CN109064379B - Digital watermark marking method and digital watermark verifying device - Google Patents

Digital watermark marking method and digital watermark verifying device Download PDF

Info

Publication number
CN109064379B
CN109064379B CN201810829962.6A CN201810829962A CN109064379B CN 109064379 B CN109064379 B CN 109064379B CN 201810829962 A CN201810829962 A CN 201810829962A CN 109064379 B CN109064379 B CN 109064379B
Authority
CN
China
Prior art keywords
data
check code
column
labeling
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810829962.6A
Other languages
Chinese (zh)
Other versions
CN109064379A (en
Inventor
郝闻众
庞勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Asiainfo Network Security Industrial Technology Research Institute Co ltd
Original Assignee
Chengdu Asiainfo Network Security Industrial Technology Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Asiainfo Network Security Industrial Technology Research Institute Co ltd filed Critical Chengdu Asiainfo Network Security Industrial Technology Research Institute Co ltd
Priority to CN201810829962.6A priority Critical patent/CN109064379B/en
Publication of CN109064379A publication Critical patent/CN109064379A/en
Application granted granted Critical
Publication of CN109064379B publication Critical patent/CN109064379B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The embodiment of the invention discloses a digital watermark marking method, a digital watermark verifying method and a digital watermark verifying device, relates to the technical field of information hiding, and can ensure the usability of structured data and simultaneously reduce the verifying complexity by adopting a double verification code marking mode for the structured data. The method comprises the following steps: determining a labeling column of data to be delivered; generating an ID check code according to the user ID and the original numerical value of the labeling column; wherein the user ID is the ID of the data demander; attaching an ID check code to the decimal end of the original numerical value of the labeling column to generate an intermediate numerical value; generating a unit check code according to the intermediate numerical value calculation; attaching the unit check code to the decimal end of the intermediate value to generate an updated value of the labeling column; and replacing the original numerical value of the labeling column with the updated numerical value of the labeling column to generate final delivery data. The embodiment of the invention is applied to the field of information security.

Description

Digital watermark marking method and digital watermark verifying device
Technical Field
The embodiment of the invention relates to the technical field of information hiding, in particular to a digital watermark marking method, a digital watermark verifying method and a digital watermark verifying device.
Background
Information hiding technology (Information Hiding), i.e. information hiding, plays an important role in protecting information from damage in future networks, which is a way to hide confidential information from adversaries in large amounts of information. Information hiding methods mainly include steganography, digital watermarking technology, visual passwords, latent channels, hiding protocols and the like.
The digital watermarking (Digital Watermarking) technology is to embed some identification information (i.e. digital watermark) directly into a digital carrier (including multimedia, document, software, etc.) or indirectly (modifying the structure of a specific area), and does not affect the use value of the original carrier, and is not easy to be ascertained and modified again, but can be recognized and identified by a producer. Through the information hidden in the carrier, the purposes of confirming the content creator, the purchaser, transmitting the hidden information, judging whether the carrier is tampered or not and the like can be achieved. The digital watermark is an effective method for protecting information security, realizing anti-counterfeiting traceability and copyright protection, and is an important branch and research direction in the research field of information hiding technology.
In the big data age, the data becomes a special production data, the sharing and circulation demands of the data are more and more vigorous, and the safety protection demands of the data are more outstanding. Digital watermarking provides a better measure of protection for unstructured data, so the industry is also considering whether the security protection capabilities of digital watermarking can be extended to structured data, and many attempts have been made. Unstructured data usually has sufficient redundant information, the embedded digital watermark is conveniently embedded by adding marks to specific redundant information, the embedded digital watermark is also easily hidden in the data, and the data user (data requiring party) can hardly find the embedded digital watermark. The structured data is different from unstructured data, and has the characteristics of high precision requirement, high data format requirement and small redundant space, and the usability of the data must be ensured when the marked information is added to generate the digital watermark.
Some methods for marking the structured data with distributed digital watermarks based on numerical fields have been proposed in the industry for the characteristics of the structured data. The distributed digital watermark marking method strengthens the concealment (invisibility) and robustness of the digital watermark on the premise of ensuring the availability of the structured data, but the detection method is complex, and a certain amount of data to be detected needs to be obtained to ensure the complete recovery or the distinguishable part recovery of the digital watermark.
Disclosure of Invention
The embodiment of the invention provides a marking method, a checking method and a checking device for digital watermarks, which can ensure the availability of the structured data and reduce the checking complexity by adopting a marking mode of double check codes for the structured data.
In a first aspect, a method for labeling a digital watermark is provided, the method comprising: determining a labeling column of data to be delivered; generating an ID check code according to the user ID and the original numerical value of the labeling column; wherein the user ID is the ID of the data demander; attaching an ID check code to the decimal end of the original numerical value of the labeling column to generate an intermediate numerical value; generating a unit check code according to the intermediate numerical value calculation; attaching the unit check code to the decimal end of the intermediate value to generate an updated value of the labeling column; and replacing the original numerical value of the labeling column with the updated numerical value of the labeling column to generate final delivery data.
In the method for marking the digital watermark, firstly, marking columns of data to be delivered are determined; generating an ID check code according to the user ID and the original numerical value of the labeling column; wherein the user ID is the ID of the data demander; attaching an ID check code to the decimal end of the original numerical value of the labeling column to generate an intermediate numerical value; then generating a unit check code according to the intermediate numerical value calculation; attaching the unit check code to the decimal end of the intermediate value to generate an updated value of the labeling column; and replacing the original numerical value of the labeling column with the updated numerical value of the labeling column, and finally generating final delivery data. The method can ensure the accuracy of the inspection and reduce the complexity of the inspection by adopting a labeling mode of double check codes for the structured data.
Optionally, determining the annotation column of the data to be delivered further includes: acquiring user data; wherein the user data is the demand data of the data demand party; and generating data to be delivered according to the user data.
Optionally, determining a labeling column of the data to be delivered specifically includes: determining a labeling column of the data to be delivered according to a first preset rule; wherein the first predetermined rule includes, but is not limited to, a date type data column or a geographic coordinate data column or a floating point number data column as an annotation column.
In a second aspect, a method for verifying a digital watermark is provided, including: acquiring suspicious data; determining a labeling column of suspicious data; separating suspicious values in the labeling column to obtain a first unit check code, a first ID check code, an intermediate value and an original value; wherein the intermediate value comprises an original value and a first ID check code, and the first ID check code is appended to the decimal end of the original value; the suspicious numerical value of the labeling column comprises an intermediate numerical value and a first unit check code, and the first unit check code is attached to the decimal end of the intermediate numerical value; generating a second unit check code according to the intermediate numerical value calculation; and matches the check with the first unit check code; when the first unit check code and the second unit check code are successfully matched, respectively calculating the second ID check code corresponding to each user ID according to the original numerical value in the suspicious numerical value and combining all user IDs in the user ID list; and carrying out matching verification on the second ID verification code corresponding to each user ID and the first ID verification code, and storing the user ID corresponding to the second ID verification code which is successfully matched into a suspicious user ID list.
In the method for checking the digital watermark, suspicious data is firstly acquired; determining a labeling column of suspicious data; separating suspicious values in the labeling column to obtain a first unit check code, a first ID check code, an intermediate value and an original value; wherein the intermediate value comprises an original value and a first ID check code, and the first ID check code is appended to the decimal end of the original value; the suspicious numerical value of the labeling column comprises an intermediate numerical value and a first unit check code, and the first unit check code is attached to the decimal end of the intermediate numerical value; generating a second unit check code according to the intermediate numerical value calculation; and matches the check with the first unit check code; when the first unit check code and the second unit check code are successfully matched, respectively calculating the second ID check code corresponding to each user ID according to the original numerical value in the suspicious numerical value and combining all user IDs in the user ID list; and carrying out matching verification on the second ID verification code corresponding to each user ID and the first ID verification code, and storing the user ID corresponding to the second ID verification code which is successfully matched into a suspicious user ID list. The method can accurately acquire the source of data leakage by adopting a matching verification mode for the double verification codes separated from the suspicious data.
Optionally, determining the labeling column of the suspicious data specifically includes: determining a labeling column of the suspicious data according to a second preset rule; wherein the second predetermined rule includes, but is not limited to, adding an X bit to the end of the fraction of the date data column or an X bit to the end of the fraction of the geographic coordinate data column or an X bit to the end of the fraction of the floating point data column as a labeling column, wherein X is equal to the sum of the digits of the first unit check code and the first ID check code.
In a third aspect, there is provided a digital watermark labeling apparatus, the apparatus comprising:
and the determining module is used for determining the annotation column of the data to be delivered.
The processing module is used for generating an ID check code according to the user ID acquired by the acquisition module and the original numerical value of the labeling column determined by the determination module; wherein the user ID is the ID of the data consumer.
And the processing module is also used for attaching the ID check code to the decimal end of the original numerical value of the labeling column to generate an intermediate numerical value.
And the processing module is also used for generating a unit check code according to the intermediate numerical value calculation.
And the processing module is also used for attaching the unit check code to the decimal end of the intermediate value to generate an updated value of the labeling column.
And the processing module is also used for replacing the original numerical value of the labeling column with the updated numerical value of the labeling column to generate final delivery data.
Optionally, the acquiring module is used for acquiring user data; wherein the user data is the demand data of the data demander.
And the processing module is used for generating data to be delivered according to the user data acquired by the acquisition module.
Optionally, the determining module is specifically configured to determine a labeling column of the data to be delivered according to a first predetermined rule; wherein the first predetermined rule includes, but is not limited to, a date type data column or a geographic coordinate data column or a floating point number data column as an annotation column.
It can be appreciated that the foregoing digital watermark labeling apparatus is configured to perform the method corresponding to the first aspect, so that the advantages achieved by the foregoing method of the first aspect and the advantages of the corresponding scheme in the following detailed description are not repeated herein.
In a fourth aspect, there is provided a digital watermark verification apparatus, the apparatus comprising:
and the acquisition module is used for acquiring suspicious data.
The determining module is used for determining the annotation column of the suspicious data acquired by the acquiring module.
The processing module is used for separating the suspicious values in the labeling column determined by the determining module to obtain a first unit check code, a first ID check code, an intermediate value and an original value; wherein the intermediate value comprises an original value and a first ID check code, and the first ID check code is appended to the decimal end of the original value; the suspect value of the annotation column comprises an intermediate value and a first unit check code, and the first unit check code is appended to the decimal end of the intermediate value.
And the processing module is also used for generating a second unit check code according to the intermediate numerical value calculation.
And the verification module is used for matching and verifying the second unit verification code generated by the processing module with the first unit verification code.
And the processing module is used for respectively calculating the second ID check code corresponding to each user ID according to the original numerical value of the labeling column and combining all the user IDs in the user ID list when the first unit check code checked by the check module is successfully matched with the second unit check code.
And the verification module is used for carrying out matching verification on the second ID verification code corresponding to each user ID generated by the processing module and the first ID verification code, and storing the user ID corresponding to the second ID verification code which is successfully matched into the suspicious user ID list.
Optionally, the determining module is specifically configured to determine the annotation column of the suspicious data acquired by the acquiring module according to a second predetermined rule; wherein the second predetermined rule includes, but is not limited to, adding an X bit to the end of the fraction of the date data column or an X bit to the end of the fraction of the geographic coordinate data column or an X bit to the end of the fraction of the floating point data column as a labeling column, wherein X is equal to the sum of the digits of the first unit check code and the first ID check code.
It can be appreciated that the above-provided digital watermark verifying apparatus is configured to perform the method corresponding to the second aspect provided above, so that the advantages achieved by the digital watermark verifying apparatus can be referred to the method of the second aspect and the advantages of the corresponding scheme in the following detailed description, which are not repeated herein.
Drawings
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Fig. 1 is a flow chart of a method for labeling a digital watermark according to an embodiment of the present invention;
fig. 2 is a flow chart of a method for verifying a digital watermark according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a digital watermark labeling apparatus according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a digital watermark verifying apparatus according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the big data age, the data becomes a special production data, the sharing and circulation demands of the data are more and more vigorous, and the safety protection demands of the data are more outstanding. Digital watermarking provides a better measure of protection for unstructured data, so the industry is also considering whether the security protection capabilities of digital watermarking can be extended to structured data, and many attempts have been made. Unstructured data usually has sufficient redundant information, the embedded digital watermark is conveniently embedded by adding marks to specific redundant information, the embedded digital watermark is also easily hidden in the data, and the data user (data requiring party) can hardly find the embedded digital watermark. The structured data is different from unstructured data, and has the characteristics of high precision requirement, high data format requirement and small redundant space, and the usability of the data must be ensured when the marked information is added to generate the digital watermark. Some methods for marking the structured data with distributed digital watermarks based on numerical fields have been proposed in the industry for the characteristics of the structured data. The distributed digital watermark marking method strengthens the concealment (invisibility) and robustness of the digital watermark on the premise of ensuring the availability of the structured data, but the detection method is complex, and a certain amount of data to be detected needs to be obtained to ensure the complete recovery or the distinguishable part recovery of the digital watermark. Referring to fig. 1, an embodiment of the present invention provides a method for labeling a digital watermark, including:
101. and determining a labeling column of the data to be delivered.
In detail, determining a labeling column of the data to be delivered specifically includes: determining a labeling column of the data to be delivered according to a first preset rule; wherein the first predetermined rule includes, but is not limited to, a date type data column or a geographic coordinate data column or a floating point number data column as an annotation column.
In addition, before determining the annotation column of the data to be delivered, the method further comprises the following steps: acquiring user data; wherein the user data is the demand data of the data demand party; and generating data to be delivered according to the user data.
102. Generating an ID check code according to the user ID and the original numerical value of the labeling column; wherein the user ID is the ID of the data consumer.
Illustratively, the ID check code may be 1 bit in length.
103. An ID check code is appended to the decimal end of the original value of the labeling column to generate an intermediate value.
104. And generating a unit check code according to the intermediate numerical value calculation.
Illustratively, the unit check code may be 1 bit in length.
105. And attaching the unit check code to the decimal end of the intermediate value to generate an updated value of the labeling column.
106. And replacing the original numerical value of the labeling column with the updated numerical value of the labeling column to generate final delivery data.
In addition, it should be noted that, the method for marking the digital watermark provided by the embodiment of the invention adopts double check codes (ID check code and unit check code), which not only can add the digital watermark marking to the single-row to-be-delivered data and provide accurate detection, but also can respectively add the digital watermark marking to the multiple-row to-be-delivered data meeting the condition and provide accurate detection.
More preferably, on the basis of adding digital watermark marks in the data to be delivered by adopting a double check code, 0 can be added before the ID check code, so that the precision loss of the final delivered data is smaller; or (sum) expands the labeling space by improving the check code generation algorithm, and reduces the collision probability of the double check codes.
In the method for marking the digital watermark, firstly, marking columns of data to be delivered are determined; generating an ID check code according to the user ID and the original numerical value of the labeling column; wherein the user ID is the ID of the data demander; attaching an ID check code to the decimal end of the original numerical value of the labeling column to generate an intermediate numerical value; then generating a unit check code according to the intermediate numerical value calculation; attaching the unit check code to the decimal end of the intermediate value to generate an updated value of the labeling column; and replacing the original numerical value of the labeling column with the updated numerical value of the labeling column, and finally generating final delivery data. The method can ensure the availability of the structured data and reduce the complexity of inspection by adopting a labeling mode of double check codes for the structured data.
Referring to fig. 2, an embodiment of the present invention provides a method for verifying a digital watermark, including:
201. suspicious data is acquired.
202. A column of labels for suspicious data is determined.
In detail, determining the labeling column of the suspicious data specifically includes: determining a labeling column of the suspicious data according to a second preset rule; wherein the second predetermined rule includes, but is not limited to, adding an X bit to the end of the fraction of the date data column or an X bit to the end of the fraction of the geographic coordinate data column or an X bit to the end of the fraction of the floating point data column as a labeling column, wherein X is equal to the sum of the digits of the first unit check code and the first ID check code.
203. Separating suspicious values in the labeling column to obtain a first unit check code, a first ID check code, an intermediate value and an original value; wherein the intermediate value comprises an original value and a first ID check code, and the first ID check code is appended to the decimal end of the original value; the suspect value of the annotation column comprises an intermediate value and a first unit check code, and the first unit check code is appended to the decimal end of the intermediate value.
204. Generating a second unit check code according to the intermediate numerical value calculation; and matches the check with the first unit check code;
205. when the first unit check code and the second unit check code are successfully matched, respectively calculating the second ID check code corresponding to each user ID according to the original numerical value in the suspicious numerical value and combining all user IDs in the user ID list.
206. And carrying out matching verification on the second ID verification code corresponding to each user ID and the first ID verification code, and storing the user ID corresponding to the second ID verification code which is successfully matched into a suspicious user ID list.
Preferably, the comprehensive judgment of suspicious users is specifically as follows: the method can adopt a mode of checking a plurality of pieces of suspicious data to obtain a plurality of checking results, and comprehensively judges the suspicious user ID according to the plurality of checking results.
In the method for checking the digital watermark, suspicious data is firstly acquired; determining a labeling column of suspicious data; separating suspicious values in the labeling column to obtain a first unit check code, a first ID check code, an intermediate value and an original value; wherein the intermediate value comprises an original value and a first ID check code, and the first ID check code is appended to the decimal end of the original value; the suspicious numerical value of the labeling column comprises an intermediate numerical value and a first unit check code, and the first unit check code is attached to the decimal end of the intermediate numerical value; generating a second unit check code according to the intermediate numerical value calculation; and matches the check with the first unit check code; when the first unit check code and the second unit check code are successfully matched, respectively calculating the second ID check code corresponding to each user ID according to the original numerical value in the suspicious numerical value and combining all user IDs in the user ID list; and carrying out matching verification on the second ID verification code corresponding to each user ID and the first ID verification code, and storing the user ID corresponding to the second ID verification code which is successfully matched into a suspicious user ID list. The method can accurately acquire the source of data leakage by adopting a matching verification mode for the double verification codes separated from the suspicious data.
Referring to fig. 3, an embodiment of the present invention provides a digital watermark labeling apparatus 30, which includes:
a determining module 301, configured to determine a annotation column of the data to be delivered.
The processing module 302 is configured to generate an ID check code according to the user ID acquired by the acquiring module 303 and the original numerical value of the labeling column determined by the determining module; wherein the user ID is the ID of the data consumer.
The processing module 302 is further configured to append an ID check code to the decimal end of the original value of the labeling column to generate an intermediate value.
The processing module 302 is further configured to generate a unit check code according to the intermediate numerical calculation.
The processing module 302 is further configured to append a unit check code to the decimal end of the intermediate value, and generate an updated value of the labeling column.
The processing module 302 is further configured to replace the original value of the annotation column with the updated value of the annotation column, and generate final delivery data.
In an exemplary scenario, the obtaining module 303 is configured to obtain user data; wherein the user data is the demand data of the data demander.
And the processing module is used for generating data to be delivered according to the user data acquired by the acquisition module.
In an exemplary scenario, the determining module 301 is specifically configured to determine a labeling column of the data to be delivered according to a first predetermined rule; wherein the first predetermined rule includes, but is not limited to, a date type data column or a geographic coordinate data column or a floating point number data column as an annotation column.
The content related to the embodiment of the method for labeling a digital watermark and the technical effects achieved in the embodiment of the method can be directly referred to the description of the corresponding functional modules in the embodiment of the system, which is not repeated in detail.
Referring to fig. 4, an embodiment of the present invention provides a digital watermark verifying apparatus 40, including:
an acquisition module 401, configured to acquire suspicious data.
A determining module 402, configured to determine a labeling column of the suspicious data acquired by the acquiring module 401.
The processing module 403 is configured to separate the suspicious value in the labeling column determined by the determining module 402 to obtain a first unit check code, a first ID check code, an intermediate value, and an original value; wherein the intermediate value comprises an original value and a first ID check code, and the first ID check code is appended to the decimal end of the original value; the suspect value of the annotation column comprises an intermediate value and a first unit check code, and the first unit check code is appended to the decimal end of the intermediate value.
The processing module 403 is further configured to generate a second unit check code according to the intermediate numerical calculation.
And the verification module 404 is configured to match and verify the second unit verification code generated by the processing module with the first unit verification code.
And the processing module 403 is configured to, when the first unit check code checked by the checking module 403 is successfully matched with the second unit check code, calculate the second ID check code corresponding to each user ID according to the original numerical value of the labeling column and in combination with all the user IDs in the user ID list.
And the verification module 404 is configured to perform a matching verification on the second ID verification code corresponding to each user ID generated by the processing module 403 and the first ID verification code, and store the user ID corresponding to the second ID verification code that is successfully matched to the suspicious user ID list.
In an exemplary aspect, the determining module 402 is specifically configured to determine, according to a second predetermined rule, a labeling column of the suspicious data acquired by the acquiring module 401; wherein the second predetermined rule includes, but is not limited to, adding an X bit to the end of the fraction of the date data column or an X bit to the end of the fraction of the geographic coordinate data column or an X bit to the end of the fraction of the floating point data column as a labeling column, wherein X is equal to the sum of the digits of the first unit check code and the first ID check code.
The content related to the above embodiment of the method for verifying a digital watermark and the technical effects achieved in the embodiment of the method may directly refer to descriptions in corresponding functional modules in the embodiment of the system, which are not described in detail.
The steps of a method or algorithm for labeling a digital watermark described in connection with the present disclosure may be implemented in hardware, or may be implemented by a processor executing software instructions. For example: the acquisition module, the determination module and the processing module may be implemented by separate processors or may be implemented in the same processor. The embodiment of the invention also provides a storage medium, which can comprise a memory for storing computer software instructions for a digital watermark labeling device, wherein the computer software instructions comprise program code designed by the digital watermark labeling method. In particular, the software instructions may be comprised of corresponding software modules that may be stored in random access Memory (Random Access Memory, RAM), flash Memory, read Only Memory (ROM), erasable programmable Read Only Memory (Erasable Programmable ROM), electrically Erasable Programmable Read Only Memory (EEPROM), registers, hard disk, a removable disk, a compact disc Read Only Memory (CD-ROM), or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.
The embodiment of the invention also provides a computer program which can be directly loaded into a memory and contains software codes, and the computer program can realize the marking method of the digital watermark after being loaded and executed by a computer.
In addition, the steps of the digital watermark verification method or algorithm described in connection with the present disclosure may be implemented in hardware or may be implemented by a processor executing software instructions. For example: the acquisition module, the determination module, the verification module and the processing module may be implemented by separate processors or may be implemented in a centralized manner in the same processor. The embodiment of the invention also provides a storage medium, which can comprise a memory for storing computer software instructions for use by a digital watermark verification device, comprising program code designed to perform the digital watermark verification method. In particular, the software instructions may be comprised of corresponding software modules that may be stored in random access Memory (Random Access Memory, RAM), flash Memory, read Only Memory (ROM), erasable programmable Read Only Memory (Erasable Programmable ROM), electrically Erasable Programmable Read Only Memory (EEPROM), registers, hard disk, a removable disk, a compact disc Read Only Memory (CD-ROM), or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.
The embodiment of the invention also provides a computer program which can be directly loaded into a memory and contains software codes, and the computer program can realize the digital watermark checking method after being loaded and executed by a computer.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the present invention may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The present invention is not limited to the above embodiments, and any changes or substitutions that can be easily understood by those skilled in the art within the technical scope of the present invention are intended to be included in the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (6)

1. A method for labeling a digital watermark, comprising:
determining a labeling column of the data to be delivered according to a first preset rule; wherein the first predetermined rule includes, but is not limited to, a date data column or a geographic coordinate data column or a floating point data column as an annotation column;
generating an ID check code according to the user ID and the original numerical value of the labeling column; wherein the user ID is an ID of the data demander;
attaching the ID check code to the decimal end of the original numerical value of the labeling column to generate an intermediate numerical value;
generating a unit check code according to the intermediate numerical calculation;
attaching the unit check code to the decimal end of the intermediate value to generate an updated value of the labeling column;
and replacing the original numerical value of the labeling column with the updated numerical value of the labeling column to generate final delivery data.
2. The method for labeling a digital watermark according to claim 1, wherein determining a labeling column of data to be delivered, further comprises:
acquiring user data; wherein the user data is demand data of a data demand party;
and generating the data to be delivered according to the user data.
3. A method of verifying a digital watermark, comprising:
acquiring suspicious data;
determining a labeling column of the suspicious data according to a second preset rule; wherein the second predetermined rule includes, but is not limited to, adding an X bit to the end of the decimal of the date data column or an X bit to the end of the decimal of the geographic coordinates data column or an X bit to the end of the decimal of the floating point number data column as a labeling column, wherein the X is equal to the sum of the digits of the first unit check code and the first ID check code;
separating suspicious values in the labeling column to obtain a first unit check code, a first ID check code, an intermediate value and an original value; wherein the intermediate value includes the original value and the first ID check code, and the first ID check code is appended at the decimal end of the original value; the suspicious value of the labeling column comprises the intermediate value and the first unit check code, and the first unit check code is attached to the decimal end of the intermediate value;
generating a second unit check code according to the intermediate numerical value calculation; and matches and verifies with the first unit check code;
when the first unit check code is successfully matched with the second unit check code, respectively calculating a second ID check code corresponding to each user ID according to the original value in the suspicious value and combining all user IDs in a user ID list;
and carrying out matching verification on the second ID verification code corresponding to each user ID and the first ID verification code, and storing the user ID corresponding to the second ID verification code which is successfully matched into a suspicious user ID list.
4. A digital watermark labeling apparatus, comprising:
the determining module is used for determining a labeling column of the data to be delivered according to a first preset rule; wherein the first predetermined rule includes, but is not limited to, a date data column or a geographic coordinate data column or a floating point data column as an annotation column;
the processing module is used for generating an ID check code according to the user ID acquired by the acquisition module and the original numerical value of the annotation column determined by the determination module; wherein the user ID is an ID of the data demander;
the processing module is further used for attaching the ID check code to the decimal end of the original numerical value of the labeling column to generate an intermediate numerical value;
the processing module is also used for generating a unit check code according to the intermediate numerical value calculation;
the processing module is further used for attaching the unit check code to the decimal end of the intermediate numerical value to generate an updated numerical value of the labeling column;
and the processing module is also used for replacing the original numerical value of the labeling column with the updated numerical value of the labeling column to generate final delivery data.
5. The apparatus for labeling a digital watermark as defined in claim 4, comprising:
the acquisition module is used for acquiring user data; wherein the user data is demand data of a data demand party;
the processing module is used for generating the data to be delivered according to the user data acquired by the acquisition module.
6. A digital watermark verifying apparatus, comprising:
the acquisition module is used for acquiring suspicious data;
the determining module is used for determining a labeling column of the suspicious data according to a second preset rule; wherein the second predetermined rule includes, but is not limited to, adding an X bit to the end of the decimal of the date data column or an X bit to the end of the decimal of the geographic coordinates data column or an X bit to the end of the decimal of the floating point number data column as a labeling column, wherein the X is equal to the sum of the digits of the first unit check code and the first ID check code; the processing module is used for separating the suspicious values in the labeling columns determined by the determining module to obtain a first unit check code, a first ID check code, an intermediate value and an original value; wherein the intermediate value includes the original value and the first ID check code, and the first ID check code is appended at the decimal end of the original value; the suspicious value of the labeling column comprises the intermediate value and the first unit check code, and the first unit check code is attached to the decimal end of the intermediate value;
the processing module is further used for generating a second unit check code according to the intermediate numerical value calculation;
the verification module is used for matching and verifying the second unit verification code generated by the processing module with the first unit verification code;
the processing module is used for respectively calculating a second ID check code corresponding to each user ID according to the original numerical value of the labeling column and all user IDs in the user ID list when the first unit check code checked by the check module is successfully matched with the second unit check code;
and the verification module is used for carrying out matching verification on the second ID verification code corresponding to each user ID generated by the processing module and the first ID verification code, and storing the user ID corresponding to the second ID verification code which is successfully matched into a suspicious user ID list.
CN201810829962.6A 2018-07-25 2018-07-25 Digital watermark marking method and digital watermark verifying device Active CN109064379B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810829962.6A CN109064379B (en) 2018-07-25 2018-07-25 Digital watermark marking method and digital watermark verifying device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810829962.6A CN109064379B (en) 2018-07-25 2018-07-25 Digital watermark marking method and digital watermark verifying device

Publications (2)

Publication Number Publication Date
CN109064379A CN109064379A (en) 2018-12-21
CN109064379B true CN109064379B (en) 2023-06-06

Family

ID=64836458

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810829962.6A Active CN109064379B (en) 2018-07-25 2018-07-25 Digital watermark marking method and digital watermark verifying device

Country Status (1)

Country Link
CN (1) CN109064379B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084046A (en) * 2019-03-15 2019-08-02 全球能源互联网研究院有限公司 Mask method, detection method and device, the electronic equipment of structural data watermark
CN111651736B (en) * 2020-06-16 2021-08-13 杭州美创科技有限公司 Watermark tracing method for desensitization of identity card data

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107800819A (en) * 2017-11-17 2018-03-13 深圳市泉眼网络科技有限公司 A kind of generation method of file identification, device and server
CN108121911A (en) * 2016-11-30 2018-06-05 中国移动通信有限公司研究院 A kind of software detecting method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4527369B2 (en) * 2003-07-31 2010-08-18 富士通株式会社 Data embedding device and data extraction device
CN101106455B (en) * 2007-08-20 2010-10-13 北京飞天诚信科技有限公司 Identity authentication method and intelligent secret key device
CN103903218B (en) * 2014-04-17 2017-04-12 石河子大学 Robust geographic data watermarking method for public ownership verification
WO2017000272A1 (en) * 2015-07-01 2017-01-05 海能达通信股份有限公司 Wireless system access control method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108121911A (en) * 2016-11-30 2018-06-05 中国移动通信有限公司研究院 A kind of software detecting method and device
CN107800819A (en) * 2017-11-17 2018-03-13 深圳市泉眼网络科技有限公司 A kind of generation method of file identification, device and server

Also Published As

Publication number Publication date
CN109064379A (en) 2018-12-21

Similar Documents

Publication Publication Date Title
CN110457873B (en) Watermark embedding and detecting method and device
CN107330306B (en) Text watermark embedding and extracting method and device, electronic equipment and storage medium
US8844049B2 (en) Method for generating a cryptographic key for a protected digital data object on the basis of current components of a computer
CN105141409B (en) A kind of implementation method, terminal and the server of screen Digital watermark
US20110214188A1 (en) Software watermarking techniques
CN110011800B (en) Block chain data reading method and device
CN102903072B (en) Blind digital watermark detection method and system
CN109064379B (en) Digital watermark marking method and digital watermark verifying device
CN110688675A (en) Data leakage tracing device and method based on privacy protection and readable storage medium
EP3683700A1 (en) Method for determining if a machine learning model has been copied
CN116385250B (en) Track data double watermarking method based on robust watermarking and fragile watermarking
CN114356919A (en) Watermark embedding method, tracing method and device for structured database
CN112001376B (en) Fingerprint identification method, device, equipment and storage medium based on open source component
CN111835808B (en) Data storage method and device, data reading method and device, and storage medium
CN109461110B (en) Method and device for determining traceability information of picture
Wang et al. RST invariant fragile watermarking for 2D vector map authentication
US8306268B2 (en) Method and system for image integrity determination
CN107704732B (en) Method and equipment for generating fingerprint of work
JP3651777B2 (en) Digital watermark system, digital watermark analysis apparatus, digital watermark analysis method, and recording medium
CN112446814A (en) Vector map data fragile watermarking method for positioning and tampering entity group
CN110349072B (en) Watermark synchronization method in vector geographic data watermark embedding and detecting process
CN110378829B (en) Method, device and equipment for providing information and extracting watermark
Tohidi et al. Efficient self-embedding data hiding for image integrity verification with pixel-wise recovery capability
CN110866858B (en) Watermark embedding method, watermark embedding device, query data providing device, and data processing method
CN113505348A (en) Data watermark embedding method, data watermark verifying method and data watermark verifying device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant