CN106446621A - Data transaction safety scheduling method and system - Google Patents
Data transaction safety scheduling method and system Download PDFInfo
- Publication number
- CN106446621A CN106446621A CN201610376563.XA CN201610376563A CN106446621A CN 106446621 A CN106446621 A CN 106446621A CN 201610376563 A CN201610376563 A CN 201610376563A CN 106446621 A CN106446621 A CN 106446621A
- Authority
- CN
- China
- Prior art keywords
- data
- watermark
- module
- trade
- demand
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000013500 data storage Methods 0.000 claims abstract description 5
- 239000000284 extract Substances 0.000 claims description 6
- 230000002688 persistence Effects 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 abstract description 2
- 238000006073 displacement reaction Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012946 outsourcing Methods 0.000 description 1
- 238000013139 quantization Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention provides a data transaction safety scheduling method, which is characterized by comprising the following steps: step one, after receiving a data calling request of a data demand module, informing a data watermarking system; step two, the data watermarking module watermarks after fetching data from the data storage module; and step three, informing a data demand module after the watermark is printed, and extracting the data printed with the watermark by the data demand module. The invention relates to a transaction and data scheduling method based on a data watermarking technology, which solves the problem of copyright protection in the data transaction and transmission process.
Description
Technical field
The present invention relates to data trade field, more particularly, to data trade security fields.
Background technology
With the continuous development of big data industry, increasing database data is carried out storing, is distributed by network, again
Using.These data often contain huge economic worth, are valuable data resources.Distribute data with network data
Being continuously increased of the demands such as outsourcing, how to protect copyrights of data, make the rights and interests of copyrights of data owner obtain protection to be increasingly becoming
Major issue urgently to be resolved hurrily;Transaction based on data watermark technology and data dispatching method are to solve data trade and transmission
During copyright problem effective way.
Content of the invention
Present invention aims to the deficiencies in the prior art, a kind of safe data trade dispatching method is proposed.
The technical scheme is that:A kind of data trade sacurity dispatching method, comprises the following steps:
Step one, after receiving the data call request of demand data module, notifies data watermark system;
Step 2, data watermark module watermark after data memory module fetches data;
Step 3, watermark notifies demand data module after accomplishing fluently, and demand data module extracts the data having accomplished fluently watermark.
Preferably, step 2 also includes, and data watermark module, after data memory module fetches data, carries out data watermark pre-
Process, then watermark again;
Preferably, watermarking images are changed by described data watermark pretreatment by the pretreatment that Arnold displacement and position are decomposed
For mixed and disorderly binary sequence, as actual watermark information to be embedded.
For this purpose it is proposed, the present invention also provides a kind of data trade sacurity dispatching system it is characterised in that including:Data dispatch
Module, data memory module, data watermark module:
Described data dispatch module, for sending data call request to data watermark module, for data trade interface
Feedback data watermark status information;
Described data memory module, for data storage;
Described data watermark module, is used for carrying out data watermark generation, data watermark embeds and data watermark extracts.
Preferably, described data memory module is Data Persistence Layer.
Preferably, described data trade sacurity dispatching system, also includes data check module, for by default verification
Algorithm carries out data check to the data in caching, so that the data in caching is consistent with the data in Data Persistence Layer.
Beneficial effect:
Data trade sacurity dispatching method and system of the present invention, in conjunction with data digital watermark and data trade dispatching party
Method, solves the problems, such as copyrights of data ownership mark during data trade, and can asking according to data trade scheduler module
Ask, carry out watermark on demand, further can feed back watermark status information on demand, be easy to data trade and dynamically manage.
For image class data watermark, increased watermark pretreatment step before watermark, compared with prior art strengthen
The security of watermark, improves the detection performance of watermark.
Brief description
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be attached to use required in embodiment
Figure be briefly described it should be apparent that, drawings in the following description are some embodiments of the present invention, common for this area
For technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart of the data trade sacurity dispatching method of embodiment of the present invention;
Fig. 2 is the schematic diagram of the data trade sacurity dispatching system that the present invention sends out embodiment.
Specific embodiment
Below in conjunction with accompanying drawing, embodiments of the present invention is described in detail.
As shown in figure 1, provide in the embodiment of the present invention the technical scheme is that:A kind of data trade sacurity dispatching
Method, comprises the following steps:
S001, after receiving the data call request of demand data module, notifies data watermark system;
S002, data watermark module watermark after data memory module fetches data;
S003, watermark notifies demand data module after accomplishing fluently, and demand data module extracts the data having accomplished fluently watermark.
Preferably, S002 also includes, and data watermark module, after data memory module fetches data, carries out data watermark and locates in advance
Reason, then watermark again;
Preferably, for image class data, data watermark pretreatment mode is the pretreatment decomposed by Arnold displacement and position
Watermarking images are converted to mixed and disorderly binary sequence, as actual watermark information to be embedded.
Preferably, for image class data, watermark process:Original image is carried out 8X8 piecemeal DTC conversion, selects each
8 DCr intermediate frequency coefficients of sub-block as the embedded location of watermark, and with the PJGE luminance quantization table that combines with visual characteristic Lai
Determine the proportionate relationship of these coefficient embedment strengths.To one suitable region of search of the embedment strength factor, heuristically select
Certain embedment strength value carries out watermark and embeds, and introduces to comment better than the image quality evaluating method of Y-PSNR and mean square deviation
Valency contains the distortion situation of watermarking images.If picture quality is unsatisfactory for the desired close distortion factor, constantly adjust embedded strong
Angle value, thus the position information of watermarking images is embedded in 8 intermediate frequency coefficients of each sub-block with different intensity respectively.
Provide in the embodiment of the present invention as shown in Figure 2 and the technical scheme is that:
A kind of data trade sacurity dispatching system, including:Data dispatch module 201, data memory module 202, data watermark mould
Block 203:
Described data dispatch module 201, for sending data call request to data watermark module 203, for handing over to data
Easily interface 204 feedback data watermark status information;
Described data memory module 202, for data storage;
Described data watermark module 203, is used for carrying out data watermark generation, data watermark embeds and data watermark extracts.
Preferably, described data memory module 202 is Data Persistence Layer.
Preferably, described data trade sacurity dispatching system also includes data check module, for by default verification
Algorithm carries out data check to the data in caching, so that the data in caching is consistent with the data in Data Persistence Layer.
Embodiment of above is merely to illustrate the present invention, and not limitation of the present invention, common about technical field
Technical staff, without departing from the spirit and scope of the present invention, can also make a variety of changes and modification, therefore all
Equivalent technical scheme falls within scope of the invention, and the scope of patent protection of the present invention should be defined by the claims.
Claims (6)
1. a kind of data trade sacurity dispatching method is it is characterised in that described data trade sacurity dispatching method includes following step
Suddenly:
Step one, after receiving the data call request of demand data module, notifies data watermark system;
Step 2, data watermark module watermark after data memory module fetches data;
Step 3, watermark notifies demand data module after accomplishing fluently, and demand data module extracts the data having accomplished fluently watermark.
2., it is characterised in that step 2 also includes, data watermark module is from data storage for method according to claim 1
After module is fetched data, carry out data watermark pretreatment, then watermark again.
3. method according to claim 2, it is characterised in that described data watermark pre-processes, is replaced by Arnold
Watermarking images are converted to mixed and disorderly binary sequence by the pretreatment decomposed with position, as actual watermark information to be embedded.
4. a kind of data trade sacurity dispatching system is it is characterised in that include:Data dispatch module, data memory module, data
Watermark module:
Described data dispatch module, for sending data call request to data watermark module, for data trade interface
Feedback data watermark status information;
Described data memory module, for data storage;
Described data watermark module, is used for carrying out data watermark generation, data watermark embeds and data watermark extracts.
5. system according to claim 4 is it is characterised in that described data memory module is Data Persistence Layer.
6. system according to claim 5, it is characterised in that also including data check module, verifies for passing through to preset
Algorithm carries out data check to the data in caching, so that the data in caching is consistent with the data in Data Persistence Layer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610376563.XA CN106446621A (en) | 2016-05-31 | 2016-05-31 | Data transaction safety scheduling method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610376563.XA CN106446621A (en) | 2016-05-31 | 2016-05-31 | Data transaction safety scheduling method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106446621A true CN106446621A (en) | 2017-02-22 |
Family
ID=58183092
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610376563.XA Pending CN106446621A (en) | 2016-05-31 | 2016-05-31 | Data transaction safety scheduling method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106446621A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110069473A (en) * | 2019-03-27 | 2019-07-30 | 北京中科朗思信息技术有限公司 | The method of database object persistence is realized on domestic discretionary security trusted platform |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1363895A (en) * | 2000-12-07 | 2002-08-14 | 索尼英国有限公司 | Aqueous printing and delivering data |
CN101425163A (en) * | 2007-10-30 | 2009-05-06 | 上海交通大学 | Trading, identifying and arbitraging method, system and equipment based on watermark technology |
CN101452533A (en) * | 2007-12-07 | 2009-06-10 | 佳能株式会社 | Rendering apparatus and rendering method |
-
2016
- 2016-05-31 CN CN201610376563.XA patent/CN106446621A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1363895A (en) * | 2000-12-07 | 2002-08-14 | 索尼英国有限公司 | Aqueous printing and delivering data |
CN101425163A (en) * | 2007-10-30 | 2009-05-06 | 上海交通大学 | Trading, identifying and arbitraging method, system and equipment based on watermark technology |
CN101452533A (en) * | 2007-12-07 | 2009-06-10 | 佳能株式会社 | Rendering apparatus and rendering method |
Non-Patent Citations (2)
Title |
---|
刘芳: "一种基于Arnold变换的二值图像水印算法", 《计算机应用》 * |
吴杰: "基于DCT变换的图像分块数字水印算法", 《电脑知识与技术》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110069473A (en) * | 2019-03-27 | 2019-07-30 | 北京中科朗思信息技术有限公司 | The method of database object persistence is realized on domestic discretionary security trusted platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103942585B (en) | Method for converting information into two-dimensional codes | |
CN102034220B (en) | Digital watermark-based electronic bill image anti-tamper method | |
CN106161991A (en) | A kind of camera video processing method and terminal | |
Huang et al. | Survey of Bio-inspired Computing for Information Hiding. | |
CN116567353B (en) | Video delivery method and device, storage medium and electronic equipment | |
CN105981383A (en) | Method and apparatus for processing video | |
CN108765264A (en) | Image U.S. face method, apparatus, equipment and storage medium | |
CN105469353A (en) | Embedding method and device of watermark image, and extraction method and device of watermark image | |
CN106446621A (en) | Data transaction safety scheduling method and system | |
CN102723093B (en) | A kind of caching method of image file | |
CN108243355B (en) | Set top box user interface loading method and system | |
CN106202361B (en) | Data query method and system | |
CN101873485B (en) | Watermark embedding method and device based on H.264 compressed domain | |
CN105427234A (en) | Sharing method and sharing system for WIFI password | |
CN102143365B (en) | Motion estimation (ME) method | |
Guo et al. | Data hiding in dot diffused halftone images | |
US20240184632A1 (en) | A method and apparatus for enhanced task grouping | |
CN104244001A (en) | Watermark processing method and device for digital media file | |
US11700432B2 (en) | Method and apparatus for signaling and storing grouping types in an image container file | |
CN112188235B (en) | Media processing mode selection method and media processing method | |
CN206042211U (en) | Device and license plate recognition that handle is carried out camera video flowing | |
CN102065287A (en) | T-shaped video watermark embedding and extracting method | |
CN106791837A (en) | Forerunner's analysis method and device of Video coding | |
CN111400038A (en) | Video and picture multi-resolution self-adaptive video watermarking method and system | |
CN107194013B (en) | Processing method and processing system based on Distributed Message Queue middleware |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |