CN108229114A - Based on random watermark distributed cryptography file, verification and the method and its application of retrospect - Google Patents
Based on random watermark distributed cryptography file, verification and the method and its application of retrospect Download PDFInfo
- Publication number
- CN108229114A CN108229114A CN201810139951.5A CN201810139951A CN108229114A CN 108229114 A CN108229114 A CN 108229114A CN 201810139951 A CN201810139951 A CN 201810139951A CN 108229114 A CN108229114 A CN 108229114A
- Authority
- CN
- China
- Prior art keywords
- file
- document
- electronic document
- random
- watermark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000012795 verification Methods 0.000 title claims abstract description 25
- 238000000926 separation method Methods 0.000 claims description 4
- 239000002131 composite material Substances 0.000 claims description 3
- 238000005286 illumination Methods 0.000 claims description 2
- 230000000149 penetrating effect Effects 0.000 claims description 2
- 230000004044 response Effects 0.000 claims description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims 1
- 230000002265 prevention Effects 0.000 abstract description 4
- 230000006870 function Effects 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Abstract
The present invention relates to a kind of based on random watermark distributed cryptography file, verification and the method and its application of retrospect, the ciphering process comprising file, the verification of file, trace back process composition;File encryption is included to the encryption of electronic document metadata and the encryption of electronic document format text and image;The verification of file is to compare the paper document of electronic paper printer and true electronic document, verifies that its paper document is consistent with electronic document and authenticity;The retrospect of file traces the metadata information of file by scanning patter identifier information.The present invention, in a controllable state, avoids copying the generation of file and prevention, the consistent and authenticity for identifying file by the generation to file encryption file and circulation.
Description
Technical field
The present invention relates to the methods for judging the file true and false, and in particular to one kind is based on random watermark distributed cryptography file, tests
Card and the method and its application of retrospect.
Background technology
At present, the hundreds of millions of file in China is to some extent in giving away secrets, among the state broken one's promise, the authenticity of file
It is difficult to even it can not verify and ensure.A kind of document security and verification, retroactive method based on random watermark distributed cryptography, comprising
The ciphering process of file, the verification of file, trace back process, by the generation to file encryption file and circulation in one
Controllable state avoids copying the generation of file and prevention, the consistent and authenticity for identifying file.
Invention content
The present invention proposes a kind of based on random watermark distributed cryptography file, verification and the method and its application of retrospect.It adds
Decryption method is rigorous, retrospect is simple, effectively avoids copying the generation and prevention of file, and has effectively achieved the consistent of identification file
And authenticity.
Technical program of the present invention lies in:
A kind of method based on random watermark distributed cryptography file, is characterized in that, this method includes:
(1)Prepare a electronic document to be encrypted in computer systems;
(2)It treats in encrypted electronic document and is encrypted using plain code information at random, the plain code information in computer system with leading to
The private mark information for crossing Encryption Algorithm acquisition matches one by one;
(3)Electronic document metadata is encrypted;
(4)Electronic document is overlapped using random watermark;Text in electronic document and image are laminated using random watermark,
With electronic document metadata information and content information composite document fingerprint, and encode;
(5)Document No. is converted into graphical identifier;
(6)Graphical identifier is laid on the region that predetermined electronic document arbitrarily sets;The electronic document has been encrypted
Into.
Above-mentioned random watermark is digital pattern, random character, character string or the code-point of geometry.
Above-mentioned graphical identifier is identifiable graphical identifier, including one-dimension code and Quick Response Code.
The above-mentioned region being overlapped using random watermark to electronic document is consolidated for entire electronic document or electronic document
Determine region.
Above-mentioned electronic document is exportable printing type formatted file, including but not limited to text file, picture file, image
File and drawing file.
A kind of verification that encryption file is obtained to the above method and retroactive method, are characterized in that, this method includes:
(1)Prepare to be distributed paper document to be verified with random watermark;
(2)Paper document to be verified is scanned by image capture device;
(3)Graphical identifier is detected in paper document, image file;
(4)By scanning patter identifier, identify and decode;
(5)The consistency of the random watermark in paper document and electronic document is verified according to decoded information;It is tested according to decoded information
The consistency of paper document and the random watermark in image file is demonstrate,proved, and traces the metadata of original electronic file;
(6)Comprehensive descision is carried out, and obtain the result of the file true and false to the file forged document and changed.
Color separation printing technique is used during the random watermark printing of above-mentioned paper document to be verified.
Above-mentioned comprehensive descision:
It is random including the paper document after the true electronic document with random watermark or printing is compared with the file forged
Watermark will not be overlapped;
Or/and the random watermark of the paper document after the true electronic paper printer with random watermark in ultraviolet radiator illumination
It can be presented under penetrating, itself and the random watermark information on electronic document are compared, verify the consistency of paper document and electronic document.
The metadata of above-mentioned retrospect original electronic file:Computer system accesses identifier's mobile phone, is identified by scanning patter
Symbol, and identifying code is sent to verify the metadata of retrospect file with identifier's mobile phone.
A kind of application for the verification and retroactive method that encryption file is obtained to the above method, is characterized in that, works as institute
When stating encryption file as production data information, the verification and retroactive method are used to trace product.
The technical effects of the invention are that:
It is a kind of based on random watermark distributed cryptography file, verification and the method and its application of retrospect, file encryption is included to file
Metadata encryption, using random watermark and graphical identifier electronic document format text and image are laminated and encrypted;It will
Encrypted file is printed as paper document using color separation printing technique or is swept paper document using Color Image Acquisition equipment
Image file is retouched into, graphical identifier is detected in paper document, image file, by scanning patter identifier, identification is simultaneously
Decoding;The consistency of random watermark in paper document and electronic document is verified according to decoded information;Paper is verified according to decoded information
The consistency of random watermark in matter file and image file, and trace the metadata information of original electronic file.Present invention encryption
Adopt a rigorous approach, trace simple, effectively avoid copying the generation and prevention of file, and have effectively achieved the consistent of identification file and
Authenticity.
Specific embodiment
A kind of document security and verification, retroactive method based on random watermark distributed cryptography, it by file encryption, verification and
Trace back process forms.The file encryption process is as follows:
(1)Prepare a electronic document to be encrypted in computer systems;
(2)It treats certain text or images in encrypted electronic document at random to encrypt using plain code, plain code information in system with leading to
The private mark information for crossing Encryption Algorithm acquisition corresponds;The Encryption Algorithm of the present invention can realize its described function suitable for all
Encryption Algorithm;
(3)Electronic document metadata is encrypted;Metadata includes character, date of formation, form etc.;
(4)The fixed area of entire electronic document or electronic document is overlapped using random watermark;Use random watermark pair
Text and image are laminated and with electronic document metadata information and content information composite document fingerprint and are encoded in electronic document;
(5)Document No. is converted into graphical identifier;
(6)Graphical identifier is laid on a certain region of predetermined electronic document;A certain region can be that user's custom is fixed
The arbitrary region of justice;
(7)By the electronic paper printer with random watermark into paper document.
Specific implementation process is as follows:
1) plug-in unit is accessed in office, WPS or alternative document software for editing, layout files format editing software;
2)After accessing plug-in unit success, office, WPS or alternative document software for editing can increase newly【Add watermark】、【It is anti-fake to beat
Print】Etc. functions;
3)The editor of file is completed in office, WPS or alternative document software for editing, forms file to be encrypted;
4)It treats at random and text or image is write from memory in encrypted electronic document using plain code encryption;
5)It uses【Add watermark】Function selects " single page watermark " or " multipage watermark ";Selection is " using random watermark to electronics
Text and image laminate in file " or selection " to the fixed area of entire electronic document or electronic document using random watermark into
Row superposition ".It cannot be edited again after electronic document addition random watermark to be encrypted;
6)After the completion of adding watermark, use【Anti-counterfeiting printing】By encrypted electronic document using color separation printing technique, it is printed as
Paper document;The summary info that every page content is associated with during anti-counterfeiting printing automatically generates in some region of file every page
Graphical identifier, the graphical identifier have uniqueness;It graphical identifier formation zone can be self-defined.
The electronic document verification and trace back process are as follows:
(1)Paper document to be verified is passed through into Color Image Acquisition device scan;
(2)Graphical identifier is detected in paper document, image file;
(3)By scanning patter identifier, identify and decode;
(4)The consistency of the random watermark in paper document and electronic document is verified according to decoded information;It is tested according to decoded information
The consistency of paper document and the random watermark in image file is demonstrate,proved, and traces the metadata of original electronic file;
(5)Comprehensive descision is carried out, and obtain the result of the file true and false to the file forged document and changed;
(6)Identifying code is sent to verify the metadata of retrospect file by scanning patter identifier, and with identifier's mobile phone.
Specifically implementation process is:
(1)It has been encrypted on paper document to be verified using ultraviolet light irradiation, random watermark can be presented in paper document, will be in
Existing random watermark information is compared with the random watermark information on true electronic document, verification paper document and electronics text
The consistency of part;
(2)Graphical identifier is detected in paper document, scanning patter identifier is identified and decoded, by the figure of paper document
Shape identifier decoded information and the decoded information of the graphical identifier of true electronic document compare, verification paper document and electronics text
The consistency of part;
(3)If true paper document, random watermark and the random watermark of true electronic document that paper document is presented can weigh
It is folded;The decoded information of graphical identifier in paper document is consistent with true electronic document information;
If file is copied, the random watermark that paper document is presented will not be overlapped with the random watermark of true electronic document;Papery
The decoded information of graphical identifier in file has differences with true electronic document information;
(4)Graphical identifier in scanning recognition paper document, the phone number of input validation people obtain identifying code, Ke Yicha
Ask and trace the metadata information of file;
(5)Encrypted paper document is scanned using Color Image Acquisition equipment, forms image file;
(6)Compare paper document and the consistency of random watermark in image file;
(7)Graphical identifier, scanning recognition graphical identifier are detected in image file, and is decoded, is compared in paper document
The consistency of the decoded information of graphical identifier detected in the decoded information and image file of the graphical identifier detected,
Judge the authenticity of image file;
(8)Graphical identifier in scanning recognition image file, the phone number of input validation people obtain identifying code, Ke Yicha
Ask and trace the metadata information of file.
The present invention can also be a kind of application for the verification and retroactive method that encryption file is obtained to the above method, add when described
When ciphertext part is production data information, the verification and retroactive method are used to trace product, obtain production data information,
Judge the true and false of product.
Claims (10)
- A kind of 1. method based on random watermark distributed cryptography file, which is characterized in that this method includes:(1)Prepare a electronic document to be encrypted in computer systems;(2)It treats in encrypted electronic document and is encrypted using plain code information at random, the plain code information in computer system with leading to The private mark information for crossing Encryption Algorithm acquisition matches one by one;(3)Electronic document metadata is encrypted;(4)Electronic document is overlapped using random watermark;Text in electronic document and image are laminated using random watermark, With electronic document metadata information and content information composite document fingerprint, and encode;(5)Document No. is converted into graphical identifier;(6)Graphical identifier is laid on the region that predetermined electronic document arbitrarily sets;The electronic document has been encrypted Into.
- 2. the method according to claim 1 based on random watermark distributed cryptography file, it is characterised in that:The random watermark Digital pattern, random character, character string or code-point for geometry.
- 3. the method according to claim 1 based on random watermark distributed cryptography file, it is characterised in that:The pattern identification It accords with as identifiable graphical identifier, including one-dimension code and Quick Response Code.
- 4. the method according to claim 1 based on random watermark distributed cryptography file, it is characterised in that:It is described to use at random Watermark is to fixed area of the region that electronic document is overlapped for entire electronic document or electronic document.
- 5. the method based on random watermark distributed cryptography file according to Claims 1 to 4 is any, it is characterised in that:It is described Electronic document is exportable printing type formatted file, including but not limited to text file, picture file, image file and drawing text Part.
- 6. a kind of verification that encryption file is obtained to claim 1 the method and retroactive method, which is characterized in that this method packet It includes:(1)Prepare to be distributed paper document to be verified with random watermark;(2)Paper document to be verified is scanned by image capture device;(3)Graphical identifier is detected in paper document, image file;(4)By scanning patter identifier, identify and decode;(5)The consistency of the random watermark in paper document and electronic document is verified according to decoded information;It is tested according to decoded information The consistency of paper document and the random watermark in image file is demonstrate,proved, and traces the metadata of original electronic file;(6)Comprehensive descision is carried out, and obtain the result of the file true and false to the file forged document and changed.
- 7. verification and retroactive method according to claim 6, it is characterised in that:The random water of the paper document to be verified Color separation printing technique is used during print printing.
- 8. verification and retroactive method according to claim 7, which is characterized in thatThe comprehensive descision:It is random including the paper document after the true electronic document with random watermark or printing is compared with the file forged Watermark will not be overlapped;Or/and the random watermark of the paper document after the true electronic paper printer with random watermark in ultraviolet radiator illumination It can be presented under penetrating, itself and the random watermark information on electronic document are compared, verify the consistency of paper document and electronic document.
- 9. verification and retroactive method according to claim 8, it is characterised in that:The metadata of the retrospect original electronic file: Computer system accesses identifier's mobile phone, by scanning patter identifier, and sends identifying code with identifier's mobile phone and is chased after to verify It traces back the metadata of file.
- 10. a kind of application for the verification and retroactive method that encryption file is obtained to claim 1 the method, which is characterized in that When the encryption file is production data information, the verification and retroactive method are used to trace product.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810139951.5A CN108229114A (en) | 2018-02-11 | 2018-02-11 | Based on random watermark distributed cryptography file, verification and the method and its application of retrospect |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810139951.5A CN108229114A (en) | 2018-02-11 | 2018-02-11 | Based on random watermark distributed cryptography file, verification and the method and its application of retrospect |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108229114A true CN108229114A (en) | 2018-06-29 |
Family
ID=62661546
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810139951.5A Pending CN108229114A (en) | 2018-02-11 | 2018-02-11 | Based on random watermark distributed cryptography file, verification and the method and its application of retrospect |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108229114A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111913673A (en) * | 2020-07-28 | 2020-11-10 | 立讯智造(浙江)有限公司 | Method, device and equipment for managing controlled files |
CN112417387A (en) * | 2020-11-18 | 2021-02-26 | 国家电网有限公司 | Dark watermark display identification device based on computer identification and identification method thereof |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1385823A (en) * | 2002-04-01 | 2002-12-18 | 谭寅生 | Ticket and security ciphering and identifying method based on identified fibre random distribution |
WO2005122114A1 (en) * | 2004-06-10 | 2005-12-22 | Protection Technology Limited | Water marks injector |
CN103942845A (en) * | 2014-03-28 | 2014-07-23 | 浪潮软件集团有限公司 | Method for checking electronic invoice |
CN107451820A (en) * | 2016-04-29 | 2017-12-08 | 卢念秋 | On line, multiple, dynamic anti-fake under line, anti-channel conflict, can traceability system |
-
2018
- 2018-02-11 CN CN201810139951.5A patent/CN108229114A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1385823A (en) * | 2002-04-01 | 2002-12-18 | 谭寅生 | Ticket and security ciphering and identifying method based on identified fibre random distribution |
WO2005122114A1 (en) * | 2004-06-10 | 2005-12-22 | Protection Technology Limited | Water marks injector |
CN103942845A (en) * | 2014-03-28 | 2014-07-23 | 浪潮软件集团有限公司 | Method for checking electronic invoice |
CN107451820A (en) * | 2016-04-29 | 2017-12-08 | 卢念秋 | On line, multiple, dynamic anti-fake under line, anti-channel conflict, can traceability system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111913673A (en) * | 2020-07-28 | 2020-11-10 | 立讯智造(浙江)有限公司 | Method, device and equipment for managing controlled files |
CN112417387A (en) * | 2020-11-18 | 2021-02-26 | 国家电网有限公司 | Dark watermark display identification device based on computer identification and identification method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3803378B2 (en) | Secure copy of confidential documents | |
JP5064563B2 (en) | Cryptographic system using image puzzle type encrypted image | |
US8477379B2 (en) | Secure document workflow | |
JP5011233B2 (en) | Information output system, method and program for falsification detection | |
CN101686294B (en) | Embedded type file information security management system | |
US20060177094A1 (en) | A system for embedding, extracting, and executing self-governing behavior and use controls within digital medium content | |
JP2008009811A (en) | Printing system, print control method, and program | |
CN107918791A (en) | Quick Response Code generation, coding/decoding method and device in Quick Response Code reproduction process | |
JP2003152989A (en) | Image processing device, image processing method, program, and storage medium | |
CN107103577A (en) | Half fragile uniqueness image watermark insertion and extracting method for integrity protection | |
CN101359214B (en) | Security document printing system and method of controlling the same | |
CN108229114A (en) | Based on random watermark distributed cryptography file, verification and the method and its application of retrospect | |
CN109614805A (en) | A kind of generation that document is anti-fake and recognition methods and printing driving and system | |
CN101170626B (en) | Information processing apparatus, information processing method | |
WO2020237881A1 (en) | Method and apparatus for injecting anti-counterfeit information, computer device, and storage medium | |
JP6208643B2 (en) | Print management for on-demand print jobs | |
KR101573857B1 (en) | A Printed Document Having Function Of Preventing From Forging/Manipulating, The Method Thereof and The Inspecting Method Of The Printed Document | |
KR102138077B1 (en) | System and method for preventing forgery and alteration of documents | |
JP2006074570A (en) | Network printing system and security system of document | |
CN115861020A (en) | Image processing method and device | |
CN104484586B (en) | Software copyright protecting method | |
JP2007166342A (en) | Device and method for generating image, and image reader | |
KR101339306B1 (en) | Security document | |
JP4260076B2 (en) | Document creation device, document verification device, document creation method, document verification method, document creation program, document verification program, recording medium storing document creation program, and recording medium storing document verification program | |
JP2018089840A (en) | Method to manufacture printed matter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180629 |