CN112927119B - Antitheft information embedding method and use method of TrueType word stock - Google Patents

Antitheft information embedding method and use method of TrueType word stock Download PDF

Info

Publication number
CN112927119B
CN112927119B CN201911242048.2A CN201911242048A CN112927119B CN 112927119 B CN112927119 B CN 112927119B CN 201911242048 A CN201911242048 A CN 201911242048A CN 112927119 B CN112927119 B CN 112927119B
Authority
CN
China
Prior art keywords
information
line control
truetype
word stock
control points
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911242048.2A
Other languages
Chinese (zh)
Other versions
CN112927119A (en
Inventor
全伟伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuji Xerox Industry Development China Co Ltd
Original Assignee
Fuji Xerox Industry Development China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuji Xerox Industry Development China Co Ltd filed Critical Fuji Xerox Industry Development China Co Ltd
Priority to CN201911242048.2A priority Critical patent/CN112927119B/en
Publication of CN112927119A publication Critical patent/CN112927119A/en
Application granted granted Critical
Publication of CN112927119B publication Critical patent/CN112927119B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Abstract

The invention relates to a theft prevention information embedding method of a TrueType word stock, a use method of the TrueType word stock, two kinds of computer equipment and two kinds of computer readable storage media. Each word in the TrueType word stock is composed of a plurality of sections of quadratic bezier curves, and each quadratic bezier curve comprises an out-of-line control point. The antitheft information embedding method of the TrueType word stock comprises the following steps: generating anti-theft information based on authorization information of an authorized user; and sequentially modifying the coordinate values of at least part of the off-line control points in the TrueType word stock based on the binary information stream of the antitheft information, wherein the modified coordinate values of all the off-line control points comprise the antitheft information. The invention can embed the secret watermark into the font content to release the embedded font file which keeps the visual effect, and simultaneously realize the functions of copy and piracy prevention and piracy tracking.

Description

Antitheft information embedding method and use method of TrueType word stock
Technical Field
The invention relates to a copyright protection technology of a TrueType word stock, in particular to an anti-theft information embedding method of the TrueType word stock, a use method of the TrueType word stock, two kinds of computer equipment and two kinds of computer readable storage media.
Background
The TrueType word library is a mathematical glyph description technique for curve outline fonts commonly developed by apple corporation and microsoft corporation. The character library adopts a secondary Bezier curve and a straight line in geometry to describe the outline of the character, and comprises commands such as character form construction, color filling, digital description function, flow condition control, grid processing control, additional prompt control and the like, and can be used for printing and screen display. Because the TrueType word stock describes the fonts by adopting instructions and is irrelevant to the resolution, the fonts can be output according to the target resolution. Because of the continuity of the quadratic function derivative function, the characters of the TrueType word stock are always smooth and no saw-tooth appears no matter whether the characters are enlarged or reduced.
Referring to fig. 1, fig. 1 shows a schematic diagram of a contour curve of TrueType font based on a quadratic bezier curve.
As shown in fig. 1, the glyph outline of a TrueType font may be composed of a string of ordered control points P. The control points may include an inner start point P0 and a tail connection point P2 located on the contour curve, and an outer control point P1 located outside the contour curve. The actual outline curve of TrueType fonts can be determined by these control points P by adjusting the quadratic bezier curve.
The prior word stock copyright protection technology mainly comprises the following steps:
1. the digital watermarking and information hiding technology for the image is mainly proposed for the color image based on the fact that a large amount of redundant data and abundant features exist in the color image. Because binary font library redundancy data is less, common digital watermarking and information hiding technology is not suitable for font libraries.
2. Aiming at the technology of the font library, the secret information, the watermark and other information are embedded mainly by modifying binary pixel values in the point matrix font library. As the operating systems of Microsoft and apple companies are changed to default TrueType font libraries, if the original modification method for pixel values is directly imported into the existing TrueType font library file, the problem that the visual performance is obviously affected, such as font line breakage, will occur.
3. The watermark is embedded for the replacement of fonts in the application document, which changes when the application calls a font library installed to the OS. Thus, it is impossible to prevent the pirate from directly copying the installed font library file for pirating.
4. Since the document watermark is extracted by counting the changed and unchanged font distribution in the document, it is also impossible to prevent the pirate from directly copying the installed font library file for pirating.
Therefore, in order to overcome the above-mentioned drawbacks of the prior art, there is a need in the art for a copyright protection technology of TrueType word library, which is used for embedding a hidden watermark into font content to release an embedded font file that maintains visual effects, and at the same time, implementing copy-and-piracy prevention and piracy tracking functions.
Disclosure of Invention
The following presents a simplified summary of one or more aspects in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later.
In order to overcome the defects in the prior art, the invention provides a theft prevention information embedding method of a TrueType word stock, a use method of the TrueType word stock, two computer devices and two computer readable storage media, which are used for embedding a secret watermark into font contents to release an embedded font file with a visual effect, and simultaneously realize copy prevention and piracy tracking functions.
In the antitheft information embedding method of the TrueType word stock, each word in the TrueType word stock is composed of a plurality of sections of secondary Bezier curves, and each secondary Bezier curve comprises an off-line control point. The antitheft information embedding method of the TrueType word stock provided by the invention comprises the following steps: generating anti-theft information based on authorization information of an authorized user; and sequentially modifying the coordinate values of at least part of the off-line control points in the TrueType word stock based on the binary information stream of the antitheft information, wherein the modified coordinate values of all the off-line control points comprise the antitheft information.
Preferably, in the antitheft information embedding method of the TrueType word stock provided by the present invention, the sequentially modifying the coordinate values of at least part of the off-line control points in the TrueType word stock based on the binary information stream of the antitheft information includes: and sequentially modifying the coordinate value of each of the at least partial off-line control points according to the respective bits in the binary information stream so that the parity of the modified coordinate values indicates the corresponding bits of the binary information stream to complete the embedding of all bits of the binary information.
Preferably, in the antitheft information embedding method of the TrueType word stock provided by the present invention, the sequentially modifying, according to each bit in the binary information, the coordinate value of each of the at least part of the off-line control points so that the parity of the modified coordinate value indicates the corresponding bit of the binary information stream includes: for one bit in the binary information, if the parity of the coordinate value of the off-line control point corresponding to the bit is identical with the parity indicated by the bit, the coordinate value of the off-line control point is kept unchanged, otherwise, the coordinate value of the off-line control point is increased or decreased by 1 coordinate value unit.
Optionally, in the anti-theft information embedding method for a TrueType word stock provided by the present invention, the at least part of out-of-line control points include a plurality of out-of-line control points sequentially stored from a first out-of-line control point according to a length of a binary information stream of the anti-theft information in the TrueType word stock.
Optionally, in the antitheft information embedding method of the TrueType word stock provided by the present invention, the at least part of out-of-line control points include a plurality of out-of-line control points distributed evenly in the TrueType word stock according to a length of a binary information stream of the antitheft information.
Optionally, in the antitheft information embedding method of the TrueType word stock provided by the present invention, the at least part of the off-line control points do not include an off-line control point where a curve is close to a font boundary or an off-line control point where a curve curvature is close to 0.
Optionally, in the antitheft information embedding method of the TrueType word stock provided by the present invention, the generating antitheft information based on the authorization information of the authorized user includes: adding information length information with fixed length to the authorization information to obtain the anti-theft information, wherein the information length information indicates the length of a binary information stream of the anti-theft information. The binary information stream based on the antitheft information sequentially modifies the coordinate values of at least part of the off-line control points in the TrueType word stock, including: modifying the coordinate values of a preset number of off-line control points at fixed positions in the TrueType word stock based on the binary information stream part of the information length information; and modifying the coordinate values of the remaining ones of the at least partial off-line control points based on the remaining portions of the binary information stream.
Preferably, in the antitheft information embedding method of the TrueType word stock provided by the present invention, the generating antitheft information based on the authorization information of the authorized user includes: generating error correction code information based on the authorization information; and adding the error correction code information at the end of the authorization information to obtain the theft prevention information.
Optionally, in the antitheft information embedding method of the TrueType word stock provided by the invention, the authorization information is an authorization serial number generated based on the user information of the authorized user and the machine identification information of the authorized machine.
According to another aspect of the invention, a method for using the TrueType word stock is also provided.
In the usage method of the TrueType word stock provided by the invention, each word in the TrueType word stock is composed of a plurality of sections of secondary Bezier curves, and each secondary Bezier curve comprises an off-line control point. The using method comprises the following steps: extracting a binary information stream of antitheft information based on at least partial coordinate values of the off-line control points in the TrueType word stock, wherein the antitheft information comprises authorization information of an authorized user; the anti-theft information is sent to a verification server to verify whether the current use of the TrueType word stock is legal or not based on authorization information in the anti-theft information; and receiving coordinate correction data of the corresponding authorized user in response to the verification pass so as to restore the coordinate values of at least part of the off-line control points in the TrueType word stock based on the coordinate correction data to obtain an original TrueType word stock.
Preferably, in the method for using a TrueType word stock provided by the present invention, the extracting the binary information stream of the antitheft information includes: corresponding bits in the binary information stream are obtained in order based on parity of the coordinate values of each of the at least partial off-line control points to obtain all bit values of the binary information stream.
Optionally, in the method for using a TrueType word stock provided by the present invention, the at least part of the off-line control points include a plurality of off-line control points sequentially stored from a first off-line control point according to a length of a binary information stream of the anti-theft information in the TrueType word stock.
Optionally, in the method for using a TrueType word stock provided by the present invention, the at least part of out-of-line control points include a plurality of out-of-line control points distributed evenly in the TrueType word stock according to a length of a binary information stream of the anti-theft information.
Optionally, in the method for using a TrueType word stock provided by the present invention, the at least part of the out-of-line control points do not include an out-of-line control point where a curve is close to a font boundary or an out-of-line control point where a curve curvature is close to 0.
Optionally, in the method for using a TrueType word stock provided by the present invention, the anti-theft information further includes information length information with a fixed length located before the authorization information, where the information length information indicates a length of a binary information stream of the anti-theft information. The binary information stream for extracting the antitheft information comprises the following steps: extracting a binary information stream part of the information length information based on coordinate values of a preset number of off-line control points at fixed positions in the TrueType word stock; and extracting a remaining portion of the binary information stream of the antitheft information based on coordinate values of remaining portions of the at least partial off-line control points.
Preferably, in the method for using a TrueType word stock provided by the present invention, the anti-theft information further includes error correction code information located at the end of the authorization information.
Optionally, in the method for using a TrueType word stock provided by the present invention, the authorization information is an authorization serial number generated based on user information of the authorized user and machine identification information of an authorized machine. The method for using the TrueType word stock further comprises the following steps: and transmitting user information of the user currently using the TrueType word stock and machine identification information of the machine to the verification server to execute the authorization information verification.
Optionally, in the method for using a TrueType word stock provided by the present invention, the coordinate correction data includes a modification record of coordinate values of the at least part of the off-line control points. The recovering the coordinate values of the at least part of the out-of-line control points in the TrueType word stock to obtain an original TrueType word stock includes: and correcting the coordinate values of the at least partial out-of-line control points based on the modification record to obtain an original TrueType word stock.
According to another aspect of the present invention, there is also provided a computer device.
The computer device provided by the invention comprises a memory, a processor and computer executable instructions stored on the memory and capable of running on the processor. When the processor executes the computer executable instruction, the steps of any antitheft information embedding method of the TrueType word stock can be realized.
According to another aspect of the present invention, there is also provided a computer device.
The computer device provided by the invention comprises a memory, a processor and computer executable instructions stored on the memory and capable of running on the processor. When the processor executes the computer executable instructions, the steps of the method for using any TrueType word stock can be implemented.
According to another aspect of the present invention, there is also provided herein a computer-readable storage medium.
The present invention provides the above computer-readable storage medium having computer-executable instructions stored thereon. When the computer executable instruction is executed by the processor, the steps of any antitheft information embedding method of the TrueType word stock can be realized.
According to another aspect of the present invention, there is also provided herein a computer-readable storage medium.
The present invention provides the above computer-readable storage medium having computer-executable instructions stored thereon. When the computer executable instructions are executed by the processor, the steps of the method for using any TrueType word stock can be realized.
Drawings
The above features and advantages of the present invention will be better understood after reading the detailed description of embodiments of the present disclosure in conjunction with the following drawings. In the drawings, the components are not necessarily to scale and components having similar related features or characteristics may have the same or similar reference numerals.
Fig. 1 shows a schematic diagram of a section of outline curve of TrueType font based on quadratic bezier curve.
Fig. 2 is a flow chart illustrating a method for embedding anti-theft information in a TrueType word stock according to an aspect of the present invention.
Fig. 3 shows a schematic diagram of embedded anti-theft information provided in accordance with an embodiment of the present invention.
Fig. 4 is a flow chart illustrating a method for using a TrueType word stock according to another aspect of the present invention.
Fig. 5 shows a schematic structural diagram of a theft-proof information embedding device of a TrueType word stock according to another aspect of the present invention.
Fig. 6 is a schematic structural diagram of a device for using a TrueType word stock according to another aspect of the present invention.
Reference numerals
A P control point;
p0 internal origin;
p1, P1' off-line control points;
a P2 tail connection point;
201-202 steps of an antitheft information embedding method of a TrueType word stock;
the method for using the 401-403 TrueType word stock comprises the steps of;
51. a memory 61;
52. 62 a processor.
Detailed Description
Further advantages and effects of the present invention will become apparent to those skilled in the art from the disclosure of the present specification, by describing the embodiments of the present invention with specific examples. While the description of the invention will be presented in connection with a preferred embodiment, it is not intended to limit the inventive features to that embodiment. Rather, the purpose of the invention described in connection with the embodiments is to cover other alternatives or modifications, which may be extended by the claims based on the invention. The following description contains many specific details for the purpose of providing a thorough understanding of the present invention. The invention may be practiced without these specific details. Furthermore, some specific details are omitted from the description in order to avoid obscuring the invention.
The terms "upper", "lower", "left", "right", "top", "bottom", "horizontal", "vertical" as used in the following description should be understood as the orientation depicted in this paragraph and the associated drawings. This relative terminology is for convenience only and is not intended to be limiting of the invention as it is described in terms of the apparatus being manufactured or operated in a particular orientation.
In order to overcome the defects in the prior art, the invention provides a theft prevention information embedding method of a TrueType word stock, a use method of the TrueType word stock, two computer devices and two computer readable storage media, which are used for embedding a secret watermark into font contents to release an embedded font file with a visual effect, and simultaneously realize copy prevention and piracy tracking functions.
In the antitheft information embedding method of the TrueType word stock, each word in the TrueType word stock can be composed of a plurality of sections of secondary Bezier curves. As shown in fig. 1, each secondary bezier curve may consist of a series of ordered control points P, including inter alia an inner start point P0 and a tail connection point P2 on the contour curve, and an outer control point P1 outside the contour curve. The actual outline curve of TrueType fonts can be determined by these control points P by adjusting the quadratic bezier curve.
Specifically, the internal start point P0 and the tail connection point P2 are points through which the actual profile curve must pass, and the out-of-line control point P1 is located outside the actual profile curve. The coordinates of each point P (x (u), y (u)) on the actual contour curve can be determined by the following formula:
x(u)=x0+2*(x1-x0)*u+(x2-2x1+x0)*u^2
y(u)=y0+2*(y1-y0)*u+(y2-2y1+y0)*u^2
wherein, P0 (x 0, y 0), P1 (x 1, y 1), P2 (x 2, y 2) are the coordinates of the P0, P1, P2 points, respectively.
Referring to fig. 2 in combination, fig. 2 is a flow chart illustrating a method for embedding anti-theft information in a TrueType word stock according to an aspect of the present invention.
As shown in fig. 2, in the anti-theft information embedding method of the TrueType word stock provided by the present invention, the method may include the steps of:
201: anti-theft information is generated based on authorization information of the authorized user.
In some embodiments, the authorized user may include a legitimate user who purchased the TrueType word stock usage rights. The authorization information of the authorized user may include authentication information granted to the legitimate user by the copyrighter of the TrueType word stock, including, but not limited to, an authorization serial number. The authorized user can use the authorized serial number to carry out identity authentication when installing the word stock program so as to generate a word stock file which can be normally used. In a preferred embodiment, the authorization information may be an authorization serial number generated based on user information of an authorized user and machine identification information of an authorized machine, for limiting installation of the library installer to only the designated authorized machine.
In some embodiments, during installation of the word stock program, in response to a user entering an authorization serial number for identity authentication, the anti-theft information embedding device may automatically generate an anti-theft message according to the entered authorization serial number. The theft-proof information can indicate the user identity corresponding to the authorization serial number, so that the word stock copyright party can track the theft source according to the theft-proof information to perform compensation. In some embodiments, the anti-theft information embedding device may be a computer device having a memory and a processor, or may be a processing module storing corresponding computer executable instructions.
As shown in fig. 2, in the anti-theft information embedding method of the TrueType word stock provided by the present invention, the method may further include the steps of:
202: and sequentially modifying the coordinate values of at least part of the off-line control points in the TrueType word stock based on the binary information stream of the anti-theft information.
In some embodiments, each character in the TrueType word stock may be stored in the word stock file in units of a quadratic bezier curve for invocation by the device using the TrueType word stock. In some embodiments, the device for using the TrueType word stock may be a computer device having a memory and a processor, or may be a processing module storing corresponding computer executable instructions.
In some embodiments, the anti-theft information embedding device may sequentially modify the coordinate values of the off-line control point P1 of at least part of the quadratic bezier curve in the word stock according to the specific value (0 or 1) of each bit in the binary information stream of the anti-theft information, so that the parity of the modified coordinate values indicates the value of the corresponding bit of the binary information stream, thereby completing the embedding of all bits of the binary information, and making the coordinate values of all modified off-line control points P1' in the word stock contain the anti-theft information.
Specifically, for a bit in the binary information stream, the anti-theft information embedding device may modify the abscissa value and/or the ordinate value of the off-line control point P1 corresponding to the secondary bezier curve in the original TrueType font library file, so that the parity of the abscissa value and/or the ordinate value of the modified off-line control point P1' represents a specific value (0 or 1) of the bit. That is, if the parity of the coordinate value of the off-line control point corresponding to the bit matches the parity indicated by the bit, the coordinate value of the off-line control point can be kept unchanged; otherwise, the coordinate value of the off-line control point may be increased or decreased by 1 coordinate value unit so as to coincide with the parity indicated by the bit.
Referring to fig. 3, fig. 3 is a schematic diagram of embedded anti-theft information according to an embodiment of the present invention.
As shown in fig. 3, in one embodiment, the anti-theft information embedding device may sequentially modify the coordinate values of the off-line control point P1 of at least a portion of the quadratic bezier curve in the word stock according to the generated binary information stream (e.g., 10100110010100110100111000) of the anti-theft information. Specifically, if the coordinate value of the off-line control point of the first secondary bezier curve stored in the word stock file is P1 (123,67), the anti-theft information embedding device may maintain the abscissa value of the off-line control point of the secondary bezier curve to be an odd number 123 and modify the ordinate value of the off-line control point of the secondary bezier curve to be an even number 68 according to the value 1 of the first bit and the value 0 of the second bit of the binary information stream of the anti-theft information, so as to obtain a modified off-line control point P1' (123,68).
Then, the anti-theft information embedding device may modify the coordinate value of the off-line control point of the second quadratic bezier curve stored in the word stock file according to the third bit 1 and the fourth bit 0 of the binary information stream of the anti-theft information so that the abscissa value of the off-line control point is an odd number and the ordinate value of the off-line control point is an even number.
By analogy, the antitheft information embedding device can sequentially embed the values of bits of the binary information stream of antitheft information into the coordinate values of the off-line control points of the first thirteen secondary Bezier curves in the word stock one by one, so that the coordinate values of all the modified off-line control points P1' in the word stock contain antitheft information.
As shown in fig. 3, the antitheft information embedding method of the TrueType word stock provided by the invention keeps the position information of the starting point P0 and the tail connection point P2 in the secondary bezier curve unchanged, but only shifts the position of the off-line control point P1 by 1 position unit, each character in the word stock after modification only changes the curvature of one unit, and still can keep the connectivity of the whole font. Therefore, the TrueType word stock file embedded with the antitheft information can still ensure normal use of users, and meanwhile, a thief can not easily find that the TrueType word stock is embedded with the antitheft information by visual observation.
It will be appreciated by those skilled in the art that the above-described scheme of modifying the abscissa and ordinate values of the off-line control point simultaneously according to the bit values in the binary information stream of the anti-theft information is only one embodiment provided by the present invention, and is mainly used to clearly illustrate the concept of the present invention and to provide a specific scheme for public implementation, not to limit the scope of the present invention.
Alternatively, in other embodiments, the anti-theft information embedding device may also modify the abscissa value or the ordinate value of the off-line control point P1 of at least part of the quadratic bezier curve in the word stock in sequence only according to the specific value of each bit in the binary information stream of the anti-theft information, so that the parity of the modified abscissa value or the ordinate value indicates the value of the corresponding bit in the binary information stream, thereby completing the embedding of all the bits of the binary information, and making the coordinate value of all the modified off-line control point P1' in the word stock contain the anti-theft information.
It will be further appreciated by those skilled in the art that the above-described scheme of sequentially modifying the coordinate values of a plurality of off-line control points starting from a first off-line control point is merely one embodiment provided by the present invention, and is mainly used to clearly illustrate the concept of the present invention and to provide a specific scheme for public implementation, not to limit the scope of protection of the present invention.
Optionally, in other embodiments, the anti-theft information embedding device may also modify coordinate values of off-line control points of the plurality of evenly distributed secondary bezier curves in the TrueType word stock according to a length of a binary information stream of the anti-theft information, so as to embed the binary information stream of the anti-theft information into the TrueType word stock.
Preferably, in one embodiment of the present invention, the at least part of the off-line control points may not include the off-line control points where the curve is near the font boundary, or the off-line control points where the curvature of the curve is near 0. That is, the antitheft information embedding apparatus may further judge the position and curvature of the corresponding secondary bezier curve when embedding the binary information stream of antitheft information into the TrueType word stock.
If the out-of-line control point P1 corresponding to the secondary bezier curve is close to the boundary of the font, the anti-theft information embedding device may skip the secondary bezier curve and directly embed the bit value to be embedded into the next secondary bezier curve, so as to avoid that the excessive distortion of the secondary bezier curve affects the normal use of the user.
Similarly, if the off-line control point P1 corresponding to the secondary bezier curve is too close to the curve, the anti-theft information embedding device may determine that the curvature of the curve is close to 0, so as to skip the secondary bezier curve and directly embed the bit value to be embedded into the next secondary bezier curve, so as to avoid that the excessive distortion of the secondary bezier curve affects the normal use of the user.
In some embodiments of the present invention, the anti-theft information embedding device may further read the length of the binary information stream of the authorization information while generating the anti-theft information according to the authorization information, so as to calculate the length of the binary information stream of the corresponding anti-theft information. The anti-theft information embedding device may then add information length information of a fixed length to the authorization information to obtain the anti-theft information. The information length information may indicate the length of a binary information stream of the anti-theft information.
Specifically, the anti-theft information embedding device may generate information length information (11000) indicating the length (24 bits) of the authorization serial number according to the authorization serial number SN201908231146user100112 input by the user, and add the information length information before the authorization information to obtain anti-theft information, so as to facilitate the reading of the using device of the TrueType word stock. In some embodiments, the information length information may have a fixed length (e.g., 8 bits). That is, the antitheft information embedding apparatus may complement the information length information to 00011000 so that the use apparatus of the TrueType word stock reads the values of the first eight bits of the antitheft information to acquire the information length information, thereby acquiring the length of the binary information stream of the antitheft information. And then, the using equipment of the TrueType word stock can read the coordinate values of the corresponding number of the secondary Bezier curves according to the information flow length of the anti-theft information indicated by the information length information so as to extract the binary information flow of the anti-theft information.
In some embodiments, the anti-theft information embedding device may embed the eight-bit value into the abscissa of the off-line control point P1 of the first four quadratic bezier curves in the word stock. The anti-theft information embedding device may then embed bits of the remaining part of the binary information stream into the word stock sequentially from the off-line control point P1 of the fifth quadratic bezier curve.
In a preferred embodiment, the anti-theft information embedding device may further add a fixed length of modification pattern information to the authorization information to obtain the anti-theft information according to the modification pattern of the anti-theft information. Specifically, the antitheft information embedding apparatus may generate the modification pattern information of 11 in response to simultaneously modifying the abscissa value and the ordinate value of the off-line control point; the modification pattern information of 10 may be generated in response to modifying only the abscissa value of the off-line control point; the modification pattern information of 01 may also be generated in response to modifying only the ordinate value of the off-line control point.
In a preferred embodiment, the anti-theft information embedding device may further add a fixed length of embedded mode information to the authorization information to obtain the anti-theft information according to the embedded mode of the anti-theft information. Specifically, the antitheft information embedding apparatus may generate the embedding pattern information of 01 in response to modifying coordinate values of a plurality of off-line control points one by one from the first off-line control point; generating 10 embedded mode information in response to modifying coordinate values of the plurality of off-line control points at intervals from the first off-line control point; the embedded pattern information of 11 may also be generated in response to modifying coordinate values of the plurality of off-line control points according to the length average distribution of the antitheft information.
In a preferred embodiment, the antitheft information embedding apparatus may further generate error correction code information based on the authorization information input by the user, and add the error correction code information to the end of the authorization information to obtain the antitheft information. In some embodiments, the error correction code information may be generated by performing an encryption calculation on the authorization information for verifying and correcting errors in the anti-theft information. Specifically, the using device of the TrueType word stock can restore the corresponding authorization information by performing anti-encryption calculation on the error correction code information. By comparing the directly read authorization information with the restored authorization information, whether the directly read authorization information has data loss or is tampered can be found. In some embodiments, the device using the TrueType word stock may correct the authorization information with the data missing or tampered according to the redundant error correction code information.
In some embodiments, the anti-theft information embedding device may be communicatively connected to an authorization and tracking system operated by a word stock copyright party. After the antitheft information is generated, the antitheft information embedding device can send the extracted antitheft information to the authorization and tracking system in a networking environment, and downloads the modified TrueType font library file from the authorization and tracking system so as to be installed on the appointed device filled in when the font library use right is purchased.
According to another aspect of the invention, a method for using the TrueType word stock is also provided.
Referring to fig. 4, fig. 4 is a flow chart illustrating a method for using a TrueType word stock according to another aspect of the present invention.
As shown in fig. 4, in the method for using the TrueType word stock provided by the present invention, the method may include the steps of:
401: based on the coordinate value of at least part of the off-line control points in the TrueType word stock, extracting the binary information flow of the antitheft information, wherein the antitheft information comprises the authorization information of the authorized user;
402: the anti-theft information is sent to a verification server to verify whether the current use of the TrueType word stock is legal or not based on authorization information in the anti-theft information; and
403: and receiving coordinate correction data of the corresponding authorized user in response to the verification pass so as to recover the coordinate values of at least part of the off-line control points in the TrueType word stock based on the coordinate correction data, so as to obtain the original TrueType word stock.
In some embodiments of the present invention, the apparatus for using the TrueType word stock may obtain the value (0 or 1) of the corresponding bit in the binary information stream of the anti-theft information based on the parity of the coordinate value of the off-line control point P1' of the partial secondary bezier curve embedded with the anti-theft information. All bit values of the binary information stream can be obtained by sequentially reading the parity of the coordinate values of the off-line control point P1' of each secondary bezier curve.
In some preferred embodiments, the antitheft information may include modification mode information indicating a modification mode, embedding mode information indicating an embedding mode, and information length information indicating a length of the modification information. In some embodiments, the apparatus for using the TrueType word stock may determine that the anti-theft information adopts a modification mode for modifying both the abscissa value and the ordinate value of the off-line control point in response to the abscissa value and the ordinate value of the off-line control point P1' of the first quadratic bezier curve in the word stock being both odd, i.e. the modification mode information is 11. In some embodiments, the apparatus for using the TrueType word stock may determine that the antitheft information adopts an embedding mode in which coordinate values of a plurality of off-line control points are modified one by one from a first off-line control point in response to an abscissa of an off-line control point P1' of a second quadratic bezier curve in the word stock being an even number and an ordinate being an odd number, that is, embedding mode information being 01. In some embodiments, the apparatus for using the TrueType word stock may determine that the corresponding authorized serial number is 24 bits in length in response to the information length information indicated by the coordinate values of the out-of-line control points P1 'of the third to sixth quadratic bezier curves in the word stock being 00011000, thereby extracting the binary information stream of the anti-theft information based on the coordinate values of the out-of-line control points P1' of the seventh to eighteenth quadratic bezier curves in the word stock.
It will be appreciated by those skilled in the art that the above-described scheme of sequentially reading a plurality of off-line control point coordinate values from the off-line control point P1' of the first quadratic bezier curve of the word stock is merely one embodiment provided by the present invention, and is mainly used to clearly illustrate the concept of the present invention and to provide a specific scheme for public implementation, not to limit the scope of protection of the present invention.
Alternatively, in other embodiments, the device using the TrueType word stock may also read the coordinates of the off-line control points P1' of the multiple secondary bezier curves in the word stock in an average distribution according to the length of the binary information stream of the anti-theft information in response to the embedded mode information in the anti-theft information being 11.
In a preferred embodiment, the at least some of the off-line control points may not include off-line control points where the curve is near the font boundary, or off-line control points where the curvature of the curve is near 0. That is, in extracting the binary information stream of the antitheft information, the using device of the TrueType word stock may further determine the position and curvature of the corresponding secondary bezier curve.
If the out-of-line control point P1 'of the secondary bezier curve is close to the boundary of the font, the using device of the TrueType font library may skip the secondary bezier curve and directly read the coordinate value of the out-of-line control point P1' of the next secondary bezier curve. Similarly, if the off-line control point P1 'of the secondary bezier curve is too close to the curve, the using device of the TrueType word stock may determine that the curvature of the curve is close to 0, so as to skip the secondary bezier curve and directly read the coordinate value of the off-line control point P1' of the next secondary bezier curve.
In a preferred embodiment, the anti-theft information may further include error correction code information located at the end of the authorization information. The error correction code information may be generated by performing encryption calculation on the authorization information for verifying and correcting errors in the anti-theft information. The using device of the TrueType word stock can restore the corresponding authorization information by performing anti-encryption calculation on the error correction code information. By comparing the directly read authorization information with the restored authorization information, whether the directly read authorization information has data loss or is tampered can be found. In some embodiments, the device using the TrueType word stock may correct the authorization information with the data missing or tampered according to the redundant error correction code information.
In some embodiments of the present invention, the authentication server includes, but is not limited to, an external authorization and tracking system of the internet and/or an internal authorization and tracking system built in an intranet environment. The external authorization and tracking system can be operated by the copyright party of the word stock and is used for tracking the source of theft so that the copyright party can conduct rights compensation. The internal authorization and tracking system can be maintained by an enterprise and is used for self-checking whether a word stock file used by the enterprise is legal or not. In some embodiments, the device for using the TrueType word stock may be communicatively connected to an authorization and tracking system operated by the copyright party of the word stock. The usage device of the TrueType word stock may send user information of a user currently using the TrueType word stock and machine identification information of a machine to the authorization and tracking system to perform authorization information verification.
In some embodiments, in response to the verification passing, the usage device of the TrueType word stock may restore the coordinate value of the off-line control point P1' of the modified partial secondary bezier curve in the TrueType word stock based on the coordinate correction data to obtain the original TrueType word stock. In some embodiments, the coordinate correction data may be transmitted by the anti-theft information embedding device to the authorization and tracking system, and may include a modified record of the coordinate values of the off-line control point P1' of the modified partial secondary bezier curve. After the verification is passed, the using device of the TrueType word stock may download coordinate correction data corresponding to the authorized user from the authorization and tracking system, so as to correct the coordinate value of the off-line control point P1' of the modified part of the secondary bezier curve based on the modification record therein, so as to obtain the original TrueType word stock.
In some embodiments, if the authorization and tracking system determines that the authorization information verification result is an unauthorized user and location, the verification failure result may be returned to the using device of the TrueType word stock. At this time, the matching program of the TrueType word stock using device can record the current user and place information and send the current user and place information to the authorization and tracking system so that the copyright party can carry out subsequent embezzlement tracking.
While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated that the methodologies are not limited by the order of acts, as some acts may, in accordance with one or more embodiments, occur in different orders and/or concurrently with other acts from that shown and described herein or not shown and described herein, as would be understood and appreciated by those skilled in the art.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a antitheft information embedding device of a TrueType word stock according to another aspect of the present invention.
As shown in fig. 5, the computer device provided by the present invention includes a memory 51, a processor 52, and computer executable instructions stored on the memory 51 and executable on the processor 52. When the processor 52 executes the computer executable instructions, the steps of the anti-theft information embedding method of the TrueType word stock provided in any of the embodiments described above may be implemented, so that a secret watermark is embedded into the font content to implement the copy and piracy prevention and piracy tracking functions.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a device for using a TrueType word stock according to another aspect of the present invention.
As shown in fig. 6, the computer device provided by the present invention includes a memory 61, a processor 62, and computer executable instructions stored on the memory 61 and executable on the processor 62. When the processor 62 executes the computer executable instructions, the steps of the method for using the TrueType word stock provided in any of the embodiments described above may be implemented, so that an embedded font file that maintains a visual effect is released to implement the copy and piracy prevention and piracy tracking functions.
Although the above-described embodiments provide processors 52, 62 that may be implemented by a combination of software and hardware. Those skilled in the art will appreciate that the processors 52, 62 may also be implemented separately in software or hardware. For a hardware implementation, the processors 52, 62 may be implemented within one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital signal processing devices (DAPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic devices for performing the functions described above, or a selected combination thereof. For software implementation, the processors 52, 62 may be implemented by individual software modules, such as program modules (procedures) and function modules (functions), running on a common chip, each of which may perform one or more of the functions and operations described herein.
According to another aspect of the present invention, there is also provided herein a computer-readable storage medium.
The present invention provides the above computer-readable storage medium having computer-executable instructions stored thereon. The steps of the anti-theft information embedding method of the TrueType word stock provided in any of the above embodiments can be implemented when the computer executable instructions are executed by the processor 52, so that a secret watermark is embedded into the font content to implement the functions of copy and piracy prevention and piracy tracking.
According to another aspect of the present invention, there is also provided herein a computer-readable storage medium.
The present invention provides the above computer-readable storage medium having computer-executable instructions stored thereon. The steps of the method for using the TrueType word stock provided in any of the embodiments described above may be implemented when the computer executable instructions are executed by the processor 62, so as to issue an embedded font file that maintains a visual effect to implement copy and piracy protection and piracy tracking functions.
Those of skill in the art would understand that information, signals, and data may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The various illustrative logical modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary embodiments, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software as a computer program product, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a web site, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk (disk) and disc (disk) as used herein include Compact Disc (CD), laser disc, optical disc, digital Versatile Disc (DVD), floppy disk and blu-ray disc where disks (disk) usually reproduce data magnetically, while discs (disk) reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The previous description of the disclosure is provided to enable any person skilled in the art to make or use the disclosure. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the spirit or scope of the disclosure. Thus, the disclosure is not intended to be limited to the examples and designs described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (20)

1. Each word in the TrueType word stock is composed of a plurality of sections of secondary Bezier curves, each secondary Bezier curve comprises an off-line control point, and the method comprises the following steps:
generating anti-theft information based on authorization information of an authorized user; and
sequentially modifying the coordinate values of at least part of the off-line control points in the TrueType word stock based on the binary information stream of the antitheft information, wherein the modified coordinate values of all the off-line control points comprise the antitheft information;
wherein the coordinate values of each of the at least some off-line control points are sequentially modified according to respective bits in the binary information stream such that the parity of the modified coordinate values indicates the corresponding bits of the binary information stream to complete the embedding of all bits of the binary information.
2. The antitheft information embedding method of claim 1 wherein said sequentially modifying the coordinate values of each of said at least partial out-of-line control points by respective bits in said binary information such that the parity of the modified coordinate values indicates the respective bits of said binary information stream comprises:
for one bit in the binary information, if the parity of the coordinate value of the off-line control point corresponding to the bit is identical with the parity indicated by the bit, the coordinate value of the off-line control point is kept unchanged, otherwise, the coordinate value of the off-line control point is increased or decreased by 1 coordinate value unit.
3. The antitheft information embedding method of claim 1 wherein the at least part of the off-line control points comprise a plurality of off-line control points stored in the TrueType word stock in order from a first off-line control point according to the length of the binary information stream of the antitheft information.
4. The antitheft information embedding method of claim 1 wherein the at least part of the off-line control points comprise a plurality of off-line control points distributed evenly in the TrueType word stock according to the length of the binary information stream of antitheft information.
5. The anti-theft information embedding method according to claim 1, wherein the at least part of the out-of-line control points do not include an out-of-line control point where a curve is near a font boundary or an out-of-line control point where a curvature of the curve is near 0.
6. The antitheft information embedding method of claim 1 wherein generating antitheft information based on the authorization information of the authorized user comprises:
adding information length information of a fixed length to the authorization information to obtain the theft protection information, the information length information indicating the length of a binary information stream of the theft protection information,
the binary information stream based on the antitheft information sequentially modifies the coordinate values of at least part of the off-line control points in the TrueType word stock, including:
modifying the coordinate values of a preset number of off-line control points at fixed positions in the TrueType word stock based on the binary information stream part of the information length information; and
the coordinate values of the remaining ones of the at least partial off-line control points are modified based on the remaining portion of the binary information stream.
7. The antitheft information embedding method of claim 6 wherein said generating antitheft information based on the authorization information of the authorized user comprises:
Generating error correction code information based on the authorization information; and
adding the error correction code information at the end of the authorization information to obtain the theft prevention information.
8. The antitheft information embedding method of claim 1 wherein the authorization information is an authorization serial number generated based on user information of the authorized user and machine identification information of an authorized machine.
9. The use method of the TrueType word stock, each word in the TrueType word stock is composed of a plurality of sections of secondary Bezier curves, each secondary Bezier curve comprises an off-line control point, and the use method comprises the following steps:
extracting a binary information stream of antitheft information based on at least partial coordinate values of the off-line control points in the TrueType word stock, wherein the antitheft information comprises authorization information of an authorized user;
wherein respective bits in the binary information stream are obtained sequentially based on parity of coordinate values of each of the at least partial off-line control points to obtain all bit values of the binary information stream;
the anti-theft information is sent to a verification server to verify whether the current use of the TrueType word stock is legal or not based on authorization information in the anti-theft information; and
And receiving coordinate correction data of a corresponding authorized user in response to the verification pass so as to restore the coordinate values of at least part of the off-line control points in the TrueType word stock based on the coordinate correction data to obtain an original TrueType word stock.
10. The method of claim 9, wherein the at least some out-of-line control points include a plurality of out-of-line control points stored in the TrueType word library sequentially from a first out-of-line control point according to a length of a binary information stream of the anti-theft information.
11. The method of claim 9, wherein the at least some out-of-line control points comprise a plurality of out-of-line control points in the TrueType word library that are evenly distributed according to a length of the binary information stream of the anti-theft information.
12. The method of claim 9, wherein the at least some of the off-line control points do not include an off-line control point where the curve is near the font boundary or an off-line control point where the curve has a curvature near 0.
13. The method of claim 9, wherein the theft prevention message further comprises a fixed length message preceding the authorization message, the message length message indicating a length of a binary message stream of the theft prevention message,
The binary information stream for extracting the antitheft information comprises the following steps:
extracting a binary information stream part of the information length information based on coordinate values of a preset number of off-line control points at fixed positions in the TrueType word stock; and
extracting a remaining portion of the binary information stream of the theft prevention information based on coordinate values of remaining portions of the at least partial off-line control points.
14. The method of claim 13, wherein the anti-theft information further includes error correction code information located at the end of the authorization information.
15. The method of claim 9, wherein the authorization information is an authorization serial number generated based on user information of the authorized user and machine identification information of an authorized machine, the method of using a TrueType word library further comprising:
and transmitting user information of the user currently using the TrueType word stock and machine identification information of the machine to the verification server to execute the authorization information verification.
16. The method of claim 9, wherein the coordinate modification data comprises a modification record of coordinate values of the at least a portion of the off-line control points,
The recovering the coordinate values of the at least part of the out-of-line control points in the TrueType word stock to obtain an original TrueType word stock includes:
and correcting the coordinate values of the at least partial out-of-line control points based on the modification record to obtain an original TrueType word stock.
17. A computer device comprising a memory, a processor and computer executable instructions stored on the memory and executable on the processor, wherein the processor, when executing the computer executable instructions, performs the steps of the method of any one of claims 1-8.
18. A computer device comprising a memory, a processor and computer executable instructions stored on the memory and executable on the processor, wherein the processor, when executing the computer executable instructions, performs the steps of the method of any one of claims 9-16.
19. A computer readable storage medium having stored thereon computer executable instructions, which when executed by a processor, implement the steps of the method according to any of claims 1-8.
20. A computer readable storage medium having stored thereon computer executable instructions which when executed by a processor perform the steps of the method according to any of claims 9-16.
CN201911242048.2A 2019-12-06 2019-12-06 Antitheft information embedding method and use method of TrueType word stock Active CN112927119B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911242048.2A CN112927119B (en) 2019-12-06 2019-12-06 Antitheft information embedding method and use method of TrueType word stock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911242048.2A CN112927119B (en) 2019-12-06 2019-12-06 Antitheft information embedding method and use method of TrueType word stock

Publications (2)

Publication Number Publication Date
CN112927119A CN112927119A (en) 2021-06-08
CN112927119B true CN112927119B (en) 2024-02-09

Family

ID=76161629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911242048.2A Active CN112927119B (en) 2019-12-06 2019-12-06 Antitheft information embedding method and use method of TrueType word stock

Country Status (1)

Country Link
CN (1) CN112927119B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114564106B (en) * 2022-02-25 2023-11-28 北京字跳网络技术有限公司 Method and device for determining interaction indication line, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5646997A (en) * 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data
WO2012001893A1 (en) * 2010-06-30 2012-01-05 パナソニック株式会社 Curve-dividing device, curve-dividing method, curve-dividing program and integrated circuit
CN102486821A (en) * 2010-12-02 2012-06-06 北大方正集团有限公司 Word stock copyright control method and device
CN103578450A (en) * 2012-07-31 2014-02-12 国民技术股份有限公司 Character display method, character display device and safety authentication device
WO2015014061A1 (en) * 2013-07-31 2015-02-05 北大方正集团有限公司 Method and apparatus for building intermediate font library
WO2018177201A1 (en) * 2017-03-29 2018-10-04 腾讯科技(深圳)有限公司 Method and device for embedding and extracting digital watermark, digital watermarking system
CN108763879A (en) * 2018-05-30 2018-11-06 北京溯斐科技有限公司 A kind of automatic generation method and device of watermark character library

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8269987B2 (en) * 2007-10-30 2012-09-18 Xerox Corporation Using application side truetype or other outline fonts to create specialty imaging fonts on digital front-end

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5646997A (en) * 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data
WO2012001893A1 (en) * 2010-06-30 2012-01-05 パナソニック株式会社 Curve-dividing device, curve-dividing method, curve-dividing program and integrated circuit
CN102486821A (en) * 2010-12-02 2012-06-06 北大方正集团有限公司 Word stock copyright control method and device
CN103578450A (en) * 2012-07-31 2014-02-12 国民技术股份有限公司 Character display method, character display device and safety authentication device
WO2015014061A1 (en) * 2013-07-31 2015-02-05 北大方正集团有限公司 Method and apparatus for building intermediate font library
WO2018177201A1 (en) * 2017-03-29 2018-10-04 腾讯科技(深圳)有限公司 Method and device for embedding and extracting digital watermark, digital watermarking system
CN108763879A (en) * 2018-05-30 2018-11-06 北京溯斐科技有限公司 A kind of automatic generation method and device of watermark character library

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Priyanka Singh et al..Detection of Seal and Signature Entities with Hierarchical Recovery based on Watermark Self Embedding in Tampered Digital Documents.《 Displays.》.2018,第54卷(第2018期), 47-59. *
孙晓辉 ; 陈晓 ; 王春 ; 刘建 ; .在嵌入式浏览器中使用TrueType矢量字库.电视技术.2007,(第S1期), 122-123,152. *
尹学松,李延峰,潘志庚.基于TrueType的碑文字库的生成.杭州电子工业学院学报.2003,(第06期), 58-60. *
郑军 ; .集外汉字输入中TrueType字体技术和TrueType字库格式介绍.电脑知识与技术.2009,(第08期), 128. *

Also Published As

Publication number Publication date
CN112927119A (en) 2021-06-08

Similar Documents

Publication Publication Date Title
KR101712726B1 (en) Method and system for verifying integrity and validity of contents using hash code
US8844049B2 (en) Method for generating a cryptographic key for a protected digital data object on the basis of current components of a computer
KR100795059B1 (en) Method and device for controlling multimedia data watermark
CN101076861A (en) Controlling distribution and use of digital works
JP2009282525A (en) Content security method providing long-term renewable security, device for the same, and computer-readable storage medium
JP2003523556A (en) Key encryption using a separate client-specific key
US20050108174A1 (en) Copy detection for digitally-formatted works
JP2004527031A (en) Protection system and protection method for preventing copy of protection optical disk creation information
JP2002319230A (en) Recording medium, information processor, server, and method, program for contents distribution and recording medium thereof
CN101840361B (en) Program verification apparatus and its method
CN112927119B (en) Antitheft information embedding method and use method of TrueType word stock
CN105260627B (en) A kind of anti-copy method of embedded device program
CN102346715B (en) Method for protecting application program in internal memory, internal memory controller and processor
US8661559B2 (en) Software control flow watermarking
CN109190335B (en) Software copyright protection method and system
JP2008108212A (en) Storage element with data protection function
EP2400493B1 (en) Information processing device, information processing method, and program
JP4785823B2 (en) Memory device and memory writing device
CN102449638A (en) Using a custom media library to secure digital media content
KR101405915B1 (en) Method for writing data by encryption and reading the data thereof
JP2008077273A (en) Data protection method in semiconductor memory card, and semiconductor memory card
US7127618B2 (en) Data protection via reversible data damage
US20030018907A1 (en) Content protection for digital media
US20040034667A1 (en) Incorporating data into files
CN116880884B (en) Updating method of electronic device, updating device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant