CN107256346A - Protect method, system and the storage medium of file copy right - Google Patents

Protect method, system and the storage medium of file copy right Download PDF

Info

Publication number
CN107256346A
CN107256346A CN201710365734.3A CN201710365734A CN107256346A CN 107256346 A CN107256346 A CN 107256346A CN 201710365734 A CN201710365734 A CN 201710365734A CN 107256346 A CN107256346 A CN 107256346A
Authority
CN
China
Prior art keywords
watermarking
embedded
file
key frame
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710365734.3A
Other languages
Chinese (zh)
Other versions
CN107256346B (en
Inventor
胡丽娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710365734.3A priority Critical patent/CN107256346B/en
Publication of CN107256346A publication Critical patent/CN107256346A/en
Application granted granted Critical
Publication of CN107256346B publication Critical patent/CN107256346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method for protecting file copy right, this method includes:When Resource Server receives the file of application program upload, the corresponding application message of the application program and user profile are obtained;The application message is converted into multipurpose watermarking, and the user profile is converted into fragile watermarking, or, the application message is converted into fragile watermarking, and user profile is converted into multipurpose watermarking;Multipurpose watermarking is embedded into the file using DWT algorithms, and fragile watermarking is embedded into the file using DCT algorithms.The invention also discloses a kind of system for protecting file copy right, and a kind of storage medium.The present invention, so as on the basis of file content is not changed, improve the anti-attack ability of the file, enables the copyright of the file to be effectively protected by simultaneously embedded above-mentioned multipurpose watermarking and fragile watermarking hereof.

Description

Protect method, system and the storage medium of file copy right
Technical field
The present invention relates to digital watermark technology field, more particularly to a kind of method for protecting file copy right, system and storage Medium.
Background technology
With the popularization of the mobile terminals such as mobile phone, social network sites are increasingly liked by user, and user also increasingly likes Picture or video are uploaded into these social network sites, when picture or video are uploaded into these social network sites, it is difficult to user The picture of long pass or the copyright of video are protected.
At present, to the copyright protection of picture or video, it is common practice in picture or video add word or Logo watermarks, but this protected mode does not possess good robustness, i.e. picture or video and experienced various signal transactings Or after various attacks, it is difficult to certain fidelity, anti-attack ability is not strong.
The content of the invention
It is a primary object of the present invention to propose a kind of method, system and the storage medium of protection file copy right, it is intended to solve Certainly user, by after picture or video upload social network sites, experienced various signal transactings or various attacks in the prior art Afterwards, it is difficult to certain fidelity, the not strong technical problem of anti-attack ability.
To achieve the above object, the present invention provides a kind of method for protecting file copy right, the side of the protection file copy right Method includes:
When Resource Server receives the file of application program upload, the corresponding application message of the application program is obtained With user profile;
The application message is converted into multipurpose watermarking, and the user profile is converted into fragile watermarking, or Person, is converted to fragile watermarking, and the user profile is converted into multipurpose watermarking by the application message;
The multipurpose watermarking is embedded into the file using preset DWT algorithms, and calculated using preset DCT The fragile watermarking is embedded into the file by method.
Optionally, the application message is converted into multipurpose watermarking, and the user profile is converted into fragility Watermark, or, the application message is converted into fragile watermarking, and the user profile is converted into multipurpose watermarking Also include after step:
Disorder processing is carried out to the multipurpose watermarking and fragile watermarking respectively.
Optionally, the file includes picture or video, described to utilize preset DWT algorithms that the multipurpose watermarking is embedding The step of entering to the file includes:
When the file is video, corresponding first key frame of the video is obtained;
Carry out DWT conversion to first key frame, and the multipurpose watermarking is embedded into first crucial after conversion The corresponding low frequency part of frame, obtains the second key frame.
Optionally, DWT conversion is carried out to first key frame, and the multipurpose watermarking is embedded into after conversion the The step of one key frame corresponding low frequency part, includes:
First key frame is divided into multiple images block in spatial domain, DWT changes are carried out to each image block respectively Change, and the multipurpose watermarking is embedded into the corresponding low frequency part of each image block after conversion.
Optionally, obtain also including after the second key frame:
DWT inverse transformations are carried out to second key frame, obtain being embedded in the 3rd key frame of the multipurpose watermarking.
Optionally, the step of fragile watermarking is embedded into the file by the utilization preset DCT algorithms includes:
Carry out dct transform to the 3rd key frame, and the fragile watermarking is embedded into the 3rd crucial after conversion The corresponding HFS of frame, obtains the 4th key frame.
Optionally, obtain also including after the 4th key frame:
DCT inverse transformations are carried out to the 4th key frame, obtained while the embedded multipurpose watermarking and fragile watermarking The 5th key frame, and the video comprising the 5th key frame is preserved to the Resource Server, download for user or Check.
Optionally, it is described that the multipurpose watermarking is embedded in institute using preset DWT algorithms when the file is picture The step of stating file, and the fragile watermarking is embedded in into the file using preset DCT algorithms includes:
DWT conversion is carried out to the picture, and the multipurpose watermarking is embedded into the corresponding low frequency of picture after conversion Part, obtains the first picture;
DWT inverse transformations are carried out to first picture, obtain being embedded in the second picture of the multipurpose watermarking;
Dct transform is carried out to the second picture, and the fragile watermarking is embedded into the second picture pair after conversion The HFS answered, obtains the 3rd picture;
DCT inverse transformations are carried out to the 3rd picture, the simultaneously embedded multipurpose watermarking and fragile watermarking is obtained 4th picture, and the 4th picture is preserved to the Resource Server, so that user downloads or checks.
In addition, to achieve the above object, the present invention also provides a kind of system for protecting file copy right, the protection file version The system of power includes:The protection text that memory, processor and being stored in can be run on the memory and on the processor The program of part copyright, following steps are realized when the program of the protection file copy right is by the computing device:
When Resource Server receives the file of application program upload, the corresponding application message of the application program is obtained With user profile;
The application message is converted into multipurpose watermarking, and the user profile is converted into fragile watermarking, or Person, is converted to fragile watermarking, and the user profile is converted into multipurpose watermarking by the application message;
The multipurpose watermarking is embedded into the file using preset DWT algorithms, and calculated using preset DCT The fragile watermarking is embedded into the file by method.
Optionally, the application message is converted into multipurpose watermarking, and the user profile is converted into fragility Watermark, or, the application message is converted into fragile watermarking, and the user profile is converted into multipurpose watermarking After step, when the program of the protection file copy right is executed by processor, following steps can also be realized:
Disorder processing is carried out to the multipurpose watermarking and fragile watermarking respectively.
Optionally, the file includes picture or video, described to utilize preset DWT algorithms that the multipurpose watermarking is embedding The step of entering to the file includes:
When the file is video, corresponding first key frame of the video is obtained;
Carry out DWT conversion to first key frame, and the multipurpose watermarking is embedded into first crucial after conversion The corresponding low frequency part of frame, obtains the second key frame.
Optionally, DWT conversion is carried out to first key frame, and the multipurpose watermarking is embedded into after conversion the The step of one key frame corresponding low frequency part, includes:
First key frame is divided into multiple images block in spatial domain, DWT changes are carried out to each image block respectively Change, and the multipurpose watermarking is embedded into the corresponding low frequency part of each image block after conversion.
Optionally,, can be with when the program of the protection file copy right is executed by processor after obtaining the second key frame Realize following steps:
DWT inverse transformations are carried out to second key frame, obtain being embedded in the 3rd key frame of the multipurpose watermarking.
Optionally, the step of fragile watermarking is embedded into the file by above-mentioned utilization preset DCT algorithms includes:
Carry out dct transform to the 3rd key frame, and the fragile watermarking is embedded into the 3rd crucial after conversion The corresponding HFS of frame, obtains the 4th key frame.
Optionally, after the 4th key frame is obtained, when the program of the protection file copy right is executed by processor, may be used also To realize following steps:
DCT inverse transformations are carried out to the 4th key frame, obtained while the embedded multipurpose watermarking and fragile watermarking The 5th key frame, and the video comprising the 5th key frame is preserved to the Resource Server, download for user or Check.
Optionally, when above-mentioned file is picture, the program of the protection file copy right is by real during the computing device Existing following steps:
DWT conversion is carried out to the picture, and the multipurpose watermarking is embedded into the corresponding low frequency of picture after conversion Part, obtains the first picture;
DWT inverse transformations are carried out to first picture, obtain being embedded in the second picture of the multipurpose watermarking;
Dct transform is carried out to the second picture, and the fragile watermarking is embedded into the second picture pair after conversion The HFS answered, obtains the 3rd picture;
DCT inverse transformations are carried out to the 3rd picture, the simultaneously embedded multipurpose watermarking and fragile watermarking is obtained 4th picture, and the 4th picture is preserved to the Resource Server, so that user downloads or checks.
In addition, to achieve the above object, the present invention also provides the protection that is stored with a kind of storage medium, the storage medium The program of file copy right, the program of the protection file copy right realizes following steps when being executed by processor:
When Resource Server receives the file of application program upload, the corresponding application message of the application program is obtained With user profile;
The application message is converted into multipurpose watermarking, and the user profile is converted into fragile watermarking, or Person, is converted to fragile watermarking, and the user profile is converted into multipurpose watermarking by the application message;
The multipurpose watermarking is embedded into the file using preset DWT algorithms, and calculated using preset DCT The fragile watermarking is embedded into the file by method.
Optionally, the application message is converted into multipurpose watermarking, and the user profile is converted into fragility Watermark, or, the application message is converted into fragile watermarking, and the user profile is converted into multipurpose watermarking After step, when the program of the protection file copy right is executed by processor, following steps can also be realized:
Disorder processing is carried out to the multipurpose watermarking and fragile watermarking respectively.
Optionally, the file includes picture or video, described to utilize preset DWT algorithms that the multipurpose watermarking is embedding The step of entering to the file includes:
When the file is video, corresponding first key frame of the video is obtained;
Carry out DWT conversion to first key frame, and the multipurpose watermarking is embedded into first crucial after conversion The corresponding low frequency part of frame, obtains the second key frame.
Optionally, DWT conversion is carried out to first key frame, and the multipurpose watermarking is embedded into after conversion the The step of one key frame corresponding low frequency part, includes:
First key frame is divided into multiple images block in spatial domain, DWT changes are carried out to each image block respectively Change, and the multipurpose watermarking is embedded into the corresponding low frequency part of each image block after conversion.
Optionally,, can be with when the program of the protection file copy right is executed by processor after obtaining the second key frame Realize following steps:
DWT inverse transformations are carried out to second key frame, obtain being embedded in the 3rd key frame of the multipurpose watermarking.
Optionally, the step of fragile watermarking is embedded into the file by above-mentioned utilization preset DCT algorithms includes:
Carry out dct transform to the 3rd key frame, and the fragile watermarking is embedded into the 3rd crucial after conversion The corresponding HFS of frame, obtains the 4th key frame.
Optionally, after the 4th key frame is obtained, when the program of the protection file copy right is executed by processor, may be used also To realize following steps:
DCT inverse transformations are carried out to the 4th key frame, obtained while the embedded multipurpose watermarking and fragile watermarking The 5th key frame, and the video comprising the 5th key frame is preserved to the Resource Server, download for user or Check.
Optionally, when above-mentioned file is picture, the program of the protection file copy right is by real during the computing device Existing following steps:
DWT conversion is carried out to the picture, and the multipurpose watermarking is embedded into the corresponding low frequency of picture after conversion Part, obtains the first picture;
DWT inverse transformations are carried out to first picture, obtain being embedded in the second picture of the multipurpose watermarking;
Dct transform is carried out to the second picture, and the fragile watermarking is embedded into the second picture pair after conversion The HFS answered, obtains the 3rd picture;
DCT inverse transformations are carried out to the 3rd picture, the simultaneously embedded multipurpose watermarking and fragile watermarking is obtained 4th picture, and the 4th picture is preserved to the Resource Server, so that user downloads or checks.
Method, system and the storage medium of protection file copy right provided by the present invention, can be achieved:It is uploaded in user In each file of Resource Server, by DWT conversion and dct transform, while the embedded Shandong for including application program application message Rod watermark and the fragile watermarking comprising user profile, or the embedded fragility for including application program application message simultaneously Watermark and the multipurpose watermarking comprising user profile, because multipurpose watermarking can resist some malicious attacks, and fragility water Print then can prevent above-mentioned file to be tampered, so that embedded in the file of multipurpose watermarking and fragile watermarking simultaneously has Higher attack tolerant and anti-destructive, so as on the basis of file content is not changed, improve the anti-of above-mentioned file and attack Hit ability, the copyright of above-mentioned file is effectively protected, solve in the prior art user by picture or video After biography social network sites, after it experienced various signal transactings or various attacks, it is difficult to certain fidelity, attack resistance Indifferent technical problem.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for realizing the optional mobile terminal of each embodiment one of the invention;
Fig. 2 protects the schematic flow sheet of the method first embodiment of file copy right for the present invention;
Fig. 3 step S30 shown in method Fig. 2 of present invention protection file copy right refinement step schematic flow sheet;
Fig. 4 step S30 shown in method Fig. 2 of present invention protection file copy right another refinement step schematic flow sheet;
Fig. 5 in the present invention by the schematic flow sheet of multipurpose watermarking and fragile watermarking embedded video simultaneously;
Fig. 6 protects the schematic flow sheet of the embodiment of method the 5th of file copy right for the present invention;
Fig. 7 in the present invention by the schematic flow sheet of multipurpose watermarking and fragile watermarking embedded picture simultaneously;
The structural representation for the software runtime environment that Fig. 8 is related to for the system of present invention protection file copy right.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can be mixed Ground is used.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. are moved Move the fixed terminals such as terminal, and numeral TV, desktop computer.
Referring to Fig. 1, hardware configuration signals of the Fig. 1 for the optional mobile terminal of realization each embodiment one of the invention Figure, the mobile terminal 1 00 can include:WiFi module 102, A/V (audio/video) input block 104, display unit 106, use The parts such as family input block 107, interface unit 108, memory 109, processor 110 and power supply 111.People in the art Member it is appreciated that the mobile terminal structure that shows does not constitute the restriction to mobile terminal in Fig. 1, mobile terminal can include than More or less parts are illustrated, some parts or different parts arrangement is either combined.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user's transmitting-receiving electricity by WiFi module 102 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need To be omitted in the essential scope for do not change invention.
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041,1041 pairs of graphics processor is in video acquisition mode or image capture mould The static images or the view data of video obtained in formula by image capture apparatus (such as camera) are handled.Figure after processing As frame may be displayed on display unit 106.Picture frame after being handled through graphics processor 1041 can be stored in memory 109 It is transmitted in (or other storage mediums) or via WiFi module 102.Display unit 106 is used to show what is inputted by user Information or the information for being supplied to user.Display unit 106 may include display panel 1061, can use liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode, ) etc. OLED form configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (such as user is using any suitable objects such as finger, stylus or annex on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can be wrapped Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, with preprocessor 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be input and the output function that mobile terminal is realized as two independent parts, but in certain embodiments, can By contact panel 1071 and the input that is integrated and realizing mobile terminal of display panel 1061 and output function, not do specifically herein Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 1 00 or can be with For transmitting data between mobile terminal 1 00 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, application program (the such as sound that storing program area can be needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data field can be stored uses created data (such as according to mobile phone Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, it can also include non-easy The property lost memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by operation or performs and is stored in software program and/or module in memory 109, and calls and be stored in storage Data in device 109, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;It is preferred that, processor 110 can integrated application processor and modulatedemodulate mediate Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 1 00 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Based on above-mentioned mobile terminal hardware configuration and communications network system, the method for proposing present invention protection file copy right Each embodiment.
Following examples of the present invention provide a kind of method for protecting file copy right, and this method passes through DWT (Discrete Wavelet Transform, wavelet transform) (Discrete Cosine Transform, discrete cosine becomes with DCT for conversion Change) conversion, it is uploaded in user using mobile terminal in each file of Resource Server, while embedded should comprising application program With the multipurpose watermarking of information, and the fragile watermarking comprising user profile, so that on the basis of file content is not changed, The anti-attack ability of above-mentioned file is improved, the copyright of above-mentioned file is effectively protected.
Reference picture 2, Fig. 2 is the schematic flow sheet of the method first embodiment of present invention protection file copy right, present invention guarantor In the method first embodiment for protecting file copy right, the method for the protection file copy right includes:
Step S100, when Resource Server receives the file of application program upload, obtains the application program correspondence Application message and user profile.
It is understood that user is during using above-mentioned mobile terminal 1 00, some for sometimes shooting oneself Photo or video are uploaded to some such as QQ spaces, wechat circle of friends, social network sites of microblogging, are shared with online friend, therefore, The corresponding Resource Server of above-mentioned social network sites obtains the application program corresponding when receiving the file of application program upload Application message and user profile.
Wherein, above-mentioned application message include application program correspondence LOGO (LOGOtype, trade mark/logo), icon, trade mark, User-defined identification etc.;Above-mentioned user profile include User logs in using the user name of above-mentioned application program, user's pet name, No. ID Deng, can also include user-defined information, such as address name, from editor keyword.
For example, user by application program " QQ " on " QQ spaces " after transmitting file, " QQ spaces " corresponding resource service Device just obtains " QQ " or " QQ spaces " corresponding LOGO as application message, and obtains User logs in " QQ " or " QQ spaces " simultaneously User profile.
Step S200, is converted to multipurpose watermarking, and the user profile is converted into fragility by the application message Property watermark, or, the application message is converted into fragile watermarking, and the user profile is converted into robustness water Print.
In the present embodiment, Resource Server corresponding application message of the application program of transmitting file on getting is believed with user After breath, the application message got is converted into multipurpose watermarking respectively, user profile is converted into fragile watermarking;Or will The application message got is converted to fragile watermarking, and user profile is converted into multipurpose watermarking.
Wherein, digital watermarking (Digital Watermarking) technology is that some identification informations (i.e. digital watermarking) are straight Connect among embedded digital carrier (including multimedia, document, software etc.), but do not influence the use value of original vector, be also not easy Perceived or noticed by the consciousness system (such as vision or auditory system) of people.Information in the carrier is hidden by these, can be with Reach confirmation creator of content, buyer, transmission secret information or judge whether carrier the purpose such as is tampered.According to watermark Above-mentioned digital watermarking can be divided into multipurpose watermarking and the class of fragile watermarking two by characteristic.
Wherein, multipurpose watermarking is mainly used in copyright identifying Copyright Information, is existed using this digital watermark The sign (i.e. sequence number) of embedded founder, the beacon information of the owner, or insertion buyer in the data of content of multimedia. It in general pattern except that can handle (such as:Filtering, plus noise, replacement, compression etc.) middle existence is outside, moreover it is possible to resist some malice Attack.The requirement of fragile watermarking and multipurpose watermarking is on the contrary, fragile watermarking is mainly used in integrity protection, and this watermark is same Sample is the embedded sightless information in file content data.When file content changes, these watermark informations can occur It is corresponding to change, so as to identify whether initial data is tampered.The processing of fragile watermarking reply general pattern is (such as:Filtering, Plus noise, replacement, compression etc.) there is stronger immunocompetence (robustness), while requiring there is stronger sensitiveness again, both allow one Determine the distortion of degree, distortion situation can be detected again, the change to signal is very sensitive, can be according to the state of fragile watermark It may determine that whether data are tampered with.
Wherein, above-mentioned application message is being converted into multipurpose watermarking, user profile is converted into fragile watermarking, or Above-mentioned application message is converted into fragile watermarking, when user profile is converted into multipurpose watermarking, can use and be calculated based on small echo The digital watermarking generation of method and hidden algorithm:Using wavelet algorithm, the spatial domain data of digital picture is converted by DWT and changed For corresponding wavelet domain coefficients, and according to information type to be concealed, appropriate coding and deformation are carried out to it, further according to hiding The size of information content and corresponding Security Target, select square frequency coefficient sequence, finally, by the frequency coefficient of digital picture It is inverse transformed to be converted into spatial domain data.
The multipurpose watermarking, is embedded into the file by step S300 using preset DWT algorithms, and using in advance The fragile watermarking is embedded into the file by the DCT algorithms put.
In the present embodiment, above-mentioned multipurpose watermarking can be embedded into above-mentioned by Resource Server using preset DWT algorithms In file, and using preset DCT algorithms above-mentioned fragile watermarking is embedded into simultaneously in above-mentioned file.
Wherein, DWT conversion is the partial transformation of space and frequency, is translated using basic function and the flexible one group of letter constituted Number is represented or approximation signal (function).Watermark signal is embedded on the high frequency band coefficient of the digital picture after wavelet transformation When, not only allow for carrying out additivity, multiplying property, quantization, replacement etc. to DWT conversion coefficients, human visual system is additionally contemplates that sometimes Some characteristics, such as visual masking, frequency sensitivity, luminosity sensitivity.
And dct transform not only has good energy compression ability, and decorrelation ability is also relatively strong, due to digital picture Sampled value of the binary function at discrete grid block point is regarded as, its content typically has autocorrelation to a certain extent, That is the generally change of the content of topography is little.Therefore, image is after dct transform, and most of energy all concentrates on low Frequency part, due to human visual system to image feel be concentrated mainly on low-frequency range, so watermark signal is embedded in figure After the low frequency of picture, can having preferable anti-JPEG, (Joint Photographic Experts Group, joint image expert is small Group) compression, MPEG (Moving Picture Experts Group, dynamic image expert group) compressions and nonshrink put resampling etc. Characteristic.
Wherein, when above-mentioned multipurpose watermarking is embedded into file using DWT algorithms, it can generate and calculate by watermark signal first Method generates watermark signal N, and original host image is carried out into DWT conversion, watermark signal is embedded in its high frequency coefficient, so as to complete The superposition of watermark signal, then carries out DWT inverse transformations, so as to obtain being embedded in the image after above-mentioned multipurpose watermarking.
When using DCT algorithms, above-mentioned fragile watermarking is embedded into file, it can be given birth to first by watermark signal generating algorithm Into watermark signal W, former host image is secondly subjected to dct transform by 8 × 8 piecemeals, watermark signal W is then embedded in its part In DCT low frequency coefficients, so as to complete the superposition of watermark signal, piecemeal DCT inverse transformations are finally carried out, obtain being embedded in above-mentioned fragility Image after watermark.
Specifically, after above-mentioned multipurpose watermarking and fragile watermarking are embedded into above-mentioned file simultaneously, then will bag File containing above-mentioned multipurpose watermarking and fragile watermarking is stored in above-mentioned Resource Server, so that other users are downloaded or are looked into See.Wherein, when other users are downloaded in above-mentioned Resource Server or check above-mentioned file, uploader is included in above-mentioned file The application message watermark and user profile watermark of used application program.
For example, user's first uploads one in " QQ spaces " from after taking pictures by application program " QQ ", then it is automatic in the Zhang Zhao Embedded " QQ " or " QQ spaces " corresponding LOGO watermarks in piece, and the corresponding user of embedded user's first simultaneously in this photo Information watermark.User's second is downloaded in " QQ spaces " after this photo that user's first is uploaded, then while including in the photo downloaded " QQ spaces " corresponding LOGO watermarks, and the corresponding user profile watermark of user's first.
The method of protection file copy right described in the present embodiment, is uploaded in each file of Resource Server in user, By DWT conversion and dct transform, while being embedded in the multipurpose watermarking comprising application program application message and including user profile Fragile watermarking, or the simultaneously embedded fragile watermarking comprising application program application message and the Shandong comprising user profile Rod watermark, because multipurpose watermarking can resist some malicious attacks, and fragile watermarking can then prevent that above-mentioned file from being usurped Change, so that the file that embedded in multipurpose watermarking and fragile watermarking simultaneously is provided with higher attack tolerant and collapse resistance Property, so as on the basis of file content is not changed, improve the anti-attack ability of above-mentioned file, enable the copyright of above-mentioned file Access and be effectively protected, solve user in the prior art and, by after picture or video upload social network sites, experienced respectively Plant after signal transacting or various attacks, it is difficult to certain fidelity, the not strong technical problem of anti-attack ability.
Further, the method first embodiment of file copy right is protected based on the invention described above, present invention protection text is proposed In the method second embodiment of part copyright, the present embodiment, the application message being turned described in step S200 shown in above-mentioned Fig. 2 Multipurpose watermarking is changed to, and the user profile is converted into fragile watermarking, or, the application message is converted to crisp Weak property watermark, and the step of the user profile is converted into multipurpose watermarking after also include:
Disorder processing is carried out to the multipurpose watermarking and fragile watermarking respectively.
Wherein, disorder processing refers to upset the information order of image, on the position that a pixels are moved to b pixels, b pictures Element is moved on the position of c pixels, it is transformed into the disorderly and unsystematic image for being difficult to recognize.Believe the image of scramble as secret Breath be hidden again, can very limits raising hidden carrier robustness.
Specifically, disorderly and unsystematic by two after above-mentioned multipurpose watermarking and fragile watermarking progress disorder processing, will be obtained Watermark, this watermark achromatization, texture-free, amorphism can not therefrom read any information, then, such watermark is embedding Enter and be just difficult to cause the width graph coloring coloured silk, texture, the too big change of shape during to another width normal image, will not even change Become, such human eye is not just easy to identify, so as to escape from third-party sight.
Wherein it is possible to be entered respectively to the multipurpose watermarking and fragile watermarking at line shuffle using Arnold conversion algorithm Reason.Arnold conversion can be regarded as the process for stretching, compress, folding and splicing, by this process by the numeral of discretization Point in image array is rearranged.
Meanwhile, above-mentioned multipurpose watermarking and fragile watermarking are subjected to disorder processing, malicious attack can be effective against.This It is that, because carrying out the process of decommutation to Secret Image, each of the information dispersion for just make to apply on image, drawing to picture is local, The random noise of point-like is formd, the degree to visual impact is little.
After carrying out disorder processing to the multipurpose watermarking and fragile watermarking respectively, you can calculated using preset DWT Multipurpose watermarking is embedded into above-mentioned file by method, and fragile watermarking is embedded into above-mentioned text using preset DCT algorithms In part.
Described in the present embodiment protection file copy right method, by above-mentioned application message be converted to multipurpose watermarking and Above-mentioned user profile is converted into fragile watermarking, or, the application message is converted into fragile watermarking and by described in User profile is converted to after multipurpose watermarking, and the multipurpose watermarking and fragile watermarking after conversion are entered at line shuffle respectively Reason, so as to improve the robustness of above-mentioned multipurpose watermarking and fragile watermarking.
Further, the method first embodiment of file copy right is protected based on the invention described above, present invention protection text is proposed The method 3rd embodiment of part copyright, reference picture 3, Fig. 3 step S300 shown in method Fig. 2 of present invention protection file copy right In refinement step schematic flow sheet, the present embodiment, the preset DWT algorithms of utilization shown in above-mentioned Fig. 2 described in step S300 will The step of multipurpose watermarking is embedded into the file includes:
Step S311, when the file is video, obtains corresponding first key frame of the video;
Step S312, DWT conversion is carried out to first key frame, and the multipurpose watermarking is embedded into after conversion The corresponding low frequency part of first key frame, obtains the second key frame.
In the present embodiment, when above-mentioned multipurpose watermarking and fragile watermarking are embedded into file, this document is first judged Type, if this document be video, obtain corresponding first key frame of the video.Wherein, the first key frame is regarded equivalent to above-mentioned Original painting in frequency 2 D animation, refers to that frame residing for the key operations in role or object of which movement or change.
After corresponding first key frame of the video is obtained, DWT conversion is carried out to first key frame, and by above-mentioned Shandong Rod watermark is embedded into the corresponding low frequency part of the first key frame after conversion, obtains the second key frame.
Further, DWT conversion is carried out to the first key frame described in above-mentioned steps S312, and by the multipurpose watermarking The step of being embedded into the first key frame corresponding low frequency part after conversion includes:
First key frame is divided into multiple images block in spatial domain, DWT changes are carried out to each image block respectively Change, and the multipurpose watermarking is embedded into the corresponding low frequency part of each image block after conversion.
Further, also include after the second key frame is obtained:
Step S313, carries out DWT inverse transformations to second key frame, obtains being embedded in the 3rd pass of the multipurpose watermarking Key frame.
The method of protection file copy right described in the present embodiment, when above-mentioned file is video, obtains the key of the video Frame, then carries out DWT conversion, and above-mentioned multipurpose watermarking is embedded into the corresponding low frequency of key frame after conversion to the key frame Part, then carries out DWT inverse transformations again, just can obtain being embedded in the key frame of above-mentioned multipurpose watermarking, due to multipurpose watermarking Some malicious attacks can be resisted, so that the video that embedded in multipurpose watermarking is provided with higher attack tolerant, are solved The not strong technical problem of the anti-attack ability of video in the prior art.
Further, method first, the 3rd embodiment of file copy right are protected based on the invention described above, proposes that the present invention is protected Protect the method fourth embodiment of file copy right, reference picture 4, Fig. 4 steps shown in method Fig. 2 of present invention protection file copy right In S300 another refinement step schematic flow sheet, the present embodiment, the utilization shown in above-mentioned Fig. 2 described in step S300 is preset The step of fragile watermarking is embedded into the file by DCT algorithms includes:
Step S314, dct transform is carried out to the 3rd key frame, and the fragile watermarking is embedded into after conversion The corresponding HFS of 3rd key frame, obtains the 4th key frame.
It is then crucial to the 3rd again after obtaining being embedded in the 3rd key frame of above-mentioned multipurpose watermarking in this implementation Frame carries out dct transform, and above-mentioned fragile watermarking is embedded into the corresponding HFS of the 3rd key frame after conversion, obtains the Four key frames.
Further, also include after the 4th key frame is obtained:
Step S315, DCT inverse transformations are carried out to the 4th key frame, obtain the embedded multipurpose watermarking simultaneously and crisp 5th key frame of weak property watermark, and the video comprising the 5th key frame is preserved to the Resource Server, for Family is downloaded or checked.
In the present embodiment, after the 5th key frame of simultaneously embedded above-mentioned multipurpose watermarking and fragile watermarking is obtained, Video comprising the 5th key frame is preserved to above-mentioned Resource Server again, so that user downloads or checks, wherein, other When user downloads in above-mentioned Resource Server or checks above-mentioned video, then application is used comprising uploader in above-mentioned video The application message watermark and user profile watermark of program.
For example, after user's first uploads one section of video by application program " QQ " in " QQ spaces ", then it is automatic in the video Embedded " QQ " or " QQ spaces " corresponding LOGO watermarks, and the corresponding user profile water of embedded user's first simultaneously in the video Print.User's second is downloaded in " QQ spaces " after the video that user's first is uploaded, then simultaneously comprising " QQ spaces " in the video downloaded Corresponding LOGO watermarks, and the corresponding user profile watermark of user's first.
In order to be better understood from the present invention, reference picture 5, Fig. 5 is in the present invention that multipurpose watermarking is same with fragile watermarking When be embedded in video schematic flow sheet.
The method of protection file copy right described in the present embodiment, when above-mentioned file is video, to including above-mentioned fragility 3rd key frame of watermark carries out dct transform, and it is corresponding that above-mentioned fragile watermarking is embedded into the 3rd key frame after conversion HFS, then carries out DCT inverse transformations again, obtains the key frame of simultaneously embedded above-mentioned multipurpose watermarking and fragile watermarking, Finally the video again comprising the key frame is preserved to above-mentioned Resource Server, so that user downloads or checks.Due to robust Property watermark can resist some malicious attacks, and fragile watermarking can then prevent that above-mentioned video is tampered, so that simultaneously embedding The video for having entered multipurpose watermarking and fragile watermarking is provided with higher attack tolerant and anti-destructive, solves prior art Middle video is after it experienced various signal transactings or various attacks, it is difficult to which, with certain fidelity, anti-attack ability is not strong Technical problem.
Further, further, the method first, the three, the 4th for protecting file copy right based on the invention described above is implemented Example, proposes the embodiment of method the 5th of present invention protection file copy right, reference picture 6, and Fig. 6 is the side of present invention protection file copy right In the schematic flow sheet of the embodiment of method the 5th, the present embodiment, when above-mentioned file is picture, in step S300 shown in above-mentioned Fig. 2 The multipurpose watermarking is embedded in the file by the preset DWT algorithms of described utilization, and utilizes preset DCT algorithms by institute Stating the fragile watermarking insertion file includes:
Step S321, DWT conversion is carried out to the picture, and the multipurpose watermarking is embedded into the picture pair after conversion The low frequency part answered, obtains the first picture;
Step S322, carries out DWT inverse transformations to first picture, obtains being embedded in the second figure of the multipurpose watermarking Piece;
Step S323, dct transform is carried out to the second picture, and the fragile watermarking is embedded into after conversion the The corresponding HFS of two pictures, obtains the 3rd picture;
Step S324, DCT inverse transformations are carried out to the 3rd picture, are obtained while the embedded multipurpose watermarking and fragility Property watermark the 4th picture, and the 4th picture is preserved to the Resource Server, so that user downloads or checks.
In the present embodiment, when above-mentioned multipurpose watermarking and fragile watermarking are embedded into file, this document is first judged Type, if this document be picture, to the picture carry out DWT conversion, and by above-mentioned multipurpose watermarking be embedded into conversion after The corresponding low frequency part of picture, obtains the first picture, then carries out DWT inverse transformations to first picture, obtains being embedded in robustness The second picture of watermark;Followed by the second picture carry out dct transform, and by above-mentioned fragile watermarking be embedded into conversion after The corresponding HFS of second picture, then carries out DCT inverse transformations, obtains while the embedded multipurpose watermarking and fragility water 4th picture of print, and the 4th picture is preserved to above-mentioned Resource Server again, so that user downloads or checks.
In order to be better understood from the present invention, reference picture 7, Fig. 7 is in the present invention that multipurpose watermarking is same with fragile watermarking When be embedded in picture schematic flow sheet.
The method of protection file copy right described in the present embodiment, is figure when user is uploaded to the above-mentioned file of Resource Server During piece, using DWT algorithms and DCT algorithms, by the multipurpose watermarking comprising application program application message with including user profile Fragile watermarking, or the fragile watermarking comprising application program application message and the multipurpose watermarking comprising user profile is embedding Enter in the picture, because multipurpose watermarking can resist some malicious attacks, and fragile watermarking can then prevent above-mentioned picture quilt Distort, so that the picture that embedded in multipurpose watermarking and fragile watermarking simultaneously is provided with higher attack tolerant and anti-broken Bad property, solve in the prior art picture after it experienced various signal transactings or various attacks, it is difficult to certain guarantor True degree, the not strong technical problem of anti-attack ability.
Further, the present invention also provides a kind of system for protecting file copy right, and the system of the protection file copy right includes: The program of memory, processor and the protection file copy right that is stored on the memory and can run on the processor, Following steps are realized when the program of the protection file copy right is by the computing device:
When Resource Server receives the file of application program upload, the corresponding application message of the application program is obtained With user profile;
The application message is converted into multipurpose watermarking, and the user profile is converted into fragile watermarking, or Person, is converted to fragile watermarking, and the user profile is converted into multipurpose watermarking by the application message;
The multipurpose watermarking is embedded into the file using preset DWT algorithms, and calculated using preset DCT The fragile watermarking is embedded into the file by method.
Wherein, the application message is converted into multipurpose watermarking, and the user profile is converted into fragility water Print, or, the application message is converted into fragile watermarking, and the user profile is converted to the step of multipurpose watermarking After rapid, when the program of the protection file copy right is by the computing device, following steps can also be realized:
Disorder processing is carried out to the multipurpose watermarking and fragile watermarking respectively.
Wherein, the file includes picture or video, described to be embedded in the multipurpose watermarking using preset DWT algorithms The step of to the file, includes:
When the file is video, corresponding first key frame of the video is obtained;
Carry out DWT conversion to first key frame, and the multipurpose watermarking is embedded into first crucial after conversion The corresponding low frequency part of frame, obtains the second key frame.
Wherein, to first key frame carry out DWT conversion, and by the multipurpose watermarking be embedded into conversion after first The step of key frame corresponding low frequency part, includes:
First key frame is divided into multiple images block in spatial domain, DWT changes are carried out to each image block respectively Change, and the multipurpose watermarking is embedded into the corresponding low frequency part of each image block after conversion.
Wherein, obtain after the second key frame, when the program of the protection file copy right is by the computing device, may be used also To realize following steps:
DWT inverse transformations are carried out to second key frame, obtain being embedded in the 3rd key frame of the multipurpose watermarking.
Wherein, the step of fragile watermarking is embedded into the file by above-mentioned utilization preset DCT algorithms includes:
Carry out dct transform to the 3rd key frame, and the fragile watermarking is embedded into the 3rd crucial after conversion The corresponding HFS of frame, obtains the 4th key frame.
Wherein, after the 4th key frame is obtained, when the program of the protection file copy right is by the computing device, also Following steps can be realized:
DCT inverse transformations are carried out to the 4th key frame, obtained while the embedded multipurpose watermarking and fragile watermarking The 5th key frame, and the video comprising the 5th key frame is preserved to the Resource Server, download for user or Check.
Wherein, when above-mentioned file is picture, realized when the program of the protection file copy right is by the computing device Following steps:
DWT conversion is carried out to the picture, and the multipurpose watermarking is embedded into the corresponding low frequency of picture after conversion Part, obtains the first picture;
DWT inverse transformations are carried out to first picture, obtain being embedded in the second picture of the multipurpose watermarking;
Dct transform is carried out to the second picture, and the fragile watermarking is embedded into the second picture pair after conversion The HFS answered, obtains the 3rd picture;
DCT inverse transformations are carried out to the 3rd picture, the simultaneously embedded multipurpose watermarking and fragile watermarking is obtained 4th picture, and the 4th picture is preserved to the Resource Server, so that user downloads or checks.
In order to be better understood from the present invention, reference picture 8, the software that Fig. 8 is related to for the system of present invention protection file copy right In the structural representation of running environment, the present embodiment, the system of above-mentioned protection file copy right may include:Processor 110, for example CPU, network interface 1004, user interface 1003, memory 109, communication bus 1002.Wherein, communication bus 1002 is used for real Connection communication between these existing components;User interface 1003 can include the interface unit 108 and display list shown in above-mentioned Fig. 1 Member 106;Network interface 1004 can optionally include wireline interface, the wave point (such as WI-FI interfaces) of standard;Memory 109 can be high-speed RAM memory or stable memory (non-volatile memory), such as disk storage Device;Memory 109 optionally can also be the storage device independently of aforementioned processor 110.
It will be understood by those skilled in the art that the structure shown in Fig. 8 is not constituted to above-mentioned protection file copy right system The restriction of system, can be included than illustrating more or less parts, either combine some parts or different parts arrangement.
As shown in figure 8, as in a kind of memory 109 of storage medium, operating system, network service mould can be included Block, Subscriber Interface Module SIM and the program for protecting file copy right.
As shown in figure 8, network interface 1004 is mainly used in connecting background server, carrying out data with background server leads to Letter;User interface 1003 is mainly used in connection client (user terminal), and row data communication is entered with client;And processor 110 can For calling the program of the protection file copy right stored in memory 109, and perform corresponding operation.
Wherein, the corresponding embodiment of the system of the protection file copy right and the method for foregoing protection file copy right are corresponding each Individual embodiment is essentially identical, therefore will not be repeated here.
Further, the present invention also provides a kind of program for the protection file copy right that is stored with storage medium, storage medium, The program of the protection file copy right realizes following steps when being executed by processor:
When Resource Server receives the file of application program upload, the corresponding application message of the application program is obtained With user profile;
The application message is converted into multipurpose watermarking, and the user profile is converted into fragile watermarking, or Person, is converted to fragile watermarking, and the user profile is converted into multipurpose watermarking by the application message;
The multipurpose watermarking is embedded into the file using preset DWT algorithms, and calculated using preset DCT The fragile watermarking is embedded into the file by method.
Wherein, the application message is converted into multipurpose watermarking, and the user profile is converted into fragility water Print, or, the application message is converted into fragile watermarking, and the user profile is converted to the step of multipurpose watermarking After rapid, when the program of the protection file copy right is executed by processor, following steps can also be realized:
Disorder processing is carried out to the multipurpose watermarking and fragile watermarking respectively.
Wherein, the file includes picture or video, described to be embedded in the multipurpose watermarking using preset DWT algorithms The step of to the file, includes:
When the file is video, corresponding first key frame of the video is obtained;
Carry out DWT conversion to first key frame, and the multipurpose watermarking is embedded into first crucial after conversion The corresponding low frequency part of frame, obtains the second key frame.
Wherein, to first key frame carry out DWT conversion, and by the multipurpose watermarking be embedded into conversion after first The step of key frame corresponding low frequency part, includes:
First key frame is divided into multiple images block in spatial domain, DWT changes are carried out to each image block respectively Change, and the multipurpose watermarking is embedded into the corresponding low frequency part of each image block after conversion.
Wherein,, can also be real when the program of the protection file copy right is executed by processor after obtaining the second key frame Existing following steps:
DWT inverse transformations are carried out to second key frame, obtain being embedded in the 3rd key frame of the multipurpose watermarking.
Wherein, the step of fragile watermarking is embedded into the file by above-mentioned utilization preset DCT algorithms includes:
Carry out dct transform to the 3rd key frame, and the fragile watermarking is embedded into the 3rd crucial after conversion The corresponding HFS of frame, obtains the 4th key frame.
Wherein, after the 4th key frame is obtained, the program of the protection file copy right is when being executed by processor, can be with Realize following steps:
DCT inverse transformations are carried out to the 4th key frame, obtained while the embedded multipurpose watermarking and fragile watermarking The 5th key frame, and the video comprising the 5th key frame is preserved to the Resource Server, download for user or Check.
Wherein, when above-mentioned file is picture, realized when the program of the protection file copy right is by the computing device Following steps:
DWT conversion is carried out to the picture, and the multipurpose watermarking is embedded into the corresponding low frequency of picture after conversion Part, obtains the first picture;
DWT inverse transformations are carried out to first picture, obtain being embedded in the second picture of the multipurpose watermarking;
Dct transform is carried out to the second picture, and the fragile watermarking is embedded into the second picture pair after conversion The HFS answered, obtains the 3rd picture;
DCT inverse transformations are carried out to the 3rd picture, the simultaneously embedded multipurpose watermarking and fragile watermarking is obtained 4th picture, and the 4th picture is preserved to the Resource Server, so that user downloads or checks.
Specifically, the corresponding embodiment of the storage medium each embodiment corresponding with the method for foregoing protection file copy right It is essentially identical, therefore will not be repeated here.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property is included, so that process, method, article or system including a series of key elements not only include those key elements, and And also including other key elements being not expressly set out, or also include for this process, method, article or system institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there is other identical element in process, method, article or the system of key element.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Understood based on such, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, Computer, server, or network equipment etc.) perform method described in each of the invention embodiment.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of method for protecting file copy right, it is characterised in that the method for the protection file copy right includes:
When Resource Server receives the file of application program upload, the corresponding application message of the application program is obtained with using Family information;
The application message is converted into multipurpose watermarking, and the user profile is converted into fragile watermarking, or, will The application message is converted to fragile watermarking, and the user profile is converted into multipurpose watermarking;
The multipurpose watermarking is embedded into the file using preset wavelet transform DWT algorithms, and using in advance The fragile watermarking is embedded into the file by the discrete cosine transform algorithm put.
2. the method for file copy right is protected as claimed in claim 1, it is characterised in that the application message is converted into robust Property watermark, and the user profile is converted into fragile watermarking, or, the application message is converted into fragility water Also include after the step of printing, and the user profile is converted into multipurpose watermarking:
Disorder processing is carried out to the multipurpose watermarking and fragile watermarking respectively.
3. the method for file copy right is protected as claimed in claim 1, it is characterised in that the file includes picture or video, The step of multipurpose watermarking is embedded into the file by the utilization preset DWT algorithms includes:
When the file is video, corresponding first key frame of the video is obtained;
DWT conversion is carried out to first key frame, and the multipurpose watermarking is embedded into the first key frame pair after conversion The low frequency part answered, obtains the second key frame.
4. the method for file copy right is protected as claimed in claim 3, it is characterised in that DWT is carried out to first key frame Conversion, and include the step of the multipurpose watermarking to be embedded into the first key frame corresponding low frequency part after conversion:
First key frame is divided into multiple images block in spatial domain, DWT conversion is carried out to each image block respectively, and The multipurpose watermarking is embedded into the corresponding low frequency part of each image block after conversion.
5. the method for file copy right is protected as claimed in claim 3, it is characterised in that obtain also wrapping after the second key frame Include:
DWT inverse transformations are carried out to second key frame, obtain being embedded in the 3rd key frame of the multipurpose watermarking.
6. the method for file copy right is protected as claimed in claim 5, it is characterised in that described to utilize preset DCT algorithms The step of fragile watermarking is embedded into the file includes:
Dct transform is carried out to the 3rd key frame, and the fragile watermarking is embedded into the 3rd key frame pair after conversion The HFS answered, obtains the 4th key frame.
7. the method for file copy right is protected as claimed in claim 6, it is characterised in that obtain also wrapping after the 4th key frame Include:
DCT inverse transformations are carried out to the 4th key frame, obtain and meanwhile the embedded multipurpose watermarking and fragile watermarking the Five key frames, and the video comprising the 5th key frame is preserved to the Resource Server, so that user downloads or checks.
8. the method for the protection file copy right as described in claim 1 to 7 any one, it is characterised in that when the file is It is described that the multipurpose watermarking is embedded in the file using preset DWT algorithms during picture, and calculated using preset DCT The step of fragile watermarking is embedded in the file by method includes:
DWT conversion is carried out to the picture, and the multipurpose watermarking is embedded into the corresponding low frequency part of picture after conversion, Obtain the first picture;
DWT inverse transformations are carried out to first picture, obtain being embedded in the second picture of the multipurpose watermarking;
To the second picture carry out dct transform, and by the fragile watermarking be embedded into conversion after second picture it is corresponding HFS, obtains the 3rd picture;
DCT inverse transformations are carried out to the 3rd picture, the 4th of the simultaneously embedded multipurpose watermarking and fragile watermarking is obtained Picture, and the 4th picture is preserved to the Resource Server, so that user downloads or checks.
9. a kind of system for protecting file copy right, it is characterised in that the system of the protection file copy right includes:Memory, place The program of reason device and the protection file copy right that is stored on the memory and can run on the processor, the protection text The program of part copyright by during the computing device realize as any one of claim 1 to 8 protect file copy right Each corresponding step of method.
10. a kind of storage medium, it is characterised in that the program for the protection file copy right that is stored with the storage medium, the guarantor The program of shield file copy right realizes the protection file copy right as any one of claim 1 to 8 when being executed by processor Each corresponding step of method.
CN201710365734.3A 2017-05-22 2017-05-22 Method, system and storage medium for protecting file copyright Active CN107256346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710365734.3A CN107256346B (en) 2017-05-22 2017-05-22 Method, system and storage medium for protecting file copyright

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710365734.3A CN107256346B (en) 2017-05-22 2017-05-22 Method, system and storage medium for protecting file copyright

Publications (2)

Publication Number Publication Date
CN107256346A true CN107256346A (en) 2017-10-17
CN107256346B CN107256346B (en) 2021-01-05

Family

ID=60028174

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710365734.3A Active CN107256346B (en) 2017-05-22 2017-05-22 Method, system and storage medium for protecting file copyright

Country Status (1)

Country Link
CN (1) CN107256346B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107993182A (en) * 2017-12-08 2018-05-04 上饶师范学院 Multiplying property watermark embedding method, extracting method and relevant apparatus
CN108737895A (en) * 2018-06-06 2018-11-02 北京酷我科技有限公司 A kind of method that static images synthesize anti-fake video
CN108777814A (en) * 2018-06-06 2018-11-09 北京酷我科技有限公司 A kind of method of static images synthetic video
CN109040760A (en) * 2018-08-19 2018-12-18 同创蓝天投资管理(北京)有限公司 The guard method of network image copyright information, device and storage medium
CN109766675A (en) * 2019-01-09 2019-05-17 珠海丹德图像技术有限公司 A kind of copyright information identifying system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1635469A (en) * 2003-12-25 2005-07-06 中国科学院自动化研究所 Protecting method for digital media distribution and play
CN101021941A (en) * 2007-03-23 2007-08-22 北京理工大学 Multi-channel filter group-based multifunction digital watermark method
CN102157154A (en) * 2011-01-28 2011-08-17 桂林电子科技大学 Audio-content-based non-uniform discrete cosine transform audio reliability authentication method
CN104123693A (en) * 2014-06-26 2014-10-29 宁波大学 Multi-functional digital watermarking method for three-dimensional picture
CN105323209A (en) * 2014-06-05 2016-02-10 江苏博智软件科技有限公司 Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1635469A (en) * 2003-12-25 2005-07-06 中国科学院自动化研究所 Protecting method for digital media distribution and play
CN101021941A (en) * 2007-03-23 2007-08-22 北京理工大学 Multi-channel filter group-based multifunction digital watermark method
CN102157154A (en) * 2011-01-28 2011-08-17 桂林电子科技大学 Audio-content-based non-uniform discrete cosine transform audio reliability authentication method
CN105323209A (en) * 2014-06-05 2016-02-10 江苏博智软件科技有限公司 Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology
CN104123693A (en) * 2014-06-26 2014-10-29 宁波大学 Multi-functional digital watermarking method for three-dimensional picture

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘少峰: "视频数字水印的研究与应用", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107993182A (en) * 2017-12-08 2018-05-04 上饶师范学院 Multiplying property watermark embedding method, extracting method and relevant apparatus
CN107993182B (en) * 2017-12-08 2021-06-22 上饶师范学院 Multiplicative watermark embedding method, multiplicative watermark extracting method and related device
CN108737895A (en) * 2018-06-06 2018-11-02 北京酷我科技有限公司 A kind of method that static images synthesize anti-fake video
CN108777814A (en) * 2018-06-06 2018-11-09 北京酷我科技有限公司 A kind of method of static images synthetic video
CN109040760A (en) * 2018-08-19 2018-12-18 同创蓝天投资管理(北京)有限公司 The guard method of network image copyright information, device and storage medium
CN109766675A (en) * 2019-01-09 2019-05-17 珠海丹德图像技术有限公司 A kind of copyright information identifying system and method
CN109766675B (en) * 2019-01-09 2022-04-08 珠海丹德图像技术有限公司 Copyright information identification system and method

Also Published As

Publication number Publication date
CN107256346B (en) 2021-01-05

Similar Documents

Publication Publication Date Title
CN107256346A (en) Protect method, system and the storage medium of file copy right
CN109445894A (en) A kind of screenshot method and electronic equipment
CN109409244B (en) Output method of object placement scheme and mobile terminal
CN107784232B (en) Picture processing method and mobile terminal
CN107256530A (en) Adding method, mobile terminal and the readable storage medium storing program for executing of picture watermark
CN108989678A (en) A kind of image processing method, mobile terminal
CN107846352A (en) A kind of method for information display, mobile terminal
CN107808084A (en) A kind of touch operation method and mobile terminal
CN108920119A (en) A kind of sharing method and mobile terminal
CN109241775A (en) A kind of method for secret protection and terminal
CN107784089A (en) A kind of storage method of multi-medium data, processing method and mobile terminal
CN108682040A (en) A kind of sketch image generation method, terminal and computer readable storage medium
CN107748848A (en) A kind of information processing method and mobile terminal
CN108573307A (en) A kind of method and terminal of processing neural network model file
CN110990849A (en) Encryption and decryption method for private data and terminal
CN108171034A (en) A kind of method and terminal for protecting privacy
CN110457879A (en) Object displaying method and terminal device
CN109271779A (en) A kind of installation packet inspection method, terminal device and server
CN107864086A (en) The quick sharing method of information, mobile terminal and computer-readable recording medium
CN107273024A (en) A kind of method and apparatus for realizing application data processing
CN108109188B (en) Image processing method and mobile terminal
CN107358083A (en) A kind of information processing method, terminal and computer-readable recording medium
CN110213438A (en) A kind of processing method and terminal device of application program
CN107967652B (en) A kind of information sharing method sends lateral terminal, receives lateral terminal and server
TW201209655A (en) Touch control system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant