CN110955889A - Electronic document tracing method based on digital fingerprints - Google Patents

Electronic document tracing method based on digital fingerprints Download PDF

Info

Publication number
CN110955889A
CN110955889A CN201911311809.5A CN201911311809A CN110955889A CN 110955889 A CN110955889 A CN 110955889A CN 201911311809 A CN201911311809 A CN 201911311809A CN 110955889 A CN110955889 A CN 110955889A
Authority
CN
China
Prior art keywords
font
digital fingerprint
user
digital
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911311809.5A
Other languages
Chinese (zh)
Inventor
宋其义
贾大智
宋想
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Lingchu Information Technology Co Ltd
Original Assignee
Hefei Lingchu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Lingchu Information Technology Co Ltd filed Critical Hefei Lingchu Information Technology Co Ltd
Priority to CN201911311809.5A priority Critical patent/CN110955889A/en
Publication of CN110955889A publication Critical patent/CN110955889A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Document Processing Apparatus (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention relates to electronic document tracing, in particular to an electronic document tracing method based on digital fingerprints, which generates digital fingerprint information according to user information which can uniquely identify a user, generates digital fingerprints according to the digital fingerprint information, modifies the existing fonts in a font library to generate fonts with the digital fingerprints, replaces the fonts in the electronic document with the fonts with the digital fingerprints, sends the electronic document to a corresponding user, and judges a divulged user according to the user information corresponding to the digital fingerprints when finding the electronic document with the fonts with the digital fingerprints; the technical scheme provided by the invention can effectively overcome the defects of small hidden information capacity, easy interference of hidden information and need of changing the original document content in the prior art.

Description

Electronic document tracing method based on digital fingerprints
Technical Field
The invention relates to electronic document tracing, in particular to an electronic document tracing method based on digital fingerprints.
Background
In order to determine the identity of a divulger after a divulgence event, there are several main prior arts:
screen watermarking technology
The user's screen is provided with watermark information that is invisible but can be identified in a special way. The advantage is that can prevent taking a picture, contains stealthy watermark in the photo of taking down, if the photo reveals away, can find the divulger according to the watermark information in the photo.
The disadvantages include the following: the watermark information is easy to remove by modifying the color of the photo; only can prevent shooting, and a divulgent cannot be found by tracing the source of the leaked electronic document; it is necessary to use with a special display.
Hiding digital fingerprints in pictures
The hidden digital fingerprint is added into the picture, and the method principle is that the image has complex texture, color, brightness and other information, for example: by embedding the watermark in the least significant bits of each row of pixels of the image.
The method has the advantages of large hidden information capacity and the following disadvantages: the watermark information is easy to remove by modifying the color of the picture; the picture is needed as a carrier, and the method cannot be applied to the electronic document only containing characters.
Hiding digital fingerprints in text format
A common method is to modify the spacing between characters and the spacing between lines as hidden information, for example, a character offset to the left by 0.5 spacing for 1 and a character offset to the right by 0.5 character for 0.
The disadvantages include the following: the hidden information has small capacity, and the document format can be disordered once too much hidden information is embedded; hidden information is easily interfered, and once editing operations such as addition, deletion, modification and the like are carried out on a document, the hidden information can be identified.
Fourthly, modifying characters to hide digital fingerprints
The common method is to replace characters, add and delete useless characters as hidden information, for example, replace 'of' with 'of' and delete conjunctions.
The disadvantages include the following: the hidden information capacity is small; the content of the original document is changed, which may not be perceptible when reading, but is actually changed.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects in the prior art, the invention provides the electronic document tracing method based on the digital fingerprint, which can effectively overcome the defects of small hidden information capacity, easy interference of hidden information and need of changing the original document content in the prior art.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme:
the electronic document tracing method based on the digital fingerprint comprises the following steps:
s1, generating digital fingerprint information according to the user information which can uniquely identify the user, and generating a digital fingerprint according to the digital fingerprint information;
s2, modifying the existing font in the font library to generate the font with the digital fingerprint;
s3, replacing the font in the electronic document with the font with the digital fingerprint, and sending the electronic document to the corresponding user;
and S4, when the electronic document with the digital fingerprint font is found, judging the divulged user according to the user information corresponding to the digital fingerprint.
Preferably, the user information that can uniquely identify the user includes a user name, a user ID.
Preferably, after the digital fingerprint information is generated in step S1, the digital fingerprint information is encrypted, and a signature is calculated and stored in a database together with the user information.
Preferably, the step of generating a digital fingerprint according to the digital fingerprint information in step S1 includes the following steps: the digital fingerprint information is converted into binary information, and the binary information is converted into a bar code pattern.
Preferably, the modifying the existing font in the font library to generate the font with the digital fingerprint in step S2 includes the following steps:
a. selecting a proper existing font, analyzing the font file, converting the font file into an XML file, and acquiring the position of each coordinate point of the selected character in the font;
b. processing the selected font, and adding a digital fingerprint at a position which does not influence the original font;
c. editing appointed characters in the selected font, converting the font file into an XML file, and adding a digital fingerprint at an appointed position;
d. and converting the modified XML file into a font file and storing the font file.
Preferably, the step of determining the compromised user according to the user information corresponding to the digital fingerprint in step S4 includes the following steps:
a. inputting an electronic document with a digital fingerprint font;
b. converting characters with digital fingerprints into a picture format, and amplifying and reading the digital fingerprints;
c. and extracting digital fingerprint information according to the digital fingerprint, and judging the divulged user according to the user information corresponding to the digital fingerprint information.
(III) advantageous effects
Compared with the prior art, the electronic document tracing method based on the digital fingerprint generates the digital fingerprint according to the digital fingerprint information, modifies the existing font in the font library to generate the font with the digital fingerprint, so that the digital fingerprint can carry large-capacity hidden information, and the font with the digital fingerprint is generated, so that the common editing operation in the electronic document can not cause interference and damage to the hidden information, the content of the original document is not required to be changed, the digital fingerprint can be ensured to be effectively identified, and a divulged user can be found through accurate tracing of user information corresponding to the digital fingerprint.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
FIG. 1 is a schematic diagram of the present invention for obtaining the position of each coordinate point of a selected character in a font;
FIG. 2 is a diagram of a digital fingerprint according to the present invention;
FIG. 3 is a schematic diagram of a font with a digital fingerprint according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The electronic document tracing method based on the digital fingerprint comprises the following steps:
s1, generating digital fingerprint information according to the user information which can uniquely identify the user, and generating a digital fingerprint according to the digital fingerprint information;
s2, modifying the existing font in the font library to generate the font with the digital fingerprint;
s3, replacing the font in the electronic document with the font with the digital fingerprint, and sending the electronic document to the corresponding user;
and S4, when the electronic document with the digital fingerprint font is found, judging the divulged user according to the user information corresponding to the digital fingerprint.
The user information that can uniquely identify the user includes a user name, a user ID.
After the digital fingerprint information is generated in step S1, the digital fingerprint information is encrypted, and a signature is calculated and stored in the database together with the user information.
In step S1, generating a digital fingerprint according to the digital fingerprint information, the method includes the following steps: the digital fingerprint information is converted into binary information, and the binary information is converted into a bar code pattern.
In step S2, modifying the existing font in the font library to generate the font with the digital fingerprint, including the following steps:
a. selecting a proper existing font, analyzing the font file, converting the font file into an XML file, and acquiring the position of each coordinate point of the selected character in the font;
b. processing the selected font, and adding a digital fingerprint at a position which does not influence the original font;
c. editing appointed characters in the selected font, converting the font file into an XML file, and adding a digital fingerprint at an appointed position;
d. and converting the modified XML file into a font file and storing the font file.
In step S4, the method for determining a compromised user according to the user information corresponding to the digital fingerprint includes the following steps:
a. inputting an electronic document with a digital fingerprint font;
b. converting characters with digital fingerprints into a picture format, and amplifying and reading the digital fingerprints;
c. and extracting digital fingerprint information according to the digital fingerprint, and judging the divulged user according to the user information corresponding to the digital fingerprint information.
And generating digital fingerprint information according to the user information capable of uniquely identifying the user, and generating the digital fingerprint according to the digital fingerprint information. After the digital fingerprint information is generated, the digital fingerprint information is encrypted, a signature is calculated, and the signature and the user information are stored in a database.
The user information that can uniquely identify the user includes a user name, a user ID.
Generating a digital fingerprint from the digital fingerprint information, comprising the steps of: the digital fingerprint information is converted into binary information, and the binary information is converted into a bar code pattern. In this case, 1 may be set to represent a black square with 1 × 1, and 0 may be set to represent a white square with 1 × 1, as shown in fig. 2.
Modifying the existing font in the font library to generate the font with the digital fingerprint, comprising the following steps:
a. selecting a proper existing font, analyzing the font file, converting the font file into an XML file, and acquiring the position of each coordinate point of the selected character in the font;
b. processing the selected font, and adding a digital fingerprint at a position which does not influence the original font;
c. editing appointed characters in the selected font, converting the font file into an XML file, and adding a digital fingerprint at an appointed position;
d. and converting the modified XML file into a font file and storing the font file.
As shown in fig. 1, the color points in E are coordinate points, and these coordinate points are combined into a closed figure to form the text E that we can see. The font glyphs known by us are actually closed graphs obtained by connecting a series of coordinate points, and although the font glyphs are small when being used, the precision of each font glyph is very high, most font glyphs are about 128-200, and some font glyphs can reach the precision of 1000-1600.
So, if within this large range, some digital fingerprints of 1 × 1 (or a little larger) small squares (or other shapes) are added, the distinction from the normal font is not visible at all in the normal display of the document, but is visible after magnification, as shown in fig. 3.
When finding the electronic document with the digital fingerprint font, judging the divulged user according to the user information corresponding to the digital fingerprint, comprising the following steps:
a. inputting an electronic document with a digital fingerprint font;
b. converting characters with digital fingerprints into a picture format, and amplifying and reading the digital fingerprints;
c. and extracting digital fingerprint information according to the digital fingerprint, and judging the divulged user according to the user information corresponding to the digital fingerprint information.
For example, the existing user ID is "KB 20190101", and the user ID is converted into binary information "10010111000010110010110000110001111001110000110001110000110001".
The binary numbers represent digital fingerprint information, the binary information is converted into a bar code pattern, 1 represents a black square with 1 x 1, 0 represents a white square with 1 x 1, the digital fingerprint is obtained, as shown in fig. 2, and finally the digital fingerprint is written into a font, as shown in fig. 3.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (6)

1. The electronic document tracing method based on the digital fingerprint is characterized in that: the method comprises the following steps:
s1, generating digital fingerprint information according to the user information which can uniquely identify the user, and generating a digital fingerprint according to the digital fingerprint information;
s2, modifying the existing font in the font library to generate the font with the digital fingerprint;
s3, replacing the font in the electronic document with the font with the digital fingerprint, and sending the electronic document to the corresponding user;
and S4, when the electronic document with the digital fingerprint font is found, judging the divulged user according to the user information corresponding to the digital fingerprint.
2. The electronic document tracing method based on digital fingerprints as claimed in claim 1, wherein: the user information capable of uniquely identifying the user comprises a user name and a user ID.
3. The electronic document tracing method based on digital fingerprints as claimed in claim 1, wherein: after the digital fingerprint information is generated in step S1, the digital fingerprint information is encrypted, and a signature is calculated and stored in a database together with the user information.
4. The electronic document tracing method based on digital fingerprints as claimed in claim 1, wherein: the step of generating the digital fingerprint according to the digital fingerprint information in the step S1 includes the following steps: the digital fingerprint information is converted into binary information, and the binary information is converted into a bar code pattern.
5. The electronic document tracing method based on digital fingerprints as claimed in claim 1, wherein: in step S2, modifying the existing font in the font library to generate the font with the digital fingerprint includes the following steps:
a. selecting a proper existing font, analyzing the font file, converting the font file into an XML file, and acquiring the position of each coordinate point of the selected character in the font;
b. processing the selected font, and adding a digital fingerprint at a position which does not influence the original font;
c. editing appointed characters in the selected font, converting the font file into an XML file, and adding a digital fingerprint at an appointed position;
d. and converting the modified XML file into a font file and storing the font file.
6. The electronic document tracing method based on digital fingerprints as claimed in claim 1, wherein: the step of determining the compromised user according to the user information corresponding to the digital fingerprint in step S4 includes the following steps:
a. inputting an electronic document with a digital fingerprint font;
b. converting characters with digital fingerprints into a picture format, and amplifying and reading the digital fingerprints;
c. and extracting digital fingerprint information according to the digital fingerprint, and judging the divulged user according to the user information corresponding to the digital fingerprint information.
CN201911311809.5A 2019-12-18 2019-12-18 Electronic document tracing method based on digital fingerprints Pending CN110955889A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911311809.5A CN110955889A (en) 2019-12-18 2019-12-18 Electronic document tracing method based on digital fingerprints

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911311809.5A CN110955889A (en) 2019-12-18 2019-12-18 Electronic document tracing method based on digital fingerprints

Publications (1)

Publication Number Publication Date
CN110955889A true CN110955889A (en) 2020-04-03

Family

ID=69982706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911311809.5A Pending CN110955889A (en) 2019-12-18 2019-12-18 Electronic document tracing method based on digital fingerprints

Country Status (1)

Country Link
CN (1) CN110955889A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114943086A (en) * 2022-05-18 2022-08-26 兰州交通大学 Vector geographic data decryption method for traceable and divulged users
CN116828127A (en) * 2023-08-30 2023-09-29 北京点聚信息技术有限公司 Fingerprint encryption storage method combined with document data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104036280A (en) * 2014-06-23 2014-09-10 国家广播电影电视总局广播科学研究院 Video fingerprinting method based on region of interest and cluster combination
CN104361268A (en) * 2014-11-28 2015-02-18 广州视源电子科技股份有限公司 Watermark embedding and reading method, device and system
CN104715168A (en) * 2015-02-13 2015-06-17 陈佳阳 File security control and trace method and system based on digital fingerprints
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output
CN109657426A (en) * 2019-01-30 2019-04-19 贵州大学 A kind of data source tracing method based on digital signature and digital watermarking

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104036280A (en) * 2014-06-23 2014-09-10 国家广播电影电视总局广播科学研究院 Video fingerprinting method based on region of interest and cluster combination
CN104361268A (en) * 2014-11-28 2015-02-18 广州视源电子科技股份有限公司 Watermark embedding and reading method, device and system
CN104715168A (en) * 2015-02-13 2015-06-17 陈佳阳 File security control and trace method and system based on digital fingerprints
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output
CN109657426A (en) * 2019-01-30 2019-04-19 贵州大学 A kind of data source tracing method based on digital signature and digital watermarking

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114943086A (en) * 2022-05-18 2022-08-26 兰州交通大学 Vector geographic data decryption method for traceable and divulged users
CN114943086B (en) * 2022-05-18 2023-09-22 兰州交通大学 Vector geographic data decryption method for traceable divulged users
CN116828127A (en) * 2023-08-30 2023-09-29 北京点聚信息技术有限公司 Fingerprint encryption storage method combined with document data
CN116828127B (en) * 2023-08-30 2023-10-27 北京点聚信息技术有限公司 Fingerprint encryption storage method combined with document data

Similar Documents

Publication Publication Date Title
US5765176A (en) Performing document image management tasks using an iconic image having embedded encoded information
US8427509B2 (en) Method for embedding messages into documents using distance fields
EP3410685B1 (en) Image processing device, image processing method, and program
Amano et al. A feature calibration method for watermarking of document images
US20040001606A1 (en) Watermark fonts
CN110766594B (en) Information hiding method and device, detection method and device and anti-counterfeiting tracing method
US11134167B2 (en) Method of embedding and extracting watermark data using a correction image comparison with a noise-based image in the frequency domain
JP2005328528A (en) Processing method and system for secret mark of digital image
US20050053258A1 (en) System and method for watermarking a document
CN111680273A (en) Watermark embedding method, device, electronic equipment and readable storage medium
CN110955889A (en) Electronic document tracing method based on digital fingerprints
KR101960290B1 (en) Method for embedding and extraction of watermarking data
JP4595014B2 (en) Digital watermark embedding device and detection device
CN115114598A (en) Watermark generation method, and method and device for file tracing by using watermark
CN110210467B (en) Formula positioning method of text image, image processing device and storage medium
CN115841413A (en) Image processing method and device
CN109166193B (en) Photographing card-punching or evidence-obtaining method based on time, position, random number and bar code
US10873679B2 (en) Image processing device, image processing method for embedding a watermark in a color image
Villán et al. Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding
KR102435876B1 (en) Method for embedding and extraction of watermarking data
CN113628091B (en) Safety information extraction method and device for electronic display screen content reproduction scene
CN116127419A (en) Data processing method, data identification method, font file generation method and device
CN111669477B (en) Image processing method, system, device, equipment and computer storage medium
KR102347288B1 (en) Method for embedding and extraction of watermarking data
JP2006279640A (en) Information embedding device, printing medium and information reader

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200403