CN104517045A - Method for creating protected digital file - Google Patents
Method for creating protected digital file Download PDFInfo
- Publication number
- CN104517045A CN104517045A CN201310447489.2A CN201310447489A CN104517045A CN 104517045 A CN104517045 A CN 104517045A CN 201310447489 A CN201310447489 A CN 201310447489A CN 104517045 A CN104517045 A CN 104517045A
- Authority
- CN
- China
- Prior art keywords
- watermark
- digital document
- image file
- customized label
- view data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000006835 compression Effects 0.000 claims description 17
- 238000007906 compression Methods 0.000 claims description 17
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 11
- 230000006837 decompression Effects 0.000 claims description 7
- 238000012795 verification Methods 0.000 claims description 4
- 230000008859 change Effects 0.000 claims description 2
- 239000000463 material Substances 0.000 description 12
- 230000008569 process Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 238000006243 chemical reaction Methods 0.000 description 9
- 230000009471 action Effects 0.000 description 4
- 239000000203 mixture Substances 0.000 description 4
- 238000001514 detection method Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- RZVAJINKPMORJF-UHFFFAOYSA-N Acetaminophen Chemical compound CC(=O)NC1=CC=C(O)C=C1 RZVAJINKPMORJF-UHFFFAOYSA-N 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 239000007799 cork Substances 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 210000000697 sensory organ Anatomy 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1063—Personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Abstract
The invention provides a method for creating a protected digital file. The method comprises the step of: analyzing the digital file; converting the digital file from the original format into a tagged image file format (TIFF); defining a first custom tag in a first image file directory (IFD) of a TIFF file; storing the digital file with the original format in the first custom tag; and embedding a watermark image data into the TIFF file.
Description
Technical field
The present invention relates to document process, particularly relate to digital document guard method and system.
Background technology
Along with the arrival of digital Age, document content is changed to digital form by paper-based form gradually, and the digital document information content and medium have nothing to do, and copy very simple, and the bandwidth that content delivery needs is lower.These features make the storage of digital document, copy and become very convenient with propagation, but cause thus distort and reuse for sensitive information in document content is unwarranted the problem also becoming document publisher and be day by day concerned about.
Current, for electronic documents such as conventional Word, Excel, PowerPoint, MS Office office software provides the Information Rights Management method to associated documents, also these documents can be exported as PDF file distribution.These methods can help prevent document sensitive information due to accident or carelessness be diffused into mistake personnel's hand in.But these methods can only carry out conservation treatment for MS Office document format, there is the limitation of document process form.And generally do not comprise the original document of protected document in the digital document of conservation treatment, this is for needing the user controlling whole document rights of using, comparatively inconvenience on the contrary.
Therefore, this area needs a kind of protection scheme that is general, digital document flexibly badly.
Summary of the invention
Below provide the brief overview of one or more aspect to provide the basic comprehension to these aspects.Detailed the combining of this not all aspect contemplated of general introduction is look at, and both not intended to be pointed out out the scope of key or decisive any or all aspect of elements nor delineate of all aspects.Its unique object is the sequence that some concepts that will provide one or more aspect in simplified form think the more detailed description provided after a while.
According to an aspect of the present invention, a kind of method for creating shielded digital document being provided, comprising: this digital document is resolved; This digital document is changed into tiff image file from unprocessed form; The first customized label is defined in the first image file directory IFD of this tiff image file; Unprocessed form digital document is kept in this first customized label; And in the view data of this tiff image file embed watermark.
In one example, the unprocessed form of this digital document is the one in Word, Excel, PowerPoint, html web page, text file format.
In one example, this digital document is stored in this first customized label to comprise: perform compression to this unprocessed form digital document; Unprocessed form digital document after compression is encrypted; And the unprocessed form digital document after encryption is stored in this first customized label.
In one example, the method also comprises: define the second customized label in the IFD in this tiff image file; And the classified information of this digital document is kept in this second customized label.
In one example, in this view data of this tiff image file, embed this watermark to comprise: perform encryption and disorder processing to this watermark; Dct transform is performed to this view data; In the frequency domain of this view data, the watermark through encryption and scramble is embedded according to watermark embedment strategy; And idct transform is performed to this view data after embed watermark.
According to a further aspect in the invention, provide a kind of method for browsing shielded digital document, this digital document is included in tiff image file, and the method comprises: from the view data of this tiff image file, recover watermark; Verify the watermark recovered; If be proved to be successful, then play the image of this tiff image file; And if authentication failed, then from the first customized label the first image file directory IFD of this tiff image file, read unprocessed form digital document.
In one example, from the first customized label of this tiff image file, extract this unprocessed form digital document to comprise: be decrypted this unprocessed form digital document; And decompression is performed to obtain original digital document to the unprocessed form digital document after deciphering.
In one example, from this view data of this tiff image file, recover this watermark to comprise: perform dct transform to this view data; From the frequency domain of this view data, this watermark is extracted according to watermark extracting strategy; And to extracted watermark perform deciphering and anti-disorder processing to recover watermark.
In one example, verify that the watermark recovered comprises: recovered watermark and original watermark are compared; If both are consistent, be then proved to be successful, otherwise authentication failed.
In one example, the method also comprises: the classified information reading this digital document from the second customized label an IFD of this tiff image file.
According to another aspect of the invention, providing a kind of service end for creating shielded digital document, comprising: document resolver, in order to resolve this digital document; Format converter, in order to change into tiff image file by this digital document from unprocessed form; Customized label write device, in order to define the first customized label in the first image file directory IFD of this tiff image file, and is kept at this digital document in this first customized label; And water mark embedding device, in order to embed watermark in the view data of this tiff image file.
In one example, the unprocessed form of this digital document is the one in Word, Excel, PowerPoint, html web page, text file format.
In one example, this service end also comprises compression and encryption equipment, in order to this digital document perform compression and to compression after digital document be encrypted, wherein this customized label write device this digital document is kept at this first customized label comprise by encryption after digital document be stored in this first customized label.
In one example, customized label write device also defines the second customized label in an IFD of this tiff image file, and the classified information of this digital document is kept in this second customized label.
In one example, this water mark embedding device embed watermark comprises: perform encryption and disorder processing to this watermark; Dct transform is performed to this view data; In the frequency domain of this view data, the watermark through encryption and scramble is embedded according to watermark embedment strategy; And idct transform is performed to this view data after embed watermark.
In accordance with a further aspect of the present invention, provide a kind of client for browsing shielded digital document, this digital document is included in tiff image file, this client comprises: watermark detector, in order to recover watermark in the view data from this tiff image file, and verify the watermark recovered; And image viewer, in order to play the image of this tiff image file when watermark verification is successful; And customized label reader, in order to read unprocessed form digital document from the first customized label in the first image file directory IFD of this tiff image file.
In one example, this client also comprises decompression and decipher, in order to be decrypted this unprocessed form digital document, and performs decompression to obtain original digital document to the unprocessed form digital document after deciphering.
In one example, this watermark detector recovery watermark comprises: perform dct transform to this view data; From the frequency domain of this view data, this watermark is extracted according to watermark extracting strategy; And to extracted watermark perform deciphering and anti-disorder processing to recover watermark.
In one example, this watermark detector verifies that the watermark recovered comprises: recovered watermark and original watermark are compared; If both are consistent, be then proved to be successful, otherwise authentication failed.
In one example, this customized label reader also reads the classified information of this digital document from the second customized label an IFD of this tiff image file.
Accompanying drawing explanation
After the detailed description of reading embodiment of the present disclosure in conjunction with the following drawings, above-mentioned feature and advantage of the present invention can be understood better.In the accompanying drawings, each assembly is not necessarily drawn in proportion, and the assembly with similar correlation properties or feature may have identical or close Reference numeral.
Fig. 1 shows the schematic diagram of the file structure of tiff format image file;
Fig. 2 shows the schematic diagram of digital watermarking system according to an aspect of the present invention.
Fig. 3 shows the process flow diagram of the method performed by the service end of file protection system according to an aspect of the present invention.
Fig. 4 shows the process flow diagram of the method performed by the client of file protection system according to an aspect of the present invention.
Fig. 5 shows the service end of file protection system according to an aspect of the present invention and the block diagram of client.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.Note, the aspects described below in conjunction with the drawings and specific embodiments is only exemplary, and should not be understood to carry out any restriction to protection scope of the present invention.
TIFF(Tagged Image File (TIF) Format) be based on mark file layout, be widely used in the storage to the higher image of image quality requirements and conversion.GIFf image file layout designs in order to memory scanning instrument image the earliest, can process black and white, gray scale and coloured image, the same with BMP form when storing true color image, directly stores the trichromatic color value of RGB and does not use palette.Due to its flexible structure and pardon large, it has become a kind of standard of image file format, and most picture system all supports this form.First the image file of tiff format is conveniently check, supports that " photo viewer " that windows operating system carries checks picture material.The maximum color depth of the image file of tiff format is 32, can show very fine and smooth image color.The image file of tiff format also has two important feature, and one is support multi-page pictures, and two are maximum features of tiff image form is favorable expandability, and file structure is supported the self-defined of label field and read.Just based on these two features of tiff image form, the present invention proposes a kind of protection scheme that is general, digital document flexibly.
Fig. 1 shows the schematic diagram of the file structure of tiff format image file.GIFf format image file generally comprises three key elements, i.e. image file head (IFH), image file directory (IFD) and directory entry (DE) and view data, as shown in the figure.Each tiff image file starts with the IFH of 8 bytes, and IFH is first data structure in tiff file, is in the top of image file architecture.This structure is only in a tiff file, has fixing position.IFH contains the correct necessary information needed for other parts explaining tiff file, and such as IFH has the pointer of sensing first IFD, as shown in the figure.IFD contains the various information of image, also comprises the pointer that is pointed to actual image data simultaneously.As shown in the figure, each IFD comprises multiple DE, and the corresponding label of each DE, these DE identify each attribute such as size, resolution, color depth of tiff image.Similarly, each DE can have a pointer (such as, side-play amount) to point to associated data field starting position hereof, and provides data type and length, as shown in the figure.This file structure allows data field to be positioned at file Anywhere, and can be random length, and therefore file layout is very flexible.Except tiff image filespec definition standard label attribute except, also can as required customized label for identifying special image attributes.Because an IFD only identifies all tag attributes of an image, in a tiff file, multiple image can be had, so, there are several pages of images in a tiff file, will to there being several IFD.
In view of the These characteristics of tiff format image file, according to an aspect of the present invention, every one page of electronic document files can be recorded as a width tiff image, correspond to an IFD.Content due to electronic document is converted into image display, thus effectively prevent can the copying and reusing of Edit Document content.In addition, can at an an IFD(such as IFD) in definition the first customized label, and original electronic document compressed and encrypt, being then stored in this first customized label.Thus, the user that has permission exist to source document consult or edit need time, can source document be extracted.According to a further aspect in the invention, the second customized label can also be defined in this IFD, and the classified information about this electronic document content is kept in this second customized label.As everyone knows, for the retrieval of picture material and abnormal classification difficulty, therefore this electronic document is after converting tiff image file to, becomes feasible hardly for the direct retrieval of the document and classification.In the present invention, by being kept in customized label by the classified information of document, user can read the classified information stored in this customized label when search file, thus the retrieval realized like a cork document and classification.
Digital watermarking adds some numerical information in the digital media information (as image, sound, video etc.), to protect the copyright of Digital Media, proves the true and reliable property of product, follows the tracks of piracy or provide the additional information of product.Watermark information is embedded in bearer documents, does not affect sense organ and the integrality of source document.According to digital watermarking to the resistivity of attacking, digital watermarking can be divided into: multipurpose watermarking, fragility watermark, half fragility watermark.Multipurpose watermarking is mainly used in the intellectual property protection of digital picture, prevents from illegally obtaining image file, has stronger robustness to amendment; Fragility watermark is then mainly used in integrality and the Trusting eBusiness of picture material, has stronger susceptibility to amendment; Half fragility watermark then can distinguish accidentally amendment and malice is distorted, and only distorts comparatively responsive to malice.
According to a further aspect in the invention, can in the view data of the tiff image file be converted to embed watermark, such as fragility watermark.Thus, if the image in tiff image file is modified, by detecting the fragility watermark embedded wherein, can verify the integrality of picture material and credibility.When detecting that the image in tiff image file is tampered, the original document file that the user having a due authority can obtain protected document carries out consulting and editing and processing.
Fig. 2 shows the schematic diagram of digital watermarking system according to an aspect of the present invention.As shown in Figure 2, watermaking system comprises water mark embedding device 210 and watermark detector 220.In one embodiment, water mark embedding device 210 can be included in the service end for creating shielded electronic document, and watermark detector 220 can be included in the client for browsing shielded electronic document.Water mark embedding device 210 can comprise pretreatment module 212.Pretreatment module 212 can adopt Arnold disorder processing and Logistic chaos encryption Processing Algorithm, is encrypted and disorder processing watermarking images to be embedded, to strengthen the security of watermarking images.Watermark through encryption and scramble is imported into merge module 214.Merge module 214 also receives host image, such as the view data of tiff image file, and can carry out dct transform process to view data, with by view data from spatial transform to frequency domain.Subsequently, merge module 214 can embed through encryption and the watermark of scramble according to watermark embedment strategy in the frequency domain of view data, and performs idct transform to the view data after embed watermark, obtains the image containing watermark thus.
