CN109325323B - Digital watermark generation method, and secret information extraction method and device - Google Patents
Digital watermark generation method, and secret information extraction method and device Download PDFInfo
- Publication number
- CN109325323B CN109325323B CN201811098983.1A CN201811098983A CN109325323B CN 109325323 B CN109325323 B CN 109325323B CN 201811098983 A CN201811098983 A CN 201811098983A CN 109325323 B CN109325323 B CN 109325323B
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- watermark
- converted
- processed
- secret information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000000605 extraction Methods 0.000 title claims description 6
- 238000006243 chemical reaction Methods 0.000 claims description 13
- 238000001514 detection method Methods 0.000 claims description 12
- 238000011835 investigation Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The application discloses a method for generating a digital watermark, a method and a device for extracting secret information, wherein the method for generating the digital watermark comprises the following steps: when a request for generating a digital watermark is received, selecting the watermark from a preset watermark set as a watermark to be processed; calculating the capacity of the watermark to be processed; determining the length of the ciphertext embedded in the watermark to be processed according to the relation between the capacity of the ciphertext embedded in the watermark to be processed and the length of the ciphertext, wherein the capacity of the ciphertext is not more than the capacity of the watermark to be processed; converting the secret information into a ciphertext with the length through a preset algorithm to obtain a converted ciphertext; and embedding the converted ciphertext into the watermark to be processed to generate the digital watermark. By the method and the device, the confidential information with any length and any structure can be hidden in the watermark to be processed within the allowable range of the capacity of the watermark to be processed.
Description
Technical Field
The present application relates to the field of information hiding, and in particular, to a method and an apparatus for generating a digital watermark, and a method and an apparatus for extracting secret information.
Background
Currently, preventing information leakage has become an important issue. Digital watermarking technology is a technology for preventing information leakage. The digital watermark is obtained by hiding the secret information in a watermark carrier. The digital watermarking technology is to embed some digital watermarks directly into a digital carrier or indirectly express some digital watermarks on the premise of not influencing the use value of the digital carrier (multimedia, documents and software).
The common method for generating the digital watermark mainly comprises a spatial domain algorithm and a watermark algorithm based on character characteristics. The space domain algorithm is to embed the information to be kept secret into the least significant bits of the randomly selected pixel points in the image. The watermark algorithm based on character features is a data hiding technology based on character features, such as character spacing, line spacing, color coding, texture, Chinese characters and the like.
Whatever digital watermark generation method is adopted, the secret information needs to be hidden in the watermark carrier in the process of generating the digital watermark. However, the capacity of the watermark carrier is limited, and therefore, how to hide secret information with any structure and length in the watermark carrier with limited capacity is a problem to be solved.
Disclosure of Invention
Based on this, the application provides a digital watermark generation method, which is used for generating a watermark capable of hiding secret information with any structure and any length in a carrier.
The application also provides a device for generating the digital watermark, which is used for ensuring the realization and the application of the method in practice.
The application also provides a method and a device for extracting the secret information, which are used for extracting the secret information from the generated digital watermark.
The technical scheme provided by the application is as follows:
the application discloses a method for generating a digital watermark, which comprises the following steps:
when a request for generating a digital watermark is received, selecting the watermark from a preset watermark set as a watermark to be processed;
calculating the capacity of the watermark to be processed;
determining the length of the ciphertext embedded in the watermark to be processed according to the relation between the capacity of the ciphertext embedded in the watermark to be processed and the length of the ciphertext, wherein the capacity of the ciphertext is not more than the capacity of the watermark to be processed;
converting the secret information into a ciphertext with the length through a preset algorithm to obtain a converted ciphertext;
and embedding the converted ciphertext into the watermark to be processed to generate the digital watermark.
Wherein, after converting the secret information into the ciphertext with the length and obtaining the converted ciphertext, the method further comprises:
detecting whether the converted ciphertext exists in the stored ciphertext;
if the converted ciphertext exists in the stored ciphertext, returning to execute the step of converting the secret information into the ciphertext with the length to obtain the converted ciphertext until the currently converted ciphertext does not exist in the stored ciphertext;
the step of embedding the converted ciphertext into the watermark to be processed to generate the digital watermark specifically includes:
and embedding the currently converted ciphertext into the watermark to be processed to generate the digital watermark.
Wherein, after detecting whether the converted ciphertext exists in the saved ciphertext, the method further comprises:
if the converted ciphertext does not exist in the stored ciphertext, correspondingly storing the secret information and the converted ciphertext;
and if the converted ciphertext exists in the stored ciphertext, correspondingly storing the secret information and the current converted ciphertext.
The embedding the converted ciphertext into the watermark to be processed to generate the digital watermark includes:
and embedding the converted ciphertext into the watermark to be processed, and generating the digital watermark in a picture form.
The application also discloses a method for extracting the confidential information, which comprises the following steps:
extracting a ciphertext from the digital watermark of the confidential information to be extracted; the digital watermark is generated according to any one of the digital watermark generation methods;
and determining the secret information corresponding to the extracted ciphertext from the stored secret information and the converted ciphertext.
The application also discloses a device for generating digital watermarks, which comprises:
the selecting unit is used for selecting the watermark from a preset watermark set as the watermark to be processed when a request for generating the digital watermark is received;
the computing unit is used for computing the capacity of the watermark to be processed;
the first determining unit is used for determining the length of the ciphertext embedded in the watermark to be processed according to the relation between the capacity of the ciphertext embedded in the watermark to be processed and the length of the ciphertext and the capacity of the ciphertext;
the conversion unit is used for converting the secret information into the ciphertext with the length through a preset algorithm to obtain the converted ciphertext;
and the generating unit is used for embedding the converted ciphertext into the watermark to be processed to generate the digital watermark.
Wherein, the device still includes:
the detection unit is used for detecting whether the converted ciphertext exists in the stored ciphertext after the conversion unit converts the secret information into the ciphertext with the length to obtain the converted ciphertext;
the execution unit is used for returning to execute the operation of the conversion unit when the detection unit detects that the converted ciphertext exists in the stored ciphertext until the currently converted ciphertext does not exist in the stored ciphertext;
the generating unit is specifically configured to embed the currently converted ciphertext into the watermark to be processed, so as to generate the digital watermark.
The execution unit is further configured to detect that the converted ciphertext does not exist in the stored ciphertext, and correspondingly store the secret information and the converted ciphertext;
the execution unit is further configured to, if the detection unit detects that the converted ciphertext exists in the stored ciphertext, store the secret information and the current converted ciphertext correspondingly.
The generating unit is specifically configured to embed the converted ciphertext into the watermark to be processed, and generate the digital watermark in a form of a picture.
The application also discloses secret information's extraction element includes:
the extraction unit is used for extracting the ciphertext from the digital watermark of the confidential information to be extracted; the digital watermark is generated according to any one of the digital watermark generation devices;
and the second determining unit is used for determining the secret information corresponding to the extracted ciphertext from the stored secret information and the converted ciphertext.
The beneficial effect of this application does:
in the embodiment of the application, the watermarks to be processed are selected from a preset watermark set, the capacity of the watermarks to be processed is calculated, the capacity of a ciphertext embedded in the watermarks to be processed is not larger than the capacity of the watermarks to be processed, and the length of the ciphertext embedded in the watermarks to be processed is determined according to the relation between the capacity of the ciphertext and the length of the ciphertext. Moreover, the preset algorithm can convert the secret information with any length and structure into the ciphertext with the preset length, so that in the embodiment of the application, the secret information with any length and structure can be converted into the ciphertext with the determined length through the preset algorithm, and at the moment, the capacity of the ciphertext obtained through conversion is not more than the capacity of the watermark to be processed; therefore, in the process of generating the digital watermark in the embodiment of the application, the secret information with any length and any structure can be hidden in the watermark to be processed within the allowable range of the capacity of the watermark to be processed.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of an embodiment of a method for generating a digital watermark according to the present application;
FIG. 2 is a flow chart of an embodiment of a method for extracting secret information according to the present application;
fig. 3 is a schematic structural diagram of an embodiment of a digital watermark generation apparatus in the present application;
FIG. 4 is a schematic structural diagram of an embodiment of a device for extracting secret information according to the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The digital watermark generated by the embodiment of the application can be applied to web pages, documents, images and the like. An application scenario of the embodiment of the present application may be: bank employees download a document about the customer's personal credit report and may embed digital watermarks in the background, headers, footers, etc. of the document in order to locate responsible persons after the document's contents are compromised. When the document is revealed, the information of the bank employee hidden in the digital watermark can be extracted according to the digital watermark embedded in the revealed document, so that a person responsible for document disclosure can be determined.
Of course, in practical application, the application scenario of the digital watermark generated in the embodiment of the present application may also be other scenarios, and the embodiment of the present application does not limit a specific application scenario. The embodiments of the present application take the above-described scenarios as examples, and introduce the process of generating a digital watermark according to the embodiments of the present application. The execution main body of the embodiment of the application can be a digital watermark generation device, and the device can be integrated in a bank system or can be independently arranged. The method embodiment corresponding to fig. 1 is described below by taking a generating device that executes digital watermarking with an independent main body as an example.
Referring to fig. 1, a flowchart of an embodiment of a method for generating a digital watermark in the present application is shown, where the embodiment of the method may include:
step 101: when a request for generating a digital watermark embedded with secret information is received, the watermark is selected from a preset watermark set as a watermark to be processed.
For example, in a scenario where a bank employee downloads a document of a client personal credit investigation report, when the bank employee sends a request for calling the client personal credit investigation report to a bank system, and when the bank system receives the request for calling the client personal credit investigation report, the bank system sends information for generating a digital watermark to a digital watermark generation device, and the bank system simultaneously sends the bank employee personal information to the digital watermark generation device. For convenience of description, the present embodiment refers to personal information of the bank employee as confidential information. In this step, the confidential information may be information such as a user ID, an identification number, an IP address, and an MAC address of the bank employee.
When a digital watermark generating device receives a request for generating a digital watermark embedded with secret information, in the step, the watermark is selected from a preset watermark set, wherein the preset watermark set comprises a plurality of watermarks. In practical application, the watermark in the preset watermark set may be a bright watermark or a dark watermark. For example, when the watermark is a plain watermark, the content displayed in the watermark may be "XX bank copyright owner", "XX bank internal material, no external transfer", or the like. For convenience of description, the watermarks selected from the preset watermark set are collectively referred to as to-be-processed watermarks, where the selection mode may be any one.
Step 102: and calculating the capacity of the watermark to be processed.
The watermark to be processed has a certain capacity, and the specific calculation mode refers to the existing calculation method for calculating the capacity of the watermark to be processed in the prior art. In this step, the content of the watermark is taken as a character as an example, and a calculation method of the watermark capacity with the content as the character is introduced. The size of the watermark capacity with content being characters is related to the type of characters and the number of characters in the watermark. For example, the watermark to be processed contains m Chinese characters and n English characters, and at this time, the volume calculation formula of the watermark to be processed is shown in the following formula (1).
P=3(m-1)*2(n-1) (1)
In the formula, P represents the capacity of the watermark to be processed, m represents the number of Chinese characters in the watermark to be processed, and n represents the number of Chinese and English characters in the watermark to be processed.
When the content of the watermark to be processed is 'XX bank copyright ownership', the capacity of the watermark to be processed can be calculated according to the formula (1).
Step 103: and determining the length of the ciphertext according to the relation between the capacity of the ciphertext embedded in the watermark to be processed and the length of the ciphertext, wherein the capacity of the ciphertext is not more than the capacity of the watermark to be processed.
After the capacity of the watermark to be processed is determined, in the embodiment, the capacity of the ciphertext embedded into the watermark to be processed cannot be larger than the capacity of the watermark to be processed, so that in the step, the maximum value of the capacity of the ciphertext embedded into the watermark to be processed can be determined according to the calculated capacity of the watermark to be processed; and the capacity of the ciphertext has a certain relation with the length of the ciphertext, so the maximum length of the ciphertext can be determined by utilizing the relation between the capacity of the ciphertext and the length of the ciphertext and the determined maximum capacity of the ciphertext. In practical application, the length of the ciphertext is determined according to the determined maximum length of the ciphertext and on the principle that the determined maximum length of the ciphertext is not larger than the maximum length of the ciphertext.
In practical applications, when the ciphertext in this embodiment is a hash ciphertext, the following formula (2) shows the relationship between the length of the ciphertext and the capacity of the ciphertext.
y=16x (2)
Where x represents the length of the hash cipher text and y represents the capacity of the hash cipher text.
It should be noted that the ciphertext in this embodiment is not limited to be the hash ciphertext, and in this step, the relationship between the ciphertext capacity and the ciphertext length is merely described visually by taking the relationship between the hash ciphertext capacity and the hash ciphertext length as an example.
Taking the hash ciphertext as "afe 39e 05", in this case, the hash ciphertext is 8-bit characters in length, and the hash ciphertext has a capacity of 168。
Taking the content of the watermark to be processed as 'XX bank copyright ownership' as an example, after the capacity of the watermark to be processed is determined, the maximum length of the secret information converted into the hash ciphertext can be determined according to the formula (2). And, according to the actual situation, a hash ciphertext length with the length not larger than the determined maximum length can be determined.
Step 104: and converting the secret information into a ciphertext with the determined length through a preset algorithm to obtain the converted ciphertext.
Since the hash algorithm can convert the secret information with any length and any structure into the hash ciphertext with the preset length, in this step, the preset algorithm can be the hash algorithm. After the length of the ciphertext is determined, the secret information can be converted into the hash ciphertext with the determined length through a hash algorithm.
Taking the watermark content to be processed as 'XX bank copyright ownership' as an example, in this step, personal information of a bank employee is converted into a ciphertext with a determined length. For example, the identity card number of the bank employee is converted into a hash ciphertext with a determined length through a hash algorithm.
Step 105: and detecting whether the converted ciphertext exists in the stored ciphertext.
In practical applications, when a plurality of different secret information correspond to the same ciphertext, for example, when the ciphertext corresponding to the personal information of a plurality of bank employees respectively is the same, when the content of the personal credit report of the client is leaked, it cannot be uniquely determined which bank employee the responsible person is. Therefore, in this embodiment, in order to prevent a plurality of secret information from corresponding to the same ciphertext, after the secret information is converted into the ciphertext by the predetermined algorithm, in this step, it is detected whether the converted ciphertext exists in the saved ciphertext. If the converted ciphertext exists in the stored ciphertext, the operation of step 106 is executed; if the converted ciphertext does not exist in the stored ciphertext, the operation of step 107 is performed.
In practical applications, when the embodiment is executed for the first time, the content of the stored ciphertext is empty, and as a result of executing this step, the converted ciphertext does not exist in the stored ciphertext.
Step 106: and converting the secret information into the ciphertext with the determined length again to obtain the converted ciphertext, and returning to execute the step 105.
When the converted ciphertext exists in the saved ciphertext, in this step, the secret information may be converted into the ciphertext with the determined length again through the hash algorithm. And detecting whether the currently obtained converted ciphertext exists in the stored ciphertext, if so, executing the action of the step until the currently obtained converted ciphertext does not exist in the stored ciphertext, and executing the action of the step 107.
Step 107: and correspondingly storing the secret information and the converted ciphertext.
In the case where it is determined that the currently converted ciphertext does not exist in the stored ciphertexts, the currently converted ciphertext and the secret information are stored in association with each other, for example, in a table in which the association between the secret information and the converted ciphertext is stored, and the ciphertexts stored in the table are different from each other.
It should be noted that, in practical applications, as for the storage manner of storing the secret information and the converted ciphertext, this embodiment only provides that the secret information and the converted ciphertext can be stored in a table manner, and in practical applications, the secret information and the converted ciphertext can also be stored in other manners, and this embodiment does not limit the specific storage manner.
Step 108: and embedding the converted ciphertext into the watermark to be processed to generate a watermark picture.
And when the stored ciphertext is detected to have no ciphertext obtained by current conversion, embedding the ciphertext obtained by current conversion into the watermark to be processed to generate the watermark picture.
In this embodiment, the beneficial effects of generating the watermark picture are as follows: on one hand, the method can ensure that the watermark picture keeps good visual effect in the aspects of background color, transparency, font color and gradient of visible watermark, and the like, and when the watermark picture is embedded into the digital carrier, the normal operation of a user on the digital carrier is not influenced. On the other hand, the invisible watermark content is ensured to keep the maximum occupied area in the watermark image, a series of attack means such as smearing, screen shooting, screen capturing, filter and the like are resisted, and the subsequent watermark information is conveniently extracted to the maximum extent.
In practical application, the sequence of step 107 and step 108 may be interchanged.
In a scene that a bank employee downloads a document of a client personal credit investigation report, after a generating device of the digital watermark generates the digital watermark embedded with the confidential information, the generated digital watermark is transmitted to a bank system, for example, a generated watermark picture is transmitted to the bank system, the bank system embeds the watermark picture in an operation page, at the moment, the personal information of the bank employee is embedded in the watermark picture, and after the bank employee downloads the document of the client personal credit investigation report in the page, the information of the bank employee is embedded in the downloaded document; thus, when the document of the personal credit report of the client is revealed, the responsible person can be located.
In this embodiment, a watermark to be processed is selected from a preset watermark set, the capacity of the watermark to be processed is calculated, and the length of a ciphertext embedded in the watermark to be processed is determined according to the relationship between the capacity of the ciphertext and the length of the ciphertext on the basis of the principle that the capacity of the ciphertext embedded in the watermark to be processed is not larger than the capacity of the watermark to be processed. Moreover, the preset algorithm can convert the secret information with any length and structure into the ciphertext with the preset length, so that in the embodiment of the application, the secret information with any length and structure can be converted into the ciphertext with the determined length through the preset algorithm, and at the moment, the capacity of the ciphertext obtained through conversion is not more than the capacity of the watermark to be processed; therefore, in the process of generating the digital watermark in the embodiment of the application, the secret information with any length and any structure can be hidden in the watermark to be processed within the allowable range of the capacity of the watermark to be processed.
In this embodiment, after the digital watermark embedded with the secret information is generated, the embedded information may be extracted from the digital watermark. Specifically, referring to fig. 2, a flowchart of an embodiment of a method for extracting secret information from a digital watermark in the present application is shown, where the embodiment of the method may include:
step 201: and extracting a ciphertext from the digital watermark of the secret information to be extracted.
In this embodiment, the process of extracting the ciphertext from the digital watermark from which the secret information is to be extracted is an inverse process of embedding the ciphertext into the watermark to be processed, and the process of extracting the ciphertext from the digital watermark is prior art, and the specific process may refer to the prior art, and this step is not described in detail again.
Step 202: and determining the secret information corresponding to the extracted ciphertext from the corresponding relation between the stored secret information and the converted ciphertext.
After the ciphertext is extracted, since the corresponding relationship between the secret information and the converted ciphertext is stored in the embodiment corresponding to fig. 1, in this step, the secret information corresponding to the extracted ciphertext can be determined from the corresponding relationship between the stored secret information and the ciphertext by means of table lookup.
In this embodiment, a method for extracting secret information is provided, and secret information can be quickly determined from a digital watermark by means of table lookup.
Referring to fig. 3, a schematic structural diagram of an embodiment of an apparatus for generating a digital watermark in the present application is shown, where the apparatus embodiment may include:
a selecting unit 301, configured to select a watermark from a preset watermark set as a to-be-processed watermark when a request for generating a digital watermark is received;
a calculating unit 302, configured to calculate a capacity of the watermark to be processed;
a first determining unit 303, configured to determine the length of the ciphertext embedded in the watermark to be processed according to that the capacity of the ciphertext embedded in the watermark to be processed is not greater than the capacity of the watermark to be processed, and a relationship between the capacity of the ciphertext and the length of the ciphertext;
a conversion unit 304, configured to convert the secret information into a ciphertext with the length through a preset algorithm, so as to obtain a converted ciphertext;
a generating unit 305, configured to embed the converted ciphertext into the watermark to be processed, so as to generate the digital watermark.
Wherein, the embodiment of the device can also comprise:
the detection unit is used for detecting whether the converted ciphertext exists in the stored ciphertext after the conversion unit converts the secret information into the ciphertext with the length to obtain the converted ciphertext;
the execution unit is used for returning to execute the operation of the conversion unit when the detection unit detects that the converted ciphertext exists in the stored ciphertext until the currently converted ciphertext does not exist in the stored ciphertext;
the generating unit is specifically configured to embed the currently converted ciphertext into the watermark to be processed, so as to generate the digital watermark.
The execution unit is further configured to detect that the converted ciphertext does not exist in the stored ciphertext and correspondingly store the secret information and the converted ciphertext in the detection unit; and the detection unit is further configured to, if the detection unit detects that the converted ciphertext exists in the stored ciphertext, correspondingly store the secret information and the current converted ciphertext.
The generating unit is specifically configured to embed the converted ciphertext into the watermark to be processed, and generate the digital watermark in a form of a picture.
Referring to fig. 4, a schematic structural diagram of an embodiment of a secret information extraction apparatus in the present application is shown, where the apparatus embodiment may include:
an extracting unit 401, configured to extract a ciphertext from the digital watermark from which the secret information is to be extracted; the digital watermark is generated according to the embodiment of the device corresponding to fig. 3;
a second determining unit 402, configured to determine, from the stored secret information and the converted ciphertext, the secret information corresponding to the extracted ciphertext.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. In this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms "comprising," "including," and the like, as used herein, are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is, the meaning of "includes but is not limited to". The invention can be applied to various fields, such as a mobile phone, a.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. A method for generating a digital watermark, comprising:
when a request for generating a digital watermark is received, selecting the watermark from a preset watermark set as a watermark to be processed;
calculating the capacity of the watermark to be processed;
determining the length of the ciphertext embedded in the watermark to be processed according to the relation between the capacity of the ciphertext embedded in the watermark to be processed and the length of the ciphertext, wherein the capacity of the ciphertext is not more than the capacity of the watermark to be processed;
converting the secret information with any length and any structure into a ciphertext with the length through a preset algorithm to obtain a converted ciphertext, wherein the capacity of the converted ciphertext is not more than that of the watermark to be processed;
and embedding the converted ciphertext into the watermark to be processed to generate the digital watermark.
2. The method of claim 1, wherein after converting the secret information into the ciphertext of the length to obtain the converted ciphertext, the method further comprises:
detecting whether the converted ciphertext exists in the stored ciphertext;
if the converted ciphertext exists in the stored ciphertext, returning to execute the step of converting the secret information into the ciphertext with the length to obtain the converted ciphertext until the currently converted ciphertext does not exist in the stored ciphertext;
the step of embedding the converted ciphertext into the watermark to be processed to generate the digital watermark specifically includes:
and embedding the currently converted ciphertext into the watermark to be processed to generate the digital watermark.
3. The method according to claim 2, wherein after the detecting whether the converted ciphertext exists in the saved ciphertext, the method further comprises:
if the converted ciphertext does not exist in the stored ciphertext, correspondingly storing the secret information and the converted ciphertext;
and if the converted ciphertext exists in the stored ciphertext, correspondingly storing the secret information and the current converted ciphertext.
4. The method according to any one of claims 1 to 3, wherein the embedding the converted ciphertext into the watermark to be processed to generate the digital watermark includes:
and embedding the converted ciphertext into the watermark to be processed, and generating the digital watermark in a picture form.
5. A method for extracting secret information, comprising:
extracting a ciphertext from the digital watermark of the confidential information to be extracted; the digital watermark is generated according to the method of any one of claims 1-4;
and determining the secret information corresponding to the extracted ciphertext from the stored secret information and the converted ciphertext.
6. An apparatus for generating a digital watermark, comprising:
the selecting unit is used for selecting the watermark from a preset watermark set as the watermark to be processed when a request for generating the digital watermark is received;
the computing unit is used for computing the capacity of the watermark to be processed;
the first determining unit is used for determining the length of the ciphertext embedded in the watermark to be processed according to the relation between the capacity of the ciphertext embedded in the watermark to be processed and the length of the ciphertext and the capacity of the ciphertext;
the conversion unit is used for converting the secret information with any length and any structure into the ciphertext with the length through a preset algorithm to obtain the converted ciphertext, and the capacity of the converted ciphertext is not more than the capacity of the watermark to be processed;
and the generating unit is used for embedding the converted ciphertext into the watermark to be processed to generate the digital watermark.
7. The apparatus of claim 6, further comprising:
the detection unit is used for detecting whether the converted ciphertext exists in the stored ciphertext after the conversion unit converts the secret information into the ciphertext with the length to obtain the converted ciphertext;
the execution unit is used for returning to execute the operation of the conversion unit when the detection unit detects that the converted ciphertext exists in the stored ciphertext until the currently converted ciphertext does not exist in the stored ciphertext;
the generating unit is specifically configured to embed the currently converted ciphertext into the watermark to be processed, so as to generate the digital watermark.
8. The apparatus of claim 7,
the execution unit is further configured to store the secret information and the converted ciphertext correspondingly when the detection unit detects that the converted ciphertext does not exist in the stored ciphertext;
the execution unit is further configured to, if the detection unit detects that the converted ciphertext exists in the stored ciphertext, store the secret information and the current converted ciphertext correspondingly.
9. The apparatus according to any one of claims 6 to 8,
the generating unit is specifically configured to embed the converted ciphertext into the watermark to be processed, and generate the digital watermark in a form of a picture.
10. An apparatus for extracting confidential information, comprising:
the extraction unit is used for extracting the ciphertext from the digital watermark of the confidential information to be extracted; the digital watermark is generated according to the device of any one of claims 6 to 9;
and the second determining unit is used for determining the secret information corresponding to the extracted ciphertext from the stored secret information and the converted ciphertext.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811098983.1A CN109325323B (en) | 2018-09-20 | 2018-09-20 | Digital watermark generation method, and secret information extraction method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811098983.1A CN109325323B (en) | 2018-09-20 | 2018-09-20 | Digital watermark generation method, and secret information extraction method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109325323A CN109325323A (en) | 2019-02-12 |
CN109325323B true CN109325323B (en) | 2020-12-15 |
Family
ID=65265237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811098983.1A Active CN109325323B (en) | 2018-09-20 | 2018-09-20 | Digital watermark generation method, and secret information extraction method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109325323B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101165699A (en) * | 2006-10-20 | 2008-04-23 | 中国科学院微电子研究所 | Digital product content protection system and method based on digital watermark |
CN105095699A (en) * | 2014-05-20 | 2015-11-25 | 富士通株式会社 | Watermark information embedding method and device, and watermark information decoding method |
CN105989569A (en) * | 2015-03-06 | 2016-10-05 | 北京万方数据股份有限公司 | Digital watermark embedding method and apparatus for EPUB document as well as extraction method and apparatus |
CN106228502A (en) * | 2016-07-15 | 2016-12-14 | 北华航天工业学院 | The digital watermark embedding of satellite remote-sensing image tiff file and extracting method |
-
2018
- 2018-09-20 CN CN201811098983.1A patent/CN109325323B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101165699A (en) * | 2006-10-20 | 2008-04-23 | 中国科学院微电子研究所 | Digital product content protection system and method based on digital watermark |
CN105095699A (en) * | 2014-05-20 | 2015-11-25 | 富士通株式会社 | Watermark information embedding method and device, and watermark information decoding method |
CN105989569A (en) * | 2015-03-06 | 2016-10-05 | 北京万方数据股份有限公司 | Digital watermark embedding method and apparatus for EPUB document as well as extraction method and apparatus |
CN106228502A (en) * | 2016-07-15 | 2016-12-14 | 北华航天工业学院 | The digital watermark embedding of satellite remote-sensing image tiff file and extracting method |
Also Published As
Publication number | Publication date |
---|---|
CN109325323A (en) | 2019-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahmed et al. | A secure and robust hash-based scheme for image authentication | |
Sivaram et al. | Steganography of two LSB bits | |
CN110211019A (en) | A kind of watermark insertion of image and extracting method and relevant apparatus | |
Lee et al. | A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding | |
Pal et al. | Weighted matrix based reversible watermarking scheme using color image | |
CN104933375A (en) | Method and system for protecting electronic display document | |
WO2019192375A1 (en) | Multimedia processing method and device thereof, storage medium, and electronic product | |
KR102108192B1 (en) | Method, Apparatus and System for Inserting Watermark | |
CN114782238A (en) | Image self-authentication method based on hash function and information hiding | |
CN109325323B (en) | Digital watermark generation method, and secret information extraction method and device | |
Mohammed et al. | Robust image watermarking scheme based on wavelet technique | |
Khairnar et al. | Steganography Using BPCS technology | |
Sharma et al. | A study of steganography based data hiding techniques | |
KR102180924B1 (en) | System and Method for Embedding and Extracting Digital Watermark Using QR Code | |
KR20200121638A (en) | Method for embeding and extracting watermark in biomedical image, device and computer readable medium for performing the method | |
WO2014075467A1 (en) | Method and device for information hiding and extraction | |
Iacobici et al. | Digital imaging processing and reconstruction for general applications | |
He et al. | Cryptanalysis on majority-voting based self-recovery watermarking scheme | |
CN102497602A (en) | Digital watermarking processing method and device | |
Vasil et al. | Digital Image Processing and Recognition in Industrial and Public Environments | |
CN113051615B (en) | Method, system and medium for preventing screen capturing leakage information in background | |
Huang et al. | Secure and Oblivious Information Hiding in Binary Image | |
Wu et al. | Research of image watermarking algorithm and application in eco-tourism digital museums copyrights protection | |
Palanisamy et al. | A steganography framework for easy secret sharing through images | |
Ridzon et al. | Robust digital watermarking in color images |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221109 Address after: 100005 No. 69, inner main street, Dongcheng District, Beijing, Jianguomen Patentee after: AGRICULTURAL BANK OF CHINA Patentee after: Agricultural Bank of China Financial Technology Co.,Ltd. Address before: 100005 No. 69, inner main street, Dongcheng District, Beijing, Jianguomen Patentee before: AGRICULTURAL BANK OF CHINA |