CN109727180A - A kind of screen message leakage traceability system and retroactive method - Google Patents

A kind of screen message leakage traceability system and retroactive method Download PDF

Info

Publication number
CN109727180A
CN109727180A CN201910003496.0A CN201910003496A CN109727180A CN 109727180 A CN109727180 A CN 109727180A CN 201910003496 A CN201910003496 A CN 201910003496A CN 109727180 A CN109727180 A CN 109727180A
Authority
CN
China
Prior art keywords
screen
watermark
information
module
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910003496.0A
Other languages
Chinese (zh)
Other versions
CN109727180B (en
Inventor
华建和
杨季春
李鹏程
徐波
刘安立
范力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU YUFEI INFORMATION ENGINEERING Co Ltd
Original Assignee
CHENGDU YUFEI INFORMATION ENGINEERING Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU YUFEI INFORMATION ENGINEERING Co Ltd filed Critical CHENGDU YUFEI INFORMATION ENGINEERING Co Ltd
Priority to CN201910003496.0A priority Critical patent/CN109727180B/en
Publication of CN109727180A publication Critical patent/CN109727180A/en
Application granted granted Critical
Publication of CN109727180B publication Critical patent/CN109727180B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a kind of screen message leakage traceability system and retroactive methods.A kind of client screen information progress watermark insertion is proposed, server-side cooperates the system architecture of original operation system progress centralized management.System includes screen watermark generation module, screen watermark display module, server-side control module, watermark information extraction module and watermark information enquiry module, it can be achieved to encode device numbering, user information, temporal information, generate screen watermarking images and real-time update, it links with operation system, when client checks or modifies sensitive information, control screen watermarking images are shown on client screen.When screen message leakage occurs, according to the bat screen of acquisition, screenshotss image, screen watermark information therein is extracted, the personnel of divulging a secret, time of divulging a secret can reliably be traced, protects the sensitive information of enterprise or department safety.

Description

A kind of screen message leakage traceability system and retroactive method
Technical field
The invention belongs to network security, information protection, screen message leakage tracking tracing technology fields.More particularly in net Under network environment, insertion digital watermarking protection is used to prevent user's screen message by screenshotss or clapping screen leakage, and to leakage Tracking traceability system used by information and tracking source tracing method.
Background technique
With the development of intelligent hand-held terminal and development of Mobile Internet technology, paperless office inevitably will appear sensitivity Information is by screenshotss, the outstanding problems such as divulge a secret of taking pictures.Only by being arranged using security protections such as access control, information encryption, log audits It applies, is difficult to trace the source of this mode leakage information, sensitive information cannot be prevented to flow out.Because under digital environment Image information by shooting style, the content of image information is transferred on other carriers by computer, although in information Appearance does not change, but the bearing mode of information but changes very big, existence of the general tracing technology due to its tracking information Period is short weak with the anti-attack ability of image, digital-to-analogue conversion and analog-to-digital conversion, perspective variation can not occur in information carrier and make an uproar In the case that sound is attacked, continues to track and trace to the source.Numerous enterprises and department, such as financial circles and government affairs department, all face Face the serious problems for needing to solve protection screen leakage of information.
Digital watermark technology is that identification information (i.e. digital watermarking) is directly embedded into digital carrier by computerized algorithm In, it without influencing its use value, and leads, be objectively not easy to be noticeable, there is extremely strong hidden sexual function, be that information security is ground One of hot spot technology with fastest developing speed in hair field, the highest attention by international academic community and business circles.In digital watermarking skill In art, it is ensured that safety be it is primary, by taking image digital watermark as an example, to ensure digital watermark information safety, it is necessary to use The modes such as scrambling and coding ensure the concealment of digital watermark information, make its be difficult to distort with technological means such as picture edittings and It forges;Second is robustness: be requirement digital watermark information pass through including interchannel noise, filtering, D/A and analog/digital conversion, After the treatment processes such as resampling, shearing, displacement, standard variation and lossy compression coding, remain to keep part integrality and energy Correctly identified.Therefore, digital watermark technology in practical applications, seeks both to be able to satisfy fidelity and requires to meet robustness again It is required that optimal digital watermark embedding method, be the difficult point and advantages of the present invention of digital watermark technology application development.
Summary of the invention
The present invention synthesizes the more recent application technology with machine vision, needle in conjunction with vision according to based on Digital Watermarking Theory Screenshotss, the problems such as divulging a secret of taking pictures are met with to screen message, applicant in this case has researched and developed to trace to the source for screen message leakage tracking Practical technique, divulge a secret and track needs of tracing to the source for the anti-screenshotss of user, anti-take pictures, a kind of practical and effective technical products are provided, Its technical solution is as follows:
A kind of screen message leakage traceability system, including screen watermark generation module, screen watermark display module, server-side Manage module, screen watermark information extraction module and screen watermark information enquiry module, it is characterised in that:
Screen watermark generation module has following function:
1) according to watermark code and display area size, miniature coding is carried out;
2) miniature coding is constantly repeated, carries out texture coding;
3) according to miniature coding and texture coding, screen watermarking images are generated;
Screen watermark display module has following function:
1) it is communicated with server-side control module, reports self-operating situation and client computer software and hardware information;
2) the control information of server-side control module is received, change watermark shows hidden state, content, color and transparency Deng;
3) screen watermarking images are carried out merging display with normal display content;
4) process, the thread protection for realizing itself, are not closed arbitrarily by user;
Server-side manages module, has following function:
1) managing user information database, system administrator database, log database etc.;
2) line duration of management screen watermark client, display intensity, watermark content etc.;
3) it is spaced on schedule, using new temporal information encoded watermark code, updates screen watermarking images and send;
4) it is associated and interacts with client's related service system, adjust screen watermark client on demand shows hidden and content;
Watermark information extraction module has following function:
1) to the image of screen shot or screenshotss, image enhancement and three-dimensional correction are carried out;
2) to the image that can read miniature coding, miniature coding and decoding is carried out, watermark code is obtained;
3) to the image that can not read miniature coding, texture coding decoding is carried out, watermark code is obtained;
3) according to watermark code coding principle, watermark code decoding is carried out, digital watermarking tracing information is obtained;
Watermark information enquiry module has following function:
1) there is authentication, log recording function;
2) it is decoded to obtain Customs Assigned Number according to watermark code, be inquired in User Information Database;
3) information such as device numbering, user of service's information, the leak time of screen message leakage be will lead to feed back, be Enterprise or department carry out leakage of information retrospect and provide foundation;
Above-mentioned screen message leaks traceability system, relies on computer network cooperation existing business system operation.
The beneficial effects of the present invention are:
(1) the present invention provides a kind of effective screen messages to leak retrospect means.The original operation system of client can root According to the level of confidentiality of display content, whether real-time control needs to show screen watermark on client screen, and can control watermark Content, color and transparency;After screen message leakage, leakage can be traced back to according to the watermark information in leakage image The device numbering of information person, personal information, temporal information are accurately realized and are called to account afterwards.
(2) present invention is less to the vision interference of client user.Watermark information has certain concealment, watermark Code is expressed as the decorative pattern or texture with certain rule on screen watermarking images, compared to common plaintext watermark, to client It holds the attention interference of user smaller, does not influence normal office work.
(3) deterrent effect to client user can be achieved in the present invention.The display of screen watermark, to there are information to let out The user for leaking possibility has watchful effect, makes it that dare not carry out screen shot or screenshotss, reduces the possibility of inadvertent disclosure Property.
(4) present invention has stronger robustness and is difficult to the outstanding advantages for being forged and distorting.Because in screen watermark In image, have three kinds of very strong watermarks of robustness formed by watermark code, miniature coding and texture coding combination of interactions Embedded mode, user can retain the watermark information of miniature coding when intercepting a fritter screen;Relatively remote or focusing not In the case where standard when photographed screen, the watermark information of texture coding can be retained, and miniature coding and texture coding all have relatively by force Redundancy, can also be decoded in the incomplete situation of watermarking images;And the coding mode of its watermark code, miniature coding It all include disorder processing feature with texture coding, it is difficult to be forged and be distorted.
(5) present invention has wide applicability.Total system can be based on Browser/Server Mode (B/S), client End/server mode (C/S), mobile terminal application software/server mode, remote virtual desktop mode are disposed, can be It is run in the systems such as Windows, Linux, Mac OS, IOS, Android, is suitable for local area network and internet environment, to existing industry Business system process flow is without influence, the security management and controls technologies such as completely compatible all kinds of encryptions, certification, filtering, audit.
Detailed description of the invention
Fig. 1 is the screen watermarking images with miniature coding and texture coding
Fig. 2 is that screen watermarking images and client screen normally show the image after content mergence
Fig. 3 is that analog subscriber screenshotss are divulged a secret the details enlarged drawing of image
Fig. 4 is that analog subscriber claps the overall diagram for shielding image of divulging a secret
Fig. 5 is that screen message of the present invention leaks traceability system composition figure
Fig. 6 is that screen message of the present invention leaks traceability system flow chart
Fig. 7 is that screen message of the present invention leaks traceability system administration interface figure
Wherein: Fig. 1 is the screen watermarking images with miniature coding and texture coding;It is connect by server-side control module After the client-related information reported to screen watermark display module, binding time information encodes customer information to obtain watermark Code, then watermark code is subjected to miniature coding and texture coding via the screen watermark generation module of server-side and is generated;Screen water Watermark image regularly updates temporal information wherein included.
Fig. 2 is that screen watermarking images and client screen normally show the image after content mergence;Client screen watermark After display module receives screen watermarking images, normally show that content carries out fusion treatment with screen, and fused image is shown On client screen.
Fig. 3 is that analog subscriber screenshotss are divulged a secret image detail enlarged drawing;After user's progress screenshotss are divulged a secret, system manager passes through To divulging a secret, image is amplified, and can be traced blabber by extracting miniature coding and be divulged a secret the time.
Fig. 4 is that image overall diagram of divulging a secret is shielded in analog subscriber bat;User clap after screen divulges a secret, and system manager is by letting out Close image carries out global analysis, can trace blabber by extracting texture coding and divulge a secret the time.
Fig. 5 is screen message leakage traceability system composition figure of the present invention;Whole system is by screen watermark generation module, screen Watermark display module, server-side manage 5 module, screen watermark information extraction module and screen watermark information enquiry module parts Composition, wherein screen watermark generation module, server-side control module are deployed in server-side, and screen watermark display module is deployed in visitor Family end, screen watermark information extraction module, screen watermark information enquiry module are deployed in system administrator computer.
Fig. 6 is screen message leakage traceability system flow chart of the present invention;This system basic procedure are as follows: 1. client screen water It prints display module and sends customer information to server-side control module;2. server-side manages module according to customer information and temporal information Generate watermark code, recall screen watermark generation module generate containing it is miniature coding and texture coding screen watermarking images, Screen watermarking images are sent to client screen watermark display module again;3. client screen watermark display module is by screen water After watermark image and screen normally show content mergence, it is shown on client screen;4. (clapping screen after the leakage of a state or party secret occurs or cutting Screen), system manager calls screen watermark information extraction module to decode the water in image of divulging a secret according to the image of divulging a secret of acquisition Official seal breath, the watermark code being embedded in reuse watermark code and screen watermark information enquiry module are called to obtain blabber's identity Information and temporal information of divulging a secret complete retrospect process.
Fig. 7 is screen message leakage traceability system administration interface figure of the present invention;The system management software is disposed on the server, System manager can carry out remote web page login, realize system running state monitoring, real-time control, information inquiry, log audit Etc. functions.
Specific embodiment
6 pairs of present invention tracking processes of tracing to the source are described in detail with reference to the accompanying drawing:
Using screen message of the present invention leak traceability system, to screen message by screenshotss, taking pictures to divulge a secret chases after The method that track is traced to the source operates in the steps below:
The first step, client operating system (application software) starting, screen watermark display module automatic running therein are received Collect client software and hardware information, to server-side control module report self-operating situation and client-related information;
Second step, server-side manage module registers client operating condition, and by inquiring client-related information, will look into The customer information binding time information ask is encoded to obtain watermark code, and the screen watermark generation module of server-side uses watermark Code generates the screen watermarking images containing miniature coding and texture coding, is sent to client screen watermark display module on demand;
Third step, client screen watermark display module receive screen watermarking images, it is melted with normal display content After conjunction, it is shown on client screen;After blabber leaks screen display content by screenshotss, the modes such as take pictures, what is divulged a secret Screen watermarking images will be contained in image;
4th step, system manager obtain image of divulging a secret, and call watermark information extraction module to carry out image of divulging a secret miniature Coding extracts (Fig. 3) or texture coding extracts (Fig. 4), then decodes to watermark code, by calling watermark information enquiry module to look into It askes, to obtain the number for the user that divulges a secret and divulge a secret the time, to call to account, processing provides reliable basis.
Embodiment 1: screen message is let out using Browser/Server Mode (B/S) Automatic work system (OA system) The tracing mode of leakage:
The browser plug-in containing screen watermark display module is installed for each client terminal machine, on the server installation screen Curtain watermark generation module and service end pipe control module, on system administrator computer install screen watermark information extraction module and Screen watermark information enquiry module;Operation interface is provided for existing OA system, computer network is relied on to cooperate existing business system Operation.
After the first step, client log in OA system by browser, browser plug-in collects computer name, the net of client The software and hardwares information such as network address (IP address), hardware address (MAC Address), login username are issued to server-side control module Registration;Server-side manages module and inquires client identity according to related software and hardware information, uses current time and user information Encoded watermark code, screen watermark generation module carries out miniature coding to watermark code and texture coding generates screen watermarking images (figure 1), it is sent to client browser plug-in unit;
Second step, OA system issue specific use after receiving user and requesting browsing sensitive information, to server-side control module Family watermarking order, server-side manage module and send display command to the browser plug-in of corresponding client again, and by minimum retrospect Time interval updates screen watermarking images to client, and client screen watermark display module is responsible for showing screen watermarking images On client screen (Fig. 2);When exiting sensitive information browsing, screen watermark is closed by OA system manipulation server-side control module The display of image stops screen watermarking images and updates;
Third step, system manager can carry out system user rights management, abnormal thing by login system administration page Whether online the operations such as part checks, log audit, can monitor client browser plug-in unit in real time, and in real time modifying watermark code Appearance, color and transparency (Fig. 7).
In screenshotss or after clapping screen, propagating associated picture causes screen message to leak by 4th step, user;System manager uses The image of divulging a secret intercepted and captured carries out miniature coding to image of divulging a secret by screen watermark information extraction module and extracts (Fig. 3) or texture volume Code extracts (Fig. 4), then carries out watermark code decoding, by calling the inquiry of watermark information enquiry module, obtains the number for the user that divulges a secret With the time of divulging a secret, foundation of effectively calling to account is provided for the retrospect leakage of a state or party secret.
Apply example 2: using the desktop system screen message leakage tracing mode of customer end/server mode (C/S):
In the present embodiment, it is only that with the difference of embodiment 1 and is shown for the installation of each client terminal machine containing screen watermark Show the application program of module, screen watermark display module follows FTP client FTP to start and start to work automatically.Server setting It is identical as example 1 is applied with implementing procedure.
Embodiment 3: using mobile terminal application software/server mode mobile device screen leakage of information tracing mode:
In the present embodiment, it is only that with the difference of embodiment 1 and is shown for the installation of each client terminal machine containing screen watermark Show the mobile applications of module, when user starts mobile applications, screen watermark display module is started to work.Server is set It sets identical as example 1 is applied with implementing procedure.
Embodiment 4: tracing mode is leaked using the screen message of remote virtual desktop mode:
In the present embodiment, it is only that with the difference of embodiment 1 and is shown for the installation of each client terminal machine containing screen watermark The remote virtual desktop terminal for showing module, after the starting of remote virtual desktop terminal, screen watermark display module is started to work.Clothes The setting of business device and implementing procedure are identical as example 1 is applied.

Claims (3)

1. a kind of screen message leaks traceability system, including screen watermark generation module, screen watermark display module, service end pipe Control module, screen watermark information extraction module and screen watermark information enquiry module, it is characterised in that wherein:
Screen watermark generation module has following function:
1) according to watermark code and display area size, miniature coding is carried out;
2) miniature coding is constantly repeated, carries out texture coding;
3) according to miniature coding and texture coding, screen watermarking images are generated;
Screen watermark display module has following function:
1) it is communicated with server-side control module, reports self-operating situation and client computer software and hardware information;
2) the control information of server-side control module is received, change watermark shows hidden state, content, color and transparency etc.;
3) screen watermarking images are carried out merging display with normal display content;
4) process, the thread protection for realizing itself, are not closed arbitrarily by user;
Server-side manages module, has following function:
1) managing user information database, system administrator database, log database etc.;
2) line duration of management screen watermark client, display intensity, watermark content etc.;
3) it is spaced on schedule, using new temporal information encoded watermark code, updates screen watermarking images and send;
4) it is associated and interacts with client's related service system, adjust screen watermark client on demand shows hidden and content;
Watermark information extraction module has following function:
1) to the image of screen shot or screenshotss, image enhancement and three-dimensional correction are carried out;
2) to the image that can read miniature coding, miniature coding and decoding is carried out, watermark code is obtained;
3) to the image that can not read miniature coding, texture coding decoding is carried out, watermark code is obtained;
3) according to watermark code coding principle, watermark code decoding is carried out, digital watermarking tracing information is obtained;
Watermark information enquiry module has following function:
1) there is authentication, log recording function;
2) it is decoded to obtain Customs Assigned Number according to watermark code, be inquired in User Information Database;
3) information such as device numbering, user of service's information, the leak time of screen message leakage be will lead to feed back, be enterprise Or department carries out leakage of information retrospect and provides foundation;
Above-mentioned screen message leaks traceability system, relies on computer network cooperation existing business system operation.
2. using screen message described in claim 1 leak traceability system, to screen message by screenshotss, taking pictures to divulge a secret chases after The method that track is traced to the source operates in the steps below:
The first step, client operating system (application software) starting, screen watermark display module automatic running therein collect visitor Family end software and hardware information, to server-side control module report self-operating situation and client-related information;
Second step, server-side manage module registers client operating condition, and by inquiring client-related information, will inquire Customer information binding time information encoded to obtain watermark code, the screen watermark generation module of server-side call watermark code into The miniature coding of row and texture coding generate the screen watermarking images with watermark code, miniature coding and texture coding, send on demand Give client screen watermark display module;
Third step, client screen watermark display module receive screen watermarking images, by its with after normal display content mergence, It is shown on client screen;After blabber leaks screen display content by screenshotss, the modes such as take pictures, in the image divulged a secret Screen watermarking images will be contained;
4th step, system manager obtain image of divulging a secret, and watermark information extraction module is called to carry out miniature coding to image of divulging a secret It extracts (Fig. 3) or texture coding extracts (Fig. 4), then watermark code is decoded, by calling the inquiry of watermark information enquiry module, obtain Divulge a secret user number and divulge a secret the time, to call to account, processing provides reliable basis.
3. screen message described in accordance with the claim 1 leaks traceability system, it is characterised in that:
Can using 1. Browser/Server Mode (B/S), 2. customer end/server mode (C/S), 3. mobile terminal is using soft Part/server mode, 4. remote virtual desktop mode is disposed;Be on the server installation screen watermark generation module and Server-side manages module, and screen watermark information extraction module and the inquiry of screen watermark information are installed on system administrator computer Module;For 1. Browser/Server Mode (B/S), contain screen watermark display module for the installation of each client terminal machine Browser plug-in;For the desktop system of 2. customer end/server mode (C/S), contain screen for the installation of each client terminal machine The application program of curtain watermark display module;For 3. mobile terminal application software/server mode, installed for each client terminal machine Mobile applications containing screen watermark display module;For 4. remote virtual desktop mode, pacify for each client terminal machine Fill the remote virtual desktop terminal containing screen watermark display module;To 1. 2. 3. 4. mode for existing business system provides operation Interface relies on computer network cooperation existing business system operation.
CN201910003496.0A 2019-01-03 2019-01-03 Screen information leakage tracing system and tracing method Active CN109727180B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910003496.0A CN109727180B (en) 2019-01-03 2019-01-03 Screen information leakage tracing system and tracing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910003496.0A CN109727180B (en) 2019-01-03 2019-01-03 Screen information leakage tracing system and tracing method

Publications (2)

Publication Number Publication Date
CN109727180A true CN109727180A (en) 2019-05-07
CN109727180B CN109727180B (en) 2023-06-13

Family

ID=66299565

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910003496.0A Active CN109727180B (en) 2019-01-03 2019-01-03 Screen information leakage tracing system and tracing method

Country Status (1)

Country Link
CN (1) CN109727180B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110730355A (en) * 2019-09-06 2020-01-24 西安万像电子科技有限公司 Video image processing method and device
CN110990800A (en) * 2019-11-26 2020-04-10 合肥高维数据技术有限公司 Watermark processing method and system based on application program
CN111191414A (en) * 2019-11-11 2020-05-22 苏州亿歌网络科技有限公司 Page watermark generation method, identification method, device, equipment and storage medium
CN111242824A (en) * 2019-12-05 2020-06-05 北京万里红科技股份有限公司 Watermark embedding method, tracing method, device and storage medium
CN111402109A (en) * 2020-03-07 2020-07-10 北京北信源软件股份有限公司 Method and device for setting digital watermark of instant messaging user interface
CN112464177A (en) * 2019-09-06 2021-03-09 成都鼎桥通信技术有限公司 Watermark full-coverage method and device
CN112579993A (en) * 2020-12-22 2021-03-30 浙江财经大学 Watermark shading-based source tracing and evidence obtaining system and method for resisting screen shooting attack
CN112616056A (en) * 2020-12-18 2021-04-06 广州虎牙科技有限公司 Reporting alarm method and device based on watermark monitoring
CN112650994A (en) * 2020-12-25 2021-04-13 平安科技(深圳)有限公司 Screen watermark generation method and device, electronic equipment and storage medium
CN113312593A (en) * 2020-02-26 2021-08-27 中国航天系统工程有限公司 Tracking management system and method for dynamically tracking leakage information
CN113360860A (en) * 2021-08-09 2021-09-07 江苏羽驰区块链科技研究院有限公司 Screen divulgence protection method based on block chain
CN113469869A (en) * 2021-09-03 2021-10-01 武汉华工安鼎信息技术有限责任公司 Image management method and device
CN113672961A (en) * 2021-08-26 2021-11-19 北京中安星云软件技术有限公司 Information leakage tracking method and device
CN116703688A (en) * 2023-08-09 2023-09-05 江苏中威科技软件系统有限公司 Algorithm technology capable of guaranteeing watermark display effect of terminal
CN118396828A (en) * 2024-05-10 2024-07-26 北京国隐科技有限公司 Screen watermark processing method, screen watermark extracting method and screen watermark extracting device

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201111783Y (en) * 2007-10-25 2008-09-10 西安环球印务股份有限公司 Micro code fleeing goods prevention packing box
CN102685076A (en) * 2011-03-16 2012-09-19 中国电信股份有限公司 Online information protection method and device
CN103632106A (en) * 2013-12-18 2014-03-12 北京明朝万达科技有限公司 OA (office automation) data protection method and system based on OA flow
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN104992208A (en) * 2015-06-30 2015-10-21 合肥中玛信息科技有限公司 Anti-counterfeiting method through comparison identification with encryption patterns by use of two-dimensional codes
CN105005803A (en) * 2015-06-29 2015-10-28 合肥中玛信息科技有限公司 Method for generating color two-dimensional code to carry out anti-counterfeiting
WO2016177301A1 (en) * 2015-05-01 2016-11-10 励元科技(上海)有限公司 Micro-texture anti-counterfeit method
US20160335733A1 (en) * 2015-05-12 2016-11-17 Digify Pte Ltd Method and system for adaptive content protection
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output
CN107766912A (en) * 2017-12-05 2018-03-06 海南拍拍看信息技术有限公司 De-noising two-dimension code anti-counterfeit printed article
CN108563930A (en) * 2018-04-16 2018-09-21 深圳市联软科技股份有限公司 A kind of method, apparatus, medium and the system of confidential document addition watermark

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201111783Y (en) * 2007-10-25 2008-09-10 西安环球印务股份有限公司 Micro code fleeing goods prevention packing box
CN102685076A (en) * 2011-03-16 2012-09-19 中国电信股份有限公司 Online information protection method and device
CN103632106A (en) * 2013-12-18 2014-03-12 北京明朝万达科技有限公司 OA (office automation) data protection method and system based on OA flow
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
WO2016177301A1 (en) * 2015-05-01 2016-11-10 励元科技(上海)有限公司 Micro-texture anti-counterfeit method
US20160335733A1 (en) * 2015-05-12 2016-11-17 Digify Pte Ltd Method and system for adaptive content protection
CN105005803A (en) * 2015-06-29 2015-10-28 合肥中玛信息科技有限公司 Method for generating color two-dimensional code to carry out anti-counterfeiting
CN104992208A (en) * 2015-06-30 2015-10-21 合肥中玛信息科技有限公司 Anti-counterfeiting method through comparison identification with encryption patterns by use of two-dimensional codes
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output
CN107766912A (en) * 2017-12-05 2018-03-06 海南拍拍看信息技术有限公司 De-noising two-dimension code anti-counterfeit printed article
CN108563930A (en) * 2018-04-16 2018-09-21 深圳市联软科技股份有限公司 A kind of method, apparatus, medium and the system of confidential document addition watermark

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黄开等: "屏幕水印技术在公安数据防泄露中的应用实践", 《电子技术与软件工程》 *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112464177A (en) * 2019-09-06 2021-03-09 成都鼎桥通信技术有限公司 Watermark full-coverage method and device
CN112464177B (en) * 2019-09-06 2023-10-17 成都鼎桥通信技术有限公司 Watermark full-coverage method and device
CN110730355A (en) * 2019-09-06 2020-01-24 西安万像电子科技有限公司 Video image processing method and device
CN111191414A (en) * 2019-11-11 2020-05-22 苏州亿歌网络科技有限公司 Page watermark generation method, identification method, device, equipment and storage medium
CN110990800A (en) * 2019-11-26 2020-04-10 合肥高维数据技术有限公司 Watermark processing method and system based on application program
CN110990800B (en) * 2019-11-26 2022-04-12 合肥高维数据技术有限公司 Watermark processing method and system based on application program
CN111242824A (en) * 2019-12-05 2020-06-05 北京万里红科技股份有限公司 Watermark embedding method, tracing method, device and storage medium
CN113312593A (en) * 2020-02-26 2021-08-27 中国航天系统工程有限公司 Tracking management system and method for dynamically tracking leakage information
CN111402109A (en) * 2020-03-07 2020-07-10 北京北信源软件股份有限公司 Method and device for setting digital watermark of instant messaging user interface
CN112616056B (en) * 2020-12-18 2023-04-07 广州虎牙科技有限公司 Reporting alarm method and device based on watermark monitoring
CN112616056A (en) * 2020-12-18 2021-04-06 广州虎牙科技有限公司 Reporting alarm method and device based on watermark monitoring
CN112579993B (en) * 2020-12-22 2023-05-23 浙江财经大学 Anti-screen-shot-attack tracing evidence obtaining system and method based on watermark shading
CN112579993A (en) * 2020-12-22 2021-03-30 浙江财经大学 Watermark shading-based source tracing and evidence obtaining system and method for resisting screen shooting attack
CN112650994B (en) * 2020-12-25 2024-06-25 平安科技(深圳)有限公司 Screen watermark generation method and device, electronic equipment and storage medium
CN112650994A (en) * 2020-12-25 2021-04-13 平安科技(深圳)有限公司 Screen watermark generation method and device, electronic equipment and storage medium
CN113360860A (en) * 2021-08-09 2021-09-07 江苏羽驰区块链科技研究院有限公司 Screen divulgence protection method based on block chain
CN113672961A (en) * 2021-08-26 2021-11-19 北京中安星云软件技术有限公司 Information leakage tracking method and device
CN113672961B (en) * 2021-08-26 2024-04-26 北京中安星云软件技术有限公司 Information leakage tracking method and device
CN113469869B (en) * 2021-09-03 2021-11-12 武汉华工安鼎信息技术有限责任公司 Image management method and device
CN113469869A (en) * 2021-09-03 2021-10-01 武汉华工安鼎信息技术有限责任公司 Image management method and device
CN116703688A (en) * 2023-08-09 2023-09-05 江苏中威科技软件系统有限公司 Algorithm technology capable of guaranteeing watermark display effect of terminal
CN116703688B (en) * 2023-08-09 2023-11-17 江苏中威科技软件系统有限公司 Method capable of guaranteeing watermark display effect of terminal
CN118396828A (en) * 2024-05-10 2024-07-26 北京国隐科技有限公司 Screen watermark processing method, screen watermark extracting method and screen watermark extracting device

Also Published As

Publication number Publication date
CN109727180B (en) 2023-06-13

Similar Documents

Publication Publication Date Title
CN109727180A (en) A kind of screen message leakage traceability system and retroactive method
CN105743916A (en) Information processing method, system and device for enhancing access security
CN113411638A (en) Video file playing processing method and device, electronic equipment and storage medium
CN110990800B (en) Watermark processing method and system based on application program
CN103618693A (en) A cloud manufacturing user data management and control method based on labels
DE112013005781T5 (en) An image management system and method for fingerprint confirmation
CN105516085A (en) System and method for managing temporary internet surfing behavior by visitor
JP7236042B2 (en) Face Recognition Application Using Homomorphic Encryption
CN107659481A (en) Long-range control method, device and storage medium based on Virtual Private Network
CN103379108B (en) A kind of flexible safe central authentication method
CN110855664A (en) Network certificate system
KR102365571B1 (en) Method and apparatus for managing password including one-time password issuance function for integrally managing closed-circuit television
CN114024754A (en) Method and system for encrypting running of application system software
CN113037611A (en) Mobile safety instant communication method based on multiple public IM channels
CN111611600B (en) Service processing method and system based on cloud platform
CN109040761A (en) A kind of monitoring on-wall system with encrypted watermark
CN112241541A (en) Community security application method based on block chain and portrait recognition technology
CN109218318A (en) A kind of things-internet gateway login detecting method based on equipment knowledge
CN111897196B (en) Method and system for hiding and extracting digital holographic information
CN112383737B (en) Video processing verification method and device for multi-user online content on same screen and electronic equipment
CN114153841A (en) Technical data encryption storage and viewing method
CN110278549B (en) Network conference method, network conference system and computer readable storage medium
KR101861441B1 (en) Finance service providing method using simple login and server performing the same
Alam et al. Manipulation and transparency control of ICT constituted e-administrative protocol via digital watermarking for LDC's
CN116049322B (en) Data sharing platform and method based on privacy calculation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant