CN111325654A - Digital watermark image generation method based on desktop virtualization technology - Google Patents

Digital watermark image generation method based on desktop virtualization technology Download PDF

Info

Publication number
CN111325654A
CN111325654A CN202010152976.6A CN202010152976A CN111325654A CN 111325654 A CN111325654 A CN 111325654A CN 202010152976 A CN202010152976 A CN 202010152976A CN 111325654 A CN111325654 A CN 111325654A
Authority
CN
China
Prior art keywords
image
desktop
virtual machine
digital watermark
watermark image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010152976.6A
Other languages
Chinese (zh)
Inventor
陈波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yunchuangshilian Science And Technology Co ltd
Original Assignee
Beijing Yunchuangshilian Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yunchuangshilian Science And Technology Co ltd filed Critical Beijing Yunchuangshilian Science And Technology Co ltd
Priority to CN202010152976.6A priority Critical patent/CN111325654A/en
Publication of CN111325654A publication Critical patent/CN111325654A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/10Image enhancement or restoration by non-spatial domain filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20048Transform domain processing
    • G06T2207/20056Discrete and fast Fourier transform, [DFT, FFT]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a digital watermark image generation method based on desktop virtualization technology, which relates to the technical field of digital security, and can effectively improve the safety awareness of internal personnel, improve the cost of illegal use after user information leaks, reduce the information leakage risk and improve the traceability of the leaked user information by adding specific user information to each virtual machine desktop image by utilizing the desktop virtualization technology.

Description

Digital watermark image generation method based on desktop virtualization technology
Technical Field
The invention relates to the technical field of digital information security, in particular to a digital watermark image generation method based on a desktop virtualization technology.
Background
The digitization of the information medium provides great convenience for information access, and meanwhile, the efficiency and the accuracy of information expression are remarkably improved. Especially, with the development of computer network communication technology, the exchange and transmission of data become a relatively simple process.
At present, people can conveniently and rapidly transmit digital information to any desired place by means of electronic equipment such as computers, digital scanners, printers and the like. However, the following side effects are that the security of the digital data files cannot be guaranteed in the transmission process, information leakage is easily performed through modes of screen shooting, screen capturing, printing and the like, and the requirement of a confidential scene required by information security cannot be met.
Disclosure of Invention
In order to solve the defects of the prior art, an embodiment of the present invention provides a digital watermark image generation method based on a desktop virtualization technology, where the method includes:
reading user characteristic information from a background server by using an SPICE client or a KVM virtual machine;
converting the user characteristic information into a watermark image with set pixels;
encoding the watermark image by adopting a random sequence to generate an encrypted watermark image;
carrying out Fourier transform on an original image of a virtual machine desktop and carrying out frequency domain processing on the transformed watermark image to obtain a frequency domain image;
and superposing the watermark image and the frequency domain image and carrying out inverse Fourier transform on the superposed image to obtain the virtual machine desktop image containing the digital watermark.
Preferably, obtaining the virtual machine desktop image containing the digital watermark includes:
and displaying the virtual machine desktop image containing the digital watermark by using the SIPCE client or the KVM virtual machine.
Preferably, the pixels of the watermark image are 128pix × 32 pix.
Preferably, the user characteristic information includes:
user name, user terminal IP address.
The digital watermark image generation method based on the desktop virtualization technology provided by the embodiment of the invention has the following beneficial effects:
by utilizing the desktop virtual technology, specific user information is added to each virtual machine desktop image, the safety awareness of internal personnel can be effectively improved, the cost of illegal use after user information leaks is improved, the information leakage risk is reduced, and the traceability of the leaked user information is improved.
Drawings
Fig. 1 is a schematic flow chart of a method for generating a digital watermark image based on a desktop virtualization technology according to an embodiment of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and the embodiments.
Referring to fig. 1, a method for generating a digital watermark image based on a desktop virtualization technology provided by an embodiment of the present invention includes the following steps:
and S101, reading user characteristic information from a background server by using the SPICE client or the KVM virtual machine.
The Simple Protocol for Independent Computing Environment (SPICE) is a BS/CS compatible, high-performance, dynamic and self-adaptive remote desktop delivery technology, and can bring experience which is difficult to distinguish from a physical desktop personal computer for a terminal user. SPICE is specifically designed and created for remote access to virtualized desktops, and is the default desktop delivery protocol for desktop virtualization (or similar) solutions, connecting users to virtualized desktops. Kernel-based Virtual Machine (KVM) is a fully virtualized solution provided for Linux on AMD64 and Intel64 hardware, which is included in the standard Red Hat enterprise Linux 7 Kernel. The KVM can run a variety of Windows and Linux guest operating systems without modification. KVM is the most common desktop delivery method in intelligent desktop virtualization.
Further, SPICE clients may run under different operating systems, such as Windows and Linux.
And S102, converting the user characteristic information into a watermark image with set pixels.
S103, the watermark image is coded by adopting a random sequence to generate an encrypted watermark image.
And S104, carrying out Fourier transform on the original image of the virtual machine desktop and carrying out frequency domain processing on the transformed watermark image to obtain a frequency domain image.
The frequency of the image is an index for representing the intensity of the change of the gray scale in the image, and is the gradient of the gray scale on a plane space. Such as: a large area of desert is an area with slow gray level change in an image, and the corresponding frequency value is very low; and for the edge region with violent surface attribute transformation, the image is a region with violent gray scale change, and the corresponding frequency value is higher. For an image, the edge part of the image is a sudden change part which changes rapidly, so that the reaction is a high-frequency component in a frequency domain; the noise of the image is mostly a high frequency part; the gently changing part of the image is a low-frequency component.
That is, the fourier transform provides another angle to view the image, and the image can be transformed from a gray scale distribution to a frequency distribution to view the characteristics of the image. Different frequency information has different roles in the image structure. The main component of the image is low-frequency information which forms the basic gray level of the image and has small determining effect on the image structure; determining the edge structure of the image by the intermediate frequency information; the high frequency information forms the edges and details of the image and is a further enhancement of the image content over the intermediate frequency information.
And S105, superposing the watermark image and the frequency domain image, and performing inverse Fourier transform on the superposed image to obtain a virtual machine desktop image containing the digital watermark.
Optionally, obtaining a virtual machine desktop image containing a digital watermark includes:
and displaying the virtual machine desktop image containing the digital watermark by using the SIPCE client or the KVM virtual machine.
Optionally, the pixels of the watermark image are 128pix × 32 pix.
Optionally, the user characteristic information includes:
user name, user terminal IP address.
According to the digital watermark image generation method based on the desktop virtualization technology, the desktop virtualization technology is utilized, the specific user information is added to each virtual machine desktop image, the safety awareness of internal personnel can be effectively improved, the cost of illegal use after user information leaks is improved, the information leakage risk is reduced, and the traceability of leaked user information is improved.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It will be appreciated that the relevant features of the method and apparatus described above are referred to one another.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In addition, the memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (4)

1. A digital watermark image generation method based on desktop virtualization technology is characterized by comprising the following steps:
reading user characteristic information from a background server by using an SPICE client or a KVM virtual machine;
converting the user characteristic information into a watermark image with set pixels;
encoding the watermark image by adopting a random sequence to generate an encrypted watermark image;
carrying out Fourier transform on an original image of a virtual machine desktop and carrying out frequency domain processing on the transformed watermark image to obtain a frequency domain image;
and superposing the watermark image and the frequency domain image and carrying out inverse Fourier transform on the superposed image to obtain the virtual machine desktop image containing the digital watermark.
2. The method of claim 1, wherein obtaining a desktop image of a virtual machine including a digital watermark comprises:
and displaying the virtual machine desktop image containing the digital watermark by using the SIPCE client or the KVM virtual machine.
3. The method for generating a digital watermark image based on desktop virtualization technology as claimed in claim 1, wherein the pixels of the watermark image are 128pix × 32 pix.
4. The method for generating digital watermark image based on desktop virtualization technology as claimed in claim 1, wherein the user characteristic information comprises:
user name, user terminal IP address.
CN202010152976.6A 2020-03-06 2020-03-06 Digital watermark image generation method based on desktop virtualization technology Pending CN111325654A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010152976.6A CN111325654A (en) 2020-03-06 2020-03-06 Digital watermark image generation method based on desktop virtualization technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010152976.6A CN111325654A (en) 2020-03-06 2020-03-06 Digital watermark image generation method based on desktop virtualization technology

Publications (1)

Publication Number Publication Date
CN111325654A true CN111325654A (en) 2020-06-23

Family

ID=71173230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010152976.6A Pending CN111325654A (en) 2020-03-06 2020-03-06 Digital watermark image generation method based on desktop virtualization technology

Country Status (1)

Country Link
CN (1) CN111325654A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170011486A1 (en) * 2008-12-18 2017-01-12 Vmware, Inc. Watermarking and scalability techniques for a virtual desktop planning tool
CN109064378A (en) * 2018-07-25 2018-12-21 成都睿码科技有限责任公司 Digital watermark embedding and extracting method based on Fourier transform
CN109190338A (en) * 2018-08-22 2019-01-11 广东微云科技股份有限公司 A kind of virtualization desktop screen watermark generation method and system
CN109840131A (en) * 2017-11-27 2019-06-04 中兴通讯股份有限公司 A kind of watermark adding method, device and computer readable storage medium
CN109977634A (en) * 2017-12-27 2019-07-05 中兴通讯股份有限公司 A kind of method, apparatus, computer equipment and the storage medium of watermark addition
CN110674476A (en) * 2019-08-29 2020-01-10 万翼科技有限公司 File printing method and device with embedded dark watermark

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170011486A1 (en) * 2008-12-18 2017-01-12 Vmware, Inc. Watermarking and scalability techniques for a virtual desktop planning tool
CN109840131A (en) * 2017-11-27 2019-06-04 中兴通讯股份有限公司 A kind of watermark adding method, device and computer readable storage medium
CN109977634A (en) * 2017-12-27 2019-07-05 中兴通讯股份有限公司 A kind of method, apparatus, computer equipment and the storage medium of watermark addition
CN109064378A (en) * 2018-07-25 2018-12-21 成都睿码科技有限责任公司 Digital watermark embedding and extracting method based on Fourier transform
CN109190338A (en) * 2018-08-22 2019-01-11 广东微云科技股份有限公司 A kind of virtualization desktop screen watermark generation method and system
CN110674476A (en) * 2019-08-29 2020-01-10 万翼科技有限公司 File printing method and device with embedded dark watermark

Similar Documents

Publication Publication Date Title
US9590854B1 (en) Automated network security
CN102693527A (en) Method and apparatus for performing a blur rendering process on an image
EP2277317A2 (en) Systems and methods for enhanced image encoding
CN110245304B (en) Data sharing method, device and computer readable medium
US10127204B2 (en) Customized system documentation
Abdelhakim et al. Optimized SVD-based robust watermarking in the fractional Fourier domain
US20200285753A1 (en) Incremental decryption and integrity verification of a secure operating system image
Wu et al. Logistic map and contourlet-based robust zero watermark for medical images
US20220269820A1 (en) Artificial intelligence based data redaction of documents
US10049222B1 (en) Establishing application trust levels using taint propagation
CN111325654A (en) Digital watermark image generation method based on desktop virtualization technology
US8464343B1 (en) Systems and methods for providing security information about quick response codes
Fan et al. Optical information encoding and image watermarking scheme based on phase-shifting interferometry and singular value decomposition
Leopard et al. Memory forensics and the Macintosh OS X operating system
CN113312668A (en) Image identification method, device and equipment based on privacy protection
CN110858832B (en) Password information reinforcement and data processing method, device, system and storage medium
CN114391253A (en) Geometric cross component filtering
TWI677822B (en) System and method for managing web interface, readable storage medium
CN107515742B (en) Architecture method and system for enabling Web page to access local resources of mobile APP
Kaur et al. Survey on mobile cloud computing
Qureshi et al. Realization of a robust watermarking system in spatial domain
US20150161405A1 (en) Content management
CN108470406A (en) Book information acquisition methods and device
JP7231026B2 (en) Device estimation device, device estimation method, and device estimation program
CN114429414A (en) Method and equipment for adding and analyzing invisible watermark text

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination