CN104517045A - Method for creating protected digital file - Google Patents

Method for creating protected digital file Download PDF

Info

Publication number
CN104517045A
CN104517045A CN201310447489.2A CN201310447489A CN104517045A CN 104517045 A CN104517045 A CN 104517045A CN 201310447489 A CN201310447489 A CN 201310447489A CN 104517045 A CN104517045 A CN 104517045A
Authority
CN
China
Prior art keywords
watermark
digital document
image file
customized label
view data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310447489.2A
Other languages
Chinese (zh)
Other versions
CN104517045B (en
Inventor
步彤
杨小林
武勇
刘焱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai middle shift information technology Co., Ltd.
Original Assignee
SHANGHAI ZHONGYI COMMUNICATION TECHNOLOGY ENGINEERING Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI ZHONGYI COMMUNICATION TECHNOLOGY ENGINEERING Co Ltd filed Critical SHANGHAI ZHONGYI COMMUNICATION TECHNOLOGY ENGINEERING Co Ltd
Priority to CN201310447489.2A priority Critical patent/CN104517045B/en
Publication of CN104517045A publication Critical patent/CN104517045A/en
Application granted granted Critical
Publication of CN104517045B publication Critical patent/CN104517045B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Abstract

The invention provides a method for creating a protected digital file. The method comprises the step of: analyzing the digital file; converting the digital file from the original format into a tagged image file format (TIFF); defining a first custom tag in a first image file directory (IFD) of a TIFF file; storing the digital file with the original format in the first custom tag; and embedding a watermark image data into the TIFF file.

Description

Digital document guard method and system
Technical field
The present invention relates to document process, particularly relate to digital document guard method and system.
Background technology
Along with the arrival of digital Age, document content is changed to digital form by paper-based form gradually, and the digital document information content and medium have nothing to do, and copy very simple, and the bandwidth that content delivery needs is lower.These features make the storage of digital document, copy and become very convenient with propagation, but cause thus distort and reuse for sensitive information in document content is unwarranted the problem also becoming document publisher and be day by day concerned about.
Current, for electronic documents such as conventional Word, Excel, PowerPoint, MS Office office software provides the Information Rights Management method to associated documents, also these documents can be exported as PDF file distribution.These methods can help prevent document sensitive information due to accident or carelessness be diffused into mistake personnel's hand in.But these methods can only carry out conservation treatment for MS Office document format, there is the limitation of document process form.And generally do not comprise the original document of protected document in the digital document of conservation treatment, this is for needing the user controlling whole document rights of using, comparatively inconvenience on the contrary.
Therefore, this area needs a kind of protection scheme that is general, digital document flexibly badly.
Summary of the invention
Below provide the brief overview of one or more aspect to provide the basic comprehension to these aspects.Detailed the combining of this not all aspect contemplated of general introduction is look at, and both not intended to be pointed out out the scope of key or decisive any or all aspect of elements nor delineate of all aspects.Its unique object is the sequence that some concepts that will provide one or more aspect in simplified form think the more detailed description provided after a while.
According to an aspect of the present invention, a kind of method for creating shielded digital document being provided, comprising: this digital document is resolved; This digital document is changed into tiff image file from unprocessed form; The first customized label is defined in the first image file directory IFD of this tiff image file; Unprocessed form digital document is kept in this first customized label; And in the view data of this tiff image file embed watermark.
In one example, the unprocessed form of this digital document is the one in Word, Excel, PowerPoint, html web page, text file format.
In one example, this digital document is stored in this first customized label to comprise: perform compression to this unprocessed form digital document; Unprocessed form digital document after compression is encrypted; And the unprocessed form digital document after encryption is stored in this first customized label.
In one example, the method also comprises: define the second customized label in the IFD in this tiff image file; And the classified information of this digital document is kept in this second customized label.
In one example, in this view data of this tiff image file, embed this watermark to comprise: perform encryption and disorder processing to this watermark; Dct transform is performed to this view data; In the frequency domain of this view data, the watermark through encryption and scramble is embedded according to watermark embedment strategy; And idct transform is performed to this view data after embed watermark.
According to a further aspect in the invention, provide a kind of method for browsing shielded digital document, this digital document is included in tiff image file, and the method comprises: from the view data of this tiff image file, recover watermark; Verify the watermark recovered; If be proved to be successful, then play the image of this tiff image file; And if authentication failed, then from the first customized label the first image file directory IFD of this tiff image file, read unprocessed form digital document.
In one example, from the first customized label of this tiff image file, extract this unprocessed form digital document to comprise: be decrypted this unprocessed form digital document; And decompression is performed to obtain original digital document to the unprocessed form digital document after deciphering.
In one example, from this view data of this tiff image file, recover this watermark to comprise: perform dct transform to this view data; From the frequency domain of this view data, this watermark is extracted according to watermark extracting strategy; And to extracted watermark perform deciphering and anti-disorder processing to recover watermark.
In one example, verify that the watermark recovered comprises: recovered watermark and original watermark are compared; If both are consistent, be then proved to be successful, otherwise authentication failed.
In one example, the method also comprises: the classified information reading this digital document from the second customized label an IFD of this tiff image file.
According to another aspect of the invention, providing a kind of service end for creating shielded digital document, comprising: document resolver, in order to resolve this digital document; Format converter, in order to change into tiff image file by this digital document from unprocessed form; Customized label write device, in order to define the first customized label in the first image file directory IFD of this tiff image file, and is kept at this digital document in this first customized label; And water mark embedding device, in order to embed watermark in the view data of this tiff image file.
In one example, the unprocessed form of this digital document is the one in Word, Excel, PowerPoint, html web page, text file format.
In one example, this service end also comprises compression and encryption equipment, in order to this digital document perform compression and to compression after digital document be encrypted, wherein this customized label write device this digital document is kept at this first customized label comprise by encryption after digital document be stored in this first customized label.
In one example, customized label write device also defines the second customized label in an IFD of this tiff image file, and the classified information of this digital document is kept in this second customized label.
In one example, this water mark embedding device embed watermark comprises: perform encryption and disorder processing to this watermark; Dct transform is performed to this view data; In the frequency domain of this view data, the watermark through encryption and scramble is embedded according to watermark embedment strategy; And idct transform is performed to this view data after embed watermark.
In accordance with a further aspect of the present invention, provide a kind of client for browsing shielded digital document, this digital document is included in tiff image file, this client comprises: watermark detector, in order to recover watermark in the view data from this tiff image file, and verify the watermark recovered; And image viewer, in order to play the image of this tiff image file when watermark verification is successful; And customized label reader, in order to read unprocessed form digital document from the first customized label in the first image file directory IFD of this tiff image file.
In one example, this client also comprises decompression and decipher, in order to be decrypted this unprocessed form digital document, and performs decompression to obtain original digital document to the unprocessed form digital document after deciphering.
In one example, this watermark detector recovery watermark comprises: perform dct transform to this view data; From the frequency domain of this view data, this watermark is extracted according to watermark extracting strategy; And to extracted watermark perform deciphering and anti-disorder processing to recover watermark.
In one example, this watermark detector verifies that the watermark recovered comprises: recovered watermark and original watermark are compared; If both are consistent, be then proved to be successful, otherwise authentication failed.
In one example, this customized label reader also reads the classified information of this digital document from the second customized label an IFD of this tiff image file.
Accompanying drawing explanation
After the detailed description of reading embodiment of the present disclosure in conjunction with the following drawings, above-mentioned feature and advantage of the present invention can be understood better.In the accompanying drawings, each assembly is not necessarily drawn in proportion, and the assembly with similar correlation properties or feature may have identical or close Reference numeral.
Fig. 1 shows the schematic diagram of the file structure of tiff format image file;
Fig. 2 shows the schematic diagram of digital watermarking system according to an aspect of the present invention.
Fig. 3 shows the process flow diagram of the method performed by the service end of file protection system according to an aspect of the present invention.
Fig. 4 shows the process flow diagram of the method performed by the client of file protection system according to an aspect of the present invention.
Fig. 5 shows the service end of file protection system according to an aspect of the present invention and the block diagram of client.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.Note, the aspects described below in conjunction with the drawings and specific embodiments is only exemplary, and should not be understood to carry out any restriction to protection scope of the present invention.
TIFF(Tagged Image File (TIF) Format) be based on mark file layout, be widely used in the storage to the higher image of image quality requirements and conversion.GIFf image file layout designs in order to memory scanning instrument image the earliest, can process black and white, gray scale and coloured image, the same with BMP form when storing true color image, directly stores the trichromatic color value of RGB and does not use palette.Due to its flexible structure and pardon large, it has become a kind of standard of image file format, and most picture system all supports this form.First the image file of tiff format is conveniently check, supports that " photo viewer " that windows operating system carries checks picture material.The maximum color depth of the image file of tiff format is 32, can show very fine and smooth image color.The image file of tiff format also has two important feature, and one is support multi-page pictures, and two are maximum features of tiff image form is favorable expandability, and file structure is supported the self-defined of label field and read.Just based on these two features of tiff image form, the present invention proposes a kind of protection scheme that is general, digital document flexibly.
Fig. 1 shows the schematic diagram of the file structure of tiff format image file.GIFf format image file generally comprises three key elements, i.e. image file head (IFH), image file directory (IFD) and directory entry (DE) and view data, as shown in the figure.Each tiff image file starts with the IFH of 8 bytes, and IFH is first data structure in tiff file, is in the top of image file architecture.This structure is only in a tiff file, has fixing position.IFH contains the correct necessary information needed for other parts explaining tiff file, and such as IFH has the pointer of sensing first IFD, as shown in the figure.IFD contains the various information of image, also comprises the pointer that is pointed to actual image data simultaneously.As shown in the figure, each IFD comprises multiple DE, and the corresponding label of each DE, these DE identify each attribute such as size, resolution, color depth of tiff image.Similarly, each DE can have a pointer (such as, side-play amount) to point to associated data field starting position hereof, and provides data type and length, as shown in the figure.This file structure allows data field to be positioned at file Anywhere, and can be random length, and therefore file layout is very flexible.Except tiff image filespec definition standard label attribute except, also can as required customized label for identifying special image attributes.Because an IFD only identifies all tag attributes of an image, in a tiff file, multiple image can be had, so, there are several pages of images in a tiff file, will to there being several IFD.
In view of the These characteristics of tiff format image file, according to an aspect of the present invention, every one page of electronic document files can be recorded as a width tiff image, correspond to an IFD.Content due to electronic document is converted into image display, thus effectively prevent can the copying and reusing of Edit Document content.In addition, can at an an IFD(such as IFD) in definition the first customized label, and original electronic document compressed and encrypt, being then stored in this first customized label.Thus, the user that has permission exist to source document consult or edit need time, can source document be extracted.According to a further aspect in the invention, the second customized label can also be defined in this IFD, and the classified information about this electronic document content is kept in this second customized label.As everyone knows, for the retrieval of picture material and abnormal classification difficulty, therefore this electronic document is after converting tiff image file to, becomes feasible hardly for the direct retrieval of the document and classification.In the present invention, by being kept in customized label by the classified information of document, user can read the classified information stored in this customized label when search file, thus the retrieval realized like a cork document and classification.
Digital watermarking adds some numerical information in the digital media information (as image, sound, video etc.), to protect the copyright of Digital Media, proves the true and reliable property of product, follows the tracks of piracy or provide the additional information of product.Watermark information is embedded in bearer documents, does not affect sense organ and the integrality of source document.According to digital watermarking to the resistivity of attacking, digital watermarking can be divided into: multipurpose watermarking, fragility watermark, half fragility watermark.Multipurpose watermarking is mainly used in the intellectual property protection of digital picture, prevents from illegally obtaining image file, has stronger robustness to amendment; Fragility watermark is then mainly used in integrality and the Trusting eBusiness of picture material, has stronger susceptibility to amendment; Half fragility watermark then can distinguish accidentally amendment and malice is distorted, and only distorts comparatively responsive to malice.
According to a further aspect in the invention, can in the view data of the tiff image file be converted to embed watermark, such as fragility watermark.Thus, if the image in tiff image file is modified, by detecting the fragility watermark embedded wherein, can verify the integrality of picture material and credibility.When detecting that the image in tiff image file is tampered, the original document file that the user having a due authority can obtain protected document carries out consulting and editing and processing.
Fig. 2 shows the schematic diagram of digital watermarking system according to an aspect of the present invention.As shown in Figure 2, watermaking system comprises water mark embedding device 210 and watermark detector 220.In one embodiment, water mark embedding device 210 can be included in the service end for creating shielded electronic document, and watermark detector 220 can be included in the client for browsing shielded electronic document.Water mark embedding device 210 can comprise pretreatment module 212.Pretreatment module 212 can adopt Arnold disorder processing and Logistic chaos encryption Processing Algorithm, is encrypted and disorder processing watermarking images to be embedded, to strengthen the security of watermarking images.Watermark through encryption and scramble is imported into merge module 214.Merge module 214 also receives host image, such as the view data of tiff image file, and can carry out dct transform process to view data, with by view data from spatial transform to frequency domain.Subsequently, merge module 214 can embed through encryption and the watermark of scramble according to watermark embedment strategy in the frequency domain of view data, and performs idct transform to the view data after embed watermark, obtains the image containing watermark thus.
Image containing watermark may be subject to various attack, distorting of such as image.Therefore, take over party user can by verifying the integrality of picture material and feasibility the detection of watermark.Extraction module 224 in watermark detector 220 can first to view data perform dct transform, with by view data from spatial transform to frequency domain, then can extract watermark according to watermark extracting strategy from the frequency domain of view data.The watermark extracted can be imported into anti-pretreatment module 222, and this anti-pretreatment module 222 can adopt the anti-disorder processing of Arnold and Logistic back mixing ignorant encryption algorithm to be decrypted and anti-disorder processing the watermark signal extracted, to recover watermark.Although do not illustrate in the drawings, watermark detector 220 also can comprise the module watermark recovered and original watermark compared, to verify the watermark recovered.If both are consistent, be then proved to be successful, represent that view data is not tampered, otherwise authentication failed, view data may be tampered.
Fig. 3 shows the process flow diagram of the method performed by the service end of file protection system according to an aspect of the present invention.In step 302, digital document is resolved.Pending file is supplied to the service end of file protection system as input, and service end according to the file type of the suffix name discriminating digit document of input file, and calls corresponding analyzing component document data, is the ready work of follow-up format conversion.The document files of multiple format can be converted into multipage tiff image file according to file protection system of the present invention, mainly comprise digital document of common Word, Excel, PowerPoint and html web page and text formatting etc.Process for newly-increased document format can add corresponding processing components, possesses good extendability to make file protection system in accessible document format.
In step 304, this digital document is changed into tiff image file from unprocessed form.Thus, the editable sensitive information of original figure document is shown as the picture material on each page image of tiff image file.Relative to the document format before conversion, because image file is not easy to edit sensitive information, directly distorting and reusing sensitive information in document can be stoped.In some instances, format conversion also can comprise and first the data after resolving being shown according to set form, and the displaying contents of each page corresponds to one page image in tiff image file.Thus, user can adjust the page display content of document by format setting, thus such as, when user browses shown document, one page image converted to by current page display content in tiff image file by grabbing screen current page, also becomes the multi-page pictures in tiff image file by being carried out by document file page batch to grab screen by the Content Transformation of whole document.In this way, every page of image of the tiff image file after conversion may correspond to the respective page displaying contents in the document shown according to set form.Format conversion of the present invention includes but not limited to above-mentioned format conversion mode, and those skilled in the art can understand, and any known document format conversion regime can be adopted to convert the document data after parsing to tiff image file layout.
In step 306, definition and write customized label in the tiff image file obtained.In one embodiment, the first customized label can be defined in the specific IFD of this tiff image file, and this digital document of unprocessed form can be kept in this first customized label.Particularly, a tag number can be defined such as be 42222 and storage class is the customized label of byte array in an IFD of tiff image file.For the ease of the original copy of back-up storage document files safely and effectively, more preferably, also can before storage unprocessed form digital document, the size reducing storage backup file in tiff image customized label is compressed to digital document, such as, the efficient lossless compression algorithm that LZW encodes and Huffman encoding combines can be adopted to compress document files.Subsequently, the document after compression can be encrypted, such as, adopt 3DES symmetric encipherment algorithm to be encrypted to the document after compression.Finally, the digital document of the unprocessed form after encryption is kept in above-mentioned customized label.In another embodiment, the second customized label can also be defined in the specific IFD of this tiff image file, and the classified information of this digital document can be kept in this second customized label.Particularly, a tag number can be defined such as be 42220 and storage class is the customized label of text in an IFD of tiff image file, this classified information is kept in this customized label.
In step 308, embed watermark in the view data of this tiff image file.Such as, this watermark can be fragility watermark.The amendment of fragility watermark to picture material has stronger susceptibility, may be used for the integrality of picture material and credible checking.Particularly, first encryption and disorder processing can be performed to watermark, again dct transform is performed to be transformed to frequency domain to this view data, then in the frequency domain of view data, embed the watermark through encryption and scramble according to watermark embedment strategy, finally again idct transform is performed to be switched back to spatial domain to the view data that embedded in watermark.
Thus, create shielded digital document, in this shielded digital document; the sensitive information of original document file is that user is visible with picture material; while the content that effectively diffuses information, because picture material is not easy to editor, prevent directly distorting and reusing sensitive information.In addition, when view data is tampered, can find distorting of view data by the detection of watermark, the user had permission still can by obtaining original document file to the reading of customized label in tiff image file.
Fig. 4 shows the process flow diagram of the method performed by the client of file protection system according to an aspect of the present invention.In step 402, from the view data of tiff image file, recover watermark.Particularly, can first to this view data perform dct transform with by it from spatial transform to frequency domain, then from the frequency domain of this view data, extract watermark according to watermark extracting strategy, then to extracted watermark perform deciphering and anti-disorder processing to recover watermark.In step 404, can recover watermark be verified.Particularly, recovered watermark and original watermark can be compared, if both are consistent, then be proved to be successful, otherwise authentication failed.
If be proved to be successful, then method advances to step 406, wherein can play the image of this tiff image file.As mentioned above, fragility watermark has stronger susceptibility for distorting, therefore, when fragility watermark is not destroyed, can think that the picture material in tiff image file is genuine and believable, the image thus can playing this tiff image file is browsed for user.If authentication failed, then method marches to step 408.The authentication failed of fragility watermark shows that picture material is tampered, and the present image of tiff image file is insincere thus.In one example, the prompting that image may be tampered can also be provided.Therefore, the user had permission can read original figure document from the customized label the specific IFD of tiff image file.Particularly, unprocessed form digital document can be read from the first customized label the first image file directory IFD of this tiff image file.It can be such as the unprocessed form digital document reading byte array type in the customized label of 42222 from the tag number an IFD.The judgement of authority can provide password to realize by requiring user.More preferably, this unprocessed form digital document is compressed and is encrypted.In this case, can the unprocessed form digital document extracted be decrypted, then decompression is performed to obtain original digital document to the document after deciphering.In another embodiment, the classified information of this digital document can also be read from the second customized label the first image file directory IFD of this tiff image file.Because original document is after converting tiff image file to, user is comparatively inconvenient to the retrieval of tiff image content, and the user therefore had permission realizes the retrieval of document content by the classified information extracted in customized label.
Fig. 5 shows the service end of file protection system according to an aspect of the present invention and the block diagram of client.As shown in the figure, file protection system 500 comprises service end 510 and client 520.Service end 510 can perform the flow process described in Fig. 3, and client 520 can perform the flow process described in Fig. 4.Service end 510 can comprise document resolver 511, for the parsing of combine digital document.The document resolver 511 can adopt modularity to design, to expand the file layout needing to support easily.Format converter 512 can convert the document data after parsing to tiff image file layout.In some instances, data after parsing can also show according to set form by format converter 512, then one page image converted to by current page display content in tiff image file by grabbing screen current page, also becomes the multi-page pictures in tiff image file by being carried out by document file page batch to grab screen by the Content Transformation of whole document.Format converter 512 can adopt any known document format conversion regime to convert the document data after parsing to tiff image file layout.Customized label write device 514 can define and write customized label in tiff image file.Such as, customized label write device 514 can define a tag number and such as be 42222 and storage class is the customized label of byte array in an IFD of tiff image file, is written in this customized label by the digital document of unprocessed form subsequently.Server 510 also can comprise compression and encryption equipment 513, compression and encryption is performed for unprocessed form digital document, the efficient lossless compression algorithm that LZW encodes and Huffman encoding combines such as can be adopted to compress document files, and adopt 3DES symmetric encipherment algorithm to be encrypted to the document after compression.In this case, customized label write device can write unprocessed form digital document that is compressed and encryption in above-mentioned customized label.Service end 510 also can comprise water mark embedding device 515.Water mark embedding device 515 can embed watermark, the such as watermark of embedding fragility in the view data of tiff image file.Particularly, first water mark embedding device 515 can perform encryption and disorder processing to watermark, again dct transform is performed to be transformed to frequency domain to this view data, then in the frequency domain of view data, embed the watermark through encryption and scramble according to watermark embedment strategy, finally again idct transform is performed to be switched back to spatial domain to the view data that embedded in watermark.Above, composition graphs 2 has been described in detail the concrete composition of water mark embedding device 515.
Client 520 can comprise watermark detector 521, for recovering watermark in the view data from tiff image file and verifying it.Particularly, watermark detector 521 can first to this view data perform dct transform with by it from spatial transform to frequency domain, then from the frequency domain of this view data, extract watermark according to watermark extracting strategy, then to extracted watermark perform deciphering and anti-disorder processing to recover watermark.Recovered watermark and original watermark also can compare by watermark detector 521, if both are consistent, are then proved to be successful, otherwise authentication failed.Above, composition graphs 2 has been described in detail the concrete composition of watermark detector 521.
Client 520 also can comprise image viewer 522 to play the image of tiff image file.Such as, image viewer 522 can play the image of tiff image file in the successful situation of watermark verification.User is by browsing tiff image to consult the content of digital document, and this image viewer 522 supports that the played in order of tiff image sequence and Stochastic choice are play, and supports the Scalable to image views and mobile operation.Client also can comprise customized label reader 523 for reading customized label.Such as, when user inputs password by Authority Verification, customized label reader 523 can read unprocessed form digital document from the first customized label an IFD of tiff image file.This unprocessed form digital document may be compressed and be encrypted, and decompression and decipher 524 can be decrypted this unprocessed form digital document and decompress, to obtain original document files.Customized label reader 523 also can read the classified information of this digital document from the second customized label an IFD of tiff image file, so that retrieve document content.
Said method illustrated although simplify for making explanation and is described as a series of actions, it should be understood that and understand, these methods not limit by the order of action, because according to one or more embodiment, some actions can occur by different order and/or with from illustrating herein and describe or not shown and to describe but other actions that it will be appreciated by those skilled in the art that occur concomitantly herein.
Thering is provided previous description of the present disclosure is for making any person skilled in the art all can make or use the disclosure.To be all apparent for a person skilled in the art to various amendment of the present disclosure, and generic principles as defined herein can be applied to other variants and can not depart from spirit or scope of the present disclosure.Thus, the disclosure not intended to be is defined to example described herein and design, but the widest scope consistent with principle disclosed herein and novel features should be awarded.

Claims (20)

1., for creating a method for shielded digital document, comprising:
Described digital document is resolved;
Described digital document is changed into tiff image file from unprocessed form;
The first customized label is defined in the first image file directory IFD of described tiff image file;
Unprocessed form digital document is kept in described first customized label; And
Embed watermark in the view data of described tiff image file.
2. the method for claim 1, is characterized in that, the unprocessed form of described digital document is the one in Word, Excel, PowerPoint, html web page, text file format.
3. the method for claim 1, is characterized in that, described digital document is stored in described first customized label and comprises:
Compression is performed to described unprocessed form digital document;
Unprocessed form digital document after compression is encrypted; And
Unprocessed form digital document after encryption is stored in described first customized label.
4. the method for claim 1, is characterized in that, also comprises:
The second customized label is defined in a described IFD in described tiff image file; And
The classified information of described digital document is kept in described second customized label.
5. the method for claim 1, is characterized in that, embeds described watermark and comprise in the described view data of described tiff image file:
Encryption and disorder processing are performed to described watermark;
Dct transform is performed to described view data;
In the frequency domain of described view data, the watermark through encryption and scramble is embedded according to watermark embedment strategy; And
Idct transform is performed to the described view data after embed watermark.
6., for browsing a method for shielded digital document, described digital document is included in tiff image file, and described method comprises:
Watermark is recovered from the view data of described tiff image file;
Verify the watermark recovered;
If be proved to be successful, then play the image of described tiff image file; And
If authentication failed, then from the first customized label the first image file directory IFD of described tiff image file, read unprocessed form digital document.
7. method as claimed in claim 6, is characterized in that, extract described unprocessed form digital document and comprise from the first customized label of described tiff image file:
Described unprocessed form digital document is decrypted; And
Unprocessed form digital document after deciphering is performed and decompresses to obtain original digital document.
8. method as claimed in claim 6, is characterized in that, recover described watermark and comprise from the described view data of described tiff image file:
Dct transform is performed to described view data;
From the frequency domain of described view data, described watermark is extracted according to watermark extracting strategy; And
To extracted watermark perform deciphering and anti-disorder processing to recover watermark.
9. method as claimed in claim 8, is characterized in that, verifies that the watermark recovered comprises:
Recovered watermark and original watermark are compared;
If both are consistent, be then proved to be successful, otherwise authentication failed.
10. method as claimed in claim 6, is characterized in that, also comprise:
The classified information of described digital document is read from the second customized label a described IFD of described tiff image file.
11. 1 kinds, for creating the service end of shielded digital document, comprising:
Document resolver, in order to resolve described digital document;
Format converter, in order to change into tiff image file by described digital document from unprocessed form;
Customized label write device, in order to define the first customized label in the first image file directory IFD of described tiff image file, and is kept at described digital document in described first customized label; And
Water mark embedding device, in order to embed watermark in the view data of described tiff image file.
12. service ends as claimed in claim 11, it is characterized in that, the unprocessed form of described digital document is the one in Word, Excel, PowerPoint, html web page, text file format.
13. service ends as claimed in claim 11, it is characterized in that, also comprise compression and encryption equipment, in order to perform compression to described digital document and to be encrypted the digital document after compression, described digital document is kept at described first customized label and comprises by wherein said customized label write device:
Digital document after encryption is stored in described first customized label.
14. service ends as claimed in claim 11, it is characterized in that, customized label write device also defines the second customized label in a described IFD of described tiff image file, and the classified information of described digital document is kept in described second customized label.
15. service ends as claimed in claim 11, it is characterized in that, described water mark embedding device embed watermark comprises:
Encryption and disorder processing are performed to described watermark;
Dct transform is performed to described view data;
In the frequency domain of described view data, the watermark through encryption and scramble is embedded according to watermark embedment strategy; And
Idct transform is performed to the described view data after embed watermark.
16. 1 kinds for browsing the client of shielded digital document, described digital document is included in tiff image file, and described client comprises:
Watermark detector, in order to recover watermark in the view data from described tiff image file, and verifies the watermark recovered; And
Image viewer, in order to play the image of described tiff image file when watermark verification is successful; And
Customized label reader, in order to read unprocessed form digital document from the first customized label in the first image file directory IFD of described tiff image file.
17. clients as claimed in claim 16, is characterized in that, also comprise decompression and decipher, in order to be decrypted described unprocessed form digital document, and perform decompression to obtain original digital document to the unprocessed form digital document after deciphering.
18. clients as claimed in claim 16, is characterized in that, described watermark detector recovers watermark and comprises:
Dct transform is performed to described view data;
From the frequency domain of described view data, described watermark is extracted according to watermark extracting strategy; And
To extracted watermark perform deciphering and anti-disorder processing to recover watermark.
19. clients as claimed in claim 18, is characterized in that, described watermark detector verifies that the watermark recovered comprises:
Recovered watermark and original watermark are compared;
If both are consistent, be then proved to be successful, otherwise authentication failed.
20. clients as claimed in claim 16, is characterized in that, described customized label reader also reads the classified information of described digital document from the second customized label a described IFD of described tiff image file.
CN201310447489.2A 2013-09-26 2013-09-26 Digital document guard method and system Active CN104517045B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310447489.2A CN104517045B (en) 2013-09-26 2013-09-26 Digital document guard method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310447489.2A CN104517045B (en) 2013-09-26 2013-09-26 Digital document guard method and system

Publications (2)

Publication Number Publication Date
CN104517045A true CN104517045A (en) 2015-04-15
CN104517045B CN104517045B (en) 2017-10-03

Family

ID=52792334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310447489.2A Active CN104517045B (en) 2013-09-26 2013-09-26 Digital document guard method and system

Country Status (1)

Country Link
CN (1) CN104517045B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740657A (en) * 2016-01-26 2016-07-06 唐山新质点科技有限公司 On-line browsing method and device of file
CN106506518A (en) * 2016-11-25 2017-03-15 天津津航计算技术研究所 The encryption/decryption module of big data safe transmission
CN106529597A (en) * 2016-11-11 2017-03-22 理光图像技术(上海)有限公司 Scanning image file generation device
CN109635525A (en) * 2018-12-11 2019-04-16 上海智臻智能网络科技股份有限公司 Adding method, device, equipment and the storage medium of watermark
CN110750961A (en) * 2019-09-12 2020-02-04 北京真视通科技股份有限公司 File format conversion method and device, computer equipment and storage medium
CN112258376A (en) * 2020-10-20 2021-01-22 中国农业银行股份有限公司 Encrypted document processing method and system
CN114168079A (en) * 2021-12-09 2022-03-11 深圳软牛科技有限公司 Method, device and related assembly for identifying tiff type data deleted from disk

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1752920A (en) * 2004-09-21 2006-03-29 三星电子株式会社 Image processing system and method
CN101625684A (en) * 2008-07-07 2010-01-13 全国组织机构代码管理中心 Method and system for acquiring and compressing paper document image-text information
CN102222195A (en) * 2011-07-29 2011-10-19 飞天诚信科技股份有限公司 E-book reading method and system
CN102479349A (en) * 2010-11-23 2012-05-30 金蝶软件(中国)有限公司 Method and device for sending receipt files in ERP system and ERP (Enterprise Resource Planning) system
CN102844749A (en) * 2010-05-08 2012-12-26 惠普发展公司,有限责任合伙企业 Executing transcription requests on files

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1752920A (en) * 2004-09-21 2006-03-29 三星电子株式会社 Image processing system and method
CN101625684A (en) * 2008-07-07 2010-01-13 全国组织机构代码管理中心 Method and system for acquiring and compressing paper document image-text information
CN102844749A (en) * 2010-05-08 2012-12-26 惠普发展公司,有限责任合伙企业 Executing transcription requests on files
CN102479349A (en) * 2010-11-23 2012-05-30 金蝶软件(中国)有限公司 Method and device for sending receipt files in ERP system and ERP (Enterprise Resource Planning) system
CN102222195A (en) * 2011-07-29 2011-10-19 飞天诚信科技股份有限公司 E-book reading method and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
FAIRAGE: "雪莹DocConvert文档转化工具0.6", 《URL:HTTP://DL.PCONLINE.COM.CN/DOWNLOAD/63581.HTML》 *
徐世刚 等: "基于DCT变换的图像数字水印算法", 《计算机与数字工程》 *
深谷憂狼: "无法打开图像文件tiff文件", 《URL:HTTPS://ZHIDAO.BAIDU.COM/QUESTION/399567097.HTML》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740657A (en) * 2016-01-26 2016-07-06 唐山新质点科技有限公司 On-line browsing method and device of file
CN106529597A (en) * 2016-11-11 2017-03-22 理光图像技术(上海)有限公司 Scanning image file generation device
CN106506518A (en) * 2016-11-25 2017-03-15 天津津航计算技术研究所 The encryption/decryption module of big data safe transmission
CN109635525A (en) * 2018-12-11 2019-04-16 上海智臻智能网络科技股份有限公司 Adding method, device, equipment and the storage medium of watermark
CN110750961A (en) * 2019-09-12 2020-02-04 北京真视通科技股份有限公司 File format conversion method and device, computer equipment and storage medium
CN112258376A (en) * 2020-10-20 2021-01-22 中国农业银行股份有限公司 Encrypted document processing method and system
CN112258376B (en) * 2020-10-20 2024-04-12 中国农业银行股份有限公司 Method and system for processing encrypted document
CN114168079A (en) * 2021-12-09 2022-03-11 深圳软牛科技有限公司 Method, device and related assembly for identifying tiff type data deleted from disk
CN114168079B (en) * 2021-12-09 2023-08-22 深圳软牛科技有限公司 Method, device and related component for identifying tiff type data deleted from disk

Also Published As

Publication number Publication date
CN104517045B (en) 2017-10-03

Similar Documents

Publication Publication Date Title
Shih Digital watermarking and steganography: fundamentals and techniques
CN104517045A (en) Method for creating protected digital file
JP4603079B2 (en) Method and device for embedding a digital watermark in a text document and for detecting the digital watermark
KR100383312B1 (en) Method and apparatus for imprinting id information into a digital content and for reading out the same
KR101491446B1 (en) Methods for extracting pingerprint of publication, apparatus for extracting pingerprint of publication, system for identifying publication using fingerprint and method for identifying publication using fingerprint
Gugelmann et al. Screen watermarking for data theft investigation and attribution
Khadam et al. Text data security and privacy in the internet of things: threats, challenges, and future directions
CN101834726A (en) Safe encryption method based on bi-dimensional codes
KR102108192B1 (en) Method, Apparatus and System for Inserting Watermark
CN111340676A (en) Image watermark embedding method, image watermark identification method, image watermark embedding device, image watermark identification device and electronic equipment
CN101388076A (en) Method and apparatus for generating two-dimension bar-code
KR100792984B1 (en) Information embedding and extracting method for image authentification
KR20080032732A (en) The forgery of the scanning original document and the system for security management for the check protect and the security management method for the originals maintain
CN105989569A (en) Digital watermark embedding method and apparatus for EPUB document as well as extraction method and apparatus
Jaiswal et al. Implementation of a new technique for web document protection using unicode
CN110532740B (en) Picture encryption method and device, infringement determination method and computer storage medium
Iacobici et al. Digital imaging processing and reconstruction for general applications
JP3499294B2 (en) Document security management method and image processing apparatus
Lee et al. Optimal pixel-level self-repairing authentication method for grayscale images under a minimax criterion of distortion reduction
Sharma et al. Digital Watermarking—An Overview and a Possible Solution
Nanjundan et al. Perspective Chapter: Text Watermark Analysis–Concept, Technique, and Applications
KR101572242B1 (en) Preventing system and method for copying electronic book
Zhao et al. Identity Authentication Protection for" Spatial Watermarking+ QR Code" Paper-cutting Digital Image
Tiwari et al. A novel steganographic methodology for high capacity data hiding in executable files
JP3814618B2 (en) Text processing apparatus and control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 200083 B building, No. 420, Guang Zhong Road, Hongkou District, Shanghai

Patentee after: Shanghai middle shift information technology Co., Ltd.

Address before: 200083 B building, No. 420, Guang Zhong Road, Hongkou District, Shanghai

Patentee before: SHANGHAI ZHONGYI COMMUNICATION TECHNOLOGY ENGINEERING CO., LTD.

CP01 Change in the name or title of a patent holder