Image containing watermark may be subject to various attack, distorting of such as image.Therefore, take over party user can by verifying the integrality of picture material and feasibility the detection of watermark.Extraction module 224 in watermark detector 220 can first to view data perform dct transform, with by view data from spatial transform to frequency domain, then can extract watermark according to watermark extracting strategy from the frequency domain of view data.The watermark extracted can be imported into anti-pretreatment module 222, and this anti-pretreatment module 222 can adopt the anti-disorder processing of Arnold and Logistic back mixing ignorant encryption algorithm to be decrypted and anti-disorder processing the watermark signal extracted, to recover watermark.Although do not illustrate in the drawings, watermark detector 220 also can comprise the module watermark recovered and original watermark compared, to verify the watermark recovered.If both are consistent, be then proved to be successful, represent that view data is not tampered, otherwise authentication failed, view data may be tampered.
Fig. 3 shows the process flow diagram of the method performed by the service end of file protection system according to an aspect of the present invention.In step 302, digital document is resolved.Pending file is supplied to the service end of file protection system as input, and service end according to the file type of the suffix name discriminating digit document of input file, and calls corresponding analyzing component document data, is the ready work of follow-up format conversion.The document files of multiple format can be converted into multipage tiff image file according to file protection system of the present invention, mainly comprise digital document of common Word, Excel, PowerPoint and html web page and text formatting etc.Process for newly-increased document format can add corresponding processing components, possesses good extendability to make file protection system in accessible document format.
In step 304, this digital document is changed into tiff image file from unprocessed form.Thus, the editable sensitive information of original figure document is shown as the picture material on each page image of tiff image file.Relative to the document format before conversion, because image file is not easy to edit sensitive information, directly distorting and reusing sensitive information in document can be stoped.In some instances, format conversion also can comprise and first the data after resolving being shown according to set form, and the displaying contents of each page corresponds to one page image in tiff image file.Thus, user can adjust the page display content of document by format setting, thus such as, when user browses shown document, one page image converted to by current page display content in tiff image file by grabbing screen current page, also becomes the multi-page pictures in tiff image file by being carried out by document file page batch to grab screen by the Content Transformation of whole document.In this way, every page of image of the tiff image file after conversion may correspond to the respective page displaying contents in the document shown according to set form.Format conversion of the present invention includes but not limited to above-mentioned format conversion mode, and those skilled in the art can understand, and any known document format conversion regime can be adopted to convert the document data after parsing to tiff image file layout.
In step 306, definition and write customized label in the tiff image file obtained.In one embodiment, the first customized label can be defined in the specific IFD of this tiff image file, and this digital document of unprocessed form can be kept in this first customized label.Particularly, a tag number can be defined such as be 42222 and storage class is the customized label of byte array in an IFD of tiff image file.For the ease of the original copy of back-up storage document files safely and effectively, more preferably, also can before storage unprocessed form digital document, the size reducing storage backup file in tiff image customized label is compressed to digital document, such as, the efficient lossless compression algorithm that LZW encodes and Huffman encoding combines can be adopted to compress document files.Subsequently, the document after compression can be encrypted, such as, adopt 3DES symmetric encipherment algorithm to be encrypted to the document after compression.Finally, the digital document of the unprocessed form after encryption is kept in above-mentioned customized label.In another embodiment, the second customized label can also be defined in the specific IFD of this tiff image file, and the classified information of this digital document can be kept in this second customized label.Particularly, a tag number can be defined such as be 42220 and storage class is the customized label of text in an IFD of tiff image file, this classified information is kept in this customized label.
In step 308, embed watermark in the view data of this tiff image file.Such as, this watermark can be fragility watermark.The amendment of fragility watermark to picture material has stronger susceptibility, may be used for the integrality of picture material and credible checking.Particularly, first encryption and disorder processing can be performed to watermark, again dct transform is performed to be transformed to frequency domain to this view data, then in the frequency domain of view data, embed the watermark through encryption and scramble according to watermark embedment strategy, finally again idct transform is performed to be switched back to spatial domain to the view data that embedded in watermark.
Thus, create shielded digital document, in this shielded digital document; the sensitive information of original document file is that user is visible with picture material; while the content that effectively diffuses information, because picture material is not easy to editor, prevent directly distorting and reusing sensitive information.In addition, when view data is tampered, can find distorting of view data by the detection of watermark, the user had permission still can by obtaining original document file to the reading of customized label in tiff image file.
Fig. 4 shows the process flow diagram of the method performed by the client of file protection system according to an aspect of the present invention.In step 402, from the view data of tiff image file, recover watermark.Particularly, can first to this view data perform dct transform with by it from spatial transform to frequency domain, then from the frequency domain of this view data, extract watermark according to watermark extracting strategy, then to extracted watermark perform deciphering and anti-disorder processing to recover watermark.In step 404, can recover watermark be verified.Particularly, recovered watermark and original watermark can be compared, if both are consistent, then be proved to be successful, otherwise authentication failed.
If be proved to be successful, then method advances to step 406, wherein can play the image of this tiff image file.As mentioned above, fragility watermark has stronger susceptibility for distorting, therefore, when fragility watermark is not destroyed, can think that the picture material in tiff image file is genuine and believable, the image thus can playing this tiff image file is browsed for user.If authentication failed, then method marches to step 408.The authentication failed of fragility watermark shows that picture material is tampered, and the present image of tiff image file is insincere thus.In one example, the prompting that image may be tampered can also be provided.Therefore, the user had permission can read original figure document from the customized label the specific IFD of tiff image file.Particularly, unprocessed form digital document can be read from the first customized label the first image file directory IFD of this tiff image file.It can be such as the unprocessed form digital document reading byte array type in the customized label of 42222 from the tag number an IFD.The judgement of authority can provide password to realize by requiring user.More preferably, this unprocessed form digital document is compressed and is encrypted.In this case, can the unprocessed form digital document extracted be decrypted, then decompression is performed to obtain original digital document to the document after deciphering.In another embodiment, the classified information of this digital document can also be read from the second customized label the first image file directory IFD of this tiff image file.Because original document is after converting tiff image file to, user is comparatively inconvenient to the retrieval of tiff image content, and the user therefore had permission realizes the retrieval of document content by the classified information extracted in customized label.
Fig. 5 shows the service end of file protection system according to an aspect of the present invention and the block diagram of client.As shown in the figure, file protection system 500 comprises service end 510 and client 520.Service end 510 can perform the flow process described in Fig. 3, and client 520 can perform the flow process described in Fig. 4.Service end 510 can comprise document resolver 511, for the parsing of combine digital document.The document resolver 511 can adopt modularity to design, to expand the file layout needing to support easily.Format converter 512 can convert the document data after parsing to tiff image file layout.In some instances, data after parsing can also show according to set form by format converter 512, then one page image converted to by current page display content in tiff image file by grabbing screen current page, also becomes the multi-page pictures in tiff image file by being carried out by document file page batch to grab screen by the Content Transformation of whole document.Format converter 512 can adopt any known document format conversion regime to convert the document data after parsing to tiff image file layout.Customized label write device 514 can define and write customized label in tiff image file.Such as, customized label write device 514 can define a tag number and such as be 42222 and storage class is the customized label of byte array in an IFD of tiff image file, is written in this customized label by the digital document of unprocessed form subsequently.Server 510 also can comprise compression and encryption equipment 513, compression and encryption is performed for unprocessed form digital document, the efficient lossless compression algorithm that LZW encodes and Huffman encoding combines such as can be adopted to compress document files, and adopt 3DES symmetric encipherment algorithm to be encrypted to the document after compression.In this case, customized label write device can write unprocessed form digital document that is compressed and encryption in above-mentioned customized label.Service end 510 also can comprise water mark embedding device 515.Water mark embedding device 515 can embed watermark, the such as watermark of embedding fragility in the view data of tiff image file.Particularly, first water mark embedding device 515 can perform encryption and disorder processing to watermark, again dct transform is performed to be transformed to frequency domain to this view data, then in the frequency domain of view data, embed the watermark through encryption and scramble according to watermark embedment strategy, finally again idct transform is performed to be switched back to spatial domain to the view data that embedded in watermark.Above, composition graphs 2 has been described in detail the concrete composition of water mark embedding device 515.
Client 520 can comprise watermark detector 521, for recovering watermark in the view data from tiff image file and verifying it.Particularly, watermark detector 521 can first to this view data perform dct transform with by it from spatial transform to frequency domain, then from the frequency domain of this view data, extract watermark according to watermark extracting strategy, then to extracted watermark perform deciphering and anti-disorder processing to recover watermark.Recovered watermark and original watermark also can compare by watermark detector 521, if both are consistent, are then proved to be successful, otherwise authentication failed.Above, composition graphs 2 has been described in detail the concrete composition of watermark detector 521.
Client 520 also can comprise image viewer 522 to play the image of tiff image file.Such as, image viewer 522 can play the image of tiff image file in the successful situation of watermark verification.User is by browsing tiff image to consult the content of digital document, and this image viewer 522 supports that the played in order of tiff image sequence and Stochastic choice are play, and supports the Scalable to image views and mobile operation.Client also can comprise customized label reader 523 for reading customized label.Such as, when user inputs password by Authority Verification, customized label reader 523 can read unprocessed form digital document from the first customized label an IFD of tiff image file.This unprocessed form digital document may be compressed and be encrypted, and decompression and decipher 524 can be decrypted this unprocessed form digital document and decompress, to obtain original document files.Customized label reader 523 also can read the classified information of this digital document from the second customized label an IFD of tiff image file, so that retrieve document content.
Said method illustrated although simplify for making explanation and is described as a series of actions, it should be understood that and understand, these methods not limit by the order of action, because according to one or more embodiment, some actions can occur by different order and/or with from illustrating herein and describe or not shown and to describe but other actions that it will be appreciated by those skilled in the art that occur concomitantly herein.
Thering is provided previous description of the present disclosure is for making any person skilled in the art all can make or use the disclosure.To be all apparent for a person skilled in the art to various amendment of the present disclosure, and generic principles as defined herein can be applied to other variants and can not depart from spirit or scope of the present disclosure.Thus, the disclosure not intended to be is defined to example described herein and design, but the widest scope consistent with principle disclosed herein and novel features should be awarded.
Claims (20)
1., for creating a method for shielded digital document, comprising:
Described digital document is resolved;
Described digital document is changed into tiff image file from unprocessed form;
The first customized label is defined in the first image file directory IFD of described tiff image file;
Unprocessed form digital document is kept in described first customized label; And
Embed watermark in the view data of described tiff image file.
2. the method for claim 1, is characterized in that, the unprocessed form of described digital document is the one in Word, Excel, PowerPoint, html web page, text file format.
3. the method for claim 1, is characterized in that, described digital document is stored in described first customized label and comprises:
Compression is performed to described unprocessed form digital document;
Unprocessed form digital document after compression is encrypted; And
Unprocessed form digital document after encryption is stored in described first customized label.
4. the method for claim 1, is characterized in that, also comprises:
The second customized label is defined in a described IFD in described tiff image file; And
The classified information of described digital document is kept in described second customized label.
5. the method for claim 1, is characterized in that, embeds described watermark and comprise in the described view data of described tiff image file:
Encryption and disorder processing are performed to described watermark;
Dct transform is performed to described view data;
In the frequency domain of described view data, the watermark through encryption and scramble is embedded according to watermark embedment strategy; And
Idct transform is performed to the described view data after embed watermark.
6., for browsing a method for shielded digital document, described digital document is included in tiff image file, and described method comprises:
Watermark is recovered from the view data of described tiff image file;
Verify the watermark recovered;
If be proved to be successful, then play the image of described tiff image file; And
If authentication failed, then from the first customized label the first image file directory IFD of described tiff image file, read unprocessed form digital document.
7. method as claimed in claim 6, is characterized in that, extract described unprocessed form digital document and comprise from the first customized label of described tiff image file:
Described unprocessed form digital document is decrypted; And
Unprocessed form digital document after deciphering is performed and decompresses to obtain original digital document.
8. method as claimed in claim 6, is characterized in that, recover described watermark and comprise from the described view data of described tiff image file:
Dct transform is performed to described view data;
From the frequency domain of described view data, described watermark is extracted according to watermark extracting strategy; And
To extracted watermark perform deciphering and anti-disorder processing to recover watermark.
9. method as claimed in claim 8, is characterized in that, verifies that the watermark recovered comprises:
Recovered watermark and original watermark are compared;
If both are consistent, be then proved to be successful, otherwise authentication failed.
10. method as claimed in claim 6, is characterized in that, also comprise:
The classified information of described digital document is read from the second customized label a described IFD of described tiff image file.
11. 1 kinds, for creating the service end of shielded digital document, comprising:
Document resolver, in order to resolve described digital document;
Format converter, in order to change into tiff image file by described digital document from unprocessed form;
Customized label write device, in order to define the first customized label in the first image file directory IFD of described tiff image file, and is kept at described digital document in described first customized label; And
Water mark embedding device, in order to embed watermark in the view data of described tiff image file.
12. service ends as claimed in claim 11, it is characterized in that, the unprocessed form of described digital document is the one in Word, Excel, PowerPoint, html web page, text file format.
13. service ends as claimed in claim 11, it is characterized in that, also comprise compression and encryption equipment, in order to perform compression to described digital document and to be encrypted the digital document after compression, described digital document is kept at described first customized label and comprises by wherein said customized label write device:
Digital document after encryption is stored in described first customized label.
14. service ends as claimed in claim 11, it is characterized in that, customized label write device also defines the second customized label in a described IFD of described tiff image file, and the classified information of described digital document is kept in described second customized label.
15. service ends as claimed in claim 11, it is characterized in that, described water mark embedding device embed watermark comprises:
Encryption and disorder processing are performed to described watermark;
Dct transform is performed to described view data;
In the frequency domain of described view data, the watermark through encryption and scramble is embedded according to watermark embedment strategy; And
Idct transform is performed to the described view data after embed watermark.
16. 1 kinds for browsing the client of shielded digital document, described digital document is included in tiff image file, and described client comprises:
Watermark detector, in order to recover watermark in the view data from described tiff image file, and verifies the watermark recovered; And
Image viewer, in order to play the image of described tiff image file when watermark verification is successful; And
Customized label reader, in order to read unprocessed form digital document from the first customized label in the first image file directory IFD of described tiff image file.
17. clients as claimed in claim 16, is characterized in that, also comprise decompression and decipher, in order to be decrypted described unprocessed form digital document, and perform decompression to obtain original digital document to the unprocessed form digital document after deciphering.
18. clients as claimed in claim 16, is characterized in that, described watermark detector recovers watermark and comprises:
Dct transform is performed to described view data;
From the frequency domain of described view data, described watermark is extracted according to watermark extracting strategy; And
To extracted watermark perform deciphering and anti-disorder processing to recover watermark.
19. clients as claimed in claim 18, is characterized in that, described watermark detector verifies that the watermark recovered comprises:
Recovered watermark and original watermark are compared;
If both are consistent, be then proved to be successful, otherwise authentication failed.
20. clients as claimed in claim 16, is characterized in that, described customized label reader also reads the classified information of described digital document from the second customized label a described IFD of described tiff image file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310447489.2A CN104517045B (en) | 2013-09-26 | 2013-09-26 | Digital document guard method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310447489.2A CN104517045B (en) | 2013-09-26 | 2013-09-26 | Digital document guard method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104517045A true CN104517045A (en) | 2015-04-15 |
CN104517045B CN104517045B (en) | 2017-10-03 |
Family
ID=52792334
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310447489.2A Active CN104517045B (en) | 2013-09-26 | 2013-09-26 | Digital document guard method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104517045B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105740657A (en) * | 2016-01-26 | 2016-07-06 | 唐山新质点科技有限公司 | On-line browsing method and device of file |
CN106506518A (en) * | 2016-11-25 | 2017-03-15 | 天津津航计算技术研究所 | The encryption/decryption module of big data safe transmission |
CN106529597A (en) * | 2016-11-11 | 2017-03-22 | 理光图像技术(上海)有限公司 | Scanning image file generation device |
CN109635525A (en) * | 2018-12-11 | 2019-04-16 | 上海智臻智能网络科技股份有限公司 | Adding method, device, equipment and the storage medium of watermark |
CN110750961A (en) * | 2019-09-12 | 2020-02-04 | 北京真视通科技股份有限公司 | File format conversion method and device, computer equipment and storage medium |
CN112258376A (en) * | 2020-10-20 | 2021-01-22 | 中国农业银行股份有限公司 | Encrypted document processing method and system |
CN114168079A (en) * | 2021-12-09 | 2022-03-11 | 深圳软牛科技有限公司 | Method, device and related assembly for identifying tiff type data deleted from disk |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1752920A (en) * | 2004-09-21 | 2006-03-29 | 三星电子株式会社 | Image processing system and method |
CN101625684A (en) * | 2008-07-07 | 2010-01-13 | 全国组织机构代码管理中心 | Method and system for acquiring and compressing paper document image-text information |
CN102222195A (en) * | 2011-07-29 | 2011-10-19 | 飞天诚信科技股份有限公司 | E-book reading method and system |
CN102479349A (en) * | 2010-11-23 | 2012-05-30 | 金蝶软件(中国)有限公司 | Method and device for sending receipt files in ERP system and ERP (Enterprise Resource Planning) system |
CN102844749A (en) * | 2010-05-08 | 2012-12-26 | 惠普发展公司,有限责任合伙企业 | Executing transcription requests on files |
-
2013
- 2013-09-26 CN CN201310447489.2A patent/CN104517045B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1752920A (en) * | 2004-09-21 | 2006-03-29 | 三星电子株式会社 | Image processing system and method |
CN101625684A (en) * | 2008-07-07 | 2010-01-13 | 全国组织机构代码管理中心 | Method and system for acquiring and compressing paper document image-text information |
CN102844749A (en) * | 2010-05-08 | 2012-12-26 | 惠普发展公司,有限责任合伙企业 | Executing transcription requests on files |
CN102479349A (en) * | 2010-11-23 | 2012-05-30 | 金蝶软件(中国)有限公司 | Method and device for sending receipt files in ERP system and ERP (Enterprise Resource Planning) system |
CN102222195A (en) * | 2011-07-29 | 2011-10-19 | 飞天诚信科技股份有限公司 | E-book reading method and system |
Non-Patent Citations (3)
Title |
---|
FAIRAGE: "雪莹DocConvert文档转化工具0.6", 《URL:HTTP://DL.PCONLINE.COM.CN/DOWNLOAD/63581.HTML》 * |
徐世刚 等: "基于DCT变换的图像数字水印算法", 《计算机与数字工程》 * |
深谷憂狼: "无法打开图像文件tiff文件", 《URL:HTTPS://ZHIDAO.BAIDU.COM/QUESTION/399567097.HTML》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105740657A (en) * | 2016-01-26 | 2016-07-06 | 唐山新质点科技有限公司 | On-line browsing method and device of file |
CN106529597A (en) * | 2016-11-11 | 2017-03-22 | 理光图像技术(上海)有限公司 | Scanning image file generation device |
CN106506518A (en) * | 2016-11-25 | 2017-03-15 | 天津津航计算技术研究所 | The encryption/decryption module of big data safe transmission |
CN109635525A (en) * | 2018-12-11 | 2019-04-16 | 上海智臻智能网络科技股份有限公司 | Adding method, device, equipment and the storage medium of watermark |
CN110750961A (en) * | 2019-09-12 | 2020-02-04 | 北京真视通科技股份有限公司 | File format conversion method and device, computer equipment and storage medium |
CN112258376A (en) * | 2020-10-20 | 2021-01-22 | 中国农业银行股份有限公司 | Encrypted document processing method and system |
CN112258376B (en) * | 2020-10-20 | 2024-04-12 | 中国农业银行股份有限公司 | Method and system for processing encrypted document |
CN114168079A (en) * | 2021-12-09 | 2022-03-11 | 深圳软牛科技有限公司 | Method, device and related assembly for identifying tiff type data deleted from disk |
CN114168079B (en) * | 2021-12-09 | 2023-08-22 | 深圳软牛科技有限公司 | Method, device and related component for identifying tiff type data deleted from disk |
Also Published As
Publication number | Publication date |
---|---|
CN104517045B (en) | 2017-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shih | Digital watermarking and steganography: fundamentals and techniques | |
CN104517045A (en) | Method for creating protected digital file | |
JP4603079B2 (en) | Method and device for embedding a digital watermark in a text document and for detecting the digital watermark | |
KR100383312B1 (en) | Method and apparatus for imprinting id information into a digital content and for reading out the same | |
KR101491446B1 (en) | Methods for extracting pingerprint of publication, apparatus for extracting pingerprint of publication, system for identifying publication using fingerprint and method for identifying publication using fingerprint | |
Gugelmann et al. | Screen watermarking for data theft investigation and attribution | |
Khadam et al. | Text data security and privacy in the internet of things: threats, challenges, and future directions | |
CN101834726A (en) | Safe encryption method based on bi-dimensional codes | |
KR102108192B1 (en) | Method, Apparatus and System for Inserting Watermark | |
CN111340676A (en) | Image watermark embedding method, image watermark identification method, image watermark embedding device, image watermark identification device and electronic equipment | |
CN101388076A (en) | Method and apparatus for generating two-dimension bar-code | |
KR100792984B1 (en) | Information embedding and extracting method for image authentification | |
KR20080032732A (en) | The forgery of the scanning original document and the system for security management for the check protect and the security management method for the originals maintain | |
CN105989569A (en) | Digital watermark embedding method and apparatus for EPUB document as well as extraction method and apparatus | |
Jaiswal et al. | Implementation of a new technique for web document protection using unicode | |
CN110532740B (en) | Picture encryption method and device, infringement determination method and computer storage medium | |
Iacobici et al. | Digital imaging processing and reconstruction for general applications | |
JP3499294B2 (en) | Document security management method and image processing apparatus | |
Lee et al. | Optimal pixel-level self-repairing authentication method for grayscale images under a minimax criterion of distortion reduction | |
Sharma et al. | Digital Watermarking—An Overview and a Possible Solution | |
Nanjundan et al. | Perspective Chapter: Text Watermark Analysis–Concept, Technique, and Applications | |
KR101572242B1 (en) | Preventing system and method for copying electronic book | |
Zhao et al. | Identity Authentication Protection for" Spatial Watermarking+ QR Code" Paper-cutting Digital Image | |
Tiwari et al. | A novel steganographic methodology for high capacity data hiding in executable files | |
JP3814618B2 (en) | Text processing apparatus and control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 200083 B building, No. 420, Guang Zhong Road, Hongkou District, Shanghai Patentee after: Shanghai middle shift information technology Co., Ltd. Address before: 200083 B building, No. 420, Guang Zhong Road, Hongkou District, Shanghai Patentee before: SHANGHAI ZHONGYI COMMUNICATION TECHNOLOGY ENGINEERING CO., LTD. |
|
CP01 | Change in the name or title of a patent holder |