watermark information, and the Text Watermarking based on form is afterwards it would be better in robustness and security.
Workflow technology comes from Field of Office Automation, and by by job analysis, being task, role, carry out these tasks and they are monitored according to certain rule, to reach office automatic, the purpose of increasing work efficiency.The workflow defining that WFMC (Workflow Management Coalition WfMC) provides is: workflow is the business process that a class can completely or partially automatically perform, and it can transmit and carry out according to a series of process rules, document, information or task between different executors.
The technology that realizes of workflow has: based on the CORBA distributed work flow, based on the Distributed Workflow System of permanent message formation with based on agency's Workflow Management System etc., they are mainly used in solving the realization of distributed work flow.
Summary of the invention
The object of the present invention is to provide a kind of management method of examination security based on watermark and Work-flow control of abundant assurance examination security.
Technical solution of the present invention is:
A kind of management method of examination security based on watermark and Work-flow control is characterized in that: comprise copyright water mark method that sign paper copyright is set, arrange based on the anti-tamper water mark method of the protection paper of summary, be provided for the anti-tamper water mark method based on attribute, the method for judgement performance is distorted in two kinds of watermarks in conjunction with raising;
(1) the copyright water mark method of sign paper copyright is set, concrete steps are:
(1) by the visual input interface of paper relevant information is provided, obtain paper copyright relevant information, the course name is arranged, the people that sets a question, checker's information, the people that makes the test, test subject, paper code name, make the test the time etc., visual input interface provides the option that derives from database as much as possible; By newly-built one " needing the information .doc hidden ", deposit and need the watermark of inserting;
(2), by the end of cursor movement to document, by " insertion watermark " method, insert watermark; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, the digital watermarking designed is inserted in destination document; Call Selection object ParentContentControl.LockContentControl, two attributes of ParentContentContro-l.LockContents, their property value all is set to True, and copyright information is set to can not revise, can not delete; By the Fields.Update method, upgrade the information of anti-tamper watermark;
(3) by " hiding watermark " method, hide watermark; Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, two attributes of ParentContent-Control.LockContents, property value all is set to False; By the Hidden property value that Fond is set, be that True and Color property value are set to-603914241, reach Information hiding;
While (4) needing to delete watermark, by " deletion watermark " method, delete watermark; Described " deletion watermark " method is: document author is by first Selection object ParentConte-ntControl.LockContentControl, two property values of ParentContentControl.LockContents are set to False, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
(2) the anti-tamper water mark method of protection paper based on summary is set, concrete steps are:
(1) source data is processed
1) the paper text is opened with binary mode;
2) get 1/10 of binary documents, for processing object;
3) by the requirement of SHA-1 algorithm, to binary file divide into groups, cover and additional length value;
(2) by the SHA-1 algorithm, producing length is the 160bits clip Text;
(3) form watermark information, specific as follows:
1) be 160 information A of 160bits clip Text to length 0~159Half-and-half be divided into two groups, carry out XOR calculating:
WM=A 0~79⊕ A 80~159, obtain the watermark information WM of 80.
2) 80 watermark information WM, every 4 one group, be divided into 20 groups, establish i group g i4 be: g i=(a i, b i, c i, d i);
(4) watermark embeds.Each group information will be embedded in the form of a word of paper title, and method is: the 1st a of i group iBe added to i the word W that reference position starts to count iThe kerning attribute in, all the other 3 b i, c i, d iThree former groups as color mean, are inserted into i word W iColor attribute Color (r i, g i, b i) inner, algorithm is as follows:
Kerning(W i)=1+a i
Color(W i)=(r i+b i,g i+c i,b i+d i)=(b i,c i,d i);
(3) be provided for the anti-tamper water mark method based on attribute, concrete steps are:
(a) by the Use Word territory, automatic or manual upgrades and obtains document properties;
(b) in watermark, comprise simultaneously original document watermark and current document watermark, by comparing above-mentioned five property values of " current information ", " information before ", reach the purpose of checking whether document is tampered;
(c) the document properties information of step (a), step (b) " current information ", " information before " are stored in " needing the information .doc hidden " file of step ();
(d) by the method for " insertion watermark ", " hiding watermark ", " deletion watermark ", watermark is controlled; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, the digital watermarking designed is inserted in destination document; Call Selection object ParentContentControl.LockContentControl, two attributes of ParentContentContro-l.LockContents, their property value all is set to True, and copyright information is set to can not revise, can not delete; By the Fields.Update method, upgrade the information of anti-tamper watermark;
Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, two attributes of ParentContent-Control.LockContents, property value all is set to False; By the Hidden property value that Fond is set, be that True and Color property value are set to-603914241, reach Information hiding;
Described " deletion watermark " method is: document author is by first Selection object ParentConte-ntControl.LockContentControl, two property values of ParentContentControl.LockContents are set to False, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
The method of judgement performance is distorted in (four) two kinds of watermarks in conjunction with raising, concrete steps are:
(1), by " extraction watermark " method, check in step (three) for the anti-tamper watermark based on attribute, relatively this attribute and paper primitive attribute value;
(2), if this attribute and paper primitive attribute value change, mean to distort; If this attribute and paper primitive attribute value do not change, but security requirement is higher, further make the following judgment with the anti-tamper watermark of protection paper that step (two) is planted based on summary:
1) if do not change, mean without distorting.
2), if change, mean to distort.
Paper safety in also further flowing with operation protection by the control paper is mobile, concrete steps are:
(1) by visual workflow, realize the robotization of managing test paper, workflow comprises that business has: proposition audit, paper are got seal, exam paper marking audit, paper filing, paper check;
(2) with " Gong Hao & & Kou Ling & & Identifying code " carry out authentication and role assignments, by Database Dynamic, verify, guaranteed the legitimacy of operation.
The visual workflow of described use realizes the robotization of managing test paper, and concrete grammar is: (1) generates workflow automatically by Examination plan, and forms visualization interface;
(2) hot-zone on visualization interface, corresponding with the affairs on workflow, affairs associate management department, custodian and the work that need complete; According to business personnel's correlativity, visible to the related personnel business; After business completes, revise service condition;
(3) the affairs document is associated with list, and after list completed, affairs were done, and document status changes, and management work moves ahead along workflow.
The present invention's property easy to use, safe is good, can guarantee fully that the safety of taking an examination carries out.
The accompanying drawing explanation
The invention will be further described below in conjunction with drawings and Examples.
Fig. 1 is two kinds of anti-tamper watermark formation logic block diagrams.
Fig. 2 is that copyright information generates schematic diagram.
Fig. 3 is the examination management process flow diagram.
Fig. 4 is workflow that list the drives principle schematic of advancing.
Fig. 5 is copyright watermark input interface schematic diagram.
Fig. 6, Fig. 7 be respectively the no-watermark title, watermark title schematic diagram is arranged.
Fig. 8 is document properties information, current information ", " information before " be stored in " need hide information .doc " file schematic diagram.
Fig. 9, Figure 10, Figure 11 meaned respectively while distorting, for before inserting, by the author insert, non-author inserts the situation schematic diagram.
Figure 12 is the variation schematic diagram that paper is distorted the summary watermark content caused.
Figure 13 is workflow creation interface schematic diagram.
Figure 14 is visual workflow interface schematic diagram.
Figure 15 is that paper is submitted the interface schematic diagram to.
Figure 16 is paper audit interface schematic diagram.
Embodiment
A kind of management method of examination security based on watermark and Work-flow control, comprise copyright water mark method that sign paper copyright is set, arrange based on the anti-tamper water mark method of the protection paper of summary, be provided for the anti-tamper water mark method based on attribute, the method for judgement performance is distorted in two kinds of watermarks in conjunction with raising;
(1) the copyright water mark method of sign paper copyright is set, concrete steps are:
(1) by the visual input interface of paper relevant information is provided, obtain paper copyright relevant information, the course name is arranged, the people that sets a question, checker's information, the people that makes the test, test subject, paper code name, make the test the time etc., visual input interface provides the option that derives from database as much as possible; By newly-built one " needing the information .doc hidden ", deposit and need the watermark of inserting;
Input interface adopts list box, calendar control.List box option content is from tables of data.
Copyright watermark input interface is shown in Fig. 5.
(2), by the end of cursor movement to document, by " insertion watermark " method, insert watermark; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, the digital watermarking designed is inserted in destination document; Call Selection object ParentContentControl.LockContentControl, two attributes of ParentContentContro-l.LockContents, their property value all is set to True, and copyright information is set to can not revise, can not delete; By the Fields.Update method, upgrade the information of anti-tamper watermark;
(3) by " hiding watermark " method, hide watermark; Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, two attributes of ParentContent-Control.LockContents, property value all is set to False; By the Hidden property value that Fond is set, be that True and Color property value are set to-603914241, reach Information hiding;
While (4) needing to delete watermark, by " deletion watermark " method, delete watermark; Described " deletion watermark " method is: document author is by first Selection object ParentConte-ntControl.LockContentControl, two property values of ParentContentControl.LockContents are set to False, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
(2) the anti-tamper water mark method of protection paper based on summary is set, concrete steps are:
(1) source data is processed
1) the paper text is opened with binary mode; Method is:
Open paper file For Binary as filenumber
2) get 1/10 of binary documents, for processing object; Method is: equidistantly get, namely ten bytes get one.
3) by the requirement of SHA-1 algorithm, to binary file divide into groups, cover and additional length value; Be specially:
1. binary file is divided into groups for group leader by 512 bytes
2. the group of last group less than 512 bytes is carried out to cover, make its length %512=448
3. additional length value in first character.
(2) by the SHA-1 algorithm, producing length is the 160bits clip Text; As: 0E452 291A F4AD 92B0 B1E4 52A1 2F1F 3979 A3F5 7019 H
(3) form watermark information, specific as follows:
1) be 160 information A of 160bits clip Text to length 0~159Half-and-half be divided into two groups, carry out XOR calculating:
WM=A 0~79⊕ A 80~159, obtain the watermark information WM of 80.
2) 80 watermark information WM, every 4 one group, be divided into 20 groups, establish i group g i4 be: g i=(a i, b i, c i, d i);
(4) watermark embeds.Each group information will be embedded in the form of a word of paper title, and method is: the 1st a of i group iBe added to i the word W that reference position starts to count iThe kerning attribute in, all the other 3 b i, c i, d iThree former groups as color mean, are inserted into i word W iColor attribute Color (r i, g i, b i) inner, algorithm is as follows:
Kerning(W i)=1+a i
Color(W i)=(r i+b i,g i+c i,b i+d i)=(b i,c i,d i);
Above-mentioned information, from first character, embed in the Kerning and color of title, comparison diagram is shown in Fig. 6, Fig. 7.
(3) be provided for the anti-tamper water mark method based on attribute, concrete steps are:
(a) by the Use Word territory, automatic or manual upgrades and obtains document properties;
(b) in watermark, comprise simultaneously original document watermark and current document watermark, by comparing above-mentioned five property values of " current information ", " information before ", reach the purpose of checking whether document is tampered;
(c) the document properties information of step (a), step (b) " current information ", " information before " are stored in " needing the information .doc hidden " file of step (); See Fig. 8.
(d) by the method for " insertion watermark ", " hiding watermark ", " deletion watermark ", watermark is controlled; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, the digital watermarking designed is inserted in destination document; Call Selection object ParentContentControl.LockContentControl, two attributes of ParentContentContro-l.LockContents, their property value all is set to True, and copyright information is set to can not revise, can not delete; By the Fields.Update method, upgrade the information of anti-tamper watermark;
Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, two attributes of ParentContent-Control.LockContents, property value all is set to False; By the Hidden property value that Fond is set, be that True and Color property value are set to-603914241, reach Information hiding;
Described " deletion watermark " method is: document author is by first Selection object ParentConte-ntControl.LockContentControl, two property values of ParentContentControl.LockContents are set to False, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
The method of judgement performance is distorted in (four) two kinds of watermarks in conjunction with raising, concrete steps are:
(1), by " extraction watermark " method, check in step (three) for the anti-tamper watermark based on attribute, relatively this attribute and paper primitive attribute value;
(2), if this attribute and paper primitive attribute value change, mean to distort; If this attribute and paper primitive attribute value do not change, but security requirement is higher, further make the following judgment with the anti-tamper watermark of protection paper that step (two) is planted based on summary:
1) if do not change, mean without distorting.
2), if change, mean to distort.
(5) also further by controlling flow paper safety in flowing with operation protection of paper, concrete steps are:
(1) by visual workflow, realize the robotization of managing test paper, workflow comprises that business has: proposition audit, paper are got seal, exam paper marking audit, paper filing, paper check etc.;
(2) with " Gong Hao & & Kou Ling & & Identifying code " carry out authentication and role assignments, by Database Dynamic, verify, guaranteed the legitimacy of operation.
The visual workflow of described use realizes the robotization of managing test paper, and concrete grammar is: (1) generates workflow automatically by Examination plan, and forms visualization interface;
(2) hot-zone on visualization interface, corresponding with the affairs on workflow, affairs associate management department, custodian and the work that need complete; According to business personnel's correlativity, visible to the related personnel business; After business completes, revise service condition;
(3) the affairs document is associated with list, and after list (can control according to step 5) completed, affairs were done, and document status changes, and management work moves ahead along workflow.
As: teacher, by clicking corresponding label, enters paper and submits interface to, shown in Figure 15.
As: after paper was submitted to successfully, a series of examination of paper namely started, and audit will be carried out according to preset order, can not be random.Dean's audit interface as shown in figure 16.

Claims (3)

1. management method of the examination security based on watermark and Work-flow control is characterized in that: comprise copyright water mark method that sign paper copyright is set, arrange based on the anti-tamper water mark method of the protection paper of summary, be provided for the anti-tamper water mark method based on attribute, the method for judgement performance is distorted in two kinds of watermarks in conjunction with raising;
(1) the copyright water mark method of sign paper copyright is set, concrete steps are:
(1) by the visual input interface of paper relevant information is provided, obtain paper copyright relevant information, the course name is arranged, the people that sets a question, checker's information, the people that makes the test, test subject, paper code name, make the test the time; By newly-built one " needing the information .doc hidden ", deposit and need the watermark of inserting;
(2), by the end of cursor movement to document, by " insertion watermark " method, insert watermark; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, the digital watermarking designed is inserted in destination document; Call Selection object ParentContentControl.LockContentControl, two attributes of ParentContentContro-l.LockContents, their property value all is set to True, and copyright information is set to can not revise, can not delete; By the Fields.Update method, upgrade the information of anti-tamper watermark;
(3) by " hiding watermark " method, hide watermark; Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, two attributes of ParentContent-Control.LockContents, property value all is set to False; By the Hidden property value that Fond is set, be that True and Color property value are set to-603914241, reach Information hiding;
While (4) needing to delete watermark, by " deletion watermark " method, delete watermark; Described " deletion watermark " method is: document author is by first Selection object ParentConte-ntControl.LockContentControl, two property values of ParentContentControl.LockContents are set to False, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
(2) the anti-tamper water mark method of protection paper based on summary is set, concrete steps are:
(1) source data is processed
1) the paper text is opened with binary mode;
2) get 1/10 of binary documents, for processing object;
3) by the requirement of SHA-1 algorithm, to binary file divide into groups, cover and additional length value;
(2) by the SHA-1 algorithm, producing length is the 160bits clip Text;
(3) form watermark information, specific as follows:
1) be 160 information A of 160bits clip Text to length 0~159Half-and-half be divided into two groups, carry out XOR calculating:
WM=A 0~79⊕ A 80~159, obtain the watermark information WM of 80.
2) 80 watermark information WM, every 4 one group, be divided into 20 groups, establish i group g i4 be: g i=(a i, b i, c i, d i);
(4) watermark embeds.Each group information will be embedded in the form of a word of paper title, and method is: the 1st a of i group iBe added to i the word W that reference position starts to count iThe kerning attribute in, all the other 3 b i, c i, d iThree former groups as color mean, are inserted into i word W iColor attribute Color (r i, g i, b i) inner, algorithm is as follows:
Kerning(W i)=1+a i
Color(W i)=(r i+b i,g i+c i,b i+d i)=(b i,c i,d i);
(3) be provided for the anti-tamper water mark method based on attribute, concrete steps are:
(a) by the Use Word territory, automatic or manual upgrades and obtains document properties;
(b) in watermark, comprise simultaneously original document watermark and current document watermark, by comparing above-mentioned five property values of " current information ", " information before ", reach the purpose of checking whether document is tampered;
(c) the document properties information of step (a), step (b) " current information ", " information before " are stored in " needing the information .doc hidden " file of step ();
(d) by the method for " insertion watermark ", " hiding watermark ", " deletion watermark ", watermark is controlled; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, the digital watermarking designed is inserted in destination document; Call Selection object ParentContentControl.LockContentControl, two attributes of ParentContentContro-l.LockContents, their property value all is set to True, and copyright information is set to can not revise, can not delete; By the Fields.Update method, upgrade the information of anti-tamper watermark;
Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, two attributes of ParentContent-Control.LockContents, property value all is set to False; By the Hidden property value that Fond is set, be that True and Color property value are set to-603914241, reach Information hiding;
Described " deletion watermark " method is: document author is by first Selection object ParentConte-ntControl.LockContentControl, two property values of ParentContentControl.LockContents are set to False, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
The method of judgement performance is distorted in (four) two kinds of watermarks in conjunction with raising, concrete steps are:
(1), by " extraction watermark " method, check in step (three) for the anti-tamper watermark based on attribute, relatively this attribute and paper primitive attribute value;
(2), if this attribute and paper primitive attribute value change, mean to distort; If this attribute and paper primitive attribute value do not change, but security requirement is higher, further make the following judgment with the anti-tamper watermark of protection paper that step (two) is planted based on summary:
1) if do not change, mean without distorting.
2), if change, mean to distort.
2. the management method of the examination security based on watermark and Work-flow control according to claim 1 is characterized in that: also further by controlling flow paper safety in flowing with operation protection of paper, concrete steps are:
(1) by visual workflow, realize the robotization of managing test paper, workflow comprises that business has: proposition audit, paper are got seal, exam paper marking audit, paper filing, paper check;
(2) with " Gong Hao & & Kou Ling & & Identifying code " carry out authentication and role assignments, by Database Dynamic, verify, guaranteed the legitimacy of operation.
3. the management method of the examination security based on watermark and Work-flow control according to claim 2, it is characterized in that: the visual workflow of described use realizes the robotization of managing test paper, concrete grammar is: (1) generates workflow automatically by Examination plan, and forms visualization interface;
(2) hot-zone on visualization interface, corresponding with the affairs on workflow, affairs associate management department, custodian and the work that need complete; According to business personnel's correlativity, visible to the related personnel business; After business completes, revise service condition;
(3) the affairs document is associated with list, and after list completed, affairs were done, and document status changes, and management work moves ahead along workflow.
CN201310371306.3A 2013-08-22 2013-08-22 Based on the examination security management method of watermark and Work-flow control Expired - Fee Related CN103413204B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610028912.9A CN105701618B (en) 2013-08-22 2013-08-22 Examination security management method based on watermark and Work-flow control
CN201310371306.3A CN103413204B (en) 2013-08-22 2013-08-22 Based on the examination security management method of watermark and Work-flow control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310371306.3A CN103413204B (en) 2013-08-22 2013-08-22 Based on the examination security management method of watermark and Work-flow control

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201610028912.9A Division CN105701618B (en) 2013-08-22 2013-08-22 Examination security management method based on watermark and Work-flow control

Publications (2)

Publication Number Publication Date
CN103413204A true CN103413204A (en) 2013-11-27
CN103413204B CN103413204B (en) 2016-03-02

Family

ID=49606210

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610028912.9A Active CN105701618B (en) 2013-08-22 2013-08-22 Examination security management method based on watermark and Work-flow control
CN201310371306.3A Expired - Fee Related CN103413204B (en) 2013-08-22 2013-08-22 Based on the examination security management method of watermark and Work-flow control

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201610028912.9A Active CN105701618B (en) 2013-08-22 2013-08-22 Examination security management method based on watermark and Work-flow control

Country Status (1)

Country Link
CN (2) CN105701618B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407820A (en) * 2016-08-31 2017-02-15 江苏中威科技软件系统有限公司 Method and system for preventing document from being tampered and leaked through watermark encryption
CN110866268A (en) * 2018-08-27 2020-03-06 北京交通大学 Cloud isolation safety question management method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1018833A2 (en) * 1999-01-07 2000-07-12 Hewlett-Packard Company Applying digital watermarks to data files
CN1924925A (en) * 2006-09-28 2007-03-07 北京理工大学 Document data waterprint embedded method
CN101894238A (en) * 2010-08-09 2010-11-24 中国人民解放军海军工程大学 Double authentication-based word document electronic seal system and method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7519819B2 (en) * 2002-05-29 2009-04-14 Digimarc Corporatino Layered security in digital watermarking
US7644281B2 (en) * 2004-09-27 2010-01-05 Universite De Geneve Character and vector graphics watermark for structured electronic documents security
CN103049682B (en) * 2013-01-28 2015-04-01 上海理工大学 Character pitch encoding-based dual-watermark embedded text watermarking method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1018833A2 (en) * 1999-01-07 2000-07-12 Hewlett-Packard Company Applying digital watermarks to data files
CN1924925A (en) * 2006-09-28 2007-03-07 北京理工大学 Document data waterprint embedded method
CN101894238A (en) * 2010-08-09 2010-11-24 中国人民解放军海军工程大学 Double authentication-based word document electronic seal system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈翔: "用于文本认证的脆弱水印研究综述", 《长沙大学学报》, vol. 25, no. 5, 15 September 2011 (2011-09-15), pages 35 - 36 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407820A (en) * 2016-08-31 2017-02-15 江苏中威科技软件系统有限公司 Method and system for preventing document from being tampered and leaked through watermark encryption
CN106407820B (en) * 2016-08-31 2019-12-10 江苏中威科技软件系统有限公司 Method and system for preventing file from being tampered and leaked through watermark encryption
CN110866268A (en) * 2018-08-27 2020-03-06 北京交通大学 Cloud isolation safety question management method and system
CN110866268B (en) * 2018-08-27 2021-09-17 北京交通大学 Cloud isolation safety question management method and system

Also Published As

Publication number Publication date
CN105701618A (en) 2016-06-22
CN103413204B (en) 2016-03-02
CN105701618B (en) 2019-08-27

Similar Documents

Publication Publication Date Title
Liu et al. A new steganographic method for data hiding in microsoft word documents by a change tracking technique
US10482222B2 (en) Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data
US6782509B1 (en) Method and system for embedding information in document
US20120159296A1 (en) Redaction with Classification and Archiving for Format Independence
US20120303962A1 (en) System and method for embedding a written signature into a secure electronic document
CN101622858A (en) Image processing method and image checking method
Mali et al. Implementation of text watermarking technique using natural language watermarks
CN107203574A (en) Data management and the polymerization of data analysis
CN103902517A (en) Separated electronic official document mark remaining and showing method and system
Su et al. Watermarking 3D CAPD models for topology verification
CN110471898B (en) Information credit management method and digital news traceable release method
CN103413204B (en) Based on the examination security management method of watermark and Work-flow control
CN103530574B (en) A kind of hide Info embedding and extracting method based on English PDF document
CN110874456B (en) Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and data processing method
KR20140140928A (en) Method, Apparatus and System for Inserting Watermark, Method and Apparatus for Detecting Watermark, and System for Protecting Digital Document
CN102024245B (en) Fragile watermarking technology-based electronic seal protection method
CN100437560C (en) Method for inserting digital watermarking to relation database and extracting it from the same
JP2012151789A (en) Handwritten signature acquisition device, handwritten signature acquisition program, and handwritten signature acquisition method
Lin et al. A copyright protection scheme based on PDF
CN108416569A (en) A kind of verification method and system of surveying and mapping result
CN110909323B (en) Remote sensing image stream forwarding tracing method based on XML multi-label watermark
EP1343097A1 (en) Method for embedding of information in media files
Tiwari et al. A novel steganographic methodology for high capacity data hiding in executable files
CN103793634A (en) Track-oriented online streaming data watermarking method
WO2000004501A1 (en) Electronic watermarking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160302

Termination date: 20170822

CF01 Termination of patent right due to non-payment of annual fee