CN112579993A - Watermark shading-based source tracing and evidence obtaining system and method for resisting screen shooting attack - Google Patents

Watermark shading-based source tracing and evidence obtaining system and method for resisting screen shooting attack Download PDF

Info

Publication number
CN112579993A
CN112579993A CN202011530115.3A CN202011530115A CN112579993A CN 112579993 A CN112579993 A CN 112579993A CN 202011530115 A CN202011530115 A CN 202011530115A CN 112579993 A CN112579993 A CN 112579993A
Authority
CN
China
Prior art keywords
watermark
image
shading
screen
tracing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011530115.3A
Other languages
Chinese (zh)
Other versions
CN112579993B (en
Inventor
冯小青
宋海裕
王继林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Finance and Economics
Original Assignee
Zhejiang University of Finance and Economics
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Finance and Economics filed Critical Zhejiang University of Finance and Economics
Priority to CN202011530115.3A priority Critical patent/CN112579993B/en
Publication of CN112579993A publication Critical patent/CN112579993A/en
Application granted granted Critical
Publication of CN112579993B publication Critical patent/CN112579993B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a source tracing and evidence obtaining system and method for resisting screen shot attack based on watermark shading. The invention comprises a fusion module of screen shot resistant watermark shading and screen display content and a source tracing and evidence obtaining module of screen shot images. The method comprises the following specific steps: step 1: obtaining traceability information, and performing effective two-dimensional coding to obtain a two-dimensional code image; step 2: constructing a tracing watermark shading image; and step 3: effectively fusing the watermark shading image and the screen display content; and 4, step 4: shooting the effective fused screen, acquiring the image after screen shooting, and tracing to the source to obtain evidence. The method can effectively prevent the disclosure of sensitive information in a unit in a screen shooting or screen capturing mode, and can realize the tracing of the disclosure source. The invention effectively fuses the tracing information and the screen display content in the form of watermark shading. High concealment and low visual interference. The watermark shading method has robustness, and even if only a part of the screen is intercepted, the tracing information can still be decoded.

Description

Watermark shading-based source tracing and evidence obtaining system and method for resisting screen shooting attack
Technical Field
The invention relates to a source tracing and evidence obtaining system and method for resisting screen shot attack based on watermark shading.
Background
With the wide use of smart phones, stealing of sensitive information in units by means of screen shooting, video recording and the like through the smart phones has gradually become a main way for leakage of current important information, and how to prevent leakage of confidential sensitive information through screen shooting, video recording and the like is one of the problems which need to be solved urgently in confidential work. The traditional scheme adopts a visible screen watermark technology, but the watermark is clearly visible and is easy to remove through professional software, so that the source tracing and evidence obtaining functions are lost. According to the invention, the related tracing information is edited into the watermark shading, the watermark shading can effectively resist screen shooting attack and cannot be directly decoded by naked eyes, so that a simple, convenient and efficient copyright protection and tracing evidence obtaining scheme is provided for a user.
Disclosure of Invention
The invention aims to provide a traceable evidence obtaining system and a traceable evidence obtaining method for resisting screen shot attack based on watermark shading aiming at the defects of the prior art.
A source tracing and evidence obtaining system for resisting screen shooting attack based on watermark shading comprises a fusion module for resisting screen shooting watermark shading and screen display content and a source tracing and evidence obtaining module for screen shooting images.
The screen shot resisting watermark shading and screen display content fusion module is used for acquiring related traceability information of computer equipment, editing the traceability information by using a two-dimensional code and then acquiring traceability two-dimensional code information; and then, encoding the tracing two-dimensional code information into a watermark shading image which cannot be directly decoded by naked eyes through 2 watermark seeds. And finally, effectively fusing the watermark shading image and the content displayed on the screen through a fusion algorithm.
And the tracing and evidence obtaining module of the screen shot image is used for carrying out perspective correction on the screen shot image and then carrying out convolution operation based on the watermark seeds on the corrected image. And performing image morphological calculation to obtain a traceable two-dimensional code image for information decoding.
A source tracing and evidence obtaining method for resisting screen shot attack based on watermark shading specifically comprises the following steps:
step 1: obtaining traceability information, and performing effective two-dimensional coding, specifically:
step 1.1, obtaining computer tracing information used by a user for logging in, wherein the computer tracing information comprises an IP address, a user name, login time, an MAC address and the like.
Step 1.2, performing two-dimensional code editing with high fault tolerance rate of 30% on the tracing information to obtain a two-dimensional code image;
step 2: constructing a tracing watermark shading image, specifically:
step 2.1 constructs 2 symmetric watermark seed images using 2D sine functions z (x, y) ═ sin2 pi (a x + b y) and z (x, y) ═ sin2 pi (a x-b y).
And 2.2, acquiring the black and white block size of the tracing two-dimensional code image, and then converting the two-dimensional code image into a string of binary information sequences according to lines, wherein the black block is '1' and the white block is '0'.
For example: the binary sequence of the black-white block conversion of the two-dimensional code of black-white-black-white is '101010'.
And 2.3, according to the binary information sequence, encoding the two-dimensional code image by using the watermark seed image to obtain a watermark shading unit image which cannot be directly decoded by naked eyes.
The specific coding is realized as follows: and respectively corresponding the two symmetrical watermark seed images to '1' and '0' in the binary information sequence to form a watermark shading unit image. Such as: "1" corresponds to the left sine function image and "0" corresponds to the right sine function image.
And step 3: the effective fusion of the watermark shading image and the screen display content is realized as follows:
and 3.1, acquiring the size of the screen display content needing to be subjected to source tracing protection.
And 3.2, tiling the watermark shading units according to the size of the screen display content to obtain a watermark shading image.
And 3.3, effectively fusing the watermark shading image and the screen display content by adopting a fusion algorithm based on ALPHA pixels, specifically:
