CN108563929A - It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium - Google Patents

It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium Download PDF

Info

Publication number
CN108563929A
CN108563929A CN201810337396.7A CN201810337396A CN108563929A CN 108563929 A CN108563929 A CN 108563929A CN 201810337396 A CN201810337396 A CN 201810337396A CN 108563929 A CN108563929 A CN 108563929A
Authority
CN
China
Prior art keywords
file
concerning security
security matters
watermark
forms
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810337396.7A
Other languages
Chinese (zh)
Inventor
张双峻
何华荣
王志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen United Soft Polytron Technologies Inc
Original Assignee
Shenzhen United Soft Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen United Soft Polytron Technologies Inc filed Critical Shenzhen United Soft Polytron Technologies Inc
Priority to CN201810337396.7A priority Critical patent/CN108563929A/en
Publication of CN108563929A publication Critical patent/CN108563929A/en
Priority to PCT/CN2019/080492 priority patent/WO2019201077A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Abstract

The invention belongs to technical field of information processing, and in particular to and it is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium, include the following steps:The fileinfo for being shown in the file on terminal screen window is obtained, file type is determined according to fileinfo;If file type is confidential document, it is determined that concerning security matters display area of the forms of confidential document on terminal screen window;Add a watermark to concerning security matters display area.The present invention can change according to the forms of confidential document, only add corresponding watermark in the concerning security matters display area of confidential document, easy to operate, will not influence user's reading.

Description

It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium
Technical field
The invention belongs to technical field of information processing, and in particular to it is a kind of only in the method for concerning security matters Area generation watermark, be System, device and medium.
Background technology
With the development and progress of information technology, to protect digital media file property right, digital watermark technology to come into being And quick development is obtained.Under the prior art, digital watermark technology is a kind of watermark information is directly embedded into carrier of characters to work as In technology, this technology do not influence the use value of original vector.
The generation method of present watermark typically generates watermark on the specific region of display screen, or will Watermark is embedded into file.Watermark is generated in the specific region of display screen, this effect is not so good, because user may incite somebody to action File is moved to the region of not watermark, if full screen display watermark, and user's reading could be influenced.File is embedded watermark data into work as In, need active operation or advance operation, operation comparatively laborious.
Invention content
For the defects in the prior art, the present invention provides it is a kind of only the method for concerning security matters Area generation watermark, system, Device and medium, the present invention can change according to the forms of confidential document, and only in the concerning security matters display area of confidential document, addition is corresponding Watermark, it is easy to operate, will not influence user reading.
In a first aspect, the present invention provides a kind of only in the method for concerning security matters Area generation watermark, include the following steps:
The fileinfo for being shown in the file on terminal screen window is obtained, file type is determined according to fileinfo;
If file type is confidential document, it is determined that concerning security matters viewing area of the forms of confidential document on terminal screen window Domain;
Add a watermark to concerning security matters display area.
Preferably, the file type includes confidential document and ordinary file.
Preferably, described that file type is determined according to fileinfo, specially:
The document information in the name information or file of file is obtained according to fileinfo;
If keyword or document information that name information contains ciphering type file contain sensitive keyword, the text Part is confidential document, is otherwise ordinary file.
Preferably, concerning security matters display area of the forms of the determining confidential document on terminal screen window, specially:
The message hook being arranged by SetWindowsHookEx, when the frame size that is shown on terminal screen window and When position changes, message hook receives forms change notification;
After receiving forms change notification, sorted by the display of forms, on computing terminal screen window from top to bottom The size and coordinate range of each forms of display, it is aobvious to obtain concerning security matters of the forms of confidential document on terminal screen window Show region.
Second aspect, the present invention provides a kind of only in the system of concerning security matters Area generation watermark, is suitable for first aspect institute That states is a kind of only in the method for concerning security matters Area generation watermark, including:
File type determination unit, the fileinfo for obtaining the file being shown on terminal screen window, according to text Part information determines file type;
Concerning security matters area determination unit, if being confidential document for file type, it is determined that the forms of confidential document are in terminal Concerning security matters display area on screen window;
Watermark adding device, for adding a watermark to concerning security matters display area.
Preferably, the file type includes confidential document and ordinary file.
Preferably, described that file type is determined according to fileinfo, specially:
The document information in the name information or file of file is obtained according to fileinfo;
If keyword or document information that name information contains ciphering type file contain sensitive keyword, the text Part is confidential document, is otherwise ordinary file.
Preferably, concerning security matters display area of the forms of the determining confidential document on terminal screen window, specially:
The message hook being arranged by SetWindowsHookEx, when the frame size that is shown on terminal screen window and When position changes, message hook receives forms change notification;
After receiving forms change notification, sorted by the display of forms, on computing terminal screen window from top to bottom The size and coordinate range of each forms of display, it is aobvious to obtain concerning security matters of the forms of confidential document on terminal screen window Show region.
The third aspect is only set in the device of concerning security matters Area generation watermark, including processor, input the present invention provides a kind of Standby, output equipment and memory, the processor, input equipment, output equipment and memory are connected with each other, wherein described to deposit For reservoir for storing computer program, the computer program includes program instruction, and the processor is configured for calling institute Program instruction is stated, the method described in first aspect is executed.
Fourth aspect, the present invention provides a kind of computer readable storage medium, the computer storage media is stored with Computer program, the computer program include program instruction, and described program instruction makes the processing when being executed by a processor Device executes the method described in first aspect.
Beneficial effects of the present invention are:The present invention can change according to the forms of confidential document, only in the concerning security matters of confidential document Corresponding watermark is added in display area, easy to operate, will not influence user's reading.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described.In all the appended drawings, similar element Or part is generally identified by similar reference numeral.In attached drawing, each element or part might not be drawn according to actual ratio.
Fig. 1 is in the present embodiment only in the method flow diagram of concerning security matters Area generation watermark;
Fig. 2 is that Word file and txt file are shown in the schematic diagram on window in the present embodiment;
Fig. 3 is in the present embodiment only in the system construction drawing of concerning security matters Area generation watermark;
Fig. 4 is in the present embodiment only in the module frame chart of the device of concerning security matters Area generation watermark.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, element, component and/or its presence or addition gathered.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet computer of (for example, touch-screen display and/or touch tablet) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch tablet).
Embodiment one:
Present embodiments provide it is a kind of only in the method for concerning security matters Area generation watermark, as shown in Figure 1, including the following steps:
S1 obtains the fileinfo for being shown in the file on terminal screen window, file type is determined according to fileinfo. The file type includes confidential document and ordinary file, determines file type according to fileinfo described in step S1, specifically For:
The document information in the name information or file of file is obtained according to fileinfo;
If keyword or document information that name information contains ciphering type file contain sensitive keyword, the text Part is confidential document, is otherwise ordinary file.
The terminal screen window in the present embodiment include but not limited to mobile phone, computer and other fix or move end The screen window at end, before executing the method involved by the present embodiment, user can also be described by being equipped in terminal The APP of terminal carries out authentication and registration, obtains APPID and APPKEY;Later stage user can utilize the APPID and APPKEY logs in the software.It, can be after logging in software when user needs that a certain information is browsed or read Relevant information input interface editor and input information read requests are subsequently sent to generate the device of watermark, the generation watermark Device can be a server or server cluster;Described information read requests include but not limited to the title letter of file It includes the information such as word, image that document information in breath or file, which such as connects at data, the document information,.If name information contains ciphering type The keyword or document information of file contain sensitive keyword, then the file is confidential document, is otherwise ordinary file.
User can also input web page interlinkage in terminal by browser in the present embodiment, then open Webpage, Simultaneously input information read requests are subsequently sent to generate the device of watermark the information input interface editor of Webpage.It needs to carry out Illustrate, user's operation on a web browser and generates base contained in the processing mode and previous embodiment of the device of watermark This is similar, and details are not described herein.
S2, if file type is confidential document, it is determined that concerning security matters of the forms of confidential document on terminal screen window are aobvious Show region.This step S2 is specially:
The message hook being arranged by SetWindowsHookEx, when the frame size that is shown on terminal screen window and When position changes, message hook receives forms change notification;
After receiving forms change notification, sorted by the display of forms, on computing terminal screen window from top to bottom The size and coordinate range of each forms of display, it is aobvious to obtain concerning security matters of the forms of confidential document on terminal screen window Show region.
The message hook of SetWindowsHookEx described in the present embodiment is one of windows messaging treatment mechanism Sub- journey can be arranged to monitor certain message of specified window in platform, application program above, and the window monitored can be with It is that other processes are created.Hook Mechanism allows application program to intercept and capture processing window message or particular event.Such as user A Word file and a txt file are being opened, it is confidential document, a txt file to obtain Word file through step S1 For ordinary file, user is shown in using the display mode of small form on terminal screen window, and message hook obtains user's diminution The forms change notification of forms, as shown in Fig. 2, being shown in the schematic diagram on window for Word file and txt file.
Windows has z sequences, display sortord that can be divided into stacking display, stack display when showing forms Be displayed side by side, if Fig. 2 is that stacking is shown, including two layers of display, top layer shows to be txt file, and bottom shows to be Word File calculates the size and coordinate range of the two forms, obtains concerning security matters display area of the forms of Word file on window (display area of Word file subtracts the region blocked by txt file, as concerning security matters display area).
S3 adds a watermark to concerning security matters display area.
The advantages of watermark of the present embodiment includes digital watermarking, polar plot or other kinds of watermark, the digital watermarking It is:The mode of generation is simple, can fast be embedded in the short time in the concerning security matters region of corresponding information, when reducing user's waiting Between, improve the efficiency of watermark addition;Polar plot for bitmap compared to the advantage is that:Even user is in the screen of client On the corresponding information to be read it be amplified many times after watermark information will not be distorted, will not appear as multiple Pixel.
The method of the present embodiment, compared to tradition by document entire chapter add watermark mode for, according to confidential document Forms change, and only add corresponding watermark in the concerning security matters display area of confidential document, the variation of concerning security matters display area, and watermark is also therewith Variation, the method for the present embodiment is easy to operate, not only ensure that the safety of classified information, realize it is anti-fake trace to the source, protect copyright, but also not User's reading can be influenced, the pleasant content that must read other than concerning security matters region of user can be allowed, promote the Experience Degree of user, increasing The strong practicability of the present invention.
Embodiment two:
It present embodiments provides a kind of only in the system of concerning security matters Area generation watermark, is suitable for one kind described in embodiment one Only in the method for concerning security matters Area generation watermark, as shown in figure 3, including file type determination unit, concerning security matters area determination unit, water Print adding device etc.:
The file type determination unit, the fileinfo for obtaining the file being shown on terminal screen window, root File type is determined according to fileinfo.It is described that file type is determined according to fileinfo, specially:
The document information in the name information or file of file is obtained according to fileinfo;
If keyword or document information that name information contains ciphering type file contain sensitive keyword, the text Part is confidential document, is otherwise ordinary file.
The terminal screen window in the present embodiment include but not limited to mobile phone, computer and other fix or move end The screen window at end, before executing the method involved by the present embodiment, user can also be described by being equipped in terminal The APP of terminal carries out authentication and registration, obtains APPID and APPKEY;Later stage user can utilize the APPID and APPKEY logs in the software.It, can be after logging in software when user needs that a certain information is browsed or read Relevant information input interface editor and input information read requests are subsequently sent to generate the device of watermark, the generation watermark Device can be a server or server cluster;Described information read requests include but not limited to the title letter of file It includes the information such as word, image that document information in breath or file, which such as connects at data, the document information,.If name information contains ciphering type The keyword or document information of file contain sensitive keyword, then the file is confidential document, is otherwise ordinary file.
User can also input web page interlinkage in terminal by browser in the present embodiment, then open Webpage, Simultaneously input information read requests are subsequently sent to generate the device of watermark the information input interface editor of Webpage.It needs to carry out Illustrate, user's operation on a web browser and generates base contained in the processing mode and previous embodiment of the device of watermark This is similar, and details are not described herein.
The concerning security matters area determination unit, if being confidential document for file type, it is determined that the forms of confidential document exist Concerning security matters display area on terminal screen window.This unit is specifically used for:
The message hook being arranged by SetWindowsHookEx, when the frame size that is shown on terminal screen window and When position changes, message hook receives forms change notification;
After receiving forms change notification, sorted by the display of forms, on computing terminal screen window from top to bottom The size and coordinate range of each forms of display, it is aobvious to obtain concerning security matters of the forms of confidential document on terminal screen window Show region.
The message hook of SetWindowsHookEx described in the present embodiment is one of windows messaging treatment mechanism Sub- journey can be arranged to monitor certain message of specified window in platform, application program above, and the window monitored can be with It is that other processes are created.Hook Mechanism allows application program to intercept and capture processing window message or particular event.Such as user A Word file and a txt file are being opened, it is confidential document, a txt file to obtain Word file through step S1 For ordinary file, user is shown in using the display mode of small form on terminal screen window, and message hook obtains user's diminution The forms change notification of forms, as shown in Fig. 2, being shown in the schematic diagram on window for Word file and txt file.
Windows has z sequences, display sortord that can be divided into stacking display, stack display when showing forms Be displayed side by side, if Fig. 2 is that stacking is shown, including two layers of display, top layer shows to be txt file, and bottom shows to be Word File calculates the size and coordinate range of the two forms, obtains concerning security matters display area of the forms of Word file on window (display area of Word file subtracts the region blocked by txt file, as concerning security matters display area).
The watermark adding device, for adding a watermark to concerning security matters display area.
The advantages of watermark of the present embodiment includes digital watermarking, polar plot or other kinds of watermark, the digital watermarking It is:The mode of generation is simple, can fast be embedded in the short time in the concerning security matters region of corresponding information, when reducing user's waiting Between, improve the efficiency of watermark addition;Polar plot for bitmap compared to the advantage is that:Even user is in the screen of client On the corresponding information to be read it be amplified many times after watermark information will not be distorted, will not appear as multiple Pixel.
The system of the present embodiment, compared to tradition by document entire chapter add watermark mode for, according to confidential document Forms change, and only add corresponding watermark in the concerning security matters display area of confidential document, the variation of concerning security matters display area, and watermark is also therewith Variation, the method for the present embodiment is easy to operate, not only ensure that the safety of classified information, realize it is anti-fake trace to the source, protect copyright, but also not User's reading can be influenced, the pleasant content that must read other than concerning security matters region of user can be allowed, promote the Experience Degree of user, increasing The strong practicability of the present invention.
Embodiment three:
Present embodiments provide it is a kind of only in the device of concerning security matters Area generation watermark, as shown in figure 4, including processor 42, Input equipment 41, output equipment 44 and memory 43, the processor 42, input equipment 41, output equipment 44 and memory 43 It is connected with each other by communication bus 40, wherein for storing computer program, the computer program includes the memory 43 Program instruction, the processor 42 are configured for calling described program instruction, execute the method implemented described in one.
It should be appreciated that in embodiments of the present invention, alleged memory 43 may include that read-only memory and arbitrary access are deposited Reservoir, and provide instruction and data to processor 42.The a part of of memory 43 can also deposit including non-volatile random Reservoir.For example, memory 43 can also be stored with the relevant information of device type.
Processor 42 is for running or executing the operating system being stored in internal storage 43, various software programs, And the instruction set of itself, and for handling the number for coming from touch input unit or being received from other external input approach According to and instruction, to realize various functions.Processor 42 can include but is not limited to central processing unit (CPU), general image processing Device (GPU), microprocessor (MCU), digital signal processor (DSP), field programmable gate array (FPGA), application specific It is one or more in integrated circuit (ASIC).In some embodiments, processor 42 and Memory Controller 104 can be single It is realized on chip.In some other embodiments, they can be realized on chip independent of each other respectively.
Input equipment 41 can be camera (CAMERA or WEBCAM) etc., and camera is also known as camera computer, computer eye And electronic eyes etc., it is that a kind of video drives into the touch input unit such as equipment and numeric keypad or mechanical keyboard;It is described defeated It may include display (display) etc. to go out equipment 44.
In the specific implementation, processor 42 described in the embodiment of the present invention, input equipment 41, output equipment 44 are executable Realization method described in the embodiment of embodiment one, details are not described herein.
The device of the present embodiment, compared to tradition by document entire chapter add watermark mode for, according to confidential document Forms change, and only add corresponding watermark in the concerning security matters display area of confidential document, the variation of concerning security matters display area, and watermark is also therewith Variation, the method for the present embodiment is easy to operate, not only ensure that the safety of classified information, realize it is anti-fake trace to the source, protect copyright, but also not User's reading can be influenced, the pleasant content that must read other than concerning security matters region of user can be allowed, promote the Experience Degree of user, increasing The strong practicability of the present invention.
Example IV:
A kind of computer readable storage medium is present embodiments provided, the computer storage media is stored with computer journey Sequence, the computer program include program instruction, and described program instruction makes the processor execute reality when being executed by a processor Apply the method described in example one.
Specifically, the computer readable storage medium may include caching (Cache), high-speed random access memory (RAM), such as common double data rate Synchronous Dynamic Random Access Memory (DDR SDRAM), and may also include non-volatile Property memory (NVRAM), such as one or more read-only memory (ROM), disk storage equipment, flash memory (Flash) memory Equipment or other non-volatile solid state memory equipment such as CDs (CD-ROM, DVD-ROM), floppy disk or data tape etc..
Computer readable storage medium provided in this embodiment, program instruction realize basis and relate to when being executed by a processor The forms of ciphertext part change, and only add corresponding watermark, the variation of concerning security matters display area, water in the concerning security matters display area of confidential document Print also changes therewith, and the method for the present embodiment is easy to operate, both ensure that the safety of classified information, has realized and anti-fake trace to the source, protect Copyright, and user's reading is not interfered with, it can allow the pleasant content that must be read other than concerning security matters region of user, promote user's Experience Degree enhances the practicability of the present invention.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and method and step, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This A little functions are implemented in hardware or software actually, depend on the specific application and design constraint of technical solution.Specially Industry technical staff can use different methods to achieve the described function each specific application, but this realization is not It is considered as beyond the scope of this invention.
In several embodiments provided herein, it should be understood that described system and method can pass through it Its mode is realized.For example, system embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored or not executed.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, can also be during two or more units are integrated in one unit.It is above-mentioned integrated The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme should all cover in the claim of the present invention and the range of specification.

Claims (10)

1. a kind of only in the method for concerning security matters Area generation watermark, which is characterized in that include the following steps:
The fileinfo for being shown in the file on terminal screen window is obtained, file type is determined according to fileinfo;
If file type is confidential document, it is determined that concerning security matters display area of the forms of confidential document on terminal screen window;
Add a watermark to concerning security matters display area.
2. according to claim 1 a kind of only in the method for concerning security matters Area generation watermark, which is characterized in that the files classes Type includes confidential document and ordinary file.
3. according to claim 2 a kind of only in the method for concerning security matters Area generation watermark, which is characterized in that described according to text Part information determines file type, specially:
The document information in the name information or file of file is obtained according to fileinfo;
If keyword or document information that name information contains ciphering type file contain sensitive keyword, the file is Otherwise confidential document is ordinary file.
4. according to claim 1 a kind of only in the method for concerning security matters Area generation watermark, which is characterized in that the determination relates to Concerning security matters display area of the forms of ciphertext part on terminal screen window, specially:
The message hook being arranged by SetWindowsHookEx, when the frame size and position being shown on terminal screen window When changing, message hook receives forms change notification;
After receiving forms change notification, is sorted by the display of forms, shown from top to bottom on computing terminal screen window Each forms size and coordinate range, to obtain concerning security matters viewing area of the forms of confidential document on terminal screen window Domain.
5. a kind of only in the system of concerning security matters Area generation watermark, which is characterized in that be suitable for claim 1-4 any one of them A method of only in concerning security matters Area generation watermark, including:
File type determination unit, the fileinfo for obtaining the file being shown on terminal screen window, believes according to file Breath determines file type;
Concerning security matters area determination unit, if being confidential document for file type, it is determined that the forms of confidential document are in terminal screen Concerning security matters display area on window;
Watermark adding device, for adding a watermark to concerning security matters display area.
6. according to claim 5 a kind of only in the system of concerning security matters Area generation watermark, which is characterized in that the files classes Type includes confidential document and ordinary file.
7. according to claim 6 a kind of only in the system of concerning security matters Area generation watermark, which is characterized in that described according to text Part information determines file type, specially:
The document information in the name information or file of file is obtained according to fileinfo;
If keyword or document information that name information contains ciphering type file contain sensitive keyword, the file is Otherwise confidential document is ordinary file.
8. according to claim 5 a kind of only in the system of concerning security matters Area generation watermark, which is characterized in that the determination relates to Concerning security matters display area of the forms of ciphertext part on terminal screen window, specially:
The message hook being arranged by SetWindowsHookEx, when the frame size and position being shown on terminal screen window When changing, message hook receives forms change notification;
After receiving forms change notification, is sorted by the display of forms, shown from top to bottom on computing terminal screen window Each forms size and coordinate range, to obtain concerning security matters viewing area of the forms of confidential document on terminal screen window Domain.
9. a kind of only in the device of concerning security matters Area generation watermark, which is characterized in that including processor, input equipment, output equipment And memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing Computer program, the computer program include program instruction, and the processor is configured for calling described program instruction, holds Row method according to any one of claims 1-4.
10. a kind of computer readable storage medium, which is characterized in that the computer storage media is stored with computer program, The computer program includes program instruction, and described program instruction makes the processor execute such as right when being executed by a processor It is required that 1-4 any one of them methods.
CN201810337396.7A 2018-04-16 2018-04-16 It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium Pending CN108563929A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810337396.7A CN108563929A (en) 2018-04-16 2018-04-16 It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium
PCT/CN2019/080492 WO2019201077A1 (en) 2018-04-16 2019-03-29 Method, system, and apparatus for generating watermark only in secret-related area, and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810337396.7A CN108563929A (en) 2018-04-16 2018-04-16 It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium

Publications (1)

Publication Number Publication Date
CN108563929A true CN108563929A (en) 2018-09-21

Family

ID=63535158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810337396.7A Pending CN108563929A (en) 2018-04-16 2018-04-16 It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium

Country Status (2)

Country Link
CN (1) CN108563929A (en)
WO (1) WO2019201077A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019201077A1 (en) * 2018-04-16 2019-10-24 深圳市联软科技股份有限公司 Method, system, and apparatus for generating watermark only in secret-related area, and medium
CN110471632A (en) * 2019-08-16 2019-11-19 北京明朝万达科技股份有限公司 File printout, inspection method, device, electronic equipment and readable storage medium storing program for executing
CN110990800A (en) * 2019-11-26 2020-04-10 合肥高维数据技术有限公司 Watermark processing method and system based on application program
CN111242824A (en) * 2019-12-05 2020-06-05 北京万里红科技股份有限公司 Watermark embedding method, tracing method, device and storage medium
CN111526384A (en) * 2019-02-01 2020-08-11 北京国双科技有限公司 Information processing method and related equipment
CN112287414A (en) * 2020-10-30 2021-01-29 平安信托有限责任公司 Access control method, device, computer equipment and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11847718B2 (en) * 2021-07-15 2023-12-19 Vmware, Inc. Per-window digital watermark for desktop applications

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101236645A (en) * 2008-02-28 2008-08-06 上海交通大学 Damage-free digital watermarking based image tampering detection and positioning method
CN101661609A (en) * 2009-08-31 2010-03-03 重庆大学 Digital image interesting region visible watermarik adding method suitable for internet
CN103037268A (en) * 2012-12-07 2013-04-10 广东威创视讯科技股份有限公司 Method and device for watermark adding
CN103826168A (en) * 2014-02-25 2014-05-28 深圳市掌网立体时代视讯技术有限公司 Method and system for adding watermark to video
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN105376502A (en) * 2015-11-23 2016-03-02 华中师范大学 All media on-line editing tool
CN105898561A (en) * 2016-04-13 2016-08-24 腾讯科技(深圳)有限公司 Video image processing method and video image processing device
CN106778336A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 A kind of processing method of file content, device and mobile terminal
CN107239666A (en) * 2017-06-09 2017-10-10 孟群 A kind of method and system that medical imaging data are carried out with desensitization process
CN107358111A (en) * 2017-08-28 2017-11-17 维沃移动通信有限公司 A kind of method for secret protection and mobile terminal
CN107392833A (en) * 2017-07-27 2017-11-24 上海传英信息技术有限公司 A kind of adding method and adding set of the picture watermark based on smart machine
CN107644172A (en) * 2016-07-20 2018-01-30 平安科技(深圳)有限公司 The guard method of content displaying and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631359B (en) * 2015-12-23 2018-10-23 北京奇虎科技有限公司 A kind of control method and device of web page operation
CN106295425A (en) * 2016-08-05 2017-01-04 深圳市金立通信设备有限公司 Terminal and screen content display method thereof thereof
CN107358120A (en) * 2017-07-06 2017-11-17 珠海市魅族科技有限公司 Document edit method and device, terminal device and computer-readable recording medium
CN107862647A (en) * 2017-11-15 2018-03-30 平安科技(深圳)有限公司 Display methods, device, computer equipment and the storage medium of screen watermark
CN108563929A (en) * 2018-04-16 2018-09-21 深圳市联软科技股份有限公司 It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101236645A (en) * 2008-02-28 2008-08-06 上海交通大学 Damage-free digital watermarking based image tampering detection and positioning method
CN101661609A (en) * 2009-08-31 2010-03-03 重庆大学 Digital image interesting region visible watermarik adding method suitable for internet
CN103037268A (en) * 2012-12-07 2013-04-10 广东威创视讯科技股份有限公司 Method and device for watermark adding
CN103826168A (en) * 2014-02-25 2014-05-28 深圳市掌网立体时代视讯技术有限公司 Method and system for adding watermark to video
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN105376502A (en) * 2015-11-23 2016-03-02 华中师范大学 All media on-line editing tool
CN105898561A (en) * 2016-04-13 2016-08-24 腾讯科技(深圳)有限公司 Video image processing method and video image processing device
CN107644172A (en) * 2016-07-20 2018-01-30 平安科技(深圳)有限公司 The guard method of content displaying and device
CN106778336A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 A kind of processing method of file content, device and mobile terminal
CN107239666A (en) * 2017-06-09 2017-10-10 孟群 A kind of method and system that medical imaging data are carried out with desensitization process
CN107392833A (en) * 2017-07-27 2017-11-24 上海传英信息技术有限公司 A kind of adding method and adding set of the picture watermark based on smart machine
CN107358111A (en) * 2017-08-28 2017-11-17 维沃移动通信有限公司 A kind of method for secret protection and mobile terminal

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019201077A1 (en) * 2018-04-16 2019-10-24 深圳市联软科技股份有限公司 Method, system, and apparatus for generating watermark only in secret-related area, and medium
CN111526384A (en) * 2019-02-01 2020-08-11 北京国双科技有限公司 Information processing method and related equipment
CN111526384B (en) * 2019-02-01 2022-05-27 北京国双科技有限公司 Information processing method and related equipment
CN110471632A (en) * 2019-08-16 2019-11-19 北京明朝万达科技股份有限公司 File printout, inspection method, device, electronic equipment and readable storage medium storing program for executing
CN110471632B (en) * 2019-08-16 2021-03-02 北京明朝万达科技股份有限公司 File printing and viewing method and device, electronic equipment and readable storage medium
CN110990800A (en) * 2019-11-26 2020-04-10 合肥高维数据技术有限公司 Watermark processing method and system based on application program
CN110990800B (en) * 2019-11-26 2022-04-12 合肥高维数据技术有限公司 Watermark processing method and system based on application program
CN111242824A (en) * 2019-12-05 2020-06-05 北京万里红科技股份有限公司 Watermark embedding method, tracing method, device and storage medium
CN112287414A (en) * 2020-10-30 2021-01-29 平安信托有限责任公司 Access control method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
WO2019201077A1 (en) 2019-10-24

Similar Documents

Publication Publication Date Title
CN108563929A (en) It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium
JP6744932B2 (en) Identifying content in electronic images
US9104659B2 (en) Systems and methods for providing content aware document analysis and modification
US20110202850A1 (en) Automatic Removal of Sensitive Information from a Computer Screen
CN108563930A (en) A kind of method, apparatus, medium and the system of confidential document addition watermark
US9747007B2 (en) Resizing technique for display content
US20150378549A1 (en) Light dismiss manager
CN107463627A (en) A kind of picture loading method and terminal
CN107870706A (en) One kind management figure calibration method, terminal and computer-readable medium
CN106681584A (en) Method for optimizing application display and terminal
CN108089856A (en) The monitor method and device of a kind of page elements
CN108629727A (en) Method, terminal and the medium of watermark are generated according to color
EP3408752B1 (en) Object management and visualization using a computing device
CN107766108A (en) A kind of method of interception image, terminal and computer-readable medium
WO2021036871A1 (en) Information input method, device, terminal, and storage medium
US10592063B1 (en) Controlling actions for browser extensions
US8860735B2 (en) Aligning script animations with display refresh
CN109828715B (en) Screen recording method and device
US10599688B2 (en) Automatically embedding digital maps in software applications
EP3364326B1 (en) Method and apparatus for generating password by means of pressure touch control
WO2016018682A1 (en) Processing image to identify object for insertion into document
CN108052546A (en) A kind of method and mobile terminal in mobile terminal browsing pictures
JP7141589B1 (en) Terminal device, method and program
US20070226643A1 (en) System and method for controlling obscuring traits on a field of a display
US9378664B1 (en) Providing financial data through real-time virtual animation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180921

RJ01 Rejection of invention patent application after publication