CN110674476A - File printing method and device with embedded dark watermark - Google Patents

File printing method and device with embedded dark watermark Download PDF

Info

Publication number
CN110674476A
CN110674476A CN201910810502.3A CN201910810502A CN110674476A CN 110674476 A CN110674476 A CN 110674476A CN 201910810502 A CN201910810502 A CN 201910810502A CN 110674476 A CN110674476 A CN 110674476A
Authority
CN
China
Prior art keywords
file
dark watermark
embedded
identification information
dark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910810502.3A
Other languages
Chinese (zh)
Inventor
田岱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wanyi Technology Co Ltd
Original Assignee
Wanyi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wanyi Technology Co Ltd filed Critical Wanyi Technology Co Ltd
Priority to CN201910810502.3A priority Critical patent/CN110674476A/en
Publication of CN110674476A publication Critical patent/CN110674476A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The application relates to the technical field of data security, and provides a method and a device for printing a file with an embedded dark watermark. A method for printing a file embedded with a dark watermark comprises the following steps: when a printing request of a user is received, acquiring identification information of the user, wherein the printing request carries a file to be printed; encoding the identification information to obtain encoded information; generating a dark watermark based on the encoding information; embedding the dark watermark into the file to be printed to obtain the file embedded with the dark watermark; and printing the file embedded with the dark watermark. The technical scheme of the embodiment of the application is beneficial to improving the data security.

Description

File printing method and device with embedded dark watermark
Technical Field
The present application relates to the field of data security technologies, and in particular, to a method and an apparatus for printing a file with embedded dark watermark.
Background
With the continuous development of data technology, data security issues are becoming more prominent, and data security includes ensuring data confidentiality, for example, preventing the leakage of business enterprise secrets and personal information.
At present, for employees of enterprises and enterprises of a company, any employee can print files of the company at will, but for files with requirements on confidentiality, if leakage occurs, the source of the files cannot be tracked, the confidentiality of data cannot be guaranteed, and the data security is low.
Disclosure of Invention
The embodiment of the application provides a method and a device for printing a file with an embedded dark watermark, which are beneficial to improving data security.
The application provides a method for printing a file with an embedded dark watermark, which comprises the following steps:
when a printing request of a user is received, acquiring identification information of the user, wherein the printing request carries a file to be printed;
encoding the identification information to obtain encoded information;
generating a dark watermark based on the encoding information;
embedding the dark watermark into the file to be printed to obtain the file embedded with the dark watermark;
and printing the file embedded with the dark watermark.
In a first possible implementation manner based on the first aspect of the present application, the encoding the identification information includes:
encoding the identification information by adopting Morse codes;
or acquiring a preset custom coding mode, and coding the identification information by adopting the custom coding mode.
In a second possible implementation manner, based on the first possible implementation manner of the first aspect of the present application, the embedding the dark watermark into the file to be printed to obtain a file embedded with the dark watermark includes:
carrying out Fourier transform on the file to be printed to obtain frequency domain data;
embedding the dark watermark into the frequency domain data;
and carrying out inverse Fourier transform on the frequency domain data embedded with the dark watermark to obtain the file embedded with the dark watermark.
In a third possible implementation manner, based on the first possible implementation manner of the first aspect of the present application, the embedding the dark watermark into the file to be printed to obtain a file embedded with the dark watermark includes:
dividing the file to be printed to obtain a plurality of files;
respectively carrying out discrete cosine transform on the plurality of files to obtain a plurality of pieces of frequency domain data, wherein the plurality of files correspond to the plurality of pieces of frequency domain data one to one;
embedding the dark watermarks into the plurality of pieces of frequency domain data respectively;
and respectively carrying out inverse discrete cosine transform on the plurality of pieces of frequency domain data embedded with the dark watermark to obtain the file embedded with the dark watermark.
In a fourth possible implementation manner based on any one of the foregoing implementation manners of the first aspect of the present application, the method further includes:
acquiring a printing file;
processing the printed file to obtain the dark watermark;
obtaining the coding information based on the dark watermark;
decoding the coded information to obtain the identification information;
determining the user based on the identification information.
A second aspect of the present application provides a document printing apparatus embedded with a dark watermark, comprising:
the device comprises an acquisition unit, a processing unit and a printing unit, wherein the acquisition unit is used for acquiring identification information of a user when receiving a printing request of the user, and the printing request carries a file to be printed;
the coding unit is used for coding the identification information to obtain coding information;
a generating unit configured to generate a dark watermark based on the encoding information;
the embedding unit is used for embedding the dark watermark into the file to be printed so as to obtain the file embedded with the dark watermark;
and the printing unit is used for printing the file embedded with the dark watermark.
Based on the second aspect of the present application, in a first possible implementation manner, the encoding unit is specifically configured to:
encoding the identification information by adopting Morse codes;
or acquiring a preset custom coding mode, and coding the identification information by adopting the custom coding mode.
In a second possible implementation manner, based on the first possible implementation manner of the second aspect of the present application, the embedding unit is specifically configured to:
carrying out Fourier transform on the file to be printed to obtain frequency domain data;
embedding the dark watermark into the frequency domain data;
and carrying out inverse Fourier transform on the frequency domain data embedded with the dark watermark to obtain the file embedded with the dark watermark.
In a third possible implementation manner, based on the first possible implementation manner of the second aspect of the present application, the embedding unit is specifically configured to:
dividing the file to be printed to obtain a plurality of files;
respectively carrying out discrete cosine transform on the plurality of files to obtain a plurality of pieces of frequency domain data, wherein the plurality of files correspond to the plurality of pieces of frequency domain data one to one;
embedding the dark watermarks into the plurality of pieces of frequency domain data respectively;
and respectively carrying out inverse discrete cosine transform on the plurality of pieces of frequency domain data embedded with the dark watermark to obtain the file embedded with the dark watermark.
In a fourth possible implementation manner, based on any one of the foregoing implementation manners of the second aspect of the present application, the apparatus further includes a processing unit, where the processing unit is configured to:
acquiring a printing file;
processing the printed file to obtain the dark watermark;
obtaining the coding information based on the dark watermark;
decoding the coded information to obtain the identification information;
determining the user based on the identification information.
According to the method and the device for printing the file embedded with the dark watermark, when a printing request of a user is received, identification information of the user is obtained, the printing request carries the file to be printed, the identification information is coded to obtain coded information, the dark watermark is generated based on the coded information, the dark watermark is embedded into the file to be printed to obtain the file embedded with the dark watermark, and the file embedded with the dark watermark is printed. Therefore, when a user prints a file, a dark watermark can be generated based on identification information of the user and is embedded into the printed file, the embedded dark watermark in the printed file does not influence the use of the file, and meanwhile, when the file is leaked, the identification information of the printing user can be obtained based on the dark watermark in the file, so that the identity information of the printing user is determined, the source of the file is tracked, and the data security is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a flowchart of a document printing method with a dark watermark embedded according to an embodiment of the present application;
FIG. 2 is a flowchart of another method for printing a document with a dark watermark embedded according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating encoding of identification information according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a document printing apparatus with embedded dark watermark according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device in a hardware operating environment according to an embodiment of the present application.
Detailed Description
The method and the device for printing the file with the embedded dark watermark are beneficial to improving the data security.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," "third," "fourth," and the like in the description and claims of this application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
The following provides a detailed description of examples of the present application.
Referring to fig. 1, fig. 1 is a flowchart of a file printing method with embedded dark watermark according to an embodiment of the present application, where the file printing method provided in this embodiment is applied to a terminal. As shown in fig. 1, a method for printing a document with a dark watermark embedded provided in an embodiment of the present application may include:
101. when a terminal receives a printing request of a user, acquiring identification information of the user, wherein the printing request carries a file to be printed.
The file to be printed can be a document file or an image file.
In one possible example, a user uploads a file to be printed through a user terminal and executes a printing operation, wherein the user terminal includes a mobile phone, a tablet computer, a notebook computer, a mobile internet device or other types of terminals, when the user confirms printing, the terminal with the printing function receives a printing request of the user, the printing request carries the file to be printed uploaded by the user, and the terminal acquires identification information of the user, wherein the identification information of the user is a login user name, and the login user name can uniquely identify the user, for example, the login user name can be the name of an employee inside a company, and for the case of more employees inside a company enterprise, the login user name can be the combination of the employee name and the number, so that the influence caused by a duplicate name condition can be avoided, and the user can be uniquely distinguished according to the login user name.
In this example, when the user performs the printing operation, the user needs to log in, and the printing operation can be performed only after the login is successful, so that when the terminal receives the printing request of the user, the login user name of the user can be acquired as the identification information of the user.
In another possible example, a user uploads a file to be printed through a user terminal and performs a printing operation, where the user terminal includes a mobile phone, a tablet computer, a notebook computer, a mobile internet device, or another type of terminal, when the user confirms printing, the terminal with a printing function receives a printing request of the user, the printing request carries the file to be printed uploaded by the user, and the terminal obtains identification information of the user, where the identification information of the user is an IP address or a media access control MAC address of the user terminal, and the IP address or the media access control MAC address can uniquely identify the user. For example, inside a company, each employee is equipped with a separate computer, each computer needs an IP address when being networked, and each computer has a unique MAC address, and the computers used by users can be uniquely distinguished according to the IP address or the MAC address, that is, the users can be uniquely distinguished.
102. And the terminal encodes the identification information to obtain encoded information.
In one possible example, the terminal encodes the identification information by using a morse code, and the identification information may be a login user name of the user, or an IP address or a media access control MAC address of the user terminal, which can uniquely identify the user to obtain the encoded information. The Morse code is a signal code which is switched on and off at any time, different English letters, numbers and punctuation marks are expressed by different arrangement sequences, and the Morse code comprises five codes: dots, dashes, pauses between dots and dashes, short pauses between each character, medium pauses between each word, and long pauses between sentences, e.g., the mole code of the SOS is ". - - - -.
In another possible example, the terminal obtains a preset custom coding mode, and codes the identification information by using the custom coding mode to obtain the coded information. The preset self-defined coding mode is self-defined by an administrator, the coding length, the coding mode and the decoding mode can be defined, and the coding mode self-defined by the administrator needs to meet smaller ambiguity.
The identification information is coded to obtain the coded information, if the coded information is obtained, the identification information can be obtained only by decoding, and for a user who does not know the coding mode, the identification information cannot be obtained even if the coded information is obtained, so that the identification information can be ensured not to be leaked, and the confidentiality of data is improved.
103. And the terminal generates a dark watermark based on the coding information.
Digital Watermarking (Digital Watermarking) technology is to embed some identification information (i.e. Digital watermark) directly into Digital carriers (including multimedia, documents, software, etc.), and does not affect the use value of the original carrier, and is not easy to be detected, but can be identified and recognized. The characteristics of digital watermarking include provability, imperceptibility, robustness and security.
Digital watermarks include spatial domain watermarks, transform domain watermarks, compressed domain watermarks, and the like, where the spatial domain watermarking algorithm hides information by adjusting the lowest bits of the original data, so that a general user is visually hard to perceive the hidden information, and has a large amount of information embedded, but the hidden digital watermarking information is very fragile and easily affected by a lossy signal, and a transform domain-based technique can embed a large amount of bit data without causing a noticeable defect, and is often used to hide digital watermarking information by using a spread-spectrum-like technique, where the transform domain watermarks are based on image transforms, including Discrete Cosine Transforms (DCT), wavelet transforms (DWT), Fourier Transforms (FT), and Hadamard transforms (Hadamard transforms), and the like, and the compressed domain digital watermarking algorithm based on JPEG and MPEG standards not only saves a large amount of decoding and re-encoding processes, and has great practical value in digital television broadcasting and VOD (video Oil demand), and correspondingly, the watermark detection and extraction can also be directly carried out in compressed domain data.
In this example, the dark watermark may be any form of data including a sequence, a character, a binary image, a grayscale image, a color image, or the like, and when the dark watermark is a sequence or a character, the dark watermark may be generated directly from the encoded information, and when the dark watermark is a binary image, a grayscale image, or a color image, the image may be generated based on the encoded information, the generated image including the encoded information thereon.
104. And the terminal embeds the dark watermark into the file to be printed to obtain the file embedded with the dark watermark.
In one possible example, the terminal embeds a dark watermark into a document to be printed to obtain a document embedded with the dark watermark, including:
carrying out Fourier transform on a file to be printed to obtain frequency domain data; embedding the dark watermark into the frequency domain data; and carrying out inverse Fourier transform on the frequency domain data embedded with the dark watermark to obtain the file embedded with the dark watermark.
Specifically, the fourier transform from the time domain to the frequency domain, and the inverse fourier transform from the frequency domain to the time domain can decompose the time domain signal into frequency components, which in turn can accurately constitute the original time domain signal.
Optionally, when the file to be printed is an image file and the dark watermark is a binary image, firstly, performing fourier transform on the file to be printed to obtain frequency domain data, secondly, performing cat face transform scrambling on the dark watermark to generate a pseudorandom sequence, secondly, embedding the pseudorandom sequence into the frequency domain data subjected to fourier transform, and finally, performing inverse fourier transform on the frequency domain data embedded with the pseudorandom sequence to obtain the file embedded with the dark watermark.
The cat face transform is also called Arnold transform, and the Arnold transform is used for scrambling an image, so that an originally meaningful image becomes a meaningless image. The Arnold transform can preprocess the image before other image processing, for example, scrambling the watermark before embedding the digital blind watermark, and can also be used for common image encryption. Generally, one Arnold transformation does not achieve an ideal effect, the image needs to be transformed for a plurality of times continuously, and the Arnold transformation has periodicity, namely the Arnold transformation is continuously performed on the image, and the original image can be finally obtained. The data after N times of Arnold transformation can restore data through N times of inverse transformation, and the Arnold transformation can be used for scrambling images and scrambling and encrypting other data.
In one possible example, the terminal embeds a dark watermark into a document to be printed to obtain a document embedded with the dark watermark, including:
dividing a file to be printed to obtain a plurality of files; respectively carrying out discrete cosine transform on a plurality of files to obtain a plurality of pieces of frequency domain data, wherein the plurality of files correspond to the plurality of pieces of frequency domain data one by one; respectively embedding the dark watermarks into a plurality of pieces of frequency domain data; and respectively carrying out inverse discrete cosine transform on the plurality of pieces of frequency domain data embedded with the dark watermarks to obtain the files embedded with the dark watermarks.
In particular, the discrete cosine transform is a separable transform whose transform kernel is a cosine function. The Discrete cosine transform is a transform related to the fourier transform, which is similar to the Discrete fourier transform (DFT for Discrete fourier transform), but uses only real numbers.
Optionally, when the file to be printed is an image file and the dark watermark is a binary image, firstly, the file to be printed is partitioned to obtain a plurality of images, secondly, discrete cosine transform is performed on each image in the plurality of images to obtain a plurality of pieces of frequency domain data, cat-face transform scrambling is performed on the dark watermark, wherein the scrambling frequency can be preset, then binary serialization is performed to convert two-dimensional image data into a one-dimensional sequence, secondly, the generated binary watermark sequence is embedded into each piece of frequency domain data in the plurality of pieces of frequency domain data, and finally, inverse discrete cosine transform is performed on the frequency domain data embedded with the binary watermark sequence to obtain the file embedded with the dark watermark.
105. And the terminal prints the file embedded with the dark watermark.
And after the dark watermark is embedded, the terminal prints the file embedded with the dark watermark.
In one possible example, a print file is obtained, the print file is processed to obtain a dark watermark, encoded information is obtained based on the dark watermark, the encoded information is decoded to obtain identification information, and a user is determined based on the identification information.
Specifically, when a file is leaked, a print file is acquired firstly, the print file is scanned to obtain a print image, a dark watermark in the print image is acquired, coding information is acquired based on the dark watermark, a coding mode is acquired, the coding information is decoded according to the coding mode to obtain identification information, and users can be uniquely distinguished by the identification information, so that the users who print the file are determined based on the identification information, and data security is improved.
In one possible example, acquiring a dark watermark in a printed image includes:
firstly, Fourier transform is carried out on a printed image, secondly, a pseudo-random sequence is generated, secondly, the correlation between an embedded watermark amplitude spectrum and the pseudo-random sequence is calculated, a watermark matrix is generated according to the rule during embedding, and finally, the watermark matrix is scrambled by cat face transform to obtain the extracted dark watermark.
In another possible example, acquiring a dark watermark in a printed image includes:
firstly, block processing is carried out on a printed image to obtain a plurality of images, secondly, discrete cosine transformation is carried out on each image, coefficients are extracted to obtain a binary sequence, and secondly, the extracted binary sequence is subjected to reverse scrambling to obtain the extracted dark watermark.
In one possible example, obtaining the encoded information based on the dark watermark includes:
if the dark watermark is a sequence or a character, the extracted dark watermark is coding information;
and if the dark watermark is a binary image, a gray image and the like, carrying out image identification on the dark watermark to obtain the coding information in the dark watermark.
In one possible example, acquiring the encoding mode, and decoding the encoded information according to the encoding mode to obtain the identification information includes:
the coding mode is Morse code coding, and after the coded information is obtained, the coded information can be decoded according to the Morse code comparison table to obtain the identification information.
In another possible example, acquiring the encoding mode, and decoding the encoded information according to the encoding mode to obtain the identification information includes:
the coding mode is self-defined coding, after the coding information is obtained, the coding mode of the self-defined coding needs to be obtained firstly, then the decoding mode corresponding to the coding mode is obtained, and the coding information is decoded to obtain the identification information.
In one possible example, determining a user to print the file based on the identification information includes:
the identification information is a login user name, and the user can be uniquely distinguished by the login user name, so that after the login user name is obtained, the corresponding user can be determined based on the login name of the user, namely the user for printing the file.
In one possible example, determining a user to print the file based on the identification information includes:
the identification information is an IP address or a medium access control MAC address, and the IP address or the medium access control MAC address can uniquely distinguish the user terminal, so that after the IP address or the medium access control MAC address is obtained, the corresponding user terminal can be determined based on the IP address or the medium access control MAC address, and a user using the user terminal can be determined based on the user terminal, namely the user printing the file.
According to the method for printing the file embedded with the dark watermark, provided by the embodiment of the application, when the printing request of the user is received, the identification information of the user is obtained, the printing request carries the file to be printed, the identification information is coded to obtain the coded information, the dark watermark is generated based on the coded information, the dark watermark is embedded into the file to be printed to obtain the file embedded with the dark watermark, and the file embedded with the dark watermark is printed. Therefore, when a user prints a file, a dark watermark can be generated based on identification information of the user and is embedded into the printed file, the embedded dark watermark in the printed file does not influence the use of the file, and meanwhile, when the file is leaked, the identification information of the printing user can be obtained based on the dark watermark in the file, so that the identity information of the printing user is determined, the source of the file is tracked, and the data security is improved.
Referring to fig. 2, fig. 2 is a flowchart of another method for printing a document with a dark watermark embedded according to another embodiment of the present application. As shown in fig. 2, a method for printing a document with a dark watermark embedded provided in an embodiment of the present application may include:
201. when the terminal receives a printing request of a user, the identification information of the user is obtained, and the printing request carries a file to be printed.
Wherein, the file to be printed is an image file.
In one possible example, a user uploads a file to be printed through a user terminal and executes a printing operation, wherein the user terminal includes a mobile phone, a tablet computer, a notebook computer, a mobile internet device or other types of terminals, when the user confirms printing, the terminal with a printing function receives a printing request of the user, the printing request carries the file to be printed uploaded by the user, and the terminal acquires identification information of the user, wherein the identification information of the user is a login user name, and the login user name can uniquely identify the user.
In this example, when the user performs the printing operation, the user needs to log in, and the printing operation can be performed only after the login is successful, so that when the terminal receives the printing request of the user, the login user name of the user can be acquired as the identification information of the user.
In another possible example, a user uploads a file to be printed through a user terminal and performs a printing operation, where the user terminal includes a mobile phone, a tablet computer, a notebook computer, a mobile internet device, or another type of terminal, when the user confirms printing, the terminal with a printing function receives a printing request of the user, the printing request carries the file to be printed uploaded by the user, and the terminal obtains identification information of the user, where the identification information of the user is an IP address or a media access control MAC address of the user terminal, and the IP address or the media access control MAC address can uniquely identify the user.
202. And the terminal adopts Morse codes to encode the identification information so as to obtain encoded information.
The Morse code is a signal code which is switched on and off at any time, different English letters, numbers and punctuation marks are expressed by different arrangement sequences, and the Morse code comprises five codes: dots, strokes, pauses between dots and strokes, short pauses between each character, medium pauses between each word, and long pauses between sentences.
For example, the molar code of an SOS is ". - - -".
The identification information is coded to obtain the coded information, if the coded information is obtained, the identification information can be obtained only by decoding, and for a user who does not know the coding mode, the identification information cannot be obtained even if the coded information is obtained, so that the identification information can be ensured not to be leaked, and the confidentiality of data is improved.
203. The terminal generates a dark watermark based on the encoded information.
Digital Watermarking (Digital Watermarking) technology is to embed some identification information (i.e. Digital watermark) directly into Digital carriers (including multimedia, documents, software, etc.), and does not affect the use value of the original carrier, and is not easy to be detected, but can be identified and recognized. The characteristics of digital watermarking include provability, imperceptibility, robustness and security.
Digital watermarks include spatial domain watermarks, transform domain watermarks, compressed domain watermarks, and the like, where the spatial domain watermarking algorithm hides information by adjusting the lowest bits of the original data, so that a general user is visually hard to perceive the hidden information, and has a large amount of information embedded, but the hidden digital watermarking information is very fragile and easily affected by a lossy signal, and a transform domain-based technique can embed a large amount of bit data without causing a noticeable defect, and is often used to hide digital watermarking information by using a spread-spectrum-like technique, where the transform domain watermarks are based on image transforms, including Discrete Cosine Transforms (DCT), wavelet transforms (DWT), Fourier Transforms (FT), and Hadamard transforms (Hadamard transforms), and the like, and the compressed domain digital watermarking algorithm based on JPEG and MPEG standards not only saves a large amount of decoding and re-encoding processes, and has great practical value in digital television broadcasting and VOD (video Oil demand), and correspondingly, the watermark detection and extraction can also be directly carried out in compressed domain data.
In this example, the dark watermark is a binary image, and a binary image is generated based on the encoding information, which is included on the generated binary image.
204. The terminal divides the file to be printed to obtain a plurality of files.
Specifically, the file to be printed is an image file, and the image file is divided to obtain a plurality of image files.
205. The terminal respectively carries out discrete cosine transform on the files to obtain a plurality of pieces of frequency domain data, and the files correspond to the frequency domain data one by one.
The discrete cosine transform is a separable transform whose transform kernel is a cosine function. The Discrete cosine transform is a transform related to the fourier transform, which is similar to the Discrete fourier transform (DFT for Discrete fourier transform), but uses only real numbers.
206. And the terminal respectively embeds the dark watermarks into the plurality of pieces of frequency domain data.
Specifically, the terminal performs cat face transform scrambling on the dark watermark, wherein the scrambling frequency can be preset, then performs binary serialization, converts two-dimensional image data into a one-dimensional sequence, and then embeds the generated binary watermark sequence into each piece of frequency domain data in a plurality of pieces of frequency domain data.
The cat face transform is also called Arnold transform, and the Arnold transform is used for scrambling an image, so that an originally meaningful image becomes a meaningless image. The Arnold transform can preprocess the image before other image processing, for example, scrambling the watermark before embedding the digital blind watermark, and can also be used for common image encryption. Generally, one Arnold transformation does not achieve an ideal effect, the image needs to be transformed for a plurality of times continuously, and the Arnold transformation has periodicity, namely the Arnold transformation is continuously performed on the image, and the original image can be finally obtained. The data after N times of Arnold transformation can restore data through N times of inverse transformation, and the Arnold transformation can be used for scrambling images and scrambling and encrypting other data.
207. And respectively carrying out inverse discrete cosine transform on the plurality of pieces of frequency domain data embedded with the dark watermark by the terminal to obtain the file embedded with the dark watermark.
208. And the terminal prints the file embedded with the dark watermark.
209. And when the file is leaked, acquiring the printed file, and processing the printed file to obtain the dark watermark.
Specifically, when a file leaks, a print file is acquired first, the print file is scanned to obtain a print image, and a dark watermark in the print image is acquired.
Firstly, block processing is carried out on a printed image to obtain a plurality of images, secondly, discrete cosine transformation is carried out on each image, coefficients are extracted to obtain a binary sequence, and secondly, the extracted binary sequence is subjected to reverse scrambling to obtain the extracted dark watermark.
210. And obtaining the coded information based on the dark watermark, and decoding the coded information to obtain the identification information.
In one possible example, obtaining the encoded information based on the dark watermark includes:
and carrying out image recognition on the dark watermark to obtain the coded information in the dark watermark.
In one possible example, decoding the encoded information to obtain the identification information includes:
the coding mode is Morse code coding, and after the coded information is obtained, the coded information can be decoded according to the Morse code comparison table to obtain the identification information.
211. The user is determined based on the identification information.
In one possible example, determining a user to print the file based on the identification information includes:
the identification information is a login user name, and the user can be uniquely distinguished by the login user name, so that after the login user name is obtained, the corresponding user can be determined based on the login name of the user, namely the user for printing the file.
In one possible example, determining a user to print the file based on the identification information includes:
the identification information is an IP address or a medium access control MAC address, and the IP address or the medium access control MAC address can uniquely distinguish the user terminal, so that after the IP address or the medium access control MAC address is obtained, the corresponding user terminal can be determined based on the IP address or the medium access control MAC address, and a user using the user terminal can be determined based on the user terminal, namely the user printing the file.
It can be seen that according to the method for printing a file with an embedded dark watermark provided by the embodiment of the application, when a printing request of a user is received, identification information of the user is acquired, the printing request carries the file to be printed, the identification information is subjected to Morse code encoding to obtain encoding information, the dark watermark is generated through discrete cosine transform based on the encoding information, the dark watermark is embedded into the file to be printed to obtain the file with the embedded dark watermark, and the file with the embedded dark watermark is printed. Therefore, when a user prints a file, a dark watermark can be generated based on identification information of the user and is embedded into the printed file, the embedded dark watermark in the printed file does not affect the use of the file, meanwhile, when the file is leaked, the printed file can be obtained, the dark watermark is obtained through inverse discrete cosine transformation, coding information can be obtained based on the dark watermark, the coding information is decoded through a Morse code comparison table to obtain identification information, namely the identification information of the printing user, the identification information is a login user name, an IP address or a medium access control MAC address, the user can be uniquely distinguished, the identity information of the printing user can be determined, the source of the file can be tracked, and the data security can be improved.
Referring to fig. 3, fig. 3 is a schematic diagram illustrating encoding of identification information according to an embodiment of the present application. As shown in fig. 3, the encoding method is a morse code encoding method, the identification information obtained by the terminal is a login user name of the user, the login user name is "zhangsan", the login user name is encoded, and the obtained morse code is "
--.......--.--.....--.。
Referring to fig. 4, fig. 4 is a schematic diagram of a document printing apparatus with embedded dark watermark according to another embodiment of the present application. As shown in fig. 4, a document printing apparatus with embedded dark watermark provided in an embodiment of the present application may include:
an obtaining unit 401, configured to obtain, when a print request of a user is received, identification information of the user, where the print request carries a file to be printed;
an encoding unit 402, configured to encode the identification information to obtain encoded information;
a generating unit 403, configured to generate a dark watermark based on the encoding information;
an embedding unit 404, configured to embed the dark watermark into the file to be printed, so as to obtain a file embedded with the dark watermark;
a printing unit 405, configured to print the file embedded with the dark watermark.
In one possible example, the encoding unit 402 is specifically configured to:
encoding the identification information by adopting Morse codes;
or acquiring a preset custom coding mode, and coding the identification information by adopting the custom coding mode.
In one possible example, the embedding unit 404 is specifically configured to:
carrying out Fourier transform on the file to be printed to obtain frequency domain data;
embedding the dark watermark into the frequency domain data;
and carrying out inverse Fourier transform on the frequency domain data embedded with the dark watermark to obtain the file embedded with the dark watermark.
In one possible example, the embedding unit 404 is specifically configured to:
dividing the file to be printed to obtain a plurality of files;
respectively carrying out discrete cosine transform on the plurality of files to obtain a plurality of pieces of frequency domain data, wherein the plurality of files correspond to the plurality of pieces of frequency domain data one to one;
embedding the dark watermarks into the plurality of pieces of frequency domain data respectively;
and respectively carrying out inverse discrete cosine transform on the plurality of pieces of frequency domain data embedded with the dark watermark to obtain the file embedded with the dark watermark.
In one possible example, the apparatus further comprises a processing unit 406, the processing unit 406 being configured to:
acquiring a printing file;
processing the printed file to obtain the dark watermark;
obtaining the coding information based on the dark watermark;
decoding the coded information to obtain the identification information;
determining the user based on the identification information.
It can be seen that, with the file printing apparatus embedded with the dark watermark provided in the embodiment of the present application, when a print request of a user is received, identification information of the user is obtained, the print request carries a file to be printed, the identification information is encoded to obtain encoded information, the dark watermark is generated based on the encoded information, the dark watermark is embedded into the file to be printed to obtain the file embedded with the dark watermark, and the file embedded with the dark watermark is printed. Therefore, when a user prints a file, a dark watermark can be generated based on identification information of the user and is embedded into the printed file, the embedded dark watermark in the printed file does not influence the use of the file, and meanwhile, when the file is leaked, the identification information of the printing user can be obtained based on the dark watermark in the file, so that the identity information of the printing user is determined, the source of the file is tracked, and the data security is improved.
For specific implementation of the document printing apparatus with embedded dark watermark in the embodiment of the present application, reference may be made to each embodiment of the document printing method with embedded dark watermark, which is not described herein again.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an electronic device in a hardware operating environment according to an embodiment of the present application. As shown in fig. 5, an electronic device of a hardware operating environment according to an embodiment of the present application may include:
a processor 501, such as a CPU.
The memory 502 may alternatively be a high speed RAM memory or a stable memory such as a disk memory.
A communication interface 503 for implementing connection communication between the processor 501 and the memory 502.
Those skilled in the art will appreciate that the configuration of the electronic device shown in fig. 5 does not constitute a limitation of the electronic device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 5, the memory 502 may include therein an operating system, a network communication module, and a file printing program. The operating system is a program that manages and controls the hardware and software resources of the electronic device, supporting the operation of the file printing program and other software or programs. The network communication module is used to implement communication between the components in the memory 502 and with other hardware and software in the electronic device.
In the electronic device shown in fig. 5, the processor 501 is configured to execute a file printing program stored in the memory 502, and implement the following steps:
when a printing request of a user is received, acquiring identification information of the user, wherein the printing request carries a file to be printed;
encoding the identification information to obtain encoded information;
generating a dark watermark based on the encoding information;
embedding the dark watermark into the file to be printed to obtain the file embedded with the dark watermark;
and printing the file embedded with the dark watermark.
For specific implementation of the electronic device in the embodiment of the present application, reference may be made to the above embodiments of the method for printing a file with a dark watermark embedded, which are not described herein again.
Another embodiment of the present application provides a computer-readable storage medium storing a computer program for execution by a processor to perform the steps of:
when a printing request of a user is received, acquiring identification information of the user, wherein the printing request carries a file to be printed;
encoding the identification information to obtain encoded information;
generating a dark watermark based on the encoding information;
embedding the dark watermark into the file to be printed to obtain the file embedded with the dark watermark;
and printing the file embedded with the dark watermark.
For specific implementation of the computer-readable storage medium of the present application, reference may be made to the above embodiments of the method for printing a file with a dark watermark embedded therein, which are not described herein again.
It is also noted that while for simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present application is not limited by the order of acts, as some steps may, in accordance with the present application, occur in other orders and concurrently. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application. In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A method for printing a document with a dark watermark embedded therein, comprising:
when a printing request of a user is received, acquiring identification information of the user, wherein the printing request carries a file to be printed;
encoding the identification information to obtain encoded information;
generating a dark watermark based on the encoding information;
embedding the dark watermark into the file to be printed to obtain the file embedded with the dark watermark;
and printing the file embedded with the dark watermark.
2. The method of claim 1, wherein the encoding the identification information comprises:
encoding the identification information by adopting Morse codes;
or acquiring a preset custom coding mode, and coding the identification information by adopting the custom coding mode.
3. The method according to claim 2, wherein said embedding the dark watermark into the document to be printed to obtain the document embedded with the dark watermark comprises:
carrying out Fourier transform on the file to be printed to obtain frequency domain data;
embedding the dark watermark into the frequency domain data;
and carrying out inverse Fourier transform on the frequency domain data embedded with the dark watermark to obtain the file embedded with the dark watermark.
4. The method according to claim 2, wherein said embedding the dark watermark into the document to be printed to obtain the document embedded with the dark watermark comprises:
dividing the file to be printed to obtain a plurality of files;
respectively carrying out discrete cosine transform on the plurality of files to obtain a plurality of pieces of frequency domain data, wherein the plurality of files correspond to the plurality of pieces of frequency domain data one to one;
embedding the dark watermarks into the plurality of pieces of frequency domain data respectively;
and respectively carrying out inverse discrete cosine transform on the plurality of pieces of frequency domain data embedded with the dark watermark to obtain the file embedded with the dark watermark.
5. The method according to any one of claims 1 to 4, further comprising:
acquiring a printing file;
processing the printed file to obtain the dark watermark;
obtaining the coding information based on the dark watermark;
decoding the coded information to obtain the identification information;
determining the user based on the identification information.
6. A dark watermark embedded document printing apparatus, comprising:
the device comprises an acquisition unit, a processing unit and a printing unit, wherein the acquisition unit is used for acquiring identification information of a user when receiving a printing request of the user, and the printing request carries a file to be printed;
the coding unit is used for coding the identification information to obtain coding information;
a generating unit configured to generate a dark watermark based on the encoding information;
the embedding unit is used for embedding the dark watermark into the file to be printed so as to obtain the file embedded with the dark watermark;
and the printing unit is used for printing the file embedded with the dark watermark.
7. The apparatus according to claim 6, wherein the encoding unit is specifically configured to:
encoding the identification information by adopting Morse codes;
or acquiring a preset custom coding mode, and coding the identification information by adopting the custom coding mode.
8. The apparatus according to claim 7, wherein the embedding unit is specifically configured to:
carrying out Fourier transform on the file to be printed to obtain frequency domain data;
embedding the dark watermark into the frequency domain data;
and carrying out inverse Fourier transform on the frequency domain data embedded with the dark watermark to obtain the file embedded with the dark watermark.
9. The apparatus according to claim 7, wherein the embedding unit is specifically configured to:
dividing the file to be printed to obtain a plurality of files;
respectively carrying out discrete cosine transform on the plurality of files to obtain a plurality of pieces of frequency domain data, wherein the plurality of files correspond to the plurality of pieces of frequency domain data one to one;
embedding the dark watermarks into the plurality of pieces of frequency domain data respectively;
and respectively carrying out inverse discrete cosine transform on the plurality of pieces of frequency domain data embedded with the dark watermark to obtain the file embedded with the dark watermark.
10. The apparatus according to any one of claims 6 to 9, further comprising a processing unit for:
acquiring a printing file;
processing the printed file to obtain the dark watermark;
obtaining the coding information based on the dark watermark;
decoding the coded information to obtain the identification information;
determining the user based on the identification information.
CN201910810502.3A 2019-08-29 2019-08-29 File printing method and device with embedded dark watermark Pending CN110674476A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910810502.3A CN110674476A (en) 2019-08-29 2019-08-29 File printing method and device with embedded dark watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910810502.3A CN110674476A (en) 2019-08-29 2019-08-29 File printing method and device with embedded dark watermark

Publications (1)

Publication Number Publication Date
CN110674476A true CN110674476A (en) 2020-01-10

Family

ID=69075893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910810502.3A Pending CN110674476A (en) 2019-08-29 2019-08-29 File printing method and device with embedded dark watermark

Country Status (1)

Country Link
CN (1) CN110674476A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111325654A (en) * 2020-03-06 2020-06-23 北京云创世联科技股份有限公司 Digital watermark image generation method based on desktop virtualization technology
CN111405008A (en) * 2020-03-06 2020-07-10 精英数智科技股份有限公司 Coal mine data transmission method, device and system
CN111737662A (en) * 2020-06-16 2020-10-02 北京达佳互联信息技术有限公司 Watermark adding method, watermark extracting method, watermark adding device, watermark extracting device and electronic equipment
CN112445443A (en) * 2020-11-24 2021-03-05 上海汉图科技有限公司 File output method and device and printer
CN113573141A (en) * 2021-07-21 2021-10-29 北京奇艺世纪科技有限公司 Video processing method and device, electronic equipment and storage medium
CN115079966A (en) * 2022-08-22 2022-09-20 南京数睿数据科技有限公司 Code-free page printing method and device, electronic equipment and readable medium
CN115482142A (en) * 2022-09-27 2022-12-16 河北纬坤电子科技有限公司 Dark watermark adding method, extracting method, system, storage medium and terminal
CN116755649A (en) * 2023-08-15 2023-09-15 南京功夫豆信息科技有限公司 Intelligent printing equipment data management system and method based on Internet of things

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079147A (en) * 2007-06-25 2007-11-28 中山大学 Multiple bit digital watermark method capable of resisting printing, scanning and geometric transformation
DE102011076911A1 (en) * 2010-07-01 2012-01-05 Xerox Corp. Embedding infrared watermarks by frequency modulation into digital documents
CN103164830A (en) * 2011-12-09 2013-06-19 中国电信股份有限公司 Method and device of embedding watermark information into printing content
CN103996162A (en) * 2014-05-09 2014-08-20 北京邮电大学 Flexible image watermarking method and device based on human eye video features
CN104217392A (en) * 2014-09-18 2014-12-17 上海理工大学 Holographic watermark algorithm resistant to geometric attack

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079147A (en) * 2007-06-25 2007-11-28 中山大学 Multiple bit digital watermark method capable of resisting printing, scanning and geometric transformation
DE102011076911A1 (en) * 2010-07-01 2012-01-05 Xerox Corp. Embedding infrared watermarks by frequency modulation into digital documents
CN103164830A (en) * 2011-12-09 2013-06-19 中国电信股份有限公司 Method and device of embedding watermark information into printing content
CN103996162A (en) * 2014-05-09 2014-08-20 北京邮电大学 Flexible image watermarking method and device based on human eye video features
CN104217392A (en) * 2014-09-18 2014-12-17 上海理工大学 Holographic watermark algorithm resistant to geometric attack

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
司守奎,孙兆亮: "《数学建模算法与应用》", 30 May 2015 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111325654A (en) * 2020-03-06 2020-06-23 北京云创世联科技股份有限公司 Digital watermark image generation method based on desktop virtualization technology
CN111405008A (en) * 2020-03-06 2020-07-10 精英数智科技股份有限公司 Coal mine data transmission method, device and system
CN111737662A (en) * 2020-06-16 2020-10-02 北京达佳互联信息技术有限公司 Watermark adding method, watermark extracting method, watermark adding device, watermark extracting device and electronic equipment
CN112445443A (en) * 2020-11-24 2021-03-05 上海汉图科技有限公司 File output method and device and printer
CN113573141A (en) * 2021-07-21 2021-10-29 北京奇艺世纪科技有限公司 Video processing method and device, electronic equipment and storage medium
CN113573141B (en) * 2021-07-21 2022-09-30 北京奇艺世纪科技有限公司 Video processing method and device, electronic equipment and storage medium
CN115079966A (en) * 2022-08-22 2022-09-20 南京数睿数据科技有限公司 Code-free page printing method and device, electronic equipment and readable medium
CN115079966B (en) * 2022-08-22 2022-12-02 南京数睿数据科技有限公司 Code-free page printing method and device, electronic equipment and readable medium
CN115482142A (en) * 2022-09-27 2022-12-16 河北纬坤电子科技有限公司 Dark watermark adding method, extracting method, system, storage medium and terminal
CN116755649A (en) * 2023-08-15 2023-09-15 南京功夫豆信息科技有限公司 Intelligent printing equipment data management system and method based on Internet of things
CN116755649B (en) * 2023-08-15 2023-10-31 南京功夫豆信息科技有限公司 Intelligent printing equipment data management system and method based on Internet of things

Similar Documents

Publication Publication Date Title
CN110674476A (en) File printing method and device with embedded dark watermark
Ou et al. High payload image steganography with minimum distortion based on absolute moment block truncation coding
Reddy et al. High capacity and security steganography using discrete wavelet transform
Kaur et al. A Survey on different techniques of steganography
Daraee et al. Watermarking in binary document images using fractal codes
Tagliasacchi et al. Hash-based identification of sparse image tampering
JP2004507177A (en) How to embed a digital watermark in digital image data
Chen et al. A simple and efficient watermark technique based on JPEG2000 codec
Sajedi et al. Cover selection steganography method based on similarity of image blocks
Lin et al. Joint fingerprinting and decryption with noise-resistant for vector quantization images
CN110889796B (en) Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and equipment
Liu et al. Toward a two-dimensional barcode with visual information using perceptual shaping watermarking in mobile applications
Xun et al. Dual anti-counterfeiting of QR code based on information encryption and digital watermarking
Lee et al. Secure error-free steganography for JPEG images
Narkedamilly et al. Discrete multiwavelet–based video watermarking scheme using SURF
Hazra et al. A survey on different techniques for covert communication using steganography
Sun et al. Research and development of QR code steganography based on JSteg algorithm in DCT domain
Manujala et al. Embedding multiple images in a single image using Bit Plane Complexity Segmentation (BPCS) steganography
Guzman-Candelario et al. A low-distortion QR code watermarking scheme for digital color images robust to gamma correction attack
Yang et al. Bit-plane watermarking for zerotree-coded images
Chaturvedi et al. An Integer Wavelet Transform Based Steganography Technique for Concealing Data in Colored Images
Lin et al. Noise-resistant joint fingerprinting and decryption based on vector quantization
Ahmed et al. Information hiding in video files using frequency domain
Zhou et al. A study of influence between digital watermarking and steganography
Rao et al. A smart intelligent way of video authentication using classification and decomposition of watermarking methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200110

RJ01 Rejection of invention patent application after publication