CN109727180A - A kind of screen message leakage traceability system and retroactive method - Google Patents
A kind of screen message leakage traceability system and retroactive method Download PDFInfo
- Publication number
- CN109727180A CN109727180A CN201910003496.0A CN201910003496A CN109727180A CN 109727180 A CN109727180 A CN 109727180A CN 201910003496 A CN201910003496 A CN 201910003496A CN 109727180 A CN109727180 A CN 109727180A
- Authority
- CN
- China
- Prior art keywords
- screen
- watermark
- information
- module
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a kind of screen message leakage traceability system and retroactive methods.A kind of client screen information progress watermark insertion is proposed, server-side cooperates the system architecture of original operation system progress centralized management.System includes screen watermark generation module, screen watermark display module, server-side control module, watermark information extraction module and watermark information enquiry module, it can be achieved to encode device numbering, user information, temporal information, generate screen watermarking images and real-time update, it links with operation system, when client checks or modifies sensitive information, control screen watermarking images are shown on client screen.When screen message leakage occurs, according to the bat screen of acquisition, screenshotss image, screen watermark information therein is extracted, the personnel of divulging a secret, time of divulging a secret can reliably be traced, protects the sensitive information of enterprise or department safety.
Description
Technical field
The invention belongs to network security, information protection, screen message leakage tracking tracing technology fields.More particularly in net
Under network environment, insertion digital watermarking protection is used to prevent user's screen message by screenshotss or clapping screen leakage, and to leakage
Tracking traceability system used by information and tracking source tracing method.
Background technique
With the development of intelligent hand-held terminal and development of Mobile Internet technology, paperless office inevitably will appear sensitivity
Information is by screenshotss, the outstanding problems such as divulge a secret of taking pictures.Only by being arranged using security protections such as access control, information encryption, log audits
It applies, is difficult to trace the source of this mode leakage information, sensitive information cannot be prevented to flow out.Because under digital environment
Image information by shooting style, the content of image information is transferred on other carriers by computer, although in information
Appearance does not change, but the bearing mode of information but changes very big, existence of the general tracing technology due to its tracking information
Period is short weak with the anti-attack ability of image, digital-to-analogue conversion and analog-to-digital conversion, perspective variation can not occur in information carrier and make an uproar
In the case that sound is attacked, continues to track and trace to the source.Numerous enterprises and department, such as financial circles and government affairs department, all face
Face the serious problems for needing to solve protection screen leakage of information.
Digital watermark technology is that identification information (i.e. digital watermarking) is directly embedded into digital carrier by computerized algorithm
In, it without influencing its use value, and leads, be objectively not easy to be noticeable, there is extremely strong hidden sexual function, be that information security is ground
One of hot spot technology with fastest developing speed in hair field, the highest attention by international academic community and business circles.In digital watermarking skill
In art, it is ensured that safety be it is primary, by taking image digital watermark as an example, to ensure digital watermark information safety, it is necessary to use
The modes such as scrambling and coding ensure the concealment of digital watermark information, make its be difficult to distort with technological means such as picture edittings and
It forges;Second is robustness: be requirement digital watermark information pass through including interchannel noise, filtering, D/A and analog/digital conversion,
After the treatment processes such as resampling, shearing, displacement, standard variation and lossy compression coding, remain to keep part integrality and energy
Correctly identified.Therefore, digital watermark technology in practical applications, seeks both to be able to satisfy fidelity and requires to meet robustness again
It is required that optimal digital watermark embedding method, be the difficult point and advantages of the present invention of digital watermark technology application development.
Summary of the invention
The present invention synthesizes the more recent application technology with machine vision, needle in conjunction with vision according to based on Digital Watermarking Theory
Screenshotss, the problems such as divulging a secret of taking pictures are met with to screen message, applicant in this case has researched and developed to trace to the source for screen message leakage tracking
Practical technique, divulge a secret and track needs of tracing to the source for the anti-screenshotss of user, anti-take pictures, a kind of practical and effective technical products are provided,
Its technical solution is as follows:
A kind of screen message leakage traceability system, including screen watermark generation module, screen watermark display module, server-side
Manage module, screen watermark information extraction module and screen watermark information enquiry module, it is characterised in that:
Screen watermark generation module has following function:
1) according to watermark code and display area size, miniature coding is carried out;
2) miniature coding is constantly repeated, carries out texture coding;
3) according to miniature coding and texture coding, screen watermarking images are generated;
Screen watermark display module has following function:
1) it is communicated with server-side control module, reports self-operating situation and client computer software and hardware information;
2) the control information of server-side control module is received, change watermark shows hidden state, content, color and transparency
Deng;
3) screen watermarking images are carried out merging display with normal display content;
4) process, the thread protection for realizing itself, are not closed arbitrarily by user;
Server-side manages module, has following function:
1) managing user information database, system administrator database, log database etc.;
2) line duration of management screen watermark client, display intensity, watermark content etc.;
3) it is spaced on schedule, using new temporal information encoded watermark code, updates screen watermarking images and send;
4) it is associated and interacts with client's related service system, adjust screen watermark client on demand shows hidden and content;
Watermark information extraction module has following function:
1) to the image of screen shot or screenshotss, image enhancement and three-dimensional correction are carried out;
2) to the image that can read miniature coding, miniature coding and decoding is carried out, watermark code is obtained;
3) to the image that can not read miniature coding, texture coding decoding is carried out, watermark code is obtained;
3) according to watermark code coding principle, watermark code decoding is carried out, digital watermarking tracing information is obtained;
Watermark information enquiry module has following function:
1) there is authentication, log recording function;
2) it is decoded to obtain Customs Assigned Number according to watermark code, be inquired in User Information Database;
3) information such as device numbering, user of service's information, the leak time of screen message leakage be will lead to feed back, be
Enterprise or department carry out leakage of information retrospect and provide foundation;
Above-mentioned screen message leaks traceability system, relies on computer network cooperation existing business system operation.
The beneficial effects of the present invention are:
(1) the present invention provides a kind of effective screen messages to leak retrospect means.The original operation system of client can root
According to the level of confidentiality of display content, whether real-time control needs to show screen watermark on client screen, and can control watermark
Content, color and transparency;After screen message leakage, leakage can be traced back to according to the watermark information in leakage image
The device numbering of information person, personal information, temporal information are accurately realized and are called to account afterwards.
(2) present invention is less to the vision interference of client user.Watermark information has certain concealment, watermark
Code is expressed as the decorative pattern or texture with certain rule on screen watermarking images, compared to common plaintext watermark, to client
It holds the attention interference of user smaller, does not influence normal office work.
(3) deterrent effect to client user can be achieved in the present invention.The display of screen watermark, to there are information to let out
The user for leaking possibility has watchful effect, makes it that dare not carry out screen shot or screenshotss, reduces the possibility of inadvertent disclosure
Property.
(4) present invention has stronger robustness and is difficult to the outstanding advantages for being forged and distorting.Because in screen watermark
In image, have three kinds of very strong watermarks of robustness formed by watermark code, miniature coding and texture coding combination of interactions
Embedded mode, user can retain the watermark information of miniature coding when intercepting a fritter screen;Relatively remote or focusing not
In the case where standard when photographed screen, the watermark information of texture coding can be retained, and miniature coding and texture coding all have relatively by force
Redundancy, can also be decoded in the incomplete situation of watermarking images;And the coding mode of its watermark code, miniature coding
It all include disorder processing feature with texture coding, it is difficult to be forged and be distorted.
(5) present invention has wide applicability.Total system can be based on Browser/Server Mode (B/S), client
End/server mode (C/S), mobile terminal application software/server mode, remote virtual desktop mode are disposed, can be
It is run in the systems such as Windows, Linux, Mac OS, IOS, Android, is suitable for local area network and internet environment, to existing industry
Business system process flow is without influence, the security management and controls technologies such as completely compatible all kinds of encryptions, certification, filtering, audit.
Detailed description of the invention
Fig. 1 is the screen watermarking images with miniature coding and texture coding
Fig. 2 is that screen watermarking images and client screen normally show the image after content mergence
Fig. 3 is that analog subscriber screenshotss are divulged a secret the details enlarged drawing of image
Fig. 4 is that analog subscriber claps the overall diagram for shielding image of divulging a secret
Fig. 5 is that screen message of the present invention leaks traceability system composition figure
Fig. 6 is that screen message of the present invention leaks traceability system flow chart
Fig. 7 is that screen message of the present invention leaks traceability system administration interface figure
Wherein: Fig. 1 is the screen watermarking images with miniature coding and texture coding;It is connect by server-side control module
After the client-related information reported to screen watermark display module, binding time information encodes customer information to obtain watermark
Code, then watermark code is subjected to miniature coding and texture coding via the screen watermark generation module of server-side and is generated;Screen water
Watermark image regularly updates temporal information wherein included.
Fig. 2 is that screen watermarking images and client screen normally show the image after content mergence;Client screen watermark
After display module receives screen watermarking images, normally show that content carries out fusion treatment with screen, and fused image is shown
On client screen.
Fig. 3 is that analog subscriber screenshotss are divulged a secret image detail enlarged drawing;After user's progress screenshotss are divulged a secret, system manager passes through
To divulging a secret, image is amplified, and can be traced blabber by extracting miniature coding and be divulged a secret the time.
Fig. 4 is that image overall diagram of divulging a secret is shielded in analog subscriber bat;User clap after screen divulges a secret, and system manager is by letting out
Close image carries out global analysis, can trace blabber by extracting texture coding and divulge a secret the time.
Fig. 5 is screen message leakage traceability system composition figure of the present invention;Whole system is by screen watermark generation module, screen
Watermark display module, server-side manage 5 module, screen watermark information extraction module and screen watermark information enquiry module parts
Composition, wherein screen watermark generation module, server-side control module are deployed in server-side, and screen watermark display module is deployed in visitor
Family end, screen watermark information extraction module, screen watermark information enquiry module are deployed in system administrator computer.
Fig. 6 is screen message leakage traceability system flow chart of the present invention;This system basic procedure are as follows: 1. client screen water
It prints display module and sends customer information to server-side control module;2. server-side manages module according to customer information and temporal information
Generate watermark code, recall screen watermark generation module generate containing it is miniature coding and texture coding screen watermarking images,
Screen watermarking images are sent to client screen watermark display module again;3. client screen watermark display module is by screen water
After watermark image and screen normally show content mergence, it is shown on client screen;4. (clapping screen after the leakage of a state or party secret occurs or cutting
Screen), system manager calls screen watermark information extraction module to decode the water in image of divulging a secret according to the image of divulging a secret of acquisition
Official seal breath, the watermark code being embedded in reuse watermark code and screen watermark information enquiry module are called to obtain blabber's identity
Information and temporal information of divulging a secret complete retrospect process.
Fig. 7 is screen message leakage traceability system administration interface figure of the present invention;The system management software is disposed on the server,
System manager can carry out remote web page login, realize system running state monitoring, real-time control, information inquiry, log audit
Etc. functions.
Specific embodiment
6 pairs of present invention tracking processes of tracing to the source are described in detail with reference to the accompanying drawing:
Using screen message of the present invention leak traceability system, to screen message by screenshotss, taking pictures to divulge a secret chases after
The method that track is traced to the source operates in the steps below:
The first step, client operating system (application software) starting, screen watermark display module automatic running therein are received
Collect client software and hardware information, to server-side control module report self-operating situation and client-related information;
Second step, server-side manage module registers client operating condition, and by inquiring client-related information, will look into
The customer information binding time information ask is encoded to obtain watermark code, and the screen watermark generation module of server-side uses watermark
Code generates the screen watermarking images containing miniature coding and texture coding, is sent to client screen watermark display module on demand;
Third step, client screen watermark display module receive screen watermarking images, it is melted with normal display content
After conjunction, it is shown on client screen;After blabber leaks screen display content by screenshotss, the modes such as take pictures, what is divulged a secret
Screen watermarking images will be contained in image;
4th step, system manager obtain image of divulging a secret, and call watermark information extraction module to carry out image of divulging a secret miniature
Coding extracts (Fig. 3) or texture coding extracts (Fig. 4), then decodes to watermark code, by calling watermark information enquiry module to look into
It askes, to obtain the number for the user that divulges a secret and divulge a secret the time, to call to account, processing provides reliable basis.
Embodiment 1: screen message is let out using Browser/Server Mode (B/S) Automatic work system (OA system)
The tracing mode of leakage:
The browser plug-in containing screen watermark display module is installed for each client terminal machine, on the server installation screen
Curtain watermark generation module and service end pipe control module, on system administrator computer install screen watermark information extraction module and
Screen watermark information enquiry module;Operation interface is provided for existing OA system, computer network is relied on to cooperate existing business system
Operation.
After the first step, client log in OA system by browser, browser plug-in collects computer name, the net of client
The software and hardwares information such as network address (IP address), hardware address (MAC Address), login username are issued to server-side control module
Registration;Server-side manages module and inquires client identity according to related software and hardware information, uses current time and user information
Encoded watermark code, screen watermark generation module carries out miniature coding to watermark code and texture coding generates screen watermarking images (figure
1), it is sent to client browser plug-in unit;
Second step, OA system issue specific use after receiving user and requesting browsing sensitive information, to server-side control module
Family watermarking order, server-side manage module and send display command to the browser plug-in of corresponding client again, and by minimum retrospect
Time interval updates screen watermarking images to client, and client screen watermark display module is responsible for showing screen watermarking images
On client screen (Fig. 2);When exiting sensitive information browsing, screen watermark is closed by OA system manipulation server-side control module
The display of image stops screen watermarking images and updates;
Third step, system manager can carry out system user rights management, abnormal thing by login system administration page
Whether online the operations such as part checks, log audit, can monitor client browser plug-in unit in real time, and in real time modifying watermark code
Appearance, color and transparency (Fig. 7).
In screenshotss or after clapping screen, propagating associated picture causes screen message to leak by 4th step, user;System manager uses
The image of divulging a secret intercepted and captured carries out miniature coding to image of divulging a secret by screen watermark information extraction module and extracts (Fig. 3) or texture volume
Code extracts (Fig. 4), then carries out watermark code decoding, by calling the inquiry of watermark information enquiry module, obtains the number for the user that divulges a secret
With the time of divulging a secret, foundation of effectively calling to account is provided for the retrospect leakage of a state or party secret.
Apply example 2: using the desktop system screen message leakage tracing mode of customer end/server mode (C/S):
In the present embodiment, it is only that with the difference of embodiment 1 and is shown for the installation of each client terminal machine containing screen watermark
Show the application program of module, screen watermark display module follows FTP client FTP to start and start to work automatically.Server setting
It is identical as example 1 is applied with implementing procedure.
Embodiment 3: using mobile terminal application software/server mode mobile device screen leakage of information tracing mode:
In the present embodiment, it is only that with the difference of embodiment 1 and is shown for the installation of each client terminal machine containing screen watermark
Show the mobile applications of module, when user starts mobile applications, screen watermark display module is started to work.Server is set
It sets identical as example 1 is applied with implementing procedure.
Embodiment 4: tracing mode is leaked using the screen message of remote virtual desktop mode:
In the present embodiment, it is only that with the difference of embodiment 1 and is shown for the installation of each client terminal machine containing screen watermark
The remote virtual desktop terminal for showing module, after the starting of remote virtual desktop terminal, screen watermark display module is started to work.Clothes
The setting of business device and implementing procedure are identical as example 1 is applied.
Claims (3)
1. a kind of screen message leaks traceability system, including screen watermark generation module, screen watermark display module, service end pipe
Control module, screen watermark information extraction module and screen watermark information enquiry module, it is characterised in that wherein:
Screen watermark generation module has following function:
1) according to watermark code and display area size, miniature coding is carried out;
2) miniature coding is constantly repeated, carries out texture coding;
3) according to miniature coding and texture coding, screen watermarking images are generated;
Screen watermark display module has following function:
1) it is communicated with server-side control module, reports self-operating situation and client computer software and hardware information;
2) the control information of server-side control module is received, change watermark shows hidden state, content, color and transparency etc.;
3) screen watermarking images are carried out merging display with normal display content;
4) process, the thread protection for realizing itself, are not closed arbitrarily by user;
Server-side manages module, has following function:
1) managing user information database, system administrator database, log database etc.;
2) line duration of management screen watermark client, display intensity, watermark content etc.;
3) it is spaced on schedule, using new temporal information encoded watermark code, updates screen watermarking images and send;
4) it is associated and interacts with client's related service system, adjust screen watermark client on demand shows hidden and content;
Watermark information extraction module has following function:
1) to the image of screen shot or screenshotss, image enhancement and three-dimensional correction are carried out;
2) to the image that can read miniature coding, miniature coding and decoding is carried out, watermark code is obtained;
3) to the image that can not read miniature coding, texture coding decoding is carried out, watermark code is obtained;
3) according to watermark code coding principle, watermark code decoding is carried out, digital watermarking tracing information is obtained;
Watermark information enquiry module has following function:
1) there is authentication, log recording function;
2) it is decoded to obtain Customs Assigned Number according to watermark code, be inquired in User Information Database;
3) information such as device numbering, user of service's information, the leak time of screen message leakage be will lead to feed back, be enterprise
Or department carries out leakage of information retrospect and provides foundation;
Above-mentioned screen message leaks traceability system, relies on computer network cooperation existing business system operation.
2. using screen message described in claim 1 leak traceability system, to screen message by screenshotss, taking pictures to divulge a secret chases after
The method that track is traced to the source operates in the steps below:
The first step, client operating system (application software) starting, screen watermark display module automatic running therein collect visitor
Family end software and hardware information, to server-side control module report self-operating situation and client-related information;
Second step, server-side manage module registers client operating condition, and by inquiring client-related information, will inquire
Customer information binding time information encoded to obtain watermark code, the screen watermark generation module of server-side call watermark code into
The miniature coding of row and texture coding generate the screen watermarking images with watermark code, miniature coding and texture coding, send on demand
Give client screen watermark display module;
Third step, client screen watermark display module receive screen watermarking images, by its with after normal display content mergence,
It is shown on client screen;After blabber leaks screen display content by screenshotss, the modes such as take pictures, in the image divulged a secret
Screen watermarking images will be contained;
4th step, system manager obtain image of divulging a secret, and watermark information extraction module is called to carry out miniature coding to image of divulging a secret
It extracts (Fig. 3) or texture coding extracts (Fig. 4), then watermark code is decoded, by calling the inquiry of watermark information enquiry module, obtain
Divulge a secret user number and divulge a secret the time, to call to account, processing provides reliable basis.
3. screen message described in accordance with the claim 1 leaks traceability system, it is characterised in that:
Can using 1. Browser/Server Mode (B/S), 2. customer end/server mode (C/S), 3. mobile terminal is using soft
Part/server mode, 4. remote virtual desktop mode is disposed;Be on the server installation screen watermark generation module and
Server-side manages module, and screen watermark information extraction module and the inquiry of screen watermark information are installed on system administrator computer
Module;For 1. Browser/Server Mode (B/S), contain screen watermark display module for the installation of each client terminal machine
Browser plug-in;For the desktop system of 2. customer end/server mode (C/S), contain screen for the installation of each client terminal machine
The application program of curtain watermark display module;For 3. mobile terminal application software/server mode, installed for each client terminal machine
Mobile applications containing screen watermark display module;For 4. remote virtual desktop mode, pacify for each client terminal machine
Fill the remote virtual desktop terminal containing screen watermark display module;To 1. 2. 3. 4. mode for existing business system provides operation
Interface relies on computer network cooperation existing business system operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910003496.0A CN109727180B (en) | 2019-01-03 | 2019-01-03 | Screen information leakage tracing system and tracing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910003496.0A CN109727180B (en) | 2019-01-03 | 2019-01-03 | Screen information leakage tracing system and tracing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109727180A true CN109727180A (en) | 2019-05-07 |
CN109727180B CN109727180B (en) | 2023-06-13 |
Family
ID=66299565
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910003496.0A Active CN109727180B (en) | 2019-01-03 | 2019-01-03 | Screen information leakage tracing system and tracing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109727180B (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110730355A (en) * | 2019-09-06 | 2020-01-24 | 西安万像电子科技有限公司 | Video image processing method and device |
CN110990800A (en) * | 2019-11-26 | 2020-04-10 | 合肥高维数据技术有限公司 | Watermark processing method and system based on application program |
CN111191414A (en) * | 2019-11-11 | 2020-05-22 | 苏州亿歌网络科技有限公司 | Page watermark generation method, identification method, device, equipment and storage medium |
CN111242824A (en) * | 2019-12-05 | 2020-06-05 | 北京万里红科技股份有限公司 | Watermark embedding method, tracing method, device and storage medium |
CN111402109A (en) * | 2020-03-07 | 2020-07-10 | 北京北信源软件股份有限公司 | Method and device for setting digital watermark of instant messaging user interface |
CN112464177A (en) * | 2019-09-06 | 2021-03-09 | 成都鼎桥通信技术有限公司 | Watermark full-coverage method and device |
CN112579993A (en) * | 2020-12-22 | 2021-03-30 | 浙江财经大学 | Watermark shading-based source tracing and evidence obtaining system and method for resisting screen shooting attack |
CN112616056A (en) * | 2020-12-18 | 2021-04-06 | 广州虎牙科技有限公司 | Reporting alarm method and device based on watermark monitoring |
CN112650994A (en) * | 2020-12-25 | 2021-04-13 | 平安科技(深圳)有限公司 | Screen watermark generation method and device, electronic equipment and storage medium |
CN113312593A (en) * | 2020-02-26 | 2021-08-27 | 中国航天系统工程有限公司 | Tracking management system and method for dynamically tracking leakage information |
CN113360860A (en) * | 2021-08-09 | 2021-09-07 | 江苏羽驰区块链科技研究院有限公司 | Screen divulgence protection method based on block chain |
CN113469869A (en) * | 2021-09-03 | 2021-10-01 | 武汉华工安鼎信息技术有限责任公司 | Image management method and device |
CN113672961A (en) * | 2021-08-26 | 2021-11-19 | 北京中安星云软件技术有限公司 | Information leakage tracking method and device |
CN116703688A (en) * | 2023-08-09 | 2023-09-05 | 江苏中威科技软件系统有限公司 | Algorithm technology capable of guaranteeing watermark display effect of terminal |
CN118396828A (en) * | 2024-05-10 | 2024-07-26 | 北京国隐科技有限公司 | Screen watermark processing method, screen watermark extracting method and screen watermark extracting device |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201111783Y (en) * | 2007-10-25 | 2008-09-10 | 西安环球印务股份有限公司 | Micro code fleeing goods prevention packing box |
CN102685076A (en) * | 2011-03-16 | 2012-09-19 | 中国电信股份有限公司 | Online information protection method and device |
CN103632106A (en) * | 2013-12-18 | 2014-03-12 | 北京明朝万达科技有限公司 | OA (office automation) data protection method and system based on OA flow |
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
CN104992208A (en) * | 2015-06-30 | 2015-10-21 | 合肥中玛信息科技有限公司 | Anti-counterfeiting method through comparison identification with encryption patterns by use of two-dimensional codes |
CN105005803A (en) * | 2015-06-29 | 2015-10-28 | 合肥中玛信息科技有限公司 | Method for generating color two-dimensional code to carry out anti-counterfeiting |
WO2016177301A1 (en) * | 2015-05-01 | 2016-11-10 | 励元科技(上海)有限公司 | Micro-texture anti-counterfeit method |
US20160335733A1 (en) * | 2015-05-12 | 2016-11-17 | Digify Pte Ltd | Method and system for adaptive content protection |
CN107423629A (en) * | 2017-04-12 | 2017-12-01 | 李晓妮 | A kind of anti-method and system divulged a secret with tracing of fileinfo output |
CN107766912A (en) * | 2017-12-05 | 2018-03-06 | 海南拍拍看信息技术有限公司 | De-noising two-dimension code anti-counterfeit printed article |
CN108563930A (en) * | 2018-04-16 | 2018-09-21 | 深圳市联软科技股份有限公司 | A kind of method, apparatus, medium and the system of confidential document addition watermark |
-
2019
- 2019-01-03 CN CN201910003496.0A patent/CN109727180B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201111783Y (en) * | 2007-10-25 | 2008-09-10 | 西安环球印务股份有限公司 | Micro code fleeing goods prevention packing box |
CN102685076A (en) * | 2011-03-16 | 2012-09-19 | 中国电信股份有限公司 | Online information protection method and device |
CN103632106A (en) * | 2013-12-18 | 2014-03-12 | 北京明朝万达科技有限公司 | OA (office automation) data protection method and system based on OA flow |
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
WO2016177301A1 (en) * | 2015-05-01 | 2016-11-10 | 励元科技(上海)有限公司 | Micro-texture anti-counterfeit method |
US20160335733A1 (en) * | 2015-05-12 | 2016-11-17 | Digify Pte Ltd | Method and system for adaptive content protection |
CN105005803A (en) * | 2015-06-29 | 2015-10-28 | 合肥中玛信息科技有限公司 | Method for generating color two-dimensional code to carry out anti-counterfeiting |
CN104992208A (en) * | 2015-06-30 | 2015-10-21 | 合肥中玛信息科技有限公司 | Anti-counterfeiting method through comparison identification with encryption patterns by use of two-dimensional codes |
CN107423629A (en) * | 2017-04-12 | 2017-12-01 | 李晓妮 | A kind of anti-method and system divulged a secret with tracing of fileinfo output |
CN107766912A (en) * | 2017-12-05 | 2018-03-06 | 海南拍拍看信息技术有限公司 | De-noising two-dimension code anti-counterfeit printed article |
CN108563930A (en) * | 2018-04-16 | 2018-09-21 | 深圳市联软科技股份有限公司 | A kind of method, apparatus, medium and the system of confidential document addition watermark |
Non-Patent Citations (1)
Title |
---|
黄开等: "屏幕水印技术在公安数据防泄露中的应用实践", 《电子技术与软件工程》 * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112464177A (en) * | 2019-09-06 | 2021-03-09 | 成都鼎桥通信技术有限公司 | Watermark full-coverage method and device |
CN112464177B (en) * | 2019-09-06 | 2023-10-17 | 成都鼎桥通信技术有限公司 | Watermark full-coverage method and device |
CN110730355A (en) * | 2019-09-06 | 2020-01-24 | 西安万像电子科技有限公司 | Video image processing method and device |
CN111191414A (en) * | 2019-11-11 | 2020-05-22 | 苏州亿歌网络科技有限公司 | Page watermark generation method, identification method, device, equipment and storage medium |
CN110990800A (en) * | 2019-11-26 | 2020-04-10 | 合肥高维数据技术有限公司 | Watermark processing method and system based on application program |
CN110990800B (en) * | 2019-11-26 | 2022-04-12 | 合肥高维数据技术有限公司 | Watermark processing method and system based on application program |
CN111242824A (en) * | 2019-12-05 | 2020-06-05 | 北京万里红科技股份有限公司 | Watermark embedding method, tracing method, device and storage medium |
CN113312593A (en) * | 2020-02-26 | 2021-08-27 | 中国航天系统工程有限公司 | Tracking management system and method for dynamically tracking leakage information |
CN111402109A (en) * | 2020-03-07 | 2020-07-10 | 北京北信源软件股份有限公司 | Method and device for setting digital watermark of instant messaging user interface |
CN112616056B (en) * | 2020-12-18 | 2023-04-07 | 广州虎牙科技有限公司 | Reporting alarm method and device based on watermark monitoring |
CN112616056A (en) * | 2020-12-18 | 2021-04-06 | 广州虎牙科技有限公司 | Reporting alarm method and device based on watermark monitoring |
CN112579993B (en) * | 2020-12-22 | 2023-05-23 | 浙江财经大学 | Anti-screen-shot-attack tracing evidence obtaining system and method based on watermark shading |
CN112579993A (en) * | 2020-12-22 | 2021-03-30 | 浙江财经大学 | Watermark shading-based source tracing and evidence obtaining system and method for resisting screen shooting attack |
CN112650994B (en) * | 2020-12-25 | 2024-06-25 | 平安科技(深圳)有限公司 | Screen watermark generation method and device, electronic equipment and storage medium |
CN112650994A (en) * | 2020-12-25 | 2021-04-13 | 平安科技(深圳)有限公司 | Screen watermark generation method and device, electronic equipment and storage medium |
CN113360860A (en) * | 2021-08-09 | 2021-09-07 | 江苏羽驰区块链科技研究院有限公司 | Screen divulgence protection method based on block chain |
CN113672961A (en) * | 2021-08-26 | 2021-11-19 | 北京中安星云软件技术有限公司 | Information leakage tracking method and device |
CN113672961B (en) * | 2021-08-26 | 2024-04-26 | 北京中安星云软件技术有限公司 | Information leakage tracking method and device |
CN113469869B (en) * | 2021-09-03 | 2021-11-12 | 武汉华工安鼎信息技术有限责任公司 | Image management method and device |
CN113469869A (en) * | 2021-09-03 | 2021-10-01 | 武汉华工安鼎信息技术有限责任公司 | Image management method and device |
CN116703688A (en) * | 2023-08-09 | 2023-09-05 | 江苏中威科技软件系统有限公司 | Algorithm technology capable of guaranteeing watermark display effect of terminal |
CN116703688B (en) * | 2023-08-09 | 2023-11-17 | 江苏中威科技软件系统有限公司 | Method capable of guaranteeing watermark display effect of terminal |
CN118396828A (en) * | 2024-05-10 | 2024-07-26 | 北京国隐科技有限公司 | Screen watermark processing method, screen watermark extracting method and screen watermark extracting device |
Also Published As
Publication number | Publication date |
---|---|
CN109727180B (en) | 2023-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109727180A (en) | A kind of screen message leakage traceability system and retroactive method | |
CN105743916A (en) | Information processing method, system and device for enhancing access security | |
CN113411638A (en) | Video file playing processing method and device, electronic equipment and storage medium | |
CN110990800B (en) | Watermark processing method and system based on application program | |
CN103618693A (en) | A cloud manufacturing user data management and control method based on labels | |
DE112013005781T5 (en) | An image management system and method for fingerprint confirmation | |
CN105516085A (en) | System and method for managing temporary internet surfing behavior by visitor | |
JP7236042B2 (en) | Face Recognition Application Using Homomorphic Encryption | |
CN107659481A (en) | Long-range control method, device and storage medium based on Virtual Private Network | |
CN103379108B (en) | A kind of flexible safe central authentication method | |
CN110855664A (en) | Network certificate system | |
KR102365571B1 (en) | Method and apparatus for managing password including one-time password issuance function for integrally managing closed-circuit television | |
CN114024754A (en) | Method and system for encrypting running of application system software | |
CN113037611A (en) | Mobile safety instant communication method based on multiple public IM channels | |
CN111611600B (en) | Service processing method and system based on cloud platform | |
CN109040761A (en) | A kind of monitoring on-wall system with encrypted watermark | |
CN112241541A (en) | Community security application method based on block chain and portrait recognition technology | |
CN109218318A (en) | A kind of things-internet gateway login detecting method based on equipment knowledge | |
CN111897196B (en) | Method and system for hiding and extracting digital holographic information | |
CN112383737B (en) | Video processing verification method and device for multi-user online content on same screen and electronic equipment | |
CN114153841A (en) | Technical data encryption storage and viewing method | |
CN110278549B (en) | Network conference method, network conference system and computer readable storage medium | |
KR101861441B1 (en) | Finance service providing method using simple login and server performing the same | |
Alam et al. | Manipulation and transparency control of ICT constituted e-administrative protocol via digital watermarking for LDC's | |
CN116049322B (en) | Data sharing platform and method based on privacy calculation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |