CN111431861A - Digital text protection device, control method and control terminal - Google Patents

Digital text protection device, control method and control terminal Download PDF

Info

Publication number
CN111431861A
CN111431861A CN202010127335.5A CN202010127335A CN111431861A CN 111431861 A CN111431861 A CN 111431861A CN 202010127335 A CN202010127335 A CN 202010127335A CN 111431861 A CN111431861 A CN 111431861A
Authority
CN
China
Prior art keywords
module
watermark
layer
fixedly connected
digital text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010127335.5A
Other languages
Chinese (zh)
Inventor
陈翔
刘强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changsha Normal University
Original Assignee
Changsha Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changsha Normal University filed Critical Changsha Normal University
Priority to CN202010127335.5A priority Critical patent/CN111431861A/en
Publication of CN111431861A publication Critical patent/CN111431861A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Computing Systems (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The application discloses digital text protection device, control method and control terminal, which comprises a housing, the front end fixedly connected with RIFD discernment panel at casing top, the top of casing just is located the front end of RIFD discernment panel and articulates through the hinge and has the apron, the spout has all been seted up to the top and the bottom on apron surface, the inner chamber sliding connection of spout has the scanner, the left side fixedly connected with supporting shoe of scanner, the equal fixedly connected with camera in top and the bottom on supporting shoe surface. This application uses through casing, RIFD identification panel, scanner, camera, display screen, function button, mainboard, treater, information storage ware, transmission module and fingerprint identification module's cooperation, and what can be better carries out watermark encryption processing to text information, and the receiver can detect and resume text information through encrypting the watermark, has reduced user property loss's possibility.

Description

Digital text protection device, control method and control terminal
Technical Field
The application relates to the technical field of network security, in particular to a digital text protection device, a control method and a control terminal.
Background
With the development of networks and multimedia, digital information systems play more and more important roles, while the transmission of text information on public networks is subject to malicious tampering, which not only destroys the content of the text information, but also may cause significant loss on property, so that the detection and recovery of text information tampering are very important
In recent years, in order to deal with cloud computing and digital text security crisis, the main network information security research community in the world uses the solution of the digital text security problem as a development key link of information security technology, and countries such as the united states, the united kingdom, germany, japan, and the like develop and develop a digital text protection system. The U.S. Google corporation invests $ 16 million each year to build cloud computing data security centers, with an efficiency equivalent to $ 640 million using traditional technology, a cost savings of 40 times. China also draws great attention in the technical field of cloud computing and digital text watermarking, some national-level key laboratories and research institutes of China have already advanced research in related fields at present, and related academic groups and expert groups hold academic conferences for many times in recent years to discuss cloud computing and digital text security crisis and development problems.
The existing digital text watermark bidirectional security control device based on a cloud model can be matched with a network cloud model to control a digital text. But in actual use, the watermark features are less secure. The feature prevention capability for the deliberate watermark attack is weak, most of the existing text digital watermark technologies cannot prevent an attacker from attacking a watermark system by an automatic method, the attack cost is generally low, and the bidirectional security of the watermark is not strong. Both cloud computing and digital text watermarking algorithms have a mutual authentication problem. Weakening of identity authentication management and digital text watermarking methods such as line shifting, word shifting, semantics and the like can give an attacker a chance to make the attacker relatively difficult in application of copyright statement, content authentication and the like, which are problems that actually exist and are urgently needed to be solved.
Disclosure of Invention
In order to solve the technical problems, the following technical scheme is provided:
in a first aspect, an embodiment of the application provides a digital text protection device, which comprises a casing, wherein an RIFD identification panel is fixedly connected to the front end of the top of the casing, a cover plate is hinged to the top of the casing and the front end of the RIFD identification panel through a hinge, sliding grooves are formed in the top and the bottom of the surface of the cover plate, a scanner is connected to the inner cavity of the sliding grooves in a sliding manner, a supporting block is fixedly connected to the left side of the scanner, cameras are fixedly connected to the top and the bottom of the surface of the supporting block, a display screen is fixedly connected to the left side of the rear end of the top of the casing, a function key is arranged on the right side of the rear end of the top of the casing, a main board is fixedly connected to the bottom of the inner cavity of the casing, and; the output of RIFD discernment panel and the one-way electric connection of input of treater, the one-way electric connection of output and the input of treater of scanner, the one-way electric connection of output and the input of treater of camera, the one-way electric connection of output and the input of display screen of treater, the one-way electric connection of output and the input of information memory of treater, the two-way electric connection of treater and transmission module, the one-way electric connection of input and the input of function button of treater.
By adopting the implementation mode, through the matching use of the shell, the RIFD identification panel, the scanner, the camera, the display screen, the function keys, the main board, the processor, the information memory, the transmission module and the fingerprint identification module, the watermark encryption processing can be better carried out on the text information, a receiver can detect and recover the text information through the encrypted watermark, and the possibility of property loss of a user is reduced.
With reference to the first aspect, in a first possible implementation manner of the first aspect, an L ED light supplement lamp is fixedly connected between the cameras, and an input end of the L ED light supplement lamp is electrically connected to an output end of the processor in a single direction.
With reference to the first aspect, in a second possible implementation manner of the first aspect, a data transmission interface is fixedly connected to the left side of the motherboard, the data transmission interface is electrically connected to the processor in a bidirectional manner, and the data transmission interface is a USB connection port, an HDMI connection port, or a network cable connection port.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the information storage includes a multi-level cache and a solid-state storage, the multi-level cache is a distributed multi-level cache, and is provided with three levels of third-order cache regions, and the multi-level cache is connected to the solid-state storage through a data connection line.
In combination with the first aspect, in a fourth possible implementation manner of the first aspect, a fingerprint identification module is disposed on the right side of the top of the display screen, and an output end of the fingerprint identification module is electrically connected with an input end of the processor in a one-way manner.
In a second aspect, an embodiment of the present application provides a digital text protection device control method, for controlling the digital text protection device of the first aspect or any possible implementation manner of the first aspect, where the method includes: collecting text information through an RIFD identification panel, a scanner, a camera and a data transmission interface; the collected information is processed in an informationization way through a processor; acquiring the watermark encryption degree updated in real time from the cloud end through a transmission module and processing the watermark encryption degree; and after the processing is finished, storing the processed data into an information memory, and transferring and replacing the processed data through a data transmission interface.
In a third aspect, an embodiment of the present application provides a control terminal, where the control terminal is configured to implement bidirectional security control over digital text watermarking of the digital text protection device according to the first aspect or any one of possible implementation manners of the first aspect, the terminal includes a carrier layer, an output end of the carrier layer is provided with a watermark layer, an output end of the watermark layer is provided with an encryption layer, an output end of the encryption layer is provided with a validation layer, and the validation layer is in communication connection with the carrier layer in front of the watermark layer through the encryption layer; the check layer is extracted the module, is differentiateed the module by the watermark and constitutes, the check layer includes that the watermark extracts the module, the output that the watermark extracted the module is equipped with the module of differentiateing, the watermark extracts the module, differentiates the module and all with check layer communication connection.
With reference to the third aspect, in a first possible implementation manner of the third aspect, the carrier layer includes an acquisition module, an output end of the acquisition module is provided with an information hiding module, and the acquisition module and the information hiding module are both in communication connection with the carrier layer.
With reference to the third aspect, in a second possible implementation manner of the third aspect, the watermark layer includes a watermark generating module, an output end of the watermark generating module is provided with an embedding module, and both the watermark generating module and the embedding module are connected to the watermark layer in a communication manner.
With reference to the third aspect, in a third possible implementation manner of the third aspect, the encryption layer includes an encryption module.
Drawings
Fig. 1 is a schematic structural diagram of a digital text protection apparatus according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a connection between a processor and a housing according to an embodiment of the present disclosure;
fig. 3 is a schematic system diagram of a digital text protection device according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a method for controlling a digital text protection apparatus according to an embodiment of the present application;
fig. 5 is a schematic diagram of a control terminal according to an embodiment of the present disclosure;
in fig. 1 to 5, the symbols are represented as:
the fingerprint identification device comprises a shell 1, a 2-RIFD identification panel, a 3-cover plate, a 4-sliding chute, a 5-scanner, a 6-supporting block, a 7-camera, an 8-display screen, a 9-function key, a 10-main board, a 11-processor, a 12-information memory, a 13-transmission module, a 14-L ED light supplement lamp, a 15-data transmission interface and a 16-fingerprint identification module.
Detailed Description
The present invention will be described with reference to the accompanying drawings and embodiments.
Referring to fig. 1-3, the digital text protection device in this embodiment includes a housing 1, a RIFD recognition panel 2 is fixedly connected to the front end of the top of the housing 1, a cover plate 3 is hinged to the top of the housing 1 and the front end of the RIFD recognition panel 2 through a hinge, sliding grooves 4 are formed in the top and the bottom of the surface of the cover plate 3, a scanner 5 is slidably connected to an inner cavity of the sliding groove 4, a supporting block 6 is fixedly connected to the left side of the scanner 5, cameras 7 are fixedly connected to the top and the bottom of the surface of the supporting block 6, L ED light supplement lamps 14 are fixedly connected between the cameras 7, the input end of the L ED light supplement lamp 14 is electrically connected to the output end of the processor 11 in a single direction, and by arranging the L ED light supplement lamps 14, light compensation can be provided for the cameras 7 when light is dim, and smooth.
Through setting up L ED light filling lamp, can provide light compensation to the camera when light is dim, better assurance going on smoothly of image acquisition, through setting up the data transmission interface, can be more convenient transmit data, better assurance text message transmission's swift simplicity, through being provided with multi-level buffer and solid-state memory with information storage ware, can be better save data, better assurance the processing of text message work, through setting up fingerprint identification module, user's permission can be injectd, better assurance text message's security.
The left side fixedly connected with display screen 8 of 1 top rear end of casing, the right side at 8 tops of display screen is provided with fingerprint identification module 16, and fingerprint identification module 16's the one-way electric connection of output and the input of treater 11 through setting up fingerprint identification module 16, can inject user's permission, better assurance text information's security.
The right side of the back end of the top of the machine shell 1 is provided with a function key 9, the bottom of the inner cavity of the machine shell 1 is fixedly connected with a mainboard 10, the left side of the mainboard 10 is fixedly connected with a data transmission interface 15, the data transmission interface 15 is in bidirectional electrical connection with a processor 11, the data transmission interface 15 is a USB wiring port, an HDMI wiring port or a network cable wiring port, through the arrangement of the data transmission interface 15, data can be transmitted more conveniently, and the rapidness and simplicity of text information transmission are better ensured, the top of the mainboard 10 is fixedly connected with the processor 11, an information memory 12 and a transmission module 13 from left to right in sequence, the information memory 12 comprises a multi-level cache and a solid state memory, the multi-level cache is a distributed multi-level cache and is provided with three-level cache regions, the multi-level cache is connected with the solid, the data can be better stored, and the processing of text information work is better guaranteed.
The output end of the RIFD identification panel 2 is electrically connected with the input end of the processor 11 in a single direction, the output end of the scanner 5 is electrically connected with the input end of the processor 11 in a single direction, the output end of the camera 7 is electrically connected with the input end of the processor 11 in a single direction, the output end of the processor 11 is electrically connected with the input end of the display screen 8 in a single direction, the output end of the processor 11 is electrically connected with the input end of the information memory 12 in a single direction, the processor 11 is electrically connected with the transmission module 13 in a double direction, and the input end of the processor 11 is electrically connected with the input end of the function.
Through the cooperation of casing 1, RIFD identification panel 2, scanner 5, camera 7, display screen 8, function button 9, mainboard 10, treater 11, information memory 12, transmission module 13 and fingerprint identification module 16 and using, the watermark encryption processing can be better carried out to text message, and the receiver can detect and resume text message through encrypting the watermark, has reduced user property loss's possibility.
This digital text protection device, through casing 1, RIFD identification panel 2, scanner 5, camera 7, display screen 8, function button 9, mainboard 10, treater 11, information memory 12, transmission module 13 and fingerprint identification module 16's cooperation, solved and carried out the transmission of text information and easily suffered maliciously and falsely on the public network, not only destroyed the content of text information, but also probably caused the problem of the great loss on the property.
The embodiment of the present application further provides a flow diagram of a method for controlling a digital text protection device, referring to fig. 4, where the method includes:
and S101, collecting text information through the RIFD identification panel, the scanner, the camera and the data transmission interface.
And S102, performing information processing on the collected information through the processor.
And S103, acquiring the watermark encryption degree updated in real time from the cloud end through the transmission module, and processing the watermark encryption degree.
And S104, storing the processed data into an information memory after the processing is finished, and transferring and replacing the processed data through a data transmission interface.
An embodiment of the present application further provides a control terminal, referring to fig. 5, where the control terminal includes: carrier layer, watermark layer, encryption layer and effect layer, the output of carrier layer is equipped with the watermark layer, the output on watermark layer is equipped with the encryption layer, the output on encryption layer is equipped with the effect layer, the effect layer is through the fixed series connection of carrier layer in encryption layer and watermark layer the place ahead, the effect layer is drawed the module by the watermark, is differentiateed the module and constitutes, the inside on effect layer is equipped with the watermark and draws the module, the output that the module was drawed to the watermark is equipped with differentiates the module, the watermark is drawed the module, is differentiateed the module and all establishes ties with effect layer is fixed.
The inside of carrier layer is equipped with collection module, collection module's output is equipped with the information and hides the module, collection module, information hide the module and all establish ties with the carrier layer is fixed, and fixed series connection has increased the connectivity.
The watermark generation module is arranged in the watermark layer, the output end of the watermark generation module is provided with the embedding module, the watermark generation module and the embedding module are fixedly connected with the watermark layer in series, and the watermark generation module is convenient for forming watermarks.
The encryption layer is fixedly provided with an encryption module inside, and the encryption module is convenient to encrypt.
The modules are fixedly connected in series, and the fixed series connection facilitates the interactive use of the system.
The control terminal establishes and realizes the binding of the environmental security of the virtual cloud with the watermark information based on a runtime trust chain mechanism and an isolation protection mechanism of a trusted cloud executable program list, ensures that a model structure diagram hides a cloud theoretical model with invisible data and hides multi-bit information through a modulation technology or a multi-path transmission technology, and plays a role in protection in bidirectional authentication attack.
Carrier layer, watermark layer, the layer of encrypting that connects gradually and verify the layer, the carrier layer includes collection module and information hiding module, collection module with the information transfer of gathering extremely watermark layer to hide partial information through information hiding module. The carrier layer is the basis of the whole watermark system and comprises watermark media carriers, such as PDF (portable document format) and other documents, which are collected by a collection module; the information hiding module has an information hiding mechanism, and then the security control of the digital text watermarking system is realized and researched. Proposition logic formalization establishes decentralized security control watermark information Print, and aiming at a cloud model watermark protection system WGuarder, distributed watermark security control protection and program language level watermark stream security control are realized. WGuarder applications are sought to embed watermarking and watermark stream security control into applications.
The problems of capacity control of digital text watermarks in a watermark layer and an encryption layer in a model structure diagram, coding safety of watermark information and the like are solved in the layer. The watermark generating module generates a watermark after receiving the information transmitted by the acquisition module and carries out data embedding on the carrier layer through the embedding module.
The task of the watermark layer is to generate a watermark and embed data in the carrier layer, which is a key level of the watermark technology. The watermark generation device comprises an encryption module, wherein the encryption module is connected with the watermark generation module. The encryption layer is used for encrypting the information of the watermark layer so as to resist unauthorized detection, embedding and other attacks, and mainly comprises an encryption and decryption algorithm, a secret key and other contents. The verification layer comprises a watermark extraction module and a discrimination module, the watermark extraction module is connected with the encryption module, the discrimination module is connected with the watermark extraction module, and then the digital text watermark safety control performance analysis research is carried out.
The method for the security control performance analysis adopts N digital watermark texts with different quantities, the watermarks are embedded and extracted aiming at each group of texts, the text content is recovered, the security control performance is matched by adopting independent watermark text analysis and linear discriminant analysis, the small sample watermark is complex and time-consuming in precision adjustment, and the method under the cloud model with good security performance is realized. The model structure diagram validation layer plays an important role in controlling the security of a digital text watermarking system under a cloud theory model. The watermark extraction module is connected with the encryption module, and the identification module is connected with the watermark extraction module. The main function of the verification layer is to directly serve users and provide verification and security control for the carrier, watermark information, authorship and other contents.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Of course, the above description is not limited to the above examples, and technical features that are not described in this application may be implemented by or using the prior art, and are not described herein again; the above embodiments and drawings are only for illustrating the technical solutions of the present application and not for limiting the present application, and the present application is only described in detail with reference to the preferred embodiments instead, it should be understood by those skilled in the art that changes, modifications, additions or substitutions within the spirit and scope of the present application may be made by those skilled in the art without departing from the spirit of the present application, and the scope of the claims of the present application should also be covered.

Claims (10)

1. A digital text protection device comprises a casing and is characterized in that the front end of the top of the casing is fixedly connected with an RIFD identification panel, the top of the casing and the front end of the RIFD identification panel are hinged with a cover plate through hinges, the top and the bottom of the surface of the cover plate are both provided with a sliding chute, the inner cavity of the sliding chute is connected with a scanner in a sliding manner, the left side of the scanner is fixedly connected with a supporting block, the top and the bottom of the surface of the supporting block are both fixedly connected with a camera, the left side of the rear end of the top of the casing is fixedly connected with a display screen, the right side of the rear end of the top of the casing is provided with a function key, the bottom of the inner cavity of the casing is fixedly connected with a main board, and the top;
the output of RIFD discernment panel and the one-way electric connection of input of treater, the one-way electric connection of output and the input of treater of scanner, the one-way electric connection of output and the input of treater of camera, the one-way electric connection of output and the input of display screen of treater, the one-way electric connection of output and the input of information memory of treater, the two-way electric connection of treater and transmission module, the one-way electric connection of input and the input of function button of treater.
2. The digital text protection device of claim 1, wherein an L ED fill light is fixedly connected between the cameras, and an input end of the L ED fill light is electrically connected with an output end of the processor in a unidirectional manner.
3. The digital text protection device according to claim 1, wherein a data transmission interface is fixedly connected to the left side of the main board, the data transmission interface is electrically connected to the processor in a bidirectional manner, and the data transmission interface is a USB connection port, an HDMI connection port or a network cable connection port.
4. The digital text protection device according to claim 1, wherein the information storage comprises a multi-level buffer and a solid-state storage, the multi-level buffer is a distributed multi-level buffer, and is provided with three levels of three-level buffer areas, and the multi-level buffer is connected with the solid-state storage through a data connection line.
5. The digital text protection device according to claim 1, wherein a fingerprint recognition module is disposed on the right side of the top of the display screen, and an output end of the fingerprint recognition module is electrically connected with an input end of the processor in a unidirectional manner.
6. A digital text protection device control method for controlling the digital text protection device of any one of claims 1 to 5, the method comprising:
collecting text information through an RIFD identification panel, a scanner, a camera and a data transmission interface;
the collected information is processed in an informationization way through a processor;
acquiring the watermark encryption degree updated in real time from the cloud end through a transmission module and processing the watermark encryption degree;
and after the processing is finished, storing the processed data into an information memory, and transferring and replacing the processed data through a data transmission interface.
7. A control terminal for realizing the digital text watermark bidirectional security control of the digital text protection device of any one of claims 1 to 5, characterized in that the terminal comprises a carrier layer, the output end of the carrier layer is provided with a watermark layer, the output end of the watermark layer is provided with an encryption layer, the output end of the encryption layer is provided with a validation layer, and the validation layer is in communication connection with the carrier layer in front of the watermark layer through the encryption layer;
the check layer is extracted the module, is differentiateed the module by the watermark and constitutes, the check layer includes that the watermark extracts the module, the output that the watermark extracted the module is equipped with the module of differentiateing, the watermark extracts the module, differentiates the module and all with check layer communication connection.
8. The control terminal according to claim 7, wherein the carrier layer comprises an acquisition module, an information hiding module is arranged at an output end of the acquisition module, and the acquisition module and the information hiding module are both in communication connection with the carrier layer.
9. The control terminal according to claim 7, wherein the watermark layer comprises a watermark generation module, an output end of the watermark generation module is provided with an embedding module, and the watermark generation module and the embedding module are both connected with the watermark layer in a communication manner.
10. The control terminal in accordance with claim 7, wherein the encryption layer comprises an encryption module.
CN202010127335.5A 2020-02-28 2020-02-28 Digital text protection device, control method and control terminal Pending CN111431861A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010127335.5A CN111431861A (en) 2020-02-28 2020-02-28 Digital text protection device, control method and control terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010127335.5A CN111431861A (en) 2020-02-28 2020-02-28 Digital text protection device, control method and control terminal

Publications (1)

Publication Number Publication Date
CN111431861A true CN111431861A (en) 2020-07-17

Family

ID=71547336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010127335.5A Pending CN111431861A (en) 2020-02-28 2020-02-28 Digital text protection device, control method and control terminal

Country Status (1)

Country Link
CN (1) CN111431861A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105787307A (en) * 2016-03-04 2016-07-20 长沙师范学院 Digital watermark algorithm hierarchical model system based on texts
CN206322239U (en) * 2017-01-04 2017-07-11 广西科技师范学院 A kind of medical image digital watermarking device
CN208241741U (en) * 2018-06-22 2018-12-14 刘泽宇 A kind of portable computer photo scanning device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105787307A (en) * 2016-03-04 2016-07-20 长沙师范学院 Digital watermark algorithm hierarchical model system based on texts
CN206322239U (en) * 2017-01-04 2017-07-11 广西科技师范学院 A kind of medical image digital watermarking device
CN208241741U (en) * 2018-06-22 2018-12-14 刘泽宇 A kind of portable computer photo scanning device

Similar Documents

Publication Publication Date Title
Zhu et al. Secure neural network watermarking protocol against forging attack
US20160055552A1 (en) Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same
WO2015090170A1 (en) Digital watermarking data processing module, chip and smart digital watermarking mobile phone
WO2005064524A1 (en) Digital seal system
Kaur et al. An existential review on text watermarking techniques
CN109785222A (en) A method of the information for webpage is quickly embedded in and extracts
Lax et al. Digital document signing: Vulnerabilities and solutions
CN109151157A (en) A kind of multimedia digital watermark evidence obtaining mobile phone
CN201056906Y (en) Fingerprint cabinet lock
Mukherjee et al. An image steganography technique based on fake DNA sequence construction
CN101989324A (en) Information security system based on computer and mobile storage device
CN101561853B (en) Image copyright certification management system based on digital watermark technique
Yang et al. Multimedia security and privacy protection in the internet of things: research developments and challenges
Das et al. Digital forensic enabled image authentication using least significant bit (lsb) with tamper localization based hash function
CN111431861A (en) Digital text protection device, control method and control terminal
CN202677327U (en) Handwritten terminal for encrypting signatures
CN114357524B (en) Electronic document processing method and device
Cheddad Steganoflage: a new image steganography algorithm
Elbegbayan Winnowing, a document fingerprinting algorithm
Patel et al. Digital image watermarking mechanism for image authentication, image forgery and self recovery
Khadam et al. Data aggregation and privacy preserving using computational intelligence
Malik et al. ECDSA approach for reliable data sharing and document verification using two level QR code
CN105787307B (en) A kind of text based digital watermarking algorithm hierarchical mode system
Wang et al. Internet of vehicles based on TrustZone and optimized RSA
CN115134473B (en) Image encryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200717