CN107358073A - A kind of method of the tracking watermark hidden embedded in Word document - Google Patents
A kind of method of the tracking watermark hidden embedded in Word document Download PDFInfo
- Publication number
- CN107358073A CN107358073A CN201710586125.0A CN201710586125A CN107358073A CN 107358073 A CN107358073 A CN 107358073A CN 201710586125 A CN201710586125 A CN 201710586125A CN 107358073 A CN107358073 A CN 107358073A
- Authority
- CN
- China
- Prior art keywords
- watermark
- bookmark
- word document
- following
- inlineshape
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 230000004048 modification Effects 0.000 claims description 4
- 238000012986 modification Methods 0.000 claims description 4
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims 1
- 238000001514 detection method Methods 0.000 description 4
- 230000002093 peripheral effect Effects 0.000 description 3
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention provides a kind of method of the tracking watermark hidden embedded in Word document, comprise the following steps:A bookmark is added in Word document, watermark content is added in bookmark, and be arranged to hiding;Bookmark is replaced with into an InlineShape object, and is arranged to invisible;InlineShape objects are converted into a Shape object, placed it on the random site of the fringe region outside text.The present invention is by the way that hiding watermark to be added to the fringe region outside document text and is arranged to invisible, on the one hand display of the watermark to former document content is avoided to have an impact, another aspect user's routine operation is touched less than the region, can be avoided during user's use because hiding watermark is changed or deleted by maloperation;It is simultaneously random to determine that watermark point of addition reduce it and be detected the probability that software detection arrives.By that with upper type, can solve the problems, such as that the hiding watermark in Word can not realize the purpose hidden and protected.
Description
Technical field
The invention belongs to field of information security technology, more particularly to a kind of hiding tracking watermark embedded in Word document
Method.
Background technology
Document tracing technology of divulging a secret towards Microsoft Word is when and where a kind of tracking Word document is being beaten
The technology opened, the technology can be applied to following situation:
1. after the user that secure documents are stolen or had no right to access opens, former document holder can pass through this technology
Know when and where document is being opened by other people in time;
2. after the machine is implanted Malware, if the machine document is stolen and opened by hacker, local user can be known
Dawn;
3. if desired for the network address for obtaining specified object, destination object can be given to send specific Word texts by this method
Shelves, bipartite network information can be obtained after object opening.
U.S.National Security Agency creates bait document so as to follow the trail of target group using this technology.Wherein used technology
Detailed operation principle be by the headerfooter of Word document every page add a remote picture, when document open
When, Word will send request of data according to the URL information of remote picture to remote server, and remote server is believed by asking
Cease to judge whether document is opened so that it is determined that whether document divulges a secret.
However, its used technology still has problems:
1. problem is hidden in watermark.Remote picture watermark is added in headerfooter, the structure of original document can be destroyed, especially
In the document in the absence of headerfooter, it will headerfooter occur and significantly identify.So it is easy to be identified by user,
So as to be deleted, normal function is influenceed;
2. watermark protection problem.The watermark of technology addition depends on the presence of headerfooter, when user performs header page
During the deletion action of pin, it will the watermark of addition is deleted, is unable to reach the effect of watermark protection;
3. safety problem.Former method adds watermark in fixed header position every time, and easily detected software detection arrives.
Therefore, it is necessary to develop a kind of new watermark adding method, to realize the purpose hidden and protected.
The content of the invention
In order to solve the above-mentioned technical problem, the invention provides a kind of tracking watermark hidden embedded in Word document
Method, this method can be supplied to the interface of program language by Word, can also according to file form directly to its content
Modify to realize.
Concrete technical scheme of the present invention is as follows:
The invention provides a kind of method of the tracking watermark hidden embedded in Word document, comprise the following steps:
S1:A bookmark is added in Word document, watermark content is added in the bookmark, and be arranged to hiding;
S2:The bookmark is replaced with into an InlineShape object, and the InlineShape objects are arranged to
It is invisible;
S3:The InlineShape objects are converted into a Shape object, the Shape objects are placed on text
On the random site of outer fringe region.
This method makes the naked eyes None- identified bookmark, avoided to original text by the way that bookmark is arranged into hiding and invisible
The display of shelves header or content impacts;Shape objects are placed on the random site of the fringe region outside text simultaneously,
User will not touch the region to the routine operation of document, so as to avoid the possibility that user misoperation deletes watermark.
Further, the watermark content is a URL character string, and the URL character strings are included described in a basis
The random string of Word document content generation.
The URL character strings can be following form:http://sample.com/f3fjgj16fvma2
drgqz2piejtkwduaxi/sample.gif.Wherein, f3fjgj16fvma2 drgqz2piejtkwduaxi be it is described with
Machine character string.
The random string of each document is unique, by identifying the random string, can distinguish each document,
It is easy to manager to be identified and manage document.
Further, the InlineShape objects are object picture or OLE files.
Further, the step S2 comprises the following steps:
S2.1:The bookmark is positioned, and the bookmark is chosen;
S2.2:The bookmark is replaced with into an InlineShape object;
S2.3:The InlineShape objects are dimensioned to 0, i.e. Width=0 Height=0 simultaneously.
By aforesaid operations, make the InlineShape objects invisible, avoid the display to the original page and produce shadow
Ring.
Further, the step S2 also comprises the following steps:
S2.4:The TransparentBackground of the InlineShape objects is arranged to True.
By aforesaid operations, the Inlineshape objects are arranged to transparent, further make watermark invisible.
Further, in the step S3, the Shape objects are placed on the random site of text outer edge region
Method it is as follows:
The Left and Top of the Shape objects are disposed as random negative value.
By aforesaid operations, the position of Shape objects is arranged to negative value, it is outer peripheral to be placed into document text
Optional position, so as to avoid the situation that user misoperation causes watermark to be deleted or change.The Left values and Top of shape objects
Value can be with identical, can also be different, to expand the scope of optional position.
Further, methods described also comprises the following steps:
S4:When the Word document is changed and the modification is saved, by original book in the Word document
Label are deleted, and add a new bookmark, and original URL character strings are included in the new bookmark;
S5:The new bookmark is handled according to the method described in the step S2 and S3, and the new bookmark is put
Put on the random site of text outer edge region.
Further, in the step S5, the new bookmark that the Word document generates when changing every time is both placed in
Diverse location.
When each Word document is changed, a new bookmark is regenerated, and each new bookmark is randomly placed
In the outer peripheral different position of text, so as to reduce watermark be detected software detected by fixed position detection method it is general
Rate.
Beneficial effects of the present invention are as follows:The invention provides a kind of tracking watermark hidden embedded in Word document
Method, by the fringe region being added to hiding watermark outside document text, and it is 0 to set its size, avoids watermark pair
The problem of being changed when the display of former document content is had an impact, former document header or content are shown;Add a watermark to just
The fringe region of literary outside, the region is that the operation of user can not touch, thus can avoid during user's use because
The problem of hiding watermark is changed or deleted by maloperation;By the way that watermark is added into the random order in text outer edge region every time
Put, and the point of addition of each watermark is different, passes through fixed position detection method so as to reduce its detected software
The probability detected.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the method for tracking watermark hidden embedded in Word document described in embodiment 1;
Fig. 2 is a kind of flow chart of the method for tracking watermark hidden embedded in Word document described in embodiment 2;
Fig. 3 is a kind of flow chart of the method for tracking watermark hidden embedded in Word document described in embodiment 3.
Embodiment
The present invention is described in further detail with following examples below in conjunction with the accompanying drawings.
Embodiment 1
As shown in figure 1, the embodiment of the present invention 1 provides a kind of side of the tracking watermark hidden embedded in Word document
Method, the interface (such as to operate interface of C# language) of program language can be both supplied to by Word, can also be according to text
The form of part is directly modified (as directly changed 16 system contents) to its content, is specifically comprised the following steps:
S1:A bookmark is added in Word document, watermark content is added in the bookmark, and be arranged to hiding;
The watermark content is a URL character string, is generated in the URL character strings comprising one according to the Word document content
Random string;
S2:The bookmark is replaced with into an InlineShape object, and the InlineShape objects are arranged to
It is invisible;The InlineShape objects can be object picture, or ole object;
S3:The InlineShape objects are converted into a Shape object, the Shape objects are placed on text
On the random site of outer fringe region.
A kind of method of the tracking watermark hidden embedded in Word document is present embodiments provided, by by hiding watermark
The fringe region being added to outside document text, and it is arranged to invisible, avoid display of the watermark to former document content and produce
Influence;The user's routine operation added a watermark to outside text touch less than fringe region, therefore user can be avoided to make
The problem of hiding watermark is changed or deleted because of maloperation during;By the way that watermark is added in text outer edge region
Random site, it can be reduced and be detected the probability that is detected by fixed position detection method of software.By with upper type,
Can solve the problems, such as that the hiding watermark in Word can not realize the purpose hidden and protected.
Embodiment 2
As shown in Fig. 2 the present embodiment 2 provides what a kind of insertion in Word document was hidden on the basis of embodiment 1
The method for following the trail of watermark, the embodiment 2 further define the step S2 and comprised the following steps:
S2.1:The bookmark is positioned, and the bookmark is chosen;
S2.2:The bookmark is replaced with into an InlineShape object;
S2.3:The InlineShape objects are dimensioned to 0, i.e. Width=0 Height=0 simultaneously.
By aforesaid operations, make the InlineShape objects invisible, avoid the display to the original page and produce shadow
Ring.
The step S2 can also comprise the following steps:
S2.4:The TransparentBackground of the InlineShape objects is arranged to True.
By aforesaid operations, the InlineShape objects are arranged to transparent, further make watermark invisible.
In the step S3, the Shape objects are placed on method on the random site of text outer edge region such as
Under:The Left and Top of the Shape objects are disposed as random negative value, preferably Left=-1, Top=-1.
Embodiment 3
As shown in figure 3, the present embodiment 3 provides what a kind of insertion in Word document was hidden on the basis of embodiment 1
The method for following the trail of watermark, the embodiment 3 further define methods described and also comprised the following steps:
S4:When the Word document is changed and the modification is saved, by original book in the Word document
Label are deleted, and add a new bookmark, and original URL character strings are included in the new bookmark;
S5:The new bookmark is handled according to the method described in the step S2 and S3, and the new bookmark is put
Put on the random site of text outer edge region.
When each Word document is changed, a new bookmark is regenerated, and each new bookmark is randomly placed
In the outer peripheral different position of text, so as to reduce watermark be detected software detected by fixed position detection method it is general
Rate.
Embodiment described above only expresses the several embodiments of the present invention, and its description is more specific and detailed, but simultaneously
Therefore the limitation to the scope of the claims of the present invention can not be interpreted as.It should be pointed out that for one of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the guarantor of the present invention
Protect scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (8)
- A kind of 1. method of the tracking watermark hidden embedded in Word document, it is characterised in that comprise the following steps:S1:A bookmark is added in Word document, watermark content is added in the bookmark, and be arranged to hiding;S2:The bookmark is replaced with into an InlineShape object, and the InlineShape objects are arranged to can not See;S3:The InlineShape objects are converted into a Shape object, the Shape objects are placed on outside text On the random site of fringe region.
- 2. the embedded method for following the trail of watermark hidden in Word document as claimed in claim 1, it is characterised in that the water Print content is a URL character string, and the URL character strings include a random character generated according to the Word document content String.
- 3. the embedded method for following the trail of watermark hidden in Word document as claimed in claim 1, it is characterised in that described InlineShape objects are object picture or ole object.
- 4. the embedded method for following the trail of watermark hidden in Word document as claimed in claim 1, it is characterised in that the step Rapid S2 comprises the following steps:S2.1:The bookmark is positioned, and the bookmark is chosen;S2.2:The bookmark is replaced with into an InlineShape object;S2.3:The InlineShape objects are dimensioned to 0, i.e. Width=0 Height=0 simultaneously.
- 5. the embedded method for following the trail of watermark hidden in Word document as claimed in claim 4, it is characterised in that the step Rapid S2 also comprises the following steps:S2.4:The TransparentBackground of the InlineShape objects is arranged to True.
- 6. the embedded method for following the trail of watermark hidden in Word document as claimed in claim 1, it is characterised in that the step In rapid S3, the method that the Shape objects are placed on the random site of text outer edge region is as follows:The Left and Top of the Shape objects are disposed as random negative value.
- 7. the embedded method for following the trail of watermark hidden in Word document as claimed in claim 2, it is characterised in that the side Method also comprises the following steps:S4:When the Word document is changed and the modification is saved, original bookmark in the Word document is deleted Remove, and add a new bookmark, original URL character strings are included in the new bookmark;S5:The new bookmark is handled according to the method described in the step S2 and S3, and the new bookmark is placed on On the random site of text outer edge region.
- 8. the embedded method for following the trail of watermark hidden in Word document as claimed in claim 7, it is characterised in that the step In rapid S5, the new bookmark that the Word document generates when changing every time is both placed in diverse location.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710586125.0A CN107358073B (en) | 2017-07-18 | 2017-07-18 | Method for embedding hidden tracing watermark in Word document |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710586125.0A CN107358073B (en) | 2017-07-18 | 2017-07-18 | Method for embedding hidden tracing watermark in Word document |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107358073A true CN107358073A (en) | 2017-11-17 |
CN107358073B CN107358073B (en) | 2020-07-21 |
Family
ID=60285052
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710586125.0A Active CN107358073B (en) | 2017-07-18 | 2017-07-18 | Method for embedding hidden tracing watermark in Word document |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107358073B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417479A (en) * | 2020-11-24 | 2021-02-26 | 深圳市方直科技股份有限公司 | Method and device for embedding protection identification item of document content |
CN112650956A (en) * | 2021-01-06 | 2021-04-13 | 携程旅游信息技术(上海)有限公司 | Excel document tracking method and system, electronic device and storage medium |
EP3852329A4 (en) * | 2018-10-09 | 2021-09-08 | Huawei Technologies Co., Ltd. | Document tracking method, gateway device and server |
CN117668787A (en) * | 2023-12-04 | 2024-03-08 | 湖南工商大学 | Electronic document identification encryption and anti-counterfeiting detection method based on convolutional neural network |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1259709A (en) * | 1998-09-17 | 2000-07-12 | 国际商业机器公司 | Method and system for embedding information in document |
CN1790420A (en) * | 2005-12-01 | 2006-06-21 | 北京北大方正电子有限公司 | Method and apparatus for embedding and detecting digital watermark in text file |
CN101982818A (en) * | 2005-12-09 | 2011-03-02 | 北京书生国际信息技术有限公司 | Processing method of document |
CN102096788A (en) * | 2009-12-11 | 2011-06-15 | 北大方正集团有限公司 | Method and device for encrypting official document and method and device for verifying official document |
-
2017
- 2017-07-18 CN CN201710586125.0A patent/CN107358073B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1259709A (en) * | 1998-09-17 | 2000-07-12 | 国际商业机器公司 | Method and system for embedding information in document |
CN1790420A (en) * | 2005-12-01 | 2006-06-21 | 北京北大方正电子有限公司 | Method and apparatus for embedding and detecting digital watermark in text file |
CN101982818A (en) * | 2005-12-09 | 2011-03-02 | 北京书生国际信息技术有限公司 | Processing method of document |
CN102096788A (en) * | 2009-12-11 | 2011-06-15 | 北大方正集团有限公司 | Method and device for encrypting official document and method and device for verifying official document |
Non-Patent Citations (1)
Title |
---|
逆世智尊: "在word里指定书签的位置插入图片", 《CSDN博客》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3852329A4 (en) * | 2018-10-09 | 2021-09-08 | Huawei Technologies Co., Ltd. | Document tracking method, gateway device and server |
CN112417479A (en) * | 2020-11-24 | 2021-02-26 | 深圳市方直科技股份有限公司 | Method and device for embedding protection identification item of document content |
CN112650956A (en) * | 2021-01-06 | 2021-04-13 | 携程旅游信息技术(上海)有限公司 | Excel document tracking method and system, electronic device and storage medium |
CN117668787A (en) * | 2023-12-04 | 2024-03-08 | 湖南工商大学 | Electronic document identification encryption and anti-counterfeiting detection method based on convolutional neural network |
CN117668787B (en) * | 2023-12-04 | 2024-06-14 | 湖南工商大学 | Electronic document identification encryption and anti-counterfeiting detection method based on convolutional neural network |
Also Published As
Publication number | Publication date |
---|---|
CN107358073B (en) | 2020-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11030311B1 (en) | Detecting and protecting against computing breaches based on lateral movement of a computer file within an enterprise | |
US10484424B2 (en) | Method and system for security protection of account information | |
RU2610254C2 (en) | System and method of determining modified web pages | |
CN107358073A (en) | A kind of method of the tracking watermark hidden embedded in Word document | |
EP1863240B1 (en) | Method and system for phishing detection | |
CN101504673B (en) | Method and system for recognizing doubtful fake website | |
CN101390068B (en) | Client side attack resistant phishing detection | |
CN106549980B (en) | Malicious C & C server determination method and device | |
US20080172738A1 (en) | Method for Detecting and Remediating Misleading Hyperlinks | |
CN110166465A (en) | Processing method, device, server and the storage medium of access request | |
WO2016201938A1 (en) | Multi-stage phishing website detection method and system | |
CN108200105A (en) | A kind of method and device for detecting fishing mail | |
RU2676247C1 (en) | Web resources clustering method and computer device | |
CN106845222A (en) | A kind of detection method and system of blackmailer's virus | |
JP2009059358A (en) | Phishing notification service | |
US7590698B1 (en) | Thwarting phishing attacks by using pre-established policy files | |
CN103491101A (en) | Phishing website detecting method and device and client-side | |
CN103647767A (en) | Website information display method and apparatus | |
CN104036190A (en) | Method and device for detecting page tampering | |
CN102801698A (en) | Uniform resource locator (URL) request time sequence-based detection method and system for malicious codes | |
JP2012088803A (en) | Malignant web code determination system, malignant web code determination method, and program for malignant web code determination | |
CN109284465A (en) | A kind of Web page classifying device construction method and its classification method based on URL | |
CN106790102A (en) | A kind of QR based on URL features yards of phishing recognition methods and system | |
Balamuralikrishna et al. | Mitigating Online Fraud by Ant phishing Model with URL & Image based Webpage Matching | |
CN113556347B (en) | Detection method, device and equipment for phishing mails and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200616 Address after: 100085 2302, 23 / F, building 4, yard 1, shangdishi street, Haidian District, Beijing Applicant after: Beijing Sima Technology Co., Ltd Address before: Yang Yanlu 101499 Beijing city Huairou District Yanqi Economic Development Zone No. 88 Applicant before: BEIJING ZHONGRUI XINGWANG TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |