CN106446621A - Data transaction safety scheduling method and system - Google Patents

Data transaction safety scheduling method and system Download PDF

Info

Publication number
CN106446621A
CN106446621A CN201610376563.XA CN201610376563A CN106446621A CN 106446621 A CN106446621 A CN 106446621A CN 201610376563 A CN201610376563 A CN 201610376563A CN 106446621 A CN106446621 A CN 106446621A
Authority
CN
China
Prior art keywords
data
watermark
module
trade
demand
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610376563.XA
Other languages
Chinese (zh)
Inventor
夏虎
董传晔
朱晓婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sic Youe Data Co ltd
Original Assignee
Sic Youe Data Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sic Youe Data Co ltd filed Critical Sic Youe Data Co ltd
Priority to CN201610376563.XA priority Critical patent/CN106446621A/en
Publication of CN106446621A publication Critical patent/CN106446621A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention provides a data transaction safety scheduling method, which is characterized by comprising the following steps: step one, after receiving a data calling request of a data demand module, informing a data watermarking system; step two, the data watermarking module watermarks after fetching data from the data storage module; and step three, informing a data demand module after the watermark is printed, and extracting the data printed with the watermark by the data demand module. The invention relates to a transaction and data scheduling method based on a data watermarking technology, which solves the problem of copyright protection in the data transaction and transmission process.

Description

A kind of data trade sacurity dispatching method and system
Technical field
The present invention relates to data trade field, more particularly, to data trade security fields.
Background technology
With the continuous development of big data industry, increasing database data is carried out storing, is distributed by network, again Using.These data often contain huge economic worth, are valuable data resources.Distribute data with network data Being continuously increased of the demands such as outsourcing, how to protect copyrights of data, make the rights and interests of copyrights of data owner obtain protection to be increasingly becoming Major issue urgently to be resolved hurrily;Transaction based on data watermark technology and data dispatching method are to solve data trade and transmission During copyright problem effective way.
Content of the invention
Present invention aims to the deficiencies in the prior art, a kind of safe data trade dispatching method is proposed.
The technical scheme is that:A kind of data trade sacurity dispatching method, comprises the following steps:
Step one, after receiving the data call request of demand data module, notifies data watermark system;
Step 2, data watermark module watermark after data memory module fetches data;
Step 3, watermark notifies demand data module after accomplishing fluently, and demand data module extracts the data having accomplished fluently watermark.
Preferably, step 2 also includes, and data watermark module, after data memory module fetches data, carries out data watermark pre- Process, then watermark again;
Preferably, watermarking images are changed by described data watermark pretreatment by the pretreatment that Arnold displacement and position are decomposed For mixed and disorderly binary sequence, as actual watermark information to be embedded.
For this purpose it is proposed, the present invention also provides a kind of data trade sacurity dispatching system it is characterised in that including:Data dispatch Module, data memory module, data watermark module:
Described data dispatch module, for sending data call request to data watermark module, for data trade interface Feedback data watermark status information;
Described data memory module, for data storage;
Described data watermark module, is used for carrying out data watermark generation, data watermark embeds and data watermark extracts.
Preferably, described data memory module is Data Persistence Layer.
Preferably, described data trade sacurity dispatching system, also includes data check module, for by default verification Algorithm carries out data check to the data in caching, so that the data in caching is consistent with the data in Data Persistence Layer.
Beneficial effect:
Data trade sacurity dispatching method and system of the present invention, in conjunction with data digital watermark and data trade dispatching party Method, solves the problems, such as copyrights of data ownership mark during data trade, and can asking according to data trade scheduler module Ask, carry out watermark on demand, further can feed back watermark status information on demand, be easy to data trade and dynamically manage.
For image class data watermark, increased watermark pretreatment step before watermark, compared with prior art strengthen The security of watermark, improves the detection performance of watermark.
Brief description
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be attached to use required in embodiment Figure be briefly described it should be apparent that, drawings in the following description are some embodiments of the present invention, common for this area For technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart of the data trade sacurity dispatching method of embodiment of the present invention;
Fig. 2 is the schematic diagram of the data trade sacurity dispatching system that the present invention sends out embodiment.
Specific embodiment
Below in conjunction with accompanying drawing, embodiments of the present invention is described in detail.
As shown in figure 1, provide in the embodiment of the present invention the technical scheme is that:A kind of data trade sacurity dispatching Method, comprises the following steps:
S001, after receiving the data call request of demand data module, notifies data watermark system;
S002, data watermark module watermark after data memory module fetches data;
S003, watermark notifies demand data module after accomplishing fluently, and demand data module extracts the data having accomplished fluently watermark.
Preferably, S002 also includes, and data watermark module, after data memory module fetches data, carries out data watermark and locates in advance Reason, then watermark again;
Preferably, for image class data, data watermark pretreatment mode is the pretreatment decomposed by Arnold displacement and position Watermarking images are converted to mixed and disorderly binary sequence, as actual watermark information to be embedded.
Preferably, for image class data, watermark process:Original image is carried out 8X8 piecemeal DTC conversion, selects each 8 DCr intermediate frequency coefficients of sub-block as the embedded location of watermark, and with the PJGE luminance quantization table that combines with visual characteristic Lai Determine the proportionate relationship of these coefficient embedment strengths.To one suitable region of search of the embedment strength factor, heuristically select Certain embedment strength value carries out watermark and embeds, and introduces to comment better than the image quality evaluating method of Y-PSNR and mean square deviation Valency contains the distortion situation of watermarking images.If picture quality is unsatisfactory for the desired close distortion factor, constantly adjust embedded strong Angle value, thus the position information of watermarking images is embedded in 8 intermediate frequency coefficients of each sub-block with different intensity respectively.
Provide in the embodiment of the present invention as shown in Figure 2 and the technical scheme is that:
A kind of data trade sacurity dispatching system, including:Data dispatch module 201, data memory module 202, data watermark mould Block 203:
Described data dispatch module 201, for sending data call request to data watermark module 203, for handing over to data Easily interface 204 feedback data watermark status information;
Described data memory module 202, for data storage;
Described data watermark module 203, is used for carrying out data watermark generation, data watermark embeds and data watermark extracts.
Preferably, described data memory module 202 is Data Persistence Layer.
Preferably, described data trade sacurity dispatching system also includes data check module, for by default verification Algorithm carries out data check to the data in caching, so that the data in caching is consistent with the data in Data Persistence Layer.
Embodiment of above is merely to illustrate the present invention, and not limitation of the present invention, common about technical field Technical staff, without departing from the spirit and scope of the present invention, can also make a variety of changes and modification, therefore all Equivalent technical scheme falls within scope of the invention, and the scope of patent protection of the present invention should be defined by the claims.

Claims (6)

1. a kind of data trade sacurity dispatching method is it is characterised in that described data trade sacurity dispatching method includes following step Suddenly:
Step one, after receiving the data call request of demand data module, notifies data watermark system;
Step 2, data watermark module watermark after data memory module fetches data;
Step 3, watermark notifies demand data module after accomplishing fluently, and demand data module extracts the data having accomplished fluently watermark.
2., it is characterised in that step 2 also includes, data watermark module is from data storage for method according to claim 1 After module is fetched data, carry out data watermark pretreatment, then watermark again.
3. method according to claim 2, it is characterised in that described data watermark pre-processes, is replaced by Arnold Watermarking images are converted to mixed and disorderly binary sequence by the pretreatment decomposed with position, as actual watermark information to be embedded.
4. a kind of data trade sacurity dispatching system is it is characterised in that include:Data dispatch module, data memory module, data Watermark module:
Described data dispatch module, for sending data call request to data watermark module, for data trade interface Feedback data watermark status information;
Described data memory module, for data storage;
Described data watermark module, is used for carrying out data watermark generation, data watermark embeds and data watermark extracts.
5. system according to claim 4 is it is characterised in that described data memory module is Data Persistence Layer.
6. system according to claim 5, it is characterised in that also including data check module, verifies for passing through to preset Algorithm carries out data check to the data in caching, so that the data in caching is consistent with the data in Data Persistence Layer.
CN201610376563.XA 2016-05-31 2016-05-31 Data transaction safety scheduling method and system Pending CN106446621A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610376563.XA CN106446621A (en) 2016-05-31 2016-05-31 Data transaction safety scheduling method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610376563.XA CN106446621A (en) 2016-05-31 2016-05-31 Data transaction safety scheduling method and system

Publications (1)

Publication Number Publication Date
CN106446621A true CN106446621A (en) 2017-02-22

Family

ID=58183092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610376563.XA Pending CN106446621A (en) 2016-05-31 2016-05-31 Data transaction safety scheduling method and system

Country Status (1)

Country Link
CN (1) CN106446621A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110069473A (en) * 2019-03-27 2019-07-30 北京中科朗思信息技术有限公司 The method of database object persistence is realized on domestic discretionary security trusted platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1363895A (en) * 2000-12-07 2002-08-14 索尼英国有限公司 Aqueous printing and delivering data
CN101425163A (en) * 2007-10-30 2009-05-06 上海交通大学 Trading, identifying and arbitraging method, system and equipment based on watermark technology
CN101452533A (en) * 2007-12-07 2009-06-10 佳能株式会社 Rendering apparatus and rendering method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1363895A (en) * 2000-12-07 2002-08-14 索尼英国有限公司 Aqueous printing and delivering data
CN101425163A (en) * 2007-10-30 2009-05-06 上海交通大学 Trading, identifying and arbitraging method, system and equipment based on watermark technology
CN101452533A (en) * 2007-12-07 2009-06-10 佳能株式会社 Rendering apparatus and rendering method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘芳: "一种基于Arnold变换的二值图像水印算法", 《计算机应用》 *
吴杰: "基于DCT变换的图像分块数字水印算法", 《电脑知识与技术》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110069473A (en) * 2019-03-27 2019-07-30 北京中科朗思信息技术有限公司 The method of database object persistence is realized on domestic discretionary security trusted platform

Similar Documents

Publication Publication Date Title
CN103942585B (en) Method for converting information into two-dimensional codes
CN102034220B (en) Digital watermark-based electronic bill image anti-tamper method
CN106161991A (en) A kind of camera video processing method and terminal
Huang et al. Survey of Bio-inspired Computing for Information Hiding.
CN116567353B (en) Video delivery method and device, storage medium and electronic equipment
CN105981383A (en) Method and apparatus for processing video
CN108765264A (en) Image U.S. face method, apparatus, equipment and storage medium
CN105469353A (en) Embedding method and device of watermark image, and extraction method and device of watermark image
CN106446621A (en) Data transaction safety scheduling method and system
CN102723093B (en) A kind of caching method of image file
CN108243355B (en) Set top box user interface loading method and system
CN106202361B (en) Data query method and system
CN101873485B (en) Watermark embedding method and device based on H.264 compressed domain
CN105427234A (en) Sharing method and sharing system for WIFI password
CN102143365B (en) Motion estimation (ME) method
Guo et al. Data hiding in dot diffused halftone images
US20240184632A1 (en) A method and apparatus for enhanced task grouping
CN104244001A (en) Watermark processing method and device for digital media file
US11700432B2 (en) Method and apparatus for signaling and storing grouping types in an image container file
CN112188235B (en) Media processing mode selection method and media processing method
CN206042211U (en) Device and license plate recognition that handle is carried out camera video flowing
CN102065287A (en) T-shaped video watermark embedding and extracting method
CN106791837A (en) Forerunner's analysis method and device of Video coding
CN111400038A (en) Video and picture multi-resolution self-adaptive video watermarking method and system
CN107194013B (en) Processing method and processing system based on Distributed Message Queue middleware

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222