MixPixel=ALPHA*FrontPixel+(1-ALPHA)*BackPixel
wherein: ALPHA ∈ [0,1 ]; MixPixel represents the pixel color after ALPHA fusion; FrontPixel denotes foreground pixels; BackPixel represents a background pixel.
And 4, step 4: shoot effectual screen that fuses, acquire the image after the screen is shot and go on tracing to the source and collecting evidence, specifically:
step 4.1: and extracting a screen area image from the shot image.
Step 4.2: and carrying out perspective correction on the extracted screen area image.
Step 4.3: and performing convolution operation based on the watermark seed image on the screen area image after perspective correction to extract the watermark shading image.
Step 4.4: and performing an image morphology-based region decomposition algorithm on the watermark shading image to obtain a decodable traceable information two-dimensional code image.
The specific decomposition is as follows:
performing morphological calculation based on linear corrosion on the image after perspective correction; then carrying out 'opening' operation, 'expansion' and 'closing' operation; and finally, carrying out quadtree decomposition operation to obtain a decodable two-dimensional code image.
The invention has the following beneficial effects:
(1) the method can effectively prevent the leakage of sensitive information in a unit in a screen shooting or screen capturing mode, and can realize the tracing of the leakage source.
(2) The invention effectively fuses the tracing information and the screen display content in the form of watermark shading. Compared with the common plain water mark, the water mark has strong concealment and small visual interference.
(3) The watermark shading method has robustness. Even if only a portion of the screen is cut, the traceback information can still be decoded.
(4) The watermark shading has scrambling characteristics, and is difficult to forge and tamper.
(5) The invention has wide applicability and can stably run under various operating systems.
The method designs a source tracing and evidence obtaining technology for resisting screen shot attack based on the watermark shading, and edits related source tracing information two-dimensional codes into a watermark shading image by using watermark seed images, and effectively fuses the watermark shading with screen display contents. The two-dimensional code of tracing to the source is effectively encrypted and encoded through the watermark seed based on the strategy of the watermark shading, and human eyes can not directly identify and decode, so that the method has better concealment. Although the shading has certain visual visibility, the shading is in a shading form and is better fused with the content of the screen display, and the shading does not have a visual obtrusive feeling. Meanwhile, the shading image containing the tracing information can still effectively exist after various digital/analog, analog/digital conversion attacks, molar attacks and a large amount of random noise attacks caused by screen shooting attacks by depending on the visual visibility of the shading to a certain degree, so that the scheme is a simple, convenient and efficient copyright protection and tracing evidence obtaining scheme.
Drawings
Fig. 1 is a 2-up main module of the present invention.
FIG. 2 is a process of fusing a screen shot resistant watermark shading with screen display content according to the present invention;
FIG. 3 is a diagram illustrating obtaining a watermark shading unit image according to a tracing two-dimensional code according to the present invention;
FIG. 4 is a diagram of the content of the screen display that requires traceability protection according to the present invention;
FIG. 5 is the screen display information of the anti-screen shot attack after fusion in the present invention.
Fig. 6 is a tracing and evidence-obtaining process of screen shot images in the present invention.
FIG. 7 is a perspective view of the truncated detection region corrected in accordance with the present invention.
Fig. 8 is image information obtained by performing convolution operation on a screen image in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention is further illustrated with reference to the figures and examples.
As shown in fig. 1, a source tracing and evidence obtaining system for resisting screen shot attack based on watermark shading comprises a fusion module of the watermark shading for resisting screen shot and screen display content and a source tracing and evidence obtaining module of screen shot images.
The screen shot resisting watermark shading and screen display content fusion module is used for acquiring related traceability information of computer equipment, editing the traceability information by using a two-dimensional code and then acquiring traceability two-dimensional code information; and then, encoding the tracing two-dimensional code information into a watermark shading image which cannot be directly decoded by naked eyes through 2 watermark seeds. And finally, effectively fusing the watermark shading image and the content displayed on the screen through a fusion algorithm.
And the tracing and evidence obtaining module of the screen shot image is used for carrying out perspective correction on the screen shot image and then carrying out convolution operation based on the watermark seeds on the corrected image. And performing image morphological calculation to obtain a traceable two-dimensional code image for information decoding.
As shown in fig. 2, a source tracing and evidence obtaining method for resisting screen shot attack based on watermark shading specifically includes the following steps:
step 1: obtaining traceability information, and performing effective two-dimensional coding, specifically:
step 1.1, obtaining computer tracing information used by a user for logging in, wherein the computer tracing information comprises an IP address, a user name, login time, an MAC address and the like.
Step 1.2, performing two-dimensional code editing with high fault tolerance rate of 30% on the tracing information to obtain a two-dimensional code image;
step 2: constructing a tracing watermark shading image, specifically:
step 2.1 constructs 2 symmetric watermark seed images using 2D sine functions z (x, y) ═ sin2 pi (a x + b y) and z (x, y) ═ sin2 pi (a x-b y).
And 2.2, acquiring the black and white block size of the tracing two-dimensional code image, and then converting the two-dimensional code image into a string of binary information sequences according to lines, wherein the black block is '1' and the white block is '0'.
For example: the binary sequence of the black-white block conversion of the two-dimensional code of black-white-black-white is '101010'.
And 2.3, according to the binary information sequence, encoding the two-dimensional code image by using the watermark seed image to obtain a watermark shading unit image which cannot be directly decoded by naked eyes.
The specific coding is realized as follows: and respectively corresponding the two symmetrical watermark seed images to '1' and '0' in the binary information sequence to form a watermark shading unit image. Such as: "1" corresponds to the left sine function image and "0" corresponds to the right sine function image.
And step 3: performing effective fusion of the watermark shading unit and the screen display content, as shown in fig. 3 specifically:
step 3.1, as shown in fig. 4, the size of the screen display content S to be subjected to source tracing protection and the size W of the watermark shading unit are obtained.
And 3.2, tiling the watermark shading units according to the size of the screen display content to obtain a watermark shading image.
And 3.3, effectively fusing the watermark shading image and the screen display content by adopting a fusion algorithm based on the ALPHA pixel to obtain screen shot attack resisting screen display information. Specifically, the method comprises the following steps:
MixPixel=ALPHA*FrontPixel+(1-ALPHA)*BackPixel
wherein: ALPHA ∈ [0,1 ]; MixPixel represents the pixel color after ALPHA fusion; FrontPixel denotes foreground pixels; BackPixel represents a background pixel.
The present example is ALPHA ═ 0.23, frontpexel ═ I, backspixe ═ S, and mixpexel ═ WI. I.e., WI ═ 0.23 × I + (1-0.23) × S, the effect is shown in fig. 5.
And 4, step 4: shoot effectual amalgamation screen, obtain the image after the screen is shot and go on tracing to the source and collecting evidence, specifically as shown in fig. 6:
step 4.1: and extracting a screen area image from the shot image.
Step 4.2: the extracted screen region image is subjected to perspective correction as shown in fig. 7.
Step 4.3: the convolution operation based on the watermark seed image is performed on the screen area image after the perspective correction, and the watermark shading image is extracted, as shown in fig. 8.
Step 4.4: and performing an image morphology-based region decomposition algorithm on the watermark shading image to obtain a decodable traceable information two-dimensional code image.
Performing a linear corrosion-based quadtree region decomposition algorithm on the convolved image to obtain a decodable traceable information two-dimensional code image
The specific decomposition is as follows:
performing morphological calculation based on linear corrosion on the image after perspective correction; then carrying out 'opening' operation, 'expansion' and 'closing' operation; and finally, carrying out quadtree decomposition operation to obtain a decodable two-dimensional code image.
4.4.1, performing morphological calculation of linear corrosion;
step 4.4.2, carrying out 'on' operation;
step 4.4.3, performing expansion operation;
step 4.4.4, performing 'closing' operation;
and 4.4.5, carrying out quadtree decomposition operation to obtain a decodable two-dimensional code image.

Claims (8)

1. A traceable evidence obtaining system for resisting screen shot attack based on watermark shading is characterized by comprising a fusion module of the watermark shading for resisting screen shot and screen display contents and a traceable evidence obtaining module of a screen shot image;
the screen shot resisting watermark shading and screen display content fusion module is used for acquiring related traceability information of computer equipment, editing the traceability information by using a two-dimensional code and then acquiring traceability two-dimensional code information; then, encoding the tracing two-dimensional code information into a watermark shading image which cannot be directly decoded by naked eyes through 2 watermark seeds; finally, effectively fusing the watermark shading image and the content displayed on the screen through a fusion algorithm;
the tracing and evidence obtaining module of the screen shot image is used for carrying out perspective correction on the screen shot image and then carrying out convolution operation based on the watermark seeds on the corrected image; and performing image morphological calculation to obtain a traceable two-dimensional code image for information decoding.
2. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading as claimed in claim 1 is characterized by comprising the following steps:
step 1: obtaining traceability information, performing effective two-dimensional coding, and obtaining a two-dimensional code image;
step 2: constructing a tracing watermark shading image;
and step 3: effectively fusing the watermark shading image and the screen display content;
and 4, step 4: shooting the effective fused screen, acquiring the image after screen shooting, and tracing to the source to obtain evidence.
3. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading as claimed in claim 2, is characterized in that the step 1 is implemented as follows:
step 1.1, obtaining computer traceability information used by a user for logging in, wherein the computer traceability information comprises an IP address, a user name, login time and an MAC address;
and 1.2, editing the two-dimensional code with high fault tolerance rate of 30% on the tracing information to obtain a two-dimensional code image.
4. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading according to claim 2 or 3, is characterized in that the step 2 is implemented as follows:
step 2.1 constructs 2 symmetric watermark seed images using 2D sine functions z (x, y) ═ sin2 pi (a x + b y) and z (x, y) ═ sin2 pi (a x-b y);
step 2.2, obtaining black and white block sizes of the tracing two-dimensional code image, and then converting the two-dimensional code image into a string of binary information sequences according to lines, wherein the black block is '1', and the white block is '0';
and 2.3, according to the binary information sequence, encoding the two-dimensional code image by using the watermark seed image to obtain a watermark shading unit image which cannot be directly decoded by naked eyes.
5. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading as claimed in claim 4, wherein the step 2.3 is implemented by specifically encoding as follows: respectively corresponding the two symmetrical watermark seed images to '1' and '0' in the binary information sequence to form a watermark shading unit image; "1" corresponds to the left sine function image and "0" corresponds to the right sine function image.
6. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading according to claim 5, is characterized in that the step 3 is implemented as follows:
step 3.1, acquiring the size of the screen display content needing to be subjected to source tracing protection;
step 3.2, according to the size of the screen display content, tiling the watermark shading units to obtain watermark shading images;
and 3.3, effectively fusing the watermark shading image and the screen display content by adopting a fusion algorithm based on ALPHA pixels, specifically:
MixPixel=ALPHA*FrontPixel+(1-ALPHA)*BackPixel
wherein: ALPHA ∈ [0,1 ]; MixPixel represents the pixel color after ALPHA fusion; FrontPixel denotes foreground pixels; BackPixel represents a background pixel.
7. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading according to claim 6, is characterized in that the step 4 is implemented as follows:
step 4.1: extracting a screen area image from the screen shot image;
step 4.2: carrying out perspective correction on the extracted screen area image;
step 4.3: performing convolution operation based on the watermark seed image on the screen area image after perspective correction to extract a watermark shading image;
step 4.4: and performing an image morphology-based region decomposition algorithm on the watermark shading image to obtain a decodable traceable information two-dimensional code image.
8. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading as claimed in claim 7, is characterized in that the specific decomposition is as follows:
4.4.1, performing morphological calculation of linear corrosion;
step 4.4.2, carrying out 'on' operation;
step 4.4.3, performing expansion operation;
step 4.4.4, performing 'closing' operation;
and 4.4.5, carrying out quadtree decomposition operation to obtain a decodable two-dimensional code image.
CN202011530115.3A 2020-12-22 2020-12-22 Anti-screen-shot-attack tracing evidence obtaining system and method based on watermark shading Active CN112579993B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011530115.3A CN112579993B (en) 2020-12-22 2020-12-22 Anti-screen-shot-attack tracing evidence obtaining system and method based on watermark shading

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011530115.3A CN112579993B (en) 2020-12-22 2020-12-22 Anti-screen-shot-attack tracing evidence obtaining system and method based on watermark shading

Publications (2)

Publication Number Publication Date
CN112579993A true CN112579993A (en) 2021-03-30
CN112579993B CN112579993B (en) 2023-05-23

Family

ID=75138883

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011530115.3A Active CN112579993B (en) 2020-12-22 2020-12-22 Anti-screen-shot-attack tracing evidence obtaining system and method based on watermark shading

Country Status (1)

Country Link
CN (1) CN112579993B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113837917A (en) * 2021-09-26 2021-12-24 合肥高维数据技术有限公司 Cross-media invisible watermark checking method and system based on AR technology
CN115358911A (en) * 2022-10-20 2022-11-18 北京万里红科技有限公司 Screen watermark generation method, device, equipment and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108449527A (en) * 2018-03-28 2018-08-24 南京吉印信息科技有限公司 A kind of digital watermark method and system for taking the photograph attack for the anti-screen of remote sensing images
CN108830776A (en) * 2018-07-31 2018-11-16 浙江财经大学 The visible entity watermark copyright anti-counterfeiting mark method of three-dimensional towards 3D printing model
CN109064376A (en) * 2018-07-24 2018-12-21 南京师范大学 The anti-screen of DFT area image based on Harris-Laplace and SIFT description takes the photograph watermarking algorithm
KR20190026262A (en) * 2017-09-04 2019-03-13 한국후지필름 주식회사 Photography service system inserting watermark and the method thereof
CN109727180A (en) * 2019-01-03 2019-05-07 成都宇飞信息工程有限责任公司 A kind of screen message leakage traceability system and retroactive method
CN110796582A (en) * 2019-09-26 2020-02-14 北京大学 Reversible plain watermark method and device based on vector graphic compression

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190026262A (en) * 2017-09-04 2019-03-13 한국후지필름 주식회사 Photography service system inserting watermark and the method thereof
CN108449527A (en) * 2018-03-28 2018-08-24 南京吉印信息科技有限公司 A kind of digital watermark method and system for taking the photograph attack for the anti-screen of remote sensing images
CN109064376A (en) * 2018-07-24 2018-12-21 南京师范大学 The anti-screen of DFT area image based on Harris-Laplace and SIFT description takes the photograph watermarking algorithm
CN108830776A (en) * 2018-07-31 2018-11-16 浙江财经大学 The visible entity watermark copyright anti-counterfeiting mark method of three-dimensional towards 3D printing model
CN109727180A (en) * 2019-01-03 2019-05-07 成都宇飞信息工程有限责任公司 A kind of screen message leakage traceability system and retroactive method
CN110796582A (en) * 2019-09-26 2020-02-14 北京大学 Reversible plain watermark method and device based on vector graphic compression

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
冯小青等: "3D打印模型版权保护技术研究进展", 《中国图象图形学报》 *
王晓媛等: "屏幕防窃拍方法综述", 《计算机科学》 *
王颖;郑雪峰;刘海燕;: "基于图像的数字水印攻击技术的研究", 计算机应用研究 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113837917A (en) * 2021-09-26 2021-12-24 合肥高维数据技术有限公司 Cross-media invisible watermark checking method and system based on AR technology
CN115358911A (en) * 2022-10-20 2022-11-18 北京万里红科技有限公司 Screen watermark generation method, device, equipment and computer readable storage medium
CN115358911B (en) * 2022-10-20 2023-01-31 北京万里红科技有限公司 Screen watermark generation method, device, equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN112579993B (en) 2023-05-23

Similar Documents

Publication Publication Date Title
US7853040B2 (en) Covert and robust mark for media identification
Lancini et al. A robust video watermarking technique in the spatial domain
Queluz Authentication of digital images and video: Generic models and a new contribution
CN105741224B (en) The reversible water mark algorithm divided based on PVO and adaptive block
CN112579993A (en) Watermark shading-based source tracing and evidence obtaining system and method for resisting screen shooting attack
CN107688731A (en) A kind of digital watermarking algorithm based on text document protection
Liu et al. A robust DWT-based blind data hiding algorithm
CN109886856A (en) To the digital watermark method of screen shot process robust
Thakur et al. Hiding secret image in video
CN112351275A (en) Feature area privacy protection method and device based on original image
CN109474830B (en) Embedding and extracting method of digital video steel seal
KR101200345B1 (en) Block-bases image authentication method using reversible watermarking based on progressive differential histogram
Zeng et al. Extraction of multiresolution watermark images for resolving rightful ownership
CN114549270A (en) Anti-shooting monitoring video watermarking method combining depth robust watermarking and template synchronization
Vaish et al. A systematic review on various reversible data hiding techniques in digital images
VijayKumar et al. Histogram shifting based reversible data hiding with controlled contrast enhancement
CN111612683A (en) Data processing method and system
Lin et al. Hierarchical fragile watermarking scheme for image authentication
CN110648271A (en) Method for embedding digital watermark in halftone image by using special dots
KR101482146B1 (en) System and method for providing watermarking image with position information
JP2003179746A (en) Method for inserting binary messages in digital image
Lee et al. Temporal feature modulation for video watermarking
Yang et al. An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas
Hong et al. A private/public key watermarking technique robust to spatial scaling
Monzoy-Villuendas et al. Fragile watermarking for color image authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant