CN112579993A - Watermark shading-based source tracing and evidence obtaining system and method for resisting screen shooting attack - Google Patents
Watermark shading-based source tracing and evidence obtaining system and method for resisting screen shooting attack Download PDFInfo
- Publication number
- CN112579993A CN112579993A CN202011530115.3A CN202011530115A CN112579993A CN 112579993 A CN112579993 A CN 112579993A CN 202011530115 A CN202011530115 A CN 202011530115A CN 112579993 A CN112579993 A CN 112579993A
- Authority
- CN
- China
- Prior art keywords
- watermark
- image
- shading
- screen
- tracing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000004927 fusion Effects 0.000 claims abstract description 19
- 238000000354 decomposition reaction Methods 0.000 claims description 11
- 238000004364 calculation method Methods 0.000 claims description 7
- 230000000877 morphologic effect Effects 0.000 claims description 7
- 230000007797 corrosion Effects 0.000 claims description 5
- 238000005260 corrosion Methods 0.000 claims description 5
- 230000000007 visual effect Effects 0.000 abstract description 5
- 238000006243 chemical reaction Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 238000005267 amalgamation Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a source tracing and evidence obtaining system and method for resisting screen shot attack based on watermark shading. The invention comprises a fusion module of screen shot resistant watermark shading and screen display content and a source tracing and evidence obtaining module of screen shot images. The method comprises the following specific steps: step 1: obtaining traceability information, and performing effective two-dimensional coding to obtain a two-dimensional code image; step 2: constructing a tracing watermark shading image; and step 3: effectively fusing the watermark shading image and the screen display content; and 4, step 4: shooting the effective fused screen, acquiring the image after screen shooting, and tracing to the source to obtain evidence. The method can effectively prevent the disclosure of sensitive information in a unit in a screen shooting or screen capturing mode, and can realize the tracing of the disclosure source. The invention effectively fuses the tracing information and the screen display content in the form of watermark shading. High concealment and low visual interference. The watermark shading method has robustness, and even if only a part of the screen is intercepted, the tracing information can still be decoded.
Description
Technical Field
The invention relates to a source tracing and evidence obtaining system and method for resisting screen shot attack based on watermark shading.
Background
With the wide use of smart phones, stealing of sensitive information in units by means of screen shooting, video recording and the like through the smart phones has gradually become a main way for leakage of current important information, and how to prevent leakage of confidential sensitive information through screen shooting, video recording and the like is one of the problems which need to be solved urgently in confidential work. The traditional scheme adopts a visible screen watermark technology, but the watermark is clearly visible and is easy to remove through professional software, so that the source tracing and evidence obtaining functions are lost. According to the invention, the related tracing information is edited into the watermark shading, the watermark shading can effectively resist screen shooting attack and cannot be directly decoded by naked eyes, so that a simple, convenient and efficient copyright protection and tracing evidence obtaining scheme is provided for a user.
Disclosure of Invention
The invention aims to provide a traceable evidence obtaining system and a traceable evidence obtaining method for resisting screen shot attack based on watermark shading aiming at the defects of the prior art.
A source tracing and evidence obtaining system for resisting screen shooting attack based on watermark shading comprises a fusion module for resisting screen shooting watermark shading and screen display content and a source tracing and evidence obtaining module for screen shooting images.
The screen shot resisting watermark shading and screen display content fusion module is used for acquiring related traceability information of computer equipment, editing the traceability information by using a two-dimensional code and then acquiring traceability two-dimensional code information; and then, encoding the tracing two-dimensional code information into a watermark shading image which cannot be directly decoded by naked eyes through 2 watermark seeds. And finally, effectively fusing the watermark shading image and the content displayed on the screen through a fusion algorithm.
And the tracing and evidence obtaining module of the screen shot image is used for carrying out perspective correction on the screen shot image and then carrying out convolution operation based on the watermark seeds on the corrected image. And performing image morphological calculation to obtain a traceable two-dimensional code image for information decoding.
A source tracing and evidence obtaining method for resisting screen shot attack based on watermark shading specifically comprises the following steps:
step 1: obtaining traceability information, and performing effective two-dimensional coding, specifically:
step 1.1, obtaining computer tracing information used by a user for logging in, wherein the computer tracing information comprises an IP address, a user name, login time, an MAC address and the like.
Step 1.2, performing two-dimensional code editing with high fault tolerance rate of 30% on the tracing information to obtain a two-dimensional code image;
step 2: constructing a tracing watermark shading image, specifically:
step 2.1 constructs 2 symmetric watermark seed images using 2D sine functions z (x, y) ═ sin2 pi (a x + b y) and z (x, y) ═ sin2 pi (a x-b y).
And 2.2, acquiring the black and white block size of the tracing two-dimensional code image, and then converting the two-dimensional code image into a string of binary information sequences according to lines, wherein the black block is '1' and the white block is '0'.
For example: the binary sequence of the black-white block conversion of the two-dimensional code of black-white-black-white is '101010'.
And 2.3, according to the binary information sequence, encoding the two-dimensional code image by using the watermark seed image to obtain a watermark shading unit image which cannot be directly decoded by naked eyes.
The specific coding is realized as follows: and respectively corresponding the two symmetrical watermark seed images to '1' and '0' in the binary information sequence to form a watermark shading unit image. Such as: "1" corresponds to the left sine function image and "0" corresponds to the right sine function image.
And step 3: the effective fusion of the watermark shading image and the screen display content is realized as follows:
and 3.1, acquiring the size of the screen display content needing to be subjected to source tracing protection.
And 3.2, tiling the watermark shading units according to the size of the screen display content to obtain a watermark shading image.
And 3.3, effectively fusing the watermark shading image and the screen display content by adopting a fusion algorithm based on ALPHA pixels, specifically:
MixPixel=ALPHA*FrontPixel+(1-ALPHA)*BackPixel
wherein: ALPHA ∈ [0,1 ]; MixPixel represents the pixel color after ALPHA fusion; FrontPixel denotes foreground pixels; BackPixel represents a background pixel.
And 4, step 4: shoot effectual screen that fuses, acquire the image after the screen is shot and go on tracing to the source and collecting evidence, specifically:
step 4.1: and extracting a screen area image from the shot image.
Step 4.2: and carrying out perspective correction on the extracted screen area image.
Step 4.3: and performing convolution operation based on the watermark seed image on the screen area image after perspective correction to extract the watermark shading image.
Step 4.4: and performing an image morphology-based region decomposition algorithm on the watermark shading image to obtain a decodable traceable information two-dimensional code image.
The specific decomposition is as follows:
performing morphological calculation based on linear corrosion on the image after perspective correction; then carrying out 'opening' operation, 'expansion' and 'closing' operation; and finally, carrying out quadtree decomposition operation to obtain a decodable two-dimensional code image.
The invention has the following beneficial effects:
(1) the method can effectively prevent the leakage of sensitive information in a unit in a screen shooting or screen capturing mode, and can realize the tracing of the leakage source.
(2) The invention effectively fuses the tracing information and the screen display content in the form of watermark shading. Compared with the common plain water mark, the water mark has strong concealment and small visual interference.
(3) The watermark shading method has robustness. Even if only a portion of the screen is cut, the traceback information can still be decoded.
(4) The watermark shading has scrambling characteristics, and is difficult to forge and tamper.
(5) The invention has wide applicability and can stably run under various operating systems.
The method designs a source tracing and evidence obtaining technology for resisting screen shot attack based on the watermark shading, and edits related source tracing information two-dimensional codes into a watermark shading image by using watermark seed images, and effectively fuses the watermark shading with screen display contents. The two-dimensional code of tracing to the source is effectively encrypted and encoded through the watermark seed based on the strategy of the watermark shading, and human eyes can not directly identify and decode, so that the method has better concealment. Although the shading has certain visual visibility, the shading is in a shading form and is better fused with the content of the screen display, and the shading does not have a visual obtrusive feeling. Meanwhile, the shading image containing the tracing information can still effectively exist after various digital/analog, analog/digital conversion attacks, molar attacks and a large amount of random noise attacks caused by screen shooting attacks by depending on the visual visibility of the shading to a certain degree, so that the scheme is a simple, convenient and efficient copyright protection and tracing evidence obtaining scheme.
Drawings
Fig. 1 is a 2-up main module of the present invention.
FIG. 2 is a process of fusing a screen shot resistant watermark shading with screen display content according to the present invention;
FIG. 3 is a diagram illustrating obtaining a watermark shading unit image according to a tracing two-dimensional code according to the present invention;
FIG. 4 is a diagram of the content of the screen display that requires traceability protection according to the present invention;
FIG. 5 is the screen display information of the anti-screen shot attack after fusion in the present invention.
Fig. 6 is a tracing and evidence-obtaining process of screen shot images in the present invention.
FIG. 7 is a perspective view of the truncated detection region corrected in accordance with the present invention.
Fig. 8 is image information obtained by performing convolution operation on a screen image in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention is further illustrated with reference to the figures and examples.
As shown in fig. 1, a source tracing and evidence obtaining system for resisting screen shot attack based on watermark shading comprises a fusion module of the watermark shading for resisting screen shot and screen display content and a source tracing and evidence obtaining module of screen shot images.
The screen shot resisting watermark shading and screen display content fusion module is used for acquiring related traceability information of computer equipment, editing the traceability information by using a two-dimensional code and then acquiring traceability two-dimensional code information; and then, encoding the tracing two-dimensional code information into a watermark shading image which cannot be directly decoded by naked eyes through 2 watermark seeds. And finally, effectively fusing the watermark shading image and the content displayed on the screen through a fusion algorithm.
And the tracing and evidence obtaining module of the screen shot image is used for carrying out perspective correction on the screen shot image and then carrying out convolution operation based on the watermark seeds on the corrected image. And performing image morphological calculation to obtain a traceable two-dimensional code image for information decoding.
As shown in fig. 2, a source tracing and evidence obtaining method for resisting screen shot attack based on watermark shading specifically includes the following steps:
step 1: obtaining traceability information, and performing effective two-dimensional coding, specifically:
step 1.1, obtaining computer tracing information used by a user for logging in, wherein the computer tracing information comprises an IP address, a user name, login time, an MAC address and the like.
Step 1.2, performing two-dimensional code editing with high fault tolerance rate of 30% on the tracing information to obtain a two-dimensional code image;
step 2: constructing a tracing watermark shading image, specifically:
step 2.1 constructs 2 symmetric watermark seed images using 2D sine functions z (x, y) ═ sin2 pi (a x + b y) and z (x, y) ═ sin2 pi (a x-b y).
And 2.2, acquiring the black and white block size of the tracing two-dimensional code image, and then converting the two-dimensional code image into a string of binary information sequences according to lines, wherein the black block is '1' and the white block is '0'.
For example: the binary sequence of the black-white block conversion of the two-dimensional code of black-white-black-white is '101010'.
And 2.3, according to the binary information sequence, encoding the two-dimensional code image by using the watermark seed image to obtain a watermark shading unit image which cannot be directly decoded by naked eyes.
The specific coding is realized as follows: and respectively corresponding the two symmetrical watermark seed images to '1' and '0' in the binary information sequence to form a watermark shading unit image. Such as: "1" corresponds to the left sine function image and "0" corresponds to the right sine function image.
And step 3: performing effective fusion of the watermark shading unit and the screen display content, as shown in fig. 3 specifically:
step 3.1, as shown in fig. 4, the size of the screen display content S to be subjected to source tracing protection and the size W of the watermark shading unit are obtained.
And 3.2, tiling the watermark shading units according to the size of the screen display content to obtain a watermark shading image.
And 3.3, effectively fusing the watermark shading image and the screen display content by adopting a fusion algorithm based on the ALPHA pixel to obtain screen shot attack resisting screen display information. Specifically, the method comprises the following steps:
MixPixel=ALPHA*FrontPixel+(1-ALPHA)*BackPixel
wherein: ALPHA ∈ [0,1 ]; MixPixel represents the pixel color after ALPHA fusion; FrontPixel denotes foreground pixels; BackPixel represents a background pixel.
The present example is ALPHA ═ 0.23, frontpexel ═ I, backspixe ═ S, and mixpexel ═ WI. I.e., WI ═ 0.23 × I + (1-0.23) × S, the effect is shown in fig. 5.
And 4, step 4: shoot effectual amalgamation screen, obtain the image after the screen is shot and go on tracing to the source and collecting evidence, specifically as shown in fig. 6:
step 4.1: and extracting a screen area image from the shot image.
Step 4.2: the extracted screen region image is subjected to perspective correction as shown in fig. 7.
Step 4.3: the convolution operation based on the watermark seed image is performed on the screen area image after the perspective correction, and the watermark shading image is extracted, as shown in fig. 8.
Step 4.4: and performing an image morphology-based region decomposition algorithm on the watermark shading image to obtain a decodable traceable information two-dimensional code image.
Performing a linear corrosion-based quadtree region decomposition algorithm on the convolved image to obtain a decodable traceable information two-dimensional code image
The specific decomposition is as follows:
performing morphological calculation based on linear corrosion on the image after perspective correction; then carrying out 'opening' operation, 'expansion' and 'closing' operation; and finally, carrying out quadtree decomposition operation to obtain a decodable two-dimensional code image.
4.4.1, performing morphological calculation of linear corrosion;
step 4.4.2, carrying out 'on' operation;
step 4.4.3, performing expansion operation;
step 4.4.4, performing 'closing' operation;
and 4.4.5, carrying out quadtree decomposition operation to obtain a decodable two-dimensional code image.
Claims (8)
1. A traceable evidence obtaining system for resisting screen shot attack based on watermark shading is characterized by comprising a fusion module of the watermark shading for resisting screen shot and screen display contents and a traceable evidence obtaining module of a screen shot image;
the screen shot resisting watermark shading and screen display content fusion module is used for acquiring related traceability information of computer equipment, editing the traceability information by using a two-dimensional code and then acquiring traceability two-dimensional code information; then, encoding the tracing two-dimensional code information into a watermark shading image which cannot be directly decoded by naked eyes through 2 watermark seeds; finally, effectively fusing the watermark shading image and the content displayed on the screen through a fusion algorithm;
the tracing and evidence obtaining module of the screen shot image is used for carrying out perspective correction on the screen shot image and then carrying out convolution operation based on the watermark seeds on the corrected image; and performing image morphological calculation to obtain a traceable two-dimensional code image for information decoding.
2. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading as claimed in claim 1 is characterized by comprising the following steps:
step 1: obtaining traceability information, performing effective two-dimensional coding, and obtaining a two-dimensional code image;
step 2: constructing a tracing watermark shading image;
and step 3: effectively fusing the watermark shading image and the screen display content;
and 4, step 4: shooting the effective fused screen, acquiring the image after screen shooting, and tracing to the source to obtain evidence.
3. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading as claimed in claim 2, is characterized in that the step 1 is implemented as follows:
step 1.1, obtaining computer traceability information used by a user for logging in, wherein the computer traceability information comprises an IP address, a user name, login time and an MAC address;
and 1.2, editing the two-dimensional code with high fault tolerance rate of 30% on the tracing information to obtain a two-dimensional code image.
4. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading according to claim 2 or 3, is characterized in that the step 2 is implemented as follows:
step 2.1 constructs 2 symmetric watermark seed images using 2D sine functions z (x, y) ═ sin2 pi (a x + b y) and z (x, y) ═ sin2 pi (a x-b y);
step 2.2, obtaining black and white block sizes of the tracing two-dimensional code image, and then converting the two-dimensional code image into a string of binary information sequences according to lines, wherein the black block is '1', and the white block is '0';
and 2.3, according to the binary information sequence, encoding the two-dimensional code image by using the watermark seed image to obtain a watermark shading unit image which cannot be directly decoded by naked eyes.
5. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading as claimed in claim 4, wherein the step 2.3 is implemented by specifically encoding as follows: respectively corresponding the two symmetrical watermark seed images to '1' and '0' in the binary information sequence to form a watermark shading unit image; "1" corresponds to the left sine function image and "0" corresponds to the right sine function image.
6. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading according to claim 5, is characterized in that the step 3 is implemented as follows:
step 3.1, acquiring the size of the screen display content needing to be subjected to source tracing protection;
step 3.2, according to the size of the screen display content, tiling the watermark shading units to obtain watermark shading images;
and 3.3, effectively fusing the watermark shading image and the screen display content by adopting a fusion algorithm based on ALPHA pixels, specifically:
MixPixel=ALPHA*FrontPixel+(1-ALPHA)*BackPixel
wherein: ALPHA ∈ [0,1 ]; MixPixel represents the pixel color after ALPHA fusion; FrontPixel denotes foreground pixels; BackPixel represents a background pixel.
7. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading according to claim 6, is characterized in that the step 4 is implemented as follows:
step 4.1: extracting a screen area image from the screen shot image;
step 4.2: carrying out perspective correction on the extracted screen area image;
step 4.3: performing convolution operation based on the watermark seed image on the screen area image after perspective correction to extract a watermark shading image;
step 4.4: and performing an image morphology-based region decomposition algorithm on the watermark shading image to obtain a decodable traceable information two-dimensional code image.
8. The method for implementing the source tracing and forensics system for resisting the screen shot attack based on the watermark shading as claimed in claim 7, is characterized in that the specific decomposition is as follows:
4.4.1, performing morphological calculation of linear corrosion;
step 4.4.2, carrying out 'on' operation;
step 4.4.3, performing expansion operation;
step 4.4.4, performing 'closing' operation;
and 4.4.5, carrying out quadtree decomposition operation to obtain a decodable two-dimensional code image.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011530115.3A CN112579993B (en) | 2020-12-22 | 2020-12-22 | Anti-screen-shot-attack tracing evidence obtaining system and method based on watermark shading |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011530115.3A CN112579993B (en) | 2020-12-22 | 2020-12-22 | Anti-screen-shot-attack tracing evidence obtaining system and method based on watermark shading |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112579993A true CN112579993A (en) | 2021-03-30 |
CN112579993B CN112579993B (en) | 2023-05-23 |
Family
ID=75138883
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011530115.3A Active CN112579993B (en) | 2020-12-22 | 2020-12-22 | Anti-screen-shot-attack tracing evidence obtaining system and method based on watermark shading |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112579993B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113837917A (en) * | 2021-09-26 | 2021-12-24 | 合肥高维数据技术有限公司 | Cross-media invisible watermark checking method and system based on AR technology |
CN115358911A (en) * | 2022-10-20 | 2022-11-18 | 北京万里红科技有限公司 | Screen watermark generation method, device, equipment and computer readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108449527A (en) * | 2018-03-28 | 2018-08-24 | 南京吉印信息科技有限公司 | A kind of digital watermark method and system for taking the photograph attack for the anti-screen of remote sensing images |
CN108830776A (en) * | 2018-07-31 | 2018-11-16 | 浙江财经大学 | The visible entity watermark copyright anti-counterfeiting mark method of three-dimensional towards 3D printing model |
CN109064376A (en) * | 2018-07-24 | 2018-12-21 | 南京师范大学 | The anti-screen of DFT area image based on Harris-Laplace and SIFT description takes the photograph watermarking algorithm |
KR20190026262A (en) * | 2017-09-04 | 2019-03-13 | 한국후지필름 주식회사 | Photography service system inserting watermark and the method thereof |
CN109727180A (en) * | 2019-01-03 | 2019-05-07 | 成都宇飞信息工程有限责任公司 | A kind of screen message leakage traceability system and retroactive method |
CN110796582A (en) * | 2019-09-26 | 2020-02-14 | 北京大学 | Reversible plain watermark method and device based on vector graphic compression |
-
2020
- 2020-12-22 CN CN202011530115.3A patent/CN112579993B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190026262A (en) * | 2017-09-04 | 2019-03-13 | 한국후지필름 주식회사 | Photography service system inserting watermark and the method thereof |
CN108449527A (en) * | 2018-03-28 | 2018-08-24 | 南京吉印信息科技有限公司 | A kind of digital watermark method and system for taking the photograph attack for the anti-screen of remote sensing images |
CN109064376A (en) * | 2018-07-24 | 2018-12-21 | 南京师范大学 | The anti-screen of DFT area image based on Harris-Laplace and SIFT description takes the photograph watermarking algorithm |
CN108830776A (en) * | 2018-07-31 | 2018-11-16 | 浙江财经大学 | The visible entity watermark copyright anti-counterfeiting mark method of three-dimensional towards 3D printing model |
CN109727180A (en) * | 2019-01-03 | 2019-05-07 | 成都宇飞信息工程有限责任公司 | A kind of screen message leakage traceability system and retroactive method |
CN110796582A (en) * | 2019-09-26 | 2020-02-14 | 北京大学 | Reversible plain watermark method and device based on vector graphic compression |
Non-Patent Citations (3)
Title |
---|
冯小青等: "3D打印模型版权保护技术研究进展", 《中国图象图形学报》 * |
王晓媛等: "屏幕防窃拍方法综述", 《计算机科学》 * |
王颖;郑雪峰;刘海燕;: "基于图像的数字水印攻击技术的研究", 计算机应用研究 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113837917A (en) * | 2021-09-26 | 2021-12-24 | 合肥高维数据技术有限公司 | Cross-media invisible watermark checking method and system based on AR technology |
CN115358911A (en) * | 2022-10-20 | 2022-11-18 | 北京万里红科技有限公司 | Screen watermark generation method, device, equipment and computer readable storage medium |
CN115358911B (en) * | 2022-10-20 | 2023-01-31 | 北京万里红科技有限公司 | Screen watermark generation method, device, equipment and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112579993B (en) | 2023-05-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7853040B2 (en) | Covert and robust mark for media identification | |
Lancini et al. | A robust video watermarking technique in the spatial domain | |
Queluz | Authentication of digital images and video: Generic models and a new contribution | |
CN105741224B (en) | The reversible water mark algorithm divided based on PVO and adaptive block | |
CN112579993A (en) | Watermark shading-based source tracing and evidence obtaining system and method for resisting screen shooting attack | |
CN107688731A (en) | A kind of digital watermarking algorithm based on text document protection | |
Liu et al. | A robust DWT-based blind data hiding algorithm | |
CN109886856A (en) | To the digital watermark method of screen shot process robust | |
Thakur et al. | Hiding secret image in video | |
CN112351275A (en) | Feature area privacy protection method and device based on original image | |
CN109474830B (en) | Embedding and extracting method of digital video steel seal | |
KR101200345B1 (en) | Block-bases image authentication method using reversible watermarking based on progressive differential histogram | |
Zeng et al. | Extraction of multiresolution watermark images for resolving rightful ownership | |
CN114549270A (en) | Anti-shooting monitoring video watermarking method combining depth robust watermarking and template synchronization | |
Vaish et al. | A systematic review on various reversible data hiding techniques in digital images | |
VijayKumar et al. | Histogram shifting based reversible data hiding with controlled contrast enhancement | |
CN111612683A (en) | Data processing method and system | |
Lin et al. | Hierarchical fragile watermarking scheme for image authentication | |
CN110648271A (en) | Method for embedding digital watermark in halftone image by using special dots | |
KR101482146B1 (en) | System and method for providing watermarking image with position information | |
JP2003179746A (en) | Method for inserting binary messages in digital image | |
Lee et al. | Temporal feature modulation for video watermarking | |
Yang et al. | An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas | |
Hong et al. | A private/public key watermarking technique robust to spatial scaling | |
Monzoy-Villuendas et al. | Fragile watermarking for color image authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |