CN112800396B - Page watermark generation method, device, equipment, storage medium and program product - Google Patents
Page watermark generation method, device, equipment, storage medium and program product Download PDFInfo
- Publication number
- CN112800396B CN112800396B CN202110172297.XA CN202110172297A CN112800396B CN 112800396 B CN112800396 B CN 112800396B CN 202110172297 A CN202110172297 A CN 202110172297A CN 112800396 B CN112800396 B CN 112800396B
- Authority
- CN
- China
- Prior art keywords
- information
- watermark pattern
- page
- watermark
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 239000004973 liquid crystal related substance Substances 0.000 claims description 5
- 230000000694 effects Effects 0.000 abstract description 11
- 238000004590 computer program Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 230000008859 change Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 6
- 238000009877 rendering Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000027455 binding Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000002354 daily effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008380 pattern binding Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0062—Embedding of the watermark in text images, e.g. watermarking text documents using letter skew, letter distance or row distance
Abstract
The disclosure discloses a page watermark generation method, a device, equipment, a storage medium and a program product, which relate to the technical field of cloud computing and further relate to the technical field of platform application. The specific implementation scheme is as follows: obtaining a watermark pattern; and adding the watermark pattern in a page, wherein the target information of the watermark pattern in the page is dynamically changed. The method and the device can improve the page protection effect of the watermark pattern.
Description
Technical Field
The disclosure relates to the technical field of cloud computing, and further relates to the technical field of platform application.
Background
Watermarking is a currently popular information security management technique, for example: evidence of malicious forgery by others can be prevented by watermarking, or information leakage and the like can be prevented. At present, watermarking mainly directly covers watermark patterns on a page so as to generate watermarks on the page.
Disclosure of Invention
The present disclosure provides a page watermark generation method, apparatus, device, storage medium, and program product.
According to an aspect of the present disclosure, there is provided a page watermark generation method, including:
obtaining a watermark pattern;
and adding the watermark pattern in a page, wherein the target information of the watermark pattern in the page is dynamically changed.
According to another aspect of the present disclosure, there is provided a page watermark generation apparatus, including:
the acquisition module acquires the watermark pattern;
a first adding module, configured to add the watermark pattern to a page, where target information of the watermark pattern in the page changes dynamically
According to another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the page watermark generation method provided by the present disclosure.
According to another aspect of the present disclosure, there is provided a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the page watermark generation method provided by the present disclosure.
According to another aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the page watermark generation method provided by the present disclosure.
In the method, the watermark pattern is added in the page, and the target information of the watermark pattern in the page is dynamically changed, so that the protection effect of the watermark pattern on the page can be improved.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the disclosure, nor is it intended to be used to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following specification.
Drawings
The drawings are for a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
fig. 1 is a flowchart of a page watermark generation method provided in the present disclosure;
FIG. 2 is a flow chart of another page watermark generation method provided by the present disclosure;
FIG. 3 is an exemplary schematic diagram of page watermark generation provided by the present disclosure;
FIG. 4 is another exemplary schematic diagram of page watermark generation provided by the present disclosure;
fig. 5 is a block diagram of a page watermark generating apparatus provided in the present disclosure;
fig. 6 is a block diagram of another page watermark generation apparatus provided by the present disclosure;
fig. 7 is a block diagram of another page watermark generation apparatus provided by the present disclosure;
fig. 8 is a block diagram of an electronic device for implementing a resume matching method of an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present disclosure to facilitate understanding, and should be considered as merely exemplary. Accordingly, one of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Referring to fig. 1, fig. 1 is a flowchart of a page watermark generation method provided in the present disclosure, as shown in fig. 1, including the following steps:
step S101, obtaining a watermark pattern.
The watermark pattern may be preconfigured or generated based on a watermark template.
Step S102, adding the watermark pattern in a page, wherein the target information of the watermark pattern in the page is dynamically changed.
The page may be a chat window page of chat software, or the page may be a page of office software, or the page may be a web page, or the like. For example: the page may be an h5 page.
The adding of the watermark pattern to the page may be adding a background image to the page, the background image including one or more of the watermark patterns.
The target information may be hidden or displayable information carried by the watermark pattern, or the target information may be position information or layer information of the watermark pattern in the page.
In the method, the watermark pattern can be added into the page through the steps, and the target information of the watermark pattern in the page is dynamically changed, so that the protection effect of the watermark pattern on the page can be improved.
It should be noted that, the above page watermark generation method may be executed by an electronic device, for example: is executed by electronic equipment such as a server, a computer, a mobile phone and the like.
Referring to fig. 2, fig. 2 is a flowchart of another page watermark generation method provided in the present disclosure, as shown in fig. 2, including the following steps:
step 201, watermark template information is obtained, wherein the watermark template information comprises: layer information and layer relationship information.
The watermark template information may be obtained from a database. The layer information may include coordinate information of each layer, width and height of the layer, and image of the layer. The layer relation information may be layer relation information between layers. A set of reusable templates can be formed through the layer information and the layer relation information, and customization requirements of different enterprises can be met.
Furthermore, the watermark template information can be provided by a corresponding enterprise, so that the watermark can be customized and generated for the enterprise to meet the customization requirement of the enterprise. For example: the method can provide a visual interface for enterprises, the corresponding enterprises can freely drag the provided patterns on the interface, and the blank text boxes can be used for representing the dynamically changed text information, so that the dynamically changed information and the statically unchanged patterns can be obtained to form the watermark template information together. Further, the water stamp template information in the present disclosure may be stored to the database in json format.
Step S202, generating watermark patterns according to the layer information and the layer relation information.
The generating the watermark pattern according to the layer information and the layer relation information may be drawing according to the layer information and the layer relation information, so as to obtain the watermark pattern. For example: drawing the layer information and the layer relation information by using a drawing tool (such as headlesschrome+canvas) to obtain the watermark pattern.
Further, the watermark template information provided in the present disclosure may include dynamically populated fields that may be used to generate different watermark patterns from different accounts, such as: a business includes a plurality of accounts, so that different watermark patterns can be generated for different accounts, for example, the watermark image includes corresponding account information, and the account information can include information such as names or data of the accounts. In addition, this information is always displayed in the watermark pattern, i.e. the plaintext information of the watermark. The watermark pattern may also include date information.
In the method, the watermark pattern is generated according to the layer information and the layer relation information, so that the customization of the watermark image can be realized.
Step S203, adding the watermark pattern in a page, wherein the target information of the watermark pattern in the page changes dynamically.
As an alternative embodiment, the target information includes at least one of:
encrypting information;
the position of the document object model (Document Object Model, DOM) tree at the page.
The encryption information may be a cryptographic stamp encrypted by an online encryption algorithm, for example: and (5) using the encrypted password stamp of md 5.
In the embodiment, the encryption information of the watermark pattern in the page can be dynamically changed, so that the protection effect of the watermark image can be further improved.
Optionally, the encryption information includes: encrypting the dynamically changed hash (hash) value and the account information to obtain encryption information.
The dynamically changing hash value may be a periodically changing hash value, for example: hash value dynamically changed daily. The dynamic change may be a dynamic change of the encrypted information by a server, for example: the server dynamically updates the hash value strings corresponding to the watermark patterns every day.
The account information may be account information corresponding to the page.
In this embodiment, since the encryption information includes encryption information for encrypting the dynamically changing hash value and account information, the anti-counterfeit function of the watermark pattern can be further improved. For example: if target content suspected to be counterfeit (for example, a screenshot record of the counterfeit content) appears later, whether the target content is the encrypted information of the time corresponding to the counterfeit content or not can be judged through the encrypted information corresponding to the target content, so as to determine whether the target content is counterfeit or not. Because the above-mentioned secret information is dynamically changed, the counterfeiter does not know the dynamically changed hash value corresponding to each time. For example: in the case that the watermark pattern includes date information, the hash value corresponding to the date can be determined directly according to the date on the watermark pattern on the target content suspected to be counterfeit, and then the encrypted information obtained by encrypting the date hash value and the account information is compared with the watermark pattern bottom password stamp of the target content, so that whether the target content is counterfeit can be accurately determined.
The position of the DOM tree in the page can be that the watermark pattern is added in the page by adopting a dynamic DOM rendering mode when the watermark pattern is added, and the position of the watermark pattern in the DOM tree is dynamically changed. For example: binding the background image comprising the watermark pattern to div with dynamically changed position on the DOM tree of the page, wherein div is a page element in the page.
In this embodiment, since the position of the watermark pattern in the DOM tree of the page is dynamically changed, the position of the watermark pattern in the DOM tree cannot be tracked, and thus the watermark pattern cannot be deleted, so as to further improve the protection effect and tracking effect of the watermark image on the page.
Optionally, before the watermark pattern is added to the page, the method further includes:
and adding the encryption information into the watermark pattern, wherein the encryption information is in a hidden state in the watermark pattern.
The encryption information may be added to the bottom or bottom layer of the watermark pattern when the watermark pattern is in a hidden state.
In this embodiment, the above encryption information may be added to the watermark pattern before the watermark pattern is added to the page, and since the encryption information is in a hidden state in the watermark pattern, the protection effect of the watermark pattern on the page is further improved.
In this embodiment, after the watermark pattern is added to the page, the encryption information in the watermark pattern in the page may be dynamically updated.
The present disclosure is not limited to adding encryption information in the watermark pattern before adding the watermark pattern in the page, for example: it is also possible to add dynamically changing encryption information to the watermark pattern after adding the watermark pattern to the page.
Optionally, the encryption information of the watermark pattern at the first time includes: encrypting the first hash value and the account information to obtain encryption information;
the encryption information of the watermark pattern at a second time includes: encrypting the second hash value and the account information to obtain encryption information;
wherein the first hash value is associated with the first time and the second hash value is associated with the second time.
The first time and the second time may be two adjacent time intervals, for example: two adjacent days, two adjacent hours, two adjacent weeks, etc.
The association of the first hash value with the first time may be a hash value determined for the first time, such as a hash value determined for the first time in advance or temporarily. Further, in some embodiments, the first hash value may be randomly generated for the first time, or may be a hash value having a predetermined relationship with the first time, such as a hash value having a predetermined functional relationship with the first time, generated according to the first time.
The second hash value is a hash value that is different from the first hash value and that is associated with the second time. The second hash value may be a hash value determined in advance or temporarily for the second time. Further, in some embodiments, the second hash value may be randomly generated for the second time, or may be a hash value that has a predetermined relationship with the second time, such as a hash value that has a predetermined functional relationship with the second time, according to the second time.
Further, the first hash value and the second hash value may be two different hash values selected from a pre-configured set of hash values.
In this embodiment, since the first hash value is associated with the first time and the second hash value is associated with the second time, it is possible to dynamically change the encryption information of the watermark pattern according to time, thereby further improving the protection effect of the watermark pattern.
It should be noted that, the first time and the second time may represent any two different times in practical applications. In addition, the present disclosure is not limited to, and the target information is changed according to time, for example: the target information can be dynamically changed according to the geographic position of the electronic equipment applying the page, so that the protection effect of the watermark pattern can be further improved.
Optionally, the adding the watermark pattern in the page includes:
the watermark pattern is added to a DOM tree of the page, and the position of the watermark pattern in a target level of the DOM tree dynamically changes.
For example: the adding of the watermark pattern to the DOM tree of the page may be by rendering the DOM. For example: binding the background image comprising the watermark pattern on div with dynamically changing position on the DOM tree of the page. The div may be a div of a next-level rendering of a body layer of the page, the div being an element of watermark pattern binding, the div insertion location being random. The body layer is the main body of the page.
The target level may be a predefined level, which is not limited in particular, for example: different levels may be defined according to actual requirements. The dynamic change of the position of the watermark pattern in the target level of the DOM tree may be to destroy the watermark pattern at regular time, and then reconstruct the watermark pattern at other positions of the target level of the DOM tree, so as to ensure the untraceability of the watermark pattern, so that the developer cannot trace the position of the watermark pattern in the DOM tree in the debugger, and thus cannot delete the watermark pattern.
In the embodiment, the position of the watermark pattern in the target level of the DOM tree is dynamically changed, so that the protection effect of the watermark pattern on the page is improved.
Optionally, at a third time the watermark pattern is at a first position in the target level of the DOM tree;
a second position of the watermark pattern in the target level of the DOM tree at a fourth time;
wherein the first location is associated with the third time and the second location is associated with the fourth time.
The third time and the fourth time may be two adjacent time intervals, for example: two adjacent days, two adjacent hours, two adjacent weeks, or the like, and the third time may be the same time as the first time or the second time, and the fourth time may be the same time as the second time or the first time. That is, the positions of the above-described cryptographic information and watermark patterns on the DOM tree may vary simultaneously, and in some embodiments may also vary at different times.
The association of the first position with the third time may be a position in the DOM tree determined for the third time, such as a position in the DOM tree determined in advance or temporarily for the third time. Further, in some embodiments, the first location may be determined randomly for the third time, or may be a location that has a preset relationship with the third time, such as a location that has a preset functional relationship with the third time, generated according to the third time.
The second position is a position different from the first position and associated with the fourth time. The second position may be a position in the DOM tree determined in advance or temporarily for the fourth time. Further, in some embodiments, the second position may be determined randomly for the fourth time, or may be a position having a predetermined relationship with the fourth time, such as a position having a predetermined functional relationship with the fourth time, generated according to the fourth time.
Further, the first position and the second position value may be two different positions selected from a preconfigured set of positions.
In this embodiment, since the first position is associated with the third time and the second position is associated with the fourth time, it is possible to achieve that the position of the watermark pattern on the DOM tree is dynamically changed according to time, thereby further improving the protection effect of the watermark pattern.
It should be noted that, in the present disclosure, the dynamic change of the position of the watermark pattern in the target level of the DOM tree is not limited, for example: in some application scenarios, the watermark pattern may also be dynamically changed between different levels of the DOM tree.
The page watermark generation method provided by the present disclosure is illustrated by two alternative embodiments:
as an alternative embodiment, as shown in fig. 3, the method comprises the following steps:
step S301, generating a first layer according to a watermark base map;
step S302, judging whether the dynamic change information needs to be added;
step S303, under the condition that dynamic change information needs to be added, a dynamic text is newly built to generate a second layer;
step S304, the hash (hash) value generated randomly by the second layer binding is used as the key value of the layer.
Step S305, pattern arrangement is carried out on the generated layers.
Wherein, in the case of generating the second layer, the second layer is patterned according to the key value.
Step S306, judging whether to generate encryption information.
In step S307, when it is determined that the encryption information is generated, the encryption information is created.
And the arrangement of the encryption information may be performed in step S305 described above. The encrypted information is displayed hidden in the watermark template.
Step S308, generating a watermark pattern.
As an alternative embodiment, as shown in fig. 4, the watermark generation process involves a template layer, a generation layer and a rendering layer, and specifically includes the following steps:
step S401, watermark template information is obtained from a template library.
And step S402, drawing watermark patterns according to the watermark template information.
Step S403, judging whether the watermark pattern is successfully generated.
Step S404, the current watermark pattern is cached in a database.
Step S405, generating a DOM tree with watermark image position dynamically changed.
Step S406, page rendering is performed to generate a page with the watermark pattern added.
It should be noted that the various implementations provided in this embodiment may be applied to the embodiment shown in fig. 1.
Referring to fig. 5, fig. 5 is a page watermark generating apparatus provided in the present disclosure, and as shown in fig. 5, a page watermark generating apparatus 500 includes:
an acquisition module 501, which acquires a watermark pattern;
a first adding module 502, configured to add the watermark pattern to a page, where target information of the watermark pattern in the page changes dynamically.
Optionally, the target information includes at least one of:
encrypting information;
the position of the document object model DOM tree at the page.
Optionally, as shown in fig. 6, the apparatus further includes:
a second adding module 503, configured to add the encrypted information to the watermark pattern, where the encrypted information is in a hidden state in the watermark pattern.
Optionally, the encryption information of the watermark pattern at the first time includes: encrypting the first hash value and the account information to obtain encryption information;
the encryption information of the watermark pattern at a second time includes: encrypting the second hash value and the account information to obtain encryption information;
wherein the first hash value is associated with the first time and the second hash value is associated with the second time.
Optionally, the encryption information includes: encrypting the dynamically changed hash (hash) value and the account information to obtain encryption information.
Optionally, the first adding module is configured to add the watermark pattern to a DOM tree of the page, and a position of the watermark pattern in a target level of the DOM tree dynamically changes.
Optionally, at a third time, a first position of the watermark pattern in a target level of the DOM tree;
a second position of the watermark pattern in the target hierarchy of the DOM tree at a fourth time;
wherein the first location is associated with the third time and the second location is associated with the fourth time.
Optionally, as shown in fig. 7, the obtaining module 501 includes:
an obtaining unit 5011, configured to obtain watermark template information, where the watermark template information includes: layer information and layer relationship information;
a generating unit 5012, configured to generate a watermark pattern according to the layer information and the layer relationship information.
According to embodiments of the present disclosure, the present disclosure also provides an electronic device, a readable storage medium and a computer program product.
Fig. 8 illustrates a schematic block diagram of an example electronic device 800 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 8, the apparatus 800 includes a computing unit 801 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 802 or a computer program loaded from a storage unit 808 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data required for the operation of the device 800 can also be stored. The computing unit 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to the bus 804.
Various components in device 800 are connected to I/O interface 805, including: an input unit 806 such as a keyboard, mouse, etc.; an output unit 807 such as various types of displays, speakers, and the like; a storage unit 808, such as a magnetic disk, optical disk, etc.; and a communication unit 809, such as a network card, modem, wireless communication transceiver, or the like. The communication unit 809 allows the device 800 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The computing unit 801 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 801 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, etc. The computing unit 801 performs the respective methods and processes described above, for example, a page watermark generation method. For example, in some embodiments, the page watermark generation method may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as the storage unit 808. In some embodiments, part or all of the computer program may be loaded and/or installed onto device 800 via ROM 802 and/or communication unit 809. When a computer program is loaded into RAM 803 and executed by computing unit 801, one or more steps of the page watermark generation method described above may be performed. Alternatively, in other embodiments, the computing unit 801 may be configured to perform the page watermark generation method in any other suitable way (e.g. by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps recited in the present disclosure may be performed in parallel or sequentially or in a different order, provided that the desired results of the technical solutions of the present disclosure are achieved, and are not limited herein.
The above detailed description should not be taken as limiting the scope of the present disclosure. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present disclosure are intended to be included within the scope of the present disclosure.
Claims (12)
1. A method of generating a page watermark, comprising:
obtaining a watermark pattern;
adding the watermark pattern in a page, wherein target information of the watermark pattern in the page changes dynamically; the target information includes at least one of: encrypting information; the position of a Document Object Model (DOM) tree of the page;
the encryption information includes: encrypting the hash value and account information which are dynamically changed to obtain encryption information;
wherein the adding the watermark pattern in the page comprises:
the watermark pattern is added to a DOM tree of the page, and the position of the watermark pattern in a target level of the DOM tree dynamically changes.
2. The method of claim 1, the method further comprising, prior to adding the watermark pattern in a page:
and adding the encryption information into the watermark pattern, wherein the encryption information is in a hidden state in the watermark pattern.
3. The method of claim 1, wherein the encrypted information of the watermark pattern at a first time comprises: encrypting the first hash value and the account information to obtain encryption information;
the encryption information of the watermark pattern at a second time includes: encrypting the second hash value and the account information to obtain encryption information;
wherein the first hash value is associated with the first time and the second hash value is associated with the second time.
4. The method of claim 1, wherein at a third time the watermark pattern is at a first position in the target level of the DOM tree;
a second position of the watermark pattern in the target level of the DOM tree at a fourth time;
wherein the first location is associated with the third time and the second location is associated with the fourth time.
5. The method of claim 1, wherein the obtaining a watermark pattern comprises:
obtaining watermark template information, wherein the watermark template information comprises: layer information and layer relationship information;
and generating a watermark pattern according to the layer information and the layer relation information.
6. A page watermark generation apparatus comprising:
the acquisition module acquires the watermark pattern;
the first adding module is used for adding the watermark pattern in a page, wherein the target information of the watermark pattern in the page is dynamically changed; the target information includes at least one of: encrypting information; the position of a Document Object Model (DOM) tree of the page;
the encryption information includes: encrypting the hash value and account information which are dynamically changed to obtain encryption information;
the first adding module is used for adding the watermark pattern to the DOM tree of the page, and the position of the watermark pattern in the target level of the DOM tree is dynamically changed.
7. The apparatus of claim 6, the apparatus further comprising:
and the second adding module is used for adding the encryption information into the watermark pattern, wherein the encryption information is in a hidden state in the watermark pattern.
8. The apparatus of claim 6, wherein the encryption information of the watermark pattern at a first time comprises: encrypting the first hash value and the account information to obtain encryption information;
the encryption information of the watermark pattern at a second time includes: encrypting the second hash value and the account information to obtain encryption information;
wherein the first hash value is associated with the first time and the second hash value is associated with the second time.
9. The apparatus of claim 6, wherein at a third time the watermark pattern is at a first position in the target level of the DOM tree;
a second position of the watermark pattern in the target level of the DOM tree at a fourth time;
wherein the first location is associated with the third time and the second location is associated with the fourth time.
10. The apparatus of claim 6, wherein the acquisition module comprises:
the acquisition unit is used for acquiring watermark template information, and the watermark template information comprises: layer information and layer relationship information;
and the generating unit is used for generating the watermark pattern according to the layer information and the layer relation information.
11. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-5.
12. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110172297.XA CN112800396B (en) | 2021-02-08 | 2021-02-08 | Page watermark generation method, device, equipment, storage medium and program product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110172297.XA CN112800396B (en) | 2021-02-08 | 2021-02-08 | Page watermark generation method, device, equipment, storage medium and program product |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112800396A CN112800396A (en) | 2021-05-14 |
CN112800396B true CN112800396B (en) | 2023-10-27 |
Family
ID=75814915
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110172297.XA Active CN112800396B (en) | 2021-02-08 | 2021-02-08 | Page watermark generation method, device, equipment, storage medium and program product |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112800396B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101894238A (en) * | 2010-08-09 | 2010-11-24 | 中国人民解放军海军工程大学 | Double authentication-based word document electronic seal system and method |
KR101303961B1 (en) * | 2013-03-27 | 2013-09-05 | 주식회사 시큐에프엔 | Method for providing digital signature on the basis of biometrics and method for verifying the digitally signed electronic document, and terminal, server, and computer-readable recording medium using the same |
CN105117900A (en) * | 2015-09-30 | 2015-12-02 | 北京恒华伟业科技股份有限公司 | Progress information acquisition method and device, and terminal equipment |
CN107508685A (en) * | 2017-10-13 | 2017-12-22 | 吉林工程技术师范学院 | The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment |
WO2019037623A1 (en) * | 2017-08-22 | 2019-02-28 | 阿里巴巴集团控股有限公司 | Data processing method and device |
CN110032839A (en) * | 2019-04-04 | 2019-07-19 | 深圳大通实业股份有限公司 | The digital media content infringement detection system of high security digital watermarking |
CN110245469A (en) * | 2019-06-24 | 2019-09-17 | 苏州睿威博科技有限公司 | Watermark generation method, watermark analytic method, device and the storage medium of webpage |
-
2021
- 2021-02-08 CN CN202110172297.XA patent/CN112800396B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101894238A (en) * | 2010-08-09 | 2010-11-24 | 中国人民解放军海军工程大学 | Double authentication-based word document electronic seal system and method |
KR101303961B1 (en) * | 2013-03-27 | 2013-09-05 | 주식회사 시큐에프엔 | Method for providing digital signature on the basis of biometrics and method for verifying the digitally signed electronic document, and terminal, server, and computer-readable recording medium using the same |
CN105117900A (en) * | 2015-09-30 | 2015-12-02 | 北京恒华伟业科技股份有限公司 | Progress information acquisition method and device, and terminal equipment |
WO2019037623A1 (en) * | 2017-08-22 | 2019-02-28 | 阿里巴巴集团控股有限公司 | Data processing method and device |
CN107508685A (en) * | 2017-10-13 | 2017-12-22 | 吉林工程技术师范学院 | The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment |
CN110032839A (en) * | 2019-04-04 | 2019-07-19 | 深圳大通实业股份有限公司 | The digital media content infringement detection system of high security digital watermarking |
CN110245469A (en) * | 2019-06-24 | 2019-09-17 | 苏州睿威博科技有限公司 | Watermark generation method, watermark analytic method, device and the storage medium of webpage |
Non-Patent Citations (2)
Title |
---|
基于多态性时间戳水印的网络取证研究;温何雨;尹毅峰;樊鲲鹏;刘扬;;计算机与网络(第06期);全文 * |
基于局部变化性的网页篡改识别模型及方法;魏文晗;邓一贵;;计算机应用(第02期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112800396A (en) | 2021-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109474662B (en) | Product data publishing method and device, computer equipment and storage medium | |
CN111327607B (en) | Security threat information management method, system, storage medium and terminal based on big data | |
CN105654355A (en) | Invoice generation method and equipment | |
CN112508200B (en) | Method, apparatus, device, medium, and program for processing machine learning model file | |
CN109447599A (en) | Digital asset distributing method and system based on block chain | |
CN110706093A (en) | Accounting processing method and device | |
CN115686499A (en) | Method, device, storage medium and electronic equipment for generating request message | |
CN108733374A (en) | Application program homepage development approach and terminal device | |
CN112800396B (en) | Page watermark generation method, device, equipment, storage medium and program product | |
NO20023653D0 (en) | Method, system and computer program for producing a description of an unregulated network and an encapsulated geometric description in a computer graphics system | |
CN113239256A (en) | Method for generating website signature and method and device for identifying website | |
CN112541240A (en) | Part drawing method, computer device and storage medium | |
JP2010096787A (en) | Secret information dispersion device, secret information dispersion program, secret information dispersion method, secret information restoration device, secret information restoration program, secret information restoration method, and secret information dispersion/restoration system | |
CN115659935A (en) | File generation method and device, storage medium and electronic equipment | |
US20190158697A1 (en) | Enhancing graph visualization with supplemental data | |
CN115442164A (en) | Multi-user log encryption and decryption method, device, equipment and storage medium | |
CN115471582A (en) | Map generation method and device, computer equipment and storage medium | |
CN115563942A (en) | Contract generation method and device, electronic equipment and computer readable medium | |
CN114398678A (en) | Registration verification method and device for preventing electronic file from being tampered, electronic equipment and medium | |
CN113569289A (en) | Data desensitization method and device | |
CN113761576A (en) | Privacy protection method and device, storage medium and electronic equipment | |
CN113268949A (en) | Form display method and device based on dynamic field, computer equipment and medium | |
CN111444535A (en) | Method, apparatus, and computer storage medium for generating aggregated data tags | |
CN116089363B (en) | Data processing method, device, electronic equipment and storage medium | |
CN113590219B (en) | Data processing method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |