CN110826033A - Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting equipment and data processing method - Google Patents

Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting equipment and data processing method Download PDF

Info

Publication number
CN110826033A
CN110826033A CN201810922077.2A CN201810922077A CN110826033A CN 110826033 A CN110826033 A CN 110826033A CN 201810922077 A CN201810922077 A CN 201810922077A CN 110826033 A CN110826033 A CN 110826033A
Authority
CN
China
Prior art keywords
carrier object
camouflage
disguised
watermark
embedding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810922077.2A
Other languages
Chinese (zh)
Other versions
CN110826033B (en
Inventor
王兵
刘永亮
郑杰骞
归加琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN201810922077.2A priority Critical patent/CN110826033B/en
Publication of CN110826033A publication Critical patent/CN110826033A/en
Application granted granted Critical
Publication of CN110826033B publication Critical patent/CN110826033B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Abstract

The application discloses a watermark embedding method, which comprises the following steps: acquiring watermark information to be embedded into a carrier object; converting the watermark information into a bar code image; carrying out camouflage processing on the bar code image to obtain camouflage elements camouflaged as elements of the carrier object; embedding the disguised element into the carrier object. The method is adopted to solve the security problem of the watermark embedded into the carrier object.

Description

Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting equipment and data processing method
Technical Field
The present application relates to digital watermark embedding technology, and in particular, to a watermark embedding method, apparatus, and device. The invention also relates to a watermark extraction method, a watermark extraction device and watermark extraction equipment.
Background
The recent frequent occurrence of significant and pernicious data security events, particularly internal compromise, makes conventional data security architectures even more challenging. The data watermarking technology is a guarantee means for preventing data leakage, and can play a role in data tracing and copyright protection. At present, digital watermarking technology is mainly focused on digital products such as images, videos and audios, and the development of webpage watermarking technology is slow. The web page is used as a carrier for information dissemination, more and more information is presented on the web page content (such as video websites and the like), and the security problem of the web page content gradually becomes a hot problem. In order to secure the contents of a web page, one approach is to embed a watermark in the web page. However, watermarks embedded on web pages are also vulnerable. Therefore, how to secure watermarks embedded in carrier objects including web pages is a problem to be solved.
Disclosure of Invention
The application provides a watermark embedding method, a watermark embedding device and watermark embedding equipment, which are used for solving the safety problem of a watermark embedded into a carrier object.
The application provides a watermark embedding method, which comprises the following steps:
acquiring watermark information to be embedded into a carrier object;
converting the watermark information into a bar code image;
carrying out camouflage processing on the bar code image to obtain camouflage elements camouflaged as elements of the carrier object;
embedding the disguised element into the carrier object.
Optionally, the disguising the barcode image to obtain a disguised element disguised as an element of the carrier object includes:
and intercepting the bar code image to obtain a camouflage element containing the watermark information.
Optionally, intercepting the barcode image to obtain a disguised element containing the watermark information includes: and respectively intercepting each stripe in the bar code image in the longitudinal direction to obtain a dotted line or black and white block set containing the watermark information.
Optionally, the method further includes:
and adjusting the color of the dotted line or black and white block set containing the watermark information according to the color of the carrier object.
Optionally, the method further includes:
adjusting the color of the bar code image according to the color of the carrier object to obtain the bar code image with the adjusted color;
intercepting the bar code image to obtain a camouflage element containing the watermark information, wherein the step of intercepting the bar code image comprises the following steps:
intercepting the bar code image after the color is adjusted to obtain a camouflage element containing the watermark information.
Optionally, the disguising the barcode image to obtain a disguised element disguised as an element of the carrier object includes:
intercepting the bar code image according to the shape of the element on the carrier object to obtain a camouflage element which is matched with the shape of the element on the carrier object and contains the watermark information;
the longitudinally intercepting each stripe in the barcode image to obtain a dotted line or black and white block set containing the watermark information includes:
and respectively intercepting each stripe in the bar code image in the longitudinal direction according to the element shape on the carrier object to obtain the dotted line or black and white block set which is matched with the element shape on the carrier object and contains the watermark information.
Optionally, embedding the disguise element into the carrier object includes:
judging whether an element matched with the camouflage element in shape exists in the carrier object;
if yes, embedding the camouflage element into the position of the element; or, embedding the disguised element in an adjacent position to the element;
if not, randomly embedding the camouflage elements into the carrier object; or, according to the relationship of each element in the carrier object, the disguise element is embedded into the boundary on the spatial layout of the carrier object.
Optionally, embedding the disguise element into the carrier object includes: embedding the disguised element into the carrier object a plurality of times.
Optionally, the embedding the disguised element into the carrier object includes:
embedding the camouflage element laterally into the carrier object; and/or
Longitudinally embedding the camouflage element into the carrier object.
Optionally, the carrier object is a web page or an image.
Optionally, the method further includes: and informing the determined embedding position information to a watermark information extraction end.
The application provides a watermark extraction method, which comprises the following steps:
obtaining a carrier object;
extracting a camouflage element which is camouflaged as an element of the carrier object from the carrier object, wherein the camouflage element comprises watermark information embedded into the carrier object;
and obtaining the watermark information according to the camouflage element.
Optionally, the extracting, from the carrier object, a disguise element disguised as an element of the carrier object includes: and extracting a dotted line or black and white block set which is disguised as an element of the carrier object from the carrier object.
Optionally, the extracting, from the carrier object, a disguise element disguised as an element of the carrier object includes:
extracting transversely embedded camouflage elements which are camouflage as elements of the carrier object from the carrier object; and/or
And extracting longitudinally embedded camouflage elements disguised as elements of the carrier object from the carrier object.
Optionally, the extracting, from the carrier object, a disguise element disguised as an element of the carrier object includes:
acquiring the position information of the camouflage elements in the carrier object;
extracting the embedded disguised element from the location information.
Optionally, the obtaining of the position information of the disguised element in the carrier object includes:
acquiring the position information of the camouflage element in the carrier object from the embedding position information provided by the watermark information embedding end; alternatively, the first and second electrodes may be,
and determining the position information of the camouflage elements in the carrier object according to the change of the color gray value of the carrier object.
Optionally, the extracting, from the carrier object, a disguise element disguised as an element of the carrier object includes:
intercepting the disguised element according to the position of the disguised element in the carrier object.
Optionally, the carrier object is a web page;
the extracting of the disguise element disguised as the element of the carrier object from the carrier object includes:
determining js and css libraries related to the webpage according to the position information of the disguised element in the webpage; and finding the disguised element from js and css libraries associated with the webpage.
Optionally, the obtaining the watermark information according to the disguised element includes:
stretching and adjusting the camouflage elements to obtain adjusted bar code images;
and scanning the bar code image to obtain the watermark information.
Optionally, the obtaining the watermark information according to the disguised element includes:
determining a bit sequence corresponding to the camouflage element according to the width of the stripes of the camouflage element and the width of the gaps;
and obtaining the watermark information according to the coding matching rule corresponding to the disguised element and the corresponding bit sequence.
The present application also provides a watermark embedding apparatus, comprising:
a watermark information obtaining unit, for obtaining the watermark information to be embedded into the carrier object;
a bar code conversion unit for converting the watermark information into a bar code image;
a camouflage element obtaining unit, configured to perform camouflage processing on the barcode image to obtain a camouflage element camouflaged as an element of the carrier object;
a disguise element embedding unit for embedding the disguise element into the carrier object.
The present application further provides an electronic device, comprising:
a processor; and
a memory for storing a program of a watermark embedding method, the apparatus performing the following steps after being powered on and running the program of the watermark embedding method by the processor:
acquiring watermark information to be embedded into a carrier object;
converting the watermark information into a bar code image;
carrying out camouflage processing on the bar code image to obtain camouflage elements camouflaged as elements of the carrier object;
embedding the disguised element into the carrier object.
The present application also provides a storage device storing a program of a watermark embedding method, the program being executed by a processor and performing the steps of:
acquiring watermark information to be embedded into a carrier object;
converting the watermark information into a bar code image;
carrying out camouflage processing on the bar code image to obtain camouflage elements camouflaged as elements of the carrier object;
embedding the disguised element into the carrier object.
The present application further provides a watermark extraction apparatus, including:
a carrier object obtaining unit for obtaining a carrier object;
a disguise element extraction unit configured to extract a disguise element disguised as an element of the carrier object from the carrier object, the disguise element including watermark information embedded in the carrier object;
and the watermark information obtaining unit is used for obtaining the watermark information according to the disguised element.
The present application further provides an electronic device, comprising:
a processor; and
a memory for storing a program of a watermark extraction method, the apparatus performing the following steps after being powered on and running the program of the watermark extraction method by the processor:
obtaining a carrier object;
extracting a camouflage element which is camouflaged as an element of the carrier object from the carrier object, wherein the camouflage element comprises watermark information embedded into the carrier object;
and obtaining the watermark information according to the camouflage element.
The present application also provides a storage device that,
a program storing a watermark extraction method, the program being executed by a processor to perform the steps of:
obtaining a carrier object;
extracting a camouflage element which is camouflaged as an element of the carrier object from the carrier object, wherein the camouflage element comprises watermark information embedded into the carrier object;
and obtaining the watermark information according to the camouflage element.
The present application further provides a data processing method, including:
acquiring a carrier object and first identification information, wherein the carrier object comprises a first display element;
converting the first identification information into second identification information corresponding to the first display element;
embedding the second identification information into the carrier object.
Optionally, converting the first identification information into second identification information corresponding to the first display element includes:
converting the first identification information into an intermediate image;
converting the intermediate image into second identification information corresponding to the first display element.
Optionally, the converting the first identification information into an intermediate image includes:
obtaining a bit sequence corresponding to the first identification information according to the first identification information;
determining the width of the stripe and the width of the gap according to the bit sequence;
and obtaining the intermediate image according to the width of the stripe and the width of the gap.
Optionally, the converting the intermediate image into second identification information corresponding to the first display element includes:
and intercepting the intermediate image to obtain second identification information corresponding to the first display element.
Optionally, the converting the intermediate image into second identification information corresponding to the first display element includes:
and respectively intercepting each stripe in the intermediate image in the longitudinal direction to obtain second identification information corresponding to the first display element.
Optionally, the embedding the second identification information into the carrier object includes:
embedding the second identification information into a position of the first display element; or, the pseudo second identification information is embedded in an adjacent position of the first display element.
Optionally, the intermediate image is a barcode image.
Compared with the prior art, the method has the following advantages:
the application provides a watermark embedding method, firstly, watermark information is converted into a bar code image; then carrying out camouflage processing on the bar code image to obtain a camouflage element camouflaged as an element of the carrier object; finally, the disguise element is embedded into the carrier object. According to the method and the device, the disguise element disguised as the element of the carrier object is embedded into the carrier object, the disguise element containing the watermark information is not easy to be found by an attacker, and the screenshot and the photographing attack can be resisted, so that the safety problem of the watermark embedded into the carrier object is solved.
Drawings
Fig. 1 is a flowchart of a watermark embedding method according to a first embodiment of the present application.
Fig. 2 is a schematic diagram of a barcode image into which watermark information is converted according to a first embodiment of the present application.
Fig. 3 is a schematic diagram in dashed lines taken in accordance with fig. 2.
Fig. 4 is a schematic diagram of the first embodiment of the present application providing that no elements matching the shape of the disguised element are present in the carrier object.
Fig. 5 is a schematic diagram of a first embodiment of the present application for randomly embedding a disguised element into a carrier object.
Fig. 6 is a flowchart of a watermark extraction method according to a second embodiment of the present application.
Fig. 7 is a flowchart of extracting a watermark from an original web page according to a second embodiment of the present application.
Fig. 8 is a flowchart of extracting a watermark from a screenshot of a web page according to a second embodiment of the present application.
Fig. 9 is a flowchart of extracting a watermark from a photographed picture of a web page according to a second embodiment of the present application.
Fig. 10 is a schematic diagram of a watermark embedding apparatus according to a third embodiment of the present application.
Fig. 11 is a schematic diagram of an electronic device according to a fourth embodiment of the present application.
Fig. 12 is a schematic diagram of a watermark extraction apparatus according to a sixth embodiment of the present application.
Fig. 13 is a schematic diagram of an electronic device according to a seventh embodiment of the present application.
Fig. 14 is a flowchart of a data processing method according to a ninth embodiment of the present application.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is capable of implementation in many different ways than those herein set forth and of similar import by those skilled in the art without departing from the spirit of this application and is therefore not limited to the specific implementations disclosed below.
A first embodiment of the present application provides a watermark embedding method, which is described in detail below with reference to fig. 1, fig. 2, fig. 3, and fig. 4.
As shown in fig. 1, in step S101, watermark information that needs to be embedded in the carrier object is obtained.
The carrier object refers to an object to be embedded with watermark information. The carrier object, an index carrier, comprising: web pages, images, etc.
The watermark information refers to identification information to be embedded into the carrier object. The watermark information can be hidden and embedded into the carrier object, the use value of the original carrier object cannot be influenced, and the watermark information is not easy to be ascertained and modified again. But the watermark information can be identified and recognized by the producer. The watermark information hidden in the carrier can achieve the purposes of confirming content creators and purchasers, transmitting secret information, judging whether the carrier object is tampered or not and the like. The watermark information may be a company name of a certain company, or may be an employee number or other identification information of a certain employee.
As shown in fig. 1, in step S102, the watermark information is converted into a barcode image.
After watermark information to be embedded into the carrier object is obtained, the watermark information is converted into a bar code image. As shown in fig. 2, which is a bar code image converted according to certain watermark information.
In particular implementations, the watermark information may be converted to a barcode image according to Code39 encoding. Code39 is a type of barcode, also called 3of9Code, USD-3, or logars, and is widely used because of its characteristics such as simple construction, capability of encoding data of an arbitrary length, and support of a wide range of devices.
Besides the standard bar code coding rule, in order to increase the information quantity of the embedded watermark information, a set of coding rule can be designed by self, fewer 0/1 sequences are used for representing more characters, and the watermark information is converted into a bar code image according to the designed coding rule.
As shown in fig. 1, in step S103, the barcode image is subjected to a disguise process to obtain a disguise element disguised as an element of the carrier object.
In order to embed the barcode image in step S102 into the carrier object in a hidden manner, it is necessary to perform a disguising process on the barcode image, obtain a disguise element disguised as an element of the carrier object, and then embed the disguise element into the carrier object.
The camouflaging the barcode image to obtain camouflaged elements camouflaged as elements of the carrier object includes:
and intercepting the bar code image to obtain a camouflage element containing the watermark information.
Intercepting the bar code image to obtain a camouflage element containing the watermark information, wherein the step of intercepting the bar code image comprises the following steps: and respectively intercepting each stripe in the bar code image in the longitudinal direction to obtain a dotted line or black and white block set containing the watermark information.
In a specific implementation, the barcode image may be cut into a dotted line with a height of one pixel or several pixels, and the dotted line contains the watermark information, or the barcode image may be cut into a set of black and white blocks containing the watermark information.
Preferably, the barcode image is intercepted according to the shape of the element on the carrier object, so as to obtain a camouflage element which is matched with the shape of the element on the carrier object and contains the watermark information;
the longitudinally intercepting each stripe in the barcode image to obtain a dotted line or black and white block set containing the watermark information includes:
and respectively intercepting each stripe in the bar code image in the longitudinal direction according to the element shape on the carrier object to obtain the dotted line or black and white block set which is matched with the element shape on the carrier object and contains the watermark information.
For example, if the carrier object is a web page having a black and white solid line with a pixel height of 1 on the web page, the barcode image may be cut out according to the shape of the solid line of the web page, and a dotted line with a pixel height of 1 containing watermark information is cut out from the barcode image, fig. 3 is a dotted line cut out according to the barcode image of fig. 2, and the cut-out dotted line is a dummy element.
For another example, if the carrier object is a web page and a black and white block set exists on the web page, the barcode image may be intercepted according to the shape of the black and white block set of the web page, the black and white block set matching the black and white block shape on the carrier object is intercepted from the barcode image, the intercepted black and white block set is a disguise element, and when embedding, the disguise element (black and white block set containing watermark information) may be embedded in the position of the black and white block set of the web page.
Preferably, the color of the set of black and white blocks or dotted lines containing the watermark information is adjusted according to the color of the carrier object.
Preferably, the color of the barcode image is adjusted according to the color of the carrier object, so as to obtain the barcode image with the adjusted color;
intercepting the bar code image to obtain a camouflage element containing the watermark information, wherein the step of intercepting the bar code image comprises the following steps:
intercepting the bar code image after the color is adjusted to obtain a camouflage element containing the watermark information.
The color of the set of dashed or black-and-white blocks containing the watermark information can be adjusted if there is a color at the location on the carrier object where the disguise element is to be embedded. For example, if a disguise element (dotted line) is to be embedded at the position of a solid red line on the carrier object, the black part of the dotted line can be adjusted to a deep red and the white part of the dotted line to a light red.
If the position of the carrier object to be embedded with the camouflage element has color, the color of the bar code image can be adjusted according to the color of the carrier object to obtain the bar code image with the adjusted color; and intercepting the bar code image after the color is adjusted to obtain a camouflage element containing watermark information, and embedding the camouflage element into the carrier object. For example, if the disguise element is to be embedded in the position of a red solid line on the carrier object, the color of the barcode image may be adjusted according to the color of the carrier object, the black part of the barcode is adjusted to be dark red, and the white part of the barcode is adjusted to be light red, so as to obtain the barcode image with the adjusted color; and intercepting the bar code image after the color is adjusted to obtain a camouflage element (a dotted line) containing watermark information, and embedding the camouflage element into the carrier object.
As shown in fig. 1, in step S104, the camouflage element is embedded in the carrier object.
Embedding the disguised element into the carrier object, comprising:
judging whether an element matched with the camouflage element in shape exists in the carrier object;
if yes, embedding the camouflage element into the position of the element; or, embedding the disguised element in an adjacent position to the element;
if not, randomly embedding the camouflage elements into the carrier object; or, according to the relationship of each element in the carrier object, the disguise element is embedded into the boundary on the spatial layout of the carrier object.
When the carrier object is concretely implemented, the camouflage element is embedded into the carrier object in various ways, if an element with a shape matched with that of the camouflage element exists in the carrier object, the camouflage element can be embedded into the position where the element with the shape matched with that of the carrier object exists, that is, the element with the shape matched with that of the carrier object is replaced by the camouflage element, for example, if the camouflage element is a dotted line containing watermark information and the dotted line exists in a webpage, the camouflage element can be embedded into the position of the dotted line on the webpage and the original dotted line is replaced by the camouflage element; or the disguised element may be embedded at a position adjacent to the dotted line, for example, if the disguised element is a dotted line containing watermark information and the dotted line exists in the web page, the disguised element may be embedded at an upper adjacent position or a lower adjacent position parallel to the dotted line on the web page. If the carrier object does not have an element matching the shape of the disguise element, the disguise element may be randomly embedded into the carrier object, for example, if the disguise element is a dotted line containing watermark information and no dotted line or solid line exists in the web page, as shown in fig. 4, the disguise element may be added above or below a line of text of the carrier object, as shown in fig. 5; or, according to the relationship of each element in the carrier object, the disguised element is embedded into a boundary on the spatial layout of the carrier object; the boundary may refer to a boundary of a DIV element in a web page. In order to avoid that the watermark extraction fails due to the fact that part of the data of the carrier object is damaged, the disguise element can be embedded into the carrier object for multiple times when the disguise element is embedded into the carrier object.
Said embedding said disguised element into said carrier object comprises:
embedding the camouflage element laterally into the carrier object; and/or
Longitudinally embedding the camouflage element into the carrier object.
For example, if there is a solid line or a dashed line in the horizontal direction on the web page, the disguise element may be embedded in the horizontal direction at the position of the solid line or the dashed line, i.e., the solid line or the dashed line on the web page is replaced by the disguise element; if the webpage has a longitudinal solid line or a longitudinal dotted line, the disguised element can be rotated to be a vertical dotted line and then longitudinally embedded at the position of the solid line or the dotted line on the webpage.
In order to enable the watermark extraction end to more accurately obtain the position of watermark embedding, the watermark embedding end may notify the watermark information extraction end of the determined embedding position information.
Now, a detailed description is given of an implementation of the watermark embedding method provided in the first embodiment of the present application. According to the method and the device, the disguise element disguising as the element of the carrier object is embedded into the carrier object, the disguise element containing the watermark information is not easy to find by an attacker, and the method and the device can resist screenshot and photographing attack, namely, data are obtained and leaked in a screenshot or photographing mode, and the source can still be traced, so that the safety problem of the watermark embedded into the carrier object is solved.
A second embodiment of the present application provides a watermark extraction method, which is described in detail below with reference to fig. 6, 7, 8, and 9.
As shown in fig. 6, in step S601, a carrier object is obtained.
The carrier object refers to an object embedded with a disguised element containing watermark information. The carrier object, an index carrier, comprising: web pages, screenshots, photographs taken, and the like.
As shown in fig. 6, in step S602, a disguise element disguised as an element of the carrier object is extracted from the carrier object, the disguise element including watermark information embedded in the carrier object.
Extracting a disguise element disguised as an element of the carrier object from the carrier object, including: and extracting a dotted line or black and white block set which is disguised as an element of the carrier object from the carrier object.
If the disguised element embedded in the carrier object is a dotted line, extracting the dotted line disguised as the element of the carrier object; and if the disguised elements embedded into the carrier object are black and white block sets, extracting the black and white block sets of the elements disguised as the carrier object.
The extracting of the disguise element disguised as the element of the carrier object from the carrier object includes:
extracting transversely embedded camouflage elements which are camouflage as elements of the carrier object from the carrier object; and/or
And extracting longitudinally embedded camouflage elements disguised as elements of the carrier object from the carrier object.
Extracting the camouflage elements and embedding the camouflage elements, if the camouflage elements are transversely embedded into the carrier object, extracting the transversely embedded camouflage elements from the carrier object; if the disguise element is embedded longitudinally in the carrier object, the longitudinally embedded disguise element is extracted from the carrier object.
Extracting a disguise element disguised as an element of the carrier object from the carrier object, including:
acquiring the position information of the camouflage elements in the carrier object;
extracting the embedded disguised element from the location information.
The acquiring the position information of the disguised element in the carrier object includes:
acquiring the position information of the camouflage element in the carrier object from the embedding position information provided by the watermark information embedding end; alternatively, the first and second electrodes may be,
and determining the position information of the camouflage elements in the carrier object according to the change of the color gray value of the carrier object.
For example, if the background color of the web page is grey, if a dashed line of one of the other colors appears at a certain position, this position may be the position of the disguised element in the carrier object.
The extracting of the disguise element disguised as the element of the carrier object from the carrier object includes:
intercepting the disguised element according to the position of the disguised element in the carrier object.
If the carrier object is a webpage, extracting a disguise element disguised as an element of the carrier object from the carrier object, comprising the following process steps: determining js and css libraries related to the webpage according to the position information of the disguise element in the webpage; and finding the disguised elements from js and css libraries associated with the webpage.
As shown in fig. 6, in step S603, the watermark information is obtained from the disguised element.
Obtaining the watermark information according to the disguised element, including:
stretching and adjusting the camouflage elements to obtain adjusted bar code images;
and scanning the bar code image to obtain the watermark information.
Obtaining the watermark information according to the disguised element, including:
determining a bit sequence corresponding to the camouflage element according to the width of the stripes of the camouflage element and the width of the gaps;
and obtaining the watermark information according to the coding matching rule corresponding to the disguised element and the corresponding bit sequence.
In the following, examples of extracting watermark information from a carrier object are described, taking a web page, a screenshot and a photo as the carrier object, respectively.
Example 1: as shown in fig. 7, the carrier object is an original web page, and in step S701, the original web page is acquired; in step S702, determining the position information of the disguise element in the original webpage (which may be the position information provided by the watermark embedding end), and in step S703, determining js and css libraries associated with the webpage according to the position information of the disguise element in the original webpage; finding a disguised element from js and css libraries associated with the webpage; in step S704, the dummy element is subjected to stretching processing (original 1-pixel high dotted line (dummy element) is stretched to 100-pixel high) to obtain a barcode image, and in step S705, the barcode image is scanned with software to obtain an embedded watermark string.
Example 2: as shown in fig. 8, the carrier object is a screenshot of a web page, and in step S801, the screenshot of the web page is obtained; in step S802, the embedded dashed line position is located (which can be located by the human eye); in step S803, a lower dotted line is intercepted; in step S804, the dotted line is stretched to stretch the original 1-pixel-high dotted line (dummy element) to a 100-pixel-high barcode image, and in step S805, the barcode image is scanned with software to obtain an embedded watermark string.
Example 3: as shown in fig. 9, the carrier object is a photographed picture of a web page, and in step S901, the photographed picture is acquired; in step S902, the embedded dashed line position is located (which can be located by the human eye); in step S903, identifying the gap of the black and white stripes between the dotted lines, and determining the bit sequence corresponding to the dotted lines according to the width of the gap (wide black stripes represent 11, narrow represent 1, wide white stripes represent 00, and narrow represent 0; Code39 Code does not have three continuous 0 or 1, so the human eye can well identify according to the width of the gap); in step S904, the bit sequence is mapped to an embedded watermark string according to a matching rule.
As can be seen from the above example, the watermark information embedded by the method according to the first embodiment of the present application can be successfully extracted whether the embedded carrier object is a screenshot of an original webpage or a webpage, or a photo, and when an attacker obtains data by means of screenshot or photo and reveals the data, the attacker can still trace to the source, thereby solving the security problem of the watermark embedded in the carrier object.
Corresponding to the above-mentioned watermark embedding method, a third embodiment of the present application further provides a watermark embedding apparatus.
As shown in fig. 10, the watermark embedding apparatus includes:
a watermark information obtaining unit 1001 configured to obtain watermark information to be embedded in a carrier object;
a barcode converting unit 1002, configured to convert the watermark information into a barcode image;
a camouflaging element obtaining unit 1003 configured to perform camouflaging processing on the barcode image to obtain camouflaging elements camouflaged as elements of the carrier object;
a disguise element embedding unit 1004 for embedding the disguise element into the carrier object.
Optionally, the disguise element obtaining unit is specifically configured to:
and intercepting the bar code image to obtain a camouflage element containing the watermark information.
Optionally, intercepting the barcode image to obtain a disguised element containing the watermark information includes: and respectively intercepting each stripe in the bar code image in the longitudinal direction to obtain a dotted line or black and white block set containing the watermark information.
Optionally, the apparatus further comprises: a color adjustment unit for adjusting the color of the color image,
for adjusting the color of the set of dotted or black-and-white blocks containing the watermark information according to the color of the carrier object.
Optionally, the apparatus further comprises: a color adjustment unit for the image of the bar code,
the color adjusting device is used for adjusting the color of the bar code image according to the color of the carrier object to obtain the bar code image with the adjusted color;
intercepting the bar code image to obtain a camouflage element containing the watermark information, wherein the step of intercepting the bar code image comprises the following steps:
intercepting the bar code image after the color is adjusted to obtain a camouflage element containing the watermark information.
Optionally, the disguise element obtaining unit is specifically configured to:
intercepting the bar code image according to the shape of the element on the carrier object to obtain a camouflage element which is matched with the shape of the element on the carrier object and contains the watermark information;
the longitudinally intercepting each stripe in the barcode image to obtain a dotted line or black and white block set containing the watermark information includes:
and respectively intercepting each stripe in the bar code image in the longitudinal direction according to the element shape on the carrier object to obtain the dotted line or black and white block set which is matched with the element shape on the carrier object and contains the watermark information.
Optionally, the disguise element embedding unit is specifically configured to:
judging whether an element matched with the camouflage element in shape exists in the carrier object;
if yes, embedding the camouflage element into the position of the element; or, embedding the disguised element in an adjacent position to the element;
if not, randomly embedding the camouflage elements into the carrier object; or, according to the relationship of each element in the carrier object, the disguise element is embedded into the boundary on the spatial layout of the carrier object.
Optionally, the disguise element embedding unit is specifically configured to: embedding the disguised element into the carrier object a plurality of times.
Optionally, the disguise element embedding unit is specifically configured to:
embedding the camouflage element laterally into the carrier object; and/or
Longitudinally embedding the camouflage element into the carrier object.
Optionally, the carrier object is a web page or an image.
Optionally, the apparatus further comprises: and the position information notification unit is used for notifying the determined embedded position information to a watermark information extraction end.
It should be noted that, for the detailed description of the watermark embedding apparatus provided in the third embodiment of the present application, reference may be made to the related description of the first embodiment of the present application, and details are not described here again.
Corresponding to the watermark embedding method provided above, a fourth embodiment of the present application further provides an electronic device.
As shown in fig. 11, the electronic apparatus includes:
a processor 1101; and
a memory 1102 for storing a program of a watermark embedding method, the apparatus performing the following steps after being powered on and running the program of the watermark embedding method by the processor:
acquiring watermark information to be embedded into a carrier object;
converting the watermark information into a bar code image;
carrying out camouflage processing on the bar code image to obtain camouflage elements camouflaged as elements of the carrier object;
embedding the disguised element into the carrier object.
Optionally, the disguising the barcode image to obtain a disguised element disguised as an element of the carrier object includes:
and intercepting the bar code image to obtain a camouflage element containing the watermark information.
Optionally, intercepting the barcode image to obtain a disguised element containing the watermark information includes: and respectively intercepting each stripe in the bar code image in the longitudinal direction to obtain a dotted line or black and white block set containing the watermark information.
Optionally, the electronic device further performs the following steps:
and adjusting the color of the dotted line or black and white block set containing the watermark information according to the color of the carrier object.
Optionally, the electronic device further performs the following steps:
adjusting the color of the bar code image according to the color of the carrier object to obtain the bar code image with the adjusted color;
intercepting the bar code image to obtain a camouflage element containing the watermark information, wherein the step of intercepting the bar code image comprises the following steps:
intercepting the bar code image after the color is adjusted to obtain a camouflage element containing the watermark information.
Optionally, the disguising the barcode image to obtain a disguised element disguised as an element of the carrier object includes:
intercepting the bar code image according to the shape of the element on the carrier object to obtain a camouflage element which is matched with the shape of the element on the carrier object and contains the watermark information;
the longitudinally intercepting each stripe in the barcode image to obtain a dotted line or black and white block set containing the watermark information includes:
and respectively intercepting each stripe in the bar code image in the longitudinal direction according to the element shape on the carrier object to obtain the dotted line or black and white block set which is matched with the element shape on the carrier object and contains the watermark information.
Optionally, embedding the disguise element into the carrier object includes:
judging whether an element matched with the camouflage element in shape exists in the carrier object;
if yes, embedding the camouflage element into the position of the element; or, embedding the disguised element in an adjacent position to the element;
if not, randomly embedding the camouflage elements into the carrier object; or, according to the relationship of each element in the carrier object, the disguise element is embedded into the boundary on the spatial layout of the carrier object.
Optionally, embedding the disguise element into the carrier object includes: embedding the disguised element into the carrier object a plurality of times.
Optionally, the embedding the disguised element into the carrier object includes:
embedding the camouflage element laterally into the carrier object; and/or
Longitudinally embedding the camouflage element into the carrier object.
Optionally, the carrier object is a web page or an image.
Optionally, the electronic device further performs the following steps: : and informing the determined embedding position information to a watermark information extraction end.
It should be noted that, for the detailed description of the electronic device provided in the fourth embodiment of the present application, reference may be made to the related description of the first embodiment of the present application, and details are not repeated here.
In accordance with the foregoing watermark embedding method, a fifth embodiment of the present application further provides a storage device storing a program of the watermark embedding method, where the program is executed by a processor to perform the following steps:
acquiring watermark information to be embedded into a carrier object;
converting the watermark information into a bar code image;
carrying out camouflage processing on the bar code image to obtain camouflage elements camouflaged as elements of the carrier object;
embedding the disguised element into the carrier object.
It should be noted that, for the detailed description of the storage device provided in the fifth embodiment of the present application, reference may be made to the related description of the first embodiment of the present application, and details are not described here again.
Corresponding to the above-mentioned watermark embedding method, a sixth embodiment of the present application further provides a watermark extraction apparatus.
As shown in fig. 12, the watermark extraction apparatus includes:
a carrier object obtaining unit 1201 for obtaining a carrier object;
a disguise element extraction unit 1202 configured to extract a disguise element disguised as an element of the carrier object from the carrier object, the disguise element including watermark information embedded in the carrier object;
a watermark information obtaining unit 1203, configured to obtain the watermark information according to the disguised element.
Optionally, the disguised element extracting unit is specifically configured to: and extracting a dotted line or black and white block set which is disguised as an element of the carrier object from the carrier object.
Optionally, the disguised element extracting unit is specifically configured to:
extracting transversely embedded camouflage elements which are camouflage as elements of the carrier object from the carrier object; and/or
And extracting longitudinally embedded camouflage elements disguised as elements of the carrier object from the carrier object.
Optionally, the disguise element extracting unit is specifically configured to:
the position information acquisition subunit is used for acquiring the position information of the camouflage elements in the carrier object;
a disguise element extracting subunit operable to extract the disguise element embedded from the position information.
Optionally, the location information obtaining subunit is specifically configured to:
acquiring the position information of the camouflage element in the carrier object from the embedding position information provided by the watermark information embedding end; alternatively, the first and second electrodes may be,
and determining the position information of the camouflage elements in the carrier object according to the change of the color gray value of the carrier object.
Optionally, the disguise element extracting unit is specifically configured to:
intercepting the disguised element according to the position of the disguised element in the carrier object.
Optionally, the carrier object is a web page;
the disguise element extraction unit is specifically configured to:
determining js and css libraries related to the webpage according to the position information of the disguised element in the webpage; and finding the disguised element from js and css libraries associated with the webpage.
Optionally, the watermark information obtaining unit is specifically configured to:
stretching and adjusting the camouflage elements to obtain adjusted bar code images;
and scanning the bar code image to obtain the watermark information.
Optionally, the watermark information obtaining unit is specifically configured to:
determining a bit sequence corresponding to the camouflage element according to the width of the stripes of the camouflage element and the width of the gaps;
and obtaining the watermark information according to the coding matching rule corresponding to the disguised element and the corresponding bit sequence.
It should be noted that, for the detailed description of the watermark extraction apparatus provided in the sixth embodiment of the present application, reference may be made to the related description of the second embodiment of the present application, and details are not described here again.
A seventh embodiment of the present application further provides an electronic device corresponding to the above-mentioned watermark extraction method.
As shown in fig. 13, the electronic apparatus includes:
a processor 1301; and
a memory 1302, configured to store a program of a watermark extraction method, and after the device is powered on and the program of the watermark extraction method is executed by the processor, perform the following steps:
obtaining a carrier object;
extracting a camouflage element which is camouflaged as an element of the carrier object from the carrier object, wherein the camouflage element comprises watermark information embedded into the carrier object;
and obtaining the watermark information according to the camouflage element.
Optionally, the extracting, from the carrier object, a disguise element disguised as an element of the carrier object includes: and extracting a dotted line or black and white block set which is disguised as an element of the carrier object from the carrier object.
Optionally, the extracting, from the carrier object, a disguise element disguised as an element of the carrier object includes:
extracting transversely embedded camouflage elements which are camouflage as elements of the carrier object from the carrier object; and/or
And extracting longitudinally embedded camouflage elements disguised as elements of the carrier object from the carrier object.
Optionally, the extracting, from the carrier object, a disguise element disguised as an element of the carrier object includes:
acquiring the position information of the camouflage elements in the carrier object;
extracting the embedded disguised element from the location information.
Optionally, the obtaining of the position information of the disguised element in the carrier object includes:
acquiring the position information of the camouflage element in the carrier object from the embedding position information provided by the watermark information embedding end; alternatively, the first and second electrodes may be,
and determining the position information of the camouflage elements in the carrier object according to the change of the color gray value of the carrier object.
Optionally, the extracting, from the carrier object, a disguise element disguised as an element of the carrier object includes:
intercepting the disguised element according to the position of the disguised element in the carrier object.
Optionally, the carrier object is a web page;
the extracting of the disguise element disguised as the element of the carrier object from the carrier object includes:
determining js and css libraries related to the webpage according to the position information of the disguised element in the webpage; and finding the disguised element from js and css libraries associated with the webpage.
Optionally, the obtaining the watermark information according to the disguised element includes:
stretching and adjusting the camouflage elements to obtain adjusted bar code images;
and scanning the bar code image to obtain the watermark information.
Optionally, the obtaining the watermark information according to the disguised element includes:
determining a bit sequence corresponding to the camouflage element according to the width of the stripes of the camouflage element and the width of the gaps;
and obtaining the watermark information according to the coding matching rule corresponding to the disguised element and the corresponding bit sequence.
It should be noted that, for the detailed description of the electronic device provided in the seventh embodiment of the present application, reference may be made to the related description of the second embodiment of the present application, and details are not described here again.
Corresponding to the above-mentioned watermark extraction method, an eighth embodiment of the present application further provides a storage device, in which a program of the watermark extraction method is stored, where the program is executed by a processor to perform the following steps:
obtaining a carrier object;
extracting a camouflage element which is camouflaged as an element of the carrier object from the carrier object, wherein the camouflage element comprises watermark information embedded into the carrier object;
and obtaining the watermark information according to the camouflage element.
It should be noted that, for the detailed description of the storage device provided in the eighth embodiment of the present application, reference may be made to the related description of the second embodiment of the present application, and details are not described here again.
A ninth embodiment of the present application provides a data processing method, which is described in detail below with reference to fig. 14.
As shown in fig. 14, in step 1401, a carrier object and first identification information are obtained, where the carrier object includes a first display element.
The carrier object refers to an object in which the first identification information needs to be embedded. The carrier object, an index carrier, comprising: web pages, images, etc.
The first identification information can be embedded into the carrier object, the use value of the original carrier object cannot be influenced, and the first identification information is not easy to be detected and modified again. The first identification information may be a company name of a certain company, or may be an employee number of a certain employee or other identification information.
The first display element comprises elements such as a dotted line or a black and white block set in the carrier object.
As shown in fig. 14, in step 1402, the first identification information is converted into second identification information corresponding to the first display element.
The correspondence may mean that the shape of the second identification information matches the shape of the first display element. For example, if the first display element is a dotted line, the second identification information is also a dotted line; if the first display element is a set of black and white blocks, the second identification information is also a set of black and white blocks.
Converting the first identification information into second identification information corresponding to the first display element, including:
converting the first identification information into an intermediate image;
converting the intermediate image into second identification information corresponding to the first display element.
The converting the first identification information into an intermediate image may include:
obtaining a bit sequence corresponding to the first identification information according to the first identification information;
determining the width of the stripe and the width of the gap according to the bit sequence;
and obtaining the intermediate image according to the width of the stripe and the width of the gap.
The intermediate image comprises a barcode image.
In particular implementations, when the intermediate image is a barcode image, the above steps may be used to convert the first identification information into the barcode image according to Code39 encoding. Code39 is a type of barcode, also called 3of9Code, USD-3, or logars, and is widely used because of its characteristics such as simple construction, capability of encoding data of an arbitrary length, and support of a wide range of devices.
Besides the standard bar code encoding rule, in order to increase the information quantity of the embedded first identification information, a set of encoding rule can be designed by self, fewer 0/1 sequences are used for representing more characters, and the watermark information is converted into an intermediate image according to the designed encoding rule.
The converting the intermediate image into second identification information corresponding to the first display element includes:
and intercepting the intermediate image to obtain second identification information corresponding to the first display element.
The converting the intermediate image into second identification information corresponding to the first display element includes:
and respectively intercepting each stripe in the intermediate image in the longitudinal direction to obtain second identification information corresponding to the first display element.
For example, if the carrier object is a web page having a black and white solid line with a pixel height of 1 on the web page, the intermediate image (e.g., the barcode image) may be cut according to the shape of the solid line of the web page, a dotted line (second identification information) with a pixel height of 1 may be cut from the intermediate image, and the dotted line including the first identification information may be embedded at the position of the solid line of the web page.
For another example, if the carrier object is a web page and the web page has a black and white block set, the intermediate image (for example, a barcode image) may be cut according to the shape of the black and white block set of the web page, the black and white block set matching the black and white block shape of the carrier object is cut from the intermediate image, the cut black and white block set is the second identification information, and when the second identification information is embedded, the second identification information may be embedded into the position of the black and white block set of the web page.
As shown in fig. 14, in step 1403, the second identification information is embedded in the carrier object.
Said embedding said second identification information into said carrier object comprises:
embedding the second identification information into a position of the first display element; or, the pseudo second identification information is embedded in an adjacent position of the first display element.
When the method is specifically implemented, the second identification information is embedded into the carrier object in various ways, and if an element matching the shape of the disguised element exists in the carrier object, the second identification information can be embedded into the position of the first display element, that is, the second identification information replaces the first display element matching the shape of the first display element, for example, if the second identification information is a dotted line containing the first identification information and the webpage has a dotted line, the second identification information can be embedded into the position of the dotted line on the webpage and the second identification information replaces the original dotted line (the first display element); or the second identification information may be embedded at an adjacent position to the first display element, for example, if the second identification information is a dotted line including the first identification information, and the dotted line (the first display element) exists in the web page, the second identification information may be embedded at an upper adjacent position or a lower adjacent position parallel to the dotted line on the web page.
Although the present invention has been described with reference to the preferred embodiments, it should be understood that the scope of the present invention is not limited to the embodiments described above, and that various changes and modifications may be made by one skilled in the art without departing from the spirit and scope of the present invention.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.

Claims (33)

1. A watermark embedding method, comprising:
acquiring watermark information to be embedded into a carrier object;
converting the watermark information into a bar code image;
carrying out camouflage processing on the bar code image to obtain camouflage elements camouflaged as elements of the carrier object;
embedding the disguised element into the carrier object.
2. The method of claim 1, wherein the disguising the barcode image to obtain disguised elements disguised as elements of the carrier object comprises:
and intercepting the bar code image to obtain a camouflage element containing the watermark information.
3. The method of claim 2, wherein said intercepting the barcode image to obtain a disguised element containing the watermark information comprises: and respectively intercepting each stripe in the bar code image in the longitudinal direction to obtain a dotted line or black and white block set containing the watermark information.
4. The method of claim 3, further comprising:
and adjusting the color of the dotted line or black and white block set containing the watermark information according to the color of the carrier object.
5. The method of claim 2, further comprising:
adjusting the color of the bar code image according to the color of the carrier object to obtain the bar code image with the adjusted color;
intercepting the bar code image to obtain a camouflage element containing the watermark information, wherein the step of intercepting the bar code image comprises the following steps:
intercepting the bar code image after the color is adjusted to obtain a camouflage element containing the watermark information.
6. The method of claim 3, wherein the disguising the barcode image to obtain disguised elements disguised as elements of the carrier object comprises:
intercepting the bar code image according to the shape of the element on the carrier object to obtain a camouflage element which is matched with the shape of the element on the carrier object and contains the watermark information;
the longitudinally intercepting each stripe in the barcode image to obtain a dotted line or black and white block set containing the watermark information includes:
and respectively intercepting each stripe in the bar code image in the longitudinal direction according to the element shape on the carrier object to obtain the dotted line or black and white block set which is matched with the element shape on the carrier object and contains the watermark information.
7. The method of any of claims 1-6, wherein said embedding the disguised element into the carrier object comprises:
judging whether an element matched with the camouflage element in shape exists in the carrier object;
if yes, embedding the camouflage element into the position of the element; or, embedding the disguised element in an adjacent position to the element;
if not, randomly embedding the camouflage elements into the carrier object; or, according to the relationship of each element in the carrier object, the disguise element is embedded into the boundary on the spatial layout of the carrier object.
8. The method of claim 1, wherein the embedding the disguised element into the carrier object comprises: embedding the disguised element into the carrier object a plurality of times.
9. The method of claim 1, wherein the embedding the disguised element into the carrier object comprises:
embedding the camouflage element laterally into the carrier object; and/or
Longitudinally embedding the camouflage element into the carrier object.
10. The method of claim 1, wherein the carrier object is a web page or an image.
11. The method of claim 2, further comprising: and informing the determined embedding position information to a watermark information extraction end.
12. A watermark extraction method, comprising:
obtaining a carrier object;
extracting a camouflage element which is camouflaged as an element of the carrier object from the carrier object, wherein the camouflage element comprises watermark information embedded into the carrier object;
and obtaining the watermark information according to the camouflage element.
13. The method of claim 12, wherein the extracting of the disguised elements from the carrier object as elements of the carrier object comprises: and extracting a dotted line or black and white block set which is disguised as an element of the carrier object from the carrier object.
14. The method of claim 12, wherein the extracting of the disguised elements from the carrier object as elements of the carrier object comprises:
extracting transversely embedded camouflage elements which are camouflage as elements of the carrier object from the carrier object; and/or
And extracting longitudinally embedded camouflage elements disguised as elements of the carrier object from the carrier object.
15. The method of claim 12, wherein the extracting of the disguised elements from the carrier object as elements of the carrier object comprises:
acquiring the position information of the camouflage elements in the carrier object;
extracting the embedded disguised element from the location information.
16. The method of claim 15, wherein the obtaining the position information of the disguised element in the carrier object comprises:
acquiring the position information of the camouflage element in the carrier object from the embedding position information provided by the watermark information embedding end; alternatively, the first and second electrodes may be,
and determining the position information of the camouflage elements in the carrier object according to the change of the color gray value of the carrier object.
17. The method of claim 15, wherein the extracting of the disguised elements from the carrier object as elements of the carrier object comprises:
intercepting the disguised element according to the position of the disguised element in the carrier object.
18. The method of claim 15, wherein the carrier object is a web page;
the extracting of the disguise element disguised as the element of the carrier object from the carrier object includes:
determining js and css libraries related to the webpage according to the position information of the disguised element in the webpage; and finding the disguised element from js and css libraries associated with the webpage.
19. The method of claim 12, 17 or 18, wherein the deriving the watermark information from the camouflage element comprises:
stretching and adjusting the camouflage elements to obtain adjusted bar code images;
and scanning the bar code image to obtain the watermark information.
20. The method of claim 12, 17 or 18, wherein the deriving the watermark information from the camouflage element comprises:
determining a bit sequence corresponding to the camouflage element according to the width of the stripes of the camouflage element and the width of the gaps;
and obtaining the watermark information according to the coding matching rule corresponding to the disguised element and the corresponding bit sequence.
21. A watermark embedding apparatus, comprising:
a watermark information obtaining unit, for obtaining the watermark information to be embedded into the carrier object;
a bar code conversion unit for converting the watermark information into a bar code image;
a camouflage element obtaining unit, configured to perform camouflage processing on the barcode image to obtain a camouflage element camouflaged as an element of the carrier object;
a disguise element embedding unit for embedding the disguise element into the carrier object.
22. An electronic device, comprising:
a processor; and
a memory for storing a program of a watermark embedding method, the apparatus performing the following steps after being powered on and running the program of the watermark embedding method by the processor:
acquiring watermark information to be embedded into a carrier object;
converting the watermark information into a bar code image;
carrying out camouflage processing on the bar code image to obtain camouflage elements camouflaged as elements of the carrier object;
embedding the disguised element into the carrier object.
23. A storage device, characterized in that,
a program storing a watermark embedding method, the program being executed by a processor to perform the steps of:
acquiring watermark information to be embedded into a carrier object;
converting the watermark information into a bar code image;
carrying out camouflage processing on the bar code image to obtain camouflage elements camouflaged as elements of the carrier object;
embedding the disguised element into the carrier object.
24. A watermark extraction apparatus, comprising:
a carrier object obtaining unit for obtaining a carrier object;
a disguise element extraction unit configured to extract a disguise element disguised as an element of the carrier object from the carrier object, the disguise element including watermark information embedded in the carrier object;
and the watermark information obtaining unit is used for obtaining the watermark information according to the disguised element.
25. An electronic device, comprising:
a processor; and
a memory for storing a program of a watermark extraction method, the apparatus performing the following steps after being powered on and running the program of the watermark extraction method by the processor:
obtaining a carrier object;
extracting a camouflage element which is camouflaged as an element of the carrier object from the carrier object, wherein the camouflage element comprises watermark information embedded into the carrier object;
and obtaining the watermark information according to the camouflage element.
26. A storage device, characterized in that,
a program storing a watermark extraction method, the program being executed by a processor to perform the steps of:
obtaining a carrier object;
extracting a camouflage element which is camouflaged as an element of the carrier object from the carrier object, wherein the camouflage element comprises watermark information embedded into the carrier object;
and obtaining the watermark information according to the camouflage element.
27. A data processing method, comprising:
acquiring a carrier object and first identification information, wherein the carrier object comprises a first display element;
converting the first identification information into second identification information corresponding to the first display element;
embedding the second identification information into the carrier object.
28. The method of claim 27, wherein converting the first identification information into second identification information corresponding to the first display element comprises:
converting the first identification information into an intermediate image;
converting the intermediate image into second identification information corresponding to the first display element.
29. The method of claim 28, wherein converting the first identification information into an intermediate image comprises:
obtaining a bit sequence corresponding to the first identification information according to the first identification information;
determining the width of the stripe and the width of the gap according to the bit sequence;
and obtaining the intermediate image according to the width of the stripe and the width of the gap.
30. The method of claim 28, wherein converting the intermediate image into second identification information corresponding to the first display element comprises:
and intercepting the intermediate image to obtain second identification information corresponding to the first display element.
31. The method of claim 30, wherein converting the intermediate image into second identification information corresponding to the first display element comprises:
and respectively intercepting each stripe in the intermediate image in the longitudinal direction to obtain second identification information corresponding to the first display element.
32. The method of claim 28, wherein said embedding the second identification information into the carrier object comprises:
embedding the second identification information into a position of the first display element; or, the pseudo second identification information is embedded in an adjacent position of the first display element.
33. The method of claim 28, wherein the intermediate image is a barcode image.
CN201810922077.2A 2018-08-14 2018-08-14 Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting equipment and data processing method Active CN110826033B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810922077.2A CN110826033B (en) 2018-08-14 2018-08-14 Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting equipment and data processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810922077.2A CN110826033B (en) 2018-08-14 2018-08-14 Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting equipment and data processing method

Publications (2)

Publication Number Publication Date
CN110826033A true CN110826033A (en) 2020-02-21
CN110826033B CN110826033B (en) 2022-06-07

Family

ID=69547180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810922077.2A Active CN110826033B (en) 2018-08-14 2018-08-14 Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting equipment and data processing method

Country Status (1)

Country Link
CN (1) CN110826033B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6892947B1 (en) * 2003-07-30 2005-05-17 Hewlett-Packard Development Company, L.P. Barcode embedding methods, barcode communication methods, and barcode systems
CN101221625A (en) * 2008-01-24 2008-07-16 天津市阿波罗信息技术有限公司 Processing method capable of embedding information on bar code
CN101231742A (en) * 2008-01-08 2008-07-30 北京大学 Apparatus and method for abstracting and imbedding digital watermarking in two value text image
CN103077495A (en) * 2013-02-01 2013-05-01 上海理工大学 Digital holography watermarking algorithm based on QR (quick response) code
US20130301870A1 (en) * 2012-05-03 2013-11-14 Hong Kong University Of Science And Technology Embedding visual information in a two-dimensional bar code
WO2015167628A1 (en) * 2014-04-29 2015-11-05 Hewlett-Packard Development Company, L.P. Machine-readable watermarks and barcodes in images
CN105631797A (en) * 2015-12-24 2016-06-01 小米科技有限责任公司 Watermarking method and device
CN105701758A (en) * 2016-01-13 2016-06-22 华南理工大学 Digital watermarking image generation method based on graphic code and apparatus thereof
CN107103577A (en) * 2017-04-11 2017-08-29 中国科学院信息工程研究所 Half fragile uniqueness image watermark insertion and extracting method for integrity protection
WO2018095149A1 (en) * 2016-11-28 2018-05-31 深圳大学 Method and system for generating two-dimensional code having embedded visual image, and reading system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6892947B1 (en) * 2003-07-30 2005-05-17 Hewlett-Packard Development Company, L.P. Barcode embedding methods, barcode communication methods, and barcode systems
CN101231742A (en) * 2008-01-08 2008-07-30 北京大学 Apparatus and method for abstracting and imbedding digital watermarking in two value text image
CN101221625A (en) * 2008-01-24 2008-07-16 天津市阿波罗信息技术有限公司 Processing method capable of embedding information on bar code
US20130301870A1 (en) * 2012-05-03 2013-11-14 Hong Kong University Of Science And Technology Embedding visual information in a two-dimensional bar code
CN103077495A (en) * 2013-02-01 2013-05-01 上海理工大学 Digital holography watermarking algorithm based on QR (quick response) code
WO2015167628A1 (en) * 2014-04-29 2015-11-05 Hewlett-Packard Development Company, L.P. Machine-readable watermarks and barcodes in images
CN105631797A (en) * 2015-12-24 2016-06-01 小米科技有限责任公司 Watermarking method and device
CN105701758A (en) * 2016-01-13 2016-06-22 华南理工大学 Digital watermarking image generation method based on graphic code and apparatus thereof
WO2018095149A1 (en) * 2016-11-28 2018-05-31 深圳大学 Method and system for generating two-dimensional code having embedded visual image, and reading system
CN107103577A (en) * 2017-04-11 2017-08-29 中国科学院信息工程研究所 Half fragile uniqueness image watermark insertion and extracting method for integrity protection

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
PRASHAN PREMARATNE等: "2D Barcodes as Watermarks in Image Authentication", 《6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2007)》, 23 July 2007 (2007-07-23), pages 432 - 437, XP031119155 *
刘丽等: "二维条码数字水印技术研究", 《信息网络安全》, no. 1, 31 January 2014 (2014-01-31), pages 56 - 60 *
刘永亮等: "基于离散对数的水印检测协议", 《计算机辅助设计与图形学学报》, vol. 18, no. 9, 30 September 2006 (2006-09-30), pages 1322 - 1326 *

Also Published As

Publication number Publication date
CN110826033B (en) 2022-06-07

Similar Documents

Publication Publication Date Title
Piva An overview on image forensics
CN110766594B (en) Information hiding method and device, detection method and device and anti-counterfeiting tracing method
EP3308371B1 (en) System and method for digital watermarking
EP3410685B1 (en) Image processing device, image processing method, and program
Wang et al. Watermarking for DIBR 3D images based on SIFT feature points
CN111223032A (en) Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting equipment and data processing method
AU2016360852B2 (en) Method for authenticating and/or checking the integrity of a subject
CN111310134B (en) Screen watermark generation method, device and equipment
CN111680273A (en) Watermark embedding method, device, electronic equipment and readable storage medium
CN110969563B (en) Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting equipment and data processing method
Yin et al. Improved reversible image authentication scheme
Hamid et al. Robust image hashing scheme using Laplacian pyramids
Keyvanpour et al. A secure method in digital video watermarking with transform domain algorithms
Hadmi et al. A robust and secure perceptual hashing system based on a quantization step analysis
Lee et al. Screenshot identification using combing artifact from interlaced video
Kamenicky et al. PIZZARO: Forensic analysis and restoration of image and video data
CN110826033B (en) Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting equipment and data processing method
Sandoval Orozco et al. Image source acquisition identification of mobile devices based on the use of features
Patel et al. An improvement of forgery video detection technique using Error Level Analysis
CN113628091B (en) Safety information extraction method and device for electronic display screen content reproduction scene
Nam et al. WAN: Watermarking attack network
EP4360038A1 (en) Zoom agnostic watermark extraction
WO2022271145A1 (en) Zoom agnostic watermark extraction
Iacobici et al. Digital imaging processing and reconstruction for general applications
Saju et al. An effective method for detection and localization of tampering

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant