CN108229114A - Based on random watermark distributed cryptography file, verification and the method and its application of retrospect - Google Patents

Based on random watermark distributed cryptography file, verification and the method and its application of retrospect Download PDF

Info

Publication number
CN108229114A
CN108229114A CN201810139951.5A CN201810139951A CN108229114A CN 108229114 A CN108229114 A CN 108229114A CN 201810139951 A CN201810139951 A CN 201810139951A CN 108229114 A CN108229114 A CN 108229114A
Authority
CN
China
Prior art keywords
file
document
electronic document
random
watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810139951.5A
Other languages
Chinese (zh)
Inventor
吴联成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mdt Infotech Ltd In Shaanxi
Original Assignee
Mdt Infotech Ltd In Shaanxi
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mdt Infotech Ltd In Shaanxi filed Critical Mdt Infotech Ltd In Shaanxi
Priority to CN201810139951.5A priority Critical patent/CN108229114A/en
Publication of CN108229114A publication Critical patent/CN108229114A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Abstract

The present invention relates to a kind of based on random watermark distributed cryptography file, verification and the method and its application of retrospect, the ciphering process comprising file, the verification of file, trace back process composition;File encryption is included to the encryption of electronic document metadata and the encryption of electronic document format text and image;The verification of file is to compare the paper document of electronic paper printer and true electronic document, verifies that its paper document is consistent with electronic document and authenticity;The retrospect of file traces the metadata information of file by scanning patter identifier information.The present invention, in a controllable state, avoids copying the generation of file and prevention, the consistent and authenticity for identifying file by the generation to file encryption file and circulation.

Description

Based on random watermark distributed cryptography file, verification and the method and its application of retrospect
Technical field
The present invention relates to the methods for judging the file true and false, and in particular to one kind is based on random watermark distributed cryptography file, tests Card and the method and its application of retrospect.
Background technology
At present, the hundreds of millions of file in China is to some extent in giving away secrets, among the state broken one's promise, the authenticity of file It is difficult to even it can not verify and ensure.A kind of document security and verification, retroactive method based on random watermark distributed cryptography, comprising The ciphering process of file, the verification of file, trace back process, by the generation to file encryption file and circulation in one Controllable state avoids copying the generation of file and prevention, the consistent and authenticity for identifying file.
Invention content
The present invention proposes a kind of based on random watermark distributed cryptography file, verification and the method and its application of retrospect.It adds Decryption method is rigorous, retrospect is simple, effectively avoids copying the generation and prevention of file, and has effectively achieved the consistent of identification file And authenticity.
Technical program of the present invention lies in:
A kind of method based on random watermark distributed cryptography file, is characterized in that, this method includes:
(1)Prepare a electronic document to be encrypted in computer systems;
(2)It treats in encrypted electronic document and is encrypted using plain code information at random, the plain code information in computer system with leading to The private mark information for crossing Encryption Algorithm acquisition matches one by one;
(3)Electronic document metadata is encrypted;
(4)Electronic document is overlapped using random watermark;Text in electronic document and image are laminated using random watermark, With electronic document metadata information and content information composite document fingerprint, and encode;
(5)Document No. is converted into graphical identifier;
(6)Graphical identifier is laid on the region that predetermined electronic document arbitrarily sets;The electronic document has been encrypted Into.
Above-mentioned random watermark is digital pattern, random character, character string or the code-point of geometry.
Above-mentioned graphical identifier is identifiable graphical identifier, including one-dimension code and Quick Response Code.
The above-mentioned region being overlapped using random watermark to electronic document is consolidated for entire electronic document or electronic document Determine region.
Above-mentioned electronic document is exportable printing type formatted file, including but not limited to text file, picture file, image File and drawing file.
A kind of verification that encryption file is obtained to the above method and retroactive method, are characterized in that, this method includes:
(1)Prepare to be distributed paper document to be verified with random watermark;
(2)Paper document to be verified is scanned by image capture device;
(3)Graphical identifier is detected in paper document, image file;
(4)By scanning patter identifier, identify and decode;
(5)The consistency of the random watermark in paper document and electronic document is verified according to decoded information;It is tested according to decoded information The consistency of paper document and the random watermark in image file is demonstrate,proved, and traces the metadata of original electronic file;
(6)Comprehensive descision is carried out, and obtain the result of the file true and false to the file forged document and changed.
Color separation printing technique is used during the random watermark printing of above-mentioned paper document to be verified.
Above-mentioned comprehensive descision:
It is random including the paper document after the true electronic document with random watermark or printing is compared with the file forged Watermark will not be overlapped;
Or/and the random watermark of the paper document after the true electronic paper printer with random watermark in ultraviolet radiator illumination It can be presented under penetrating, itself and the random watermark information on electronic document are compared, verify the consistency of paper document and electronic document.
The metadata of above-mentioned retrospect original electronic file:Computer system accesses identifier's mobile phone, is identified by scanning patter Symbol, and identifying code is sent to verify the metadata of retrospect file with identifier's mobile phone.
A kind of application for the verification and retroactive method that encryption file is obtained to the above method, is characterized in that, works as institute When stating encryption file as production data information, the verification and retroactive method are used to trace product.
The technical effects of the invention are that:
It is a kind of based on random watermark distributed cryptography file, verification and the method and its application of retrospect, file encryption is included to file Metadata encryption, using random watermark and graphical identifier electronic document format text and image are laminated and encrypted;It will Encrypted file is printed as paper document using color separation printing technique or is swept paper document using Color Image Acquisition equipment Image file is retouched into, graphical identifier is detected in paper document, image file, by scanning patter identifier, identification is simultaneously Decoding;The consistency of random watermark in paper document and electronic document is verified according to decoded information;Paper is verified according to decoded information The consistency of random watermark in matter file and image file, and trace the metadata information of original electronic file.Present invention encryption Adopt a rigorous approach, trace simple, effectively avoid copying the generation and prevention of file, and have effectively achieved the consistent of identification file and Authenticity.
Specific embodiment
A kind of document security and verification, retroactive method based on random watermark distributed cryptography, it by file encryption, verification and Trace back process forms.The file encryption process is as follows:
(1)Prepare a electronic document to be encrypted in computer systems;
(2)It treats certain text or images in encrypted electronic document at random to encrypt using plain code, plain code information in system with leading to The private mark information for crossing Encryption Algorithm acquisition corresponds;The Encryption Algorithm of the present invention can realize its described function suitable for all Encryption Algorithm;
(3)Electronic document metadata is encrypted;Metadata includes character, date of formation, form etc.;
(4)The fixed area of entire electronic document or electronic document is overlapped using random watermark;Use random watermark pair Text and image are laminated and with electronic document metadata information and content information composite document fingerprint and are encoded in electronic document;
(5)Document No. is converted into graphical identifier;
(6)Graphical identifier is laid on a certain region of predetermined electronic document;A certain region can be that user's custom is fixed The arbitrary region of justice;
(7)By the electronic paper printer with random watermark into paper document.
Specific implementation process is as follows:
1) plug-in unit is accessed in office, WPS or alternative document software for editing, layout files format editing software;
2)After accessing plug-in unit success, office, WPS or alternative document software for editing can increase newly【Add watermark】、【It is anti-fake to beat Print】Etc. functions;
3)The editor of file is completed in office, WPS or alternative document software for editing, forms file to be encrypted;
4)It treats at random and text or image is write from memory in encrypted electronic document using plain code encryption;
5)It uses【Add watermark】Function selects " single page watermark " or " multipage watermark ";Selection is " using random watermark to electronics Text and image laminate in file " or selection " to the fixed area of entire electronic document or electronic document using random watermark into Row superposition ".It cannot be edited again after electronic document addition random watermark to be encrypted;
6)After the completion of adding watermark, use【Anti-counterfeiting printing】By encrypted electronic document using color separation printing technique, it is printed as Paper document;The summary info that every page content is associated with during anti-counterfeiting printing automatically generates in some region of file every page Graphical identifier, the graphical identifier have uniqueness;It graphical identifier formation zone can be self-defined.
The electronic document verification and trace back process are as follows:
(1)Paper document to be verified is passed through into Color Image Acquisition device scan;
(2)Graphical identifier is detected in paper document, image file;
(3)By scanning patter identifier, identify and decode;
(4)The consistency of the random watermark in paper document and electronic document is verified according to decoded information;It is tested according to decoded information The consistency of paper document and the random watermark in image file is demonstrate,proved, and traces the metadata of original electronic file;
(5)Comprehensive descision is carried out, and obtain the result of the file true and false to the file forged document and changed;
(6)Identifying code is sent to verify the metadata of retrospect file by scanning patter identifier, and with identifier's mobile phone.
Specifically implementation process is:
(1)It has been encrypted on paper document to be verified using ultraviolet light irradiation, random watermark can be presented in paper document, will be in Existing random watermark information is compared with the random watermark information on true electronic document, verification paper document and electronics text The consistency of part;
(2)Graphical identifier is detected in paper document, scanning patter identifier is identified and decoded, by the figure of paper document Shape identifier decoded information and the decoded information of the graphical identifier of true electronic document compare, verification paper document and electronics text The consistency of part;
(3)If true paper document, random watermark and the random watermark of true electronic document that paper document is presented can weigh It is folded;The decoded information of graphical identifier in paper document is consistent with true electronic document information;
If file is copied, the random watermark that paper document is presented will not be overlapped with the random watermark of true electronic document;Papery The decoded information of graphical identifier in file has differences with true electronic document information;
(4)Graphical identifier in scanning recognition paper document, the phone number of input validation people obtain identifying code, Ke Yicha Ask and trace the metadata information of file;
(5)Encrypted paper document is scanned using Color Image Acquisition equipment, forms image file;
(6)Compare paper document and the consistency of random watermark in image file;
(7)Graphical identifier, scanning recognition graphical identifier are detected in image file, and is decoded, is compared in paper document The consistency of the decoded information of graphical identifier detected in the decoded information and image file of the graphical identifier detected, Judge the authenticity of image file;
(8)Graphical identifier in scanning recognition image file, the phone number of input validation people obtain identifying code, Ke Yicha Ask and trace the metadata information of file.
The present invention can also be a kind of application for the verification and retroactive method that encryption file is obtained to the above method, add when described When ciphertext part is production data information, the verification and retroactive method are used to trace product, obtain production data information, Judge the true and false of product.

Claims (10)

  1. A kind of 1. method based on random watermark distributed cryptography file, which is characterized in that this method includes:
    (1)Prepare a electronic document to be encrypted in computer systems;
    (2)It treats in encrypted electronic document and is encrypted using plain code information at random, the plain code information in computer system with leading to The private mark information for crossing Encryption Algorithm acquisition matches one by one;
    (3)Electronic document metadata is encrypted;
    (4)Electronic document is overlapped using random watermark;Text in electronic document and image are laminated using random watermark, With electronic document metadata information and content information composite document fingerprint, and encode;
    (5)Document No. is converted into graphical identifier;
    (6)Graphical identifier is laid on the region that predetermined electronic document arbitrarily sets;The electronic document has been encrypted Into.
  2. 2. the method according to claim 1 based on random watermark distributed cryptography file, it is characterised in that:The random watermark Digital pattern, random character, character string or code-point for geometry.
  3. 3. the method according to claim 1 based on random watermark distributed cryptography file, it is characterised in that:The pattern identification It accords with as identifiable graphical identifier, including one-dimension code and Quick Response Code.
  4. 4. the method according to claim 1 based on random watermark distributed cryptography file, it is characterised in that:It is described to use at random Watermark is to fixed area of the region that electronic document is overlapped for entire electronic document or electronic document.
  5. 5. the method based on random watermark distributed cryptography file according to Claims 1 to 4 is any, it is characterised in that:It is described Electronic document is exportable printing type formatted file, including but not limited to text file, picture file, image file and drawing text Part.
  6. 6. a kind of verification that encryption file is obtained to claim 1 the method and retroactive method, which is characterized in that this method packet It includes:
    (1)Prepare to be distributed paper document to be verified with random watermark;
    (2)Paper document to be verified is scanned by image capture device;
    (3)Graphical identifier is detected in paper document, image file;
    (4)By scanning patter identifier, identify and decode;
    (5)The consistency of the random watermark in paper document and electronic document is verified according to decoded information;It is tested according to decoded information The consistency of paper document and the random watermark in image file is demonstrate,proved, and traces the metadata of original electronic file;
    (6)Comprehensive descision is carried out, and obtain the result of the file true and false to the file forged document and changed.
  7. 7. verification and retroactive method according to claim 6, it is characterised in that:The random water of the paper document to be verified Color separation printing technique is used during print printing.
  8. 8. verification and retroactive method according to claim 7, which is characterized in that
    The comprehensive descision:
    It is random including the paper document after the true electronic document with random watermark or printing is compared with the file forged Watermark will not be overlapped;
    Or/and the random watermark of the paper document after the true electronic paper printer with random watermark in ultraviolet radiator illumination It can be presented under penetrating, itself and the random watermark information on electronic document are compared, verify the consistency of paper document and electronic document.
  9. 9. verification and retroactive method according to claim 8, it is characterised in that:The metadata of the retrospect original electronic file: Computer system accesses identifier's mobile phone, by scanning patter identifier, and sends identifying code with identifier's mobile phone and is chased after to verify It traces back the metadata of file.
  10. 10. a kind of application for the verification and retroactive method that encryption file is obtained to claim 1 the method, which is characterized in that When the encryption file is production data information, the verification and retroactive method are used to trace product.
CN201810139951.5A 2018-02-11 2018-02-11 Based on random watermark distributed cryptography file, verification and the method and its application of retrospect Pending CN108229114A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810139951.5A CN108229114A (en) 2018-02-11 2018-02-11 Based on random watermark distributed cryptography file, verification and the method and its application of retrospect

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810139951.5A CN108229114A (en) 2018-02-11 2018-02-11 Based on random watermark distributed cryptography file, verification and the method and its application of retrospect

Publications (1)

Publication Number Publication Date
CN108229114A true CN108229114A (en) 2018-06-29

Family

ID=62661546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810139951.5A Pending CN108229114A (en) 2018-02-11 2018-02-11 Based on random watermark distributed cryptography file, verification and the method and its application of retrospect

Country Status (1)

Country Link
CN (1) CN108229114A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111913673A (en) * 2020-07-28 2020-11-10 立讯智造(浙江)有限公司 Method, device and equipment for managing controlled files
CN112417387A (en) * 2020-11-18 2021-02-26 国家电网有限公司 Dark watermark display identification device based on computer identification and identification method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1385823A (en) * 2002-04-01 2002-12-18 谭寅生 Ticket and security ciphering and identifying method based on identified fibre random distribution
WO2005122114A1 (en) * 2004-06-10 2005-12-22 Protection Technology Limited Water marks injector
CN103942845A (en) * 2014-03-28 2014-07-23 浪潮软件集团有限公司 Method for checking electronic invoice
CN107451820A (en) * 2016-04-29 2017-12-08 卢念秋 On line, multiple, dynamic anti-fake under line, anti-channel conflict, can traceability system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1385823A (en) * 2002-04-01 2002-12-18 谭寅生 Ticket and security ciphering and identifying method based on identified fibre random distribution
WO2005122114A1 (en) * 2004-06-10 2005-12-22 Protection Technology Limited Water marks injector
CN103942845A (en) * 2014-03-28 2014-07-23 浪潮软件集团有限公司 Method for checking electronic invoice
CN107451820A (en) * 2016-04-29 2017-12-08 卢念秋 On line, multiple, dynamic anti-fake under line, anti-channel conflict, can traceability system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111913673A (en) * 2020-07-28 2020-11-10 立讯智造(浙江)有限公司 Method, device and equipment for managing controlled files
CN112417387A (en) * 2020-11-18 2021-02-26 国家电网有限公司 Dark watermark display identification device based on computer identification and identification method thereof

Similar Documents

Publication Publication Date Title
JP3803378B2 (en) Secure copy of confidential documents
JP5064563B2 (en) Cryptographic system using image puzzle type encrypted image
US8477379B2 (en) Secure document workflow
JP5011233B2 (en) Information output system, method and program for falsification detection
CN101686294B (en) Embedded type file information security management system
US20060177094A1 (en) A system for embedding, extracting, and executing self-governing behavior and use controls within digital medium content
JP2008009811A (en) Printing system, print control method, and program
CN107918791A (en) Quick Response Code generation, coding/decoding method and device in Quick Response Code reproduction process
JP2003152989A (en) Image processing device, image processing method, program, and storage medium
CN107103577A (en) Half fragile uniqueness image watermark insertion and extracting method for integrity protection
CN101359214B (en) Security document printing system and method of controlling the same
CN108229114A (en) Based on random watermark distributed cryptography file, verification and the method and its application of retrospect
CN109614805A (en) A kind of generation that document is anti-fake and recognition methods and printing driving and system
CN101170626B (en) Information processing apparatus, information processing method
WO2020237881A1 (en) Method and apparatus for injecting anti-counterfeit information, computer device, and storage medium
JP6208643B2 (en) Print management for on-demand print jobs
KR101573857B1 (en) A Printed Document Having Function Of Preventing From Forging/Manipulating, The Method Thereof and The Inspecting Method Of The Printed Document
KR102138077B1 (en) System and method for preventing forgery and alteration of documents
JP2006074570A (en) Network printing system and security system of document
CN115861020A (en) Image processing method and device
CN104484586B (en) Software copyright protecting method
JP2007166342A (en) Device and method for generating image, and image reader
KR101339306B1 (en) Security document
JP4260076B2 (en) Document creation device, document verification device, document creation method, document verification method, document creation program, document verification program, recording medium storing document creation program, and recording medium storing document verification program
JP2018089840A (en) Method to manufacture printed matter

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180629