CN113254408A - Invisible mark adding method, device, medium and electronic equipment - Google Patents

Invisible mark adding method, device, medium and electronic equipment Download PDF

Info

Publication number
CN113254408A
CN113254408A CN202110788136.3A CN202110788136A CN113254408A CN 113254408 A CN113254408 A CN 113254408A CN 202110788136 A CN202110788136 A CN 202110788136A CN 113254408 A CN113254408 A CN 113254408A
Authority
CN
China
Prior art keywords
file
mark
determining
information
added
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110788136.3A
Other languages
Chinese (zh)
Other versions
CN113254408B (en
Inventor
张春醒
刘�英
沈王东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Aixiu Xinan Technology Co ltd
Original Assignee
Beijing Aixiu Xinan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Aixiu Xinan Technology Co ltd filed Critical Beijing Aixiu Xinan Technology Co ltd
Priority to CN202110788136.3A priority Critical patent/CN113254408B/en
Publication of CN113254408A publication Critical patent/CN113254408A/en
Application granted granted Critical
Publication of CN113254408B publication Critical patent/CN113254408B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • G06F16/1744Redundancy elimination performed by the file system using compression, e.g. sparse files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/103Formatting, i.e. changing of presentation of documents
    • G06F40/117Tagging; Marking up; Designating a block; Setting of attributes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The application discloses an adding method, device, medium and electronic equipment of invisible marks. Wherein, the method comprises the following steps: if a mark adding triggering event is detected, acquiring a file to be added, and determining the file type of the file to be added; if the file type is the target file type, determining that the relation file obtained after the file to be added is decompressed is a mark file; and determining marking information, and adding the marking information to the marking file according to the language rule of the relation file. By adopting the technical scheme, the invisible identification can be added to the leaked document unknowingly, and the invisible identification can be identified and traced to determine the information such as the time, the place, the person and the like of the leakage of the document. In addition, the scheme does not depend on the making and adding of the watermark in the picture format, so that the types of the detected documents are more diversified, and meanwhile, the scheme does not need to depend on a picture making tool and is more flexible and usable.

Description

Invisible mark adding method, device, medium and electronic equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a medium, and an electronic device for adding an invisible mark.
Background
With the rapid development of the technology level, the application fields of data information are gradually increased, and the divulgence of files in a computer happens frequently. For some enterprises and public institutions, the leakage of confidential documents directly causes serious economic loss and even directly influences the operation and development of the enterprises and public institutions. Therefore, the management and control of confidential documents are very important. The existing management and control method is often a method of adding a watermark to a picture file, for example, an indelible watermark is added to the text of some documents, so that the importance and traceability of the file are informed to a user through such an operation. However, due to the limitation of the picture format, once the leaked file is not in the picture format, the tracing is difficult to realize. Therefore, a way to add tags to files of any format is to be created.
Disclosure of Invention
The embodiment of the application provides an adding method, device, medium and electronic equipment of an invisible mark. By adopting the technical scheme provided by the embodiment of the application, the invisible mark can be added to the file according to the format of the file, so that the purpose of tracing the source of the leaked file can be realized on the basis of not influencing the file format.
The embodiment of the application provides an adding method of an invisible mark, which comprises the following steps:
if a mark adding triggering event is detected, acquiring a file to be added, and determining the file type of the file to be added;
if the file type is the target file type, determining that the relation file obtained after the file to be added is decompressed is a mark file;
and determining marking information, and adding the marking information to the marking file according to the language rule of the relation file.
Further, the target file type includes an Office Open XML file type.
Further, the relationship file obtained after the file to be added is decompressed is: rels/. rels file.
Further, after the markup information is added to the markup file according to the language rule of the relationship file, the method further includes:
and compressing the marked file and other files obtained after the file to be added is decompressed to obtain a marked addition result file of the file to be added.
Further, determining markup information, and adding the markup information to the markup file according to the language rule of the relationship file, includes:
determining binary mark content information of the mark information and determining preset identification information of the mark information;
determining rId value of the Relationship Id according to the Relationship Id decreasing rule of the Relationship file, and adding the preset identification information and the binary label content information to the position after rId value.
Further, the method further comprises:
if the marking information identification trigger event is detected, determining the file type of the file to be identified;
if the file type is the target file type, reading a relation file obtained after the file to be identified is decompressed;
and if the relation file comprises preset identification information, determining that the file to be identified has an invisible mark.
Further, after determining that the invisible mark exists in the file to be identified, the method further comprises:
and identifying the binary mark content information included in the relation file according to a preset rule to obtain an identification result of the invisible mark.
The embodiment of the present application further provides an invisible mark adding device, which includes:
the file type determining module is used for acquiring a file to be added and determining the file type of the file to be added if a mark adding triggering event is detected;
the mark file determining module is used for determining that the relation file obtained after the file to be added is decompressed is a mark file if the file type is the target file type;
and the marking information adding module is used for determining marking information and adding the marking information to the marking file according to the language rule of the relation file.
Embodiments of the present application also provide a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the adding method of the invisible mark according to the embodiments of the present application.
The embodiment of the present application further provides an electronic device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the computer program, the method for adding the invisible mark according to the embodiment of the present application is implemented.
The embodiment of the application adopts the following technical scheme: if a mark adding triggering event is detected, acquiring a file to be added, and determining the file type of the file to be added; if the file type is the target file type, determining that the relation file obtained after the file to be added is decompressed is a mark file; and determining marking information, and adding the marking information to the marking file according to the language rule of the relation file.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
the invention provides a scheme for tracing the source of the leaked document accurately. According to the method for adding the invisible mark, the invisible mark can be added to the leaked document under the condition that a secret divulging person does not know, and the invisible mark can be identified and traced to determine the information such as the time, the place, the people and the like of the document leakage. In addition, the scheme does not depend on the making and adding of the watermark in the picture format, so that the types of the detected documents are more diversified, and meanwhile, the scheme does not need to depend on a picture making tool and is more flexible and usable.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flow chart of a method for adding an invisible mark according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a tag added field of an office document type of an original version according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for adding an invisible mark according to a second embodiment of the present invention;
fig. 4 is a schematic structural diagram of an invisible mark adding device according to a third embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Example one
Fig. 1 is a flowchart of an adding method of an invisible mark according to an embodiment of the present invention, which is applicable to a case where an invisible mark is added to a document, such as a case where a document is compromised, and the method can be executed by an adding apparatus of an invisible mark according to an embodiment of the present invention, where the adding apparatus can be implemented by software and/or hardware, and can be integrated into any electronic device that needs to be monitored.
As shown in fig. 1, the method includes:
s110, if the mark adding triggering event is detected, acquiring a file to be added, and determining the file type of the file to be added.
The scheme is suitable for the divulgence event of the document, so that the mark adding triggering event can be determined and identified when the process of sending the file from the internal network to the external network is detected. In addition, other situations are possible, such as taking a picture by screen capture, or copying a file via a data line or other means, etc.
In the scheme, the determined file to be added is a file which needs to be sent or stored separately, such as a transmitted Microsoft Excel form file, or a JPEG picture file, and the like. Accordingly, the file type may be a Microsoft Excel form type, or a JPEG picture type, or other types.
And S120, if the file type is the target file type, determining that the relation file obtained after the file to be added is decompressed is a mark file.
For example, there may be some information that does not affect the file type in the header file except the information for characterizing the file attribute, and the change to one or more fields in the header file does not affect the attribute of the entire file. That is, by changing these fields, the file can still be used normally, and this part of the fields can be determined to add a field to the flag of the file.
In addition, it is stated that the location of the file addition field may be different due to different file types. Therefore, the present scheme requires determining the position of the mark addition according to the file type.
It is to be understood that the type of the file to be added may be determined according to a file suffix or attribute information of the file to be added. The target type may be one type or may be multiple types. The target type may be a type that supports adding invisible marks.
In this scenario, the target type may be a file type that supports decompression. Meanwhile, after the file to be added is decompressed, the relationship file can be obtained. Here, the relationship file may be a file used to characterize the relationship between the files after decompression.
In this solution, optionally, the target file type includes an Office Open XML file type.
The Office Open XML file type may be a new version Office document type, Microsoft Office 2010 document, such as Microsoft Excel 2010 document (.xlsx). In the scheme, specifically, all Office Open XML documents support the scheme, including but not limited to files of the type docx/. xlsx/. pptx.
For the new version office document type, decompressing the file to be added according to the new version office document type; and determining a preset position field of the target file in the decompression processing result as a mark adding field. For example: the Microsoft Excel 2010 document (. xlsx) can be decompressed first, xlsx is added with dark watermark content in the decompressed _ rels/. rels file, and then the file is compressed to obtain the file which is not perceived by the user and is added with invisible marks.
All new versions of office documents support this scheme, including.
By means of the arrangement, when the Microsoft office document is disclosed, tracing can be directly carried out according to the added invisible watermark.
In another feasible technical solution, optionally, the relationship file obtained after the file to be added is decompressed is: rels/. rels file.
Fig. 2 is a schematic diagram of contents of a relationship file according to an embodiment of the present invention. As shown in fig. 2, the content of the frame-selected part is the new content, that is, the invisible mark added in the scheme.
According to the scheme, the content of the relation description statement of the relation file can be added, and the purpose that a user cannot perceive and cannot see the added content completely can be achieved.
In another possible technical solution, optionally, after the markup information is added to the markup file according to the language rule of the relationship file, the method further includes:
and compressing the marked file and other files obtained after the file to be added is decompressed to obtain a marked addition result file of the file to be added.
For example, the file to be added may be a, a relation file B obtained after decompression, and other files C and D. And after the mark information is added to the relation file to obtain a relation file B ', compressing B ', C and D to obtain a mark addition result file A ' of the file to be added.
It is understood that for a compressed file, a decompressed file of the compressed file may be determined, and the addition of the invisible mark to the relationship file in the decompressed file may be performed. The advantage of such setting is that the files are often used by decompression when being finally used, so that the addition mode of the invisible mark can ensure that one or more files in the compressed files can be traced.
S130, determining the marking information, and adding the marking information to the marking file according to the language rule of the relation file.
In this embodiment, the tag information may be information for tracing, and may include, for example, a user ID, a time, a location, an IP address, and the like. The format of the mark information can be in a digital form or a text form, and can also be in a form of converting the content to be edited into binary bytes in a secondary file. In the scheme, the information required as the marked content can be converted into a binary character string and added according to the format requirement of the header file.
In this embodiment, specifically, determining the markup information, and adding the markup information to the markup file according to the language rule of the relationship file includes:
determining binary mark content information of the mark information and determining preset identification information of the mark information;
determining rId value of the Relationship Id according to the Relationship Id decreasing rule of the Relationship file, and adding the preset identification information and the binary label content information to the position after rId value.
The decreasing rule may be a rule with rId values from more to less. The language rule of the Relationship file may be that Relationship Id = "rId3", Relationship Id = "rId2", Relationship Id = "rId1" determines that added content needs to be added before Relationship Id = "rId 0".
According to the technical scheme provided by the embodiment, if a mark adding triggering event is detected, a file to be added is obtained, and the file type of the file to be added is determined; if the file type is the target file type, determining that the relation file obtained after the file to be added is decompressed is a mark file; and determining marking information, and adding the marking information to the marking file according to the language rule of the relation file. By executing the scheme, the invisible identification can be added to the leaked document under the condition that the leaked person is unknown, and the invisible identification can be identified and traced to determine the information such as the time, the place, the person and the like of the document leakage. In addition, the scheme does not depend on the making and adding of the watermark in the picture format, so that the types of the detected documents are more diversified, and meanwhile, the scheme does not need to depend on a picture making tool and is more flexible and usable.
In this embodiment, specifically, the mark adding field may be added with mark content randomly generated according to a predetermined rule, for example, a unique mark value. It will be appreciated that the value is unreadable and requires a source-tracing repository lookup code to retrieve the corresponding information. Including, for example, personnel information, time information, and other information.
In one possible embodiment, optionally, the tag information includes tag identification information and tag content information.
Wherein the marker identification information may be used to make information for subsequent identification, e.g. to determine whether an invisible marker is present. The marked content information may be information that needs to be traced, such as an IP address when the document is compromised. By means of the arrangement, whether the file has the mark or not and the specific content of the mark can be rapidly determined, and therefore the practicability of the scheme is improved.
Example two
Fig. 3 is a schematic flowchart of a method for adding an invisible mark according to a second embodiment of the present invention. As shown in fig. 3, the method includes:
s310, if the mark adding triggering event is detected, acquiring a file to be added, and determining the file type of the file to be added.
S320, if the file type is the target file type, determining that the relation file obtained after the file to be added is decompressed is a mark file.
S330, determining the marking information, and adding the marking information to the marking file according to the language rule of the relation file.
S340, if the trigger event of the identification of the marking information is detected, determining the file type of the file to be identified.
The file to be identified can be determined as a mark identification trigger event, wherein the file to be identified needs to be identified by an invisible mark. Specifically, the target file determined by the user through clicking or dragging or the like may be identified as the trigger event. In one scenario, when a worker finds that the similarity between the externally streamed file and the internal file of the company is high, the worker acquires the file and identifies the invisible mark. Similar to the tag addition process, here too, the file type needs to be determined.
And S350, if the file type is the target file type, reading the relation file obtained after the file to be identified is decompressed.
Similar to the tag addition process, here too, the target field to which the invisible tag is added needs to be determined by the file type.
S360, if the relation file comprises preset identification information, determining that the file to be identified has an invisible mark.
Here, by reading the target field, if the tag identification information is found to be present, it is determined that the invisible tag is present.
By means of the scheme, whether the file to be identified is the file added with the invisible field can be determined simply, conveniently and efficiently. So that the file to be identified can be traced to the source and processed in other ways.
In one possible embodiment, the first and second sensors, optionally,
after determining that the invisible mark exists in the file to be identified, the method further comprises the following steps:
and identifying the binary mark content information included in the relation file according to a preset rule to obtain an identification result of the invisible mark.
It will be appreciated that after determining that an invisible mark is present, the specific content of the originally added invisible mark, such as an IP address, user information, etc., may be determined by identifying the mark content field therein.
Through the arrangement, the purpose of fast and accurate tracing can be achieved.
In addition, the invention directly modifies the binary file, the software is small and exquisite in green, and the software does not exceed 500K, thereby being convenient for third-party integration. Independent of the picture watermark, the encrypted document can still be used. Even if the variable bytes are found in the face of unknown file formats, the dark watermark can still be marked. Meanwhile, the method does not damage the content of the file and does not change the type of the file, and the file can be read and written normally as a normal file.
In a feasible embodiment, it may be clear that the added information may be used not only as a basis for tracing, but also as a basis for data encryption and data processing, for example, a decryption manner in which part or all of information in a file may be associated in the added information, or a processing manner of part or all of information in a file may be specified, so that a wider range of functions may be implemented based on the added information, thereby expanding an application scenario of the present scheme.
EXAMPLE III
Fig. 4 is a schematic structural diagram of an invisible mark adding device according to a third embodiment of the present invention. As shown in fig. 4, the apparatus includes:
a file type determining module 410, configured to, if a mark addition triggering event is detected, acquire a file to be added, and determine a file type of the file to be added;
a markup file determining module 420, configured to determine, if the file type is a target file type, that the relationship file obtained after the file to be added is decompressed is a markup file;
and the markup information adding module 430 is configured to determine markup information and add the markup information to the markup file according to the language rule of the relationship file.
The device can execute the adding method of the invisible mark provided by the above embodiments, and has corresponding functional modules and beneficial effects. And will not be described in detail herein.
Example four
Embodiments of the present application also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, perform a method of adding an invisible mark, the method comprising:
if a mark adding triggering event is detected, acquiring a file to be added, and determining the file type of the file to be added;
if the file type is the target file type, determining that the relation file obtained after the file to be added is decompressed is a mark file;
and determining marking information, and adding the marking information to the marking file according to the language rule of the relation file.
Storage medium-any of various types of memory electronics or storage electronics. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in the computer system in which the program is executed, or may be located in a different second computer system connected to the computer system through a network (such as the internet). The second computer system may provide the program instructions to the computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations, such as in different computer systems that are connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in the embodiments of the present application contains computer-executable instructions, and the computer-executable instructions are not limited to the adding operation of the invisible mark described above, and may also perform related operations in the adding method of the invisible mark provided in any embodiments of the present application.
EXAMPLE five
The embodiment of the application provides electronic equipment. Fig. 5 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present application. As shown in fig. 5, the present embodiment provides an electronic device 500, which includes: one or more processors 520; the storage 510 is configured to store one or more programs, and when the one or more programs are executed by the one or more processors 520, the one or more processors 520 implement the method for adding the invisible mark provided in the embodiment of the present application, the method includes:
if a mark adding triggering event is detected, acquiring a file to be added, and determining the file type of the file to be added;
if the file type is the target file type, determining that the relation file obtained after the file to be added is decompressed is a mark file;
and determining marking information, and adding the marking information to the marking file according to the language rule of the relation file.
The electronic device 500 shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 5, the electronic device 500 includes a processor 520, a storage 510, an input 530, and an output 540; the number of the processors 520 in the electronic device may be one or more, and one processor 520 is taken as an example in fig. 5; the processor 520, the storage 510, the input device 530, and the output device 540 in the electronic apparatus may be connected by a bus or other means, and are exemplified by a bus 550 in fig. 5.
The storage device 510 is a computer-readable storage medium, and can be used to store software programs, computer-executable programs, and module units, such as program instructions corresponding to the adding method of the invisible mark in the embodiment of the present application.
The storage device 510 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the storage 510 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, storage 510 may further include memory located remotely from processor 520, which may be connected via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 530 may be used to receive input numbers, character information, or voice information, and to generate key signal inputs related to user settings and function control of the electronic apparatus. The output device 540 may include a display screen, speakers, etc. of electronic equipment.
The electronic equipment provided by the embodiment of the application can add the invisible identification for the leaked document under the condition that the leaked person is unknown, and can identify and trace the invisible identification to determine the information such as the time, the place, the person and the like of the leaked document. In addition, the scheme does not depend on the making and adding of the watermark in the picture format, so that the types of the detected documents are more diversified, and meanwhile, the scheme does not need to depend on a picture making tool and is more flexible and usable.
The invisible mark adding device, the medium and the electronic device provided in the above embodiments can operate the invisible mark adding method provided in any embodiment of the present application, and have corresponding functional modules and beneficial effects for operating the method. Technical details not described in detail in the above embodiments may be referred to the addition method of the invisible mark provided in any embodiments of the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method of adding an invisible mark, the method comprising:
if a mark adding triggering event is detected, acquiring a file to be added, and determining the file type of the file to be added;
if the file type is the target file type, determining that the relation file obtained after the file to be added is decompressed is a mark file;
and determining marking information, and adding the marking information to the marking file according to the language rule of the relation file.
2. The method of claim 1, wherein the target file type comprises an Office Open XML file type.
3. The method according to claim 2, wherein the relationship file obtained after the file to be added is decompressed is: rels/. rels file.
4. The method of claim 3, wherein after adding the markup information to the markup file according to the linguistic rules of the relationship file, the method further comprises:
and compressing the marked file and other files obtained after the file to be added is decompressed to obtain a marked addition result file of the file to be added.
5. The method of claim 3, wherein determining markup information, adding the markup information to the markup file according to the linguistic rules of the relationship file, comprises:
determining binary mark content information of the mark information and determining preset identification information of the mark information;
determining rId value of the Relationship Id according to the Relationship Id decreasing rule of the Relationship file, and adding the preset identification information and the binary label content information to the position after rId value.
6. The method of claim 5, further comprising:
if the marking information identification trigger event is detected, determining the file type of the file to be identified;
if the file type is the target file type, reading a relation file obtained after the file to be identified is decompressed;
and if the relation file comprises preset identification information, determining that the file to be identified has an invisible mark.
7. The method of claim 6, wherein after determining that the document to be identified has the invisible mark, the method further comprises:
and identifying the binary mark content information included in the relation file according to a preset rule to obtain an identification result of the invisible mark.
8. An invisible mark adding device, characterized in that the device comprises:
the file type determining module is used for acquiring a file to be added and determining the file type of the file to be added if a mark adding triggering event is detected;
the mark file determining module is used for determining that the relation file obtained after the file to be added is decompressed is a mark file if the file type is the target file type;
and the marking information adding module is used for determining marking information and adding the marking information to the marking file according to the language rule of the relation file.
9. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the method of adding an invisible mark as claimed in any one of claims 1 to 7.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of adding an invisible mark according to any one of claims 1-7 when executing the computer program.
CN202110788136.3A 2021-07-13 2021-07-13 Invisible mark adding method, device, medium and electronic equipment Active CN113254408B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110788136.3A CN113254408B (en) 2021-07-13 2021-07-13 Invisible mark adding method, device, medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110788136.3A CN113254408B (en) 2021-07-13 2021-07-13 Invisible mark adding method, device, medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN113254408A true CN113254408A (en) 2021-08-13
CN113254408B CN113254408B (en) 2021-11-12

Family

ID=77191137

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110788136.3A Active CN113254408B (en) 2021-07-13 2021-07-13 Invisible mark adding method, device, medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113254408B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113904879A (en) * 2021-12-10 2022-01-07 北京指掌易科技有限公司 Mobile terminal file tracking method and device, electronic equipment and storage medium
CN114329367A (en) * 2022-03-14 2022-04-12 天津联想协同科技有限公司 Network disk file tracing method and device, network disk and storage medium
CN114357524A (en) * 2022-03-08 2022-04-15 北京时代亿信科技股份有限公司 Electronic document processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1790420A (en) * 2005-12-01 2006-06-21 北京北大方正电子有限公司 Method and apparatus for embedding and detecting digital watermark in text file
CN103347019A (en) * 2013-06-28 2013-10-09 无锡华御信息技术有限公司 Secret-leakage-resisting method based on watermark technology
US20160035060A1 (en) * 2013-03-15 2016-02-04 Send Only Oked Documents (Sood) Method for watermarking the text portion of a document
CN105574371A (en) * 2015-12-14 2016-05-11 中国地质大学(武汉) Text watermark based android application information hiding and software protection method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1790420A (en) * 2005-12-01 2006-06-21 北京北大方正电子有限公司 Method and apparatus for embedding and detecting digital watermark in text file
US20160035060A1 (en) * 2013-03-15 2016-02-04 Send Only Oked Documents (Sood) Method for watermarking the text portion of a document
CN103347019A (en) * 2013-06-28 2013-10-09 无锡华御信息技术有限公司 Secret-leakage-resisting method based on watermark technology
CN105574371A (en) * 2015-12-14 2016-05-11 中国地质大学(武汉) Text watermark based android application information hiding and software protection method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113904879A (en) * 2021-12-10 2022-01-07 北京指掌易科技有限公司 Mobile terminal file tracking method and device, electronic equipment and storage medium
CN114357524A (en) * 2022-03-08 2022-04-15 北京时代亿信科技股份有限公司 Electronic document processing method and device
CN114329367A (en) * 2022-03-14 2022-04-12 天津联想协同科技有限公司 Network disk file tracing method and device, network disk and storage medium
CN114329367B (en) * 2022-03-14 2022-07-26 天津联想协同科技有限公司 Network disk file tracing method and device, network disk and storage medium

Also Published As

Publication number Publication date
CN113254408B (en) 2021-11-12

Similar Documents

Publication Publication Date Title
CN113254408B (en) Invisible mark adding method, device, medium and electronic equipment
US10621381B2 (en) Event log tamper detection
CN107545181B (en) Program operating method, terminal, and computer-readable storage medium
TW201642156A (en) Page jumps based on text hiding
CN112069468B (en) Page dynamic watermark method and device
US11501016B1 (en) Digital password protection
CN105760761A (en) Software behavior analyzing method and device
CN110347678B (en) Financial data storage method, system, device and equipment
CN105912946A (en) Document detection method and device
CN113656825B (en) Text watermark embedding method, text tampering detection method, text watermark embedding device, text tampering detection device and electronic equipment
CN108133026B (en) Multi-data processing method, system and storage medium
CN109558548B (en) Method for eliminating CSS style redundancy and related product
CN110750388B (en) Backup analysis method, device, equipment and medium
CN106648913B (en) Data acquisition software identification method and device
CN109117642A (en) A kind of the file reading leak detection method and device of application program
EP3547182A1 (en) Method and apparatus for publishing works on network
CN105786415A (en) File printing encryption method and device
CN111178010B (en) Method and system for displaying digital signature, data editing method and terminal
JP2022553498A (en) Event log tamper resistance
CN107180188B (en) System for extracting plaintext applied to encryption based on dynamic taint analysis
CN113987470B (en) Executable file processing method and device, electronic equipment and computer readable medium
CN116881915B (en) File detection method, electronic device and storage medium
CN111404662B (en) Data processing method and device
KR101871407B1 (en) Apparatus for identifying work history of removable storage media and method using the same
JP2005285020A (en) Method for guaranteeing originality, information processor, program, and recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant