CN111431861A - Digital text protection device, control method and control terminal - Google Patents
Digital text protection device, control method and control terminal Download PDFInfo
- Publication number
- CN111431861A CN111431861A CN202010127335.5A CN202010127335A CN111431861A CN 111431861 A CN111431861 A CN 111431861A CN 202010127335 A CN202010127335 A CN 202010127335A CN 111431861 A CN111431861 A CN 111431861A
- Authority
- CN
- China
- Prior art keywords
- module
- watermark
- layer
- fixedly connected
- digital text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 230000005540 biological transmission Effects 0.000 claims abstract description 34
- 238000012545 processing Methods 0.000 claims abstract description 11
- 230000006870 function Effects 0.000 claims description 10
- 230000002457 bidirectional effect Effects 0.000 claims description 8
- 238000004891 communication Methods 0.000 claims description 8
- 238000010200 validation analysis Methods 0.000 claims description 5
- 239000000284 extract Substances 0.000 claims description 4
- 230000002829 reductive effect Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 239000013589 supplement Substances 0.000 description 6
- 238000000605 extraction Methods 0.000 description 5
- 238000011160 research Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000003313 weakening effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Computing Systems (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The application discloses digital text protection device, control method and control terminal, which comprises a housing, the front end fixedly connected with RIFD discernment panel at casing top, the top of casing just is located the front end of RIFD discernment panel and articulates through the hinge and has the apron, the spout has all been seted up to the top and the bottom on apron surface, the inner chamber sliding connection of spout has the scanner, the left side fixedly connected with supporting shoe of scanner, the equal fixedly connected with camera in top and the bottom on supporting shoe surface. This application uses through casing, RIFD identification panel, scanner, camera, display screen, function button, mainboard, treater, information storage ware, transmission module and fingerprint identification module's cooperation, and what can be better carries out watermark encryption processing to text information, and the receiver can detect and resume text information through encrypting the watermark, has reduced user property loss's possibility.
Description
Technical Field
The application relates to the technical field of network security, in particular to a digital text protection device, a control method and a control terminal.
Background
With the development of networks and multimedia, digital information systems play more and more important roles, while the transmission of text information on public networks is subject to malicious tampering, which not only destroys the content of the text information, but also may cause significant loss on property, so that the detection and recovery of text information tampering are very important
In recent years, in order to deal with cloud computing and digital text security crisis, the main network information security research community in the world uses the solution of the digital text security problem as a development key link of information security technology, and countries such as the united states, the united kingdom, germany, japan, and the like develop and develop a digital text protection system. The U.S. Google corporation invests $ 16 million each year to build cloud computing data security centers, with an efficiency equivalent to $ 640 million using traditional technology, a cost savings of 40 times. China also draws great attention in the technical field of cloud computing and digital text watermarking, some national-level key laboratories and research institutes of China have already advanced research in related fields at present, and related academic groups and expert groups hold academic conferences for many times in recent years to discuss cloud computing and digital text security crisis and development problems.
The existing digital text watermark bidirectional security control device based on a cloud model can be matched with a network cloud model to control a digital text. But in actual use, the watermark features are less secure. The feature prevention capability for the deliberate watermark attack is weak, most of the existing text digital watermark technologies cannot prevent an attacker from attacking a watermark system by an automatic method, the attack cost is generally low, and the bidirectional security of the watermark is not strong. Both cloud computing and digital text watermarking algorithms have a mutual authentication problem. Weakening of identity authentication management and digital text watermarking methods such as line shifting, word shifting, semantics and the like can give an attacker a chance to make the attacker relatively difficult in application of copyright statement, content authentication and the like, which are problems that actually exist and are urgently needed to be solved.
Disclosure of Invention
In order to solve the technical problems, the following technical scheme is provided:
in a first aspect, an embodiment of the application provides a digital text protection device, which comprises a casing, wherein an RIFD identification panel is fixedly connected to the front end of the top of the casing, a cover plate is hinged to the top of the casing and the front end of the RIFD identification panel through a hinge, sliding grooves are formed in the top and the bottom of the surface of the cover plate, a scanner is connected to the inner cavity of the sliding grooves in a sliding manner, a supporting block is fixedly connected to the left side of the scanner, cameras are fixedly connected to the top and the bottom of the surface of the supporting block, a display screen is fixedly connected to the left side of the rear end of the top of the casing, a function key is arranged on the right side of the rear end of the top of the casing, a main board is fixedly connected to the bottom of the inner cavity of the casing, and; the output of RIFD discernment panel and the one-way electric connection of input of treater, the one-way electric connection of output and the input of treater of scanner, the one-way electric connection of output and the input of treater of camera, the one-way electric connection of output and the input of display screen of treater, the one-way electric connection of output and the input of information memory of treater, the two-way electric connection of treater and transmission module, the one-way electric connection of input and the input of function button of treater.
By adopting the implementation mode, through the matching use of the shell, the RIFD identification panel, the scanner, the camera, the display screen, the function keys, the main board, the processor, the information memory, the transmission module and the fingerprint identification module, the watermark encryption processing can be better carried out on the text information, a receiver can detect and recover the text information through the encrypted watermark, and the possibility of property loss of a user is reduced.
With reference to the first aspect, in a first possible implementation manner of the first aspect, an L ED light supplement lamp is fixedly connected between the cameras, and an input end of the L ED light supplement lamp is electrically connected to an output end of the processor in a single direction.
With reference to the first aspect, in a second possible implementation manner of the first aspect, a data transmission interface is fixedly connected to the left side of the motherboard, the data transmission interface is electrically connected to the processor in a bidirectional manner, and the data transmission interface is a USB connection port, an HDMI connection port, or a network cable connection port.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the information storage includes a multi-level cache and a solid-state storage, the multi-level cache is a distributed multi-level cache, and is provided with three levels of third-order cache regions, and the multi-level cache is connected to the solid-state storage through a data connection line.
In combination with the first aspect, in a fourth possible implementation manner of the first aspect, a fingerprint identification module is disposed on the right side of the top of the display screen, and an output end of the fingerprint identification module is electrically connected with an input end of the processor in a one-way manner.
In a second aspect, an embodiment of the present application provides a digital text protection device control method, for controlling the digital text protection device of the first aspect or any possible implementation manner of the first aspect, where the method includes: collecting text information through an RIFD identification panel, a scanner, a camera and a data transmission interface; the collected information is processed in an informationization way through a processor; acquiring the watermark encryption degree updated in real time from the cloud end through a transmission module and processing the watermark encryption degree; and after the processing is finished, storing the processed data into an information memory, and transferring and replacing the processed data through a data transmission interface.
In a third aspect, an embodiment of the present application provides a control terminal, where the control terminal is configured to implement bidirectional security control over digital text watermarking of the digital text protection device according to the first aspect or any one of possible implementation manners of the first aspect, the terminal includes a carrier layer, an output end of the carrier layer is provided with a watermark layer, an output end of the watermark layer is provided with an encryption layer, an output end of the encryption layer is provided with a validation layer, and the validation layer is in communication connection with the carrier layer in front of the watermark layer through the encryption layer; the check layer is extracted the module, is differentiateed the module by the watermark and constitutes, the check layer includes that the watermark extracts the module, the output that the watermark extracted the module is equipped with the module of differentiateing, the watermark extracts the module, differentiates the module and all with check layer communication connection.
With reference to the third aspect, in a first possible implementation manner of the third aspect, the carrier layer includes an acquisition module, an output end of the acquisition module is provided with an information hiding module, and the acquisition module and the information hiding module are both in communication connection with the carrier layer.
With reference to the third aspect, in a second possible implementation manner of the third aspect, the watermark layer includes a watermark generating module, an output end of the watermark generating module is provided with an embedding module, and both the watermark generating module and the embedding module are connected to the watermark layer in a communication manner.
With reference to the third aspect, in a third possible implementation manner of the third aspect, the encryption layer includes an encryption module.
Drawings
Fig. 1 is a schematic structural diagram of a digital text protection apparatus according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a connection between a processor and a housing according to an embodiment of the present disclosure;
fig. 3 is a schematic system diagram of a digital text protection device according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a method for controlling a digital text protection apparatus according to an embodiment of the present application;
fig. 5 is a schematic diagram of a control terminal according to an embodiment of the present disclosure;
in fig. 1 to 5, the symbols are represented as:
the fingerprint identification device comprises a shell 1, a 2-RIFD identification panel, a 3-cover plate, a 4-sliding chute, a 5-scanner, a 6-supporting block, a 7-camera, an 8-display screen, a 9-function key, a 10-main board, a 11-processor, a 12-information memory, a 13-transmission module, a 14-L ED light supplement lamp, a 15-data transmission interface and a 16-fingerprint identification module.
Detailed Description
The present invention will be described with reference to the accompanying drawings and embodiments.
Referring to fig. 1-3, the digital text protection device in this embodiment includes a housing 1, a RIFD recognition panel 2 is fixedly connected to the front end of the top of the housing 1, a cover plate 3 is hinged to the top of the housing 1 and the front end of the RIFD recognition panel 2 through a hinge, sliding grooves 4 are formed in the top and the bottom of the surface of the cover plate 3, a scanner 5 is slidably connected to an inner cavity of the sliding groove 4, a supporting block 6 is fixedly connected to the left side of the scanner 5, cameras 7 are fixedly connected to the top and the bottom of the surface of the supporting block 6, L ED light supplement lamps 14 are fixedly connected between the cameras 7, the input end of the L ED light supplement lamp 14 is electrically connected to the output end of the processor 11 in a single direction, and by arranging the L ED light supplement lamps 14, light compensation can be provided for the cameras 7 when light is dim, and smooth.
Through setting up L ED light filling lamp, can provide light compensation to the camera when light is dim, better assurance going on smoothly of image acquisition, through setting up the data transmission interface, can be more convenient transmit data, better assurance text message transmission's swift simplicity, through being provided with multi-level buffer and solid-state memory with information storage ware, can be better save data, better assurance the processing of text message work, through setting up fingerprint identification module, user's permission can be injectd, better assurance text message's security.
The left side fixedly connected with display screen 8 of 1 top rear end of casing, the right side at 8 tops of display screen is provided with fingerprint identification module 16, and fingerprint identification module 16's the one-way electric connection of output and the input of treater 11 through setting up fingerprint identification module 16, can inject user's permission, better assurance text information's security.
The right side of the back end of the top of the machine shell 1 is provided with a function key 9, the bottom of the inner cavity of the machine shell 1 is fixedly connected with a mainboard 10, the left side of the mainboard 10 is fixedly connected with a data transmission interface 15, the data transmission interface 15 is in bidirectional electrical connection with a processor 11, the data transmission interface 15 is a USB wiring port, an HDMI wiring port or a network cable wiring port, through the arrangement of the data transmission interface 15, data can be transmitted more conveniently, and the rapidness and simplicity of text information transmission are better ensured, the top of the mainboard 10 is fixedly connected with the processor 11, an information memory 12 and a transmission module 13 from left to right in sequence, the information memory 12 comprises a multi-level cache and a solid state memory, the multi-level cache is a distributed multi-level cache and is provided with three-level cache regions, the multi-level cache is connected with the solid, the data can be better stored, and the processing of text information work is better guaranteed.
The output end of the RIFD identification panel 2 is electrically connected with the input end of the processor 11 in a single direction, the output end of the scanner 5 is electrically connected with the input end of the processor 11 in a single direction, the output end of the camera 7 is electrically connected with the input end of the processor 11 in a single direction, the output end of the processor 11 is electrically connected with the input end of the display screen 8 in a single direction, the output end of the processor 11 is electrically connected with the input end of the information memory 12 in a single direction, the processor 11 is electrically connected with the transmission module 13 in a double direction, and the input end of the processor 11 is electrically connected with the input end of the function.
Through the cooperation of casing 1, RIFD identification panel 2, scanner 5, camera 7, display screen 8, function button 9, mainboard 10, treater 11, information memory 12, transmission module 13 and fingerprint identification module 16 and using, the watermark encryption processing can be better carried out to text message, and the receiver can detect and resume text message through encrypting the watermark, has reduced user property loss's possibility.
This digital text protection device, through casing 1, RIFD identification panel 2, scanner 5, camera 7, display screen 8, function button 9, mainboard 10, treater 11, information memory 12, transmission module 13 and fingerprint identification module 16's cooperation, solved and carried out the transmission of text information and easily suffered maliciously and falsely on the public network, not only destroyed the content of text information, but also probably caused the problem of the great loss on the property.
The embodiment of the present application further provides a flow diagram of a method for controlling a digital text protection device, referring to fig. 4, where the method includes:
and S101, collecting text information through the RIFD identification panel, the scanner, the camera and the data transmission interface.
And S102, performing information processing on the collected information through the processor.
And S103, acquiring the watermark encryption degree updated in real time from the cloud end through the transmission module, and processing the watermark encryption degree.
And S104, storing the processed data into an information memory after the processing is finished, and transferring and replacing the processed data through a data transmission interface.
An embodiment of the present application further provides a control terminal, referring to fig. 5, where the control terminal includes: carrier layer, watermark layer, encryption layer and effect layer, the output of carrier layer is equipped with the watermark layer, the output on watermark layer is equipped with the encryption layer, the output on encryption layer is equipped with the effect layer, the effect layer is through the fixed series connection of carrier layer in encryption layer and watermark layer the place ahead, the effect layer is drawed the module by the watermark, is differentiateed the module and constitutes, the inside on effect layer is equipped with the watermark and draws the module, the output that the module was drawed to the watermark is equipped with differentiates the module, the watermark is drawed the module, is differentiateed the module and all establishes ties with effect layer is fixed.
The inside of carrier layer is equipped with collection module, collection module's output is equipped with the information and hides the module, collection module, information hide the module and all establish ties with the carrier layer is fixed, and fixed series connection has increased the connectivity.
The watermark generation module is arranged in the watermark layer, the output end of the watermark generation module is provided with the embedding module, the watermark generation module and the embedding module are fixedly connected with the watermark layer in series, and the watermark generation module is convenient for forming watermarks.
The encryption layer is fixedly provided with an encryption module inside, and the encryption module is convenient to encrypt.
The modules are fixedly connected in series, and the fixed series connection facilitates the interactive use of the system.
The control terminal establishes and realizes the binding of the environmental security of the virtual cloud with the watermark information based on a runtime trust chain mechanism and an isolation protection mechanism of a trusted cloud executable program list, ensures that a model structure diagram hides a cloud theoretical model with invisible data and hides multi-bit information through a modulation technology or a multi-path transmission technology, and plays a role in protection in bidirectional authentication attack.
Carrier layer, watermark layer, the layer of encrypting that connects gradually and verify the layer, the carrier layer includes collection module and information hiding module, collection module with the information transfer of gathering extremely watermark layer to hide partial information through information hiding module. The carrier layer is the basis of the whole watermark system and comprises watermark media carriers, such as PDF (portable document format) and other documents, which are collected by a collection module; the information hiding module has an information hiding mechanism, and then the security control of the digital text watermarking system is realized and researched. Proposition logic formalization establishes decentralized security control watermark information Print, and aiming at a cloud model watermark protection system WGuarder, distributed watermark security control protection and program language level watermark stream security control are realized. WGuarder applications are sought to embed watermarking and watermark stream security control into applications.
The problems of capacity control of digital text watermarks in a watermark layer and an encryption layer in a model structure diagram, coding safety of watermark information and the like are solved in the layer. The watermark generating module generates a watermark after receiving the information transmitted by the acquisition module and carries out data embedding on the carrier layer through the embedding module.
The task of the watermark layer is to generate a watermark and embed data in the carrier layer, which is a key level of the watermark technology. The watermark generation device comprises an encryption module, wherein the encryption module is connected with the watermark generation module. The encryption layer is used for encrypting the information of the watermark layer so as to resist unauthorized detection, embedding and other attacks, and mainly comprises an encryption and decryption algorithm, a secret key and other contents. The verification layer comprises a watermark extraction module and a discrimination module, the watermark extraction module is connected with the encryption module, the discrimination module is connected with the watermark extraction module, and then the digital text watermark safety control performance analysis research is carried out.
The method for the security control performance analysis adopts N digital watermark texts with different quantities, the watermarks are embedded and extracted aiming at each group of texts, the text content is recovered, the security control performance is matched by adopting independent watermark text analysis and linear discriminant analysis, the small sample watermark is complex and time-consuming in precision adjustment, and the method under the cloud model with good security performance is realized. The model structure diagram validation layer plays an important role in controlling the security of a digital text watermarking system under a cloud theory model. The watermark extraction module is connected with the encryption module, and the identification module is connected with the watermark extraction module. The main function of the verification layer is to directly serve users and provide verification and security control for the carrier, watermark information, authorship and other contents.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Of course, the above description is not limited to the above examples, and technical features that are not described in this application may be implemented by or using the prior art, and are not described herein again; the above embodiments and drawings are only for illustrating the technical solutions of the present application and not for limiting the present application, and the present application is only described in detail with reference to the preferred embodiments instead, it should be understood by those skilled in the art that changes, modifications, additions or substitutions within the spirit and scope of the present application may be made by those skilled in the art without departing from the spirit of the present application, and the scope of the claims of the present application should also be covered.
Claims (10)
1. A digital text protection device comprises a casing and is characterized in that the front end of the top of the casing is fixedly connected with an RIFD identification panel, the top of the casing and the front end of the RIFD identification panel are hinged with a cover plate through hinges, the top and the bottom of the surface of the cover plate are both provided with a sliding chute, the inner cavity of the sliding chute is connected with a scanner in a sliding manner, the left side of the scanner is fixedly connected with a supporting block, the top and the bottom of the surface of the supporting block are both fixedly connected with a camera, the left side of the rear end of the top of the casing is fixedly connected with a display screen, the right side of the rear end of the top of the casing is provided with a function key, the bottom of the inner cavity of the casing is fixedly connected with a main board, and the top;
the output of RIFD discernment panel and the one-way electric connection of input of treater, the one-way electric connection of output and the input of treater of scanner, the one-way electric connection of output and the input of treater of camera, the one-way electric connection of output and the input of display screen of treater, the one-way electric connection of output and the input of information memory of treater, the two-way electric connection of treater and transmission module, the one-way electric connection of input and the input of function button of treater.
2. The digital text protection device of claim 1, wherein an L ED fill light is fixedly connected between the cameras, and an input end of the L ED fill light is electrically connected with an output end of the processor in a unidirectional manner.
3. The digital text protection device according to claim 1, wherein a data transmission interface is fixedly connected to the left side of the main board, the data transmission interface is electrically connected to the processor in a bidirectional manner, and the data transmission interface is a USB connection port, an HDMI connection port or a network cable connection port.
4. The digital text protection device according to claim 1, wherein the information storage comprises a multi-level buffer and a solid-state storage, the multi-level buffer is a distributed multi-level buffer, and is provided with three levels of three-level buffer areas, and the multi-level buffer is connected with the solid-state storage through a data connection line.
5. The digital text protection device according to claim 1, wherein a fingerprint recognition module is disposed on the right side of the top of the display screen, and an output end of the fingerprint recognition module is electrically connected with an input end of the processor in a unidirectional manner.
6. A digital text protection device control method for controlling the digital text protection device of any one of claims 1 to 5, the method comprising:
collecting text information through an RIFD identification panel, a scanner, a camera and a data transmission interface;
the collected information is processed in an informationization way through a processor;
acquiring the watermark encryption degree updated in real time from the cloud end through a transmission module and processing the watermark encryption degree;
and after the processing is finished, storing the processed data into an information memory, and transferring and replacing the processed data through a data transmission interface.
7. A control terminal for realizing the digital text watermark bidirectional security control of the digital text protection device of any one of claims 1 to 5, characterized in that the terminal comprises a carrier layer, the output end of the carrier layer is provided with a watermark layer, the output end of the watermark layer is provided with an encryption layer, the output end of the encryption layer is provided with a validation layer, and the validation layer is in communication connection with the carrier layer in front of the watermark layer through the encryption layer;
the check layer is extracted the module, is differentiateed the module by the watermark and constitutes, the check layer includes that the watermark extracts the module, the output that the watermark extracted the module is equipped with the module of differentiateing, the watermark extracts the module, differentiates the module and all with check layer communication connection.
8. The control terminal according to claim 7, wherein the carrier layer comprises an acquisition module, an information hiding module is arranged at an output end of the acquisition module, and the acquisition module and the information hiding module are both in communication connection with the carrier layer.
9. The control terminal according to claim 7, wherein the watermark layer comprises a watermark generation module, an output end of the watermark generation module is provided with an embedding module, and the watermark generation module and the embedding module are both connected with the watermark layer in a communication manner.
10. The control terminal in accordance with claim 7, wherein the encryption layer comprises an encryption module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010127335.5A CN111431861A (en) | 2020-02-28 | 2020-02-28 | Digital text protection device, control method and control terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010127335.5A CN111431861A (en) | 2020-02-28 | 2020-02-28 | Digital text protection device, control method and control terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111431861A true CN111431861A (en) | 2020-07-17 |
Family
ID=71547336
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010127335.5A Pending CN111431861A (en) | 2020-02-28 | 2020-02-28 | Digital text protection device, control method and control terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111431861A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105787307A (en) * | 2016-03-04 | 2016-07-20 | 长沙师范学院 | Digital watermark algorithm hierarchical model system based on texts |
CN206322239U (en) * | 2017-01-04 | 2017-07-11 | 广西科技师范学院 | A kind of medical image digital watermarking device |
CN208241741U (en) * | 2018-06-22 | 2018-12-14 | 刘泽宇 | A kind of portable computer photo scanning device |
-
2020
- 2020-02-28 CN CN202010127335.5A patent/CN111431861A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105787307A (en) * | 2016-03-04 | 2016-07-20 | 长沙师范学院 | Digital watermark algorithm hierarchical model system based on texts |
CN206322239U (en) * | 2017-01-04 | 2017-07-11 | 广西科技师范学院 | A kind of medical image digital watermarking device |
CN208241741U (en) * | 2018-06-22 | 2018-12-14 | 刘泽宇 | A kind of portable computer photo scanning device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhu et al. | Secure neural network watermarking protocol against forging attack | |
US20160055552A1 (en) | Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same | |
WO2015090170A1 (en) | Digital watermarking data processing module, chip and smart digital watermarking mobile phone | |
WO2005064524A1 (en) | Digital seal system | |
Kaur et al. | An existential review on text watermarking techniques | |
CN109785222A (en) | A method of the information for webpage is quickly embedded in and extracts | |
Lax et al. | Digital document signing: Vulnerabilities and solutions | |
CN109151157A (en) | A kind of multimedia digital watermark evidence obtaining mobile phone | |
CN201056906Y (en) | Fingerprint cabinet lock | |
Mukherjee et al. | An image steganography technique based on fake DNA sequence construction | |
CN101989324A (en) | Information security system based on computer and mobile storage device | |
CN101561853B (en) | Image copyright certification management system based on digital watermark technique | |
Yang et al. | Multimedia security and privacy protection in the internet of things: research developments and challenges | |
Das et al. | Digital forensic enabled image authentication using least significant bit (lsb) with tamper localization based hash function | |
CN111431861A (en) | Digital text protection device, control method and control terminal | |
CN202677327U (en) | Handwritten terminal for encrypting signatures | |
CN114357524B (en) | Electronic document processing method and device | |
Cheddad | Steganoflage: a new image steganography algorithm | |
Elbegbayan | Winnowing, a document fingerprinting algorithm | |
Patel et al. | Digital image watermarking mechanism for image authentication, image forgery and self recovery | |
Khadam et al. | Data aggregation and privacy preserving using computational intelligence | |
Malik et al. | ECDSA approach for reliable data sharing and document verification using two level QR code | |
CN105787307B (en) | A kind of text based digital watermarking algorithm hierarchical mode system | |
Wang et al. | Internet of vehicles based on TrustZone and optimized RSA | |
CN115134473B (en) | Image encryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20200717 |