CN103413204B - Based on the examination security management method of watermark and Work-flow control - Google Patents

Based on the examination security management method of watermark and Work-flow control Download PDF

Info

Publication number
CN103413204B
CN103413204B CN201310371306.3A CN201310371306A CN103413204B CN 103413204 B CN103413204 B CN 103413204B CN 201310371306 A CN201310371306 A CN 201310371306A CN 103413204 B CN103413204 B CN 103413204B
Authority
CN
China
Prior art keywords
watermark
information
paper
document
property value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310371306.3A
Other languages
Chinese (zh)
Other versions
CN103413204A (en
Inventor
徐慧
陈翔
郭荣祥
徐志远
庄林祥
金来
周艾亭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong University
Original Assignee
Nantong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nantong University filed Critical Nantong University
Priority to CN201310371306.3A priority Critical patent/CN103413204B/en
Priority to CN201610028912.9A priority patent/CN105701618B/en
Publication of CN103413204A publication Critical patent/CN103413204A/en
Application granted granted Critical
Publication of CN103413204B publication Critical patent/CN103413204B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The invention discloses a kind of examination security management method based on watermark and Work-flow control, comprise mark paper copyright is set copyright watermark method, arrange based on the anti-tamper water mark method of the protection paper of summary, arrange and combine to improve and distort for the anti-tamper water mark method based on attribute, two kinds of watermarks the method judging performance.The present invention's property easy to use, safe is good, fully can ensure that the safety of taking an examination is carried out.

Description

Based on the examination security management method of watermark and Work-flow control
Technical field
The present invention relates to a kind of examination security administrative skill field, be specifically related to paper tamper-resistance techniques and management process Automated condtrol.
Background technology
Digital watermark technology is as a kind of copyright protection means; the digital signal or pattern with identifiability is referred to be embedded in other data (host data); in order to prove the copyright ownership of host data, and don't affect the watermark adding technique of host data availability.Digital watermark technology can differentiate whether object is protected, and monitors the propagation of protected data, and as qualification, the illegal evidence of encroaching right of prosecution.Meanwhile, by the determination and analysis to watermark, ensure the integrality of numerical information.Text Watermarking, image watermark, audio frequency watermark, video watermark can be divided into by the media of watermark institute appendix.
Text Watermarking can be divided into explicit watermark and implicit expression watermark.Explicit watermark refers to and to achieve the goal mode by adding watermark element in the text in addition.Implicit expression watermark refers to that some are trickle, variation inconspicuous adds information, thus achieves the goal by doing the word in text, row and paragraph etc.Implicit expression watermark can be divided into again based on document format watermark and the watermark two kinds based on natural language technology.Based on the maximum class text watermark that document format Text Watermarking is algorithm appearance up to now.From initial row displacement, word is shifted, and feature coding is finally from the change font size that feature coding develops out, and the methods such as color, based on the finite capacity of format text watermark.Based on the watermark of natural language technology, its guiding theory be utilize natural language processing technique when not changing text original meaning by ways such as equivalent information replacement, voice conversions in watermark information embedded text.This type of watermarking algorithm is unstable, in transmitting procedure, likely lose watermark information, and robustness and security are not as good as the Text Watermarking based on form afterwards.
Workflow technology comes from Field of Office Automation, by being task, role by job analysis, performing these tasks and monitor them according to certain rule, to reach office automatic, and the object of increasing work efficiency.The workflow defining that WFMC (WorkflowManagementCoalitionWfMC) provides is: workflow is the business process that a class can completely or partially automatically perform, and it can carry out transmitting according to a series of process rule, document, information or task and perform between different executors.
The actualizing technology of workflow has: based on CORBA distributed work flow, based on the Distributed Workflow System of permanent message queue and the Workflow Management System etc. based on agency, they are mainly used in the realization solving distributed work flow.
Summary of the invention
The object of the present invention is to provide a kind of examination security management method based on watermark and Work-flow control of abundant guarantee examination security.
Technical solution of the present invention is:
Based on an examination security management method for watermark and Work-flow control, it is characterized in that: comprise mark paper copyright is set copyright watermark method, arrange based on the anti-tamper water mark method of the protection paper of summary, arrange and combine to improve and distort for the anti-tamper water mark method based on attribute, two kinds of watermarks the method judging performance;
(1) arrange the copyright watermark method of mark paper copyright, concrete steps are:
(1) by providing the visual input interface of paper relevant information, obtain paper copyright relevant information, have course name, the people that sets a question, checker's information, the people that makes the test, test subject, paper code name, to make the test the time etc., visual input interface provides the option deriving from database as much as possible; The watermark needing to insert is deposited by newly-built one " the information .doc that need hide ";
(2) move the cursor to the end of document, by " insertion watermark " method, insert watermark; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, be inserted in destination document by the digital watermarking designed; Call Selection object ParentContentControl.LockContentControl, ParentContentContro-l.LockContents two attributes, their property value is all set to True, copyright information is set to can not revise, can not delete; By Fields.Update method, upgrade the information of anti-tamper watermark;
(3) by " hiding watermark " method, watermark is hidden; Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, ParentContent-Control.LockContents two attributes, property value is all set to False; Being that True and Color property value is set to-603914241 by arranging the Hidden property value of Fond, reaching Information hiding;
(4) when need delete watermark, by " deletion watermark " method, watermark is deleted; Described " deletion watermark " method is: document author is by being first set to False Selection object ParentConte-ntControl.LockContentControl, ParentContentControl.LockContents two property values, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
(2) arrange based on the anti-tamper water mark method of the protection paper of summary, concrete steps are:
(1) source data process
1) paper text is opened in binary form;
2) getting 1/10 of binary documents, is handling object;
3) by the requirement of SHA-1 algorithm, binary file to be divided into groups, cover and additional length value;
(2) producing length by SHA-1 algorithm is 160bits clip Text;
(3) watermark information is formed, specific as follows:
1) length be 160 information A of 160bits clip Text 0 ~ 159half-and-half be divided into two groups, carry out XOR calculating:
WM=A 0 ~ 79⊕ A 80 ~ 159, obtain the watermark information WM of 80.
2) 80 watermark information WM, every 4 one group, 20 groups are divided into, if i-th group of g i4 be: g i=(a i, b i, c i, d i);
(4) watermark embedment.Each group information will be embedded in the form of a word of paper title, and method is: the 1st a of i-th group ibe added to i-th word W that reference position starts to count ikerning attribute in, all the other 3 b i, c i, d ithree former groups as color represent, are inserted into i-th word W icolor attribute Color (r i, g i, b i) inner, algorithm is as follows:
Kerning(W i)=1+a i
Color(W i)=(r i+b i,g i+c i,b i+d i)=(b i,c i,d i);
(3) arrange for the anti-tamper water mark method based on attribute, concrete steps are:
A (), by Use Word territory, automatic or manual upgrades and obtains document properties;
B () comprises original document watermark and current document watermark in watermark simultaneously, by comparing above-mentioned five property values of " current information ", " before information ", reach the object of checking whether document is tampered;
C the document properties information of step (a), step (b) " current information ", " before information " are stored in " the information .doc that need hide " file of step () by ();
D (), by the method for " insertion watermark ", " hiding watermark ", " deletion watermark ", controls watermark; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, be inserted in destination document by the digital watermarking designed; Call Selection object ParentContentControl.LockContentControl, ParentContentContro-l.LockContents two attributes, their property value is all set to True, copyright information is set to can not revise, can not delete; By Fields.Update method, upgrade the information of anti-tamper watermark;
Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, ParentContent-Control.LockContents two attributes, property value is all set to False; Being that True and Color property value is set to-603914241 by arranging the Hidden property value of Fond, reaching Information hiding;
Described " deletion watermark " method is: document author is by being first set to False Selection object ParentConte-ntControl.LockContentControl, ParentContentControl.LockContents two property values, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
(4) two kinds of watermarks combine to improve distorts the method judging performance, and concrete steps are:
(1) by " extraction watermark " method, to check in step (three) for the anti-tamper watermark based on attribute, compare this attribute and paper original property value;
(2) if this attribute and paper original property value change, indicate and distort; If this attribute and paper original property value do not change, but security requirement is higher, make the following judgment further with the watermark that step (two) is planted based on the protection paper of summary is anti-tamper:
1) if not change, indicate without distorting.
2) if changed, indicate and distort.
Paper safety in also flowing with operation protection further by the flowing of control paper, concrete steps are:
(1) realize the robotization of managing test paper by visual workflow, workflow comprises business to be had: print, exam paper marking examination & verification, paper filing, paper check are got in proposition examination & verification, paper;
(2) carry out authentication and role assignments with " job number & & password & & identifying code ", verified by Database Dynamic, ensure that the legitimacy that guarantee operates.
The described robotization realizing managing test paper by visual workflow, concrete grammar is: (1) generates workflow automatically by Examination plan, and forms visualization interface;
(2) hot-zone on visualization interface, corresponding with the affairs in workflow, affairs associate management department, custodian and the work that need complete; According to the correlativity of business personnel, business is visible to related personnel; After business completes, amendment service condition;
(3) affairs document associates with list, and after list completes, affairs are done, and document status changes, and management work moves ahead along workflow.
The present invention's property easy to use, safe is good, fully can ensure that the safety of taking an examination is carried out.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described.
Fig. 1 is two kinds of anti-tamper watermark formation logic block diagrams.
Fig. 2 is that copyright information generates schematic diagram.
Fig. 3 is examination management process flow diagram.
Fig. 4 is that the workflow that list drives is advanced principle schematic.
Fig. 5 is copyright watermark input interface schematic diagram.
Fig. 6, Fig. 7 are no-watermark title respectively, have watermark title schematic diagram.
Fig. 8 is document properties information, current information ", " before information " be stored in " the information .doc that need hide " file schematic diagram.
Fig. 9, Figure 10, Figure 11 indicate when distorting, for before inserting, inserted by author, non-author inserts situation schematic diagram.
Figure 12 is the change schematic diagram that the summary watermark content caused distorted by paper.
Figure 13 is workflow creation interface schematic diagram.
Figure 14 is visual workflow interface schematic diagram.
Figure 15 is that interface schematic diagram submitted to by paper.
Figure 16 is paper examination & verification interface schematic diagram.
Embodiment
Based on an examination security management method for watermark and Work-flow control, comprise mark paper copyright is set copyright watermark method, arrange based on the anti-tamper water mark method of the protection paper of summary, arrange and combine to improve and distort for the anti-tamper water mark method based on attribute, two kinds of watermarks the method judging performance;
(1) arrange the copyright watermark method of mark paper copyright, concrete steps are:
(1) by providing the visual input interface of paper relevant information, obtain paper copyright relevant information, have course name, the people that sets a question, checker's information, the people that makes the test, test subject, paper code name, to make the test the time etc., visual input interface provides the option deriving from database as much as possible; The watermark needing to insert is deposited by newly-built one " the information .doc that need hide ";
Input interface adopts list box, calendar control.List box option content is from tables of data.
Copyright watermark input interface is shown in Fig. 5.
(2) move the cursor to the end of document, by " insertion watermark " method, insert watermark; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, be inserted in destination document by the digital watermarking designed; Call Selection object ParentContentControl.LockContentControl, ParentContentContro-l.LockContents two attributes, their property value is all set to True, copyright information is set to can not revise, can not delete; By Fields.Update method, upgrade the information of anti-tamper watermark;
(3) by " hiding watermark " method, watermark is hidden; Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, ParentContent-Control.LockContents two attributes, property value is all set to False; Being that True and Color property value is set to-603914241 by arranging the Hidden property value of Fond, reaching Information hiding;
(4) when need delete watermark, by " deletion watermark " method, watermark is deleted; Described " deletion watermark " method is: document author is by being first set to False Selection object ParentConte-ntControl.LockContentControl, ParentContentControl.LockContents two property values, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
(2) arrange based on the anti-tamper water mark method of the protection paper of summary, concrete steps are:
(1) source data process
1) paper text is opened in binary form; Method is:
Open paper file ForBinaryasfilenumber
2) getting 1/10 of binary documents, is handling object; Method is: equidistantly get, and namely ten bytes get one.
3) by the requirement of SHA-1 algorithm, binary file to be divided into groups, cover and additional length value; Be specially:
1. to binary file by 512 bytes for group leader divides into groups
2. less than the group of 512 bytes, cover is carried out to last group, make its length %512=448
3. additional length value in first character.
(2) producing length by SHA-1 algorithm is 160bits clip Text; As: 0E452291AF4AD92B0B1E452A12F1F3979A3F57019H
(3) watermark information is formed, specific as follows:
1) length be 160 information A of 160bits clip Text 0 ~ 159half-and-half be divided into two groups, carry out XOR calculating:
WM=A 0 ~ 79⊕ A 80 ~ 159, obtain the watermark information WM of 80.
2) 80 watermark information WM, every 4 one group, 20 groups are divided into, if i-th group of g i4 be: g i=(a i, b i, c i, d i);
(4) watermark embedment.Each group information will be embedded in the form of a word of paper title, and method is: the 1st a of i-th group ibe added to i-th word W that reference position starts to count ikerning attribute in, all the other 3 b i, c i, d ithree former groups as color represent, are inserted into i-th word W icolor attribute Color (r i, g i, b i) inner, algorithm is as follows:
Kerning(W i)=1+a i
Color(W i)=(r i+b i,g i+c i,b i+d i)=(b i,c i,d i);
Above-mentioned information, from first character, embed in Kerning and color of title, comparison diagram is shown in Fig. 6, Fig. 7.
(3) arrange for the anti-tamper water mark method based on attribute, concrete steps are:
A (), by Use Word territory, automatic or manual upgrades and obtains document properties;
B () comprises original document watermark and current document watermark in watermark simultaneously, by comparing above-mentioned five property values of " current information ", " before information ", reach the object of checking whether document is tampered;
C the document properties information of step (a), step (b) " current information ", " before information " are stored in " the information .doc that need hide " file of step () by (); See Fig. 8.
D (), by the method for " insertion watermark ", " hiding watermark ", " deletion watermark ", controls watermark; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, be inserted in destination document by the digital watermarking designed; Call Selection object ParentContentControl.LockContentControl, ParentContentContro-l.LockContents two attributes, their property value is all set to True, copyright information is set to can not revise, can not delete; By Fields.Update method, upgrade the information of anti-tamper watermark;
Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, ParentContent-Control.LockContents two attributes, property value is all set to False; Being that True and Color property value is set to-603914241 by arranging the Hidden property value of Fond, reaching Information hiding;
Described " deletion watermark " method is: document author is by being first set to False Selection object ParentConte-ntControl.LockContentControl, ParentContentControl.LockContents two property values, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
(4) two kinds of watermarks combine to improve distorts the method judging performance, and concrete steps are:
(1) by " extraction watermark " method, to check in step (three) for the anti-tamper watermark based on attribute, compare this attribute and paper original property value;
(2) if this attribute and paper original property value change, indicate and distort; If this attribute and paper original property value do not change, but security requirement is higher, make the following judgment further with the watermark that step (two) is planted based on the protection paper of summary is anti-tamper:
1) if not change, indicate without distorting.
2) if changed, indicate and distort.
(5) the paper safety in also flowing with operation protection further by the flowing of control paper, concrete steps are:
(1) realize the robotization of managing test paper by visual workflow, workflow comprises business to be had: print, exam paper marking examination & verification, paper filing, paper check etc. are got in proposition examination & verification, paper;
(2) carry out authentication and role assignments with " job number & & password & & identifying code ", verified by Database Dynamic, ensure that the legitimacy that guarantee operates.
The described robotization realizing managing test paper by visual workflow, concrete grammar is: (1) generates workflow automatically by Examination plan, and forms visualization interface;
(2) hot-zone on visualization interface, corresponding with the affairs in workflow, affairs associate management department, custodian and the work that need complete; According to the correlativity of business personnel, business is visible to related personnel; After business completes, amendment service condition;
(3) affairs document associates with list, and after list (can control according to step 5) completes, affairs are done, and document status changes, and management work moves ahead along workflow.
As: teacher, by clicking corresponding label, then enters paper and submits interface to, shown in Figure 15.
As: paper is submitted to successfully, and namely a series of examination of paper start, and examination & verification will be carried out according to preset order, can not be random.The examination & verification interface of dean as shown in figure 16.

Claims (3)

1., based on an examination security management method for watermark and Work-flow control, it is characterized in that: comprise the step of the copyright watermark that mark paper copyright is set, arrange based on the anti-tamper watermark of the protection paper of summary step, arrange and combine to improve and distort for the step of the anti-tamper watermark based on attribute, two kinds of watermarks the step judging performance;
(1) arrange the step of the copyright watermark of mark paper copyright, concrete steps are:
(1) by providing the visual input interface of paper relevant information, obtaining paper copyright relevant information, having course name, the people that sets a question, checker's information, the people that makes the test, test subject, paper code name, to make the test the time; The watermark needing to insert is deposited by newly-built one " the information .doc that need hide ";
(2) move the cursor to the end of document, by " insertion watermark " method, insert watermark; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, be inserted in destination document by the digital watermarking designed; Call Selection object ParentContentControl.LockContentControl, ParentContentContro-l.LockContents two attributes, their property value is all set to True, copyright information is set to can not revise, can not delete; By Fields.Update method, upgrade the information of anti-tamper watermark;
(3) by " hiding watermark " method, watermark is hidden; Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, ParentContent-Control.LockContents two attributes, property value is all set to False; Being that True and Color property value is set to-603914241 by arranging the Hidden property value of Fond, reaching Information hiding;
(4) when need delete watermark, by " deletion watermark " method, watermark is deleted; Described " deletion watermark " method is: document author is by being first set to False Selection object ParentConte-ntControl.LockContentControl, ParentContentControl.LockContents two property values, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
(2) arrange the step based on the anti-tamper watermark of the protection paper of summary, concrete steps are:
(1) source data process
1) paper text is opened in binary form;
2) getting 1/10 of binary documents, is handling object;
3) by the requirement of SHA-1 algorithm, binary file to be divided into groups, cover and additional length value;
(2) producing length by SHA-1 algorithm is 160bits clip Text;
(3) watermark information is formed, specific as follows:
1) length be 160 information A of 160bits clip Text 0 ~ 159half-and-half be divided into two groups, carry out XOR calculating:
obtain the watermark information WM of 80;
2) 80 watermark information WM, every 4 one group, 20 groups are divided into, if i-th group of g i4 be: g i=(a i, b i, c i, d i);
(4) watermark embedment; Each group information will be embedded in the form of a word of paper title, and method is: the 1st a of i-th group ibe added to i-th word W that reference position starts to count ikerning attribute in, all the other 3 b i, c i, d ithree former groups as color represent, are inserted into i-th word W icolor attribute Color (r i, g i, b i) inner, algorithm is as follows:
Kerning(W i)=1+a i
Color(W i)=(r i+b i,g i+c i,b i+d i)=(b i,c i,d i);
(3) arrange the step being used for the anti-tamper watermark based on attribute, concrete steps are:
A (), by Use Word territory, automatic or manual upgrades and obtains document properties;
B () comprises original document watermark and current document watermark in watermark simultaneously, by comparing the document properties of " current information ", " before information ", reach the object of checking whether document is tampered;
C the document properties information of step (a), step (b) " current information ", " before information " are stored in " the information .doc that need hide " file of step () by ();
D (), by the method for " insertion watermark ", " hiding watermark ", " deletion watermark ", controls watermark; Described " insertion watermark " method is: call Selection.InsertFile.FileName method in Word document, be inserted in destination document by the digital watermarking designed; Call Selection object ParentContentControl.LockContentControl, ParentContentContro-l.LockContents two attributes, their property value is all set to True, copyright information is set to can not revise, can not delete; By Fields.Update method, upgrade the information of anti-tamper watermark;
Described " hiding watermark " method is: call Selection object ParentContentControl.Lock-ContentControl, ParentContent-Control.LockContents two attributes, property value is all set to False; Being that True and Color property value is set to-603914241 by arranging the Hidden property value of Fond, reaching Information hiding;
Described " deletion watermark " method is: document author is by being first set to False Selection object ParentConte-ntControl.LockContentControl, ParentContentControl.LockContents two property values, then whole watermark information is chosen, call the TypeBackspace method of Selection object, watermark information is deleted;
(4) two kinds of watermarks combine to improve distorts the step judging performance, and concrete steps are:
(1) by " extraction watermark " method, to check in step (three) for the anti-tamper watermark based on attribute, compare this attribute and paper original property value;
(2) if this attribute and paper original property value change, indicate and distort; If this attribute and paper original property value do not change, but security requirement is higher, make the following judgment further based on the watermark that the protection paper of summary is anti-tamper with in step (two):
1) if not change, indicate without distorting;
2) if changed, indicate and distort.
2. the examination security management method based on watermark and Work-flow control according to claim 1, is characterized in that: also further by control paper flowing flow with operation protection in paper safety, concrete steps are:
(1) realize the robotization of managing test paper by visual workflow, workflow comprises business to be had: print, exam paper marking examination & verification, paper filing, paper check are got in proposition examination & verification, paper;
(2) carry out authentication and role assignments with " job number & & password & & identifying code ", verified by Database Dynamic, ensure that the legitimacy that guarantee operates.
3. the examination security management method based on watermark and Work-flow control according to claim 2, it is characterized in that: the described robotization realizing managing test paper by visual workflow, concrete grammar is: (1) generates workflow automatically by Examination plan, and forms visualization interface;
(2) hot-zone on visualization interface, corresponding with the affairs in workflow, affairs associate management department, custodian and the work that need complete; According to the correlativity of business personnel, business is visible to related personnel; After business completes, amendment service condition;
(3) affairs document associates with list, and after list completes, affairs are done, and document status changes, and management work moves ahead along workflow.
CN201310371306.3A 2013-08-22 2013-08-22 Based on the examination security management method of watermark and Work-flow control Expired - Fee Related CN103413204B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310371306.3A CN103413204B (en) 2013-08-22 2013-08-22 Based on the examination security management method of watermark and Work-flow control
CN201610028912.9A CN105701618B (en) 2013-08-22 2013-08-22 Examination security management method based on watermark and Work-flow control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310371306.3A CN103413204B (en) 2013-08-22 2013-08-22 Based on the examination security management method of watermark and Work-flow control

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201610028912.9A Division CN105701618B (en) 2013-08-22 2013-08-22 Examination security management method based on watermark and Work-flow control

Publications (2)

Publication Number Publication Date
CN103413204A CN103413204A (en) 2013-11-27
CN103413204B true CN103413204B (en) 2016-03-02

Family

ID=49606210

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610028912.9A Active CN105701618B (en) 2013-08-22 2013-08-22 Examination security management method based on watermark and Work-flow control
CN201310371306.3A Expired - Fee Related CN103413204B (en) 2013-08-22 2013-08-22 Based on the examination security management method of watermark and Work-flow control

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201610028912.9A Active CN105701618B (en) 2013-08-22 2013-08-22 Examination security management method based on watermark and Work-flow control

Country Status (1)

Country Link
CN (2) CN105701618B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407820B (en) * 2016-08-31 2019-12-10 江苏中威科技软件系统有限公司 Method and system for preventing file from being tampered and leaked through watermark encryption
CN110866268B (en) * 2018-08-27 2021-09-17 北京交通大学 Cloud isolation safety question management method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1018833A2 (en) * 1999-01-07 2000-07-12 Hewlett-Packard Company Applying digital watermarks to data files
CN1924925A (en) * 2006-09-28 2007-03-07 北京理工大学 Document data waterprint embedded method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7519819B2 (en) * 2002-05-29 2009-04-14 Digimarc Corporatino Layered security in digital watermarking
US7644281B2 (en) * 2004-09-27 2010-01-05 Universite De Geneve Character and vector graphics watermark for structured electronic documents security
CN101894238B (en) * 2010-08-09 2012-07-04 中国人民解放军海军工程大学 Double authentication-based word document electronic seal system and method
CN103049682B (en) * 2013-01-28 2015-04-01 上海理工大学 Character pitch encoding-based dual-watermark embedded text watermarking method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1018833A2 (en) * 1999-01-07 2000-07-12 Hewlett-Packard Company Applying digital watermarks to data files
CN1924925A (en) * 2006-09-28 2007-03-07 北京理工大学 Document data waterprint embedded method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
用于文本认证的脆弱水印研究综述;陈翔;《长沙大学学报》;20110915;第25卷(第5期);35-36 *

Also Published As

Publication number Publication date
CN105701618B (en) 2019-08-27
CN105701618A (en) 2016-06-22
CN103413204A (en) 2013-11-27

Similar Documents

Publication Publication Date Title
Ahvanooey et al. ANiTW: A novel intelligent text watermarking technique for forensic identification of spurious information on social media
US10089287B2 (en) Redaction with classification and archiving for format independence
EP1906645B1 (en) Electronic watermark embedment apparatus and electronic watermark detection apparatus
US20120303962A1 (en) System and method for embedding a written signature into a secure electronic document
CN110532811B (en) PDF (Portable document Format) signature method and PDF signature system
WO2019141293A3 (en) Identifying copyrighted material using embedded copyright information
CN110809763A (en) Identifying copyrighted material using time-stamped embedded copyright information
CN101622858A (en) Image processing method and image checking method
CN102096787A (en) Method and device for hiding information based on word2007 text segmentation
Mali et al. Implementation of text watermarking technique using natural language watermarks
CN107203574A (en) Data management and the polymerization of data analysis
Rizzo et al. Text watermarking in social media
CN103902517A (en) Separated electronic official document mark remaining and showing method and system
CN103413204B (en) Based on the examination security management method of watermark and Work-flow control
KR20120064548A (en) Apparatus and method for copyright protection of digital contents
CN101923700A (en) Double-effect digital watermarking method
WO2020237881A1 (en) Method and apparatus for injecting anti-counterfeit information, computer device, and storage medium
CN102024245B (en) Fragile watermarking technology-based electronic seal protection method
KR20200021853A (en) Method and apparatus for distributing intellectual property and originality check of literary work based on blockchain technology
US8539591B2 (en) Document management system, management device, recording medium storing document management program, document management method and data signal
CN110471898B (en) Information credit management method and digital news traceable release method
WO2008004221A2 (en) Inserting digital signatures into a transformed document
CN110909323B (en) Remote sensing image stream forwarding tracing method based on XML multi-label watermark
CN110727961B (en) Digital watermark anti-counterfeiting method based on digital signature technology
Macneil et al. Creating and maintaining trustworthy records in electronic systems: archival diplomatic methods

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160302

Termination date: 20170822